WO2023151399A1 - Fraudulent incoming call identification method and apparatus, and electronic device and storage medium - Google Patents

Fraudulent incoming call identification method and apparatus, and electronic device and storage medium Download PDF

Info

Publication number
WO2023151399A1
WO2023151399A1 PCT/CN2022/140935 CN2022140935W WO2023151399A1 WO 2023151399 A1 WO2023151399 A1 WO 2023151399A1 CN 2022140935 W CN2022140935 W CN 2022140935W WO 2023151399 A1 WO2023151399 A1 WO 2023151399A1
Authority
WO
WIPO (PCT)
Prior art keywords
incoming call
location information
historical
fraudulent
information corresponding
Prior art date
Application number
PCT/CN2022/140935
Other languages
French (fr)
Chinese (zh)
Inventor
赵军
Original Assignee
上海闻泰信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海闻泰信息技术有限公司 filed Critical 上海闻泰信息技术有限公司
Publication of WO2023151399A1 publication Critical patent/WO2023151399A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • the present disclosure relates to a fraudulent call identification method, device, electronic equipment and storage medium.
  • a fraudulent call identification method, device, electronic device and storage medium are provided.
  • a method for identifying fraudulent calls comprising:
  • an interception operation is performed on the incoming call.
  • the first location information includes first historical location information corresponding to historical moments and first real-time location information corresponding to current moments
  • the second location information includes the historical The second historical location information corresponding to the moment and the second real-time location information corresponding to the current moment
  • the comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result includes: comparing the first historical location information corresponding to the historical moment with the historical Comparing the second historical position information corresponding to the time to obtain a first comparison result; comparing the first real-time position information corresponding to the current time with the second real-time position information corresponding to the current time to obtain a second comparison result; Identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result.
  • the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the historical location information corresponding to the incoming call number at the second historical moment.
  • the first historical location information, the second historical location information includes at least the second historical location information corresponding to the gateway address at the first historical moment, the second historical location information corresponding to the gateway address at the second historical moment location information; the first historical moment is earlier than the second historical moment;
  • the first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
  • the identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result includes: if the first distance is greater than a first distance threshold, or if the second distance is greater than a second distance threshold, or the third distance is greater than the third distance threshold, then it is determined that the incoming call is the fraudulent incoming call; if the first distance is not greater than the first distance threshold, and the second distance is not greater than the first two distance thresholds, and the third distance is not greater than the third distance threshold, then it is determined that the incoming call is not the fraudulent incoming call; wherein, the third distance threshold is smaller than the second distance threshold, and the second distance The threshold is less than the first distance threshold.
  • the method further includes: if it cannot be determined that the incoming call is the fraudulent call according to the comparison result, automatically calling back the calling number; If the caller number is not connected, then the caller is identified as the fraudulent call; if the caller number is dialed back and the caller is connected, it is recognized that the caller is not the fraudulent caller.
  • the method further includes: sending a detection instruction to the cloud, where the detection instruction is used to instruct the cloud to detect the marking state of the caller number corresponding to the incoming call; receiving the The flag state sent by the cloud; if the flag state indicates that the incoming call number is a fraudulent phone number, then it is recognized that the incoming call is a fraudulent call;
  • the determining the first location information corresponding to the incoming call number according to the incoming call number includes: if the marking state indicates that the incoming call number is not the fraudulent phone number, then according to the incoming call corresponding The incoming call number is used to determine the first location information corresponding to the incoming call number.
  • the determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call includes:
  • the Cell ID positioning technology and/or AFLT positioning technology and the incoming call number corresponding to the incoming call determine the first location information corresponding to the incoming call number.
  • performing an interception operation on the incoming call includes:
  • the marking instruction is used to instruct the cloud to mark the incoming call number as a fraudulent phone number .
  • a device for identifying fraudulent calls comprising:
  • a receiving module is configured as a module for receiving incoming calls dialed out by VoIP;
  • a first location determination module configuring the first location determination module as a module for determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call;
  • a second location determination module configuring the second location determination module as a module for obtaining the gateway address corresponding to the incoming call, and determining the second location location information corresponding to the gateway address according to the gateway address;
  • a comparison module configured to compare the first location information with the second location information, and identify whether the incoming call is a fraudulent call according to the comparison result;
  • An interception module configured to intercept the incoming call if it is determined that the incoming call is the fraudulent call.
  • the first location information includes first historical location information corresponding to historical moments and first real-time location information corresponding to current moments
  • the second location information includes the historical The second historical location information corresponding to the moment and the second real-time location information corresponding to the current moment
  • the comparison module is also configured to compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; and, configured to compare the current Comparing the first real-time location information corresponding to the moment with the second real-time location information corresponding to the current moment to obtain a second comparison result; and, configured to identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result module.
  • the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the historical location information corresponding to the incoming call number at the second historical moment.
  • the first historical location information, the second historical location information includes at least the second historical location information corresponding to the gateway address at the first historical moment, the second historical location information corresponding to the gateway address at the second historical moment location information; the first historical moment is earlier than the second historical moment;
  • the first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
  • the comparison module is further configured to determine that the incoming call is a fraudulent call if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold module; and, if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then determine that the incoming call is not a fraudulent incoming call; wherein , the third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
  • the device for identifying fraudulent calls further includes a callback module, and the callback module is configured to automatically call back the number of the incoming call if it cannot be determined that the incoming call is a fraudulent call according to the comparison result. and a module configured to recognize that the incoming call is a fraudulent call if it is not connected after calling back the calling number; and configured to recognize that the incoming call is not a fraudulent call if it is connected after calling back the calling number module.
  • the device for identifying fraudulent calls further includes a cloud detection module, and the cloud detection module is configured to send a detection instruction to the cloud module, and the detection instruction is used to instruct the The cloud detects the marking status of the incoming call number corresponding to the incoming call; and, a module configured to receive the marking status sent by the cloud; and, if the marking status indicates that the calling number is a fraudulent phone number, then A module that recognizes that the incoming call is a fraudulent incoming call;
  • the first location determination module is further configured to determine the caller number according to the caller number corresponding to the incoming call if the flag state indicates that the caller number is not the fraud phone number A module corresponding to the first location information.
  • the first position determining module further configures the first position determining module to use the Cell ID positioning technology and/or the AFLT positioning technology and the corresponding incoming call number of the incoming call, A module for determining the first location information corresponding to the caller number.
  • the interception module is further configured to hang up the incoming call and screen the incoming call if it is determined that the incoming call is a fraudulent incoming call, and send a marking instruction to the module in the cloud, marking the instruction Used to instruct the cloud to mark the incoming caller number as a fraudulent phone number.
  • An electronic device comprising a memory and one or more processors, the memory is configured as a module storing computer-readable instructions; when the computer-readable instructions are executed by the processor, the one or more The processor executes the steps of the fraudulent call identification method described in any one of the above.
  • One or more non-volatile storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, one or more processors perform the fraudulent call identification described in any one of the above method steps.
  • FIG. 1 is a schematic diagram of a VoIP network system provided by one or more embodiments of the present disclosure
  • FIG. 2 is a schematic diagram of a scene using a fraudulent call identification method provided by one or more embodiments of the present disclosure
  • Fig. 3 is a schematic diagram of an interface when a mobile terminal receives an incoming call provided by one or more embodiments of the present disclosure
  • Fig. 4 is a schematic flowchart of a fraudulent call identification method provided by one or more embodiments of the present disclosure
  • Fig. 5 is a schematic flowchart of another fraudulent call identification method provided by one or more embodiments of the present disclosure.
  • Fig. 6 is a schematic flowchart of another fraudulent call identification method provided by one or more embodiments of the present disclosure.
  • Fig. 7 is a modular schematic diagram of a fraudulent call identification device provided by one or more embodiments of the present disclosure.
  • Fig. 8 is a structural block diagram of an electronic device provided by one or more embodiments of the present disclosure.
  • first and second and the like in the specification and claims of the present disclosure are used to distinguish different objects, rather than to describe a specific order of objects.
  • first camera and the second camera are used to distinguish different cameras, not to describe a specific order of the cameras.
  • words such as “exemplary” or “for example” are used as examples, illustrations or illustrations. Any embodiment or design described as “exemplary” or “for example” in the embodiments of the present disclosure shall not be construed as being preferred or advantageous over other embodiments or designs. To be precise, the use of words such as “exemplary” or “for example” is intended to present related concepts in a specific manner. In addition, in the description of the embodiments of the present disclosure, unless otherwise specified, the meaning of "plurality” refers to two one or more.
  • VoIP Voice over Internet Protocol, voice transmission based on Internet Protocol
  • IP Internet Protocol
  • Other informal names for VoIP include: IP telephony, Internet telephony, broadband telephony, and broadband phone service.
  • VoIP can be used on many Internet access devices including VoIP phones, smartphones, and personal computers, to make calls and send text messages through cellular networks, Wi-Fi and other networks.
  • the basic principle of Internet telephony VoIP is: compress the voice data coding through the voice compression algorithm, and then pack the voice data according to the TCP/IP (Transmission Control Protocol/Internet Protocol, Transmission Control Protocol/Internet Protocol) standard, after The IP network sends the voice data packets to the receiving place, and then strings these voice data packets together. After decompression processing, the original voice signal is restored, so as to achieve the purpose of transmitting voice through the Internet.
  • the core and key equipment of Internet telephony VoIP is the gateway.
  • the gateway has a database, which stores the corresponding relationship between the telephone area codes of each area and the gateway address of the corresponding area.
  • the gateway can map the telephone area codes of each area to the corresponding area code through the database. gateway address.
  • FIG. 1 is a schematic diagram of a VoIP network system provided by one or more embodiments of the present disclosure.
  • the network system includes a calling terminal 110, a receiving terminal 120, a first gateway 130, a second Gateway 140, IP network 150 and PSTN/ISDN (Public Switched Telephone Network/Integrated Services Digital Network, Public Switched Telephone System/Integrated Services Digital Network) 160.
  • PSTN/ISDN Public Switched Telephone Network/Integrated Services Digital Network, Public Switched Telephone System/Integrated Services Digital Network
  • the first gateway 130 determines the gateway address of the second gateway 140 corresponding to the receiving terminal 120 according to the database storing the correspondence between the telephone area code and the gateway address of the corresponding area, and sends
  • the voice data packets are transmitted to the second gateway 140 through the IP network 150 .
  • the PSTN may be a common old telephone system, ie the telephone network commonly used in everyday life.
  • the PSTN may also be a global voice communications circuit-switched network, both commercial and government-owned.
  • ISDN is a high-speed, high-quality communication network designed for high-speed data transmission and high-quality voice communication.
  • As an all-digital network, ISDN is an ideal tool for communicating with other computer systems and other networks. That is, PSTN/ISDN 160 is a voice transmission system based on circuit switching, PSTN/ISDN 160 and IP network 150 are two different voice systems, and Internet telephone VoIP can be connected between PSTN/ISDN 160 and IP network 150 through a gateway. establish connections between.
  • the communication between the IP network 150 and the PSTN/ISDN 160 can be performed by transmitting signaling, and both the first gateway 130 and the second gateway 140 can receive signaling and send signaling.
  • the first gateway 130 can send the signaling containing the calling number corresponding to the calling terminal 110 to the PSTN/ISDN 160, and can send the signaling containing the voice data to the IP network 150
  • the PSTN/ISDN 160 can send the signaling containing the calling number corresponding to the calling terminal 110 to the PSTN/ISDN 160.
  • the signaling of the calling number is transmitted to the second gateway 140, and the IP network 150 can transmit the signaling containing voice data to the second gateway 140, and the second gateway 140 sends the identified calling number and voice data to the receiving terminal 120.
  • the receiving terminal 120 may display the calling number and play voice.
  • fraudsters can use number changing software to change the signaling containing the calling number sent by the first gateway 130 corresponding to the calling terminal 110, and change the calling number to another number, thereby Masquerade as a changed number. And fraudsters can also change the gateway address through the number changing software, which further increases the difficulty of identifying fraudulent calls through the phone number and gateway address.
  • the embodiment of the present disclosure discloses a fraudulent call identification method, device, electronic equipment and storage medium, capable of identifying a fraudulent call disguised by changing a gateway address.
  • FIG. 2 is a schematic diagram of a scene using a fraudulent call identification method provided by one or more embodiments of the present disclosure.
  • This scene may include a mobile terminal 200, where the mobile terminal 200 may include but is not limited to a mobile phone , tablet computer, wearable device, notebook computer, PC (Personal Computer, personal computer), etc.
  • the operating system of the above-mentioned mobile terminal 200 may include but not limited to Android (Android) operating system, IOS operating system, Symbian (Symbian) operating system, Black Berry (Blackberry) operating system, Windows Phone8 operating system, etc., the implementation of the present disclosure Examples are not limited.
  • the mobile terminal 200 can receive an incoming VoIP call, and output an incoming call prompt message to remind the user that there is an incoming call to be processed, and establish a call with the device that initiated the incoming call after detecting the user's answer or reject operation.
  • the mobile terminal 200 may start to execute the steps of the method for identifying fraudulent calls provided by the embodiments of the present disclosure, and the specific content of the steps is described in the following embodiments.
  • the incoming call is identified as a fraudulent call
  • the intercepting operation may include hanging up the incoming call and shielding the incoming call.
  • the ways of outputting the fraudulent call prompt information may include but not limited to voice prompts, screen display, vibration prompts, etc., which are not limited herein.
  • FIG. 3 is a schematic diagram of an interface of a mobile terminal receiving an incoming call provided by one or more embodiments of the present disclosure.
  • the display interface includes an incoming call display area 310 .
  • the button area 320, the caller ID area 310 can display the caller number corresponding to the incoming call, for example, as shown in FIG. 3, the caller ID area 310 can display 188xxxx8888. Since the caller number corresponding to the incoming call may have been saved in the mobile terminal 200 and has a corresponding note, the caller ID area 310 may also display the note corresponding to the caller number, for example, the caller ID area 310 may display "Uncle Zhang".
  • the button area 320 can display the function buttons of the incoming call to be processed when receiving an incoming call of the Internet phone VoIP, for example, the button area 320 can display the functions of "answer” and "hang up” when receiving an incoming call of the Internet phone VoIP button.
  • the button area 320 can display the function keys of the incoming call being answered when answering the incoming call of the Internet phone VoIP. For example, as shown in FIG. 3 , the button area 320 can display "hands-free", “Mute” and “Hang up” function buttons.
  • FIG. 4 is a schematic flow diagram of a fraudulent call identification method provided by one or more embodiments of the present disclosure.
  • the fraudulent call identification method can be applied to the above-mentioned mobile terminal, and the method may include the following steps:
  • Step 410 receiving an incoming call from the VoIP phone.
  • the mobile terminal receives an incoming call from the Internet phone VoIP.
  • the incoming call made by VoIP refers to an incoming call from another electronic device dialing to the mobile terminal through VoIP.
  • the mobile terminal when the mobile terminal receives an incoming call from a traditional telephone system (such as PSTN/ISDN, etc.), it can also identify the incoming call as a fraudulent call. True and false way to identify and so on.
  • the incoming call dialed by the traditional telephone system refers to the incoming call dialed by another electronic device to the mobile terminal through the traditional telephone system.
  • Step 420 according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number.
  • the mobile terminal may determine the first location information corresponding to the incoming call number through a positioning technology.
  • the positioning technology may include but not limited to positioning based on GPS (Global Positioning System, Global Positioning System), positioning based on a base station of a mobile operating network, and the like. Among them, determining the first location information corresponding to the caller number through positioning technology can comply with the legal provisions of different countries or communication companies on location services. protection of.
  • the mobile terminal can determine the corresponding number of the incoming call according to the Cell ID (cell number) positioning technology and/or AFLT (Advanced Forward Link Trilateration, based on the forward link positioning method) positioning technology and the corresponding incoming call number of the incoming call.
  • the Cell ID positioning technology uses the mobile terminal to obtain the mobile base station Cell information of the electronic device corresponding to the incoming call number at a specific time through the IP network, and obtains the current location of the user according to the mobile base station Cell information.
  • the accuracy of this positioning technology depends on the mobile base station. distribution and the size of the mobile base station coverage.
  • AFLT positioning technology is a unique technology of CDMA (Code Division Multiple Access, Code Division Multiple Access).
  • the mobile terminal monitors the pilot information of at least 3 base stations at the same time, and uses the chip delay to determine the corresponding number of the incoming call number.
  • the distance from the electronic device to the nearby base station, and finally the location information of the device corresponding to the incoming call number is calculated by triangulation, that is, the first location information.
  • the mobile terminal before it determines the first location information corresponding to the incoming call number according to the incoming call number, it can send a detection instruction to the cloud, and the detection instruction is used to instruct the cloud to detect the marking status of the incoming call number corresponding to the incoming call.
  • the mobile terminal receives the flag state sent by the cloud, if the flag state indicates that the caller number is a fraudulent phone number, then recognize that the incoming call is a fraudulent call, if the flag state indicates that the caller number is not a fraudulent phone number, then according to the corresponding caller number of the call to determine the first location information corresponding to the incoming call number.
  • the mobile terminal may be a server that sends the detection instruction carrying the caller number to the cloud
  • the cloud may be a virtual storage space in the network, which stores the marking states of multiple phone numbers.
  • the server in the cloud detects the caller number corresponding to the incoming call according to the detection instruction. If the caller number corresponding to the incoming call is found in the cloud, the marking status of the caller number corresponding to the incoming call in the cloud is sent to the mobile terminal.
  • the status can include a scam phone number, a legitimate phone number, etc.
  • the search failure information is sent to the mobile terminal, that is, the information that the incoming call number corresponding to the incoming call has not been found in the cloud.
  • the mobile terminal can judge whether the incoming call is a fraudulent call according to the marking status. If the marked state is a fraudulent phone number, the mobile terminal determines that the incoming call is a fraudulent call, if the marked state is not a fraudulent call, that is, the marked state can be a normal phone number, or it can be the search failure information, and the mobile terminal continues to execute the subsequent steps of this embodiment.
  • the step is to determine the first location information corresponding to the incoming call number according to the incoming call number.
  • Step 430 acquire the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address.
  • the mobile terminal can obtain the gateway address (ie IP address) of the gateway corresponding to the incoming call from the voice packet received by the gateway corresponding to the mobile terminal, and can determine the second location information corresponding to the gateway address according to the gateway address.
  • the corresponding relationship between the two location information can be obtained through the gateway address location service.
  • the receiving terminal 120 obtains the gateway address of the first gateway 130 through the signaling received by the second gateway 140 that includes the gateway address of the first gateway 130, and determines the call based on the gateway address of the first gateway 130. Second location information of the terminal 110.
  • Step 440 comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result.
  • the mobile terminal compares the first location information with the second location information, and identifies whether the incoming call is a fraudulent call according to the comparison result.
  • the comparison result may include but not limited to whether the distance between the first location information and the second location information exceeds the distance threshold corresponding to the first location information and the second location information, whether the first location information and the second location information are in the same
  • the comparison result indicates that the distance between the first location information and the second location information is far, it means that there is a large difference between the first location information corresponding to the caller number and the second location information corresponding to the gateway address, and there may be If the incoming call number is false or the gateway address is false and tampered, the incoming electrode is likely to be a fraudulent call, so it can be determined that the incoming call is a fraudulent call.
  • the mobile terminal after the mobile terminal identifies whether the incoming call is a fraudulent call according to the comparison result, if it cannot be determined that the incoming call is a fraudulent call according to the comparison, it automatically calls back the calling number. If the calling number is not connected after calling back, the incoming call is identified as a fraudulent call, and if the incoming call is connected after the calling number is dialed back, it is determined that the incoming call is not a fraudulent call.
  • the mobile terminal can automatically call back the calling number through parallel calling back, and can also automatically call back the calling number through serial calling back.
  • the parallel callback method requires that the mobile terminal has two calling cards.
  • the mobile terminal can automatically call back the calling number through the other calling card.
  • the speed of identifying fraudulent calls protects the security of user information.
  • the serial callback method after the mobile terminal has answered the incoming call and the call is over, the mobile terminal will automatically call back the incoming call number.
  • the automatic callback mechanism can be used to determine whether the incoming call number is a real number to identify fraudulent calls, which further improves the accuracy of identifying fraudulent calls.
  • Step 450 if it is determined that the incoming call is a fraudulent incoming call, intercepting the incoming call.
  • the mobile terminal determines that the incoming call is a fraudulent incoming call, it will intercept the incoming call.
  • any step in the fraudulent call identification method performed by the mobile terminal recognizes that the incoming call is a fraudulent call, and the incoming call can be intercepted, and the subsequent steps of the fraudulent call identification method are terminated, and the mobile terminal has obtained the result of the fraudulent call identification method. , can reduce unnecessary steps.
  • the mobile terminal determines that the incoming call is a fraudulent call, it hangs up the incoming call, screens the incoming call, and sends a marking instruction to the cloud, which is used to instruct the cloud to mark the incoming call number as a fraudulent phone number.
  • the mobile terminal determines that the incoming call is a fraudulent call, it can hang up the incoming call and block the incoming call, and can also send a marking instruction to the server in the cloud, and the server in the cloud will mark the marking state of the incoming number in the cloud as a fraudulent phone number according to the marking instruction.
  • the server in the cloud will mark the marking state of the incoming number in the cloud as a fraudulent phone number according to the marking instruction.
  • the server in the cloud will mark the marking state of the incoming number in the cloud as a fraudulent phone number according to the marking instruction.
  • the mobile terminal after the mobile terminal receives an incoming call from the Internet phone VoIP, it determines the first location information corresponding to the incoming call number according to the incoming call number, obtains the gateway address of the incoming call, and determines the corresponding location information according to the gateway address.
  • the second location information corresponding to the gateway address the mobile terminal compares the first location information with the second location information, and can improve the accuracy of identifying fraudulent calls by comparing the location information corresponding to the caller number with the location information corresponding to the gateway address , and after the incoming call is determined to be a fraudulent call, the incoming call is intercepted to reduce the possibility of the user being defrauded and ensure the user's information security.
  • FIG. 5 is a schematic flowchart of another method for identifying fraudulent calls provided by one or more embodiments of the present disclosure.
  • the method for identifying fraudulent calls may include the following steps:
  • Step 510 receiving an incoming call from the VoIP phone.
  • Step 510 is the same as the above-mentioned step 410, and the present disclosure will not repeat it here.
  • Step 520 according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number; the first location information includes the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment.
  • the mobile terminal determines the historical moment at which the first historical location information needs to be obtained, and according to the incoming call number corresponding to the incoming call, the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment can be determined through positioning technology.
  • the first historical location The information includes location information corresponding to the electronic device corresponding to the caller number at one or more historical moments, and the first real-time location information includes location information corresponding to the device corresponding to the caller number when receiving the call.
  • the manner of obtaining the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment may be the same as the manner of obtaining the first location information in the above embodiment.
  • Step 530 obtain the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address; the second location information includes the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment.
  • the mobile terminal obtains the gateway address of the gateway corresponding to the incoming call from the voice data packet received by the gateway corresponding to the mobile terminal, and determines the historical moment at which the second historical location information needs to be obtained, and then determines the second historical location information corresponding to the historical moment according to the gateway address.
  • the second historical location information includes the location information corresponding to the gateway address at one or more historical moments
  • the second real-time location information includes the corresponding location of the gateway address when receiving an incoming call. location information.
  • the corresponding relationship between the gateway address and the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment can be obtained through the gateway address location service.
  • the manner of obtaining the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment may be the same as the manner of obtaining the second location information in the above embodiment.
  • Step 540 Compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; compare the first real-time location information corresponding to the current moment with the second real-time location information corresponding to the current moment The location information is compared to obtain a second comparison result.
  • the mobile terminal may compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment, and the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment are respectively the same historical moment
  • the location information corresponding to the call number and the location information corresponding to the gateway address are compared to obtain a first comparison result.
  • the first comparison result may include, but not limited to, the distance between the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment, the distance between the first historical location information corresponding to the historical moment and the historical The administrative district corresponding to the second historical location information corresponding to the time, whether the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment are in any of the areas where fraudulent calls are frequently used are not limited here.
  • the mobile terminal may compare the first real-time location information corresponding to the current moment with the second real-time location information corresponding to the current moment, and obtain a second comparison result after the comparison.
  • the second comparison result may include, but not limited to, the distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment.
  • the first real-time location information corresponding to the current moment and the current moment The administrative district corresponding to the second real-time location information, whether the first real-time location information corresponding to the current moment, and the second real-time location information corresponding to the current moment are in areas commonly used for fraudulent calls are not limited here.
  • Step 550 identifying whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result.
  • the mobile terminal can identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result.
  • the mobile terminal may identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result, for example, when the mobile terminal identifies the incoming call as a fraudulent call according to the first comparison result, and identifies the incoming call as Only when a fraudulent call is received, can the incoming call be determined as a fraudulent call.
  • the mobile terminal can also identify whether the incoming call is a fraudulent call according to the first comparison result or the second comparison result. , it can be determined that the incoming call is a fraudulent incoming call.
  • the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the first historical location information corresponding to the incoming call number at the second historical moment, wherein the first historical moment is earlier than For the second historical moment, for example, the first historical moment may be 60 minutes ago, and the second historical moment may be 5 minutes ago.
  • the second historical location information at least includes second historical location information corresponding to the gateway address at the first historical moment and second historical location information corresponding to the gateway address at the second historical moment.
  • the historical moment corresponding to the second historical location information is the same as the historical moment corresponding to the first historical location information.
  • the first comparison result may include the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the first historical location information corresponding to the second historical moment and the second The second distance between the second historical location information corresponding to the historical moment, and the second comparison result may include a third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment.
  • the step of identifying whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result includes: if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold, Then it is determined that the incoming call is a fraudulent incoming call; if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then it is determined that the incoming call is not a fraudulent incoming call; wherein, The third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
  • the first distance threshold corresponds to the first historical moment
  • the second distance threshold corresponds to the second history
  • the third distance threshold corresponds to the current moment.
  • the first distance threshold can be 1000 kilometers, corresponding to the moment 60 minutes ago
  • the second distance threshold can be 50 kilometers, corresponding to the moment 5 minutes ago
  • the third distance threshold can be 5 kilometers, corresponding to the current moment Corresponding.
  • the distance threshold may have a proportional relationship with the historical moment, and the longer the distance from the current moment, the greater the distance threshold.
  • the mobile terminal can respectively calculate the above-mentioned first distance, second distance and third distance, and respectively compare the first distance with the first distance threshold, and compare the second distance with the second distance threshold . Comparing the third distance with the third distance threshold, if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold, then it can be determined that the incoming call is a fraudulent call .
  • the mobile terminal may also serially process the first distance, the second distance, and the third distance to identify whether the incoming call is a fraudulent call.
  • the above-mentioned first distance can be calculated first, and it can be judged whether the first distance is greater than the first distance threshold.
  • the first distance is greater than the first distance threshold, it can be directly determined that the incoming call is a fraudulent call, and the above-mentioned second distance and the third distance; if the first distance is not greater than the first distance threshold, then calculate the above-mentioned second distance, and judge whether the second distance is greater than the second distance threshold, if the second distance is greater than the second distance threshold, you can directly Determine that the incoming call is a fraudulent call, and no longer calculate the above-mentioned third distance; if the second distance is not greater than the second distance threshold, then calculate the above-mentioned third distance, and determine whether the third distance is greater than the third distance threshold, if the third If the distance is greater than the third distance threshold, it can be determined that the incoming call is a fraudulent call, and if the third distance is not greater than the third distance threshold, then it can be determined that the incoming call is not a fraudulent call. Through the method of serial comparison and judgment, the amount of calculation can be reduced and the recognition efficiency can be improved.
  • the comparison between the first distance threshold and the first distance there is no sequential relationship between the comparison between the first distance threshold and the first distance, the comparison between the second distance threshold and the second distance, and the comparison between the third distance threshold and the third distance.
  • the comparison of the first distance only needs to be performed after calculating the first distance
  • the comparison of the second distance threshold and the second distance only needs to be performed after calculating the second distance
  • the comparison of the third distance threshold and the third distance only needs to be performed after Carry out after calculating the third distance.
  • the mobile terminal when the mobile terminal determines that the incoming call is a fraudulent incoming call through one of the comparisons, it can intercept the incoming call.
  • the mobile terminal can also compare the first historical location information and the second historical location information that are not at the same historical moment, but it is necessary to calculate the historical location information of the mobile terminal between different historical moments when comparing. possible displacement within the time difference, and add the displacement to the distance threshold corresponding to the first historical location information or the second historical location information.
  • the historical moment corresponding to the first historical location information is earlier than the historical moment corresponding to the second historical location information, then calculate the time difference between the historical moment corresponding to the first historical location information and the historical moment corresponding to the second historical location information, And the possible displacement within the time difference is added to the distance threshold corresponding to the first historical location information. If the historical moment corresponding to the first historical location information is later than the historical moment corresponding to the second historical location information, then calculate the time difference between the historical moment corresponding to the first historical location information and the historical moment corresponding to the second historical location information, And the possible displacement within the time difference is added to the distance threshold corresponding to the second historical location information.
  • the first historical location information is the location information corresponding to the incoming call number 60 minutes ago
  • the second historical location information is the location information corresponding to the gateway address 50 minutes ago, that is, the historical moment corresponding to the first historical location information and the second
  • the time difference of the historical moment corresponding to the historical location information is 10 minutes
  • the possible displacement of the mobile terminal within 10 minutes is 200 kilometers
  • the historical moment corresponding to the first historical location information is 60 minutes ago
  • the first historical location information corresponds to
  • the distance threshold is 1000 kilometers
  • the distance threshold can be calculated to be 1200 kilometers.
  • the mobile terminal compares the distance between the first historical location information and the second historical location information with 1200 kilometers to obtain a comparison result.
  • the mobile terminal may compare the real-time location information corresponding to the calling number with the real-time location information corresponding to the gateway address at a certain frequency during the call. That is, the mobile terminal can not only compare the first real-time location information with the second real-time location information when a call is received, but also keep the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address during the subsequent call. Monitoring, obtaining the distance between the real-time location information corresponding to the incoming call number and the real-time location information corresponding to the gateway address at a certain frequency, and then comparing the distance with the third distance threshold.
  • the mobile terminal can acquire the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address every 1 minute, and calculate the difference between the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address. and compare that distance to 5 km.
  • Step 560 if it is determined that the incoming call is a fraudulent incoming call, intercept the incoming call.
  • Step 560 is the same as the above-mentioned step 450, and the present disclosure will not repeat it here.
  • the mobile terminal can obtain the first historical location information and the first real-time location information, and can obtain the second historical location information and the second real-time location information, and combine the first historical location information and the second historical location information Comparing the location information to obtain the first comparison result, and comparing the first real-time location information and the second real-time location information to obtain the second comparison result, and determining whether the incoming call is a fraudulent call according to the first comparison result or the second comparison result, not only for Compare the real-time location corresponding to the caller number with the real-time location corresponding to the gateway address, and compare the historical location corresponding to the caller number with the historical location corresponding to the gateway address to avoid fraudulent calls by changing the real-time gateway address for fraud, which can be compared multiple times Identify fraudulent calls and increase the likelihood of identifying fraudulent calls.
  • FIG. 6 is a schematic flowchart of another method for identifying a fraudulent call provided by one or more embodiments of the present disclosure.
  • the method for identifying a fraudulent call may include the following steps:
  • Step 602 receiving an incoming call from the Internet phone VoIP.
  • Step 604 Send a detection instruction to the cloud, and receive the flag state corresponding to the incoming call number sent by the cloud according to the detection instruction, judge whether the incoming call number is a fraudulent call according to the flag state, if so, execute step 606, if not, execute step 604 618.
  • Step 606 according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number; the first location information includes the first historical location information corresponding to the incoming call number at the first historical moment, the first historical location information corresponding to the incoming call number at the second historical moment A historical location information and the first real-time location information corresponding to the calling number at the current moment.
  • Step 608 obtain the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address; the second location information includes the second historical location information corresponding to the gateway address at the first historical moment, the gateway address at the second The second historical location information corresponding to the historical moment and the second real-time location information corresponding to the gateway address at the current moment.
  • Step 610 calculate the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, and determine whether the first distance is greater than the first distance threshold, and if so, execute Step 618, if not, go to step 612.
  • Step 612 calculate the second distance between the first historical location information corresponding to the second historical moment and the second historical location information corresponding to the second historical moment, and judge whether the second distance is greater than the second distance threshold, and if so, execute Step 618, if not, go to step 614.
  • Step 614 calculate the third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment, and judge whether the third distance is greater than the third distance threshold, if so, execute step 618, if If not, go to step 616.
  • Step 616 automatically call back the caller number, and judge whether it can be connected, if yes, execute step 618, if not, execute step 620.
  • the mobile terminal compares the locations of incoming calls at multiple historical moments, which can prevent fraudulent calls from being faked by changing the gateway address at one time, especially for the real-time location, to prevent fraudulent calls from being faked.
  • Location spoofing, and the presence of cloud-based detection and automatic callback mechanisms, can increase the likelihood of identifying a fraudulent call.
  • steps in the flow charts of FIGS. 4-6 are shown sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in Figures 4-6 may include a plurality of sub-steps or stages, these sub-steps or stages are not necessarily performed at the same time, but may be performed at different times, these sub-steps or stages The order of execution is not necessarily performed sequentially, but may be performed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.
  • the embodiment of the present disclosure also provides a device for identifying fraudulent calls.
  • the embodiment of the device corresponds to the embodiment of the method described above. Details in the embodiments are described one by one, but it should be clear that the device in this embodiment can correspondingly implement all the content in the foregoing method embodiments.
  • Fig. 7 is a modular schematic diagram of a fraudulent call identification device provided by one or more embodiments of the present disclosure. As shown in the figure, the fraudulent call identification device 700 provided in this embodiment includes:
  • Receiving module 710 the receiving module 710 is configured as a module that receives incoming calls dialed out by Internet phone VoIP;
  • the first location determination module 720 is configured to configure the first location determination module 720 as a module for determining the first location information corresponding to the incoming call number according to the incoming call number;
  • the second location determining module 730 is configured to configure the second location determining module 730 as a module for obtaining the gateway address corresponding to the incoming call, and determining the second location location information corresponding to the gateway address according to the gateway address;
  • the comparison module 740 configuring the comparison module 740 as a module that compares the first location information with the second location information, and identifies whether the incoming call is a fraudulent call according to the comparison result;
  • the interception module 750 is configured to intercept the incoming call if it is determined that the incoming call is a fraudulent call.
  • the first location information includes the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment
  • the second location information includes the second historical location information corresponding to the historical moment location information and second real-time location information corresponding to the current moment
  • the comparison module 740 is also configured to compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; Comparing the first real-time location information with the second real-time location information corresponding to the current moment to obtain a second comparison result; and a module configured to identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result.
  • the first historical location information includes at least the first historical location information corresponding to the calling number at the first historical moment, and the first historical location information corresponding to the calling number at the second historical moment
  • the second historical location information includes at least second historical location information corresponding to the gateway address at the first historical moment, and second historical location information corresponding to the gateway address at the second historical moment; the first historical moment is earlier than the second historical moment;
  • the first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the first historical location information corresponding to the second historical moment and the second A second distance between the second historical location information corresponding to the historical moment;
  • the second comparison result includes: a third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment;
  • the comparison module 740 is further configured to determine that the incoming call is a fraudulent call if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold; And, if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then determine that the incoming call is not a fraudulent call module; wherein, the first The third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
  • the fraudulent call identification device 700 also includes a callback module, which is configured to automatically call back the incoming call number if it cannot be determined that the incoming call is a fraudulent call according to the comparison result; And, a module configured to recognize that the incoming call is a fraudulent call if it is not connected after calling back the calling number; and a module configured to identify that the incoming call is not a fraudulent call if it is connected after calling back the calling number.
  • a callback module which is configured to automatically call back the incoming call number if it cannot be determined that the incoming call is a fraudulent call according to the comparison result.
  • a module configured to recognize that the incoming call is a fraudulent call if it is not connected after calling back the calling number
  • a module configured to identify that the incoming call is not a fraudulent call if it is connected after calling back the calling number.
  • the fraudulent call identification device 700 also includes a cloud detection module, and the cloud detection module is configured to send a detection instruction to the cloud module, and the detection instruction is used to instruct the cloud to detect the corresponding incoming call number and a module configured to receive the tag status sent by the cloud; and a module configured to identify the incoming call as a fraudulent call if the tag status indicates that the incoming call number is a fraudulent phone number;
  • the first location determining module 720 is also configured as a module for determining the first location information corresponding to the calling number according to the calling number corresponding to the incoming call if the marking status indicates that the calling number is not a fraudulent phone number.
  • the first location determination module 720 is further configured to configure the first location determination module 720 to use the Cell ID positioning technology and/or the AFLT positioning technology and the corresponding incoming call number of the incoming call, A module for determining the first location information corresponding to the caller number.
  • the interception module 750 is also configured to hang up the incoming call and block the incoming call if it is determined that the incoming call is a fraudulent incoming call, and send a marking instruction to the module in the cloud, marking the instruction Used to instruct the cloud to mark the incoming caller number as a fraudulent phone number.
  • the device for identifying fraudulent calls provided in this embodiment can execute the method for identifying fraudulent calls provided in the above method embodiment, and its implementation principle and technical effect are similar, and will not be repeated here.
  • Each module in the above-mentioned device for identifying fraudulent calls can be realized in whole or in part by software, hardware and combinations thereof.
  • the above-mentioned modules can be embedded in or independent of the processor in the electronic device in the form of hardware, and can also be stored in the memory of the electronic device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.
  • an electronic device is provided, and the electronic device may be a terminal device, as shown in FIG. 8 , which is a structural block diagram of an electronic device provided by one or more embodiments of the present disclosure.
  • the electronic device includes a processor, a memory, a communication interface, a database, a display screen and an input device connected by a system bus.
  • the processor of the electronic device is configured as a module providing calculation and control capabilities.
  • the memory of the electronic device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system and computer readable instructions.
  • the internal memory provides an environment for the execution of the operating system and computer readable instructions in the non-volatile storage medium.
  • the communication interface of the electronic device is configured as a wired or wireless communication module with an external terminal, and the wireless mode can be realized through WIFI, operator network, near field communication (NFC) or other technologies.
  • the computer-readable instructions are executed by the processor, the method for identifying fraudulent calls provided by the above-mentioned embodiments can be realized.
  • the display screen of the electronic device may be a liquid crystal display screen or an electronic ink display screen, and the input device of the electronic device may be a touch layer covered on the display screen, or a button, a trackball or a touch pad provided on the housing of the electronic device , and can also be an external keyboard, touchpad or mouse.
  • FIG. 8 is only a block diagram of a partial structure related to the disclosed solution, and does not constitute a limitation on the electronic device to which the disclosed solution is applied.
  • the specific electronic device can be More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.
  • the device for identifying fraudulent calls provided in the present disclosure can be implemented in the form of computer-readable instructions, and the computer-readable instructions can be run on the electronic device as shown in FIG. 8 .
  • Each program module constituting the electronic device can be stored in the memory of the electronic device.
  • the computer-readable instructions constituted by the various program modules enable the processor to execute the steps in the methods for identifying fraudulent calls in various embodiments of the present disclosure described in this specification.
  • an electronic device including a memory 810 and one or more processors 820, the memory 810 is configured as a module storing computer-readable instructions; the computer-readable instructions are processed by the When executed by the processor 820, one or more processors 820 execute the steps of the fraudulent call identification method described in the method embodiment above.
  • the electronic device provided in this embodiment can implement the fraudulent call identification method provided in the above method embodiment, and its implementation principle and technical effect are similar, and will not be repeated here.
  • One or more non-volatile storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, one or more processors perform the fraudulent call identification described in any one of the above method steps.
  • the computer-readable instructions stored on the computer-readable storage medium provided by this embodiment can implement the fraudulent call identification method provided by the above-mentioned method embodiment, and its implementation principle is similar to the technical effect, and will not be repeated here.
  • Non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory or optical memory, etc.
  • Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory.
  • RAM Random Access Memory
  • SRAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • the method for identifying fraudulent calls provided by the present disclosure can effectively improve the accuracy of identifying fraudulent calls by comparing the location information corresponding to the caller number and the location information corresponding to the gateway address, and intercept the incoming calls after determining that the incoming calls are fraudulent calls Operation, effectively reducing the possibility of users being defrauded, ensuring user information security, has strong industrial applicability.

Abstract

Provided in the embodiments of the present disclosure are a fraudulent incoming call identification method and apparatus, and an electronic device and a storage medium. The method comprises: receiving an incoming call which is dialed by means of a voice over Internet protocol (VoIP); according to an incoming call number corresponding to the incoming call, determining first location information corresponding to the incoming call number; acquiring a gateway address corresponding to the incoming call, and determining, according to the gateway address, second location information corresponding to the gateway address; comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent incoming call according to a comparison result; and if it is determined that the incoming call is a fraudulent incoming call, performing an interception operation on the incoming call. By means of implementing the embodiments of the present disclosure, the accuracy of identifying a fraudulent incoming call can be improved, thereby ensuring information security of a user.

Description

诈骗来电识别方法、装置、电子设备和存储介质Fraud call identification method, device, electronic device and storage medium
相关交叉引用related cross reference
本公开要求于2022年2月10日提交中国专利局、申请号为202210124437.0、发明名称为“诈骗来电识别方法、装置、电子设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。This disclosure claims the priority of the Chinese patent application with the application number 202210124437.0 and the title of the invention "Fraud Call Identification Method, Device, Electronic Equipment and Storage Medium" submitted to the China Patent Office on February 10, 2022, the entire contents of which are incorporated by reference incorporated in this disclosure.
技术领域technical field
本公开涉及诈骗来电识别方法、装置、电子设备和存储介质。The present disclosure relates to a fraudulent call identification method, device, electronic equipment and storage medium.
背景技术Background technique
目前,全国诈骗电话的成功率约为0.1%,犯罪分子平均每拨打约1000次诈骗电话,就会有一次接近成功,犯罪分子用一个电话号码在几天之内就能成功诈骗一次。在犯罪分子使用电话号码进行诈骗时,犯罪分子通常会通过改号软件对电话号码进行更改,导致对诈骗来电的追踪困难,无法准确识别来电是否为诈骗来电。At present, the success rate of fraudulent calls nationwide is about 0.1%. On average, for every 1,000 fraudulent calls made by criminals, one will be close to success. Criminals can successfully defraud once with a single phone number within a few days. When criminals use phone numbers to swindle, criminals usually use number changing software to change the phone number, which makes it difficult to track fraudulent calls and accurately identify whether the incoming calls are fraudulent.
发明内容Contents of the invention
(一)要解决的技术问题(1) Technical problems to be solved
在犯罪分子使用电话号码进行诈骗时,犯罪分子通常会通过改号软件对电话号码进行更改,导致对诈骗来电的追踪困难,无法准确识别来电是否为诈骗来电。When criminals use phone numbers to swindle, criminals usually use number changing software to change the phone number, which makes it difficult to track fraudulent calls and accurately identify whether the incoming calls are fraudulent.
(二)技术方案(2) Technical solution
根据本公开公开的各种实施例,提供一种诈骗来电识别方法、装置、电子设备和存储介质。According to various embodiments of the present disclosure, a fraudulent call identification method, device, electronic device and storage medium are provided.
一种诈骗来电识别方法,所述方法包括:A method for identifying fraudulent calls, the method comprising:
接收由网络电话VoIP拨出的来电;Receive incoming calls from VoIP;
根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息;determining the first location information corresponding to the incoming call number according to the incoming call number;
获取所述来电对应的网关地址,并根据所述网关地址确定与所述网关地址对应的第二位置信息;Obtaining a gateway address corresponding to the incoming call, and determining second location information corresponding to the gateway address according to the gateway address;
将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电;comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result;
若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作。If it is determined that the incoming call is the fraudulent incoming call, an interception operation is performed on the incoming call.
作为本公开实施例一种可选的实施方式,所述第一位置信息包括历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息,所述第二位置信息包括所述历史时刻对应的第二历史位置信息及所述当前时刻对应的第二实时位置信息;As an optional implementation of this embodiment of the present disclosure, the first location information includes first historical location information corresponding to historical moments and first real-time location information corresponding to current moments, and the second location information includes the historical The second historical location information corresponding to the moment and the second real-time location information corresponding to the current moment;
所述将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电,包括:将所述历史时刻对应的第一历史位置信息与所述历史时刻对应的第二历史位置信息进行比较,得到第一比较结果;将所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息进行比较,得到第二比较结果;根据所述第一比较结果及所述第二比较结果识别所述来电是否为所述诈骗来电。The comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result includes: comparing the first historical location information corresponding to the historical moment with the historical Comparing the second historical position information corresponding to the time to obtain a first comparison result; comparing the first real-time position information corresponding to the current time with the second real-time position information corresponding to the current time to obtain a second comparison result; Identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result.
作为本公开实施例一种可选的实施方式,所述第一历史位置信息至少包括所述来电号码在第一历史时刻对应的第一历史位置信息、所述来电号码在第二历史时刻对应的第一历史位置信息,所述第二历史位置信息至少包括所述网关地址在所述第一历史时刻对应的第二历史位置信息、所述网关地址在所述第二历史时刻对应的第二历史位置信息;所述第一 历史时刻早于所述第二历史时刻;As an optional implementation manner of this embodiment of the present disclosure, the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the historical location information corresponding to the incoming call number at the second historical moment. The first historical location information, the second historical location information includes at least the second historical location information corresponding to the gateway address at the first historical moment, the second historical location information corresponding to the gateway address at the second historical moment location information; the first historical moment is earlier than the second historical moment;
所述第一比较结果包括:所述第一历史时刻对应的第一历史位置信息与所述第一历史时刻对应的第二历史位置信息之间的第一距离、所述第二历史时刻对应的第一历史位置信息与所述第二历史时刻对应的第二历史位置信息之间的第二距离;所述第二比较结果包括:所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息之间的第三距离;The first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
所述根据所述第一比较结果及所述第二比较结果识别所述来电是否为所述诈骗来电,包括:若所述第一距离大于第一距离阈值,或所述第二距离大于第二距离阈值,或所述第三距离大于第三距离阈值,则确定所述来电为所述诈骗来电;若所述第一距离不大于所述第一距离阈值,且所述第二距离不大于第二距离阈值,且所述第三距离不大于第三距离阈值,则确定所述来电不为所述诈骗来电;其中,所述第三距离阈值小于所述第二距离阈值,所述第二距离阈值小于所述第一距离阈值。The identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result includes: if the first distance is greater than a first distance threshold, or if the second distance is greater than a second distance threshold, or the third distance is greater than the third distance threshold, then it is determined that the incoming call is the fraudulent incoming call; if the first distance is not greater than the first distance threshold, and the second distance is not greater than the first two distance thresholds, and the third distance is not greater than the third distance threshold, then it is determined that the incoming call is not the fraudulent incoming call; wherein, the third distance threshold is smaller than the second distance threshold, and the second distance The threshold is less than the first distance threshold.
作为本公开实施例一种可选的实施方式,所述方法还包括:若根据所述比较结果不能确定所述来电为所述诈骗来电,则自动回拨所述来电号码;若回拨所述来电号码后没有被接通,则识别到所述来电为所述诈骗来电;若回拨所述来电号码后被接通,则识别到所述来电不为所述诈骗来电。As an optional implementation of this embodiment of the present disclosure, the method further includes: if it cannot be determined that the incoming call is the fraudulent call according to the comparison result, automatically calling back the calling number; If the caller number is not connected, then the caller is identified as the fraudulent call; if the caller number is dialed back and the caller is connected, it is recognized that the caller is not the fraudulent caller.
作为本公开实施例一种可选的实施方式,所述方法还包括:发送检测指令到云端,所述检测指令用于指示所述云端检测所述来电对应的来电号码的标记状态;接收所述云端发送的所述标记状态;若所述标记状态指示所述来电号码为诈骗电话号码,则识别到所述来电为诈骗来电;As an optional implementation of this embodiment of the present disclosure, the method further includes: sending a detection instruction to the cloud, where the detection instruction is used to instruct the cloud to detect the marking state of the caller number corresponding to the incoming call; receiving the The flag state sent by the cloud; if the flag state indicates that the incoming call number is a fraudulent phone number, then it is recognized that the incoming call is a fraudulent call;
所述根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息,包括:若所述标记状态指示所述来电号码不为所述诈骗电话号码,则根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息。The determining the first location information corresponding to the incoming call number according to the incoming call number includes: if the marking state indicates that the incoming call number is not the fraudulent phone number, then according to the incoming call corresponding The incoming call number is used to determine the first location information corresponding to the incoming call number.
作为本公开实施例一种可选的实施方式,所述根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息,包括:As an optional implementation manner of an embodiment of the present disclosure, the determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call includes:
根据Cell ID定位技术和/或AFLT定位技术以及所述来电对应的来电号码,确定所述来电号码对应的第一位置信息。According to the Cell ID positioning technology and/or AFLT positioning technology and the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number.
作为本公开实施例一种可选的实施方式,所述若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作,包括:As an optional implementation manner of this embodiment of the present disclosure, if it is determined that the incoming call is the fraudulent incoming call, performing an interception operation on the incoming call includes:
若确定所述来电为所述诈骗来电,则挂断所述来电以及屏蔽所述来电,并发送标记指令到云端,所述标记指令用于指示所述云端将所述来电号码标记为诈骗电话号码。If it is determined that the incoming call is the fraudulent call, hang up the incoming call and shield the incoming call, and send a marking instruction to the cloud, the marking instruction is used to instruct the cloud to mark the incoming call number as a fraudulent phone number .
一种诈骗来电识别装置,包括:A device for identifying fraudulent calls, comprising:
接收模块,将所述接收模块配置成接收由网络电话VoIP拨出的来电的模块;A receiving module, the receiving module is configured as a module for receiving incoming calls dialed out by VoIP;
第一位置确定模块,将所述第一位置确定模块配置成根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块;A first location determination module, configuring the first location determination module as a module for determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call;
第二位置确定模块,将所述第二位置确定模块配置成获取所述来电对应的网关地址,并根据所述网关地址确定与所述网关地址对应的第二位置位置信息的模块;A second location determination module, configuring the second location determination module as a module for obtaining the gateway address corresponding to the incoming call, and determining the second location location information corresponding to the gateway address according to the gateway address;
比较模块,将所述比较模块配置成将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电的模块;A comparison module, configured to compare the first location information with the second location information, and identify whether the incoming call is a fraudulent call according to the comparison result;
拦截模块,将所述拦截模块配置成若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作的模块。An interception module, configured to intercept the incoming call if it is determined that the incoming call is the fraudulent call.
作为本公开实施例一种可选的实施方式,所述第一位置信息包括历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息,所述第二位置信息包括所述历史时刻对应的第二历史位置信息及所述当前时刻对应的第二实时位置信息;As an optional implementation of this embodiment of the present disclosure, the first location information includes first historical location information corresponding to historical moments and first real-time location information corresponding to current moments, and the second location information includes the historical The second historical location information corresponding to the moment and the second real-time location information corresponding to the current moment;
所述比较模块,还将所述比较模块配置成将历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息进行比较,得到第一比较结果的模块;以及,配置成将当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息进行比较,得到第二比较结果的模块;以及,配置成根据第一比较结果及第二比较结果识别来电是否为诈骗来电的模块。The comparison module is also configured to compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; and, configured to compare the current Comparing the first real-time location information corresponding to the moment with the second real-time location information corresponding to the current moment to obtain a second comparison result; and, configured to identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result module.
作为本公开实施例一种可选的实施方式,所述第一历史位置信息至少包括所述来电号码在第一历史时刻对应的第一历史位置信息、所述来电号码在第二历史时刻对应的第一历史位置信息,所述第二历史位置信息至少包括所述网关地址在所述第一历史时刻对应的第二历史位置信息、所述网关地址在所述第二历史时刻对应的第二历史位置信息;所述第一历史时刻早于所述第二历史时刻;As an optional implementation manner of this embodiment of the present disclosure, the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the historical location information corresponding to the incoming call number at the second historical moment. The first historical location information, the second historical location information includes at least the second historical location information corresponding to the gateway address at the first historical moment, the second historical location information corresponding to the gateway address at the second historical moment location information; the first historical moment is earlier than the second historical moment;
所述第一比较结果包括:所述第一历史时刻对应的第一历史位置信息与所述第一历史时刻对应的第二历史位置信息之间的第一距离、所述第二历史时刻对应的第一历史位置信息与所述第二历史时刻对应的第二历史位置信息之间的第二距离;所述第二比较结果包括:所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息之间的第三距离;The first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
所述比较模块,还将所述比较模块配置成若第一距离大于第一距离阈值,或第二距离大于第二距离阈值,或第三距离大于第三距离阈值,则确定来电为诈骗来电的模块;以及,配置成若第一距离不大于第一距离阈值,且第二距离不大于第二距离阈值,且第三距离不大于第三距离阈值,则确定来电不为诈骗来电的模块;其中,第三距离阈值小于第二距离阈值,第二距离阈值小于第一距离阈值。The comparison module is further configured to determine that the incoming call is a fraudulent call if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold module; and, if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then determine that the incoming call is not a fraudulent incoming call; wherein , the third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
作为本公开实施例一种可选的实施方式,所述诈骗来电识别装置还包括回拨模块,将所述回拨模块配置成若根据比较结果不能确定来电为诈骗来电,则自动回拨来电号码的模块;以及,配置成若回拨来电号码后没有被接通,则识别到来电为诈骗来电的模块;以及,配置成若回拨来电号码后被接通,则识别到来电不为诈骗来电的模块。As an optional implementation of the embodiment of the present disclosure, the device for identifying fraudulent calls further includes a callback module, and the callback module is configured to automatically call back the number of the incoming call if it cannot be determined that the incoming call is a fraudulent call according to the comparison result. and a module configured to recognize that the incoming call is a fraudulent call if it is not connected after calling back the calling number; and configured to recognize that the incoming call is not a fraudulent call if it is connected after calling back the calling number module.
作为本公开实施例一种可选的实施方式,所述诈骗来电识别装置还包括云端检测模块,将所述云端检测模块配置成发送检测指令到云端的模块,所述检测指令用于指示所述云端检测所述来电对应的来电号码的标记状态;以及,配置成接收所述云端发送的所述标记状态的模块;以及,配置成若所述标记状态指示所述来电号码为诈骗电话号码,则识别到所述来电为诈骗来电的模块;As an optional implementation of the embodiment of the present disclosure, the device for identifying fraudulent calls further includes a cloud detection module, and the cloud detection module is configured to send a detection instruction to the cloud module, and the detection instruction is used to instruct the The cloud detects the marking status of the incoming call number corresponding to the incoming call; and, a module configured to receive the marking status sent by the cloud; and, if the marking status indicates that the calling number is a fraudulent phone number, then A module that recognizes that the incoming call is a fraudulent incoming call;
所述第一位置确定模块,还将第一位置确定模块配置成若所述标记状态指示所述来电号码不为所述诈骗电话号码,则根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块。The first location determination module is further configured to determine the caller number according to the caller number corresponding to the incoming call if the flag state indicates that the caller number is not the fraud phone number A module corresponding to the first location information.
作为本公开实施例一种可选的实施方式,所述第一位置确定模块,还将第一位置确定模块配置成根据Cell ID定位技术和/或AFLT定位技术以及所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块。As an optional implementation manner of the embodiment of the present disclosure, the first position determining module further configures the first position determining module to use the Cell ID positioning technology and/or the AFLT positioning technology and the corresponding incoming call number of the incoming call, A module for determining the first location information corresponding to the caller number.
作为本公开实施例一种可选的实施方式,所述拦截模块,还将拦截模块配置成若确定来电为诈骗来电,则挂断来电以及屏蔽来电,并发送标记指令到云端的模块,标记指令用于指示云端将来电号码标记为诈骗电话号码。As an optional implementation of the embodiment of the present disclosure, the interception module is further configured to hang up the incoming call and screen the incoming call if it is determined that the incoming call is a fraudulent incoming call, and send a marking instruction to the module in the cloud, marking the instruction Used to instruct the cloud to mark the incoming caller number as a fraudulent phone number.
一种电子设备,包括存储器和一个或多个处理器,将所述存储器配置成存储计算机可读指令的模块;所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行上述任一项所述的诈骗来电识别方法的步骤。An electronic device comprising a memory and one or more processors, the memory is configured as a module storing computer-readable instructions; when the computer-readable instructions are executed by the processor, the one or more The processor executes the steps of the fraudulent call identification method described in any one of the above.
一个或多个存储有计算机可读指令的非易失性存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述任一项所述的诈骗来电识别方法的步骤。One or more non-volatile storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, one or more processors perform the fraudulent call identification described in any one of the above method steps.
本公开的其他特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本公开而了解。本公开的目的和其他优点在说明书、权利要求书以及附图中所特别指出的结构来实现和获得,本公开的一个或多个实施例的细节在下面的附图和描述中提出。Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the disclosure. The objectives and other advantages of the disclosure will be realized and attained by the structure particularly pointed out in the written description, claims hereof as well as the accompanying drawings, the details of one or more embodiments of the disclosure being set forth in the accompanying drawings and the description below.
为使本公开的上述目的、特征和优点能更明显易懂,下文特举可选实施例,并配合所附附图,作详细说明如下。In order to make the above objects, features and advantages of the present disclosure more comprehensible, optional embodiments are given below and described in detail in conjunction with the accompanying drawings.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用来解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description serve to explain the principles of the disclosure.
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, for those of ordinary skill in the art, In other words, other drawings can also be obtained from these drawings without paying creative labor.
图1为本公开一个或多个实施例提供的一种网络电话VoIP的网络系统的示意图;FIG. 1 is a schematic diagram of a VoIP network system provided by one or more embodiments of the present disclosure;
图2为本公开一个或多个实施例提供的一种使用诈骗来电识别方法的场景示意图;FIG. 2 is a schematic diagram of a scene using a fraudulent call identification method provided by one or more embodiments of the present disclosure;
图3是本公开一个或多个实施例提供的一种移动终端接收来电时的界面示意图;Fig. 3 is a schematic diagram of an interface when a mobile terminal receives an incoming call provided by one or more embodiments of the present disclosure;
图4是本公开一个或多个实施例提供的一种诈骗来电识别方法的流程示意图;Fig. 4 is a schematic flowchart of a fraudulent call identification method provided by one or more embodiments of the present disclosure;
图5是本公开一个或多个实施例提供的另一种诈骗来电识别方法的流程示意图;Fig. 5 is a schematic flowchart of another fraudulent call identification method provided by one or more embodiments of the present disclosure;
图6是本公开一个或多个实施例提供的又一种诈骗来电识别方法的流程示意图;Fig. 6 is a schematic flowchart of another fraudulent call identification method provided by one or more embodiments of the present disclosure;
图7是本公开一个或多个实施例提供的一种诈骗来电识别装置的模块化示意图;Fig. 7 is a modular schematic diagram of a fraudulent call identification device provided by one or more embodiments of the present disclosure;
图8是本公开一个或多个实施例提供的一种电子设备的结构框图。Fig. 8 is a structural block diagram of an electronic device provided by one or more embodiments of the present disclosure.
具体实施方式Detailed ways
为了能够更清楚地理解本公开的上述目的、特征和优点,下面将对本公开的方案进行进一步描述。需要说明的是,在不冲突的情况下,本公开的实施例及实施例中的特征可以相互组合。In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.
在下面的描述中阐述了很多具体细节以便于充分理解本公开,但本公开还可以采用其他不同于在此描述的方式来实施;显然,说明书中的实施例只是本公开的一部分实施例,而不是全部的实施例。In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.
本公开的说明书和权利要求书中的术语“第一”和“第二”等是用来区别不同的对象,而不是用来描述对象的特定顺序。例如,第一摄像头和第二摄像头是为了区别不同的摄像头,而不是为了描述摄像头的特定顺序。The terms "first" and "second" and the like in the specification and claims of the present disclosure are used to distinguish different objects, rather than to describe a specific order of objects. For example, the first camera and the second camera are used to distinguish different cameras, not to describe a specific order of the cameras.
在本公开实施例中,“示例性的”或者“例如”等词来表示作例子、例证或说明。本公开实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,此外,在本公开实施例的描述中,除非另有说明,“多个”的含义是指两个或两个以上。In the embodiments of the present disclosure, words such as "exemplary" or "for example" are used as examples, illustrations or illustrations. Any embodiment or design described as "exemplary" or "for example" in the embodiments of the present disclosure shall not be construed as being preferred or advantageous over other embodiments or designs. To be precise, the use of words such as "exemplary" or "for example" is intended to present related concepts in a specific manner. In addition, in the description of the embodiments of the present disclosure, unless otherwise specified, the meaning of "plurality" refers to two one or more.
在相关技术中,网络电话VoIP(Voice over Internet Protocol,基于网际协议的语音传输)是一种语音通话技术,经由网际协议(IP,Internet Protocol)来达成语音通话与多媒体会议,也就是经由互联网来进行通信。网络电话VoIP的其他非正式的名称包括:IP电话(IP telephony)、互联网电话(Internet telephony)、宽带电话(broadband telephony)以及宽带电话服务(broadband phone service)等。In related technologies, VoIP (Voice over Internet Protocol, voice transmission based on Internet Protocol) is a voice call technology, which achieves voice calls and multimedia conferences through Internet Protocol (IP, Internet Protocol), that is, through the Internet. to communicate. Other informal names for VoIP include: IP telephony, Internet telephony, broadband telephony, and broadband phone service.
网络电话VoIP可用于包括VoIP电话、智能手机、个人计算机在内的诸多互联网接入设备,通过蜂窝网络、Wi-Fi等网络进行通话及发送短信。网络电话VoIP的基本原理是:通过语音的压缩算法对语音数据编码进行压缩处理,然后把这些语音数据按TCP/IP (Transmission Control Protocol/Internet Protocol,传输控制协议/网际协议)标准进行打包,经过IP网络把语音数据包发送至接收地,再把这些语音数据包串起来,经过解压处理后,恢复成原来的语音信号,从而达到由互联网传送语音的目的。网络电话VoIP的核心与关键设备是网关,网关具有一个数据库,该数据库保存各地区电话区号与相应地区的网关地址之间的对应关系,网关可以通过数据库把各地区电话区号映射为相应地区对应的网关地址。VoIP can be used on many Internet access devices including VoIP phones, smartphones, and personal computers, to make calls and send text messages through cellular networks, Wi-Fi and other networks. The basic principle of Internet telephony VoIP is: compress the voice data coding through the voice compression algorithm, and then pack the voice data according to the TCP/IP (Transmission Control Protocol/Internet Protocol, Transmission Control Protocol/Internet Protocol) standard, after The IP network sends the voice data packets to the receiving place, and then strings these voice data packets together. After decompression processing, the original voice signal is restored, so as to achieve the purpose of transmitting voice through the Internet. The core and key equipment of Internet telephony VoIP is the gateway. The gateway has a database, which stores the corresponding relationship between the telephone area codes of each area and the gateway address of the corresponding area. The gateway can map the telephone area codes of each area to the corresponding area code through the database. gateway address.
参照图1所示,图1为本公开一个或多个实施例提供的一种网络电话VoIP的网络系统的示意图,该网络系统中包括呼叫终端110、接收终端120、第一网关130、第二网关140、IP网络150及PSTN/ISDN(Public Switched Telephone Network/Integrated Services Digital Network,公共交换电话系统/综合业务数字网)160。呼叫终端110在与接收终端120进行通信时,第一网关130根据保存着电话区号与相应地区的网关地址之间的对应关系的数据库,确定接收终端120对应的第二网关140的网关地址,将语音数据包通过IP网络150传输至第二网关140。PSTN可以是一种常用旧式电话系统,即日常生活中常用的电话网。PSTN也可以是一种全球语音通信电路交换网络,包括商业使用的和政府拥有的。ISDN是专为高速数据传输和高质量语音通信而设计的一种高速、高质量的通信网络。作为一个全数字的网络,ISDN是与其它计算机系统、其它网络进行通信的理想工具。即,PSTN/ISDN160是一种基于电路交换的语音传送系统,PSTN/ISDN 160与IP网络150为两种不同的语音系统,而网络电话VoIP则是可以通过网关在PSTN/ISDN 160和IP网络150之间建立联系。Referring to FIG. 1, FIG. 1 is a schematic diagram of a VoIP network system provided by one or more embodiments of the present disclosure. The network system includes a calling terminal 110, a receiving terminal 120, a first gateway 130, a second Gateway 140, IP network 150 and PSTN/ISDN (Public Switched Telephone Network/Integrated Services Digital Network, Public Switched Telephone System/Integrated Services Digital Network) 160. When the calling terminal 110 communicates with the receiving terminal 120, the first gateway 130 determines the gateway address of the second gateway 140 corresponding to the receiving terminal 120 according to the database storing the correspondence between the telephone area code and the gateway address of the corresponding area, and sends The voice data packets are transmitted to the second gateway 140 through the IP network 150 . The PSTN may be a common old telephone system, ie the telephone network commonly used in everyday life. The PSTN may also be a global voice communications circuit-switched network, both commercial and government-owned. ISDN is a high-speed, high-quality communication network designed for high-speed data transmission and high-quality voice communication. As an all-digital network, ISDN is an ideal tool for communicating with other computer systems and other networks. That is, PSTN/ISDN 160 is a voice transmission system based on circuit switching, PSTN/ISDN 160 and IP network 150 are two different voice systems, and Internet telephone VoIP can be connected between PSTN/ISDN 160 and IP network 150 through a gateway. establish connections between.
其中,IP网络150和PSTN/ISDN 160之间可以通过传递信令进行通信,第一网关130和第二网关140都可以接收信令和发送信令。例如,第一网关130可以发送包含呼叫终端110对应的主叫号码的信令到PSTN/ISDN 160,可以发送包含语音数据的信令到IP网络150,PSTN/ISDN 160可以将包含呼叫终端110对应的主叫号码的信令传输至第二网关140,IP网络150可以将包含语音数据的信令传输至第二网关140,第二网关140将识别到的主叫号码和语音数据发送到接收终端120,接收终端120可以显示主叫号码以及播放语音。Wherein, the communication between the IP network 150 and the PSTN/ISDN 160 can be performed by transmitting signaling, and both the first gateway 130 and the second gateway 140 can receive signaling and send signaling. For example, the first gateway 130 can send the signaling containing the calling number corresponding to the calling terminal 110 to the PSTN/ISDN 160, and can send the signaling containing the voice data to the IP network 150, and the PSTN/ISDN 160 can send the signaling containing the calling number corresponding to the calling terminal 110 to the PSTN/ISDN 160. The signaling of the calling number is transmitted to the second gateway 140, and the IP network 150 can transmit the signaling containing voice data to the second gateway 140, and the second gateway 140 sends the identified calling number and voice data to the receiving terminal 120. The receiving terminal 120 may display the calling number and play voice.
基于上述的网络电话VoIP,在相关的技术中,诈骗分子可以通过改号软件改变呼叫终端110对应的第一网关130发送的包含主叫号码的信令,将主叫号码更改为其它号码,从而伪装成被更改后的号码。并且诈骗分子还可以通过改号软件更改网关地址,进一步地提高了通过电话号码和网关地址识别出诈骗来电的困难性。Based on the VoIP VoIP mentioned above, in related technologies, fraudsters can use number changing software to change the signaling containing the calling number sent by the first gateway 130 corresponding to the calling terminal 110, and change the calling number to another number, thereby Masquerade as a changed number. And fraudsters can also change the gateway address through the number changing software, which further increases the difficulty of identifying fraudulent calls through the phone number and gateway address.
本公开实施例公开了一种诈骗来电识别方法、装置、电子设备及存储介质,能够识别出通过更改网关地址以进行伪装的诈骗来电。The embodiment of the present disclosure discloses a fraudulent call identification method, device, electronic equipment and storage medium, capable of identifying a fraudulent call disguised by changing a gateway address.
参照图2所示,图2为本公开一个或多个实施例提供的一种使用诈骗来电识别方法的场景示意图,该场景下可以包括移动终端200,其中,移动终端200可包括但不限于手机、平板电脑、可穿戴设备、笔记本电脑、PC(Personal Computer,个人计算机)等。此外,上述移动终端200的操作系统可包括但不限于Android(安卓)操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等,本公开实施例不作限定。Referring to FIG. 2, FIG. 2 is a schematic diagram of a scene using a fraudulent call identification method provided by one or more embodiments of the present disclosure. This scene may include a mobile terminal 200, where the mobile terminal 200 may include but is not limited to a mobile phone , tablet computer, wearable device, notebook computer, PC (Personal Computer, personal computer), etc. In addition, the operating system of the above-mentioned mobile terminal 200 may include but not limited to Android (Android) operating system, IOS operating system, Symbian (Symbian) operating system, Black Berry (Blackberry) operating system, Windows Phone8 operating system, etc., the implementation of the present disclosure Examples are not limited.
移动终端200可以接收网络电话VoIP的来电,并输出来电提示信息以提示用户有来电待处理,检测到用户的接听或拒绝操作后与发起来电的设备建立通话。在接收网络电话VoIP的来电时,移动终端200可以开始执行本公开实施例提供的诈骗来电识别方法的步骤,步骤的具体内容在下述实施例中说明。在识别到来电为诈骗来电时,对来电进行拦截操作,该拦截操作可包括挂断来电及屏蔽来电,可选地,在完成拦截操作后还可以输出诈骗来电提示信息,该诈骗来电提示信息用于提示用户该来电为诈骗来电,输出诈骗来电提示信息的方式可包括但不限于语音提示、屏幕显示、震动提示等,此处不作限定。The mobile terminal 200 can receive an incoming VoIP call, and output an incoming call prompt message to remind the user that there is an incoming call to be processed, and establish a call with the device that initiated the incoming call after detecting the user's answer or reject operation. When receiving a VoIP call, the mobile terminal 200 may start to execute the steps of the method for identifying fraudulent calls provided by the embodiments of the present disclosure, and the specific content of the steps is described in the following embodiments. When the incoming call is identified as a fraudulent call, the incoming call is intercepted. The intercepting operation may include hanging up the incoming call and shielding the incoming call. To remind the user that the incoming call is a fraudulent call, the ways of outputting the fraudulent call prompt information may include but not limited to voice prompts, screen display, vibration prompts, etc., which are not limited herein.
参照图3所示,图3为本公开一个或多个实施例提供的一种移动终端接收来电时的界面示意图,移动终端200在接收到网络电话VoIP的来电时,显示界面包括来电显示区域310、按键区域320,来电显示区域310可以显示来电对应的来电号码,例如,如图3所示,来电显示区域310可以显示188xxxx8888。由于来电对应的来电号码可能已在移动终端200中进行保存且具有相对应的备注,来电显示区域310也可以显示来电号码相对应的备注,例如,来电显示区域310可以显示“张叔”。在识别到来电为诈骗来电时,来电显示区域310可以将显示的来电号码或备注更改为诈骗来电提示信息。按键区域320可以在接收到网络电话VoIP的来电时,显示对待处理的来电的功能按键,例如,按键区域320可以在接收到网络电话VoIP的来电时,显示“接听”和“挂断”的功能按键。按键区域320可以在接听网络电话VoIP的来电时,显示对正在接听的来电的功能按键,例如,如图3所示,按键区域320可以在接听网络电话VoIP的来电时,显示“免提”、“静音”和“挂断”的功能按键。Referring to FIG. 3 , FIG. 3 is a schematic diagram of an interface of a mobile terminal receiving an incoming call provided by one or more embodiments of the present disclosure. When the mobile terminal 200 receives an incoming call from VoIP, the display interface includes an incoming call display area 310 . The button area 320, the caller ID area 310 can display the caller number corresponding to the incoming call, for example, as shown in FIG. 3, the caller ID area 310 can display 188xxxx8888. Since the caller number corresponding to the incoming call may have been saved in the mobile terminal 200 and has a corresponding note, the caller ID area 310 may also display the note corresponding to the caller number, for example, the caller ID area 310 may display "Uncle Zhang". When it is recognized that the incoming call is a fraudulent call, the caller display area 310 can change the displayed caller number or remarks into fraudulent call prompt information. The button area 320 can display the function buttons of the incoming call to be processed when receiving an incoming call of the Internet phone VoIP, for example, the button area 320 can display the functions of "answer" and "hang up" when receiving an incoming call of the Internet phone VoIP button. The button area 320 can display the function keys of the incoming call being answered when answering the incoming call of the Internet phone VoIP. For example, as shown in FIG. 3 , the button area 320 can display "hands-free", "Mute" and "Hang up" function buttons.
参照图4所示,图4为本公开一个或多个实施例提供的一种诈骗来电识别方法的流程示意图,该诈骗来电识别方法可应用于上述的移动终端,该方法可包括如下步骤:Referring to FIG. 4, FIG. 4 is a schematic flow diagram of a fraudulent call identification method provided by one or more embodiments of the present disclosure. The fraudulent call identification method can be applied to the above-mentioned mobile terminal, and the method may include the following steps:
步骤410,接收由网络电话VoIP拨出的来电。 Step 410, receiving an incoming call from the VoIP phone.
移动终端接收由网络电话VoIP拨出的来电。其中,由网络电话VoIP拨出的来电指的是另一电子设备通过网络电话VoIP拨号到该移动终端的来电。The mobile terminal receives an incoming call from the Internet phone VoIP. Wherein, the incoming call made by VoIP refers to an incoming call from another electronic device dialing to the mobile terminal through VoIP.
在一个实施例中,移动终端接收到由传统电话系统(例如PSTN/ISDN等)拨出的来电时,也可以对来电进行诈骗来电识别,该诈骗来电识别的方式可包括但不限于通过验证号码真假的方式进行识别等。其中,由传统电话系统拨出的来电指的是另一电子设备通过传统电话系统拨号到该移动终端的来电。In one embodiment, when the mobile terminal receives an incoming call from a traditional telephone system (such as PSTN/ISDN, etc.), it can also identify the incoming call as a fraudulent call. True and false way to identify and so on. Wherein, the incoming call dialed by the traditional telephone system refers to the incoming call dialed by another electronic device to the mobile terminal through the traditional telephone system.
步骤420,根据来电对应的来电号码,确定来电号码对应的第一位置信息。 Step 420, according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number.
移动终端根据来电对应的来电号码,可以通过定位技术确定来电号码对应的第一位置信息。其中,定位技术可以包括但不限于基于GPS(Global Positioning System,全球定位系统)的定位、基于移动运营网的基站的定位等。其中,通过定位技术确定来电号码对应的第一位置信息可以符合不同国家或通讯公司对定位服务的法律规定,例如,获取来电号码对应的第一位置信息时需要进行对第一位置信息的隐私权的保护。According to the incoming call number corresponding to the incoming call, the mobile terminal may determine the first location information corresponding to the incoming call number through a positioning technology. Wherein, the positioning technology may include but not limited to positioning based on GPS (Global Positioning System, Global Positioning System), positioning based on a base station of a mobile operating network, and the like. Among them, determining the first location information corresponding to the caller number through positioning technology can comply with the legal provisions of different countries or communication companies on location services. protection of.
在一个实施例中,移动终端可以根据Cell ID(小区号)定位技术和/或AFLT(Advanced Forward Link Trilateration,基于前向链路的定位方法)定位技术以及来电对应的来电号码,确定来电号码对应的第一位置信息。其中,Cell ID定位技术由移动终端通过IP网络获取来电号码对应的电子设备在特定时刻所在的移动基站Cell信息,并根据该移动基站Cell信息获取用户当前位置,该定位技术的精度取决于移动基站的分布及移动基站覆盖范围的大小。AFLT定位技术是CDMA(Code Division Multiple Access,码分多址)独有的技术,在定位操作时,移动终端同时监听至少3个基站的导频信息,利用码片时延来确定来电号码对应的电子设备到附近基站的距离,最后用三角定位法计算来电号码对应的设备的位置信息,即第一位置信息。In one embodiment, the mobile terminal can determine the corresponding number of the incoming call according to the Cell ID (cell number) positioning technology and/or AFLT (Advanced Forward Link Trilateration, based on the forward link positioning method) positioning technology and the corresponding incoming call number of the incoming call. The first location information of . Among them, the Cell ID positioning technology uses the mobile terminal to obtain the mobile base station Cell information of the electronic device corresponding to the incoming call number at a specific time through the IP network, and obtains the current location of the user according to the mobile base station Cell information. The accuracy of this positioning technology depends on the mobile base station. distribution and the size of the mobile base station coverage. AFLT positioning technology is a unique technology of CDMA (Code Division Multiple Access, Code Division Multiple Access). During the positioning operation, the mobile terminal monitors the pilot information of at least 3 base stations at the same time, and uses the chip delay to determine the corresponding number of the incoming call number. The distance from the electronic device to the nearby base station, and finally the location information of the device corresponding to the incoming call number is calculated by triangulation, that is, the first location information.
在一个实施例中,移动终端在根据来电对应的来电号码,确定来电号码对应的第一位置信息之前,可以发送检测指令到云端,该检测指令用于指示云端检测来电对应的来电号码的标记状态,移动终端接收云端发送的标记状态,若该标记状态指示来电号码为诈骗电话号码,则识别到来电为诈骗来电,若该标记状态指示来电号码不为诈骗电话号码,则根据来电对应的来电号码,确定来电号码对应的第一位置信息。In one embodiment, before the mobile terminal determines the first location information corresponding to the incoming call number according to the incoming call number, it can send a detection instruction to the cloud, and the detection instruction is used to instruct the cloud to detect the marking status of the incoming call number corresponding to the incoming call. , the mobile terminal receives the flag state sent by the cloud, if the flag state indicates that the caller number is a fraudulent phone number, then recognize that the incoming call is a fraudulent call, if the flag state indicates that the caller number is not a fraudulent phone number, then according to the corresponding caller number of the call to determine the first location information corresponding to the incoming call number.
其中,移动终端可以是发送携带有来电号码的检测指令到云端的服务器,该云端可以是网络中的虚拟存储空间,保存多个电话号码的标记状态。云端的服务器根据该检测指令对来电对应的来电号码进行检测,若在云端中查找到来电对应的来电号码,则将该来电对 应的来电号码在云端中的标记状态发送到移动终端,例如,标记状态可以包括诈骗电话号码、正常电话号码等。若在云端中未查找到来电对应的来电号码,则发送查找失败信息到移动终端,即在云端中未查找到来电对应的来电号码的信息。移动终端在接收到云端的服务器发送的标记状态后,可以根据该标记状态判断来电是否为诈骗来电。若标记状态为诈骗电话号码,移动终端确定来电为诈骗来电,若标记状态不为诈骗电话,即标记状态可以为正常电话号码,也可以是该查找失败信息,移动终端继续执行本实施例的后续步骤,即根据来电对应的来电号码,确定来电号码对应的第一位置信息。Wherein, the mobile terminal may be a server that sends the detection instruction carrying the caller number to the cloud, and the cloud may be a virtual storage space in the network, which stores the marking states of multiple phone numbers. The server in the cloud detects the caller number corresponding to the incoming call according to the detection instruction. If the caller number corresponding to the incoming call is found in the cloud, the marking status of the caller number corresponding to the incoming call in the cloud is sent to the mobile terminal. The status can include a scam phone number, a legitimate phone number, etc. If the incoming call number corresponding to the incoming call is not found in the cloud, then the search failure information is sent to the mobile terminal, that is, the information that the incoming call number corresponding to the incoming call has not been found in the cloud. After receiving the marking status sent by the server in the cloud, the mobile terminal can judge whether the incoming call is a fraudulent call according to the marking status. If the marked state is a fraudulent phone number, the mobile terminal determines that the incoming call is a fraudulent call, if the marked state is not a fraudulent call, that is, the marked state can be a normal phone number, or it can be the search failure information, and the mobile terminal continues to execute the subsequent steps of this embodiment. The step is to determine the first location information corresponding to the incoming call number according to the incoming call number.
步骤430,获取来电对应的网关地址,并根据网关地址确定与网关地址对应的第二位置信息。 Step 430, acquire the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address.
移动终端可以从移动终端对应的网关接收到的语音数据包中,获取来电对应的网关的网关地址(即IP地址),根据网关地址可以确定与网关地址对应的第二位置信息,网关地址与第二位置信息之间的对应关系可以通过网关地址定位服务获取。再以图1为例,接收终端120通过第二网关140接收到的包含第一网关130的网关地址的信令,获得第一网关130的网关地址,并根据第一网关130的网关地址确定呼叫终端110的第二位置信息。The mobile terminal can obtain the gateway address (ie IP address) of the gateway corresponding to the incoming call from the voice packet received by the gateway corresponding to the mobile terminal, and can determine the second location information corresponding to the gateway address according to the gateway address. The corresponding relationship between the two location information can be obtained through the gateway address location service. Taking Fig. 1 again as an example, the receiving terminal 120 obtains the gateway address of the first gateway 130 through the signaling received by the second gateway 140 that includes the gateway address of the first gateway 130, and determines the call based on the gateway address of the first gateway 130. Second location information of the terminal 110.
步骤440,将第一位置信息与第二位置信息进行比较,并根据比较结果识别来电是否为诈骗来电。 Step 440, comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result.
移动终端将第一位置信息与第二位置信息进行比较,并根据比较结果识别来电是否为诈骗来电。其中,比较结果可包括但不限于第一位置信息与第二位置信息之间的距离是否超出第一位置信息与第二位置信息对应的距离阈值、第一位置信息与第二位置信息是否处于同一个行政区、第一位置信息与第二位置信息是否处于诈骗来电常用地区等,此处不作限制。The mobile terminal compares the first location information with the second location information, and identifies whether the incoming call is a fraudulent call according to the comparison result. Wherein, the comparison result may include but not limited to whether the distance between the first location information and the second location information exceeds the distance threshold corresponding to the first location information and the second location information, whether the first location information and the second location information are in the same An administrative region, whether the first location information and the second location information are in a common area for fraudulent calls, etc., are not limited here.
在一些实施例中,若比较结果指示第一位置信息与第二位置信息距离较远,说明来电号码对应的第一位置信息与网关地址对应的第二位置信息之间的区别较大,可能存在来电号码不真实被篡改或是网关地址不真实被篡改的情况,来电极大可能为诈骗来电,因此可确定来电为诈骗来电。In some embodiments, if the comparison result indicates that the distance between the first location information and the second location information is far, it means that there is a large difference between the first location information corresponding to the caller number and the second location information corresponding to the gateway address, and there may be If the incoming call number is false or the gateway address is false and tampered, the incoming electrode is likely to be a fraudulent call, so it can be determined that the incoming call is a fraudulent call.
在一个实施例中,移动终端在根据比较结果识别来电是否为诈骗来电之后,若根据比较不能确定来电为诈骗来电,则自动回拨来电号码。若回拨来电号码后没有被接通,则识别到来电为诈骗来电,若回拨来电号码后被接通,则确定来电不为诈骗来电。其中,移动终端可以通过并行回拨的方式自动回拨来电号码,也可以通过串行回拨的方式自动回拨来电号码。并行回拨方式需求移动终端具有2张电话卡,在移动终端的其中一张电话卡接收来电时,移动终端可以通过另一张电话卡自动回拨来电号码,能够在接收来电时立即回拨来电号码,提高诈骗来电识别的速度,保护用户的信息安全。串行回拨方式可以在移动终端已接听来电并通话结束后,移动终端自动回拨来电号码。在该实施例中,可以通过自动回拨机制判断来电号码是否为真实号码以识别诈骗来电,进一步提高了识别诈骗来电的准确性。In one embodiment, after the mobile terminal identifies whether the incoming call is a fraudulent call according to the comparison result, if it cannot be determined that the incoming call is a fraudulent call according to the comparison, it automatically calls back the calling number. If the calling number is not connected after calling back, the incoming call is identified as a fraudulent call, and if the incoming call is connected after the calling number is dialed back, it is determined that the incoming call is not a fraudulent call. Wherein, the mobile terminal can automatically call back the calling number through parallel calling back, and can also automatically call back the calling number through serial calling back. The parallel callback method requires that the mobile terminal has two calling cards. When one of the calling cards of the mobile terminal receives an incoming call, the mobile terminal can automatically call back the calling number through the other calling card. The speed of identifying fraudulent calls protects the security of user information. In the serial callback method, after the mobile terminal has answered the incoming call and the call is over, the mobile terminal will automatically call back the incoming call number. In this embodiment, the automatic callback mechanism can be used to determine whether the incoming call number is a real number to identify fraudulent calls, which further improves the accuracy of identifying fraudulent calls.
步骤450,若确定来电为诈骗来电,则对来电进行拦截操作。 Step 450, if it is determined that the incoming call is a fraudulent incoming call, intercepting the incoming call.
移动终端若确定来电为诈骗来电,则对来电进行拦截操作。其中,在移动终端进行诈骗来电识别方法中的任一步骤识别到来电为诈骗来电,都可以对来电进行拦截操作,并且中止诈骗来电识别方法的后续步骤,移动终端已获得诈骗来电识别方法的结果,可以减少不必要进行的步骤。If the mobile terminal determines that the incoming call is a fraudulent incoming call, it will intercept the incoming call. Wherein, any step in the fraudulent call identification method performed by the mobile terminal recognizes that the incoming call is a fraudulent call, and the incoming call can be intercepted, and the subsequent steps of the fraudulent call identification method are terminated, and the mobile terminal has obtained the result of the fraudulent call identification method. , can reduce unnecessary steps.
在一个实施例中,移动终端若确定来电为诈骗来电,则挂断来电以及屏蔽来电,并发送标记指令到云端,标记指令用于指示云端将来电号码标记为诈骗电话号码。移动终端可以在确定来电为诈骗来电时,挂断来电并屏蔽来电,还可以发送标记指令到云端的服务器,云端的服务器根据该标记指令在云端中将来电号码的标记状态标记为诈骗电话号码,以使 得之后对该来电号码的检测能够查询到标记状态。In one embodiment, if the mobile terminal determines that the incoming call is a fraudulent call, it hangs up the incoming call, screens the incoming call, and sends a marking instruction to the cloud, which is used to instruct the cloud to mark the incoming call number as a fraudulent phone number. When the mobile terminal determines that the incoming call is a fraudulent call, it can hang up the incoming call and block the incoming call, and can also send a marking instruction to the server in the cloud, and the server in the cloud will mark the marking state of the incoming number in the cloud as a fraudulent phone number according to the marking instruction. In order to enable subsequent detection of the incoming call number to inquire about the status of the flag.
在本公开实施例中,移动终端在接收由网络电话VoIP拨出的来电后,根据来电对应的来电号码确定来电号码对应的第一位置信息,以及获取来电的网关地址,并根据网关地址确定与网关地址对应的第二位置信息,移动终端将第一位置信息与第二位置信息进行比较,能够通过来电号码对应的位置信息和网关地址对应的位置信息的比较,提高识别出诈骗来电的准确性,并在确定来电为诈骗来电后,对来电进行拦截操作,降低用户被诈骗的可能性,保证用户的信息安全。In the embodiment of the present disclosure, after the mobile terminal receives an incoming call from the Internet phone VoIP, it determines the first location information corresponding to the incoming call number according to the incoming call number, obtains the gateway address of the incoming call, and determines the corresponding location information according to the gateway address. The second location information corresponding to the gateway address, the mobile terminal compares the first location information with the second location information, and can improve the accuracy of identifying fraudulent calls by comparing the location information corresponding to the caller number with the location information corresponding to the gateway address , and after the incoming call is determined to be a fraudulent call, the incoming call is intercepted to reduce the possibility of the user being defrauded and ensure the user's information security.
参阅图5所示,图5是本公开一个或多个实施例提供的另一种诈骗来电识别方法的流程示意图,该诈骗来电识别方法可包括如下步骤:Referring to FIG. 5, FIG. 5 is a schematic flowchart of another method for identifying fraudulent calls provided by one or more embodiments of the present disclosure. The method for identifying fraudulent calls may include the following steps:
步骤510,接收由网络电话VoIP拨出的来电。 Step 510, receiving an incoming call from the VoIP phone.
步骤510与上述步骤410相同,本公开在此不再赘述。Step 510 is the same as the above-mentioned step 410, and the present disclosure will not repeat it here.
步骤520,根据来电对应的来电号码,确定来电号码对应的第一位置信息;第一位置信息包括历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息。 Step 520, according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number; the first location information includes the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment.
移动终端确定需要获取第一历史位置信息的历史时刻,根据来电对应的来电号码,可以通过定位技术确定历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息,第一历史位置信息包括来电号码对应的电子设备在一个或多个历史时刻对应的位置信息,第一实时位置信息则包括来电号码对应的设备在接收到来电时对应的位置信息。其中,获取历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息的方式可以与上述实施例中获取第一位置信息的方式相同。The mobile terminal determines the historical moment at which the first historical location information needs to be obtained, and according to the incoming call number corresponding to the incoming call, the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment can be determined through positioning technology. The first historical location The information includes location information corresponding to the electronic device corresponding to the caller number at one or more historical moments, and the first real-time location information includes location information corresponding to the device corresponding to the caller number when receiving the call. Wherein, the manner of obtaining the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment may be the same as the manner of obtaining the first location information in the above embodiment.
步骤530,获取来电对应的网关地址,并根据网关地址确定与网关地址对应的第二位置信息;第二位置信息包括历史时刻对应的第二历史位置信息及当前时刻对应的第二实时位置信息。 Step 530, obtain the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address; the second location information includes the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment.
移动终端从移动终端对应的网关接收到的语音数据包中,获取来电对应的网关的网关地址,并且确定需要获取第二历史位置信息的历史时刻,再根据网关地址可以确定历史时刻对应的第二历史位置信息及当前时刻对应的第二实时位置信息,第二历史位置信息包括网关地址在一个或多个历史时刻对应的位置信息,第二实时位置信息则包括网关地址在接收到来电时对应的位置信息。网关地址与历史时刻对应的第二历史位置信息及当前时刻对应的第二实时位置信息之间的对应关系可以通过网关地址定位服务获取。其中,获取历史时刻对应的第二历史位置信息及当前时刻对应的第二实时位置信息的方式可以与上述实施例中获取第二位置信息的方式相同。The mobile terminal obtains the gateway address of the gateway corresponding to the incoming call from the voice data packet received by the gateway corresponding to the mobile terminal, and determines the historical moment at which the second historical location information needs to be obtained, and then determines the second historical location information corresponding to the historical moment according to the gateway address. The historical location information and the second real-time location information corresponding to the current moment. The second historical location information includes the location information corresponding to the gateway address at one or more historical moments, and the second real-time location information includes the corresponding location of the gateway address when receiving an incoming call. location information. The corresponding relationship between the gateway address and the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment can be obtained through the gateway address location service. Wherein, the manner of obtaining the second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment may be the same as the manner of obtaining the second location information in the above embodiment.
步骤540,将历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息进行比较,得到第一比较结果;将当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息进行比较,得到第二比较结果。Step 540: Compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; compare the first real-time location information corresponding to the current moment with the second real-time location information corresponding to the current moment The location information is compared to obtain a second comparison result.
移动终端可以将历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息进行比较,历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息分别为同一历史时刻下来电号码对应的位置信息和网关地址对应的位置信息,比较后可以得到第一比较结果。The mobile terminal may compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment, and the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment are respectively the same historical moment The location information corresponding to the call number and the location information corresponding to the gateway address are compared to obtain a first comparison result.
在一些实施例中,第一比较结果可包括但不限于历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息之间的距离、历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息对应的行政区、历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息是否处于诈骗来电常用地区等中任一种,此处不作限制。In some embodiments, the first comparison result may include, but not limited to, the distance between the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment, the distance between the first historical location information corresponding to the historical moment and the historical The administrative district corresponding to the second historical location information corresponding to the time, whether the first historical location information corresponding to the historical moment and the second historical location information corresponding to the historical moment are in any of the areas where fraudulent calls are frequently used are not limited here.
移动终端可以将当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息进行比较,比较后得到第二比较结果。在一个实施例中,第二比较结果可包括但不限于当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息之间的距离当 前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息对应的行政区、当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息是否处于诈骗来电常用地区等,此处不作限制。The mobile terminal may compare the first real-time location information corresponding to the current moment with the second real-time location information corresponding to the current moment, and obtain a second comparison result after the comparison. In one embodiment, the second comparison result may include, but not limited to, the distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment. The first real-time location information corresponding to the current moment and the current moment The administrative district corresponding to the second real-time location information, whether the first real-time location information corresponding to the current moment, and the second real-time location information corresponding to the current moment are in areas commonly used for fraudulent calls are not limited here.
步骤550,根据第一比较结果及第二比较结果识别来电是否为诈骗来电。 Step 550, identifying whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result.
移动终端可以根据第一比较结果及第二比较结果识别来电是否为诈骗来电。可选的,移动终端可以根据第一比较结果,和第二比较结果识别来电是否为诈骗来电,例如,当移动终端根据第一比较结果识别来电为诈骗来电,且根据第二比较结果识别来电为诈骗来电时,才可以确定来电为诈骗来电。移动终端也可以根据第一比较结果,或第二比较结果识别来电是否为诈骗来电,例如,当移动终端根据第一比较结果识别来电为诈骗来电,或根据第二比较结果识别到电为诈骗来电时,都可以确定来电为诈骗来电。The mobile terminal can identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result. Optionally, the mobile terminal may identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result, for example, when the mobile terminal identifies the incoming call as a fraudulent call according to the first comparison result, and identifies the incoming call as Only when a fraudulent call is received, can the incoming call be determined as a fraudulent call. The mobile terminal can also identify whether the incoming call is a fraudulent call according to the first comparison result or the second comparison result. , it can be determined that the incoming call is a fraudulent incoming call.
在一个实施例中,第一历史位置信息至少包括来电号码在第一历史时刻对应的第一历史位置信息、来电号码在第二历史时刻对应的第一历史位置信息,其中,第一历史时刻早于第二历史时刻,例如,第一历史时刻可以是60分钟前,第二历史时刻可以是5分钟前。In one embodiment, the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the first historical location information corresponding to the incoming call number at the second historical moment, wherein the first historical moment is earlier than For the second historical moment, for example, the first historical moment may be 60 minutes ago, and the second historical moment may be 5 minutes ago.
第二历史位置信息至少包括网关地址在第一历史时刻对应的第二历史位置信息、网关地址在第二历史时刻对应的第二历史位置信息。第二历史位置信息对应的历史时刻与第一历史位置信息对应的历史时刻相同。The second historical location information at least includes second historical location information corresponding to the gateway address at the first historical moment and second historical location information corresponding to the gateway address at the second historical moment. The historical moment corresponding to the second historical location information is the same as the historical moment corresponding to the first historical location information.
第一比较结果可以包括第一历史时刻对应的第一历史位置信息与第一历史时刻对应的第二历史位置信息之间的第一距离、第二历史时刻对应的第一历史位置信息与第二历史时刻对应的第二历史位置信息之间的第二距离,第二比较结果可以包括当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息之间的第三距离。The first comparison result may include the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the first historical location information corresponding to the second historical moment and the second The second distance between the second historical location information corresponding to the historical moment, and the second comparison result may include a third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment.
步骤根据第一比较结果及第二比较结果识别来电是否为诈骗来电,包括:若第一距离大于第一距离阈值,或第二距离大于第二距离阈值,或第三距离大于第三距离阈值,则确定来电为诈骗来电;若第一距离不大于第一距离阈值,且第二距离不大于第二距离阈值,且第三距离不大于第三距离阈值,则确定来电不为诈骗来电;其中,第三距离阈值小于第二距离阈值,第二距离阈值小于第一距离阈值。The step of identifying whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result includes: if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold, Then it is determined that the incoming call is a fraudulent incoming call; if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then it is determined that the incoming call is not a fraudulent incoming call; wherein, The third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
其中,第一距离阈值与第一历史时刻相对应,第二距离阈值与第二历史相对应,第三距离阈值与当前时刻相对应。例如,第一距离阈值可以为1000公里,与60分钟前的时刻相对应;第二距离阈值可以为50公里,与5分钟前的时刻相对应;第三距离阈值可以为5公里,与当前时刻相对应。距离阈值可以与历史时刻具有正比关系,与当前时刻相隔越久,距离阈值越大。Wherein, the first distance threshold corresponds to the first historical moment, the second distance threshold corresponds to the second history, and the third distance threshold corresponds to the current moment. For example, the first distance threshold can be 1000 kilometers, corresponding to the moment 60 minutes ago; the second distance threshold can be 50 kilometers, corresponding to the moment 5 minutes ago; the third distance threshold can be 5 kilometers, corresponding to the current moment Corresponding. The distance threshold may have a proportional relationship with the historical moment, and the longer the distance from the current moment, the greater the distance threshold.
在一些实施例中,移动终端可分别计算上述的第一距离、第二距离及第三距离,并分别将第一距离与第一距离阈值进行比较、将第二距离与第二距离阈值进行比较、将第三距离与第三距离阈值进行比较,若第一距离大于第一距离阈值,或第二距离大于第二距离阈值,或第三距离大于第三距离阈值,则可确定来电为诈骗来电。In some embodiments, the mobile terminal can respectively calculate the above-mentioned first distance, second distance and third distance, and respectively compare the first distance with the first distance threshold, and compare the second distance with the second distance threshold . Comparing the third distance with the third distance threshold, if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold, then it can be determined that the incoming call is a fraudulent call .
作为另一种实施方式,移动终端也可串行对上述的第一距离、第二距离及第三距离进行处理,来识别来电是否为诈骗来电。例如,可先计算上述的第一距离,并判断第一距离是否大于第一距离阈值,若第一距离大于第一距离阈值,则可直接确定来电为诈骗来电,并不再计算上述的第二距离及第三距离;若第一距离不大于第一距离阈值,再计算上述的第二距离,并判断第二距离是否大于第二距离阈值,若第二距离大于第二距离阈值,则可直接确定来电为诈骗来电,并不再计算上述的第三距离;若第二距离不大于第二距离阈值,再计算上述的第三距离,并判断第三距离是否大于第三距离阈值,若第三距离大于第三距离阈值,则可确定来电为诈骗来电,若第三距离也不大于第三距离阈值,则可确定来电不为诈骗来电。通过串行比较判断的方式,可以减少计算量,提高识别效率。As another implementation manner, the mobile terminal may also serially process the first distance, the second distance, and the third distance to identify whether the incoming call is a fraudulent call. For example, the above-mentioned first distance can be calculated first, and it can be judged whether the first distance is greater than the first distance threshold. If the first distance is greater than the first distance threshold, it can be directly determined that the incoming call is a fraudulent call, and the above-mentioned second distance and the third distance; if the first distance is not greater than the first distance threshold, then calculate the above-mentioned second distance, and judge whether the second distance is greater than the second distance threshold, if the second distance is greater than the second distance threshold, you can directly Determine that the incoming call is a fraudulent call, and no longer calculate the above-mentioned third distance; if the second distance is not greater than the second distance threshold, then calculate the above-mentioned third distance, and determine whether the third distance is greater than the third distance threshold, if the third If the distance is greater than the third distance threshold, it can be determined that the incoming call is a fraudulent call, and if the third distance is not greater than the third distance threshold, then it can be determined that the incoming call is not a fraudulent call. Through the method of serial comparison and judgment, the amount of calculation can be reduced and the recognition efficiency can be improved.
需要说明的是,第一距离阈值与第一距离的比较、第二距离阈值与第二距离的比较以 及第三距离阈值和第三距离的比较之间并没有先后顺序关系,第一距离阈值与第一距离的比较只需要在计算出第一距离后进行,第二距离阈值与第二距离的比较只需要在计算出第二距离后进行,第三距离阈值与第三距离的比较只需要在计算出第三距离后进行。It should be noted that there is no sequential relationship between the comparison between the first distance threshold and the first distance, the comparison between the second distance threshold and the second distance, and the comparison between the third distance threshold and the third distance. The comparison of the first distance only needs to be performed after calculating the first distance, the comparison of the second distance threshold and the second distance only needs to be performed after calculating the second distance, and the comparison of the third distance threshold and the third distance only needs to be performed after Carry out after calculating the third distance.
可选的,移动终端可以在通过其中一种比较确定来电为诈骗来电时,都可以对来电进行拦截操作。作为一种可选的实施方式,移动终端还可以对不处于同一历史时刻下的第一历史位置信息和第二历史位置信息进行比较,但在比较时需要计算移动终端在不同历史时刻之间的时差内可能进行的位移,并将该位移加入第一历史位置信息或第二历史位置信息所对应的距离阈值。若第一历史位置信息所对应的历史时刻早于第二历史位置信息所对应的历史时刻,则计算第一历史位置信息所对应的历史时刻与第二历史位置信息所对应的历史时刻的时差,并将该时差内可能产生的位移加入第一历史位置信息所对应的距离阈值。若第一历史位置信息所对应的历史时刻晚于第二历史位置信息所对应的历史时刻,则计算第一历史位置信息所对应的历史时刻与第二历史位置信息所对应的历史时刻的时差,并将该时差内可能产生的位移加入第二历史位置信息所对应的距离阈值。Optionally, when the mobile terminal determines that the incoming call is a fraudulent incoming call through one of the comparisons, it can intercept the incoming call. As an optional implementation, the mobile terminal can also compare the first historical location information and the second historical location information that are not at the same historical moment, but it is necessary to calculate the historical location information of the mobile terminal between different historical moments when comparing. possible displacement within the time difference, and add the displacement to the distance threshold corresponding to the first historical location information or the second historical location information. If the historical moment corresponding to the first historical location information is earlier than the historical moment corresponding to the second historical location information, then calculate the time difference between the historical moment corresponding to the first historical location information and the historical moment corresponding to the second historical location information, And the possible displacement within the time difference is added to the distance threshold corresponding to the first historical location information. If the historical moment corresponding to the first historical location information is later than the historical moment corresponding to the second historical location information, then calculate the time difference between the historical moment corresponding to the first historical location information and the historical moment corresponding to the second historical location information, And the possible displacement within the time difference is added to the distance threshold corresponding to the second historical location information.
例如,第一历史位置信息为60分钟前的来电号码对应的位置信息,第二历史位置信息为50分钟前的网关地址对应的位置信息,即第一历史位置信息所对应的历史时刻与第二历史位置信息所对应的历史时刻的时差为10分钟,在10分钟内移动终端可能产生的位移为200公里,而第一历史位置信息对应的历史时刻为60分钟前,第一历史位置信息所对应的距离阈值为1000公里,可以计算后得到距离阈值为1200公里,移动终端将第一历史位置信息与第二历史位置信息之间的距离与1200公里进行比较,得到比较结果。For example, the first historical location information is the location information corresponding to the incoming call number 60 minutes ago, and the second historical location information is the location information corresponding to the gateway address 50 minutes ago, that is, the historical moment corresponding to the first historical location information and the second The time difference of the historical moment corresponding to the historical location information is 10 minutes, the possible displacement of the mobile terminal within 10 minutes is 200 kilometers, and the historical moment corresponding to the first historical location information is 60 minutes ago, the first historical location information corresponds to The distance threshold is 1000 kilometers, and the distance threshold can be calculated to be 1200 kilometers. The mobile terminal compares the distance between the first historical location information and the second historical location information with 1200 kilometers to obtain a comparison result.
作为一种可选的实施方式,移动终端可以在进行通话时保持一定的频率对来电号码对应的实时位置信息和网关地址对应的实时位置信息进行比较。即,移动终端可以不仅在来电时对第一实时位置信息与第二实时位置信息进行比较,还可以在后续的通话过程中保持对来电号码对应的实时位置信息和网关地址对应的实时位置信息的监控,以一定的频率获得来电号码对应的实时位置信息和网关地址对应的实时位置信息之间的距离,再将该距离与第三距离阈值进行比较。例如,移动终端可以在开始通话之后,每隔1分钟获取一次来电号码对应的实时位置信息和网关地址对应的实时位置信息,计算来电号码对应的实时位置信息和网关地址对应的实时位置信息之间的距离并将该距离与5公里进行比较。实施该实施方式,可以在通话过程中保持对诈骗来电的监测,提高识别诈骗来电的可能性。As an optional implementation manner, the mobile terminal may compare the real-time location information corresponding to the calling number with the real-time location information corresponding to the gateway address at a certain frequency during the call. That is, the mobile terminal can not only compare the first real-time location information with the second real-time location information when a call is received, but also keep the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address during the subsequent call. Monitoring, obtaining the distance between the real-time location information corresponding to the incoming call number and the real-time location information corresponding to the gateway address at a certain frequency, and then comparing the distance with the third distance threshold. For example, after starting a call, the mobile terminal can acquire the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address every 1 minute, and calculate the difference between the real-time location information corresponding to the caller number and the real-time location information corresponding to the gateway address. and compare that distance to 5 km. By implementing this embodiment, it is possible to keep monitoring fraudulent calls during a call, and improve the possibility of identifying fraudulent calls.
步骤560,若确定来电为诈骗来电,则对来电进行拦截操作。 Step 560, if it is determined that the incoming call is a fraudulent incoming call, intercept the incoming call.
步骤560与上述步骤450相同,本公开在此不再赘述。Step 560 is the same as the above-mentioned step 450, and the present disclosure will not repeat it here.
在本公开实施例中,移动终端可以获取到第一历史位置信息及第一实时位置信息,并可以获取到第二历史位置信息及第二实时位置信息,将第一历史位置信息及第二历史位置信息进行比较得到第一比较结果,以及将第一实时位置信息及第二实时位置信息进行比较得到第二比较结果,根据第一比较结果或第二比较结果确定来电是否为诈骗来电,不仅对来电号码对应的实时位置和网关地址对应的实时位置进行比较,而且对来电号码对应的历史位置和网关地址对应的历史位置进行比较,避免诈骗来电通过更改实时网关地址进行诈骗,可以通过多次比较识别出诈骗来电,提高识别出诈骗来电的可能性。In the embodiment of the present disclosure, the mobile terminal can obtain the first historical location information and the first real-time location information, and can obtain the second historical location information and the second real-time location information, and combine the first historical location information and the second historical location information Comparing the location information to obtain the first comparison result, and comparing the first real-time location information and the second real-time location information to obtain the second comparison result, and determining whether the incoming call is a fraudulent call according to the first comparison result or the second comparison result, not only for Compare the real-time location corresponding to the caller number with the real-time location corresponding to the gateway address, and compare the historical location corresponding to the caller number with the historical location corresponding to the gateway address to avoid fraudulent calls by changing the real-time gateway address for fraud, which can be compared multiple times Identify fraudulent calls and increase the likelihood of identifying fraudulent calls.
参阅图6所示,图6是本公开一个或多个实施例提供的又一种诈骗来电识别方法的流程示意图,该诈骗来电识别方法可包括如下步骤:Referring to FIG. 6, FIG. 6 is a schematic flowchart of another method for identifying a fraudulent call provided by one or more embodiments of the present disclosure. The method for identifying a fraudulent call may include the following steps:
步骤602,接收由网络电话VoIP拨出的来电。 Step 602, receiving an incoming call from the Internet phone VoIP.
步骤604,发送检测指令到云端,并接收云端根据该检测指令发送与来电号码对应的标记状态,根据该标记状态判断来电号码是否为诈骗电话,若是,则执行步骤606,若否,则执行步骤618。Step 604: Send a detection instruction to the cloud, and receive the flag state corresponding to the incoming call number sent by the cloud according to the detection instruction, judge whether the incoming call number is a fraudulent call according to the flag state, if so, execute step 606, if not, execute step 604 618.
步骤606,根据来电对应的来电号码,确定来电号码对应的第一位置信息;第一位置 信息包括来电号码在第一历史时刻对应的第一历史位置信息、来电号码在第二历史时刻对应的第一历史位置信息及来电号码在当前时刻对应的第一实时位置信息。 Step 606, according to the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number; the first location information includes the first historical location information corresponding to the incoming call number at the first historical moment, the first historical location information corresponding to the incoming call number at the second historical moment A historical location information and the first real-time location information corresponding to the calling number at the current moment.
步骤608,获取来电对应的网关地址,并根据网关地址确定与网关地址对应的第二位置信息;第二位置信息包括网关地址在第一历史时刻对应的第二历史位置信息、网关地址在第二历史时刻对应的第二历史位置信息及网关地址在当前时刻对应的第二实时位置信息。 Step 608, obtain the gateway address corresponding to the incoming call, and determine the second location information corresponding to the gateway address according to the gateway address; the second location information includes the second historical location information corresponding to the gateway address at the first historical moment, the gateway address at the second The second historical location information corresponding to the historical moment and the second real-time location information corresponding to the gateway address at the current moment.
步骤610,计算第一历史时刻对应的第一历史位置信息与第一历史时刻对应的第二历史位置信息之间的第一距离,并判断第一距离是否大于第一距离阈值,若是,则执行步骤618,若否,则执行步骤612。 Step 610, calculate the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, and determine whether the first distance is greater than the first distance threshold, and if so, execute Step 618, if not, go to step 612.
步骤612,计算第二历史时刻对应的第一历史位置信息与第二历史时刻对应的第二历史位置信息之间的第二距离,并判断第二距离是否大于第二距离阈值,若是,则执行步骤618,若否,则执行步骤614。 Step 612, calculate the second distance between the first historical location information corresponding to the second historical moment and the second historical location information corresponding to the second historical moment, and judge whether the second distance is greater than the second distance threshold, and if so, execute Step 618, if not, go to step 614.
步骤614,计算当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息之间的第三距离,并判断第三距离是否大于第三距离阈值,若是,则执行步骤618,若否,则执行步骤616。 Step 614, calculate the third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment, and judge whether the third distance is greater than the third distance threshold, if so, execute step 618, if If not, go to step 616.
步骤616,自动回拨来电号码,并判断是否能被接通,若是,则执行步骤618,若否,则执行步骤620。 Step 616, automatically call back the caller number, and judge whether it can be connected, if yes, execute step 618, if not, execute step 620.
在本公开实施例中,移动终端对来电进行多个历史时刻的位置比较,可以避免诈骗来电通过更改网关地址,进行一次性地伪装位置,尤其是对于实时位置的伪装,防止被诈骗来电伪装的位置欺骗,并且存在云端检测和自动回拨机制,都可以提高识别诈骗来电的可能性。In the embodiment of the present disclosure, the mobile terminal compares the locations of incoming calls at multiple historical moments, which can prevent fraudulent calls from being faked by changing the gateway address at one time, especially for the real-time location, to prevent fraudulent calls from being faked. Location spoofing, and the presence of cloud-based detection and automatic callback mechanisms, can increase the likelihood of identifying a fraudulent call.
应该理解的是,虽然图4-6的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图4-6中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flow charts of FIGS. 4-6 are shown sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in Figures 4-6 may include a plurality of sub-steps or stages, these sub-steps or stages are not necessarily performed at the same time, but may be performed at different times, these sub-steps or stages The order of execution is not necessarily performed sequentially, but may be performed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.
基于同一发明构思,作为对上述方法的实现,本公开实施例还提供了一种诈骗来电识别装置,该装置实施例与前述方法实施例对应,为便于阅读,本装置实施例不再对前述方法实施例中的细节内容进行逐一赘述,但应当明确,本实施例中的装置能够对应实现前述方法实施例中的全部内容。Based on the same inventive concept, as an implementation of the above method, the embodiment of the present disclosure also provides a device for identifying fraudulent calls. The embodiment of the device corresponds to the embodiment of the method described above. Details in the embodiments are described one by one, but it should be clear that the device in this embodiment can correspondingly implement all the content in the foregoing method embodiments.
图7为本公开一个或多个实施例提供的一种诈骗来电识别装置的模块化示意图,如图所示,本实施例提供的诈骗来电识别装置700包括:Fig. 7 is a modular schematic diagram of a fraudulent call identification device provided by one or more embodiments of the present disclosure. As shown in the figure, the fraudulent call identification device 700 provided in this embodiment includes:
接收模块710,将接收模块710配置成接收由网络电话VoIP拨出的来电的模块;Receiving module 710, the receiving module 710 is configured as a module that receives incoming calls dialed out by Internet phone VoIP;
第一位置确定模块720,将第一位置确定模块720配置成根据来电对应的来电号码,确定来电号码对应的第一位置信息的模块;The first location determination module 720 is configured to configure the first location determination module 720 as a module for determining the first location information corresponding to the incoming call number according to the incoming call number;
第二位置确定模块730,将第二位置确定模块730配置成获取来电对应的网关地址,并根据网关地址确定与网关地址对应的第二位置位置信息的模块;The second location determining module 730 is configured to configure the second location determining module 730 as a module for obtaining the gateway address corresponding to the incoming call, and determining the second location location information corresponding to the gateway address according to the gateway address;
比较模块740,将比较模块740配置成将第一位置信息与第二位置信息进行比较,并根据比较结果识别来电是否为诈骗来电的模块;The comparison module 740, configuring the comparison module 740 as a module that compares the first location information with the second location information, and identifies whether the incoming call is a fraudulent call according to the comparison result;
拦截模块750,将拦截模块750配置成若确定来电为诈骗来电,则对来电进行拦截操作的模块。The interception module 750 is configured to intercept the incoming call if it is determined that the incoming call is a fraudulent call.
作为本公开实施例一种可选的实施方式,第一位置信息包括历史时刻对应的第一历史 位置信息及当前时刻对应的第一实时位置信息,第二位置信息包括历史时刻对应的第二历史位置信息及当前时刻对应的第二实时位置信息;As an optional implementation of this embodiment of the present disclosure, the first location information includes the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment, and the second location information includes the second historical location information corresponding to the historical moment location information and second real-time location information corresponding to the current moment;
比较模块740,还将比较模块740配置成将历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息进行比较,得到第一比较结果的模块;以及,配置成将当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息进行比较,得到第二比较结果的模块;以及,配置成根据第一比较结果及第二比较结果识别来电是否为诈骗来电的模块。The comparison module 740 is also configured to compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; Comparing the first real-time location information with the second real-time location information corresponding to the current moment to obtain a second comparison result; and a module configured to identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result.
作为本公开实施例一种可选的实施方式,第一历史位置信息至少包括来电号码在第一历史时刻对应的第一历史位置信息、来电号码在第二历史时刻对应的第一历史位置信息,第二历史位置信息至少包括网关地址在第一历史时刻对应的第二历史位置信息、网关地址在第二历史时刻对应的第二历史位置信息;第一历史时刻早于第二历史时刻;As an optional implementation manner of the embodiment of the present disclosure, the first historical location information includes at least the first historical location information corresponding to the calling number at the first historical moment, and the first historical location information corresponding to the calling number at the second historical moment, The second historical location information includes at least second historical location information corresponding to the gateway address at the first historical moment, and second historical location information corresponding to the gateway address at the second historical moment; the first historical moment is earlier than the second historical moment;
第一比较结果包括:第一历史时刻对应的第一历史位置信息与第一历史时刻对应的第二历史位置信息之间的第一距离、第二历史时刻对应的第一历史位置信息与第二历史时刻对应的第二历史位置信息之间的第二距离;第二比较结果包括:当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息之间的第三距离;The first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the first historical location information corresponding to the second historical moment and the second A second distance between the second historical location information corresponding to the historical moment; the second comparison result includes: a third distance between the first real-time location information corresponding to the current moment and the second real-time location information corresponding to the current moment;
比较模块740,还将比较模块740配置成若第一距离大于第一距离阈值,或第二距离大于第二距离阈值,或第三距离大于第三距离阈值,则确定来电为诈骗来电的模块;以及,配置成若第一距离不大于第一距离阈值,且第二距离不大于第二距离阈值,且第三距离不大于第三距离阈值,则确定来电不为诈骗来电的模块;其中,第三距离阈值小于第二距离阈值,第二距离阈值小于第一距离阈值。The comparison module 740 is further configured to determine that the incoming call is a fraudulent call if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold; And, if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then determine that the incoming call is not a fraudulent call module; wherein, the first The third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
作为本公开实施例一种可选的实施方式,诈骗来电识别装置700还包括回拨模块,将回拨模块配置成若根据比较结果不能确定来电为诈骗来电,则自动回拨来电号码的模块;以及,配置成若回拨来电号码后没有被接通,则识别到来电为诈骗来电的模块;以及,配置成若回拨来电号码后被接通,则识别到来电不为诈骗来电的模块。As an optional implementation of the embodiment of the present disclosure, the fraudulent call identification device 700 also includes a callback module, which is configured to automatically call back the incoming call number if it cannot be determined that the incoming call is a fraudulent call according to the comparison result; And, a module configured to recognize that the incoming call is a fraudulent call if it is not connected after calling back the calling number; and a module configured to identify that the incoming call is not a fraudulent call if it is connected after calling back the calling number.
作为本公开实施例一种可选的实施方式,诈骗来电识别装置700还包括云端检测模块,将云端检测模块配置成发送检测指令到云端的模块,检测指令用于指示云端检测来电对应的来电号码的标记状态;以及,配置成接收云端发送的标记状态的模块;以及,配置成若标记状态指示来电号码为诈骗电话号码,则识别到来电为诈骗来电的模块;As an optional implementation of the embodiment of the present disclosure, the fraudulent call identification device 700 also includes a cloud detection module, and the cloud detection module is configured to send a detection instruction to the cloud module, and the detection instruction is used to instruct the cloud to detect the corresponding incoming call number and a module configured to receive the tag status sent by the cloud; and a module configured to identify the incoming call as a fraudulent call if the tag status indicates that the incoming call number is a fraudulent phone number;
第一位置确定模块720,还将第一位置确定模块720配置成若标记状态指示来电号码不为诈骗电话号码,则根据来电对应的来电号码,确定来电号码对应的第一位置信息的模块。The first location determining module 720 is also configured as a module for determining the first location information corresponding to the calling number according to the calling number corresponding to the incoming call if the marking status indicates that the calling number is not a fraudulent phone number.
作为本公开实施例一种可选的实施方式,第一位置确定模块720,还将第一位置确定模块720配置成根据Cell ID定位技术和/或AFLT定位技术以及所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块。As an optional implementation manner of the embodiment of the present disclosure, the first location determination module 720 is further configured to configure the first location determination module 720 to use the Cell ID positioning technology and/or the AFLT positioning technology and the corresponding incoming call number of the incoming call, A module for determining the first location information corresponding to the caller number.
作为本公开实施例一种可选的实施方式,拦截模块750,还将拦截模块750配置成若确定来电为诈骗来电,则挂断来电以及屏蔽来电,并发送标记指令到云端的模块,标记指令用于指示云端将来电号码标记为诈骗电话号码。As an optional implementation of the embodiment of the present disclosure, the interception module 750 is also configured to hang up the incoming call and block the incoming call if it is determined that the incoming call is a fraudulent incoming call, and send a marking instruction to the module in the cloud, marking the instruction Used to instruct the cloud to mark the incoming caller number as a fraudulent phone number.
本实施例提供的诈骗来电识别装置可以执行上述方法实施例提供的诈骗来电识别方法,其实现原理与技术效果类似,此处不再赘述。上述诈骗来电识别装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于电子设备中的处理器中,也可以以软件形式存储于电子设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。The device for identifying fraudulent calls provided in this embodiment can execute the method for identifying fraudulent calls provided in the above method embodiment, and its implementation principle and technical effect are similar, and will not be repeated here. Each module in the above-mentioned device for identifying fraudulent calls can be realized in whole or in part by software, hardware and combinations thereof. The above-mentioned modules can be embedded in or independent of the processor in the electronic device in the form of hardware, and can also be stored in the memory of the electronic device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.
在一个实施例中,提供了一种电子设备,该电子设备可以是终端设备,如图8所示,图8是本公开一个或多个实施例提供的一种电子设备的结构框图。该电子设备包括通过系 统总线连接的处理器、存储器、通信接口、数据库、显示屏和输入装置。其中,该电子设备的处理器配置成提供计算和控制能力的模块。该电子设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机可读指令。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该电子设备的通信接口配置成与外部的终端进行有线或无线方式的通信模块,无线方式可通过WIFI、运营商网络、近场通信(NFC)或其他技术实现。该计算机可读指令被处理器执行时以实现上述实施例提供的诈骗来电识别方法。该电子设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该电子设备的输入装置可以是显示屏上覆盖的触摸层,也可以是电子设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。In an embodiment, an electronic device is provided, and the electronic device may be a terminal device, as shown in FIG. 8 , which is a structural block diagram of an electronic device provided by one or more embodiments of the present disclosure. The electronic device includes a processor, a memory, a communication interface, a database, a display screen and an input device connected by a system bus. Wherein, the processor of the electronic device is configured as a module providing calculation and control capabilities. The memory of the electronic device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and computer readable instructions. The internal memory provides an environment for the execution of the operating system and computer readable instructions in the non-volatile storage medium. The communication interface of the electronic device is configured as a wired or wireless communication module with an external terminal, and the wireless mode can be realized through WIFI, operator network, near field communication (NFC) or other technologies. When the computer-readable instructions are executed by the processor, the method for identifying fraudulent calls provided by the above-mentioned embodiments can be realized. The display screen of the electronic device may be a liquid crystal display screen or an electronic ink display screen, and the input device of the electronic device may be a touch layer covered on the display screen, or a button, a trackball or a touch pad provided on the housing of the electronic device , and can also be an external keyboard, touchpad or mouse.
本领域技术人员可以理解,图8中示出的结构,仅仅是与本公开方案相关的部分结构的框图,并不构成对本公开方案所应用于其上的电子设备的限定,具体的电子设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art can understand that the structure shown in FIG. 8 is only a block diagram of a partial structure related to the disclosed solution, and does not constitute a limitation on the electronic device to which the disclosed solution is applied. The specific electronic device can be More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.
在一个实施例中,本公开提供的诈骗来电识别装置可以实现为一种计算机可读指令的形式,计算机可读指令可在如图8所示的电子设备上运行。电子设备的存储器中可存储组成该电子设备的各个程序模块。各个程序模块构成的计算机可读指令使得处理器执行本说明书中描述的本公开各个实施例的诈骗来电识别方法中的步骤。In one embodiment, the device for identifying fraudulent calls provided in the present disclosure can be implemented in the form of computer-readable instructions, and the computer-readable instructions can be run on the electronic device as shown in FIG. 8 . Each program module constituting the electronic device can be stored in the memory of the electronic device. The computer-readable instructions constituted by the various program modules enable the processor to execute the steps in the methods for identifying fraudulent calls in various embodiments of the present disclosure described in this specification.
在一个实施例中,提供了一种电子设备,包括存储器810和一个或多个处理器820,将所述存储器810配置成存储计算机可读指令的模块;所述计算机可读指令被所述处理器820执行时,使得一个或多个处理器820执行上述方法实施例所述的诈骗来电识别方法的步骤。In one embodiment, an electronic device is provided, including a memory 810 and one or more processors 820, the memory 810 is configured as a module storing computer-readable instructions; the computer-readable instructions are processed by the When executed by the processor 820, one or more processors 820 execute the steps of the fraudulent call identification method described in the method embodiment above.
本实施例提供的电子设备,可以实现上述方法实施例提供的诈骗来电识别方法,其实现原理与技术效果类似,此处不再赘述。The electronic device provided in this embodiment can implement the fraudulent call identification method provided in the above method embodiment, and its implementation principle and technical effect are similar, and will not be repeated here.
一个或多个存储有计算机可读指令的非易失性存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述任一项所述的诈骗来电识别方法的步骤。One or more non-volatile storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, one or more processors perform the fraudulent call identification described in any one of the above method steps.
本实施例提供的计算机可读存储介质上存储的计算机可读指令,可以实现上述方法实施例提供的诈骗来电识别方法,其实现原理与技术效果类似,此处不再赘述。The computer-readable instructions stored on the computer-readable storage medium provided by this embodiment can implement the fraudulent call identification method provided by the above-mentioned method embodiment, and its implementation principle is similar to the technical effect, and will not be repeated here.
本领域普通技术人员可以理解实现上述方法实施例中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成的,计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本公开所提供的各实施例中所使用的对存储器、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存或光存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,比如静态随机存取存储器(Static Random Access Memory,SRAM)和动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。Those of ordinary skill in the art can understand that the implementation of all or part of the processes in the above method embodiments can be completed by instructing related hardware through computer-readable instructions, and the computer-readable instructions can be stored in a non-volatile computer-readable When the computer-readable instructions are executed, the computer-readable instructions may include the processes of the embodiments of the above-mentioned methods. Wherein, any reference to storage, database or other media used in the various embodiments provided by the present disclosure may include at least one of non-volatile and volatile storage. Non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory or optical memory, etc. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration and not limitation, RAM is available in various forms such as Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM), among others.
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined arbitrarily. To make the description concise, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features, they should be It is considered to be within the range described in this specification.
以上实施例仅表达了本公开的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本公开构思的前提下,还可以做出若干变形和改进,这些都属于本公开的保护范围。因此,本公开专利的保护范围应以所附权利要求为准。The above examples only express several implementations of the present disclosure, and the descriptions thereof are more specific and detailed, but should not be construed as limiting the scope of the patent for the invention. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present disclosure, and these all belong to the protection scope of the present disclosure. Therefore, the scope of protection of the disclosed patent should be based on the appended claims.
工业实用性Industrial Applicability
本公开提供的诈骗来电识别方法,通过来电号码对应的位置信息和网关地址对应的位置信息的比较,可有效提高识别出诈骗来电的准确性,并在确定来电为诈骗来电后,对来电进行拦截操作,有效降低用户被诈骗的可能性,保证用户的信息安全,具有很强的工业实用性。The method for identifying fraudulent calls provided by the present disclosure can effectively improve the accuracy of identifying fraudulent calls by comparing the location information corresponding to the caller number and the location information corresponding to the gateway address, and intercept the incoming calls after determining that the incoming calls are fraudulent calls Operation, effectively reducing the possibility of users being defrauded, ensuring user information security, has strong industrial applicability.

Claims (16)

  1. 一种诈骗来电识别方法,所述方法包括:A method for identifying fraudulent calls, the method comprising:
    接收由网络电话VoIP拨出的来电;Receive incoming calls from VoIP;
    根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息;determining the first location information corresponding to the incoming call number according to the incoming call number;
    获取所述来电对应的网关地址,并根据所述网关地址确定与所述网关地址对应的第二位置信息;Obtaining a gateway address corresponding to the incoming call, and determining second location information corresponding to the gateway address according to the gateway address;
    将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电;comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result;
    若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作。If it is determined that the incoming call is the fraudulent incoming call, an interception operation is performed on the incoming call.
  2. 根据权利要求1所述的方法,其中,所述第一位置信息包括历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息,所述第二位置信息包括所述历史时刻对应的第二历史位置信息及所述当前时刻对应的第二实时位置信息;所述将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电,包括:The method according to claim 1, wherein the first location information includes the first historical location information corresponding to the historical moment and the first real-time location information corresponding to the current moment, and the second location information includes the historical location information corresponding to the historical moment. The second historical location information and the second real-time location information corresponding to the current moment; comparing the first location information with the second location information, and identifying whether the incoming call is a fraudulent call according to the comparison result ,include:
    将所述历史时刻对应的第一历史位置信息与所述历史时刻对应的第二历史位置信息进行比较,得到第一比较结果;Comparing the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result;
    将所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息进行比较,得到第二比较结果;Comparing the first real-time location information corresponding to the current moment with the second real-time location information corresponding to the current moment to obtain a second comparison result;
    根据所述第一比较结果及所述第二比较结果识别所述来电是否为所述诈骗来电。Identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result.
  3. 根据权利要求2所述的方法,其中,所述第一历史位置信息至少包括所述来电号码在第一历史时刻对应的第一历史位置信息、所述来电号码在第二历史时刻对应的第一历史位置信息,所述第二历史位置信息至少包括所述网关地址在所述第一历史时刻对应的第二历史位置信息、所述网关地址在所述第二历史时刻对应的第二历史位置信息;所述第一历史时刻早于所述第二历史时刻;The method according to claim 2, wherein the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, the first historical location information corresponding to the incoming call number at the second historical moment historical location information, the second historical location information at least includes second historical location information corresponding to the gateway address at the first historical moment, second historical location information corresponding to the gateway address at the second historical moment ; The first historical moment is earlier than the second historical moment;
    所述第一比较结果包括:所述第一历史时刻对应的第一历史位置信息与所述第一历史时刻对应的第二历史位置信息之间的第一距离、所述第二历史时刻对应的第一历史位置信息与所述第二历史时刻对应的第二历史位置信息之间的第二距离;所述第二比较结果包括:所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息之间的第三距离;The first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
    所述根据所述第一比较结果及所述第二比较结果识别所述来电是否为所述诈骗来电,包括:The identifying whether the incoming call is the fraudulent incoming call according to the first comparison result and the second comparison result includes:
    若所述第一距离大于第一距离阈值,或所述第二距离大于第二距离阈值,或所述第三距离大于第三距离阈值,则确定所述来电为所述诈骗来电;If the first distance is greater than a first distance threshold, or the second distance is greater than a second distance threshold, or the third distance is greater than a third distance threshold, then determining that the incoming call is the fraudulent incoming call;
    若所述第一距离不大于所述第一距离阈值,且所述第二距离不大于第二距离阈值,且所述第三距离不大于第三距离阈值,则确定所述来电不为所述诈骗来电;If the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then it is determined that the incoming call is not the fraudulent calls;
    其中,所述第三距离阈值小于所述第二距离阈值,所述第二距离阈值小于所述第一距离阈值。Wherein, the third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
  4. 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, wherein the method further comprises:
    若根据所述比较结果不能确定所述来电为所述诈骗来电,则自动回拨所述来电号码;If it cannot be determined that the incoming call is the fraudulent incoming call according to the comparison result, then automatically call back the incoming call number;
    若回拨所述来电号码后没有被接通,则识别到所述来电为所述诈骗来电;If the caller number is not connected after calling back, then it is recognized that the caller is the fraudulent caller;
    若回拨所述来电号码后被接通,则识别到所述来电不为所述诈骗来电。If the caller number is connected after calling back, it is recognized that the caller is not the fraudulent caller.
  5. 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, wherein the method further comprises:
    发送检测指令到云端,所述检测指令用于指示所述云端检测所述来电对应的来电号码的标记状态;Sending a detection instruction to the cloud, the detection instruction is used to instruct the cloud to detect the marking status of the incoming call number corresponding to the incoming call;
    接收所述云端发送的所述标记状态;receiving the marking status sent by the cloud;
    若所述标记状态指示所述来电号码为诈骗电话号码,则识别到所述来电为诈骗来电;If the marking state indicates that the incoming call number is a fraudulent telephone number, then identifying that the incoming call is a fraudulent incoming call;
    所述根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息,包括:The determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call includes:
    若所述标记状态指示所述来电号码不为所述诈骗电话号码,则根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息。If the flag state indicates that the incoming call number is not the fraudulent telephone number, then determine the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call.
  6. 根据权利要求1或5所述的方法,其中,所述根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息,包括:The method according to claim 1 or 5, wherein said determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call includes:
    根据Cell ID定位技术和/或AFLT定位技术以及所述来电对应的来电号码,确定所述来电号码对应的第一位置信息。According to the Cell ID positioning technology and/or AFLT positioning technology and the incoming call number corresponding to the incoming call, determine the first location information corresponding to the incoming call number.
  7. 根据权利要求1-5任一项所述的方法,其中,所述若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作,包括:The method according to any one of claims 1-5, wherein if it is determined that the incoming call is the fraudulent incoming call, performing an interception operation on the incoming call includes:
    若确定所述来电为所述诈骗来电,则挂断所述来电以及屏蔽所述来电,并发送标记指令到云端,所述标记指令用于指示所述云端将所述来电号码标记为诈骗电话号码。If it is determined that the incoming call is the fraudulent call, hang up the incoming call and shield the incoming call, and send a marking instruction to the cloud, the marking instruction is used to instruct the cloud to mark the incoming call number as a fraudulent phone number .
  8. 一种诈骗来电识别装置,包括:A device for identifying fraudulent calls, comprising:
    接收模块,将所述接收模块配置成接收由网络电话VoIP拨出的来电的模块;A receiving module, the receiving module is configured as a module for receiving incoming calls dialed out by VoIP;
    第一位置确定模块,将所述第一位置确定模块配置成根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块;A first location determination module, configuring the first location determination module as a module for determining the first location information corresponding to the incoming call number according to the incoming call number corresponding to the incoming call;
    第二位置确定模块,将所述第二位置确定模块配置成获取所述来电对应的网关地址,并根据所述网关地址确定与所述网关地址对应的第二位置位置信息的模块;A second location determination module, configuring the second location determination module as a module for obtaining the gateway address corresponding to the incoming call, and determining the second location location information corresponding to the gateway address according to the gateway address;
    比较模块,将所述比较模块配置成将所述第一位置信息与所述第二位置信息进行比较,并根据比较结果识别所述来电是否为诈骗来电的模块;A comparison module, configured to compare the first location information with the second location information, and identify whether the incoming call is a fraudulent call according to the comparison result;
    拦截模块,将所述拦截模块配置成若确定所述来电为所述诈骗来电,则对所述来电进行拦截操作的模块。An interception module, configured to intercept the incoming call if it is determined that the incoming call is the fraudulent call.
  9. 根据权利要求8所述的诈骗来电识别装置,其中,所述第一位置信息包括历史时刻对应的第一历史位置信息及当前时刻对应的第一实时位置信息,所述第二位置信息包括所述历史时刻对应的第二历史位置信息及所述当前时刻对应的第二实时位置信息;The device for identifying fraudulent calls according to claim 8, wherein the first location information includes first historical location information corresponding to historical moments and first real-time location information corresponding to current moments, and the second location information includes the The second historical location information corresponding to the historical moment and the second real-time location information corresponding to the current moment;
    所述比较模块,还将所述比较模块配置成将历史时刻对应的第一历史位置信息与历史时刻对应的第二历史位置信息进行比较,得到第一比较结果的模块;以及,配置成将当前时刻对应的第一实时位置信息与当前时刻对应的第二实时位置信息进行比较,得到第二比较结果的模块;以及,配置成根据第一比较结果及第二比较结果识别来电是否为诈骗来电的模块。The comparison module is also configured to compare the first historical location information corresponding to the historical moment with the second historical location information corresponding to the historical moment to obtain a first comparison result; and, configured to compare the current Comparing the first real-time location information corresponding to the moment with the second real-time location information corresponding to the current moment to obtain a second comparison result; and, configured to identify whether the incoming call is a fraudulent call according to the first comparison result and the second comparison result module.
  10. 根据权利要求9所述的诈骗来电识别装置,其中,所述第一历史位置信息至少包括所述来电号码在第一历史时刻对应的第一历史位置信息、所述来电号码在第二历史时刻对应的第一历史位置信息,所述第二历史位置信息至少包括所述网关地址在所述第一历史时刻对应的第二历史位置信息、所述网关地址在所述第二历史时刻对应的第二历史位置信息;所述第一历史时刻早于所述第二历史时 刻;The device for identifying fraudulent calls according to claim 9, wherein the first historical location information includes at least the first historical location information corresponding to the incoming call number at the first historical moment, and the corresponding first historical location information at the second historical moment of the incoming call number. The first historical location information, the second historical location information at least includes the second historical location information corresponding to the gateway address at the first historical moment, the second historical location information corresponding to the gateway address at the second historical moment historical location information; the first historical moment is earlier than the second historical moment;
    所述第一比较结果包括:所述第一历史时刻对应的第一历史位置信息与所述第一历史时刻对应的第二历史位置信息之间的第一距离、所述第二历史时刻对应的第一历史位置信息与所述第二历史时刻对应的第二历史位置信息之间的第二距离;所述第二比较结果包括:所述当前时刻对应的第一实时位置信息与所述当前时刻对应的第二实时位置信息之间的第三距离;The first comparison result includes: the first distance between the first historical location information corresponding to the first historical moment and the second historical location information corresponding to the first historical moment, the The second distance between the first historical location information and the second historical location information corresponding to the second historical moment; the second comparison result includes: the first real-time location information corresponding to the current moment and the current moment a third distance between the corresponding second real-time location information;
    所述比较模块,还将所述比较模块配置成若第一距离大于第一距离阈值,或第二距离大于第二距离阈值,或第三距离大于第三距离阈值,则确定来电为诈骗来电的模块;以及,配置成若第一距离不大于第一距离阈值,且第二距离不大于第二距离阈值,且第三距离不大于第三距离阈值,则确定来电不为诈骗来电的模块;其中,第三距离阈值小于第二距离阈值,第二距离阈值小于第一距离阈值。The comparison module is further configured to determine that the incoming call is a fraudulent call if the first distance is greater than the first distance threshold, or the second distance is greater than the second distance threshold, or the third distance is greater than the third distance threshold module; and, if the first distance is not greater than the first distance threshold, and the second distance is not greater than the second distance threshold, and the third distance is not greater than the third distance threshold, then determine that the incoming call is not a fraudulent incoming call; wherein , the third distance threshold is smaller than the second distance threshold, and the second distance threshold is smaller than the first distance threshold.
  11. 根据权利要求8所述的诈骗来电识别装置,其中,所述诈骗来电识别装置还包括回拨模块,将所述回拨模块配置成若根据比较结果不能确定来电为诈骗来电,则自动回拨来电号码的模块;以及,配置成若回拨来电号码后没有被接通,则识别到来电为诈骗来电的模块;以及,配置成若回拨来电号码后被接通,则识别到来电不为诈骗来电的模块。The device for identifying fraudulent calls according to claim 8, wherein the device for identifying fraudulent calls further includes a callback module, and the callback module is configured to automatically call back the incoming call if it cannot be determined that the incoming call is a fraudulent call according to the comparison result number; and, configured to identify the incoming call as a fraudulent call if it is not connected after calling back the calling number; and, configured to identify that the incoming call is not a fraud if it is connected after calling back the calling number The incoming module.
  12. 根据权利要求8所述的诈骗来电识别装置,其中,所述诈骗来电识别装置还包括云端检测模块,将所述云端检测模块配置成发送检测指令到云端的模块,所述检测指令用于指示所述云端检测所述来电对应的来电号码的标记状态;以及,配置成接收所述云端发送的所述标记状态的模块;以及,配置成若所述标记状态指示所述来电号码为诈骗电话号码,则识别到所述来电为诈骗来电的模块;The fraudulent call identification device according to claim 8, wherein the fraudulent call identification device further comprises a cloud detection module, and the cloud detection module is configured to send a detection command to the cloud module, and the detection command is used to indicate the The cloud detects the marking state of the incoming call number corresponding to the incoming call; and, a module configured to receive the marking state sent by the cloud; and, configured to if the marking state indicates that the incoming number is a fraudulent phone number, A module that identifies that the incoming call is a fraudulent incoming call;
    所述第一位置确定模块,还将第一位置确定模块配置成若所述标记状态指示所述来电号码不为所述诈骗电话号码,则根据所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块。The first location determination module is further configured to determine the caller number according to the caller number corresponding to the incoming call if the flag state indicates that the caller number is not the fraud phone number A module corresponding to the first location information.
  13. 根据权利要求8或12所述的诈骗来电识别装置,其中,所述第一位置确定模块,还将第一位置确定模块配置成根据Cell ID定位技术和/或AFLT定位技术以及所述来电对应的来电号码,确定所述来电号码对应的第一位置信息的模块。The device for identifying fraudulent calls according to claim 8 or 12, wherein the first location determination module is also configured to configure the first location determination module according to Cell ID positioning technology and/or AFLT positioning technology and the corresponding location of the incoming call The incoming call number is a module for determining the first location information corresponding to the incoming call number.
  14. 根据权利要求8-12任一项所述的诈骗来电识别装置,其中,所述拦截模块,还将拦截模块配置成若确定来电为诈骗来电,则挂断来电以及屏蔽来电,并发送标记指令到云端的模块,标记指令用于指示云端将来电号码标记为诈骗电话号码。The fraudulent call identification device according to any one of claims 8-12, wherein the interception module is further configured to hang up the incoming call and screen the incoming call if it is determined that the incoming call is a fraudulent incoming call, and send a marking instruction to A cloud module, the marking instruction is used to instruct the cloud to mark the incoming call number as a fraudulent phone number.
  15. 一种电子设备,包括:存储器和一个或多个处理器,所述存储器中存储有计算机可读指令;所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行权利要求1-7任一项所述的诈骗来电识别方法的步骤。An electronic device comprising: a memory and one or more processors, the memory storing computer-readable instructions; when executed by the one or more processors, the computer-readable instructions cause the one or more A plurality of processors execute the steps of the fraudulent call identification method described in any one of claims 1-7.
  16. 一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行权利要求1-7任一项所述的诈骗来电识别方法的步骤。One or more non-transitory computer-readable storage media storing computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform claim 1 - the step of the fraudulent call identification method described in any one of 7.
PCT/CN2022/140935 2022-02-10 2022-12-22 Fraudulent incoming call identification method and apparatus, and electronic device and storage medium WO2023151399A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210124437.0 2022-02-10
CN202210124437.0A CN114501462A (en) 2022-02-10 2022-02-10 Fraud call identification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2023151399A1 true WO2023151399A1 (en) 2023-08-17

Family

ID=81479067

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/140935 WO2023151399A1 (en) 2022-02-10 2022-12-22 Fraudulent incoming call identification method and apparatus, and electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN114501462A (en)
WO (1) WO2023151399A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114501462A (en) * 2022-02-10 2022-05-13 上海闻泰信息技术有限公司 Fraud call identification method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN107734461A (en) * 2017-09-26 2018-02-23 上海欣方智能系统有限公司 A kind of Novel telephone swindle detection and prevention method based on location determination
CN109547942A (en) * 2019-01-14 2019-03-29 中国联合网络通信集团有限公司 Swindle number identification method, device, equipment and computer readable storage medium
US20210368043A1 (en) * 2020-05-21 2021-11-25 Micron Technology, Inc. Managing spoofed calls to mobile devices
CN114501462A (en) * 2022-02-10 2022-05-13 上海闻泰信息技术有限公司 Fraud call identification method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN107734461A (en) * 2017-09-26 2018-02-23 上海欣方智能系统有限公司 A kind of Novel telephone swindle detection and prevention method based on location determination
CN109547942A (en) * 2019-01-14 2019-03-29 中国联合网络通信集团有限公司 Swindle number identification method, device, equipment and computer readable storage medium
US20210368043A1 (en) * 2020-05-21 2021-11-25 Micron Technology, Inc. Managing spoofed calls to mobile devices
CN114501462A (en) * 2022-02-10 2022-05-13 上海闻泰信息技术有限公司 Fraud call identification method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114501462A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
US9967381B1 (en) Virtual telephony assistant
US10659587B2 (en) Incoming call management method and apparatus
WO2017054572A1 (en) Communication method and device for dual sim, dual standby and single-pass terminal
US10079926B1 (en) Virtual telephony assistant
US20210084082A1 (en) Extending communication services to a consumption device using a proxy device
US10182158B2 (en) Voice gateway-based communication method
RU2594755C1 (en) Method and apparatus for identifying the telephone call
CN113067859B (en) Communication method and device based on cloud mobile phone
CN104506711A (en) Communication information processing method and device for terminal
CN103856324A (en) Identity confirmation method, communication request method, and electronic device
US8868050B2 (en) Information output method and device
WO2023151399A1 (en) Fraudulent incoming call identification method and apparatus, and electronic device and storage medium
US10154145B1 (en) Virtual telephony assistant
JP2014504058A (en) Network device, called terminal, and method for processing a third-party call
CN105120524A (en) Method for establishing communication connection and electronic device
WO2017133607A1 (en) Audio gateway
US9137743B2 (en) Method and mobile device for automatically choosing communication network
CN105376423A (en) Calling detection method, device and system
CN109714750B (en) Call method, device, electronic terminal and medium
US10142466B1 (en) Systems and methods for special called number call handling
CN105306753A (en) System and method for disclosing mobile phone number and intercepting harassing calls and short messages
US8391279B2 (en) Modem and calling packet processing method thereof
JP2017022617A (en) Call incoming control device, call incoming control method, user terminal, and program
CN106465087B (en) Communication message transfer method and related device
CN108463985A (en) A kind of call handling method, terminal and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22925749

Country of ref document: EP

Kind code of ref document: A1