CN107105108A - A kind of processing method and its system of anti-alarm harassing call - Google Patents
A kind of processing method and its system of anti-alarm harassing call Download PDFInfo
- Publication number
- CN107105108A CN107105108A CN201710263310.6A CN201710263310A CN107105108A CN 107105108 A CN107105108 A CN 107105108A CN 201710263310 A CN201710263310 A CN 201710263310A CN 107105108 A CN107105108 A CN 107105108A
- Authority
- CN
- China
- Prior art keywords
- harassing
- blacklist
- alarm
- incoming call
- caller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/63—Querying
- G06F16/635—Filtering based on additional data, e.g. user or group profiles
- G06F16/636—Filtering based on additional data, e.g. user or group profiles by using biological or physiological data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/683—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/686—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title or artist information, time, location or usage information, user ratings
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Library & Information Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biophysics (AREA)
- Physiology (AREA)
- Molecular Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a kind of processing method and its system of anti-alarm harassing call, and methods described includes the alarm voice information and corresponding caller ID that handle position obtains incoming call;The harassing and wrecking number blacklist that prestores in server is obtained, and judges that the caller ID whether there is in the harassing and wrecking number blacklist prestored, if sending harassing and wrecking prompt message in the presence of if;The harassing and wrecking prompt message is received, the vocal print feature of caller is extracted from the alarm voice information of acquisition;Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if being already present in the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.The processing method and its system for the anti-alarm harassing call that the present invention is provided, discrimination are high, and distinguishing speed is fast, can timely and effectively intercept alarm harassing call.
Description
Technical field
The present invention relates to public security warning system technical field, the processing method of more particularly to a kind of anti-alarm harassing call and
Its system.
Background technology
As urbanization constantly develops, the generation of various accidents is also increasingly frequent, such as natural calamity, social calamity
The accident occurrence frequency such as evil, public health disaster, Accidents Disasters is continuously increased, and adds the continuous improvement of quality of the residents,
In many cases, all many warm-hearted peoples can actively alarm after occurring disaster.It is all that a danger is sought help to alarm each time, is closed
The safety of life and property of the masses.However, the various harassing calls continuously emerged have had a strong impact on the normal fortune of warning system
Make.
Current panoramic false alarm, malice harassing and wrecking etc., allow warning system and the person of receiving a crime report to meet with a variety of puzzlements.110、
119 grade alarm first-aid phones belong to the social public resource in service civic, there is the solemnity for not allowing to make fun of.However, exactly this
The ambulance call of sample, by some intentional harassing and wrecking, or even set off false alarms, mischief.Someone is intentional, and someone is out of curiosity
The heart, someone makes trouble wilfully, and someone carries unwarranted demand, and someone saddles with a difficult task, these behaviors that someone makes trouble after drinking etc., serious dry
The normal order of work of public security organ is disturbed, police strength, the serious waste of financial resources is caused;Simultaneously as their behavior is occupied
Public resource, often allowing really needs the anxious user for dialing these numbers not come in, and delays rescue time, or because report
False alarm wastes the substantial amounts of human and material resources of public resource, financial resources.
To avoid harassing call from taking the circuit of alarm station, the technological means used at present is mainly reported false by " interception "
Alert telephone number, the telephone number of multiple harassing and wrecking warning system is locked and blacklist is added, is allowed in certain time
In can not alarm again.This processing mode has significant limitations in actual use:One side harassing and wrecking person can change phone after
Continuous to be harassed, it is possible to use public telephone is harassed, prior art can not all be blocked;On the other hand, it is added into " black name
The telephone number of list " may also really need to use the anxious user of these telephone calls not come in due to allowing, and easily cause mistake
Sentence, cause the accident.Therefore, these means are more and more under suspicion.
Take effective means, on the premise of legal, harassing call blocked reliably, in time and harassing and wrecking personnel are traced,
The problem of being in the urgent need to address at present.
The content of the invention
For problem above, patent purpose of the present invention be to devise a kind of anti-alarm harassing call processing method and its
System, can timely and effectively intercept alarm harassing call.
To achieve the above object, the present invention specifically provides following technical scheme:
A kind of processing method of anti-alarm harassing call, it is used for alert receiving system, and the alert receiving system is at least wrapped
A server is included, and the multiple handle positions being connected are communicated with server;Including:
Handle position obtains the alarm voice information and corresponding caller ID of incoming call;
The harassing and wrecking number blacklist prestored in server is obtained, and judges that the caller ID whether there is in disturbing for prestoring
Disturb in number blacklist, if sending harassing and wrecking prompt message in the presence of if;
Receive after the harassing and wrecking prompt message, the vocal print feature of caller is extracted from the alarm voice information of acquisition;
Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if being already present on
In the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.
It is preferred that, methods described further comprises:
The alarm voice information that handle position is obtained to incoming call judges, it is determined that the alarm voice information is believed for harassing and wrecking
During breath, extract the vocal print feature of caller and be added in blacklist sound bank, while adding corresponding caller ID to harassing and wrecking
In number blacklist.
It is preferred that, methods described further comprises:If it is determined that the vocal print feature is not present in blacklist sound bank, i.e.,
When determining the incoming call for non-disturbance incoming call, then the caller ID is deleted from harassing and wrecking number blacklist.
It is preferred that, it is determined that it is described incoming call be disturbance incoming call after, by the caller ID storage arrive and the blacklist
In the corresponding harassing and wrecking number blacklist of sound bank.
It is preferred that, the one or more harassing and wrecking black names of number of blacklist voice correspondence in the blacklist sound bank
It is single.
It is preferred that, the handle position can cut off harassing and wrecking in time after the determination incoming call is received for the information of disturbance incoming call
Send a telegram here or be transferred to and handled in specific handle position.
According to another aspect of the present invention there is provided a kind of processing system of anti-alarm harassing call, the system includes:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
It is preferred that, second determination module further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if having deposited
Then determining that the incoming call is disturbance incoming call.
It is preferred that, the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to
Handle position sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
It is preferred that, the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
By above scheme, the processing method and its system of a kind of anti-alarm harassing call that the present invention is provided, report
Alert handling desk is after incoming call is received, if it is determined that caller ID then sends prompt message for harassing and wrecking number to handle position, goes forward side by side one
Step carries out automatic identification by the alarm voice collected, using legal, technically reliable, and discrimination is high, distinguishing speed
It hurry up, the operational paradigm of public security alarm station can be greatly improved, save the manpower and communication resources of alarm station, more can be timely and effectively
Intercept alarm harassing call.
Brief description of the drawings
Embodiments of the present invention is further illustrated referring to the drawings, wherein:
Fig. 1 is the schematic flow sheet of the processing method of the anti-alarm harassing call of the present invention;
Fig. 2 is the structural representation of the processing system of the anti-alarm harassing call of the present invention;
Fig. 3 is the structural representation of the second determination module of the processing system of the anti-alarm harassing call of the present invention.
Embodiment
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the limitation of blacklist blocking disturbance call in existing police system, take effective means, closing
On the premise of method, harassing call being blocked reliably, in time and harassing and wrecking personnel are traced, it is electric that the present invention proposes a kind of anti-alarm harassing and wrecking
The processing method and system of words.
The implementation principle of processing method of anti-alarm harassing call provided in an embodiment of the present invention is:Handle position is in advance to coming
When electric alarm phone carries out being judged as harassing call, extract the vocal print feature of caller and be added in blacklist sound bank.
During normally receiving a crime report, handle position obtains alarm voice information and corresponding caller ID after receiving alarm incoming call, passes through first
Caller ID determines whether to harass number blacklist, if then sending harassing and wrecking prompt message and further being believed by alarm voice
The vocal print feature extracted in breath is judged whether in blacklist sound bank, so as to judge to determine whether as disturbance incoming call.This
Kind by way of caller's vocal print feature is determined whether, it can effectively be confirmed whether it is disturbance incoming call, it is to avoid erroneous judgement and not
Rational situation occurs, and reliably, blocks harassing call in time.
The preferred embodiments of the present invention are illustrated below in conjunction with Figure of description, it will be appreciated that described herein
Preferred embodiment is merely to illustrate and explain the present invention, and is not intended to limit the present invention, and in the case where not conflicting, this hair
The feature in embodiment and embodiment in bright can be mutually combined.
The processing method for the anti-alarm harassing call that the present invention is provided, it is used for alert receiving system, and the alert, which is accepted, is
System at least includes a server, and communicates the multiple handle positions being connected with server, and handle position is responsible for access alarm incoming call.Please
Refering to Fig. 1, it is the processing method implementation process diagram of anti-alarm harassing call provided in an embodiment of the present invention, specifically can be with
Including:
Step S101, handle position obtains the alarm voice information and corresponding caller ID of incoming call.
Specifically, alarm handle position is when having listened to incoming call incoming call, the alarm voice information and incoming call number of incoming call are obtained
Code.The telephone number that the caller ID can receive for terminal, for example:Phone number, fixed telephone number or network IP
Telephone number etc..
Step S102, obtains the harassing and wrecking number blacklist prestored in server, and judge that the caller ID whether there is
In the harassing and wrecking number blacklist prestored, if sending harassing and wrecking prompt message in the presence of if.
Specifically, handle position is obtained after caller ID, the blacklist checking of harassing and wrecking number is carried out first, and part checking judges described
Caller ID whether there is in the harassing and wrecking number blacklist prestored.
Server can be the server with number inquiry function, be provided with the harassing and wrecking number of storage harassing call
Blacklist storehouse.Server is received after caller ID, can be somebody's turn to do by being inquired about in harassing and wrecking number blacklist storehouse in the server
Caller ID, if comprising sending harassing and wrecking prompt message, the prompt message only points out the handle position incoming call to come for harassing and wrecking
Electricity, need to further be verified.If do not included, it is judged as normal incoming call.
Wherein, the harassing call information stored in server in the harassing and wrecking number blacklist storehouse can be by alert systematic collection
And store into server, or by handle position confirm after be added in server.
Step S103, receives the harassing and wrecking prompt message, and the vocal print of caller is extracted from the alarm voice information of acquisition
Feature.
Specifically, after step S102 confirmations may be disturbance incoming call, further obtaining in alarm voice information and extracting next
The vocal print feature of electric person.
The generation of human language is a complicated physiology physical process between Body Languages maincenter and vocal organs, and people exists
The phonatory organ used during speech:Everyone widely different in terms of size and form such as tongue, tooth, larynx, lung, nasal cavity,
So the voiceprint map of any two people is all variant.Application on Voiceprint Recognition identifies the identity of speaker from certain section of voice
Process.
Application on Voiceprint Recognition has two key issues:One is feature extraction, and two be pattern match.
The task of feature extraction is to extract and select have the characteristics such as separability is strong, stability is high to the vocal print of speaker
Acoustics or language feature.Different from speech recognition, the feature of Application on Voiceprint Recognition must be " personalization " feature, and Speaker Identification
Feature must be " common feature " for speaker.Although major part Voiceprint Recognition System is all acoustics aspect at present
Feature, but the feature for characterizing a personal touch should be multifaceted, including:(1) with the anatomy of the pronunciation mechanism of the mankind
The relevant acoustic feature of structure (such as frequency spectrum, cepstrum, formant, fundamental tone, reflectance factor), nasal sound, band deep breathing sound, sand
Dumb sound, laugh etc.;(2) semanteme that is influenceed by socioeconomic status, education level, birthplace etc., rhetoric, pronunciation, speech are practised
It is used to;(3) feature such as personal touch or the rhythm, rhythm, speed, intonation, the volume that are influenceed by father and mother.Can from utilization mathematical method
Set out with the angle of modeling, the feature that vocal print automatic identification model can be used at present includes:(1) acoustic feature (cepstrum);
(2) lexical characteristics (speaker related word n-gram, phoneme n-gram);(3) prosodic features (fundamental tone described using n-gram
With energy " posture ");(4) languages, dialect and accent information;(5) channel information etc..
Extract after vocal print feature, it is possible to the identification of speaker's identity is carried out using vocal print feature.It is existing for pattern-recognition
There is technology there are following a few major class methods:Template matching method, arest neighbors method, neural net method, hidden Markov model
(HMM) method, VQ clustering methods (such as LBG), multinomial classifier methods.
Step S104, determines that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if
It is already present in the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.
Specifically, server determines whether incoming call after the vocal print feature for completing caller is extracted by Characteristic Contrast
Whether the vocal print feature of person is had stored in blacklist voice Kuku.If in existing blacklist voice Kuku, it is determined that
The incoming call is disturbance incoming call and notifies handle position;
Wherein, the blacklist voice stored in server in the blacklist sound bank by alert systematic collection and can be stored
Into server, or by handle position confirm after be added in server.
The alarm voice information that handle position is obtained to incoming call judges, when incoming call described in manual confirmation is disturbance incoming call
When, extract and preserve the vocal print feature of caller and be added in blacklist sound bank, arrived while adding corresponding caller ID
Harass in number blacklist.
Optionally, if there is no in blacklist voice Kuku, being then judged as normal incoming call, therefore the incoming call is determined
For non-disturbance incoming call, then the caller ID is deleted from harassing and wrecking number blacklist.
Optionally, it is determined that it is described incoming call be disturbance incoming call after, by the caller ID storage arrive and the blacklist
In the corresponding harassing and wrecking number blacklist of sound bank.
Optionally, the one or more harassing and wrecking black names of number of blacklist voice correspondence in the blacklist sound bank
It is single.
Optionally, the handle position can cut off harassing and wrecking in time after the determination incoming call is received for the information of disturbance incoming call
Send a telegram here or be transferred to and handled in specific handle position.After determining the incoming call for the information of disturbance incoming call, handle position work
Personnel can cut off harassing call in time, or go in special process circuit the harassing and wrecking person that correlation is handled by special personnel.
It is this by way of caller's vocal print feature is determined whether, can effectively be confirmed whether it is disturbance incoming call, keep away
Exempt from erroneous judgement and irrational situation occurs, in time, reliably block harassing call.
Based on same inventive concept, a kind of processing system of anti-alarm harassing call is additionally provided in the embodiment of the present invention,
Because the principle that said system solves problem is similar to the processing method of anti-alarm harassing call, therefore the implementation of said system can
With referring to the implementation of method.
Referring to Fig. 2, its structural representation for the processing system of anti-alarm harassing call provided in an embodiment of the present invention,
Specifically include:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
Referring to Fig. 3, it is the structural representation of the second determination module provided in an embodiment of the present invention, described second judges
Module, further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if having deposited
Then determining that the incoming call is disturbance incoming call.
Preferably, the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to
Handle position sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
Preferably, the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
The embodiment of present invention described above, is not intended to limit the scope of the present invention..Any basis
Various other corresponding changes and deformation that the technical concept of the present invention is made, should be included in the guarantor of the claims in the present invention
In the range of shield.
Claims (10)
1. a kind of processing method of anti-alarm harassing call, it is used for alert receiving system, and the alert receiving system at least includes
One server, and communicate the multiple handle positions being connected with server;It is characterised in that it includes:
Handle position obtains the alarm voice information and corresponding caller ID of incoming call;
The harassing and wrecking number blacklist prestored in server is obtained, and judges that the caller ID whether there is in the harassing and wrecking number
In blacklist, if sending harassing and wrecking prompt message in the presence of if;
Receive after the harassing and wrecking prompt message, the vocal print feature of caller is extracted from the alarm voice information of acquisition;
Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if having existed, really
The fixed incoming call is disturbance incoming call and notifies handle position.
2. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that methods described is further wrapped
Include:
The alarm voice information that handle position is obtained to incoming call judges, it is determined that the alarm voice information is harassing and wrecking information
When, extract the vocal print feature of caller and be added in blacklist sound bank, while adding corresponding caller ID to harassing and wrecking number
In code blacklist.
3. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that methods described is further wrapped
Include:If it is determined that the vocal print feature is not present in blacklist sound bank, that is, when determining the incoming call for non-disturbance incoming call, then will
The caller ID is deleted from harassing and wrecking number blacklist.
4. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that it is determined that the incoming call is
After disturbance incoming call, by caller ID storage into harassing and wrecking number blacklist corresponding with the blacklist sound bank.
5. the processing method of anti-alarm harassing call according to claim 4, it is characterised in that the blacklist sound bank
In a blacklist voice correspondence it is one or more harassing and wrecking number blacklists.
6. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that the handle position is being received
After determining the incoming call for the information of disturbance incoming call, disturbance incoming call can be cut off in time or is transferred in specific handle position and is located
Reason.
7. a kind of processing system of anti-alarm harassing call, it is characterised in that the system includes:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
8. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that described second judges mould
Block, further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if existing
It is disturbance incoming call to determine the incoming call.
9. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to accepting
Seat sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
10. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710263310.6A CN107105108A (en) | 2017-04-21 | 2017-04-21 | A kind of processing method and its system of anti-alarm harassing call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710263310.6A CN107105108A (en) | 2017-04-21 | 2017-04-21 | A kind of processing method and its system of anti-alarm harassing call |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107105108A true CN107105108A (en) | 2017-08-29 |
Family
ID=59657187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710263310.6A Pending CN107105108A (en) | 2017-04-21 | 2017-04-21 | A kind of processing method and its system of anti-alarm harassing call |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107105108A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848507A (en) * | 2018-05-31 | 2018-11-20 | 厦门快商通信息技术有限公司 | A kind of bad telecommunication user information collecting method |
CN109688275A (en) * | 2018-12-27 | 2019-04-26 | 中国联合网络通信集团有限公司 | Harassing call recognition methods, device and storage medium |
CN110010135A (en) * | 2018-01-05 | 2019-07-12 | 北京搜狗科技发展有限公司 | A kind of voice-based personal identification method, device and electronic equipment |
CN110767238A (en) * | 2019-09-19 | 2020-02-07 | 平安科技(深圳)有限公司 | Blacklist identification method, apparatus, device and storage medium based on address information |
CN112185083A (en) * | 2019-07-04 | 2021-01-05 | 北京航天长峰科技工业集团有限公司 | Repeated alarm judging method |
CN113160459A (en) * | 2021-04-01 | 2021-07-23 | 深圳市欧瑞博科技股份有限公司 | Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium |
-
2017
- 2017-04-21 CN CN201710263310.6A patent/CN107105108A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110010135A (en) * | 2018-01-05 | 2019-07-12 | 北京搜狗科技发展有限公司 | A kind of voice-based personal identification method, device and electronic equipment |
CN110010135B (en) * | 2018-01-05 | 2024-05-07 | 北京搜狗科技发展有限公司 | Speech-based identity recognition method and device and electronic equipment |
CN108848507A (en) * | 2018-05-31 | 2018-11-20 | 厦门快商通信息技术有限公司 | A kind of bad telecommunication user information collecting method |
CN109688275A (en) * | 2018-12-27 | 2019-04-26 | 中国联合网络通信集团有限公司 | Harassing call recognition methods, device and storage medium |
CN112185083A (en) * | 2019-07-04 | 2021-01-05 | 北京航天长峰科技工业集团有限公司 | Repeated alarm judging method |
CN110767238A (en) * | 2019-09-19 | 2020-02-07 | 平安科技(深圳)有限公司 | Blacklist identification method, apparatus, device and storage medium based on address information |
WO2021051533A1 (en) * | 2019-09-19 | 2021-03-25 | 平安科技(深圳)有限公司 | Address information-based blacklist identification method, apparatus, device, and storage medium |
CN113160459A (en) * | 2021-04-01 | 2021-07-23 | 深圳市欧瑞博科技股份有限公司 | Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107105108A (en) | A kind of processing method and its system of anti-alarm harassing call | |
CN106550155A (en) | Suspicious number is carried out swindling the method and system that sample screens classification and interception | |
US10715662B2 (en) | System and method for artificial intelligence on hold call handling | |
CN109192202B (en) | Voice safety recognition method, device, computer equipment and storage medium | |
US20100228656A1 (en) | Apparatus and method for fraud prevention | |
CN108696644A (en) | Cooperate phone credit system | |
US20030120486A1 (en) | Speech recognition system and method | |
JP2007096963A (en) | Telephone apparatus | |
CN103179122A (en) | Telcom phone phishing-resistant method and system based on discrimination and identification content analysis | |
JP2007323107A (en) | Phishing scam prevention system | |
CN110070875B (en) | Anti-telecommunication fraud method based on voice keyword detection and voiceprint | |
CN108010289A (en) | A kind of internet alarm method and system based on Application on Voiceprint Recognition | |
CN110349586A (en) | Telecommunication fraud detection method and device | |
CN108074577A (en) | Identity identifying method and identity authorization system | |
CN111768789B (en) | Electronic equipment, and method, device and medium for determining identity of voice generator of electronic equipment | |
CN112508311A (en) | Data processing method and device for risk prediction | |
CN113744742B (en) | Role identification method, device and system under dialogue scene | |
JP2007266944A (en) | Telephone terminal and caller verification method | |
CN104580725A (en) | Method for hinting fraud calls and communication terminal | |
CN206553008U (en) | A kind of speech recognition emergency help system | |
CN111210827B (en) | Method and device for responding to alarm, electronic equipment and readable storage medium | |
CN107247792A (en) | Match method, device and the computer equipment of functional department | |
CN111179969A (en) | Alarm method, device and system based on audio information and storage medium | |
KR20210069899A (en) | System for detecting voice phishing | |
CN116915903A (en) | Call voice processing method, device, server and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170829 |