CN106782495A - The recognition methods of malicious call and device - Google Patents

The recognition methods of malicious call and device Download PDF

Info

Publication number
CN106782495A
CN106782495A CN201510808754.4A CN201510808754A CN106782495A CN 106782495 A CN106782495 A CN 106782495A CN 201510808754 A CN201510808754 A CN 201510808754A CN 106782495 A CN106782495 A CN 106782495A
Authority
CN
China
Prior art keywords
call
voice
malicious call
malicious
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510808754.4A
Other languages
Chinese (zh)
Inventor
王务志
王军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510808754.4A priority Critical patent/CN106782495A/en
Priority to PCT/CN2016/106145 priority patent/WO2017084591A1/en
Publication of CN106782495A publication Critical patent/CN106782495A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Recognition methods and device the invention discloses a kind of malicious call, during receiving calls, gather other side's voice of certain time length;Other side's voice is sent to cloud server, so that other side's voice is carried out speech analysis by cloud server, obtain the phonetic feature point of other side's voice, the phonetic feature point of other side's voice is matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, when the match is successful, the prompting of malicious call is returned;The prompting of the malicious call fed back according to cloud server, shows the prompting of the malicious call on call interface.Improving user makes telephonic security.

Description

The recognition methods of malicious call and device
Technical field
The invention belongs to mobile device technology field, specifically, it is related to a kind of identification side of malicious call Method and device.
Background technology
In current social using phone without recipient permit, carry out mandatory illegal phone advertisement, Phone is publicized and faxed, and they not only also often dial harassing and wrecking at dead of night, continuously on daytime Phone, disturbs the normal living environment of people and working environment, due to harassing call unbridledly It is much to implement harassing and wrecking words by the method for the networking telephone to move, existing public telephone network cannot be known again The source of other harassing call, it is also difficult to differentiate harassing call and normal telephone, and due to current Telephone set can only be by by the preset trusted telephone number of user oneself, isolating the side of other all phones Method prevents harassing call, and this just greatly limit the purposes of telephone set, therefore harassing call is difficult Du Absolutely, utilized by saboteur in society and bad commercial competition, carry out illegal harassing and wrecking activity.
The content of the invention
In view of this, the recognition methods this application provides a kind of malicious call and device, it is possible to achieve logical The matching for crossing phonetic feature point is intercepted to malicious call.
The embodiment of the present invention provides a kind of recognition methods of malicious call, including:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface The prompting of words.
Alternatively, described method, also includes:
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call Characteristic point is saved in malicious call voice feature data storehouse.
Alternatively, the malicious call includes intermediary's phone, sale call, fraudulent call, harassing call Or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
Alternatively, the voice of malicious call is carried out after the recording of certain time length, is also included:
According to the label that user selects, the label information is added in the voice of the malicious call recorded.
Alternatively, the voice of malicious call is carried out after the recording of certain time length, is also included:
Caller ID is added in the voice of the malicious call recorded.
Alternatively, the malicious call voice feature data storehouse includes:The incoming call number of multiple malicious calls Code information, the phonetic feature point information of multiple malicious calls, the label information of the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
Alternatively, it is anti-according to cloud server if the prompting of the malicious call includes label information The prompting of the malicious call of feedback, shows the prompting of the malicious call on call interface, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface Show the corresponding malicious call label of the label information.
Alternatively, described method also includes:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
The embodiment of the present invention also provides a kind of identifying device of malicious call, including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface Show the prompting of the malicious call.
Alternatively, described device also includes:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call, The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
Alternatively, the malicious call includes intermediary's phone, sale call, fraudulent call, harassing call Or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection Corresponding malicious call.
Alternatively, described device also includes:
Add module, for the label selected according to user, adds in the voice of the malicious call recorded The label information.
Alternatively, the add module, is additionally operable to add incoming call number in the voice of the malicious call recorded Code.
Alternatively, the malicious call voice feature data storehouse includes:The incoming call number of multiple malicious calls Code information, the phonetic feature point information of multiple malicious calls, the label information of the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
Alternatively, if the prompting of the malicious call includes label information, the display module is used for: The label information that prompting according to the malicious call includes, shows the label letter on call interface Cease corresponding malicious call label.
Alternatively, the acquisition module, is additionally operable to during receiving calls, and gathers the right of certain time length Fang Yuyin;
The sending module, is additionally operable to for other side's voice to be sent to cloud server, so that cloud server Other side's voice is carried out into speech analysis, the phonetic feature point of other side's voice is obtained, by the voice of other side's voice Characteristic point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building, With it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module, whether be additionally operable to be fed back according to cloud server is that the selection of malicious call is carried Show, when user's selection malicious call option is detected, the malicious call option that user is selected passes through institute State sending module and be sent to cloud server, so that cloud server protects the phonetic feature point of other side's voice It is stored in malicious call voice feature data storehouse.
The embodiment of the present invention is based on malicious call voice feature data storehouse, when user is in the process of receiving calls In, other side's voice of certain time length can be gathered;And other side's voice is sent to cloud server, so that Other side's voice is carried out speech analysis by cloud server, the phonetic feature point of other side's voice is obtained, by other side The phonetic feature point of voice is matched with the phonetic feature point in malicious call voice feature data storehouse, When the match is successful, the prompting of malicious call is returned;Further, the malice fed back according to cloud server The prompting of phone, shows the prompting of the malicious call on call interface, so that user hangs up electricity in time Words malicious call, preventing from having dust thrown into the eyes, therefore can improve user makes telephonic security.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application Point, the schematic description and description of the application is used to explain the application, does not constitute to the application's Improper restriction.In the accompanying drawings:
Fig. 1 is a kind of collocation method in the phonetic feature storehouse of malicious call of the offer of the embodiment of the present application Schematic flow sheet;
Fig. 2 is a kind of schematic flow sheet of the recognition methods of malicious call of the offer of the embodiment of the present application;
Fig. 3 is a kind of structural representation of the identifying device of malicious call of the offer of the embodiment of the present application.
Specific embodiment
Embodiments of the present invention are described in detail below in conjunction with drawings and Examples, thereby to the present invention How application technology means can fully understand to solve technical problem and reach the implementation process of technology effect And implement according to this.
In a typical configuration, computing device include one or more processors (CPU), input/ Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM). Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by Any method or technique realizes information Store.Information can be computer-readable instruction, data structure, The module of program or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other The random access memory (RAM) of type, read-only storage (ROM), electrically erasable is read-only deposits Reservoir (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be counted The information that calculation equipment is accessed.Defined according to herein, computer-readable medium does not include non-temporary computer Readable media (transitory media), such as data-signal and carrier wave of modulation.
Some vocabulary are such as have invoked in the middle of specification and claim to censure specific components.This area skill Art personnel are, it is to be appreciated that hardware manufacturer may call same component with different nouns.This explanation Book and claim not in the way of the difference of title is used as distinguishing component, but with component in function On difference be used as distinguish criterion.Such as " the bag in specification in the whole text and claim mentioned in Containing " it is an open language, therefore " include but be not limited to " should be construed to." substantially " refer to can In the error range of reception, those skilled in the art can solve the technology in the range of certain error and ask Topic, basically reaches the technique effect.Additionally, " coupling " one word is herein comprising any directly and indirect Electric property coupling means.Therefore, if a first device is coupled to a second device described in text, represent The first device can directly be electrically coupled to the second device, or by other devices or coupling means The second device is electrically coupled to indirectly.Specification subsequent descriptions are implementation preferable implementation of the invention Mode, so the description is for the purpose of illustrating rule of the invention, to be not limited to the present invention Scope.Protection scope of the present invention ought be defined depending on the appended claims person of defining.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to contain Lid nonexcludability is included, so that commodity or system including a series of key elements not only include those Key element, but also other key elements including being not expressly set out, or also include for this commodity or The intrinsic key element of system.In the absence of more restrictions, being limited by sentence "including a ..." Fixed key element, it is not excluded that also exist in the commodity or system including the key element it is other it is identical will Element
The recognition methods of the malicious call of the embodiment of the present invention is to be based on malicious call voice feature data storehouse, When user is during receiving calls, other side's voice of certain time length can be gathered;And send out other side's voice Cloud server is given, so that other side's voice is carried out speech analysis by cloud server, other side's voice is obtained Phonetic feature point, by the language in the phonetic feature point of other side's voice and malicious call voice feature data storehouse Sound characteristic point is matched, and when the match is successful, returns to the prompting of malicious call;Further, according to The prompting of the malicious call of cloud server feedback, shows carrying for the malicious call on call interface Show, so that user hangs up the telephone malicious call in time, prevent from having dust thrown into the eyes.
Therefore, before the recognition methods of malicious call provided in an embodiment of the present invention is discussed in detail, this hair The bright embodiment illustratively collocation method in the phonetic feature storehouse of malicious call first:
Fig. 1 is a kind of collocation method in the phonetic feature storehouse of malicious call of the offer of the embodiment of the present application Schematic flow sheet, as shown in figure 1, including:
101st, during receiving calls, phone label option is shown on call interface;
The malicious call of the present embodiment for example includes intermediary's phone, sale call, fraudulent call, harassing and wrecking electricity Words or self-defined phone etc., it is corresponding, in the present embodiment, corresponding electricity is provided with to each malicious call Words label, wherein, phone label option for example including the label of intermediary's phone, the label of sale call, The option of the label of fraudulent call, the label of harassing call or self-defined phone label.
102nd, when user selects any label according to other side's voice in phone label option, other side is come Electricity is designated the malicious call corresponding to the label of user's selection;
Specifically, for example, when user determines that incoming call is intermediary's phone according to other side's voice, can be in phone Intermediary's phone label is selected in label option, other side's incoming identification is designated intermediary's phone;And for example, When user determines that incoming call is fraudulent call according to other side's voice, swindle can be selected in phone label option Phone label, fraudulent call is designated by other side's incoming identification, and differ an illustration here.
103rd, the voice to malicious call carries out the recording of certain time length;
Alternatively, the voice of malicious call is carried out in step 103 after the recording of certain time length, is also wrapped Include:According to the phone label that user selects, user's selection is added in the voice of the malicious call recorded Phone label;
Alternatively, the voice of malicious call is carried out in step 103 after the recording of certain time length, is also wrapped Include:Caller ID is added in the voice of the malicious call recorded.
104th, the voice of malicious call is sent to cloud server;
105th, cloud server carries out speech analysis to the voice of malicious call, obtains the language of malicious call Sound characteristic point;
Specifically, phonetic feature point can be carried out using speech recognition technology when step 105 is implemented Extract, specifically include:
Obtain the power spectrum of the voice of the malicious call;
The power spectrum that will be obtained obtains the short-time rating spectrum of noisy speech by filtering process;
Short-time rating spectrum according to the noisy speech for being obtained, noisy speech is asked for by the way of frame is average Medium duration power spectrum;
The medium duration power spectrum of the noisy speech to being obtained carries out asymmetric filtering and shelters anti-noise, with Obtain the medium duration power spectrum of clean speech;
The medium duration power spectrum of medium duration power spectrum, noisy speech according to the clean speech and contain Make an uproar voice short-time rating spectrum obtain clean speech short-time rating spectrum;
Short-time rating spectrum to clean speech carries out energy normalized treatment, to eliminate multiplying property noise;
Short-time rating spectrum to eliminating the clean speech of multiplying property noise the loudness such as carries out and aggravates
The short-time rating of the clean speech after reciprocity loudness exacerbation is composed into row index nonlinear operation;
Short-time rating to having carried out the clean speech after index nonlinear operation is composed and carries out Fourier inversion Change, to ask for cepstrum coefficient;
Mean normalization treatment is carried out to cepstrum coefficient, the phonetic feature point of the malicious call is obtained.
Speech recognition technology of the present invention any can realize that phonetic feature point lifts with existing Speech recognition technology, the present invention this is not limited in any way.
106th, the phonetic feature point of malicious call is saved in malicious call voice feature data storehouse.
In a kind of optional implementation method, if carrying the malice electricity in the voice of the malicious call The label of words;Then step 106 includes when implementing:
The label carried in voice according to the malicious call, sets up the phonetic feature of the malicious call Put the corresponding relation with the label;
The phonetic feature point of the malicious call is saved in malicious call with the corresponding relation of the label Voice feature data storehouse.
In a kind of optional implementation method, if carrying the malice electricity in the voice of the malicious call The caller ID of words;Then step 106 includes when implementing:
The caller ID carried in voice according to the malicious call, sets up the voice of the malicious call The corresponding relation of characteristic point and the caller ID;
The phonetic feature point of the malicious call and the corresponding relation of the caller ID are saved in malice Call voice property data base.
In a kind of optional implementation method, cloud server receives the malicious call that user equipment sends After voice, can also be by the speech recognition of the malicious call into corresponding text information;Set up described Corresponding relation between the phonetic feature point of the text information of malicious call and the malicious call, and by institute The corresponding relation stated between the text information of malicious call and the phonetic feature point of the malicious call is preserved To in malicious call voice feature data storehouse.
In a kind of optional implementation method, the embodiment of the present invention also includes:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
Wherein, the foundation in the white list voice feature data storehouse for pre-building is, for example, as follows:User equipment Contact phone in white list is received, the call voice of contact person in white list is gathered and is sent to high in the clouds clothes Business device, cloud server carries out phonetic feature point extraction to the call voice of contact person in white list, will be white The phonetic feature point of the call voice of contact person is saved in white list voice feature data storehouse in list.
It follows that the collocation method in the phonetic feature storehouse of the malicious call for providing according to embodiments of the present invention Included but is not limited in the malicious call voice feature data storehouse for obtaining:The caller ID of multiple malicious calls Information, the phonetic feature point information of multiple malicious call, the label information of the voice of multiple malicious calls, The corresponding text information of voice of multiple malicious calls;
Further, the collocation method in the phonetic feature storehouse of malicious call provided in an embodiment of the present invention is obtained Malicious call voice feature data storehouse in can also include:The caller ID and malicious call of malicious call Phonetic feature point between corresponding relation, the corresponding relation of the phonetic feature point of malicious call and label, The phonetic feature point of malicious call and the corresponding relation of text information, the caller ID and word of malicious call The corresponding relation of information, the corresponding relation of the label of malicious call and text information, the incoming call of malicious call One-to-one relationship, the caller ID of malicious call between number and phonetic feature point and label, language Sound characteristic point, the one-to-one relationship between label and text information.
Recognition methods below by way of specific embodiment to malicious call of the invention is described in detail.
Fig. 2 is a kind of schematic flow sheet of the recognition methods of malicious call of the offer of the embodiment of the present application, As shown in Fig. 2 including:
201st, during receiving calls, other side's voice of certain time length is gathered;
202nd, other side's voice is sent to cloud server, so that cloud server carries out other side's voice Speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice with build in advance Phonetic feature point in vertical malicious call voice feature data storehouse is matched, and when the match is successful, is returned Return the prompting of malicious call;
Specifically, other side's voice is carried out speech analysis by cloud server, and the voice for obtaining other side's voice is special Levy a little for example includes when realizing:
Obtain the power spectrum of other side's voice;
The power spectrum that will be obtained obtains the short-time rating spectrum of noisy speech by filtering process;
Short-time rating spectrum according to the noisy speech for being obtained, noisy speech is asked for by the way of frame is average Medium duration power spectrum;
The medium duration power spectrum of the noisy speech to being obtained carries out asymmetric filtering and shelters anti-noise, with Obtain the medium duration power spectrum of clean speech;
The medium duration power spectrum of medium duration power spectrum, noisy speech according to the clean speech and contain Make an uproar voice short-time rating spectrum obtain clean speech short-time rating spectrum;
Short-time rating spectrum to clean speech carries out energy normalized treatment, to eliminate multiplying property noise;
Short-time rating spectrum to eliminating the clean speech of multiplying property noise the loudness such as carries out and aggravates
The short-time rating of the clean speech after reciprocity loudness exacerbation is composed into row index nonlinear operation;
Short-time rating to having carried out the clean speech after index nonlinear operation is composed and carries out Fourier inversion Change, to ask for cepstrum coefficient;
Mean normalization treatment is carried out to cepstrum coefficient, the phonetic feature point of other side's voice is obtained.
Specifically, by the phonetic feature point of other side's voice and the malicious call voice feature data for pre-building Phonetic feature point in storehouse is matched for example to be included when realizing:
By in the phonetic feature point of other side's voice and the malicious call voice feature data storehouse for pre-building When phonetic feature point is matched, if the feature point number being consistent is more than or equal to default threshold value, Can determine that the match is successful, otherwise it fails to match.
203rd, the prompting of the malicious call fed back according to cloud server, shows described on call interface The prompting of malicious call.
If the prompting of the malicious call includes label information, step 203 includes:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface Show the corresponding malicious call label of the label information.For example, the malicious call of cloud server feedback Prompting includes fraudulent call label, then the prompting of fraudulent call is shown as on call interface;And for example, The prompting of the malicious call of cloud server feedback includes advertisement telephone label, then show on call interface It is shown as the prompting of advertisement telephone.
The evil that the collocation method in the phonetic feature storehouse based on malicious call provided in an embodiment of the present invention is obtained Meaning call voice property data base, when user is during receiving calls, can gather the right of certain time length Fang Yuyin;And other side's voice is sent to cloud server, so that cloud server carries out other side's voice Speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice and malice electricity Phonetic feature point in language sound property data base is matched, and when the match is successful, returns to malicious call Prompting;Further, the prompting of the malicious call for being fed back according to cloud server, on call interface The prompting of the malicious call is shown, so that user hangs up the telephone malicious call in time, prevents from having dust thrown into the eyes, Therefore user can be improved makes telephonic security.
Fig. 3 is a kind of structural representation of the identifying device of malicious call of the offer of the embodiment of the present application, As shown in figure 3, including:
Acquisition module 31, for during receiving calls, gathering other side's voice of certain time length;
Sending module 32, for other side's voice to be sent into cloud server, so that cloud server will Other side's voice carries out speech analysis, obtains the phonetic feature point of other side's voice, and the voice of other side's voice is special Levy and a little matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, During with success, the prompting of malicious call is returned;
Display module 33, the prompting of the malicious call for being fed back according to cloud server, on call circle The prompting of the malicious call is shown on face.
Alternatively, described device also includes:
Detection module 34, for during receiving calls, according to user instruction, detects user's choosing Select malicious call option;
The acquisition module 31, it is malicious call to be additionally operable to other side's incoming identification, and to malicious call Voice carry out the recording of certain time length;
The sending module 33, is additionally operable to for the voice of malicious call to be sent to cloud server, so that The cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature of malicious call Point, the phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
The malicious call includes intermediary's phone, sale call, fraudulent call, harassing call or self-defined Phone;
The detection module 34 specifically for:During receiving calls, electricity is shown on call interface Words label option, the phone label option include the label of intermediary's phone, the label of sale call, The option of the label of fraudulent call, the label of harassing call or self-defined phone label, so as to user according to It is user's selection by other side's incoming identification when other side's voice selects any label in phone label option Malicious call corresponding to label.
Alternatively, described device also includes:
Add module 35, for the label selected according to user, in the voice of the malicious call recorded Add the label information.
The add module 35, is additionally operable to add caller ID in the voice of the malicious call recorded.
The malicious call voice feature data storehouse includes:The caller ID information of multiple malicious calls, The label information of the phonetic feature point information of multiple malicious calls, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
If the prompting of the malicious call includes label information, the display module 33 is used for:Root According to the label information that the prompting of the malicious call includes, the label information is shown on call interface Corresponding malicious call label.
The acquisition module 31, is additionally operable to during receiving calls, and gathers other side's language of certain time length Sound;
The sending module 32, is additionally operable to for other side's voice to be sent to cloud server, so that high in the clouds takes Other side's voice is carried out speech analysis by business device, the phonetic feature point of other side's voice is obtained, by other side's voice Phonetic feature point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building, Match it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module 34, be additionally operable to according to cloud server feed back whether be malicious call choosing Prompting is selected, when user's selection malicious call option is detected, the malicious call option that user selects is led to Cross the sending module and be sent to cloud server, so that cloud server is by the phonetic feature of other side's voice Point is saved in malicious call voice feature data storehouse.
Fig. 3 shown devices can perform the method described in Fig. 1 and embodiment illustrated in fig. 2, and it realizes former Reason and technique effect are repeated no more.
1a, a kind of recognition methods of malicious call, perform positioned at user equipment side, including:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface The prompting of words.
2a, the method as described in 1a, also include:
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call Characteristic point is saved in malicious call voice feature data storehouse.
3a, the method as described in 2a, the malicious call include intermediary's phone, sale call, swindle Phone, harassing call or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
4a, the method as described in 3a, after carrying out the recording of certain time length to the voice of malicious call, Also include:
According to the label that user selects, the label information is added in the voice of the malicious call recorded.
5a, the method as described in 2a, after carrying out the recording of certain time length to the voice of malicious call, Also include:
Caller ID is added in the voice of the malicious call recorded.
6a, the method as any one of 1a-5a, the malicious call voice feature data storehouse Zhong Bao Include:Phonetic feature point information, the multiple of the caller ID information of multiple malicious calls, multiple malicious calls The label information of the voice of malicious call;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
7a, the method as described in 6a, if the prompting of the malicious call includes label information, root The prompting of the malicious call fed back according to cloud server, shows carrying for the malicious call on call interface Show, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface Show the corresponding malicious call label of the label information.
8a, the method as described in 1a, also include:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
9b, a kind of identifying device of malicious call, including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface Show the prompting of the malicious call.
10b, the device as described in 9b, also include:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call, The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
11b, the device as described in 10b, the malicious call include intermediary's phone, sale call, swindleness Deceive phone, harassing call or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection Corresponding malicious call.
12b, the device as described in 11b, also include:
Add module, for the label selected according to user, adds in the voice of the malicious call recorded The label information.
13b, the device as described in 10b, the add module are additionally operable in the malicious call recorded Caller ID is added in voice.
14b, the device as any one of 9b-13b, in the malicious call voice feature data storehouse Including:It is the caller ID information of multiple malicious calls, the phonetic feature point information of multiple malicious calls, many The label information of the voice of individual malicious call;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
15b, the device as described in 14b, if the prompting of the malicious call includes label information, The display module is used for:The label information that prompting according to the malicious call includes, on call circle The corresponding malicious call label of the label information is shown on face.
16b, the device as described in 9b:
The acquisition module, is additionally operable to during receiving calls, and gathers other side's voice of certain time length;
The sending module, is additionally operable to for other side's voice to be sent to cloud server, so that cloud server Other side's voice is carried out into speech analysis, the phonetic feature point of other side's voice is obtained, by the voice of other side's voice Characteristic point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building, With it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module, whether be additionally operable to be fed back according to cloud server is that the selection of malicious call is carried Show, when user's selection malicious call option is detected, the malicious call option that user is selected passes through institute State sending module and be sent to cloud server, so that cloud server protects the phonetic feature point of other side's voice It is stored in malicious call voice feature data storehouse.
Described above has shown and described some preferred embodiments of the invention, but as it was previously stated, should manage The solution present invention is not limited to form disclosed herein, is not to be taken as the exclusion to other embodiment, And can be used for various other combinations, modification and environment, and can in invention contemplated scope described herein, It is modified by the technology or knowledge of above-mentioned teaching or association area.And those skilled in the art are carried out changes Dynamic and change does not depart from the spirit and scope of the present invention, then all should be in the protection of appended claims of the present invention In the range of.

Claims (10)

1. a kind of recognition methods of malicious call, performs positioned at user equipment side, it is characterised in that bag Include:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface The prompting of words.
2. the method for claim 1, it is characterised in that also include:
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call Characteristic point is saved in malicious call voice feature data storehouse.
3. method as claimed in claim 2, it is characterised in that the malicious call includes dielectric Words, sale call, fraudulent call, harassing call or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected, It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
4. the method as any one of claim 1-3, it is characterised in that the malicious call Voice feature data storehouse includes:The language of the caller ID information of multiple malicious calls, multiple malicious calls The label information of sound characteristic point information, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
5. method as claimed in claim 4, it is characterised in that if in the prompting of the malicious call Including label information, then the prompting of the malicious call for being fed back according to cloud server shows on call interface Show the prompting of the malicious call, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface Show the corresponding malicious call label of the label information.
6. a kind of identifying device of malicious call, it is characterised in that including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface Show the prompting of the malicious call.
7. device as claimed in claim 6, it is characterised in that also include:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call, The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
8. device as claimed in claim 6, it is characterised in that the malicious call includes dielectric Words, sale call, fraudulent call, harassing call or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection Corresponding malicious call.
9. the device as any one of claim 6-8, it is characterised in that the malicious call Voice feature data storehouse includes:The language of the caller ID information of multiple malicious calls, multiple malicious calls The label information of sound characteristic point information, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
10. device as claimed in claim 9, it is characterised in that if in the prompting of the malicious call Including label information, then the display module is used for:The mark that prompting according to the malicious call includes Label information, shows the corresponding malicious call label of the label information on call interface.
CN201510808754.4A 2015-11-20 2015-11-20 The recognition methods of malicious call and device Pending CN106782495A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510808754.4A CN106782495A (en) 2015-11-20 2015-11-20 The recognition methods of malicious call and device
PCT/CN2016/106145 WO2017084591A1 (en) 2015-11-20 2016-11-16 Identification method and device for malicious call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510808754.4A CN106782495A (en) 2015-11-20 2015-11-20 The recognition methods of malicious call and device

Publications (1)

Publication Number Publication Date
CN106782495A true CN106782495A (en) 2017-05-31

Family

ID=58717391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510808754.4A Pending CN106782495A (en) 2015-11-20 2015-11-20 The recognition methods of malicious call and device

Country Status (2)

Country Link
CN (1) CN106782495A (en)
WO (1) WO2017084591A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN108848507A (en) * 2018-05-31 2018-11-20 厦门快商通信息技术有限公司 A kind of bad telecommunication user information collecting method
CN109547621A (en) * 2018-12-11 2019-03-29 平安科技(深圳)有限公司 A kind of information prompting method, device, electronic equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112151070B (en) * 2019-06-26 2023-05-05 杭州海康威视数字技术股份有限公司 Voice detection method and device and electronic equipment
CN110610705B (en) * 2019-09-20 2023-07-25 上海数鸣人工智能科技有限公司 Voice interaction prompter based on artificial intelligence

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095889B (en) * 2013-01-07 2015-06-03 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN105338157A (en) * 2014-07-29 2016-02-17 小米科技有限责任公司 Nuisance call processing method, and device and telephone
CN104184872A (en) * 2014-09-14 2014-12-03 陈桂芳 Crank call preventing mobile phone achieving method based on conversation content
CN104320529A (en) * 2014-11-10 2015-01-28 京东方科技集团股份有限公司 Information receiving processing method and voice communication device
CN105120068A (en) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 Voice communication answering method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN108848507A (en) * 2018-05-31 2018-11-20 厦门快商通信息技术有限公司 A kind of bad telecommunication user information collecting method
CN109547621A (en) * 2018-12-11 2019-03-29 平安科技(深圳)有限公司 A kind of information prompting method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2017084591A1 (en) 2017-05-26

Similar Documents

Publication Publication Date Title
CN106782495A (en) The recognition methods of malicious call and device
US11450324B2 (en) Method of defending against inaudible attacks on voice assistant based on machine learning
CN106686191A (en) Processing method for adaptively identifying harassing call and processing system thereof
CN106790950A (en) The recognition methods of malicious call and device
US20200034743A1 (en) Bot-based data collection for detecting phone solicitations
CN105279416B (en) Personal identification method and its system based on multi-biological characteristic bonding apparatus fingerprint
US9837079B2 (en) Methods and apparatus for identifying fraudulent callers
CN106790949A (en) The collocation method and device in the phonetic feature storehouse of malicious call
CN106778113A (en) The method and apparatus that mobile terminal and application are unlocked by Intelligent worn device
CN106453061A (en) Method and system for recognizing internet fraud behavior
CN106850931A (en) The method and mobile intelligent terminal of Barassment preventing telephone
JP2023515910A (en) System and method for using relationship structure for email classification
US11363139B2 (en) Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks
Li et al. Behaviour profiling on mobile devices
Giura et al. Is it really you? User identification via adaptive behavior fingerprinting
CN104869264A (en) Method of monitoring swindle telephone and joining telephone conference and device of monitoring swindle telephone and joining telephone conference
CN107742068A (en) A kind of implicit identity authorization system of the multi-source of smart machine and method
CN106874718A (en) privacy processing method, device and terminal
KR101033870B1 (en) Method and device for processing spam call
CN106559551A (en) A kind of information cuing method of address list, device
CN106161018A (en) A kind of method and apparatus managing classification password
CN109246296A (en) A kind of mobile phone safe information generates and storage method
Marzuoli et al. Call me: Gathering threat intelligence on telephony scams to detect fraud
RO135860A2 (en) System and method for anonymization of identification data of persons participating in an audio/video call
CN115396548B (en) Incoming call interception method and device, wearable equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication