Recognition method and apparatus of malicious call

A malicious call and counterparty technology, applied in the direction of telephone communication, voice recognition, electrical components, etc., can solve the problems of illegal harassing activities, restricting the use of telephones, and unable to identify the source of harassing calls.

Inactive Publication Date: 2017-05-31
BEIJING QIHOO TECH CO LTD +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recognition method and apparatus of malicious call
  • Recognition method and apparatus of malicious call
  • Recognition method and apparatus of malicious call

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The implementation of the present invention will be described in detail below with reference to the drawings and examples, so as to fully understand and implement the implementation process of how to use technical means to solve technical problems and achieve technical effects in the present invention.

[0076] In a typical configuration, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0077] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0078] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a recognition method and apparatus of a malicious call. A cloud server receives voice of a certain duration of an opposite side, acquired by user equipment in a call-answering process; a voice analysis of the voice of the opposite side is conducted, and voice characteristic points of the voice of the opposite side are obtained; the voice characteristic points of the voice of the opposite side and voice characteristic points of a pre-established malicious call voice characteristic database are matched; a prompt of the malicious call is returned to the user equipment during successful matching; and the user equipment displays the prompt of the malicious call on a calling interface according to the prompt of the malicious call. According to the method and apparatus, the security of using the telephone by users is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile equipment, and in particular relates to a method and device for identifying malicious calls. Background technique [0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the existing public telephone network cannot identify the source of harassing calls, and it is difficult to distinguish harassing calls from normal calls. The user presets the trusted phone number and isolates all other calls to prevent harassing calls, which greatly limits the use of the phone, so harassing calls are difficult to eliminate, and have been used by socia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/663H04M1/665H04M3/436G10L15/02
CPCH04M1/663H04M1/665H04M3/436G10L15/02
Inventor 王务志王军
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products