WO2017084591A1 - Procédé et dispositif d'identification d'appel malveillant - Google Patents

Procédé et dispositif d'identification d'appel malveillant Download PDF

Info

Publication number
WO2017084591A1
WO2017084591A1 PCT/CN2016/106145 CN2016106145W WO2017084591A1 WO 2017084591 A1 WO2017084591 A1 WO 2017084591A1 CN 2016106145 W CN2016106145 W CN 2016106145W WO 2017084591 A1 WO2017084591 A1 WO 2017084591A1
Authority
WO
WIPO (PCT)
Prior art keywords
phone
voice
malicious
party
call
Prior art date
Application number
PCT/CN2016/106145
Other languages
English (en)
Chinese (zh)
Inventor
王务志
王军
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2017084591A1 publication Critical patent/WO2017084591A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Definitions

  • the invention belongs to the technical field of mobile devices, and in particular to a method and device for identifying a malicious phone.
  • the present application provides a method and apparatus for identifying a malicious phone, which can intercept a malicious phone by matching a voice feature point.
  • An embodiment of the present invention provides a method for identifying a malicious phone, including:
  • the voice of the other party is sent to the cloud server, so that the cloud server performs voice analysis on the voice of the other party to obtain the voice feature point of the voice of the other party, and matches the voice feature point of the voice of the other party with the voice feature point in the voice database of the pre-established malicious phone voice feature database. , when the match is successful, return a prompt for a malicious call;
  • the prompt of the malicious phone fed back by the cloud server is displayed on the call interface.
  • the method further includes:
  • the other party's incoming call is identified as a malicious call, and the voice of the malicious phone is recorded for a certain period of time;
  • the malicious phone comprises an intermediary phone, a sales phone, a fraud phone, a harassing phone or a custom phone;
  • the other party's call is identified as a malicious call, including:
  • a phone label option is displayed on the call interface, including the label of the intermediary phone, the tag of the promotional phone, the tag of the scam phone, the tag of the harassing phone, or the option of the custom phone tag.
  • the user selects any label according to the voice of the other party in the phone label option, the user identifies the other party's incoming call as the malicious phone corresponding to the label selected by the user.
  • the method further includes:
  • the tag information is added to the voice of the recorded malicious phone according to the tag selected by the user.
  • the method further includes:
  • the malicious phone voice feature database includes: caller number information of multiple malicious phones, voice feature point information of multiple malicious phones, and tag information of voices of multiple malicious phones;
  • the malicious phone voice feature database further includes: a correspondence between a caller number of the malicious phone and a voice feature point of the malicious phone, a correspondence relationship between the voice feature point of the malicious phone and the tag, a caller number of the malicious phone, and a voice feature point. And a one-to-one correspondence between tags.
  • the prompt of the malicious phone includes the tag information
  • displaying the prompt of the malicious phone on the call interface according to the prompt of the malicious phone fed back by the cloud server including:
  • the user equipment displays the malicious phone label corresponding to the label information on the call interface according to the label information included in the prompt of the malicious phone.
  • the method further includes:
  • the voice of the other party is sent to the cloud server, so that the cloud server performs voice analysis on the voice of the other party to obtain the voice feature point of the voice of the other party, and matches the voice feature point of the voice of the other party with the voice feature point in the pre-established whitelist voice feature database. If the match is unsuccessful, return whether the other party's phone is a selection prompt for a malicious call;
  • the cloud server feeds back the selection prompt of the malicious phone, if the user selects the malicious phone option, the malicious phone option selected by the user is sent to the cloud server, so that the cloud server saves the voice feature point of the voice of the other party to the malicious phone.
  • the voice feature database In the voice feature database.
  • An embodiment of the present invention further provides an apparatus for identifying a malicious phone, including:
  • the acquisition module is configured to collect the voice of the other party for a certain period of time during the process of answering the call;
  • the sending module is configured to send the voice of the other party to the cloud server, so that the cloud server performs voice analysis on the voice of the other party to obtain a voice feature point of the voice of the other party, and the voice feature point of the voice of the other party is in a pre-established voice feature database of the malicious phone.
  • the voice feature points are matched, and when the matching is successful, the prompt of the malicious phone is returned;
  • the display module is configured to display the prompt of the malicious phone on the call interface according to the prompt of the malicious phone fed back by the cloud server.
  • the device further includes:
  • a detecting module configured to detect, according to a user instruction, a user selecting a malicious phone option during the answering call
  • the collecting module is further configured to identify the other party's incoming call as a malicious call, and record the voice of the malicious phone for a certain period of time;
  • the sending module is further configured to send the voice of the malicious phone to the cloud server, so that the cloud server performs voice analysis on the voice of the malicious phone, obtains a voice feature point of the malicious phone, and sets a voice feature point of the malicious phone. Save to the malicious phone voice feature database.
  • the malicious phone comprises an intermediary phone, a sales phone, a fraud phone, a harassing phone or a custom phone;
  • the detecting module is specifically configured to display a phone label option on the call interface during the answering call, where the phone label option includes a label of the intermediary phone, a label of the sales phone, a label of the fraud phone, a label of the harassing phone, or Customize the option of the phone label so that when the user selects any tag in the phone tag option according to the voice of the other party, the other party's caller is identified as the malicious phone corresponding to the tag selected by the user.
  • the device further includes:
  • Adding a module for adding the tag information to the voice of the recorded malicious phone according to the tag selected by the user Adding a module for adding the tag information to the voice of the recorded malicious phone according to the tag selected by the user.
  • the adding module is further configured to add an incoming call number in the voice of the recorded malicious phone.
  • the malicious phone voice feature database includes: caller number information of multiple malicious phones, voice feature point information of multiple malicious phones, and tag information of voices of multiple malicious phones;
  • the malicious phone voice feature database further includes: a correspondence between a caller number of the malicious phone and a voice feature point of the malicious phone, a correspondence relationship between the voice feature point of the malicious phone and the tag, a caller number of the malicious phone, and a voice feature point. And a one-to-one correspondence between tags.
  • the display module is configured to: display the malicious phone corresponding to the tag information on the call interface according to the tag information included in the prompt of the malicious phone label.
  • the collecting module is further configured to collect a voice of the other party for a certain period of time during the process of answering the call;
  • the sending module is further configured to send the voice of the counterpart to the cloud server, so that the cloud server performs voice analysis on the voice of the counterpart, obtains a voice feature point of the voice of the counterpart, and sets the voice feature point of the voice of the opposite party with the pre-established whitelist voice feature.
  • the voice feature points in the database are matched, and when the matching is unsuccessful, the returning party's phone is a selection prompt of the malicious phone;
  • the detecting module is further configured to: according to whether the cloud server feeds back a selection prompt of a malicious phone, when detecting that the user selects a malicious phone option, the malicious phone option selected by the user is passed through
  • the sending module sends the cloud module to the cloud server, so that the cloud server saves the voice feature points of the counterpart voice to the malicious phone voice feature database.
  • Embodiments of the present invention provide a computer program comprising computer readable code that, when run on a computing device, causes the computing device to perform the method of identifying the malicious phone described above.
  • Embodiments of the present invention provide a computer readable medium in which the above computer program is stored.
  • the embodiment of the present invention is based on a malicious phone voice feature database.
  • the user can collect the voice of the other party for a certain period of time; and send the voice of the other party to the cloud server, so that the cloud server performs voice analysis on the voice of the other party to obtain the voice of the other party.
  • the voice feature point matches the voice feature point of the voice of the other party with the voice feature point in the voice feature database of the malicious phone.
  • the prompt of the malicious phone is returned; further, according to the prompt of the malicious phone fed back by the cloud server, The prompt of the malicious phone is displayed on the call interface, so that the user hangs up the malicious call in time to prevent being deceived, thereby improving the security of the user's use of the phone.
  • FIG. 1 is a schematic flowchart of a method for configuring a voice feature database of a malicious phone according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a method for identifying a malicious phone according to an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of an apparatus for identifying a malicious phone according to an embodiment of the present application
  • FIG. 4 is a block diagram of a computing device for performing a method for identifying a malicious phone according to an embodiment of the present invention
  • FIG. 5 is a storage unit of a program code for maintaining or carrying a method for recognizing a malicious phone according to an embodiment of the present invention.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include non-transitory computer readable media, such as modulated data signals and carrier waves.
  • a first device is coupled to a second device
  • the first device can be directly electrically coupled to the second device, or electrically coupled indirectly through other devices or coupling means. Connected to the second device.
  • the description of the preferred embodiments of the present invention is intended to be illustrative of the general principles of the invention, and is not intended to limit the scope of the invention. Wai. The scope of the invention is defined by the appended claims.
  • the method for identifying a malicious phone is based on a malicious phone voice feature database.
  • the user can collect the voice of the other party for a certain period of time; and send the voice of the other party to the cloud server, so that the cloud server can voice the other party.
  • speech analysis to obtain the speech feature points of the other party's speech, matching the speech feature points of the other party's speech with the speech feature points in the malicious phone speech feature database, and returning the prompt of the malicious phone when the matching is successful; further, according to the cloud server
  • the feedback of the malicious phone prompts the prompt of the malicious phone on the call interface, so that the user hangs up the malicious call in time to prevent being deceived.
  • the embodiment of the present invention first describes a method for configuring a voice feature database of a malicious phone:
  • FIG. 1 is a schematic flowchart of a method for configuring a voice feature database of a malicious phone according to an embodiment of the present application. As shown in FIG. 1, the method includes:
  • the phone label option is displayed on the call interface
  • the malicious phone in this embodiment includes, for example, an intermediary phone, a sales phone, a fraud phone, a harassing phone, or a custom phone.
  • a corresponding phone tag is set for each malicious phone, wherein the phone tag option Examples include labels for intermediaries, labels for sales calls, labels for fraudulent calls, tags for harassing calls, or options for custom phone labels.
  • the user selects any label according to the voice of the other party in the phone label option, the user identifies the other party's incoming call as a malicious phone corresponding to the label selected by the user;
  • the intermediary telephone label may be selected in the telephone label option to identify the other party's incoming call identification as an intermediary telephone; and, for example, when the user determines that the incoming call is a fraudulent telephone according to the voice of the opposite party, You can select the scam phone label in the phone label option to identify the other party's caller ID as a scam phone.
  • the method further includes: adding a phone label selected by the user to the voice of the recorded malicious phone according to the phone label selected by the user;
  • the method further includes: adding a caller number in the voice of the recorded malicious phone.
  • the cloud server performs voice analysis on the voice of the malicious phone, and obtains a voice feature point of the malicious phone;
  • the voice recognition feature may be extracted by using a voice recognition technology, which specifically includes:
  • the medium-average power spectrum of the noisy speech is obtained by means of frame averaging
  • the speech recognition technology of the present invention may be any existing speech recognition technology that can implement speech feature point lifting, and the present invention does not limit this.
  • the step 106 is specifically implemented to:
  • the step 106 is specifically implemented to:
  • the cloud server may further identify the voice of the malicious phone as corresponding text information; establish text information of the malicious phone and the Corresponding relationship between the voice feature points of the malicious phone, and storing the correspondence between the text information of the malicious phone and the voice feature point of the malicious phone in the malicious phone voice feature database.
  • the embodiment of the present invention further includes:
  • the voice of the other party is sent to the cloud server, so that the cloud server performs voice analysis on the voice of the other party to obtain the voice feature point of the voice of the other party, and matches the voice feature point of the voice of the other party with the voice feature point in the pre-established whitelist voice feature database. If the match is unsuccessful, return whether the other party's phone is a selection prompt for a malicious call;
  • the cloud server feeds back the selection prompt of the malicious phone, if the user selects the malicious phone option, the malicious phone option selected by the user is sent to the cloud server, so that the cloud server saves the voice feature point of the voice of the other party to the malicious phone.
  • the voice feature database In the voice feature database.
  • the establishment of the pre-established whitelist voice feature database is as follows: user equipment Receiving the contact phone number in the white list, collecting the phone voice of the contact in the white list and sending it to the cloud server, and the cloud server extracts the voice feature point of the phone voice of the contact in the white list, and the voice of the phone voice of the contact in the white list Feature points are saved to the whitelist voice feature database.
  • the malicious phone voice feature database obtained by the method for configuring the voice feature database of the malicious phone according to the embodiment of the present invention includes, but is not limited to, caller number information of multiple malicious phones, and voice feature points of multiple malicious phones. Information, tag information of voices of a plurality of malicious phones, and text information corresponding to voices of a plurality of malicious phones.
  • the malicious phone voice feature database obtained according to the configuration method of the voice feature database of the malicious phone provided by the embodiment of the present invention may further include: a correspondence between the caller number of the malicious phone and the voice feature point of the malicious phone, and malicious The correspondence between the voice feature points of the phone and the tag, the correspondence between the voice feature points of the malicious phone and the text information, the correspondence between the caller number of the malicious phone and the text information, the correspondence between the tag and the text information of the malicious phone, and the malicious phone A one-to-one correspondence between the caller number and the voice feature point and the one-to-one correspondence between the tags, the caller number of the malicious call, the voice feature point, the tag, and the text information.
  • FIG. 2 is a schematic flowchart of a method for identifying a malicious phone according to an embodiment of the present application. As shown in FIG. 2, the method includes:
  • the cloud server performs voice analysis on the voice of the other party to obtain a voice feature point of the voice of the other party, and includes, for example:
  • the medium-average power spectrum of the noisy speech is obtained by means of frame averaging
  • the cepstral coefficient is subjected to mean normalization processing to obtain a speech feature point of the counterpart speech.
  • the voice feature points of the counterpart voice are matched with the voice feature points in the pre-established malicious phone voice feature database, and the implementation includes, for example:
  • the match may be determined to be successful, otherwise the match may fail.
  • step 203 includes:
  • the user equipment displays the malicious phone label corresponding to the label information on the call interface according to the label information included in the prompt of the malicious phone.
  • the prompt of the malicious phone fed back by the cloud server includes the scam phone tag, and the prompt is displayed as a scam call on the call interface;
  • the prompt of the malicious phone fed back by the cloud server includes the advertisement phone label, and the call interface is Displayed as a reminder for an ad call.
  • the malicious phone voice feature database obtained by the method for configuring the voice feature database of the malicious phone provided by the embodiment of the present invention can collect the voice of the other party for a certain period of time and send the voice of the other party to the cloud server during the process of answering the call.
  • the cloud server performs voice analysis on the voice of the other party to obtain a voice feature point of the voice of the other party, and matches the voice feature point of the voice of the other party with the voice feature point in the voice feature database of the malicious phone, and returns a malicious call when the match is successful.
  • the prompt of the malicious phone is displayed on the call interface, so that the user hangs up the malicious call in time to prevent being deceived, thereby improving the security of the user using the phone.
  • FIG. 3 is a schematic structural diagram of a device for identifying a malicious phone according to an embodiment of the present application. As shown in FIG. 3, the method includes:
  • the collecting module 31 is configured to collect a voice of the other party for a certain period of time during the process of answering the call;
  • the sending module 32 is configured to send the voice of the other party to the cloud server, so that the cloud server performs voice analysis on the voice of the partner, obtains a voice feature point of the voice of the other party, and the voice feature point of the voice of the other party is in a pre-established voice feature database of the malicious phone.
  • the voice feature points are matched, and when the matching is successful, the prompt of the malicious call is returned;
  • the display module 33 is configured to display a prompt of the malicious phone on the call interface according to the prompt of the malicious phone fed back by the cloud server.
  • the device further includes:
  • the detecting module 34 is configured to detect, according to a user instruction, a user selecting a malicious phone option during the answering call;
  • the collecting module 31 is further configured to identify the other party's incoming call as a malicious call, and record the voice of the malicious phone for a certain period of time;
  • the sending module 33 is further configured to send the voice of the malicious phone to the cloud server, so that the cloud server performs voice analysis on the voice of the malicious phone, obtains a voice feature point of the malicious phone, and uses the voice feature of the malicious phone. The point is saved to the malicious phone voice feature database.
  • the malicious phone includes an intermediary phone, a sales phone, a fraud phone, a harassing phone or a custom phone;
  • the detecting module 34 is specifically configured to display a phone label option on the call interface during the answering call, where the phone label option includes a label of the intermediary phone, a label of the sales phone, a label of the fraud phone, and a label of the harassing phone. Or customize the option of the phone label, so that when the user selects any tag in the phone tag option according to the voice of the other party, the other party's caller is identified as the malicious phone corresponding to the tag selected by the user.
  • the device further includes:
  • the adding module 35 is configured to add the label information to the voice of the recorded malicious phone according to the label selected by the user.
  • the adding module 35 is further configured to add an incoming call number in the voice of the recorded malicious phone.
  • the malicious phone voice feature database includes: caller number information of multiple malicious phones, voice feature point information of multiple malicious phones, and tag information of voices of multiple malicious phones;
  • the malicious phone voice feature database further includes: a correspondence between a caller number of the malicious phone and a voice feature point of the malicious phone, a correspondence relationship between the voice feature point of the malicious phone and the tag, a caller number of the malicious phone, and a voice feature point. And a one-to-one correspondence between tags.
  • the display module 33 is configured to display the malicious phone tag corresponding to the tag information on the call interface according to the tag information included in the prompt of the malicious phone.
  • the collecting module 31 is further configured to collect a voice of the other party for a certain period of time during the process of answering the call;
  • the sending module 32 is further configured to send the voice of the other party to the cloud server, so that the cloud server performs voice analysis on the voice of the partner, obtains a voice feature point of the voice of the partner, and sets the voice feature point of the voice of the partner with the pre-established whitelist voice.
  • the voice feature points in the feature database are matched, and when the matching is unsuccessful, the returning party's phone is a selection prompt of the malicious phone;
  • the detecting module 34 is further configured to: according to whether the cloud server feeds back a selection prompt of the malicious phone, when detecting the user selecting the malicious phone option, sending the malicious phone option selected by the user to the cloud server through the sending module, The cloud server saves the voice feature points of the counterpart voice to the malicious phone voice feature database.
  • the apparatus shown in FIG. 3 can perform the method described in the embodiment shown in FIG. 1 and FIG. 2, and the implementation principle and technical effects are not described again.
  • Figure 4 illustrates a computing device that can implement a method of identifying a malicious phone in accordance with the present invention.
  • the computing device conventionally includes a processor 410 and a computer program product or computer readable medium in the form of a storage device 420.
  • Storage device 420 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM.
  • Storage device 420 has storage for storing program code 431 for performing any of the method steps described above Space 430.
  • storage space 430 storing program code may include various program code 431 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as a hard disk, a compact disk (CD), a memory card, or a floppy disk.
  • Such computer program products are typically portable or fixed storage units such as those shown in FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to storage device 420 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit comprises computer readable code 431' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 410, which when executed by the computing device causes the computing device Perform the various steps in the method described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un dispositif d'identification d'un appel malveillant. Le procédé consiste à : collecter une voix sur le côté opposé pendant un certain temps durant un processus de réponse aux appels (201) ; envoyer la voix sur le côté opposé à un serveur en nuage, permettre au serveur en nuage d'exécuter une analyse vocale sur la voix sur le côté opposé, obtenir un point de caractéristique vocale de la voix sur le côté opposé, mettre en correspondance le point de caractéristique vocale de la voix sur le côté opposé avec un point de caractéristique vocale préétablie dans une base de données de caractéristiques vocales d'appels malveillants, et renvoyer une invite de l'appel malveillant lorsque la mise en correspondance réussit (202) ; et afficher l'invite de l'appel malveillant sur une interface d'appel selon l'invite de l'appel malveillant renvoyé par le serveur en nuage (203).
PCT/CN2016/106145 2015-11-20 2016-11-16 Procédé et dispositif d'identification d'appel malveillant WO2017084591A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510808754.4 2015-11-20
CN201510808754.4A CN106782495A (zh) 2015-11-20 2015-11-20 恶意电话的识别方法和装置

Publications (1)

Publication Number Publication Date
WO2017084591A1 true WO2017084591A1 (fr) 2017-05-26

Family

ID=58717391

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106145 WO2017084591A1 (fr) 2015-11-20 2016-11-16 Procédé et dispositif d'identification d'appel malveillant

Country Status (2)

Country Link
CN (1) CN106782495A (fr)
WO (1) WO2017084591A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610705A (zh) * 2019-09-20 2019-12-24 上海数鸣人工智能科技有限公司 一种基于人工智能的语音交互提示器
CN112151070A (zh) * 2019-06-26 2020-12-29 杭州海康威视数字技术股份有限公司 一种语音检测的方法、装置及电子设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996B (zh) * 2017-06-30 2020-02-11 Oppo广东移动通信有限公司 来电拦截方法、装置、存储介质及终端
CN108848507A (zh) * 2018-05-31 2018-11-20 厦门快商通信息技术有限公司 一种不良电信用户信息采集方法
CN109547621A (zh) * 2018-12-11 2019-03-29 平安科技(深圳)有限公司 一种信息提醒方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095889A (zh) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 一种基于通话模式识别的垃圾呼叫拦截系统及其工作方法
CN104113466A (zh) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 一种骚扰电话的识别方法、客户端、服务器及系统
CN104184872A (zh) * 2014-09-14 2014-12-03 陈桂芳 一种基于通话内容防骚扰电话的手机实现方法
CN104320529A (zh) * 2014-11-10 2015-01-28 京东方科技集团股份有限公司 一种信息接收处理方法及语音通信设备
CN105120068A (zh) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 一种语音通信的接听方法及装置
CN105338157A (zh) * 2014-07-29 2016-02-17 小米科技有限责任公司 骚扰电话处理方法、装置及电话

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095889A (zh) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 一种基于通话模式识别的垃圾呼叫拦截系统及其工作方法
CN104113466A (zh) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 一种骚扰电话的识别方法、客户端、服务器及系统
CN105338157A (zh) * 2014-07-29 2016-02-17 小米科技有限责任公司 骚扰电话处理方法、装置及电话
CN104184872A (zh) * 2014-09-14 2014-12-03 陈桂芳 一种基于通话内容防骚扰电话的手机实现方法
CN104320529A (zh) * 2014-11-10 2015-01-28 京东方科技集团股份有限公司 一种信息接收处理方法及语音通信设备
CN105120068A (zh) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 一种语音通信的接听方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112151070A (zh) * 2019-06-26 2020-12-29 杭州海康威视数字技术股份有限公司 一种语音检测的方法、装置及电子设备
CN112151070B (zh) * 2019-06-26 2023-05-05 杭州海康威视数字技术股份有限公司 一种语音检测的方法、装置及电子设备
CN110610705A (zh) * 2019-09-20 2019-12-24 上海数鸣人工智能科技有限公司 一种基于人工智能的语音交互提示器
CN110610705B (zh) * 2019-09-20 2023-07-25 上海数鸣人工智能科技有限公司 一种基于人工智能的语音交互提示器

Also Published As

Publication number Publication date
CN106782495A (zh) 2017-05-31

Similar Documents

Publication Publication Date Title
WO2017084591A1 (fr) Procédé et dispositif d'identification d'appel malveillant
US11140267B1 (en) Voice and speech recognition for call center feedback and quality assurance
CN110392913B (zh) 在共用的启用语音的装置上处理呼叫
WO2017084592A1 (fr) Procédé et dispositif de configuration pour une base de caractéristiques vocales d'appels malveillants
CN104966053B (zh) 人脸识别方法及识别系统
US9621698B2 (en) Identifying a contact based on a voice communication session
WO2017076314A1 (fr) Procédé de traitement et système pour l'identification adaptative d'appels indésirables
US20230145324A1 (en) Hotword-Based Speaker Recognition
US20190373105A1 (en) Cognitive telephone fraud detection
CN103888581B (zh) 一种通信终端及其记录通话信息的方法
US9552512B2 (en) Personalized, automated receptionist
CN105141787A (zh) 服务录音的合规检查方法及装置
CN107808423A (zh) 一种基于服务机器人的员工考勤签到系统与实现方法
CN109510806A (zh) 鉴权方法及装置
CN106686226B (zh) 一种终端音频播放方法及系统
KR20150041592A (ko) 피호출자의 전자 디바이스에서 연락처 정보를 업데이트하는 방법 및 전자 디바이스
CN111243595A (zh) 信息处理方法和装置
WO2017059679A1 (fr) Procédé et appareil de traitement de compte
US10706839B1 (en) Electronic signatures via voice for virtual assistants' interactions
US20160351185A1 (en) Voice recognition device and method
WO2016107274A1 (fr) Procédé et dispositif d'étiquetage de numéro de téléphone
IL287635B1 (en) A combination of real-time analytics and automation
WO2016107277A1 (fr) Procédé et dispositif de chargement d'informations basé sur un numéro de téléphone
EP2913822A1 (fr) Procédé de reconnaissance de locuteur
CN112911074B (zh) 一种语音通信处理方法、装置、设备和机器可读介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16865768

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16865768

Country of ref document: EP

Kind code of ref document: A1