Methods, devices and equipment for recognizing malicious call and establishing recognition model
A technology for identifying models and malicious calls, which is applied in the field of communication and can solve the problems of reducing the accuracy of identifying malicious calls
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] In order to solve the problems existing in the background technology, an embodiment of the present invention provides a method for identifying a malicious call, which is applied to a computing device, and the functions implemented by the method for identifying a malicious call can be realized by calling program codes by a processor in the computing device , of course, the program code can be stored in a computer storage medium. It can be seen that the computing device includes at least a processor and a storage medium. Here, the computing device may be any computing device capable of information processing, such as a terminal or a server, wherein the terminal may be a computing device capable of calling, such as a tablet computer or a mobile phone.
[0050] figure 2 It is a schematic diagram of the implementation flow of a method for identifying malicious calls in the embodiment of the present invention, as figure 2 As shown, the method for identifying malicious call...
Embodiment 2
[0064] Based on the aforementioned embodiments, the embodiments of the present invention provide a recognition model based on the introduction of machine learning technology. Here, machine learning refers to relying on theories of probability, statistics, and neural propagation to enable computers to simulate human learning. behavior to acquire new knowledge or skills, and reorganize the existing knowledge structure to continuously improve its own performance. In the initial stage of forming the recognition model, it is necessary to manually select as many normal call events and malicious call events as possible as positive and negative samples for machine learning model training. This embodiment is based on the machine learning model to identify malicious calls. The identification logic is very complicated. Malicious users cannot detect and crack by simply adjusting the call number. In addition, because the model itself has the function of evolutionary learning, even if the ma...
Embodiment 3
[0093] Based on the foregoing embodiments, the embodiment of the present invention provides a method for identifying a malicious call, which is applied to a computing device, and the computing device is implemented as a server, and the functions implemented by the method for identifying a malicious call can be invoked by a processor in the server program code, of course, the program code can be stored in a computer storage medium, it can be seen that the server includes at least a processor and a storage medium.
[0094] Figure 3A It is a schematic diagram of the implementation flow of a method for identifying malicious calls in the embodiment of the present invention, as Figure 3A As shown, the method for identifying malicious calls includes:
[0095] Step S301, the server determines a first call event, and extracts characteristic parameters of the first call event.
[0096] Here, the first user establishes a communication connection with the second user through the serve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


