Telcom phone phishing-resistant method and system based on discrimination and identification content analysis

A telecommunications phone and content analysis technology, applied in transmission systems, electrical components, wireless communications, etc., can solve the problems of inability to accurately detect fraudulent calls and easy misjudgment

Inactive Publication Date: 2013-06-26
马博
View PDF4 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the field of anti-telecom fraud, only a few companies have similar patents. These patents simply use switch signaling messages or trace the source of telephone and text messages to prevent telecom fraud, and do not use voice semantics to analyze call content.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telcom phone phishing-resistant method and system based on discrimination and identification content analysis
  • Telcom phone phishing-resistant method and system based on discrimination and identification content analysis
  • Telcom phone phishing-resistant method and system based on discrimination and identification content analysis

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0021] The present invention provides a method and system for preventing telecommunications and telephone fraud based on the semantic content analysis of telephone voice. Specifically, the method and system are realized by including four steps:

[0022] Step 1: In the speech processing stage, set the speech sequence input into the library, converted into parametric speech waveforms by a form converter , then the voice waveform establishment probability P(W|S) can be calculated according to the voice sample library model P(S), and then the model M can be established through P(W|S), and there is a hidden Markov process (HMM) to obtain The joint probability P(W,S|M) of , followed by parameter matching through the acoustic model and speech grammar matcher.

[0023] In the preprocessing engine, establish a suitable sound sample library, including the extraction of sound features, and use Mel-Frequency Cepstral Coefficients (MFFCC) to do cepstral analysis to extract features, in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a telcom phone phishing-resistant method and a telcom phone phishing-resistant system based on discrimination and identification content analysis. By improving the efficiency and the accuracy rate of the voice and semanteme identification during calling, and using a Chinese semanteme determining technology, the cold call transmitter is determined whether or not to be a phishing call. The method specifically comprises the following steps of: analyzing the voice by large vocabulary provided by the invention and the large vocabulary continuous speech recognition (LVCSR) of nonspecific person during calling between two parts, determining the analyzed key words or key numbers, constructing a strategy engine by an algorithm, analyzing and classifying the semanteme of a calling party at a cloud service side by the algorithm, analyzing key information in the voice, synchronously matching the information of the bank to which the calling person belongs, and determining whether or not the call is the phishing call. Generally speaking, according to the method, the happening of the phone phishing can be effectively avoided particularly, the user safety can be protected through the discrimination and identification identifying and determining mode and the cloud platform information mining and matching mode, and the voice identification and the suspicious call relevance ratio can meet the normal use as well.

Description

technical field [0001] The invention relates to a method and system for preventing telecommunications and telephone fraud based on speech semantic content analysis, in particular to a method and system for identifying and judging fraudulent or bad content based on telephone speech semantic content. Background technique [0002] The SPHINX system produced by Carnegie Mellon University in the United States in the 1980s took the lead in realizing the recognition technology of non-specific people, continuous speech, and large vocabulary in speech recognition. Subsequently, the Tangora5000 of IBM Corporation in the United States was able to achieve a recognition rate of 97% of word selection in its recognition system. At the same time, its company's Via Voice and Microsoft's Speech SDK and other products have realized Chinese speech recognition, and at the same time provide Chinese speech The identified development package. At the same time, in Germany, France and other European...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/12G06F17/30H04W12/128
Inventor 马博
Owner 马博
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products