Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Configuration method and device of speech feature library of malicious calls

A malicious call and voice feature technology, applied in telephone communication, speech analysis, speech recognition, etc., can solve problems such as sabotage, failure to identify the source of harassing calls, and limit the use of telephones

Inactive Publication Date: 2017-05-31
BEIJING QIHOO TECH CO LTD +1
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the existing public telephone network cannot identify the source of harassing calls, and it is difficult to distinguish harassing calls from normal calls. The user presets the trusted phone number and isolates all other calls to prevent harassing calls, which greatly limits the use of the phone, so harassing calls are difficult to eliminate, and have been used by social saboteurs and bad business competition. unlawful harassment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method and device of speech feature library of malicious calls
  • Configuration method and device of speech feature library of malicious calls
  • Configuration method and device of speech feature library of malicious calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The implementation of the present invention will be described in detail below with reference to the drawings and examples, so as to fully understand and implement the implementation process of how to use technical means to solve technical problems and achieve technical effects in the present invention.

[0100] In a typical configuration, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0101] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0102] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a configuration method and device of a speech feature library of malicious calls. When it is detected that a user selects a malicious call item according to the a user instruction in a call answering process, an incoming call of a calling party is marked as a malicious call, and a speech of the malicious call is recorded for a certain time length; and the speech of the malicious call is sent to a cloud-end server so that the cloud-end server carries out speech analysis on the speech of the malicious call, and obtains speech feature points of the malicious call, and the speech feature points of the malicious call are stored in a speech feature database of malicious calls. Thus, a malicious call which matches the speech feature points can be intercepted.

Description

technical field [0001] The invention belongs to the technical field of mobile devices, and in particular relates to a configuration method and device for a voice feature library of malicious calls. Background technique [0002] In the current society, the telephone is used without the consent of the caller to carry out compulsory and illegal telephone advertisements, telephone advertisements and faxes. They not only make harassing calls during the day but also often late at night, interfering with people's normal living and working environments unscrupulously , because many harassing calls are carried out through Internet telephony, and the existing public telephone network cannot identify the source of harassing calls, and it is difficult to distinguish harassing calls from normal calls. The user presets the trusted phone number and isolates all other calls to prevent harassing calls, which greatly limits the use of the phone, so harassing calls are difficult to eliminate, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/663H04M1/665H04M3/436G10L15/02
CPCG10L15/02H04M1/663H04M1/665H04M3/436H04M3/22G10L17/04
Inventor 王务志王军
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products