Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods, devices and equipment for recognizing malicious call and establishing recognition model

A technology for identifying models and malicious calls, which is applied in the field of communication and can solve the problems of reducing the accuracy of identifying malicious calls

Active Publication Date: 2017-11-10
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the emergence of number hiding services and network number changing technology, the accuracy of using the above method to identify malicious calls is reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, devices and equipment for recognizing malicious call and establishing recognition model
  • Methods, devices and equipment for recognizing malicious call and establishing recognition model
  • Methods, devices and equipment for recognizing malicious call and establishing recognition model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In order to solve the problems existing in the background technology, an embodiment of the present invention provides a method for identifying a malicious call, which is applied to a computing device, and the functions implemented by the method for identifying a malicious call can be realized by calling program codes by a processor in the computing device , of course, the program code can be stored in a computer storage medium. It can be seen that the computing device includes at least a processor and a storage medium. Here, the computing device may be any computing device capable of information processing, such as a terminal or a server, wherein the terminal may be a computing device capable of calling, such as a tablet computer or a mobile phone.

[0050] figure 2 It is a schematic diagram of the implementation flow of a method for identifying malicious calls in the embodiment of the present invention, as figure 2 As shown, the method for identifying malicious call...

Embodiment 2

[0064] Based on the aforementioned embodiments, the embodiments of the present invention provide a recognition model based on the introduction of machine learning technology. Here, machine learning refers to relying on theories of probability, statistics, and neural propagation to enable computers to simulate human learning. behavior to acquire new knowledge or skills, and reorganize the existing knowledge structure to continuously improve its own performance. In the initial stage of forming the recognition model, it is necessary to manually select as many normal call events and malicious call events as possible as positive and negative samples for machine learning model training. This embodiment is based on the machine learning model to identify malicious calls. The identification logic is very complicated. Malicious users cannot detect and crack by simply adjusting the call number. In addition, because the model itself has the function of evolutionary learning, even if the ma...

Embodiment 3

[0093] Based on the foregoing embodiments, the embodiment of the present invention provides a method for identifying a malicious call, which is applied to a computing device, and the computing device is implemented as a server, and the functions implemented by the method for identifying a malicious call can be invoked by a processor in the server program code, of course, the program code can be stored in a computer storage medium, it can be seen that the server includes at least a processor and a storage medium.

[0094] Figure 3A It is a schematic diagram of the implementation flow of a method for identifying malicious calls in the embodiment of the present invention, as Figure 3A As shown, the method for identifying malicious calls includes:

[0095] Step S301, the server determines a first call event, and extracts characteristic parameters of the first call event.

[0096] Here, the first user establishes a communication connection with the second user through the serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses methods, devices and equipment for recognizing a malicious call and establishing a recognition model. The method for recognizing the malicious call comprises the steps that characteristic parameters of a first call event are acquired, wherein the first call event is a call event between a first user and a second user, the characteristic parameters comprise parameters for describing call speech characteristics, the parameters for describing the call speech characteristics comprise a waveform characteristic parameter of a call speech and at least one of the number and the probability of first keywords in a text corresponding to the call speech; the first call event is recognized according to the characteristic parameters of the first call event and a current preset recognition model, wherein the recognition model takes the characteristic parameters as classification parameters; a recognition result, recognized by the recognition model, of the first call event is acquired; and the recognition result of the first call event is output.

Description

technical field [0001] The invention relates to the communication field, in particular to a method, device and equipment for identifying malicious calls and establishing an identification model. Background technique [0002] The rapid development of communication technology has brought a lot of convenience to people's work and daily life, but it has also brought a lot of troubles. In daily life, more and more lawbreakers rely on mobile phones or landlines. Malicious behavior of communication tools, for example, calling others to cause economic losses to others; therefore, when a user makes a call with a strange phone, it is necessary to identify whether the strange phone is a malicious call, so as to avoid the user’s economic loss . [0003] The identification method of malicious calls in the prior art mainly uses blacklist technology, and its process mainly includes: obtaining the phone number of the current call, judging whether the phone number has a preset blacklist, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/663H04M3/436G10L15/02G10L15/06
CPCG10L15/02G10L15/063G10L2015/0631H04M1/663H04M3/436G10L15/06H04M3/22
Inventor 李靖
Owner TENCENT TECH (SHENZHEN) CO LTD