CN114189574B - Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process - Google Patents

Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process Download PDF

Info

Publication number
CN114189574B
CN114189574B CN202111491385.2A CN202111491385A CN114189574B CN 114189574 B CN114189574 B CN 114189574B CN 202111491385 A CN202111491385 A CN 202111491385A CN 114189574 B CN114189574 B CN 114189574B
Authority
CN
China
Prior art keywords
voice
user
feature
specific
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111491385.2A
Other languages
Chinese (zh)
Other versions
CN114189574A (en
Inventor
冯大航
陈孝良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202111491385.2A priority Critical patent/CN114189574B/en
Publication of CN114189574A publication Critical patent/CN114189574A/en
Application granted granted Critical
Publication of CN114189574B publication Critical patent/CN114189574B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/006Call diverting means
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/03Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • G10L2015/088Word spotting

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure provides a call forwarding identification method, device and terminal in an anti-fraud early warning process, and belongs to the technical field of Internet. The method comprises the following steps: matching a first voice feature of a first user with each specific voice feature in a specific voice database; when the first voice feature is matched with any specific voice feature, the terminal corresponding to the marked target number is transferred by the call. After a first user answers a communication request sent by a home terminal to a target number receiving malicious communication information, in the voice communication process with the first user, the first voice feature of the first user is extracted, the identity of the first user is identified by matching the first voice feature with the characteristic voice feature of a specific user, when the first user is identified as the specific user, a terminal corresponding to the target number is marked to be transferred by a call, further measures are timely taken, the legal user is prevented from being cheated, and a good anti-fraud early warning effect is achieved.

Description

Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process
Technical Field
The disclosure relates to the technical field of internet, and in particular relates to a call forwarding identification method, device and terminal in an anti-fraud early warning process.
Background
Currently, the phishing fraud is high, and when the staff carries out anti-fraud early warning on the masses receiving the fraud calls, the staff can inquire whether the host receives the fraud calls, believes the fraudsters, cooperates with the fraudsters to operate the bank card and transfer money so as to remind the host to avoid the fraud. When the party replies to the fraud call, but without believing that the fraudster is not being fraudulently detected, the staff may be relaxed.
However, if the fraudster forwards the calling of the number of the host to the mobile phones of other members in the fraud partner in advance, the other members in the fraud partner impersonate the problem of the host to answer the staff, and as whether the number of the host is called for forwarding or not can not be identified through the conversation at present, the staff can not identify that the other party is the fraud partner member when communicating with the other party, and finally erroneous judgment is formed, so that the host is fraudulently.
In order to avoid such occurrence, it is highly desirable to provide a method for identifying call forwarding in anti-fraud pre-warning process.
Disclosure of Invention
The embodiment of the disclosure provides a call forwarding identification method, a call forwarding identification device and a call forwarding identification terminal in an anti-fraud early warning process, which can identify whether a terminal corresponding to a target number receiving malicious communication information is forwarded by a call in the anti-fraud early warning process. The technical scheme is as follows:
In a first aspect, a method for identifying call forwarding in anti-fraud early warning is provided, the method comprising:
responding to a communication request sent by a first user based on a target number answering home terminal, acquiring first voice information of the first user, wherein the target number is a number for receiving malicious communication information, and the communication request is used for performing anti-fraud early warning on a legal user corresponding to the target number aiming at the malicious communication information received by the target number;
extracting first voice characteristics from the first voice information;
matching the first voice feature with each specific voice feature in a specific voice database, wherein the specific voice feature is the voice feature of a specific user, and the specific user is the user or related user who sends the malicious communication information;
and when the first voice characteristic is matched with any specific voice characteristic, marking that the terminal corresponding to the target number is transferred by the call.
In another embodiment of the present disclosure, before extracting the first speech feature from the first speech information, the method further includes:
invoking a variable sound recognition model to recognize the first voice information to obtain a recognition result, wherein the variable sound recognition model is used for recognizing whether the voice information is subjected to variable sound processing;
When the recognition result is that the first voice information is subjected to sound conversion processing, a sound reduction model is called to reduce the first voice information to obtain original voice information corresponding to the first voice information, and the sound reduction model is used for reducing the sound conversion voice information to the original voice information;
the extracting a first voice feature from the first voice information includes:
extracting the first voice feature from the original voice information.
In another embodiment of the present disclosure, before the matching the first speech feature with each specific speech feature in the specific speech database, the matching further includes:
matching the first voice feature with the target voice feature of the legal user;
when the first speech feature does not match the target speech feature, performing the step of matching the first speech feature with each specific speech feature in a specific speech database.
In another embodiment of the present disclosure, the method further comprises:
and when the first voice characteristic is matched with the target voice characteristic, marking that the terminal corresponding to the target number is not transferred by the call.
In another embodiment of the present disclosure, after the matching the first speech feature with each specific speech feature in the specific speech database, the matching further includes:
when the first voice feature is not matched with each specific voice feature in the specific voice database, extracting a specified voice keyword from the first voice information;
acquiring second voice information of a second user indicated by the appointed voice keyword;
extracting second voice characteristics from the second voice information;
matching the first speech feature with the second speech feature;
and when the first voice feature is not matched with the second voice feature, marking that the terminal corresponding to the target number is not transferred by the call.
In another embodiment of the present disclosure, after the marking that the terminal corresponding to the target number is not forwarded by the call, the method further includes:
updating the specific voice database based on the first voice feature.
In another embodiment of the present disclosure, after the marking that the terminal corresponding to the target number is not forwarded by the call, the method further includes:
and displaying early warning prompt information, wherein the early warning prompt is used for prompting that the first user is a specific user.
In a second aspect, a call forwarding identification device in an anti-fraud early warning process is provided, the device comprising:
the acquisition module is used for responding to a communication request sent by a first user based on a target number answering home terminal, acquiring first voice information of the first user, wherein the target number is a number for receiving malicious communication information, and the communication request is used for performing anti-fraud early warning on a legal user corresponding to the target number aiming at the malicious communication information received by the target number;
the extraction module is used for extracting first voice characteristics from the first voice information;
the matching module is used for matching the first voice characteristic with each specific voice characteristic in a specific voice database, wherein the specific voice characteristic is the voice characteristic of a specific user, and the specific user is the user who sends the malicious communication information or the related user;
and the identification module is used for marking that the terminal corresponding to the target number is transferred by the call when the first voice characteristic is matched with any specific voice characteristic.
In another embodiment of the present disclosure, the apparatus further comprises:
the recognition module is further used for calling a variable sound recognition model to recognize the first voice information to obtain a recognition result, and the variable sound recognition model is used for recognizing whether the voice information is subjected to variable sound processing;
The restoring module is used for calling a sound restoring model when the recognition result is that the first voice information is subjected to sound changing processing, restoring the first voice information to obtain original voice information corresponding to the first voice information, and the sound restoring model is used for restoring the sound changing voice information into the original voice information;
the extraction module is used for extracting the first voice feature from the original voice information.
In another embodiment of the present disclosure, the apparatus further comprises:
the matching module is further used for matching the first voice feature with the target voice feature of the legal user;
the matching module is further configured to match the first speech feature with each specific speech feature in a specific speech database when the first speech feature does not match the target speech feature.
In another embodiment of the present disclosure, the identification module is configured to mark that the terminal corresponding to the target number has been transferred by a call when the first voice feature matches the target voice feature.
In another embodiment of the disclosure, the extracting module is configured to extract a specified voice keyword from the first voice information when the first voice feature does not match each specific voice feature in the specific voice database;
The acquisition module is used for acquiring second voice information of a second user indicated by the appointed voice keyword;
the extraction module is used for extracting second voice characteristics from the second voice information;
the matching module is used for matching the first voice characteristic with the second voice characteristic;
and the identification module is used for marking that the terminal corresponding to the target number is transferred by the call when the first voice characteristic is not matched with the second voice characteristic.
In another embodiment of the present disclosure, the apparatus further comprises:
and the updating module is used for updating the specific voice database based on the first voice characteristic.
In another embodiment of the present disclosure, the apparatus further comprises:
the display module is used for displaying early warning prompt information, and the early warning prompt is used for prompting that the first user is a specific user.
In a third aspect, a terminal is provided, the terminal comprising a processor and a memory, the memory storing at least one program code, the at least one program code being loaded and executed by the processor to implement the call forwarding identification method in the anti-fraud pre-warning process as described in the first aspect.
In a fourth aspect, a computer readable storage medium is provided, in which at least one program code is stored, which is loaded and executed by a processor, to implement the call forwarding identification method in the anti-fraud pre-warning process according to the first aspect.
In a fifth aspect, a computer program product is provided, the computer program product comprising computer program code, the computer program code being stored in a computer readable storage medium, from which a processor of a terminal reads the computer program code, the processor executing the computer program code such that the terminal performs the call forwarding identification method in the anti-fraud pre-warning process of the first aspect.
The technical scheme provided by the embodiment of the disclosure has the beneficial effects that:
after a first user answers a communication request sent by a home terminal to a target number receiving malicious communication information, in the voice communication process with the first user, the first voice feature of the first user is extracted, and then the identity of the first user is identified by matching the first voice feature with the characteristic voice feature of a specific user, when the first user is identified as the specific user, a terminal corresponding to the target number is marked to be transferred by a call, further measures are timely taken, the legal user is prevented from being cheated, and a good anti-fraud early warning effect is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings required for the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic diagram of an implementation environment involved in a call forwarding identification method in an anti-fraud early warning process provided by an embodiment of the present disclosure;
FIG. 2 is a flow chart of a method for identifying call forwarding in an anti-fraud pre-warning process provided by an embodiment of the present disclosure;
FIG. 3 is a flow chart of a method for identifying call forwarding in another anti-fraud pre-warning process provided by an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a call forwarding recognition device in an anti-fraud early warning process according to an embodiment of the present disclosure;
fig. 5 shows a block diagram of a terminal provided by an exemplary embodiment of the present disclosure.
Detailed Description
For the purposes of clarity, technical solutions and advantages of the present disclosure, the following further details the embodiments of the present disclosure with reference to the accompanying drawings.
It will be understood that the terms "each," "plurality," and "any" as used in this disclosure, including two or more, each refer to each of the corresponding plurality, and any one refers to any one of the corresponding plurality. For example, the plurality of words includes 10 words, and each word refers to each of the 10 words, and any word refers to any one of the 10 words.
Referring to fig. 1, an implementation environment related to a call forwarding identification method in an anti-fraud early warning process provided by an embodiment of the present disclosure is shown, where the implementation environment includes: terminal 101, terminal 102, and terminal 103.
The terminal 101 is a device used by a worker, and the terminal 101 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., and the embodiment of the disclosure does not specifically limit the product type of the terminal 101. When it is detected that the target number receives malicious communication information, in order to avoid property loss of legal users of the target number, a worker uses the terminal 101 to send a communication request to the target number, so as to remind the legal users of paying attention to account safety when operating a bank card and transferring money by communicating with the legal users, and avoid transferring money or virtual money in the account to other users. In response to a communication request sent by the terminal 101, the terminal 101 obtains first voice information of a first user performing voice communication with the home terminal based on the target number, so that the first user is identified based on the first voice information, when the first user is identified as a specific user, the terminal corresponding to the target number is marked to be transferred by a call, and early warning prompt information is displayed to prompt a worker that the first user is the specific user, so that the worker contacts a legal user of the target number in other ways, anti-fraud early warning is timely performed on the legal user, and the legal user is prevented from being cheated. Considering that the current phishing is frequent, the workload of the staff is large, and in order to avoid the delayed work of the staff due to overload, an intelligent anti-phishing early warning robot can be installed in the terminal 101, so that the anti-phishing early warning is carried out on users receiving malicious communication information in a large scale based on the intelligent anti-phishing early warning robot.
The terminal 102 is a device that receives malicious communication information based on a target number, the terminal 102 is a device currently used by a legal user, the terminal 102 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., and the embodiment of the present disclosure does not specifically limit the product type of the terminal 102. In the embodiment of the disclosure, the terminal 102 may be implanted with an illegal call forwarding program by a specific user, and after the terminal 101 sends a communication request to a target number, the communication request is illegally forwarded to the terminal 103 of the specific user, so that a legal user cannot directly perform voice communication with a staff member.
The terminal 103 is a device used by a specific user, and the terminal 103 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., and the embodiment of the present disclosure does not specifically limit the product type of the terminal 103. When a specific user illegally transfers a call request sent to a target number from the terminal 102 to the terminal 103, a communication request sent by the terminal 101 to the target number is transferred from the terminal 102 to the terminal 103, so that the specific user at the terminal 103 side impersonates a legal user to perform voice communication with a staff member, and the purpose of confusing the staff member is achieved.
Taking the embodiment of the present disclosure as an example of the implementation environment shown in fig. 1 being executed by the terminal 101, the embodiment of the present disclosure provides a method for identifying call forwarding in the anti-fraud early warning process, referring to fig. 2, the method provided in the embodiment of the present disclosure includes:
201. and responding to a communication request sent by the first user based on the target number answering home terminal, and acquiring first voice information of the first user.
The target number is a number for receiving malicious communication information, and the communication request is used for performing anti-fraud early warning on legal users corresponding to the target number aiming at the malicious communication information received by the target number.
202. A first speech feature is extracted from the first speech information.
203. The first speech feature is matched with each specific speech feature in the specific speech database.
The specific voice features are voice features of specific users, and the specific users are users for sending malicious communication information or related users.
204. When the first voice feature is matched with any specific voice feature, the terminal corresponding to the marked target number is transferred by the call.
According to the method provided by the embodiment of the disclosure, after the first user answers the communication request sent by the local terminal to the target number receiving the malicious communication information, in the voice communication process with the first user, the first voice feature of the first user is extracted, and then the identity of the first user is identified by matching the first voice feature with the characteristic voice feature of the specific user, when the first user is identified as the specific user, the terminal corresponding to the target number is marked to be transferred by the call, further measures are timely taken, the legal user is prevented from being cheated, and a good anti-fraud early warning effect is achieved.
In another embodiment of the present disclosure, before extracting the first speech feature from the first speech information, the method further includes:
invoking a variable sound recognition model to recognize the first voice information to obtain a recognition result, wherein the variable sound recognition model is used for recognizing whether the voice information is subjected to variable sound processing;
when the recognition result is that the first voice information is subjected to sound conversion processing, a sound restoration model is called to restore the first voice information to obtain original voice information corresponding to the first voice information, and the sound restoration model is used for restoring the sound conversion voice information into the original voice information;
extracting a first voice feature from the first voice information, including:
first speech features are extracted from the original speech information.
In another embodiment of the present disclosure, before matching the first speech feature with each of the specific speech features in the specific speech database, further comprising:
matching the first voice feature with the target voice feature of the legal user;
when the first speech feature does not match the target speech feature, the step of matching the first speech feature with each specific speech feature in the specific speech database is performed.
In another embodiment of the present disclosure, the method further comprises:
and when the first voice feature is matched with the target voice feature, marking the terminal corresponding to the target number not to be transferred by the call.
In another embodiment of the present disclosure, after matching the first speech feature with each of the specific speech features in the specific speech database, further comprising:
when the first voice feature is not matched with each specific voice feature in the specific voice database, extracting a specified voice keyword from the first voice information;
acquiring second voice information of a second user indicated by the appointed voice keyword;
extracting second voice characteristics from the second voice information;
matching the first voice feature with the second voice feature;
and when the first voice feature is not matched with the second voice feature, the terminal corresponding to the marked target number is not transferred by the call.
In another embodiment of the present disclosure, after the terminal corresponding to the tag target number is not transferred by the call, the method further includes:
based on the first speech feature, a particular speech database is updated.
In another embodiment of the present disclosure, after the terminal corresponding to the tag target number is not transferred by the call, the method further includes:
And displaying early warning prompt information, wherein the early warning prompt is used for prompting the first user to be a specific user.
Any combination of the above-mentioned optional solutions may be adopted to form an optional embodiment of the present disclosure, which is not described herein in detail.
Based on the implementation environment shown in fig. 1, the embodiment of the present disclosure provides a call forwarding identification method in an anti-fraud early warning process, taking an example that a terminal 101 executes the embodiment of the present disclosure, referring to fig. 3, a method flow provided by the embodiment of the present disclosure includes:
301. and responding to a communication request sent by the first user based on the target number, and acquiring first voice information of the first user by the terminal.
When the target number is monitored to receive malicious communication information, in order to avoid property loss of legal users of the target number, a worker uses a terminal to send a communication request to the target number, so that anti-fraud early warning is carried out on the legal users corresponding to the target number aiming at the malicious communication information received by the target number. The target number is a number for receiving malicious communication information, and the target number can be a mobile phone number, a fixed phone number and the like. Malicious communication information includes fraud calls, fraud messages, web links containing viruses, and the like. The first user is only a user which carries out voice communication with staff based on the target number, and the first user is a legal user of the target number or not and needs to be verified through subsequent steps.
In the field of communications, call forwarding is insensitive to the calling subscriber, i.e. when a telephone number of one subscriber is forwarded to the terminal of another subscriber, when a third party subscriber initiates a call to that subscriber, the call will be forwarded to the terminal of the other subscriber, and the third party subscriber cannot perceive that the call has been forwarded. Since the worker cannot confirm whether or not the communication request sent to the target number is transferred to the terminal of the other user when the voice communication is performed with the first user, the worker cannot confirm whether or not the first user who is performing the voice communication is a legitimate user. In order to be able to identify the identity of the first user, the terminal acquires first voice information of the first user in the process that the staff at the local end performs voice communication with the first user in response to the first user answering the communication request sent to the target number based on the target number.
302. The terminal extracts first voice characteristics from the first voice information.
In one embodiment of the present disclosure, when the first voice information is acquired, the terminal will extract the first voice feature of the first user from the first voice information. Wherein the first speech feature comprises at least one of a voiceprint feature, a timbre feature, and the like. Voiceprint features are a biological feature of a user and have the characteristics of uniqueness, stability, difficulty in replication and the like. Tone characteristics are not stable enough compared to voiceprint characteristics, and can be changed by exercise learning or auxiliary external tools.
In another embodiment of the present disclosure, given the current very subtle and strong anti-reconnaissance capability of a specific user, during the voice communication with a worker, the worker may use the sound transformer to perform sound-changing processing on his own sound in order to confuse the worker, so that the worker cannot recognize his real sound through the sound. In order to identify a specific user in an omnibearing manner, the terminal also judges whether the first voice information is subjected to sound changing processing after acquiring the first voice information, and the specific judging process is as follows: and the terminal calls a variable sound recognition model, and recognizes the first voice information based on the variable sound recognition model to obtain a recognition result. The variable sound recognition model is used for recognizing whether voice information is subjected to variable sound processing or not, and can be obtained based on a large number of audio samples which are not subjected to variable sound processing and audio samples which are subjected to variable sound processing in a training mode.
When the recognition result obtained by the voice conversion recognition model is that the first voice information is subjected to voice conversion processing, the terminal calls a voice restoration model, and restores the first voice information based on the voice restoration model to obtain original voice information corresponding to the first voice information. The sound restoration model is used for restoring the voice information of the sound change into the original voice information, and can be obtained by training based on a large number of audio samples which are subjected to sound processing and corresponding original audio samples. Based on the original voice information obtained by restoring the first voice information, the terminal can extract the first voice feature from the original voice information. It should be noted that, the stability of the voiceprint feature is strong, the voiceprint feature of the user cannot be changed by the sound transformer, and only the voiceprint feature of the user can be changed, so that the above-mentioned voice-changing recognition model recognizes whether the tone of the first voice information is changed, and correspondingly, the voice restoration model restores the tone of the first voice information.
303. And the terminal matches the first voice characteristic with the target voice characteristic of the legal user.
In the embodiment of the disclosure, voice information of a user including a target number and a plurality of numbers is stored in a terminal. In consideration of the fact that the number of specific voice features of a specific user is large and the number of target voice features of a legal user is small, in order to improve the identification speed of the first user identity, the terminal can match the first voice features of the first user with the target voice features of the legal user first, and after the first voice features are not matched with the target voice features, the first voice features are matched with the specific voice features. The specific user may be a user suspected of sending malicious communication information, or may be a related user suspected of sending malicious communication information, for example, a member in the same fraud group.
In the embodiment of the disclosure, the terminal may obtain the target voice information of the legal user of the target number based on the target number, and further extract the target voice feature from the target voice information. It should be noted that, the process of extracting the first voice feature of the first user and the process of extracting the target voice feature of the legal user by the terminal may be performed synchronously, or may be performed in a sequential order, which is not limited herein. Based on the extracted target voice feature and the first voice feature, the terminal matches the target voice feature with the first voice feature, and further judges whether the first user is a legal user or not according to a matching result. When the terminal matches the target voice feature with the first voice feature, the voiceprint feature in the target voice feature can be matched with the voiceprint feature in the first voice feature, the tone feature in the target voice feature can be matched with the tone feature in the first voice feature, the voiceprint feature in the target voice feature can be matched with the voiceprint feature in the first voice feature, and the tone feature in the target voice feature can be matched with the tone feature in the first voice feature. When the target voice feature is matched with the first voice feature, the terminal identifies the first user as a legal user, and then marks that the terminal corresponding to the target number is not transferred by the call; when the target voice feature does not match the first voice feature, the terminal further identifies the identity of the first user through step 304, so as to confirm whether the terminal corresponding to the target number has been transferred by the call.
304. When the first voice feature does not match the target voice feature, the terminal matches the first voice feature with each specific voice feature in the specific voice database.
In the disclosed embodiment, the terminal maintains a specific voice database in which specific voice characteristics of a plurality of specific users are stored. When the first voice feature is not matched with the target voice feature, the terminal is used for matching the first voice feature with each specific voice feature stored in the specific voice database based on the specific voice database so as to identify whether the first user is a specific user or not in order to further identify the identity of the first user.
305. When the first voice feature is matched with any specific voice feature, the terminal corresponding to the terminal marking target number is transferred by the call.
When the first voice feature is matched with any specific voice feature in the specific voice database, the terminal recognizes that the first user is the specific user corresponding to the matched specific voice feature, and then marks that the terminal corresponding to the target number is transferred by the call.
When the specific voice characteristics matched with the first voice characteristics are stored in the specific voice database, the specific user can be quickly and accurately locked by adopting the method, so that the target number of the legal user is prevented from being transferred by calling, and the specific user cannot be identified. However, when the first user is a newly added specific user, the specific voice database does not store the first voice feature of the first user, and the first user cannot be identified as the specific user by adopting the method. In order to avoid missing the identification of the newly added specific user, the embodiment of the disclosure further identifies the identity of the first user based on the voice keyword in the first voice information. The specific identification process is as follows:
3051. When the first voice feature is not matched with each specific voice feature in the specific voice database, the terminal extracts the appointed voice keyword from the first voice information.
Wherein the voice keywords are designated as keywords that can characterize the relationship between the first user and the legitimate user. In the embodiment of the disclosure, a worker may query whether the first user is a legal user in a voice communication process with the first user, and if the first user answers a user having an affinity with the legal user instead of the legal user, the terminal may extract a specified voice keyword capable of characterizing the affinity from the first voice information.
3052. The terminal acquires second voice information of a second user indicated by the appointed voice keyword.
When it is determined that the user who is performing voice communication is not a legitimate user but a second user, the terminal will also verify the identity of the second user to avoid that the particular user impersonates the second user to perform voice communication with the staff. In order to verify the identity of the second user, the terminal needs to acquire second voice information of the second user indicated by the specified voice keyword. When the terminal obtains second voice information based on the second user indicated by the appointed voice keyword, the terminal can inquire an address book of a legal user to obtain the number of the second user, and further obtain the second voice information of the second user based on the number of the second user; the terminal can also acquire the historical voice communication information of the legal user, and further acquire the second voice information of the second user from the historical voice communication information.
3053. And the terminal extracts the second voice characteristics from the second voice information.
3054. The terminal matches the first voice feature with the second voice feature.
Based on the extracted first voice feature and the second voice feature, the terminal verifies whether the first user is a legal second user by matching the first voice feature with the second voice feature.
3055. When the first voice feature is not matched with the second voice feature, the terminal marks the terminal corresponding to the target number and is transferred by the call.
When the first voice feature is matched with the second voice feature, the first user is a legal second user, and the terminal identifies the second user as the second user, so that the terminal corresponding to the target number is marked as not being transferred by the call; when the first voice feature is not matched with the second voice feature, the first user is not a legal second user, the terminal identifies the first user as a specific user, and then the terminal corresponding to the target number is marked to be transferred by the call.
In another embodiment of the present disclosure, when the first user is identified as a newly added specific user, the terminal will further update the specific voice database based on the first voice feature to enrich the stored specific voice features in the specific voice database.
Further, when the terminal corresponding to the target number is marked as being called for forwarding, in order to enable the staff to know the situation in time, the terminal displays early warning prompt information so as to prompt the staff that the first user is a specific user. Based on the displayed early warning prompt information, the staff timely contacts the legal user in other ways, and carries out anti-fraud early warning on the legal user, so that the legal user is prevented from being deceived.
According to the method provided by the embodiment of the disclosure, after the first user answers the communication request sent by the local terminal to the target number receiving the malicious communication information, in the voice communication process with the first user, the first voice feature of the first user is extracted, and then the identity of the first user is identified by matching the first voice feature with the characteristic voice feature of the specific user, when the first user is identified as the specific user, the terminal corresponding to the target number is marked to be transferred by the call, further measures are timely taken, the legal user is prevented from being cheated, and a good anti-fraud early warning effect is achieved.
Referring to fig. 4, an embodiment of the present disclosure provides a call forwarding recognition device in an anti-fraud early warning process, the device including:
The obtaining module 401 is configured to obtain, in response to a communication request sent by a first user at a home terminal based on a target number, where the target number is a number that receives malicious communication information, and the communication request is used to perform anti-fraud early warning on a legitimate user corresponding to the target number with respect to the malicious communication information received by the target number;
an extracting module 402, configured to extract a first voice feature from the first voice information;
a matching module 403, configured to match the first voice feature with each specific voice feature in a specific voice database, where the specific voice feature is a voice feature of a specific user, and the specific user is a user who sends malicious communication information or a related user;
and the marking module 404 is configured to mark that the terminal corresponding to the target number has been forwarded by the call when the first voice feature matches any specific voice feature.
In another embodiment of the present disclosure, the apparatus further comprises:
the recognition module is used for calling a variable sound recognition model to recognize the first voice information to obtain a recognition result, and the variable sound recognition model is used for recognizing whether the voice information is subjected to variable sound processing or not;
The voice restoration module is used for restoring the first voice information to obtain original voice information corresponding to the first voice information when the recognition result is that the first voice information is subjected to voice conversion processing, and the voice restoration model is used for restoring the voice information subjected to voice conversion into the original voice information;
and the extraction module is used for extracting the first voice characteristics from the original voice information.
In another embodiment of the present disclosure, the apparatus further comprises:
the matching module is also used for matching the first voice characteristic with the target voice characteristic of the legal user;
and the matching module is also used for matching the first voice feature with each specific voice feature in the specific voice database when the first voice feature is not matched with the target voice feature.
In another embodiment of the present disclosure, the marking module is configured to mark that the terminal corresponding to the target number is not forwarded by the call when the first voice feature matches the target voice feature.
In another embodiment of the disclosure, the extracting module is configured to extract the specified voice keyword from the first voice information when the first voice feature does not match each of the specific voice features in the specific voice database;
The acquisition module is used for acquiring second voice information of a second user indicated by the appointed voice keyword;
the extraction module is used for extracting second voice characteristics from the second voice information;
the matching module is used for matching the first voice characteristic with the second voice characteristic;
and the marking module is used for marking that the terminal corresponding to the target number is not transferred by the call when the first voice characteristic is not matched with the second voice characteristic.
In another embodiment of the present disclosure, the apparatus further comprises:
and the updating module is used for updating the specific voice database based on the first voice characteristics.
In another embodiment of the present disclosure, the apparatus further comprises:
the display module is used for displaying early warning prompt information, and the early warning prompt is used for prompting the first user to be a specific user.
In summary, in the device provided in the embodiment of the present disclosure, after the first user answers the communication request sent by the home terminal to the target number that receives the malicious communication information, in the process of voice communication with the first user, the first voice feature of the first user is extracted, and then the identity of the first user is identified by matching the first voice feature with the characteristic voice feature of the specific user, when the first user is identified as the specific user, the terminal corresponding to the target number is marked as having been transferred by the call, so that measures are timely taken to avoid the legal user from being cheated, and a good anti-fraud early warning effect is achieved.
Fig. 5 shows a block diagram of a terminal 500 provided in an exemplary embodiment of the present disclosure. The terminal 500 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion picture expert compression standard audio plane 3), an MP4 (Moving Picture Experts Group Audio Layer IV, motion picture expert compression standard audio plane 4) player, a notebook computer, or a desktop computer. The terminal 500 may also be referred to by other names of user devices, portable terminals, laptop terminals, desktop terminals, etc.
In general, the terminal 500 includes: a processor 501 and a memory 502.
Processor 501 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 501 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 501 may also include a main processor and a coprocessor, the main processor being a processor for processing data in an awake state, also referred to as a CPU (Central Processing Unit ); a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 501 may be integrated with a GPU (Graphics Processing Unit, image processor) for taking care of rendering and rendering of content that the display screen is required to display. In some embodiments, the processor 501 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 502 may include one or more computer-readable storage media, which may be non-transitory. Memory 502 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 502 is used to store at least one instruction for execution by processor 501 to implement the call forwarding identification method in the anti-fraud pre-warning process provided by the method embodiments in the present application.
In some embodiments, the terminal 500 may further optionally include: a peripheral interface 503 and at least one peripheral. The processor 501, memory 502, and peripheral interface 503 may be connected by buses or signal lines. The individual peripheral devices may be connected to the peripheral device interface 503 by buses, signal lines or circuit boards. Specifically, the peripheral device includes: at least one of radio frequency circuitry 504, a display 505, a camera assembly 506, audio circuitry 507, a positioning assembly 508, and a power supply 509.
Peripheral interface 503 may be used to connect at least one Input/Output (I/O) related peripheral to processor 501 and memory 502. In some embodiments, processor 501, memory 502, and peripheral interface 503 are integrated on the same chip or circuit board; in some other embodiments, either or both of the processor 501, memory 502, and peripheral interface 503 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 504 is configured to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuitry 504 communicates with a communication network and other communication devices via electromagnetic signals. The radio frequency circuit 504 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 504 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuitry 504 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuitry 504 may also include NFC (Near Field Communication ) related circuitry, which is not limited in this application.
The display 505 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display 505 is a touch display, the display 505 also has the ability to collect touch signals at or above the surface of the display 505. The touch signal may be input as a control signal to the processor 501 for processing. At this time, the display 505 may also be used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the display 505 may be one, providing a front panel of the terminal 500; in other embodiments, the display 505 may be at least two, respectively disposed on different surfaces of the terminal 500 or in a folded design; in other embodiments, the display 505 may be a flexible display disposed on a curved surface or a folded surface of the terminal 500. Even more, the display 505 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The display 505 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode) or other materials.
The camera assembly 506 is used to capture images or video. Optionally, the camera assembly 506 includes a front camera and a rear camera. Typically, the front camera is disposed on the front panel of the terminal and the rear camera is disposed on the rear surface of the terminal. In some embodiments, the at least two rear cameras are any one of a main camera, a depth camera, a wide-angle camera and a tele camera, so as to realize that the main camera and the depth camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting and Virtual Reality (VR) shooting function or other fusion shooting functions. In some embodiments, camera assembly 506 may also include a flash. The flash lamp can be a single-color temperature flash lamp or a double-color temperature flash lamp. The dual-color temperature flash lamp refers to a combination of a warm light flash lamp and a cold light flash lamp, and can be used for light compensation under different color temperatures.
The audio circuitry 507 may include a microphone and a speaker. The microphone is used for collecting sound waves of users and environments, converting the sound waves into electric signals, and inputting the electric signals to the processor 501 for processing, or inputting the electric signals to the radio frequency circuit 504 for voice communication. For the purpose of stereo acquisition or noise reduction, a plurality of microphones may be respectively disposed at different portions of the terminal 500. The microphone may also be an array microphone or an omni-directional pickup microphone. The speaker is used to convert electrical signals from the processor 501 or the radio frequency circuit 504 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to humans, but also the electric signal can be converted into a sound wave inaudible to humans for ranging and other purposes. In some embodiments, audio circuitry 507 may also include a headphone jack.
The location component 508 is used to locate the current geographic location of the terminal 500 to enable navigation or LBS (Location Based Service, location-based services). The positioning component 508 may be a positioning component based on the United states GPS (Global Positioning System ), the Beidou system of China, the Granati system of Russia, or the Galileo system of the European Union.
A power supply 509 is used to power the various components in the terminal 500. The power supply 509 may be an alternating current, a direct current, a disposable battery, or a rechargeable battery. When the power supply 509 comprises a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the terminal 500 further includes one or more sensors 510. The one or more sensors 510 include, but are not limited to: an acceleration sensor 511, a gyro sensor 512, a pressure sensor 513, a fingerprint sensor 514, an optical sensor 515, and a proximity sensor 516.
The acceleration sensor 511 can detect the magnitudes of accelerations on three coordinate axes of the coordinate system established with the terminal 500. For example, the acceleration sensor 511 may be used to detect components of gravitational acceleration on three coordinate axes. The processor 501 may control the display 505 to display a user interface in a landscape view or a portrait view according to a gravitational acceleration signal acquired by the acceleration sensor 511. The acceleration sensor 511 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 512 may detect a body direction and a rotation angle of the terminal 500, and the gyro sensor 512 may collect a 3D motion of the user to the terminal 500 in cooperation with the acceleration sensor 511. The processor 501 may implement the following functions based on the data collected by the gyro sensor 512: motion sensing (e.g., changing UI according to a tilting operation by a user), image stabilization at shooting, game control, and inertial navigation.
The pressure sensor 513 may be disposed at a side frame of the terminal 500 and/or at a lower layer of the display 505. When the pressure sensor 513 is disposed at a side frame of the terminal 500, a grip signal of the user to the terminal 500 may be detected, and the processor 501 performs left-right hand recognition or quick operation according to the grip signal collected by the pressure sensor 513. When the pressure sensor 513 is disposed at the lower layer of the display screen 505, the processor 501 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 505. The operability controls include at least one of a button control, a scroll bar control, an icon control, and a menu control.
The fingerprint sensor 514 is used for collecting the fingerprint of the user, and the processor 501 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 514, or the fingerprint sensor 514 identifies the identity of the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, the user is authorized by the processor 501 to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for and changing settings, etc. The fingerprint sensor 514 may be provided at the front, rear or side of the terminal 500. When a physical key or a vendor Logo is provided on the terminal 500, the fingerprint sensor 514 may be integrated with the physical key or the vendor Logo.
The optical sensor 515 is used to collect the ambient light intensity. In one embodiment, the processor 501 may control the display brightness of the display screen 505 based on the intensity of ambient light collected by the optical sensor 515. Specifically, when the intensity of the ambient light is high, the display brightness of the display screen 505 is turned up; when the ambient light intensity is low, the display brightness of the display screen 505 is turned down. In another embodiment, the processor 501 may also dynamically adjust the shooting parameters of the camera assembly 506 based on the ambient light intensity collected by the optical sensor 515.
A proximity sensor 516, also referred to as a distance sensor, is typically provided on the front panel of the terminal 500. The proximity sensor 516 serves to collect a distance between the user and the front surface of the terminal 500. In one embodiment, when the proximity sensor 516 detects that the distance between the user and the front of the terminal 500 gradually decreases, the processor 501 controls the display 505 to switch from the bright screen state to the off screen state; when the proximity sensor 516 detects that the distance between the user and the front surface of the terminal 500 gradually increases, the processor 501 controls the display 505 to switch from the off-screen state to the on-screen state.
Those skilled in the art will appreciate that the structure shown in fig. 5 is not limiting and that more or fewer components than shown may be included or certain components may be combined or a different arrangement of components may be employed.
After a first user answers a communication request sent by a local terminal to a target number receiving malicious communication information, in a voice communication process with the first user, extracting first voice features of the first user, further, identifying the identity of the first user by matching the first voice features with characteristic voice features of specific users, and when the first user is identified as the specific user, marking that the terminal corresponding to the target number is transferred by a call, further, timely taking measures to avoid the illegal user from being cheated, and achieving a good anti-fraud early warning effect.
Embodiments of the present disclosure provide a computer readable storage medium having at least one program code stored therein, the at least one program code being loaded and executed by a processor to implement a call forwarding identification method in an anti-fraud pre-warning process as described in the first aspect. The computer readable storage medium may be non-transitory. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
After a first user answers a communication request sent by a home terminal to a target number receiving malicious communication information, in a voice communication process with the first user, extracting a first voice feature of the first user, further, identifying the identity of the first user by matching the first voice feature with a characteristic voice feature of a specific user, and when the first user is identified as the specific user, marking that a terminal corresponding to the target number has been called for transfer, further, taking measures in time, avoiding the legal user from being cheated, and achieving a good anti-fraud early warning effect.
The disclosed embodiments provide a computer program product comprising computer program code stored in a computer readable storage medium, from which a processor of a terminal reads the computer program code, the processor executing the computer program code such that the terminal performs a call forwarding identification method in an anti-fraud early warning process.
After a first user answers a communication request sent by a local terminal to a target number receiving malicious communication information, in a voice communication process with the first user, extracting first voice features of the first user, further, identifying the identity of the first user by matching the first voice features with characteristic voice features of a specific user, and when the first user is identified as the specific user, marking that a terminal corresponding to the target number has been called for transfer, further, timely taking measures to avoid the legal user from being cheated, thereby achieving a good anti-fraud early warning effect.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments of the present disclosure is provided for the purpose of illustration only, and is not intended to limit the disclosure to the particular embodiments disclosed, but on the contrary, the intention is to cover all modifications, equivalents, alternatives, and alternatives falling within the spirit and principles of the disclosure.

Claims (9)

1. A method for identifying call forwarding in an anti-fraud early warning process, the method comprising:
responding to a communication request sent by a first user based on a target number answering home terminal, acquiring first voice information of the first user, wherein the target number is a number for receiving malicious communication information, and the communication request is used for performing anti-fraud early warning on a legal user corresponding to the target number aiming at the malicious communication information received by the target number;
extracting first voice characteristics from the first voice information;
matching the first voice feature with each specific voice feature in a specific voice database, wherein the specific voice feature is the voice feature of a specific user, and the specific user is the user or related user who sends the malicious communication information;
When the first voice feature is matched with any specific voice feature, marking that the terminal corresponding to the target number is transferred by calling;
when the first voice feature is not matched with each specific voice feature in the specific voice database, extracting a specified voice keyword from the first voice information, wherein the specified voice keyword is a keyword representing the relationship between the first user and the legal user;
acquiring second voice information of a second user indicated by the appointed voice keyword;
extracting second voice characteristics from the second voice information;
matching the first speech feature with the second speech feature;
and when the first voice characteristic is not matched with the second voice characteristic, marking that the terminal corresponding to the target number is transferred by the call.
2. The method of claim 1, wherein prior to extracting the first speech feature from the first speech information, further comprising:
invoking a variable sound recognition model to recognize the first voice information to obtain a recognition result, wherein the variable sound recognition model is used for recognizing whether the voice information is subjected to variable sound processing;
When the recognition result is that the first voice information is subjected to sound conversion processing, a sound reduction model is called to reduce the first voice information to obtain original voice information corresponding to the first voice information, and the sound reduction model is used for reducing the sound conversion voice information to the original voice information;
the extracting a first voice feature from the first voice information includes:
extracting the first voice feature from the original voice information.
3. The method of claim 1, wherein prior to said matching the first speech feature with each particular speech feature in a particular speech database, further comprising:
matching the first voice feature with the target voice feature of the legal user;
when the first speech feature does not match the target speech feature, performing the step of matching the first speech feature with each specific speech feature in a specific speech database.
4. A method according to claim 3, wherein the method further comprises:
and when the first voice characteristic is matched with the target voice characteristic, marking that the terminal corresponding to the target number is not transferred by the call.
5. The method of claim 1, wherein after the terminal corresponding to the target number has been forwarded by the call, the method further comprises:
updating the specific voice database based on the first voice feature.
6. The method according to any one of claims 1 to 5, wherein after the terminal corresponding to the target number has been forwarded by the call, the method further comprises:
and displaying early warning prompt information, wherein the early warning prompt is used for prompting that the first user is a specific user.
7. A call forwarding identification device in an anti-fraud early warning process, the device comprising:
the acquisition module is used for responding to a communication request sent by a first user based on a target number answering home terminal, acquiring first voice information of the first user, wherein the target number is a number for receiving malicious communication information, and the communication request is used for performing anti-fraud early warning on a legal user corresponding to the target number aiming at the malicious communication information received by the target number;
the extraction module is used for extracting first voice characteristics from the first voice information;
The matching module is used for matching the first voice characteristic with each specific voice characteristic in a specific voice database, wherein the specific voice characteristic is the voice characteristic of a specific user, and the specific user is the user who sends the malicious communication information or the related user;
the marking module is used for marking that the terminal corresponding to the target number is transferred by a call when the first voice characteristic is matched with any specific voice characteristic;
the extraction module is further configured to extract a specified voice keyword from the first voice information when the first voice feature is not matched with each specific voice feature in the specific voice database, where the specified voice keyword is a keyword that characterizes a relationship between the first user and the legal user;
the acquisition module is further used for acquiring second voice information of a second user indicated by the appointed voice keyword;
the extraction module is further used for extracting second voice features from the second voice information;
the matching module is further used for matching the first voice feature with the second voice feature;
and the marking module is further used for marking that the terminal corresponding to the target number is transferred by the call when the first voice feature is not matched with the second voice feature.
8. A terminal comprising a processor and a memory, wherein the memory has at least one program code stored therein, the at least one program code being loaded and executed by the processor to implement the call forwarding identification method in the anti-fraud pre-warning process as claimed in any of claims 1 to 6.
9. A computer readable storage medium having stored therein at least one program code, the at least one program code being loaded and executed by a processor to implement the call forwarding identification method in the anti-fraud pre-warning process as recited in any of claims 1 to 6.
CN202111491385.2A 2021-12-08 2021-12-08 Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process Active CN114189574B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111491385.2A CN114189574B (en) 2021-12-08 2021-12-08 Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111491385.2A CN114189574B (en) 2021-12-08 2021-12-08 Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process

Publications (2)

Publication Number Publication Date
CN114189574A CN114189574A (en) 2022-03-15
CN114189574B true CN114189574B (en) 2023-08-04

Family

ID=80542721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111491385.2A Active CN114189574B (en) 2021-12-08 2021-12-08 Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process

Country Status (1)

Country Link
CN (1) CN114189574B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270732A (en) * 2014-10-23 2015-01-07 广州三星通信技术研究有限公司 Call forwarding configuration method and device
CN106210239A (en) * 2016-09-14 2016-12-07 北京奇虎科技有限公司 The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN107734128A (en) * 2017-09-28 2018-02-23 努比亚技术有限公司 One kind swindle number identification method and equipment
CN108347512A (en) * 2018-01-22 2018-07-31 维沃移动通信有限公司 A kind of personal identification method and mobile terminal
CN110891124A (en) * 2019-12-11 2020-03-17 厦门韭黄科技有限公司 System for artificial intelligence pick-up call
CN112992158A (en) * 2019-12-16 2021-06-18 海能达通信股份有限公司 Identity authentication method and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270732A (en) * 2014-10-23 2015-01-07 广州三星通信技术研究有限公司 Call forwarding configuration method and device
CN106210239A (en) * 2016-09-14 2016-12-07 北京奇虎科技有限公司 The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN107734128A (en) * 2017-09-28 2018-02-23 努比亚技术有限公司 One kind swindle number identification method and equipment
CN108347512A (en) * 2018-01-22 2018-07-31 维沃移动通信有限公司 A kind of personal identification method and mobile terminal
CN110891124A (en) * 2019-12-11 2020-03-17 厦门韭黄科技有限公司 System for artificial intelligence pick-up call
CN112992158A (en) * 2019-12-16 2021-06-18 海能达通信股份有限公司 Identity authentication method and equipment

Also Published As

Publication number Publication date
CN114189574A (en) 2022-03-15

Similar Documents

Publication Publication Date Title
CN111324259B (en) Group creation method, device and storage medium
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN111696532B (en) Speech recognition method, device, electronic equipment and storage medium
CN108347512B (en) Identity recognition method and mobile terminal
WO2019206077A1 (en) Video call processing method and mobile terminal
CN110930410B (en) Image processing method, server and terminal equipment
CN110909264B (en) Information processing method, device, equipment and storage medium
CN113435621A (en) Reservation and data updating method, device, equipment and storage medium for epidemic prevention project
CN110060062B (en) Information exchange method after wearable device is lost, wearable device and storage medium
CN109257489B (en) Display method and mobile terminal
CN111881423B (en) Method, device and system for authorizing restricted function use
CN111128115B (en) Information verification method and device, electronic equipment and storage medium
CN110827830B (en) Voiceprint recognition method, voiceprint recognition device, terminal and storage medium based on voice data
CN108495276B (en) Sharing method and device of digital business card
CN112866470A (en) Incoming call processing method and device, electronic equipment and medium
CN112992127A (en) Voice recognition method and device
CN116418771A (en) Message display method, message processing method, device and electronic equipment
CN114143280B (en) Session display method and device, electronic equipment and storage medium
CN114189574B (en) Call forwarding identification method, device, terminal and storage medium in anti-fraud early warning process
CN113051015B (en) Page rendering method and device, electronic equipment and storage medium
WO2021213371A1 (en) Information processing method and electronic device
CN109618018B (en) User head portrait display method, device, terminal, server and storage medium
CN114091998A (en) Order delivery method, device, equipment and computer readable storage medium
CN110333888B (en) Function updating method, device, equipment and storage medium
CN111556188B (en) Call method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant