CN107105108A - A kind of processing method and its system of anti-alarm harassing call - Google Patents

A kind of processing method and its system of anti-alarm harassing call Download PDF

Info

Publication number
CN107105108A
CN107105108A CN201710263310.6A CN201710263310A CN107105108A CN 107105108 A CN107105108 A CN 107105108A CN 201710263310 A CN201710263310 A CN 201710263310A CN 107105108 A CN107105108 A CN 107105108A
Authority
CN
China
Prior art keywords
harassing
blacklist
alarm
incoming call
caller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710263310.6A
Other languages
Chinese (zh)
Inventor
高文军
王国栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TELEWAVE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
TELEWAVE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TELEWAVE INFORMATION TECHNOLOGY Co Ltd filed Critical TELEWAVE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201710263310.6A priority Critical patent/CN107105108A/en
Publication of CN107105108A publication Critical patent/CN107105108A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/63Querying
    • G06F16/635Filtering based on additional data, e.g. user or group profiles
    • G06F16/636Filtering based on additional data, e.g. user or group profiles by using biological or physiological data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/683Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/686Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title or artist information, time, location or usage information, user ratings
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Library & Information Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Physiology (AREA)
  • Molecular Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of processing method and its system of anti-alarm harassing call, and methods described includes the alarm voice information and corresponding caller ID that handle position obtains incoming call;The harassing and wrecking number blacklist that prestores in server is obtained, and judges that the caller ID whether there is in the harassing and wrecking number blacklist prestored, if sending harassing and wrecking prompt message in the presence of if;The harassing and wrecking prompt message is received, the vocal print feature of caller is extracted from the alarm voice information of acquisition;Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if being already present in the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.The processing method and its system for the anti-alarm harassing call that the present invention is provided, discrimination are high, and distinguishing speed is fast, can timely and effectively intercept alarm harassing call.

Description

A kind of processing method and its system of anti-alarm harassing call
Technical field
The present invention relates to public security warning system technical field, the processing method of more particularly to a kind of anti-alarm harassing call and Its system.
Background technology
As urbanization constantly develops, the generation of various accidents is also increasingly frequent, such as natural calamity, social calamity The accident occurrence frequency such as evil, public health disaster, Accidents Disasters is continuously increased, and adds the continuous improvement of quality of the residents, In many cases, all many warm-hearted peoples can actively alarm after occurring disaster.It is all that a danger is sought help to alarm each time, is closed The safety of life and property of the masses.However, the various harassing calls continuously emerged have had a strong impact on the normal fortune of warning system Make.
Current panoramic false alarm, malice harassing and wrecking etc., allow warning system and the person of receiving a crime report to meet with a variety of puzzlements.110、 119 grade alarm first-aid phones belong to the social public resource in service civic, there is the solemnity for not allowing to make fun of.However, exactly this The ambulance call of sample, by some intentional harassing and wrecking, or even set off false alarms, mischief.Someone is intentional, and someone is out of curiosity The heart, someone makes trouble wilfully, and someone carries unwarranted demand, and someone saddles with a difficult task, these behaviors that someone makes trouble after drinking etc., serious dry The normal order of work of public security organ is disturbed, police strength, the serious waste of financial resources is caused;Simultaneously as their behavior is occupied Public resource, often allowing really needs the anxious user for dialing these numbers not come in, and delays rescue time, or because report False alarm wastes the substantial amounts of human and material resources of public resource, financial resources.
To avoid harassing call from taking the circuit of alarm station, the technological means used at present is mainly reported false by " interception " Alert telephone number, the telephone number of multiple harassing and wrecking warning system is locked and blacklist is added, is allowed in certain time In can not alarm again.This processing mode has significant limitations in actual use:One side harassing and wrecking person can change phone after Continuous to be harassed, it is possible to use public telephone is harassed, prior art can not all be blocked;On the other hand, it is added into " black name The telephone number of list " may also really need to use the anxious user of these telephone calls not come in due to allowing, and easily cause mistake Sentence, cause the accident.Therefore, these means are more and more under suspicion.
Take effective means, on the premise of legal, harassing call blocked reliably, in time and harassing and wrecking personnel are traced, The problem of being in the urgent need to address at present.
The content of the invention
For problem above, patent purpose of the present invention be to devise a kind of anti-alarm harassing call processing method and its System, can timely and effectively intercept alarm harassing call.
To achieve the above object, the present invention specifically provides following technical scheme:
A kind of processing method of anti-alarm harassing call, it is used for alert receiving system, and the alert receiving system is at least wrapped A server is included, and the multiple handle positions being connected are communicated with server;Including:
Handle position obtains the alarm voice information and corresponding caller ID of incoming call;
The harassing and wrecking number blacklist prestored in server is obtained, and judges that the caller ID whether there is in disturbing for prestoring Disturb in number blacklist, if sending harassing and wrecking prompt message in the presence of if;
Receive after the harassing and wrecking prompt message, the vocal print feature of caller is extracted from the alarm voice information of acquisition;
Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if being already present on In the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.
It is preferred that, methods described further comprises:
The alarm voice information that handle position is obtained to incoming call judges, it is determined that the alarm voice information is believed for harassing and wrecking During breath, extract the vocal print feature of caller and be added in blacklist sound bank, while adding corresponding caller ID to harassing and wrecking In number blacklist.
It is preferred that, methods described further comprises:If it is determined that the vocal print feature is not present in blacklist sound bank, i.e., When determining the incoming call for non-disturbance incoming call, then the caller ID is deleted from harassing and wrecking number blacklist.
It is preferred that, it is determined that it is described incoming call be disturbance incoming call after, by the caller ID storage arrive and the blacklist In the corresponding harassing and wrecking number blacklist of sound bank.
It is preferred that, the one or more harassing and wrecking black names of number of blacklist voice correspondence in the blacklist sound bank It is single.
It is preferred that, the handle position can cut off harassing and wrecking in time after the determination incoming call is received for the information of disturbance incoming call Send a telegram here or be transferred to and handled in specific handle position.
According to another aspect of the present invention there is provided a kind of processing system of anti-alarm harassing call, the system includes:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
It is preferred that, second determination module further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if having deposited Then determining that the incoming call is disturbance incoming call.
It is preferred that, the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to Handle position sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
It is preferred that, the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
By above scheme, the processing method and its system of a kind of anti-alarm harassing call that the present invention is provided, report Alert handling desk is after incoming call is received, if it is determined that caller ID then sends prompt message for harassing and wrecking number to handle position, goes forward side by side one Step carries out automatic identification by the alarm voice collected, using legal, technically reliable, and discrimination is high, distinguishing speed It hurry up, the operational paradigm of public security alarm station can be greatly improved, save the manpower and communication resources of alarm station, more can be timely and effectively Intercept alarm harassing call.
Brief description of the drawings
Embodiments of the present invention is further illustrated referring to the drawings, wherein:
Fig. 1 is the schematic flow sheet of the processing method of the anti-alarm harassing call of the present invention;
Fig. 2 is the structural representation of the processing system of the anti-alarm harassing call of the present invention;
Fig. 3 is the structural representation of the second determination module of the processing system of the anti-alarm harassing call of the present invention.
Embodiment
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the limitation of blacklist blocking disturbance call in existing police system, take effective means, closing On the premise of method, harassing call being blocked reliably, in time and harassing and wrecking personnel are traced, it is electric that the present invention proposes a kind of anti-alarm harassing and wrecking The processing method and system of words.
The implementation principle of processing method of anti-alarm harassing call provided in an embodiment of the present invention is:Handle position is in advance to coming When electric alarm phone carries out being judged as harassing call, extract the vocal print feature of caller and be added in blacklist sound bank. During normally receiving a crime report, handle position obtains alarm voice information and corresponding caller ID after receiving alarm incoming call, passes through first Caller ID determines whether to harass number blacklist, if then sending harassing and wrecking prompt message and further being believed by alarm voice The vocal print feature extracted in breath is judged whether in blacklist sound bank, so as to judge to determine whether as disturbance incoming call.This Kind by way of caller's vocal print feature is determined whether, it can effectively be confirmed whether it is disturbance incoming call, it is to avoid erroneous judgement and not Rational situation occurs, and reliably, blocks harassing call in time.
The preferred embodiments of the present invention are illustrated below in conjunction with Figure of description, it will be appreciated that described herein Preferred embodiment is merely to illustrate and explain the present invention, and is not intended to limit the present invention, and in the case where not conflicting, this hair The feature in embodiment and embodiment in bright can be mutually combined.
The processing method for the anti-alarm harassing call that the present invention is provided, it is used for alert receiving system, and the alert, which is accepted, is System at least includes a server, and communicates the multiple handle positions being connected with server, and handle position is responsible for access alarm incoming call.Please Refering to Fig. 1, it is the processing method implementation process diagram of anti-alarm harassing call provided in an embodiment of the present invention, specifically can be with Including:
Step S101, handle position obtains the alarm voice information and corresponding caller ID of incoming call.
Specifically, alarm handle position is when having listened to incoming call incoming call, the alarm voice information and incoming call number of incoming call are obtained Code.The telephone number that the caller ID can receive for terminal, for example:Phone number, fixed telephone number or network IP Telephone number etc..
Step S102, obtains the harassing and wrecking number blacklist prestored in server, and judge that the caller ID whether there is In the harassing and wrecking number blacklist prestored, if sending harassing and wrecking prompt message in the presence of if.
Specifically, handle position is obtained after caller ID, the blacklist checking of harassing and wrecking number is carried out first, and part checking judges described Caller ID whether there is in the harassing and wrecking number blacklist prestored.
Server can be the server with number inquiry function, be provided with the harassing and wrecking number of storage harassing call Blacklist storehouse.Server is received after caller ID, can be somebody's turn to do by being inquired about in harassing and wrecking number blacklist storehouse in the server Caller ID, if comprising sending harassing and wrecking prompt message, the prompt message only points out the handle position incoming call to come for harassing and wrecking Electricity, need to further be verified.If do not included, it is judged as normal incoming call.
Wherein, the harassing call information stored in server in the harassing and wrecking number blacklist storehouse can be by alert systematic collection And store into server, or by handle position confirm after be added in server.
Step S103, receives the harassing and wrecking prompt message, and the vocal print of caller is extracted from the alarm voice information of acquisition Feature.
Specifically, after step S102 confirmations may be disturbance incoming call, further obtaining in alarm voice information and extracting next The vocal print feature of electric person.
The generation of human language is a complicated physiology physical process between Body Languages maincenter and vocal organs, and people exists The phonatory organ used during speech:Everyone widely different in terms of size and form such as tongue, tooth, larynx, lung, nasal cavity, So the voiceprint map of any two people is all variant.Application on Voiceprint Recognition identifies the identity of speaker from certain section of voice Process.
Application on Voiceprint Recognition has two key issues:One is feature extraction, and two be pattern match.
The task of feature extraction is to extract and select have the characteristics such as separability is strong, stability is high to the vocal print of speaker Acoustics or language feature.Different from speech recognition, the feature of Application on Voiceprint Recognition must be " personalization " feature, and Speaker Identification Feature must be " common feature " for speaker.Although major part Voiceprint Recognition System is all acoustics aspect at present Feature, but the feature for characterizing a personal touch should be multifaceted, including:(1) with the anatomy of the pronunciation mechanism of the mankind The relevant acoustic feature of structure (such as frequency spectrum, cepstrum, formant, fundamental tone, reflectance factor), nasal sound, band deep breathing sound, sand Dumb sound, laugh etc.;(2) semanteme that is influenceed by socioeconomic status, education level, birthplace etc., rhetoric, pronunciation, speech are practised It is used to;(3) feature such as personal touch or the rhythm, rhythm, speed, intonation, the volume that are influenceed by father and mother.Can from utilization mathematical method Set out with the angle of modeling, the feature that vocal print automatic identification model can be used at present includes:(1) acoustic feature (cepstrum); (2) lexical characteristics (speaker related word n-gram, phoneme n-gram);(3) prosodic features (fundamental tone described using n-gram With energy " posture ");(4) languages, dialect and accent information;(5) channel information etc..
Extract after vocal print feature, it is possible to the identification of speaker's identity is carried out using vocal print feature.It is existing for pattern-recognition There is technology there are following a few major class methods:Template matching method, arest neighbors method, neural net method, hidden Markov model (HMM) method, VQ clustering methods (such as LBG), multinomial classifier methods.
Step S104, determines that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if It is already present in the blacklist sound bank prestored, it is determined that the incoming call is disturbance incoming call and notifies handle position.
Specifically, server determines whether incoming call after the vocal print feature for completing caller is extracted by Characteristic Contrast Whether the vocal print feature of person is had stored in blacklist voice Kuku.If in existing blacklist voice Kuku, it is determined that The incoming call is disturbance incoming call and notifies handle position;
Wherein, the blacklist voice stored in server in the blacklist sound bank by alert systematic collection and can be stored Into server, or by handle position confirm after be added in server.
The alarm voice information that handle position is obtained to incoming call judges, when incoming call described in manual confirmation is disturbance incoming call When, extract and preserve the vocal print feature of caller and be added in blacklist sound bank, arrived while adding corresponding caller ID Harass in number blacklist.
Optionally, if there is no in blacklist voice Kuku, being then judged as normal incoming call, therefore the incoming call is determined For non-disturbance incoming call, then the caller ID is deleted from harassing and wrecking number blacklist.
Optionally, it is determined that it is described incoming call be disturbance incoming call after, by the caller ID storage arrive and the blacklist In the corresponding harassing and wrecking number blacklist of sound bank.
Optionally, the one or more harassing and wrecking black names of number of blacklist voice correspondence in the blacklist sound bank It is single.
Optionally, the handle position can cut off harassing and wrecking in time after the determination incoming call is received for the information of disturbance incoming call Send a telegram here or be transferred to and handled in specific handle position.After determining the incoming call for the information of disturbance incoming call, handle position work Personnel can cut off harassing call in time, or go in special process circuit the harassing and wrecking person that correlation is handled by special personnel.
It is this by way of caller's vocal print feature is determined whether, can effectively be confirmed whether it is disturbance incoming call, keep away Exempt from erroneous judgement and irrational situation occurs, in time, reliably block harassing call.
Based on same inventive concept, a kind of processing system of anti-alarm harassing call is additionally provided in the embodiment of the present invention, Because the principle that said system solves problem is similar to the processing method of anti-alarm harassing call, therefore the implementation of said system can With referring to the implementation of method.
Referring to Fig. 2, its structural representation for the processing system of anti-alarm harassing call provided in an embodiment of the present invention, Specifically include:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
Referring to Fig. 3, it is the structural representation of the second determination module provided in an embodiment of the present invention, described second judges Module, further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if having deposited Then determining that the incoming call is disturbance incoming call.
Preferably, the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to Handle position sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
Preferably, the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
The embodiment of present invention described above, is not intended to limit the scope of the present invention..Any basis Various other corresponding changes and deformation that the technical concept of the present invention is made, should be included in the guarantor of the claims in the present invention In the range of shield.

Claims (10)

1. a kind of processing method of anti-alarm harassing call, it is used for alert receiving system, and the alert receiving system at least includes One server, and communicate the multiple handle positions being connected with server;It is characterised in that it includes:
Handle position obtains the alarm voice information and corresponding caller ID of incoming call;
The harassing and wrecking number blacklist prestored in server is obtained, and judges that the caller ID whether there is in the harassing and wrecking number In blacklist, if sending harassing and wrecking prompt message in the presence of if;
Receive after the harassing and wrecking prompt message, the vocal print feature of caller is extracted from the alarm voice information of acquisition;
Determine that the vocal print feature whether there is in the blacklist sound bank in the server that prestores, if having existed, really The fixed incoming call is disturbance incoming call and notifies handle position.
2. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that methods described is further wrapped Include:
The alarm voice information that handle position is obtained to incoming call judges, it is determined that the alarm voice information is harassing and wrecking information When, extract the vocal print feature of caller and be added in blacklist sound bank, while adding corresponding caller ID to harassing and wrecking number In code blacklist.
3. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that methods described is further wrapped Include:If it is determined that the vocal print feature is not present in blacklist sound bank, that is, when determining the incoming call for non-disturbance incoming call, then will The caller ID is deleted from harassing and wrecking number blacklist.
4. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that it is determined that the incoming call is After disturbance incoming call, by caller ID storage into harassing and wrecking number blacklist corresponding with the blacklist sound bank.
5. the processing method of anti-alarm harassing call according to claim 4, it is characterised in that the blacklist sound bank In a blacklist voice correspondence it is one or more harassing and wrecking number blacklists.
6. the processing method of anti-alarm harassing call according to claim 1, it is characterised in that the handle position is being received After determining the incoming call for the information of disturbance incoming call, disturbance incoming call can be cut off in time or is transferred in specific handle position and is located Reason.
7. a kind of processing system of anti-alarm harassing call, it is characterised in that the system includes:
First acquisition module, alarm voice information and corresponding caller ID for obtaining incoming call;
Second acquisition module, the harassing and wrecking number blacklist and blacklist sound bank prestored for obtaining in server;
First determination module, for judging that the caller ID whether there is in the harassing and wrecking number blacklist prestored;
Second determination module, for judging the incoming call whether as disturbance incoming call according to the alarm voice information of acquisition.
8. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that described second judges mould Block, further comprises:
Submodule is analyzed, the vocal print feature for extracting caller from the alarm voice information of acquisition;
Determination sub-module, for determining that the vocal print feature whether there is in the blacklist sound bank, if existing It is disturbance incoming call to determine the incoming call.
9. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that the system also includes:
First sending module, for when judging that the caller ID is present in the harassing and wrecking number blacklist prestored, to accepting Seat sends harassing and wrecking prompt message;
Second sending module, for it is determined that the incoming call is disturbance incoming call, to handle position transmission acknowledgement notification information.
10. the processing system of anti-alarm harassing call according to claim 7, it is characterised in that the system also includes:
First memory module, for storing the harassing and wrecking number blacklist;
Second memory module, for storing the blacklist sound bank.
CN201710263310.6A 2017-04-21 2017-04-21 A kind of processing method and its system of anti-alarm harassing call Pending CN107105108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710263310.6A CN107105108A (en) 2017-04-21 2017-04-21 A kind of processing method and its system of anti-alarm harassing call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710263310.6A CN107105108A (en) 2017-04-21 2017-04-21 A kind of processing method and its system of anti-alarm harassing call

Publications (1)

Publication Number Publication Date
CN107105108A true CN107105108A (en) 2017-08-29

Family

ID=59657187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710263310.6A Pending CN107105108A (en) 2017-04-21 2017-04-21 A kind of processing method and its system of anti-alarm harassing call

Country Status (1)

Country Link
CN (1) CN107105108A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848507A (en) * 2018-05-31 2018-11-20 厦门快商通信息技术有限公司 A kind of bad telecommunication user information collecting method
CN109688275A (en) * 2018-12-27 2019-04-26 中国联合网络通信集团有限公司 Harassing call recognition methods, device and storage medium
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN110767238A (en) * 2019-09-19 2020-02-07 平安科技(深圳)有限公司 Blacklist identification method, apparatus, device and storage medium based on address information
CN112185083A (en) * 2019-07-04 2021-01-05 北京航天长峰科技工业集团有限公司 Repeated alarm judging method
CN113160459A (en) * 2021-04-01 2021-07-23 深圳市欧瑞博科技股份有限公司 Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN110010135B (en) * 2018-01-05 2024-05-07 北京搜狗科技发展有限公司 Speech-based identity recognition method and device and electronic equipment
CN108848507A (en) * 2018-05-31 2018-11-20 厦门快商通信息技术有限公司 A kind of bad telecommunication user information collecting method
CN109688275A (en) * 2018-12-27 2019-04-26 中国联合网络通信集团有限公司 Harassing call recognition methods, device and storage medium
CN112185083A (en) * 2019-07-04 2021-01-05 北京航天长峰科技工业集团有限公司 Repeated alarm judging method
CN110767238A (en) * 2019-09-19 2020-02-07 平安科技(深圳)有限公司 Blacklist identification method, apparatus, device and storage medium based on address information
WO2021051533A1 (en) * 2019-09-19 2021-03-25 平安科技(深圳)有限公司 Address information-based blacklist identification method, apparatus, device, and storage medium
CN113160459A (en) * 2021-04-01 2021-07-23 深圳市欧瑞博科技股份有限公司 Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN107105108A (en) A kind of processing method and its system of anti-alarm harassing call
CN106550155A (en) Suspicious number is carried out swindling the method and system that sample screens classification and interception
US10715662B2 (en) System and method for artificial intelligence on hold call handling
CN109192202B (en) Voice safety recognition method, device, computer equipment and storage medium
US20100228656A1 (en) Apparatus and method for fraud prevention
CN108696644A (en) Cooperate phone credit system
US20030120486A1 (en) Speech recognition system and method
JP2007096963A (en) Telephone apparatus
CN103179122A (en) Telcom phone phishing-resistant method and system based on discrimination and identification content analysis
JP2007323107A (en) Phishing scam prevention system
CN110070875B (en) Anti-telecommunication fraud method based on voice keyword detection and voiceprint
CN108010289A (en) A kind of internet alarm method and system based on Application on Voiceprint Recognition
CN110349586A (en) Telecommunication fraud detection method and device
CN108074577A (en) Identity identifying method and identity authorization system
CN111768789B (en) Electronic equipment, and method, device and medium for determining identity of voice generator of electronic equipment
CN112508311A (en) Data processing method and device for risk prediction
CN113744742B (en) Role identification method, device and system under dialogue scene
JP2007266944A (en) Telephone terminal and caller verification method
CN104580725A (en) Method for hinting fraud calls and communication terminal
CN206553008U (en) A kind of speech recognition emergency help system
CN111210827B (en) Method and device for responding to alarm, electronic equipment and readable storage medium
CN107247792A (en) Match method, device and the computer equipment of functional department
CN111179969A (en) Alarm method, device and system based on audio information and storage medium
KR20210069899A (en) System for detecting voice phishing
CN116915903A (en) Call voice processing method, device, server and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170829