KR20140066465A - Method of intercepting spam voice message and apparatus performing the same - Google Patents
Method of intercepting spam voice message and apparatus performing the same Download PDFInfo
- Publication number
- KR20140066465A KR20140066465A KR1020120133722A KR20120133722A KR20140066465A KR 20140066465 A KR20140066465 A KR 20140066465A KR 1020120133722 A KR1020120133722 A KR 1020120133722A KR 20120133722 A KR20120133722 A KR 20120133722A KR 20140066465 A KR20140066465 A KR 20140066465A
- Authority
- KR
- South Korea
- Prior art keywords
- spam
- message
- voice message
- word
- voice
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/184—Messaging devices, e.g. message centre
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Embodiments of the present invention are directed to a method for blocking spam voicemail and an apparatus for implementing the method.
The mobile communication terminal may be a personal mobile communication terminal, a personal digital assistant (PDA), a smart phone, an International Mobile Telecommunication 2000 (IMT 2000) LAN terminal and the like, and is capable of implementing various functions using an application program including wireless communication.
The mobile communication terminal has not only been reduced in size and weight due to steady development, but it is being reborn as a complex communication terminal having various functions such as mp3, camera and navigation, and is already becoming a necessity of modern people.
Such mobile communication terminals are also used as media for promoting advertisements through calls or voice messages. To this end, the sender of the advertisement message transmits the customer management and product advertisement message with the consent of the receiver to advertise the desired contents.
However, a spam-based advertisement message sent to an unspecified number of recipients is often received without the consent of the recipient. Therefore, a method for protecting recipients from such harmful messages is required.
An embodiment of the present invention is to provide a spam voicemail blocking method and a device for executing the spam voicemail blocking method that can determine a spam word as a spam message if the spam word is included in the voice message.
An embodiment of the present invention is to provide a spam voicemail blocking method and a device for executing the spam voicemail blocking method capable of processing a corresponding voice message as a spam message according to the ratio of spam words in a voice message.
The problems to be solved by the present invention are not limited to the above-mentioned problem (s), and another problem (s) not mentioned can be clearly understood by those skilled in the art from the following description.
In embodiments, a method for blocking spam voicemail messages is implemented in a spam voicemail interceptor associated with a sender terminal. The spam voice message blocking method includes generating a message string by analyzing a voice message received from the sender terminal, generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters, Determining a candidate word as a spam word if the plurality of spam candidate words exist in the plurality of spam candidate words; and determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words .
In one embodiment, the method for blocking spam voicemessage comprises: determining whether a phone number of the calling terminal exists in a pre-stored contact; and if the phone number of the calling terminal is present, It may further include a step of deciding that it is not.
In one embodiment, the step of analyzing the voice message to generate a message string may further include generating a message string by controlling a corresponding interval when a pause, which is a silence period, is detected in the voice of the voice message have.
In one embodiment, the step of generating a plurality of spam candidate words by dividing the message string into a specific number of characters may further include generating a plurality of message strings by dividing the message string by character type.
In one embodiment, if the plurality of spam candidate words are present in the pre-established spam information database, the step of determining the candidate word as a spam word may include, in a social network, a list of spam phone numbers, And constructing a spam information database by receiving at least one of a URL (Uniform Resource Locator) list.
In one embodiment, the step of determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words may include determining a ratio of the spam word among the plurality of spam candidate words to a specific ratio Determining that the voice message is a spam message.
In one embodiment, determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words may include extracting a telephone number of a sender terminal that has transmitted the voice message determined as the spam message And updating the spam phone number list in the social network if the phone number does not exist in the pre-established spam information database.
In one embodiment, the spam voicemail blocking method may further include sending a warning message to the user when the voice message is determined as a spam message.
In an exemplary embodiment, a spam voice message blocking device connected to a sender terminal may include a voice message manager for analyzing a voice message received from the caller terminal to generate a message string, and a plurality of spam candidate words Determines a candidate word as a spam word if the plurality of spam candidate words exist in a pre-established spam information database, and determines the candidate word as a spam word based on a ratio of the spam word occupied by the plurality of spam candidate words, As a spam message.
In one embodiment, the spam determining unit may determine whether the phone number of the calling terminal is present in the pre-stored contact, and may determine that the voice message is not a spam message if the phone number of the calling terminal exists .
In one embodiment, when a pause, which is a silence period, is detected in the voice of the voice message, the voice message management unit may control the corresponding period to generate a message string.
In one embodiment, the voice message management unit may further include generating a plurality of message strings by dividing the message string into a plurality of character types.
In one embodiment, the spam voice message blocking device further includes a spam information database constructed by receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network can do.
In one embodiment, the spam determining unit may determine the voice message as a spam message if the percentage of the spam words among the plurality of spam candidate words is greater than a specific ratio.
In one embodiment, the spam voice message blocking device extracts a telephone number of a caller terminal that has transmitted a voice message determined as the spam message, and if the telephone number does not exist in the spam information database, And a spam voicemail blocking control unit for updating the list.
In one embodiment, the spam voicemail blocking control unit may display a warning message to the user when the voice message is determined as a spam message.
The details of other embodiments are included in the detailed description and the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS The advantages and / or features of the present invention, and how to accomplish them, will become apparent with reference to the embodiments described in detail below with reference to the accompanying drawings. It should be understood, however, that the invention is not limited to the disclosed embodiments, but is capable of many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, To fully disclose the scope of the invention to those skilled in the art, and the invention is only defined by the scope of the claims. Like reference numerals refer to like elements throughout the specification.
According to an embodiment of the present invention, if the spam word is included in the voice message, the voice message can be determined as a spam message.
According to an embodiment of the present invention, the voice message may be processed as a spam message according to the ratio of the spam word in the voice message.
FIG. 1 is a network diagram illustrating a spam voice message blocking system according to an embodiment of the present invention. Referring to FIG.
FIG. 2 is a block diagram illustrating a spam voice message blocking apparatus according to an exemplary embodiment of the present invention. Referring to FIG.
3 is a block diagram illustrating a spam voice message blocking apparatus according to another embodiment of the present invention.
4 is a flowchart illustrating a method of blocking a spam voice message according to an embodiment of the present invention.
5 is a flow chart for explaining another embodiment of a spam voice message blocking method according to the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The spam voice message blocking device according to an embodiment of the present invention is included in a mobile communication terminal. The mobile communication terminal can be a mobile communication terminal such as a personal digital assistant (PCS), a personal digital assistant Lt; / RTI >
FIG. 1 is a network diagram illustrating a spam voice message blocking system according to an embodiment of the present invention. Referring to FIG.
Referring to FIG. 1, a spam voice message blocking system includes a spam voice
The spam voice
The calling
FIG. 2 is a block diagram illustrating a spam voice message blocking apparatus according to an exemplary embodiment of the present invention. Referring to FIG.
Referring to FIG. 2, the spam voice
The
The voice
In one embodiment, the voice
In another embodiment, the
The
The
In one embodiment, the
The
In one embodiment, the
For example, when the message string is " your creditable amount is 1 million won ", the
In another embodiment, the
The
In one embodiment, the
In another embodiment, the
The
The spam voice message blocking
The spam voice message blocking
The spam voice message blocking
The spam voice message blocking
In one embodiment, the spam voice
In another embodiment, the spam voice message blocking
In yet another embodiment, the spam voice
3 is a block diagram illustrating a spam voice message blocking apparatus according to another embodiment of the present invention. 3, the same or corresponding contents as those described above with reference to FIG. 2 will be omitted and the person skilled in the art will be able to understand the structure and operation of another embodiment of the spam voice message blocking device disclosed in FIG. Will be fully understood.
The spam voice
The
In one embodiment, the
Hereinafter, a spam voice message blocking method will be described with reference to FIGS. 4 and 5. FIG. Since the spam voice message blocking method to be described later is performed in the above-described spam voice
4 is a flowchart illustrating a method of blocking a spam voice message according to an embodiment of the present invention. The embodiment of FIG. 4 relates to an embodiment in which whether a voice message received from a sender terminal is a spam message or not can be confirmed.
4, the spam voice
5 is a flowchart for explaining another embodiment of the spam voice message blocking method according to the present invention. An embodiment of FIG. 5 relates to an embodiment wherein the voice message received from the sender terminal is a spam message and the corresponding information can be provided to a server in the social network.
5, the spam voice
Embodiments of the present invention include computer readable media including program instructions for performing various computer implemented operations. The computer-readable medium may include program instructions, local data files, local data structures, etc., alone or in combination. The media may be those specially designed and constructed for the present invention or may be those known to those skilled in the computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs and DVDs, magneto-optical media such as floppy disks, and ROMs, And hardware devices specifically configured to store and execute the same program instructions. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like.
While the present invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the scope of the appended claims and equivalents thereof.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, Modification is possible. Accordingly, the spirit of the present invention should be understood only in accordance with the following claims, and all equivalents or equivalent variations thereof are included in the scope of the present invention.
100: Spam Voice Message Blocker
110:
120: voice message management unit
130: Spam judgment unit
140: Spam voice message blocking control unit
150: Message storage unit
160: Spam information database
200: caller terminal
Claims (16)
Analyzing a voice message received from the caller terminal to generate a message string;
Generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters and determining the candidate word as a spam word if the plurality of spam candidate words exist in the pre-established spam information database; And
And determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words.
Determining whether a telephone number of the calling terminal exists in a pre-stored contact; And
And determining that the voice message is not a spam message if the phone number of the sender terminal exists as a result of the determination.
Further comprising the step of generating a message string by controlling a corresponding interval when a pause that is a silence period is detected in the voice of the voice message.
Further comprising generating a plurality of message strings by dividing the message string by a character type.
Further comprising the step of receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network to construct a spam information database .
And determining the voice message as a spam message if the ratio of the spam word among the plurality of spam candidate words is greater than a specific ratio.
Extracting a telephone number of a caller terminal that has transmitted a voice message determined as the spam message; And
And updating the spam phone number list in the social network if the phone number does not exist in the pre-established spam information database.
And sending a warning message to the user if the voice message is determined as a spam message.
A voice message manager for analyzing a voice message received from the caller terminal and generating a message string; And
The method comprising: generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters; determining the candidate word as a spam word if the plurality of spam candidate words exist in the pre-established spam information database; And a spam determining unit determining the voice message as a spam message according to a ratio of the spam word among the words.
Wherein the controller determines whether a phone number of the calling terminal exists in a pre-stored contact, and determines that the voice message is not a spam message if the phone number of the calling terminal exists.
Wherein when a pause that is a silence period is detected in the voice of the voice message, the control unit controls the corresponding period to generate a message string.
Further comprising generating a plurality of message strings by dividing the message string by a character type.
Further comprising a spam information database constructed by receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network.
And the voice message is determined to be a spam message if the ratio of the spam words among the plurality of spam candidate words is greater than a specific ratio.
Further comprising a spam voice message blocking control unit for extracting a telephone number of a caller terminal that has transmitted a voice message determined as the spam message and updating the spam phone number list in the social network if the telephone number does not exist in the spam information database Wherein the spam voicemail message blocking device comprises:
And displays a warning message to the user when the voice message is determined as a spam message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120133722A KR20140066465A (en) | 2012-11-23 | 2012-11-23 | Method of intercepting spam voice message and apparatus performing the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120133722A KR20140066465A (en) | 2012-11-23 | 2012-11-23 | Method of intercepting spam voice message and apparatus performing the same |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20140066465A true KR20140066465A (en) | 2014-06-02 |
Family
ID=51123180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120133722A KR20140066465A (en) | 2012-11-23 | 2012-11-23 | Method of intercepting spam voice message and apparatus performing the same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20140066465A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113919337A (en) * | 2021-11-02 | 2022-01-11 | 湖南快乐阳光互动娱乐传媒有限公司 | Short message interception method and device, storage medium and electronic equipment |
KR102392950B1 (en) * | 2022-03-04 | 2022-04-29 | 한양대학교 산학협력단 | Voice phishing/smishing detection method |
-
2012
- 2012-11-23 KR KR1020120133722A patent/KR20140066465A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113919337A (en) * | 2021-11-02 | 2022-01-11 | 湖南快乐阳光互动娱乐传媒有限公司 | Short message interception method and device, storage medium and electronic equipment |
KR102392950B1 (en) * | 2022-03-04 | 2022-04-29 | 한양대학교 산학협력단 | Voice phishing/smishing detection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109725975B (en) | Method and device for prompting read state of message and electronic equipment | |
US20150334118A1 (en) | Method and apparatus for clearing notification icon, and storage medium | |
CN101983501A (en) | User interface with voice message summary | |
JP2003244317A (en) | Voice and circumstance-dependent notification | |
US8331268B2 (en) | Methods, systems, and computer-readable media for providing an event alert | |
JP5633086B2 (en) | Method and apparatus for quickly adding recipients, and portable terminal using the same | |
CN101243679A (en) | Voice communicator to provide a voice communication | |
EP3247095A1 (en) | Method, apparatus, and portable electronic device | |
CN104125136A (en) | Message prompt method, client and terminal equipment | |
JP2019153961A (en) | Information processing system, information processing apparatus, information processing method, and program | |
KR101426616B1 (en) | Method of intercepting spam message and apparatus performing the same | |
CN105262881A (en) | Communication control method and electronic equipment | |
US10652388B2 (en) | Communication systems and methods for causing display of visual content on a screen associated with a calling device | |
CN112995422A (en) | Call control method and device, electronic equipment and storage medium | |
KR20140066465A (en) | Method of intercepting spam voice message and apparatus performing the same | |
KR101153019B1 (en) | Method and Apparatus for setting string for filtering spam messages in mobile device | |
CN108924840B (en) | Blacklist management method and device and terminal | |
US20050207390A1 (en) | Method and system for sending text-based communications to a network access device for an application with video or audio output | |
US8223947B2 (en) | Method and system for remote call forwarding set-up and modification | |
CN105704003A (en) | Instant communication interaction method and terminal | |
KR101339101B1 (en) | Method of providing alarm searvice using address book of smart device | |
KR20130133595A (en) | Method for blocking a spam call or a spam message | |
CN110688490A (en) | Method and device for configuring knowledge graph | |
KR101418577B1 (en) | Method of providing alarm searvice using address book of smart device | |
Stamm et al. | Mobile intelligent interruptions management (MIIM) a context aware unavailability system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |