Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying bad conversation

A technology of bad and call information, applied in the field of communication, can solve the problems of money being deceived and the inability to identify fraudulent phone calls, and achieve the effect of reducing trouble and loss and achieving high accuracy.

Inactive Publication Date: 2016-04-20
NUBIA TECHNOLOGY CO LTD
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to propose a method and device for identifying bad calls, aiming to solve the problem that fraudulent calls cannot be identified in the prior art, resulting in money being defrauded from time to time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying bad conversation
  • Method and device for identifying bad conversation
  • Method and device for identifying bad conversation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] like image 3 As shown, the first embodiment of the present invention proposes a method for identifying bad calls, including:

[0070] S101, identifying the called call information and extracting information elements in the call content;

[0071] Specifically, when the mobile terminal receives the called call, it recognizes the information of the called call. The information of the called call includes the address of the calling number, the type of the calling voice, and the voice information key contained in the real-time voice topic information. Words, caller voiceprint feature information, topic type initiated by the caller, etc. The attribution of the calling number is identified according to the number segment of the calling number. The main voice type mainly refers to whether the calling is a manual call or a computer call. Through the intonation and audio of the caller's speech, it can be identified whether it is a computer voice or a manual voice. . The speec...

Embodiment 2

[0082] like Figure 4 As shown, the second embodiment of the present invention proposes a method for identifying bad calls, including:

[0083] S201, identifying the called call information and extracting information elements in the call content;

[0084] S202, comparing the extracted information elements with the data in the database, identifying the dangerous elements, and determining the risk index of the dangerous elements;

[0085] S203. After the risk index reaches a set risk level, send a warning signal to the called party;

[0086] S204. Take security measures to prevent damage from occurring.

[0087] Specifically, the security measures refer to actively taking measures to avoid losses, including disconnecting from the network, and not accepting requests from the machine to send information through the Internet, such as requests from the caller to send a verification code, or requests from the caller to send a bank account number. If it is judged that the content o...

Embodiment 3

[0090] like Figure 5 As shown, the third embodiment of the present invention proposes a device for identifying bad calls, including: an identification and extraction unit 10 , a comparison unit 20 , and a warning unit 30 .

[0091] The identifying and extracting unit 10 is configured to identify the called call information and extract information elements in the call content.

[0092] Specifically, the identification and extraction unit 10 is as Figure 7 As shown, it includes a calling party identification and extraction subunit 11 and a called party identification and extraction subunit 12.

[0093] The calling party identification and extraction subunit 12 is set to: when the mobile terminal receives the called call, identify the information of the called call, the information of the called call includes, the calling number attribution, the type of calling voice, real-time The voice information keywords contained in the voice topic information, the caller's voiceprint fe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for identifying bad conversation applied in a mobile terminal. The method comprises: identifying called conversation information and extracting information elements in the conversation content; comparing the extracted information elements with a database, identifying a risk element, determining the risk index of the risk element; after the risk index reaches a set risk grade, sending an alarm signal to the called party. According to the invention, the content elements of the called voice conversation are extracted in real time; the content elements are compared with the database; the risk index of the conversation content is evaluated; the alarm signal is sent out; a fraud call can be judged effectively in advance; and the cheated risk is reduced.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a method and device for identifying bad calls. Background technique [0002] In recent years, with the popularization of mobile phones, telecom fraud cases continue to occur frequently in some areas of the country. The perpetrators pretend to be staff members of telecom bureaus, public security bureaus, etc., and use arbitrary number display software, VOIP calls and other technologies to charge the victim's phone bills. The identity theft by others is suspected of economic crimes, intimidating and threatening to confiscate all the victim's bank deposits to defraud the victim of returning funds. At present, mobile phones on the market are lacking in the recognition of voice content of calls, so that users cannot give timely reminders and other related anti-fraud measures during the call with the other party. Contents of the invention [0003] The main purpose of the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04M1/725H04W12/128
CPCH04W12/12H04M1/72448
Inventor 余庆儿
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products