Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for recognizing malicious phone call

A malicious telephone and telephone technology, applied in telephone communication, speech recognition, electrical components, etc., can solve problems such as damage, limit the use of telephones, and cannot identify the source of harassing calls, and achieve the effect of improving security.

Inactive Publication Date: 2017-05-31
BEIJING QIHOO TECH CO LTD +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the existing public telephone network cannot identify the source of harassing calls, and it is difficult to distinguish harassing calls from normal calls. The user presets the trusted phone number and isolates all other calls to prevent harassing calls, which greatly limits the use of the phone, so harassing calls are difficult to eliminate, and have been used by social saboteurs and bad business competition. unlawful harassment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing malicious phone call
  • Method and device for recognizing malicious phone call
  • Method and device for recognizing malicious phone call

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The implementation of the present invention will be described in detail below with reference to the drawings and examples, so as to fully understand and implement the implementation process of how to use technical means to solve technical problems and achieve technical effects in the present invention.

[0051] In a typical configuration, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0052] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0053] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for recognizing a malicious phone call. The method comprises the steps of acquiring the speech of the opposite party for a certain length of time in the process of answering the phone; sending the speech of the opposite party to a cloud server so as to enable the cloud server to perform speech analysis on the speech of the opposite party, acquiring speech feature points of the speech of the opposite party, matching the speech feature points of the speech of the opposite party with speech feature points in a pre-established malicious phone call speech feature database; and returning a malicious phone call prompt when the speech feature points are successfully matched; and displaying the malicious phone call prompt on a call interface according to the malicious phone call prompt fed back by the cloud server. The phone using security of users is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile equipment, and in particular relates to a method and device for identifying malicious calls. Background technique [0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the existing public telephone network cannot identify the source of harassing calls, and it is difficult to distinguish harassing calls from normal calls. The user presets the trusted phone number and isolates all other calls to prevent harassing calls, which greatly limits the use of the phone, so harassing calls are difficult to eliminate, and have been used by socia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L15/02G10L15/30H04M1/725H04L29/08
CPCG10L15/00H04M1/663
Inventor 王务志王军
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products