[go: up one dir, main page]

CN106341539A - Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof - Google Patents

Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof Download PDF

Info

Publication number
CN106341539A
CN106341539A CN201610827254.XA CN201610827254A CN106341539A CN 106341539 A CN106341539 A CN 106341539A CN 201610827254 A CN201610827254 A CN 201610827254A CN 106341539 A CN106341539 A CN 106341539A
Authority
CN
China
Prior art keywords
caller
malicious
malice
voiceprint
vocal print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610827254.XA
Other languages
Chinese (zh)
Inventor
曹保康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610827254.XA priority Critical patent/CN106341539A/en
Publication of CN106341539A publication Critical patent/CN106341539A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/74Details of telephonic subscriber devices with voice recognition means

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提供一种恶意来电者声纹的自动取证方法和装置,确定来电呼叫相对应的来电号码为恶意来电;获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征;判断该来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储该来电者的声纹特征到该恶意声纹数据库中。这样,只要来电被识别为恶意来电,来电者的声纹特征即被存储到恶意声纹数据库中,这个恶意来电者使用其他电话号码再次呼叫用户时便会被识别出来,及时的提示用户,提高了安全性并节约了用户时间。本发明还提供一种移动终端。

The present invention provides a method and device for automatically obtaining evidence of the voiceprint of a malicious caller, which determines that the incoming number corresponding to the incoming call is a malicious call; obtains the voice data of the caller during the call, and extracts the voiceprint of the caller from the voice data Features: judging whether the caller's voiceprint feature has been stored in the malicious voiceprint database, if not stored, then storing the caller's voiceprint feature in the malicious voiceprint database. In this way, as long as the incoming call is identified as a malicious call, the caller's voiceprint features will be stored in the malicious voiceprint database, and the malicious caller will be identified when he calls the user again with another phone number, prompting the user in time, improving This increases security and saves user time. The invention also provides a mobile terminal.

Description

恶意来电者声纹的自动取证方法、装置和移动终端Automatic evidence collection method, device and mobile terminal of voiceprint of malicious caller

技术领域technical field

本发明涉及通话安全技术领域,具体而言,本发明涉及一种恶意来电者声纹的自动取证方法、装置和移动终端。The present invention relates to the technical field of call security, in particular, the present invention relates to a method, device and mobile terminal for automatic evidence collection of voiceprints of malicious callers.

背景技术Background technique

近年来,电话诈骗、电话推销、电话骚扰等恶意电话行为越来越猖獗,电信用户不胜其扰。一些手机安全软件例如360手机卫士,会将这些被众多用户举报为恶意来电的电话号码统一标识为恶意号码,并在该电话号码进行呼叫时提示被叫用户该电话号码为恶意号码,使得被叫用户可以有效分辨,避免被骗或者浪费时间,这在一定程度上保证了用户安全和节约了用户时间。然而,如果这些恶意来电者更换了电话号码再次进行恶意电话行为,则由于刚开始时该电话号码并没有被有效标识,导致被叫用户存在被骗的风险并且会浪费用户时间,安全性和效率都有待提高。In recent years, malicious telephone behaviors such as telephone fraud, telemarketing, and telephone harassment have become more and more rampant, and telecom users have been disturbed. Some mobile phone security software, such as 360 Mobile Guard, will uniformly identify these phone numbers reported by many users as malicious calls as malicious numbers, and prompt the called user that the phone number is a malicious number when the phone number is called, making the called party Users can effectively distinguish and avoid being cheated or wasting time, which ensures user safety and saves user time to a certain extent. However, if these malicious callers change their phone numbers and make malicious phone calls again, since the phone number was not effectively identified at the beginning, the called user has the risk of being cheated and will waste user time, security and efficiency Both need to be improved.

发明内容Contents of the invention

本发明的目的旨在至少能解决上述的技术缺陷之一,特别是安全性不佳的技术缺陷。The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially the technical defect of poor safety.

本发明提供一种恶意来电者声纹的自动取证方法,包括如下步骤:The present invention provides a method for automatically obtaining evidence of a voiceprint of a malicious caller, comprising the following steps:

确定来电呼叫相对应的来电号码为恶意来电;Determine that the incoming call number corresponding to the incoming call is a malicious call;

获取通话过程中来电者的语音数据,从所述语音数据中提取来电者的声纹特征;Obtain the voice data of the caller during the call, and extract the voiceprint features of the caller from the voice data;

判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储所述来电者的声纹特征到所述恶意声纹数据库中。It is judged whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, and if not stored, the voiceprint feature of the caller is stored in the malicious voiceprint database.

在其中一个实施例中,所述确定来电呼叫相对应的来电号码为恶意来电的过程包括:In one of the embodiments, the process of determining that the incoming number corresponding to the incoming call is a malicious incoming call includes:

获取来电呼叫相对应的来电号码;Obtain the incoming call number corresponding to the incoming call;

确定来电号码为恶意来电,并确定其恶意类型。Determine that the incoming number is a malicious call, and determine its malicious type.

在其中一个实施例中,所述恶意类型多于一种,包括诈骗类型、推销类型、骚扰类型中的至少之一。In one embodiment, the malicious types are more than one, including at least one of fraudulent, promotional, and harassment types.

在其中一个实施例中,所述恶意声纹数据库多于一个,每个恶意声纹数据库对应各自的恶意类型,每个恶意声纹数据库存储有对应恶意类型的预存声纹特征。In one of the embodiments, there are more than one malicious voiceprint databases, each malicious voiceprint database corresponds to a respective malicious type, and each malicious voiceprint database stores pre-existing voiceprint features corresponding to malicious types.

在其中一个实施例中,所述预存声纹特征与电话号码相关联。In one of the embodiments, the pre-stored voiceprint feature is associated with a phone number.

在其中一个实施例中,所述判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中包括:In one of the embodiments, the judging whether the caller's voiceprint features have been stored in the malicious voiceprint database includes:

从所述恶意声纹数据库中获取与所述来电号码关联的预存声纹特征,判断所述来电者的声纹特征是否与所述预存声纹特征匹配。Acquiring the pre-stored voiceprint features associated with the caller number from the malicious voiceprint database, and judging whether the caller's voiceprint features match the pre-stored voiceprint features.

在其中一个实施例中,所述确定来电呼叫相对应的来电号码为恶意来电的过程包括:In one of the embodiments, the process of determining that the incoming number corresponding to the incoming call is a malicious incoming call includes:

判断所述来电号码是否已经存储在恶意号码黑名单中,若是则确定对应的来电为恶意来电。Judging whether the incoming call number has been stored in the malicious number blacklist, and if so, determining that the corresponding incoming call is a malicious incoming call.

在其中一个实施例中,所述恶意号码黑名单存储在本地或服务器。In one of the embodiments, the blacklist of malicious numbers is stored locally or on a server.

在其中一个实施例中,所述来电者的声纹特征为携带具有特征字或词的言语信息的声波频谱。In one of the embodiments, the caller's voiceprint is characterized by a sound wave spectrum carrying speech information with characteristic words or phrases.

在其中一个实施例中,所述获取通话过程中的来电者语音数据,从所述语音数据中提取来电者的声纹特征的过程包括:In one of the embodiments, the process of acquiring the voice data of the caller during the call, and extracting the voiceprint features of the caller from the voice data includes:

检测到来电者产生语音流时,记录并存储至少一段语音数据;When detecting that a caller generates a voice stream, record and store at least one piece of voice data;

解析所述至少一段语音数据以提取来电者的声纹特征。Analyzing the at least one piece of voice data to extract the voiceprint feature of the caller.

在其中一个实施例中,所述解析所述至少一段语音数据以提取来电者的声纹特征包括:In one of the embodiments, the analyzing the at least one piece of voice data to extract the voiceprint feature of the caller includes:

解析所述至少一段语音数据,提取语音数据中至少一组特征字或词;Analyzing the at least one piece of speech data, extracting at least one set of characteristic words or words in the speech data;

根据所述特征字或词提取来电者的声纹特征。The voiceprint features of the caller are extracted according to the feature words or words.

在其中一个实施例中,所述语音数据为设定时长的语音数据。In one of the embodiments, the voice data is voice data with a set duration.

在其中一个实施例中,提取来电者的声纹特征成功后,或确认无法提取来电者的声纹特征后,删除所述语音数据。In one embodiment, after the voiceprint feature of the caller is successfully extracted, or after it is confirmed that the voiceprint feature of the caller cannot be extracted, the voice data is deleted.

在其中一个实施例中,所述存储所述来电者的声纹特征到所述恶意声纹数据库中包括:In one of the embodiments, storing the voiceprint features of the caller in the malicious voiceprint database includes:

存储与所述来电号码建立有映射关系的所述来电者的声纹特征到所述恶意声纹数据库中。Storing the caller's voiceprint feature mapped with the caller number into the malicious voiceprint database.

在其中一个实施例中,所述恶意声纹数据库建立在服务器。In one of the embodiments, the malicious voiceprint database is established on a server.

本发明还提供一种恶意来电者声纹的自动取证装置,其包括:The present invention also provides an automatic evidence collection device for the voiceprint of a malicious caller, which includes:

识别模块,用于确定来电呼叫相对应的来电号码为恶意来电;An identification module, configured to determine that the incoming number corresponding to the incoming call is a malicious incoming call;

分析模块,用于获取通话过程中来电者的语音数据,从所述语音数据中提取来电者的声纹特征;The analysis module is used to obtain the voice data of the caller during the call, and extract the voiceprint feature of the caller from the voice data;

存储模块,用于判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储所述来电者的声纹特征到所述恶意声纹数据库中。The storage module is used to judge whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, and if not, store the voiceprint feature of the caller in the malicious voiceprint database.

在其中一个实施例中,所述识别模块用于:In one of the embodiments, the identification module is used for:

获取来电呼叫相对应的来电号码;Obtain the incoming call number corresponding to the incoming call;

确定来电号码为恶意来电,并确定其恶意类型。Determine that the incoming number is a malicious call, and determine its malicious type.

在其中一个实施例中,所述恶意类型多于一种,包括诈骗类型、推销类型、骚扰类型中的至少之一。In one embodiment, the malicious types are more than one, including at least one of fraudulent, promotional, and harassment types.

在其中一个实施例中,所述恶意声纹数据库多于一个,每个恶意声纹数据库对应各自的恶意类型,每个恶意声纹数据库存储有对应恶意类型的预存声纹特征。In one of the embodiments, there are more than one malicious voiceprint databases, each malicious voiceprint database corresponds to a respective malicious type, and each malicious voiceprint database stores pre-existing voiceprint features corresponding to malicious types.

在其中一个实施例中,所述预存声纹特征与电话号码相关联。In one of the embodiments, the pre-stored voiceprint feature is associated with a phone number.

在其中一个实施例中,所述存储模块用于:In one of the embodiments, the storage module is used for:

从所述恶意声纹数据库中获取与所述来电号码关联的预存声纹特征,判断所述来电者的声纹特征是否与所述预存声纹特征匹配。Acquiring the pre-stored voiceprint features associated with the caller number from the malicious voiceprint database, and judging whether the caller's voiceprint features match the pre-stored voiceprint features.

在其中一个实施例中,所述识别模块用于:In one of the embodiments, the identification module is used for:

判断所述来电号码是否已经存储在恶意号码黑名单中,若是则确定对应的来电为恶意来电。Judging whether the incoming call number has been stored in the malicious number blacklist, and if so, determining that the corresponding incoming call is a malicious incoming call.

在其中一个实施例中,所述恶意号码黑名单存储在本地或服务器。In one of the embodiments, the blacklist of malicious numbers is stored locally or on a server.

在其中一个实施例中,所述来电者的声纹特征为携带具有特征字或词的言语信息的声波频谱。In one of the embodiments, the caller's voiceprint is characterized by a sound wave spectrum carrying speech information with characteristic words or phrases.

在其中一个实施例中,所述分析模块用于:In one of the embodiments, the analysis module is used for:

检测到来电者产生语音流时,记录并存储至少一段语音数据;When detecting that a caller generates a voice stream, record and store at least one piece of voice data;

解析所述至少一段语音数据以提取来电者的声纹特征。Analyzing the at least one piece of voice data to extract the voiceprint feature of the caller.

在其中一个实施例中,所述解析所述至少一段语音数据以提取来电者的声纹特征包括:In one of the embodiments, the analyzing the at least one piece of voice data to extract the voiceprint feature of the caller includes:

解析所述至少一段语音数据,提取语音数据中至少一组特征字或词;Analyzing the at least one piece of speech data, extracting at least one set of characteristic words or words in the speech data;

根据所述特征字或词提取来电者的声纹特征。The voiceprint features of the caller are extracted according to the feature words or words.

在其中一个实施例中,所述语音数据为设定时长的语音数据。In one of the embodiments, the voice data is voice data with a set duration.

在其中一个实施例中,所述装置还包括删除模块;所述删除模块用于在所述分析模块提取来电者的声纹特征成功后,或确认无法提取来电者的声纹特征后,删除所述语音数据。In one of the embodiments, the device further includes a deletion module; the deletion module is used to delete the caller's voiceprint feature after the analysis module successfully extracts the caller's voiceprint feature, or after confirming that the caller's voiceprint feature cannot be extracted. voice data.

在其中一个实施例中,所述存储模块用于:In one of the embodiments, the storage module is used for:

存储与所述来电号码建立有映射关系的所述来电者的声纹特征到所述恶意声纹数据库中。Storing the caller's voiceprint feature mapped with the caller number into the malicious voiceprint database.

在其中一个实施例中,所述恶意声纹数据库建立在服务器。In one of the embodiments, the malicious voiceprint database is established on a server.

本发明还提供一种移动终端,其包括:The present invention also provides a mobile terminal, which includes:

触敏显示器;touch-sensitive display;

一个或多个处理器;one or more processors;

存储器;memory;

一个或多个应用程序,其中所述一个或多个应用程序被存储在所述存储器中并被配置为由所述一个或多个处理器执行,所述一个或多个程序配置用于:执行任一实施例所述的恶意来电者声纹的自动取证方法。one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more program programs are configured to: execute The automatic forensics method for the voiceprint of a malicious caller described in any one of the embodiments.

上述的恶意来电者声纹的自动取证方法、装置和移动终端,确定来电呼叫相对应的来电号码为恶意来电;获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征;判断该来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储该来电者的声纹特征到该恶意声纹数据库中。这样,只要来电被识别为恶意来电,来电者的声纹特征即被存储到恶意声纹数据库中,这个恶意来电者使用其他电话号码再次呼叫用户时便会被识别出来,及时的提示用户,提高了安全性并节约了用户时间。The above-mentioned automatic evidence collection method, device and mobile terminal for the voiceprint of a malicious caller determine that the incoming number corresponding to the incoming call is a malicious call; obtain the voice data of the caller during the call, and extract the voiceprint of the caller from the voice data Features: judging whether the caller's voiceprint feature has been stored in the malicious voiceprint database, if not stored, then storing the caller's voiceprint feature in the malicious voiceprint database. In this way, as long as the incoming call is identified as a malicious call, the caller's voiceprint features will be stored in the malicious voiceprint database, and the malicious caller will be identified when he calls the user again with another phone number, prompting the user in time, improving This increases security and saves user time.

而且,通过收集恶意来电者的声纹特征,使得恶意来电者即使正常的日常通话都会被提示为恶意来电,可以有效遏制恶意来电者不再进行恶意电话行为。如果在一段预设的考察时长内恶意来电者的来电不再被用户举报为恶意来电,则还可以删除恶意声纹数据库中的该来电者的声纹特征。Moreover, by collecting the voiceprint characteristics of the malicious caller, the malicious caller will be prompted as a malicious call even if the normal daily call is made, which can effectively curb the malicious caller from making malicious phone calls. If the incoming call of the malicious caller is no longer reported as a malicious call by the user within a preset investigation period, the voiceprint feature of the caller in the malicious voiceprint database can also be deleted.

本发明附加的方面和优点将在下面的描述中部分给出,这些将从下面的描述中变得明显,或通过本发明的实践了解到。Additional aspects and advantages of the invention will be set forth in part in the description which follows, and will become apparent from the description, or may be learned by practice of the invention.

附图说明Description of drawings

本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present invention will become apparent and easy to understand from the following description of the embodiments in conjunction with the accompanying drawings, wherein:

图1为一个实施例的恶意来电者声纹的自动取证方法流程图;Fig. 1 is the flow chart of the method for automatically obtaining evidence of a malicious caller's voiceprint of an embodiment;

图2为一个实施例的恶意来电者声纹的自动取证装置模块图;Fig. 2 is the block diagram of the automatic forensic collection device of the malicious caller's voiceprint of an embodiment;

图3示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。Fig. 3 shows a block diagram of a partial structure of a mobile phone related to a terminal provided by an embodiment of the present invention.

具体实施方式detailed description

下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能解释为对本发明的限制。Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

本技术领域技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式。应该进一步理解的是,本发明的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。应该理解,当我们称元件被“连接”或“耦接”到另一元件时,它可以直接连接或耦接到其他元件,或者也可以存在中间元件。此外,这里使用的“连接”或“耦接”可以包括无线连接或无线耦接。这里使用的措辞“和/或”包括一个或更多个相关联的列出项的全部或任一单元和全部组合。Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and/or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Additionally, "connected" or "coupled" as used herein may include wireless connection or wireless coupling. The expression "and/or" used herein includes all or any elements and all combinations of one or more associated listed items.

本技术领域技术人员可以理解,除非另外定义,这里使用的所有术语(包括技术术语和科学术语),具有与本发明所属领域中的普通技术人员的一般理解相同的意义。还应该理解的是,诸如通用字典中定义的那些术语,应该被理解为具有与现有技术的上下文中的意义一致的意义,并且除非像这里一样被特定定义,否则不会用理想化或过于正式的含义来解释。Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art to which this invention belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be understood to have meanings consistent with their meaning in the context of the prior art, and unless specifically defined as herein, are not intended to be idealized or overly Formal meaning to explain.

本技术领域技术人员可以理解,这里所使用的“终端”、“终端设备”既包括无线信号接收器的设备,其仅具备无发射能力的无线信号接收器的设备,又包括接收和发射硬件的设备,其具有能够在双向通讯链路上,执行双向通讯的接收和发射硬件的设备。这种设备可以包括:蜂窝或其他通讯设备,其具有单线路显示器或多线路显示器或没有多线路显示器的蜂窝或其他通讯设备;PCS(Personal Communications Service,个人通讯系统),其可以组合语音、数据处理、传真和/或数据通讯能力;PDA(Personal Digital Assistant,个人数字助理),其可以包括射频接收器、寻呼机、互联网/内联网访问、网络浏览器、记事本、日历和/或GPS(Global Positioning System,全球定位系统)接收器;常规膝上型和/或掌上型计算机或其他设备,其具有和/或包括射频接收器的常规膝上型和/或掌上型计算机或其他设备。这里所使用的“终端”、“终端设备”可以是便携式、可运输、安装在交通工具(航空、海运和/或陆地)中的,或者适合于和/或配置为在本地运行,和/或以分布形式,运行在地球和/或空间的任何其他位置运行。这里所使用的“终端”、“终端设备”还可以是通讯终端、上网终端、音乐/视频播放终端,例如可以是PDA、MID(Mobile Internet Device,移动互联网设备)和/或具有音乐/视频播放功能的移动电话,也可以是智能电视、机顶盒等设备。Those skilled in the art can understand that the "terminal" and "terminal equipment" used here not only include wireless signal receiver equipment, which only has wireless signal receiver equipment without transmission capabilities, but also include receiving and transmitting hardware. A device having receiving and transmitting hardware capable of performing bi-directional communication over a bi-directional communication link. Such equipment may include: cellular or other communication equipment, which has a single-line display or a multi-line display or a cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice, data Processing, facsimile and/or data communication capabilities; PDA (Personal Digital Assistant, Personal Digital Assistant), which may include radio frequency receiver, pager, Internet/Intranet access, web browser, notepad, calendar and/or GPS (Global Positioning System (Global Positioning System) receiver; a conventional laptop and/or palmtop computer or other device having and/or including a radio frequency receiver. As used herein, a "terminal", "terminal device" may be portable, transportable, installed in a vehicle (air, sea, and/or land), or adapted and/or configured to operate locally, and/or In distributed form, the operation operates at any other location on Earth and/or in space. The "terminal" and "terminal equipment" used here can also be a communication terminal, an Internet terminal, a music/video player terminal, such as a PDA, a MID (Mobile Internet Device, a mobile Internet device) and/or a music/video player Functional mobile phones, smart TVs, set-top boxes and other devices.

本技术领域技术人员可以理解,这里所使用的远端网络设备,其包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云。在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个超级虚拟计算机。本发明的实施例中,远端网络设备、终端设备与WNS服务器之间可通过任何通讯方式实现通讯,包括但不限于,基于3GPP、LTE、WIMAX的移动通讯、基于TCP/IP、UDP协议的计算机网络通讯以及基于蓝牙、红外传输标准的近距无线传输方式。Those skilled in the art can understand that the remote network device used here includes, but is not limited to, a computer, a network host, a single network server, a set of multiple network servers, or a cloud formed by multiple servers. Here, the cloud is composed of a large number of computers or network servers based on cloud computing (Cloud Computing), wherein cloud computing is a kind of distributed computing, a super virtual computer composed of a group of loosely coupled computer sets. In the embodiment of the present invention, the communication between the remote network equipment, the terminal equipment and the WNS server can be realized through any communication method, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, UDP protocol Computer network communication and short-distance wireless transmission based on bluetooth and infrared transmission standards.

以下描述的恶意来电者声纹的自动取证方法和装置,可以应用于移动终端,例如应用于手机、平板电脑,总之是具有通信功能的终端,在以下说明中以终端为例子。The method and device for automatically obtaining evidence of a malicious caller's voiceprint described below can be applied to mobile terminals, such as mobile phones and tablet computers, in short, terminals with communication functions. In the following description, terminals are used as examples.

图1为一个实施例的恶意来电者声纹的自动取证方法流程图。FIG. 1 is a flow chart of an embodiment of an automatic forensics method for a voiceprint of a malicious caller.

本发明提供一种恶意来电者声纹的自动取证方法,包括如下步骤:The present invention provides a method for automatically obtaining evidence of a voiceprint of a malicious caller, comprising the following steps:

步骤S100:确定来电呼叫相对应的来电号码为恶意来电。Step S100: Determine that the incoming number corresponding to the incoming call is a malicious incoming call.

可以在本机或服务器预先建立好恶意号码黑名单,当终端收到来电时,获取来电号码,判断来电号码是否已经存储在恶意号码黑名单中,若是则确定对应的来电为恶意来电。如果恶意号码黑名单存储在本机,则在本地进行识别;如果恶意号码黑名单存储在服务器,则在服务器进行识别,服务器将识别结果反馈给终端。A blacklist of malicious numbers can be pre-established on the local machine or server. When the terminal receives an incoming call, it obtains the incoming call number and judges whether the incoming call number has been stored in the malicious number blacklist. If so, it determines that the corresponding incoming call is a malicious call. If the blacklist of malicious numbers is stored in the local machine, it will be identified locally; if the blacklist of malicious numbers is stored in the server, it will be identified on the server, and the server will feed back the identification result to the terminal.

恶意号码黑名单既可以是由用户自行建立的黑名单,例如用户在接到某些恶意电话时将该电话号码添加到黑名单中,这个时候恶意号码黑名单可以存储在本地,用户还可以分享该恶意号码黑名单到服务器。当然,恶意号码黑名单也可以是由服务器建立的黑名单,例如服务器将众多用户举报的电话号码列入黑名单中,这个时候恶意号码黑名单可以存储在服务器,用户还可以主动到服务器请求获取该恶意号码黑名单。The blacklist of malicious numbers can be a blacklist established by the user. For example, when the user receives some malicious calls, the phone number is added to the blacklist. At this time, the blacklist of malicious numbers can be stored locally, and the user can also share it. The malicious numbers are blacklisted to the server. Of course, the blacklist of malicious numbers can also be a blacklist established by the server. For example, the server blacklists the phone numbers reported by many users. At this time, the blacklist of malicious numbers can be stored on the server, and the user can also request to obtain it from the server. The blacklist of malicious numbers.

恶意号码黑名单既可以是一个黑名单,也可以按照恶意类型分成多个恶意号码名单。例如恶意类型可以分为诈骗类型、推销类型、骚扰类型等等,则恶意号码黑名单可以分成诈骗黑名单、推销黑名单、骚扰黑名单。终端在识别到来电号码是属于哪个恶意号码黑名单中,然后进行相应的提示。例如识别来电号码是属于诈骗黑名单中的,则提示用户来电为诈骗来电。因此,当还对恶意类型进行细分时,终端可以获取来电呼叫相对应的来电号码,确定来电号码为恶意来电,并确定其恶意类型。具体过程为:终端获取来电呼叫相对应的来电号码后,将来电号码在多个恶意号码黑名单中进行比对,当某一恶意类型的恶意号码黑名单中存储有该电话号码时,则确定该电话号码为恶意来电号码,并确定其恶意类型。The malicious number blacklist can be a blacklist, or can be divided into multiple malicious number lists according to malicious types. For example, malicious types can be divided into fraud types, sales types, harassment types, etc., and malicious number blacklists can be divided into fraud blacklists, sales blacklists, and harassment blacklists. The terminal recognizes which malicious number blacklist the incoming call number belongs to, and then prompts accordingly. For example, if it is identified that the number of the incoming call belongs to the fraud blacklist, the user is prompted that the incoming call is a fraudulent call. Therefore, when the malicious type is further subdivided, the terminal can obtain the corresponding incoming call number of the incoming call, determine that the incoming call number is a malicious incoming call, and determine its malicious type. The specific process is: after the terminal obtains the corresponding incoming call number of the incoming call, it compares the incoming call number in multiple blacklists of malicious numbers. The phone number is a malicious caller number, and its malicious type is determined.

步骤S200:获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征。Step S200: Obtain the voice data of the caller during the call, and extract the voiceprint features of the caller from the voice data.

由于每个人的声音器官,诸如声带、口腔、鼻腔、舌、齿、唇、肺等,在发音时呈现千姿百态。由于年龄、性格、语言习惯等多种原因,再加上发音容量大小不一,发音频率不尽相同,哪怕是微小的差异,也会导致这些器官发出的声音必然有着各自的特点,从而形成每个人独具一格的声纹(Voiceprint),可用语谱图观察出来。Because each person's vocal organs, such as vocal cords, oral cavity, nasal cavity, tongue, teeth, lips, lungs, etc., present in various poses and with different expressions when they pronounce. Due to various reasons such as age, personality, language habits, etc., coupled with different pronunciation volumes and pronunciation frequencies, even small differences will cause the sounds produced by these organs to have their own characteristics, thus forming each Individual's unique voiceprint (Voiceprint) can be observed by spectrogram.

声纹识别,就是从某段语音中识别出说话人的身份的过程。与指纹类似,每个人说话过程中蕴涵的语音特征和发音习惯等也几乎是唯一的。语音识别是共性识别,判定所说的内容(说的什么)。声纹识别是个性识别,判定说话人身份(是谁说的)。Voiceprint recognition is the process of identifying the identity of the speaker from a certain segment of voice. Similar to fingerprints, the speech features and pronunciation habits of each person's speech are almost unique. Speech recognition is generic recognition, which determines what is said (what is said). Voiceprint recognition is personality recognition, which determines the identity of the speaker (who said it).

声纹识别有两个关键问题,一是特征提取,二是模式识别。There are two key issues in voiceprint recognition, one is feature extraction, and the other is pattern recognition.

特征提取的任务是提取并选择对说话人的声纹具有可分性强、稳定性高等特性的声学或语言特征。虽然目前大部分声纹识别系统用的都是声学层面的特征,但是表征一个人特点的特征应该是多层面的,包括:(1)与人类的发音机制的解剖学结构有关的声学特征(如频谱、倒频谱、共振峰、基音、反射系数等等)、鼻音、带深呼吸音、沙哑音、笑声等;(2)受社会经济状况、受教育水平、出生地等影响的语义、修辞、发音、言语习惯等;(3)个人特点或受父母影响的韵律、节奏、速度、语调、音量等特征。从利用数学方法可以建模的角度出发,声纹自动识别模型目前可以使用的特征包括:(1)声学特征(倒频谱);(2)词法特征(说话人相关的词n-gram,音素n-gram);(3)韵律特征(利用n-gram描述的基音和能量“姿势”);(4)语种、方言和口音信息;(5)通道信息(使用何种通道);等等。The task of feature extraction is to extract and select acoustic or language features that have strong separability and high stability for the speaker's voiceprint. Although most voiceprint recognition systems currently use features at the acoustic level, the features that characterize a person's characteristics should be multi-level, including: (1) acoustic features related to the anatomical structure of the human pronunciation mechanism (such as Spectrum, cepstrum, formant, pitch, reflection coefficient, etc.), nasal, breathy, hoarse, laughter, etc.; (2) Semantics, rhetoric, Pronunciation, speech habits, etc.; (3) Personal characteristics or characteristics such as rhythm, rhythm, speed, intonation, and volume influenced by parents. From the perspective of using mathematical methods to model, the current features that can be used in the voiceprint automatic recognition model include: (1) acoustic features (cepstrum); (2) lexical features (speaker-related word n-gram, phoneme n -gram); (3) prosodic features (using the pitch and energy "posture" described by n-gram); (4) language, dialect and accent information; (5) channel information (which channel to use); and so on.

对于模式识别,主要有这几大类方法:(1)模板匹配方法:利用动态时间弯折(DTW)以对准训练和测试特征序列,主要用于固定词组的应用(通常为文本相关任务);(2)最近邻方法:训练时保留所有特征矢量,识别时对每个矢量都找到训练矢量中最近的K个,据此进行识别,通常模型存储和相似计算的量都很大;(3)神经网络方法:有很多种形式,如多层感知、径向基函数(RBF)等,可以显式训练以区分说话人和其背景说话人,其训练量很大,且模型的可推广性不好;(4)隐式马尔可夫模型(HMM)方法:通常使用单状态的HMM,或高斯混合模型(GMM),是比较流行的方法,效果比较好;(5)VQ聚类方法(如LBG,K-均值):效果比较好,算法复杂度也不高,和HMM方法配合起来更可以收到更好的效果;(6)多项式分类器方法:有较高的精度,但模型存储和计算量都比较大。For pattern recognition, there are mainly these categories of methods: (1) Template matching method: use dynamic time warping (DTW) to align training and test feature sequences, mainly for the application of fixed phrases (usually text-related tasks) ; (2) Nearest neighbor method: keep all feature vectors during training, and find the nearest K training vectors for each vector during recognition, and identify them accordingly. Usually, the amount of model storage and similar calculation is very large; (3 ) Neural network method: There are many forms, such as multi-layer perception, radial basis function (RBF), etc., which can be explicitly trained to distinguish speakers from their background speakers. The amount of training is large, and the model can be generalized Not good; (4) Hidden Markov Model (HMM) method: Usually single-state HMM, or Gaussian Mixture Model (GMM), is a more popular method, and the effect is better; (5) VQ clustering method ( Such as LBG, K-means): the effect is better, the algorithm complexity is not high, and it can receive better results when combined with the HMM method; (6) polynomial classifier method: has higher accuracy, but the model storage And the amount of calculation is relatively large.

其中模板匹配法的要点是,在训练过程中从每个说话人的训练语句中提取相应的特征矢量来描述各个说话人的行为;在测试阶段,从说话人的测试语音信号中用同样的方法提取测试模板,主要有动态时间规整方法和矢量量化方法。在以下的描述中,以模板匹配法为例。The main point of the template matching method is to extract the corresponding feature vector from each speaker's training sentence to describe the behavior of each speaker during the training process; in the test phase, use the same method from the speaker's test voice signal There are mainly dynamic time warping methods and vector quantization methods for extracting test templates. In the following description, the template matching method is taken as an example.

由于每个人的声纹都是唯一的,因此可以通过解析来电者的声音以获取来电者的声纹特征从而识别恶意来电者,来电者的声纹特征为携带具有特征字或词的言语信息的声波频谱。例如,终端可以在检测到来电者正在说话(产生语音流)时,记录并存储至少一段语音数据;然后解析至少一段语音数据以提取来电者的声纹特征。该语音数据可以为设定时长的语音数据,例如设定时长为10秒,从检测到来电者正在说话时开始录音,录音10秒。Since each person's voiceprint is unique, malicious callers can be identified by analyzing the caller's voice to obtain the caller's voiceprint features. The caller's voiceprint features carry speech information with characteristic words or words Sound spectrum. For example, when detecting that the caller is speaking (generating a voice stream), the terminal can record and store at least one piece of voice data; then analyze at least one piece of voice data to extract the voiceprint feature of the caller. The voice data can be voice data with a set duration, for example, the set duration is 10 seconds, and the recording starts when it is detected that the caller is speaking, and the recording is 10 seconds.

获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征可以通过如下过程实现:解析至少一段语音数据,提取语音数据中至少一组特征字或词;根据该特征字或词提取来电者的声纹特征。Obtaining the voice data of the caller during the call, and extracting the voiceprint features of the caller from the voice data can be achieved through the following process: parsing at least one piece of voice data, extracting at least one group of feature words or words in the voice data; Or words to extract the voiceprint features of the caller.

特征字或词是预先设置好的,这是因为通常诈骗者、推销者、骚扰者都会在通话中说出特定的字或词,例如“你好”、“喂”、“请问”、“你是”、“先生”、“女士”、“吗”等等特征字或词,通过在语音数据中识别这些特征字或词,可以有效提高声纹识别的效率。例如,在语音片段中识别出了来电者说的句子“你好,请问你是唐伯虎先生吗”,终端提取出“你好”、“请问”、“你是”、“先生”、“吗”这五组特征字或词,然后根据这些特征字或词提取来电者的声纹特征。Feature words or words are pre-set, this is because usually scammers, salesmen, harassers will say specific words or words in the call, such as "hello", "hello", "excuse me", "you "Yes", "Mr", "Ms", "What" and other characteristic words or words, by identifying these characteristic words or words in the voice data, the efficiency of voiceprint recognition can be effectively improved. For example, the sentence "Hello, are you Mr. Tang Bohu" is recognized in the voice clip, and the terminal extracts "Hello", "Excuse me", "Are you", "Sir", "are you" These five groups of feature words or words, and then extract the voiceprint features of the caller according to these feature words or words.

如果下述的恶意声纹数据库中没有存储有与本次获取到的来电者的第一声纹特征对应的声纹特征,则在本次存储该来电者的第一声纹特征后,后续如果该来电者使用其他电话号码再次呼叫其他用户,通常也会说出上述的特征字或词,则终端可以根据特征字或词提取到来电者的第二声纹特征,将来电者的第一声纹特征与来电者的第二声纹特征进行对比识别恶意来电。If there is no voiceprint feature corresponding to the first voiceprint feature of the caller acquired this time in the following malicious voiceprint database, after storing the first voiceprint feature of the caller this time, if The caller uses another phone number to call other users again, and usually also speaks the above-mentioned characteristic words or words, then the terminal can extract the second voiceprint feature of the caller according to the characteristic words or words, and the caller's first voice The fingerprint feature is compared with the second voiceprint feature of the caller to identify malicious calls.

获取的语音数据会存储或暂时存储在终端的存储介质中,当提取来电者的声纹特征成功后,或确认无法提取来电者的声纹特征后,终端可以删除语音片段,以节约终端的存储空间。The acquired voice data will be stored or temporarily stored in the storage medium of the terminal. When the voiceprint feature of the caller is successfully extracted, or after confirming that the voiceprint feature of the caller cannot be extracted, the terminal can delete the voice segment to save terminal storage space.

步骤S300:判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储来电者的声纹特征到恶意声纹数据库中。Step S300: Determine whether the caller's voiceprint features have been stored in the malicious voiceprint database, and if not, store the caller's voiceprint features in the malicious voiceprint database.

终端提取来电者的来电者的声纹特征后,判断来电者的声纹特征是否已经存储在恶意声纹数据库中。恶意声纹数据库存储有与电话号码相关联的预存声纹特征,这些预存声纹特征是服务器在之前的众多恶意来电中收集并存储的,并在收集后将预存声纹特征与对应的电话号码建立好映射关系。因此,恶意声纹数据库建立在服务器。After extracting the caller's voiceprint features of the caller, the terminal judges whether the caller's voiceprint features have been stored in the malicious voiceprint database. The malicious voiceprint database stores pre-stored voiceprint features associated with phone numbers. These pre-stored voiceprint features are collected and stored by the server in many previous malicious calls. After collection, the pre-stored voiceprint features and corresponding phone numbers Establish a good mapping relationship. Therefore, the malicious voiceprint database is established on the server.

恶意声纹数据库可能不止一个,例如可以是多于一个的恶意声纹数据库,每个恶意声纹数据库对应各自的恶意类型。例如恶意类型多于种,可以分为诈骗类型、推销类型、骚扰类型等等,则恶意声纹数据库可以分成诈骗数据库、推销数据库、骚扰数据库。当终端获取到恶意来电的电话号码时,在上述的识别恶意来电的过程中,可以根据该电话号码确定恶意类型,然后在判断来电者的声纹特征是否已经存储在恶意声纹数据库中时,可以根据已经确定的恶意类型到对应的恶意声纹数据库中匹配判断,提高了效率。There may be more than one malicious voiceprint database, for example, there may be more than one malicious voiceprint database, and each malicious voiceprint database corresponds to its own malicious type. For example, there are more than one malicious type, which can be divided into fraud type, sales type, harassment type, etc., then the malicious voiceprint database can be divided into fraud database, sales database, and harassment database. When the terminal obtains the phone number of a malicious call, in the above-mentioned process of identifying a malicious call, the malicious type can be determined according to the phone number, and then when judging whether the caller's voiceprint features have been stored in the malicious voiceprint database, The determined malicious type can be matched and judged in the corresponding malicious voiceprint database, which improves the efficiency.

因此,判断来电者的声纹特征是否已经存储在恶意声纹数据库中可以通过以下过程实现:从恶意声纹数据库中获取与来电号码关联的预存声纹特征,判断来电者的声纹特征是否与预存声纹特征匹配。Therefore, judging whether the voiceprint feature of the caller has been stored in the malicious voiceprint database can be realized through the following process: obtain the pre-stored voiceprint feature associated with the caller number from the malicious voiceprint database, and determine whether the voiceprint feature of the caller is consistent with Pre-stored voiceprint feature matching.

若按照恶意类型分成多个对应恶意类型的恶意声纹数据库,则终端在存储该来电者的声纹特征时,按照其恶意类型存储到对应的恶意声纹数据库。在存储时,应当存储与来电号码建立有映射关系的来电者的声纹特征到恶意声纹数据库中,即将来电者的声纹特征与来电号码建立好映射关系后存储。由于恶意声纹数据库是建立在服务器的,因此终端在获取到来电者的声纹特征后,将来电者的声纹特征上传到服务器进行存储。If it is divided into multiple malicious voiceprint databases corresponding to the malicious type according to the malicious type, when the terminal stores the voiceprint feature of the caller, it will be stored in the corresponding malicious voiceprint database according to the malicious type. When storing, the voiceprint feature of the caller that has a mapping relationship with the caller number should be stored in the malicious voiceprint database, that is, the voiceprint feature of the caller and the caller number are stored after the mapping relationship is established. Since the malicious voiceprint database is established on the server, after the terminal acquires the voiceprint features of the caller, it uploads the voiceprint features of the caller to the server for storage.

当然,如果恶意来电者不再进行恶意电话行为,则可以将该恶意来电者的声纹特征从恶意声纹数据库中删除。例如,预设考察时长(例如2个月),如果在考察时长内该来电者的声纹特征不再被采集到,即相当于在考察时长内恶意来电者的来电不再被用户举报为恶意来电,则还可以删除恶意声纹数据库中的该来电者的声纹特征。Of course, if the malicious caller no longer conducts malicious phone calls, the voiceprint feature of the malicious caller can be deleted from the malicious voiceprint database. For example, if the investigation period is preset (for example, 2 months), if the caller’s voiceprint features are no longer collected during the investigation period, it means that the malicious caller’s calls will no longer be reported as malicious by the user within the investigation period. If there is an incoming call, the voiceprint feature of the caller in the malicious voiceprint database can also be deleted.

上述的恶意来电者声纹的自动取证方法,确定来电呼叫相对应的来电号码为恶意来电;获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征;判断该来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储该来电者的声纹特征到该恶意声纹数据库中。这样,只要来电被识别为恶意来电,来电者的声纹特征即被存储到恶意声纹数据库中,这个恶意来电者使用其他电话号码再次呼叫用户时便会被识别出来,及时的提示用户,提高了安全性并节约了用户时间。The above-mentioned automatic evidence collection method for the voiceprint of a malicious caller determines that the incoming number corresponding to the incoming call is a malicious call; obtains the voice data of the caller during the call, and extracts the voiceprint characteristics of the caller from the voice data; Whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, if not stored, the voiceprint feature of the caller is stored in the malicious voiceprint database. In this way, as long as the incoming call is identified as a malicious call, the caller's voiceprint features will be stored in the malicious voiceprint database, and the malicious caller will be identified when he calls the user again with another phone number, prompting the user in time, improving This increases security and saves user time.

而且,通过收集恶意来电者的声纹特征,使得恶意来电者即使正常的日常通话都会被提示为恶意来电,可以有效遏制恶意来电者不再进行恶意电话行为。如果在一段预设的考察时长内恶意来电者的来电不再被用户举报为恶意来电,则还可以删除恶意声纹数据库的该来电者的声纹特征。Moreover, by collecting the voiceprint characteristics of the malicious caller, the malicious caller will be prompted as a malicious call even if the normal daily call is made, which can effectively curb the malicious caller from making malicious phone calls. If the incoming call of the malicious caller is no longer reported as a malicious call by the user within a preset investigation period, the voiceprint feature of the caller in the malicious voiceprint database can also be deleted.

通过众多用户的参与而形成的恶意声纹数据库,除了在恶意来电时通过来电者的声纹特征来识别并提示用户外,还可以具有以下的扩展作用。例如,随着实名制办理sim卡的业务持续开展,后续“身份证-手机号码”的数据库(DB1)系统会日趋完善,待终端海量的“用户声纹-手机号码-是否有诈骗记录”的数据库(DB2)的完善,通过两个数据库的互相访问,后续可以做到如下数据查询平台:The malicious voiceprint database formed through the participation of many users, in addition to identifying and prompting the user through the voiceprint characteristics of the caller when a malicious call is made, can also have the following expansion functions. For example, with the continuous development of the real-name system for SIM card processing, the follow-up "ID card-mobile number" database (DB1) system will be improved day by day. (DB2) improvement, through the mutual access of the two databases, the following data query platforms can be implemented in the future:

1、诈骗记录查询平台:1. Fraud record inquiry platform:

当诈骗者通过电话有诈骗行为时,云端(服务器)通过数据库DB2的声纹特征可以查询其身份认证的手机号码,再通过数据库DB1查询确认到诈骗者的真正身份。When a fraudster commits a fraudulent act by phone, the cloud (server) can query the mobile phone number for identity authentication through the voiceprint feature of the database DB2, and then confirm the fraudster's true identity through the query of the database DB1.

2、金融信用查询平台:2. Financial credit inquiry platform:

结合数据库DB1和DB2,可以整合出完整的信用评价平台,共同建立维护社会诚信的制度保障。Combining databases DB1 and DB2, a complete credit evaluation platform can be integrated to jointly establish a system guarantee for maintaining social integrity.

以下描述一种与上述恶意来电者声纹的自动取证方法相应的装置,该装置应用于移动终端。图2为一个实施例的恶意来电者声纹的自动取证装置模块图。一种恶意来电者声纹的自动取证装置,其包括:识别模块100、分析模块200和存储模块300。A device corresponding to the above-mentioned automatic evidence collection method for the voiceprint of a malicious caller is described below, and the device is applied to a mobile terminal. Fig. 2 is a block diagram of an automatic forensic collection device for voiceprints of malicious callers according to an embodiment. An automatic evidence collection device for voiceprints of malicious callers, which includes: an identification module 100 , an analysis module 200 and a storage module 300 .

识别模块100用于确定来电呼叫相对应的来电号码为恶意来电;分析模块200用于获取通话过程中来电者的语音数据,从所述语音数据中提取来电者的声纹特征;存储模块300判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储所述来电者的声纹特征到所述恶意声纹数据库中。The identification module 100 is used to determine that the incoming number corresponding to the incoming call is a malicious call; the analysis module 200 is used to obtain the voice data of the caller during the call, and extract the voiceprint characteristics of the caller from the voice data; the storage module 300 judges Whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, if not stored, the voiceprint feature of the caller is stored in the malicious voiceprint database.

识别模块100确定来电呼叫相对应的来电号码为恶意来电。The identification module 100 determines that the incoming call number corresponding to the incoming call is a malicious incoming call.

可以在本机或服务器预先建立好恶意号码黑名单,当终端收到来电时,识别模块100获取来电号码,判断来电号码是否已经存储在恶意号码黑名单中,若是则确定对应的来电为恶意来电。如果恶意号码黑名单存储在本机,则在本地进行识别;如果恶意号码黑名单存储在服务器,则在服务器进行识别,服务器将识别结果反馈给终端。A blacklist of malicious numbers can be pre-established on the local machine or server. When the terminal receives an incoming call, the identification module 100 obtains the incoming call number to determine whether the incoming call number has been stored in the malicious number blacklist, and if so, determines that the corresponding incoming call is a malicious call . If the blacklist of malicious numbers is stored in the local machine, it will be identified locally; if the blacklist of malicious numbers is stored in the server, it will be identified on the server, and the server will feed back the identification result to the terminal.

恶意号码黑名单既可以是由用户自行建立的黑名单,例如用户在接到某些恶意电话时将该电话号码添加到黑名单中,这个时候恶意号码黑名单可以存储在本地,用户还可以分享该恶意号码黑名单到服务器。当然,恶意号码黑名单也可以是由服务器建立的黑名单,例如服务器将众多用户举报的电话号码列入黑名单中,这个时候恶意号码黑名单可以存储在服务器,用户还可以主动到服务器请求获取该恶意号码黑名单。The blacklist of malicious numbers can be a blacklist established by the user. For example, when the user receives some malicious calls, the phone number is added to the blacklist. At this time, the blacklist of malicious numbers can be stored locally, and the user can also share it. The malicious numbers are blacklisted to the server. Of course, the blacklist of malicious numbers can also be a blacklist established by the server. For example, the server blacklists the phone numbers reported by many users. At this time, the blacklist of malicious numbers can be stored on the server, and the user can also request to obtain it from the server. The blacklist of malicious numbers.

恶意号码黑名单既可以是一个黑名单,也可以按照恶意类型分成多个恶意号码名单。例如恶意类型可以分为诈骗类型、推销类型、骚扰类型等等,则恶意号码黑名单可以分成诈骗黑名单、推销黑名单、骚扰黑名单。终端在识别到来电号码是属于哪个恶意号码黑名单中,然后进行相应的提示。例如识别来电号码是属于诈骗黑名单中的,则提示用户来电为诈骗来电。因此,当还对恶意类型进行细分时,识别模块100可以获取来电呼叫相对应的来电号码,确定来电号码为恶意来电,并确定其恶意类型。具体过程为:识别模块100获取来电呼叫相对应的来电号码后,将来电号码在多个恶意号码黑名单中进行比对,当某一恶意类型的恶意号码黑名单中存储有该电话号码时,则确定该电话号码为恶意来电号码,并确定其恶意类型。The malicious number blacklist can be a blacklist, or can be divided into multiple malicious number lists according to malicious types. For example, malicious types can be divided into fraud types, sales types, harassment types, etc., and malicious number blacklists can be divided into fraud blacklists, sales blacklists, and harassment blacklists. The terminal recognizes which malicious number blacklist the incoming call number belongs to, and then prompts accordingly. For example, if it is identified that the number of the incoming call belongs to the fraud blacklist, the user is prompted that the incoming call is a fraudulent call. Therefore, when subdividing the malicious type, the identification module 100 can acquire the corresponding incoming call number, determine that the incoming call number is a malicious incoming call, and determine its malicious type. The specific process is: after the identification module 100 obtains the corresponding incoming call number of the incoming call, the incoming call number is compared in a plurality of blacklists of malicious numbers. Then determine that the phone number is a malicious caller number, and determine its malicious type.

分析模块200获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征。The analysis module 200 acquires the voice data of the caller during the call, and extracts the voiceprint features of the caller from the voice data.

由于每个人的声音器官,诸如声带、口腔、鼻腔、舌、齿、唇、肺等,在发音时呈现千姿百态。由于年龄、性格、语言习惯等多种原因,再加上发音容量大小不一,发音频率不尽相同,哪怕是微小的差异,也会导致这些器官发出的声音必然有着各自的特点,从而形成每个人独具一格的声纹(Voiceprint),可用语谱图观察出来。Because each person's vocal organs, such as vocal cords, oral cavity, nasal cavity, tongue, teeth, lips, lungs, etc., present in various poses and with different expressions when they pronounce. Due to various reasons such as age, personality, language habits, etc., coupled with different pronunciation volumes and pronunciation frequencies, even small differences will cause the sounds produced by these organs to have their own characteristics, thus forming each Individual's unique voiceprint (Voiceprint) can be observed by spectrogram.

声纹识别,就是从某段语音中识别出说话人的身份的过程。与指纹类似,每个人说话过程中蕴涵的语音特征和发音习惯等也几乎是唯一的。语音识别是共性识别,判定所说的内容(说的什么)。声纹识别是个性识别,判定说话人身份(是谁说的)。Voiceprint recognition is the process of identifying the identity of the speaker from a certain segment of voice. Similar to fingerprints, the speech features and pronunciation habits of each person's speech are almost unique. Speech recognition is generic recognition, which determines what is said (what is said). Voiceprint recognition is personality recognition, which determines the identity of the speaker (who said it).

声纹识别有两个关键问题,一是特征提取,二是模式识别。There are two key issues in voiceprint recognition, one is feature extraction, and the other is pattern recognition.

特征提取的任务是提取并选择对说话人的声纹具有可分性强、稳定性高等特性的声学或语言特征。虽然目前大部分声纹识别系统用的都是声学层面的特征,但是表征一个人特点的特征应该是多层面的,包括:(1)与人类的发音机制的解剖学结构有关的声学特征(如频谱、倒频谱、共振峰、基音、反射系数等等)、鼻音、带深呼吸音、沙哑音、笑声等;(2)受社会经济状况、受教育水平、出生地等影响的语义、修辞、发音、言语习惯等;(3)个人特点或受父母影响的韵律、节奏、速度、语调、音量等特征。从利用数学方法可以建模的角度出发,声纹自动识别模型目前可以使用的特征包括:(1)声学特征(倒频谱);(2)词法特征(说话人相关的词n-gram,音素n-gram);(3)韵律特征(利用n-gram描述的基音和能量“姿势”);(4)语种、方言和口音信息;(5)通道信息(使用何种通道);等等。The task of feature extraction is to extract and select acoustic or language features that have strong separability and high stability for the speaker's voiceprint. Although most voiceprint recognition systems currently use features at the acoustic level, the features that characterize a person's characteristics should be multi-level, including: (1) acoustic features related to the anatomical structure of the human pronunciation mechanism (such as Spectrum, cepstrum, formant, pitch, reflection coefficient, etc.), nasal, breathy, hoarse, laughter, etc.; (2) Semantics, rhetoric, Pronunciation, speech habits, etc.; (3) Personal characteristics or characteristics such as rhythm, rhythm, speed, intonation, and volume influenced by parents. From the perspective of using mathematical methods to model, the current features that can be used in the voiceprint automatic recognition model include: (1) acoustic features (cepstrum); (2) lexical features (speaker-related word n-gram, phoneme n -gram); (3) prosodic features (using the pitch and energy "posture" described by n-gram); (4) language, dialect and accent information; (5) channel information (which channel to use); and so on.

对于模式识别,主要有这几大类方法:(1)模板匹配方法:利用动态时间弯折(DTW)以对准训练和测试特征序列,主要用于固定词组的应用(通常为文本相关任务);(2)最近邻方法:训练时保留所有特征矢量,识别时对每个矢量都找到训练矢量中最近的K个,据此进行识别,通常模型存储和相似计算的量都很大;(3)神经网络方法:有很多种形式,如多层感知、径向基函数(RBF)等,可以显式训练以区分说话人和其背景说话人,其训练量很大,且模型的可推广性不好;(4)隐式马尔可夫模型(HMM)方法:通常使用单状态的HMM,或高斯混合模型(GMM),是比较流行的方法,效果比较好;(5)VQ聚类方法(如LBG,K-均值):效果比较好,算法复杂度也不高,和HMM方法配合起来更可以收到更好的效果;(6)多项式分类器方法:有较高的精度,但模型存储和计算量都比较大。For pattern recognition, there are mainly these categories of methods: (1) Template matching method: use dynamic time warping (DTW) to align training and test feature sequences, mainly for the application of fixed phrases (usually text-related tasks) ; (2) Nearest neighbor method: keep all feature vectors during training, and find the nearest K training vectors for each vector during recognition, and identify them accordingly. Usually, the amount of model storage and similar calculation is very large; (3 ) Neural network method: There are many forms, such as multi-layer perception, radial basis function (RBF), etc., which can be explicitly trained to distinguish speakers from their background speakers. The amount of training is large, and the model can be generalized Not good; (4) Hidden Markov Model (HMM) method: Usually single-state HMM, or Gaussian Mixture Model (GMM), is a more popular method, and the effect is better; (5) VQ clustering method ( Such as LBG, K-means): the effect is better, the algorithm complexity is not high, and it can receive better results when combined with the HMM method; (6) polynomial classifier method: has higher accuracy, but the model storage And the amount of calculation is relatively large.

其中模板匹配法的要点是,在训练过程中从每个说话人的训练语句中提取相应的特征矢量来描述各个说话人的行为;在测试阶段,从说话人的测试语音信号中用同样的方法提取测试模板,主要有动态时间规整方法和矢量量化方法。在以下的描述中,以模板匹配法为例。The main point of the template matching method is to extract the corresponding feature vector from each speaker's training sentence to describe the behavior of each speaker during the training process; in the test phase, use the same method from the speaker's test voice signal There are mainly dynamic time warping methods and vector quantization methods for extracting test templates. In the following description, the template matching method is taken as an example.

由于每个人的声纹都是唯一的,因此分析模块200可以通过解析来电者的声音以获取来电者的声纹特征从而识别恶意来电者,来电者的声纹特征为携带具有特征字或词的言语信息的声波频谱。例如,终端可以在检测到来电者正在说话(产生语音流)时,记录并存储至少一段语音数据;然后分析模块200解析至少一段语音数据以提取来电者的声纹特征。该语音数据可以为设定时长的语音数据,例如设定时长为10秒,从检测到来电者正在说话时开始录音,录音10秒。Since each person's voiceprint is unique, the analysis module 200 can identify malicious callers by analyzing the voice of the caller to obtain the voiceprint features of the caller. The acoustic spectrum of speech information. For example, when the terminal detects that the caller is speaking (generates a voice stream), it can record and store at least one piece of voice data; then the analysis module 200 analyzes the at least one piece of voice data to extract the voiceprint feature of the caller. The voice data can be voice data with a set duration, for example, the set duration is 10 seconds, and the recording starts when it is detected that the caller is speaking, and the recording is 10 seconds.

分析模块200获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征可以通过如下过程实现:分析模块200解析至少一段语音数据,获取语音数据中至少一组特征字或词;根据该特征字或词获取来电者的声纹特征。The analysis module 200 acquires the voice data of the caller during the call, and extracting the voiceprint features of the caller from the voice data can be realized through the following process: the analysis module 200 parses at least one section of voice data, and obtains at least one set of characteristic words or Word; Acquire the voiceprint feature of the caller according to the feature word or word.

特征字或词是预先设置好的,这是因为通常诈骗者、推销者、骚扰者都会在通话中说出特定的字或词,例如“你好”、“喂”、“请问”、“你是”、“先生”、“女士”、“吗”等等特征字或词,通过在语音数据中识别这些特征字或词,可以有效提高声纹识别的效率。例如,在语音数据中识别出了来电者说的句子“你好,请问你是唐伯虎先生吗”,终端提取出“你好”、“请问”、“你是”、“先生”、“吗”这五组特征字或词,然后根据这些特征字或词提取来电者的声纹特征。Feature words or words are pre-set, this is because usually scammers, salesmen, harassers will say specific words or words in the call, such as "hello", "hello", "excuse me", "you "Yes", "Mr", "Ms", "What" and other characteristic words or words, by identifying these characteristic words or words in the voice data, the efficiency of voiceprint recognition can be effectively improved. For example, the sentence "Hello, are you Mr. Tang Bohu" is recognized in the voice data, and the terminal extracts "Hello", "Excuse me", "Are you", "Sir", "are you?" These five groups of feature words or words, and then extract the voiceprint features of the caller according to these feature words or words.

如果下述的恶意声纹数据库中没有存储有与本次获取到的来电者的第一声纹特征对应的声纹特征,则在本次存储该来电者的第一声纹特征后,后续如果该来电者使用其他电话号码再次呼叫其他用户,通常也会说出上述的特征字或词,则终端可以根据特征字或词提取到来电者的第二声纹特征,将来电者的第一声纹特征与来电者的第二声纹特征进行对比识别恶意来电。If there is no voiceprint feature corresponding to the first voiceprint feature of the caller acquired this time in the following malicious voiceprint database, after storing the first voiceprint feature of the caller this time, if The caller uses another phone number to call other users again, and usually also speaks the above-mentioned characteristic words or words, then the terminal can extract the second voiceprint feature of the caller according to the characteristic words or words, and the caller's first voice The fingerprint feature is compared with the second voiceprint feature of the caller to identify malicious calls.

该装置还可以包括删除模块。获取的语音数据会存储或暂时存储在终端的存储介质中,当提取来电者的声纹特征成功后,或确认无法提取来电者的声纹特征后,删除模块可以删除语音数据,以节约终端的存储空间。The apparatus can also include a deletion module. The acquired voice data will be stored or temporarily stored in the storage medium of the terminal. When the voiceprint feature of the caller is successfully extracted, or after confirming that the voiceprint feature of the caller cannot be extracted, the deletion module can delete the voice data to save the terminal storage.

存储模块300判断所述来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储来电者的声纹特征到恶意声纹数据库中。The storage module 300 judges whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, and if not stored, stores the voiceprint feature of the caller in the malicious voiceprint database.

分析模块200提取来电者的来电者的声纹特征后,存储模块300判断来电者的声纹特征是否已经存储在恶意声纹数据库中。恶意声纹数据库存储有与电话号码相关联的预存声纹特征,这些预存声纹特征是服务器在之前的众多恶意来电中收集并存储的,并在收集后将预存声纹特征与对应的电话号码建立好映射关系。因此,恶意声纹数据库建立在服务器。After the analysis module 200 extracts the caller's voiceprint features of the caller, the storage module 300 judges whether the caller's voiceprint features have been stored in the malicious voiceprint database. The malicious voiceprint database stores pre-stored voiceprint features associated with phone numbers. These pre-stored voiceprint features are collected and stored by the server in many previous malicious calls. After collection, the pre-stored voiceprint features and corresponding phone numbers Establish a good mapping relationship. Therefore, the malicious voiceprint database is established on the server.

恶意声纹数据库可能不止一个,例如可以是多于一个的恶意声纹数据库,每个恶意声纹数据库对应各自的恶意类型。例如恶意类型多于种,可以分为诈骗类型、推销类型、骚扰类型等等,则恶意声纹数据库可以分成诈骗数据库、推销数据库、骚扰数据库。当识别模块100获取到恶意来电的电话号码时,在上述的识别恶意来电的过程中,分析模块200可以根据该电话号码确定恶意类型,然后存储模块300在判断来电者的声纹特征是否已经存储在恶意声纹数据库中时,存储模块300可以根据已经确定的恶意类型到对应的恶意声纹数据库中匹配判断,提高了效率。There may be more than one malicious voiceprint database, for example, there may be more than one malicious voiceprint database, and each malicious voiceprint database corresponds to its own malicious type. For example, there are more than one malicious type, which can be divided into fraud type, sales type, harassment type, etc., then the malicious voiceprint database can be divided into fraud database, sales database, and harassment database. When the identification module 100 obtains the phone number of a malicious call, in the above-mentioned process of identifying a malicious call, the analysis module 200 can determine the malicious type according to the phone number, and then the storage module 300 determines whether the voiceprint feature of the caller has been stored. When in the malicious voiceprint database, the storage module 300 can match and judge the determined malicious type in the corresponding malicious voiceprint database, which improves the efficiency.

因此,分析模块200判断来电者的声纹特征是否已经存储在恶意声纹数据库中可以通过以下过程实现:从恶意声纹数据库中获取与来电号码关联的预存声纹特征,判断来电者的声纹特征是否与预存声纹特征匹配。Therefore, the analysis module 200 can determine whether the voiceprint feature of the caller has been stored in the malicious voiceprint database can be realized through the following process: obtain the pre-stored voiceprint feature associated with the caller number from the malicious voiceprint database, and determine the caller's voiceprint Whether the features match the pre-stored voiceprint features.

若按照恶意类型分成多个对应恶意类型的恶意声纹数据库,则在存储该来电者的声纹特征时,按照其恶意类型存储到对应的恶意声纹数据库。在存储时,应当存储与来电号码建立有映射关系的来电者的声纹特征到恶意声纹数据库中,即将来电者的声纹特征与来电号码建立好映射关系后存储。由于恶意声纹数据库是建立在服务器的,因此存储模块300在获取到来电者的声纹特征后,将来电者的声纹特征上传到服务器进行存储。If it is divided into a plurality of malicious voiceprint databases corresponding to malicious types according to malicious types, when storing the voiceprint features of the caller, it will be stored in the corresponding malicious voiceprint database according to its malicious type. When storing, the voiceprint feature of the caller that has a mapping relationship with the caller number should be stored in the malicious voiceprint database, that is, the voiceprint feature of the caller and the caller number are stored after the mapping relationship is established. Since the malicious voiceprint database is established on the server, the storage module 300 uploads the voiceprint features of the caller to the server for storage after acquiring the voiceprint features of the caller.

当然,如果恶意来电者不再进行恶意电话行为,则删除模块可以将该恶意来电者的声纹特征从恶意声纹数据库中删除。例如,预设考察时长(例如2个月),如果在考察时长内该来电者的声纹特征不再被采集到,即相当于在考察时长内恶意来电者的来电不再被用户举报为恶意来电,则删除模块还可以删除恶意声纹数据库的该来电者的声纹特征。Of course, if the malicious caller no longer conducts malicious phone calls, the deletion module can delete the voiceprint feature of the malicious caller from the malicious voiceprint database. For example, if the investigation period is preset (for example, 2 months), if the caller’s voiceprint features are no longer collected during the investigation period, it means that the malicious caller’s calls will no longer be reported as malicious by the user within the investigation period. If there is an incoming call, the deletion module can also delete the voiceprint feature of the caller in the malicious voiceprint database.

上述的恶意来电者声纹的自动取证装置,识别模块确定来电呼叫相对应的来电号码为恶意来电;分析模块获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征;存储模块判断该来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储该来电者的声纹特征到该恶意声纹数据库中。这样,只要来电被识别为恶意来电,来电者的声纹特征即被存储到恶意声纹数据库中,这个恶意来电者使用其他电话号码再次呼叫用户时便会被识别出来,及时的提示用户,提高了安全性并节约了用户时间。In the above-mentioned automatic forensics device for the voiceprint of a malicious caller, the identification module determines that the incoming number corresponding to the incoming call is a malicious call; the analysis module obtains the voice data of the caller during the call, and extracts the voiceprint characteristics of the caller from the voice data ; The storage module judges whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, and if not, stores the voiceprint feature of the caller in the malicious voiceprint database. In this way, as long as the incoming call is identified as a malicious call, the caller's voiceprint features will be stored in the malicious voiceprint database, and the malicious caller will be identified when he calls the user again with another phone number, prompting the user in time, improving This increases security and saves user time.

而且,通过收集恶意来电者的声纹特征,使得恶意来电者即使正常的日常通话都会被提示为恶意来电,可以有效遏制恶意来电者不再进行恶意电话行为。如果在一段预设的考察时长内恶意来电者的来电不再被用户举报为恶意来电,则还可以删除恶意声纹数据库的该来电者的声纹特征。Moreover, by collecting the voiceprint characteristics of the malicious caller, the malicious caller will be prompted as a malicious call even if the normal daily call is made, which can effectively curb the malicious caller from making malicious phone calls. If the incoming call of the malicious caller is no longer reported as a malicious call by the user within a preset investigation period, the voiceprint feature of the caller in the malicious voiceprint database can also be deleted.

本发明实施例还提供了移动终端,如图3所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point ofSales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:The embodiment of the present invention also provides a mobile terminal. As shown in FIG. 3 , for convenience of description, only the parts related to the embodiment of the present invention are shown. For specific technical details not disclosed, please refer to the method part of the embodiment of the present invention. The terminal can be any terminal device including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer, etc. Taking the terminal as a mobile phone as an example:

图3示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。参考图3,手机包括:射频(Radio Frequency,RF)电路1510、存储器1520、输入单元1530、显示单元1540、传感器1550、音频电路1560、无线保真(wireless fidelity,WiFi)模块1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图3中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Fig. 3 shows a block diagram of a partial structure of a mobile phone related to a terminal provided by an embodiment of the present invention. Referring to FIG. 3 , the mobile phone includes: a radio frequency (Radio Frequency, RF) circuit 1510, a memory 1520, an input unit 1530, a display unit 1540, a sensor 1550, an audio circuit 1560, a wireless fidelity (wireless fidelity, WiFi) module 1570, and a processor 1580 , and power supply 1590 and other components. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 3 does not constitute a limitation to the mobile phone, and may include more or less components than shown in the figure, or combine some components, or arrange different components.

下面结合图3对手机的各个构成部件进行具体的介绍:The following is a specific introduction to each component of the mobile phone in conjunction with Figure 3:

RF电路1510可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将设计上行的数据发送给基站。通常,RF电路1510包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low NoiseAmplifier,LNA)、双工器等。此外,RF电路1510还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(GlobalSystem of Mobile communication,GSM)、通用分组无线服务(General Packet RadioService,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 1510 can be used for sending and receiving information or receiving and sending signals during a call. In particular, after receiving the downlink information from the base station, it is processed by the processor 1580; in addition, the designed uplink data is sent to the base station. Generally, the RF circuit 1510 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, RF circuitry 1510 may also communicate with networks and other devices via wireless communications. The above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (Global System of Mobile communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (Code Division Multiple Access) , CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (Long Term Evolution, LTE), email, Short Messaging Service (Short Messaging Service, SMS), etc.

存储器1520可用于存储软件程序以及模块,处理器1580通过运行存储在存储器1520的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1520可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声纹播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1520 can be used to store software programs and modules, and the processor 1580 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 1520 . The memory 1520 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a voiceprint playback function, an image playback function, etc.) and the like; the storage data area can store Data created based on the use of the mobile phone (such as audio data, phonebook, etc.), etc. In addition, the memory 1520 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.

输入单元1530可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1530可包括触控面板1531以及其他输入设备1532。触控面板1531,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1531上或在触控面板1531附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1531可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器1580发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1531。除了触控面板1531,输入单元1530还可以包括其他输入设备1532。具体地,其他输入设备1532可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1530 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile phone. Specifically, the input unit 1530 may include a touch panel 1531 and other input devices 1532 . The touch panel 1531, also referred to as a touch screen, can collect touch operations of the user on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 1531 or near the touch panel 1531). operation), and drive the corresponding connection device according to the preset program. Optionally, the touch panel 1531 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to the to the processor 1580, and can receive and execute commands sent by the processor 1580. In addition, the touch panel 1531 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 1531 , the input unit 1530 may also include other input devices 1532 . Specifically, other input devices 1532 may include but not limited to one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), trackball, mouse, joystick, and the like.

显示单元1540可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1540可包括显示面板1541,可选的,可以采用液晶显示器(LiquidCrystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1541。进一步的,触控面板1531可覆盖显示面板1541,当触控面板1531检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显示面板1541上提供相应的视觉输出。虽然在图3中,触控面板1531与显示面板1541是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1531与显示面板1541集成而实现手机的输入和输出功能。The display unit 1540 may be used to display information input by or provided to the user and various menus of the mobile phone. The display unit 1540 may include a display panel 1541. Optionally, the display panel 1541 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like. Furthermore, the touch panel 1531 may cover the display panel 1541, and when the touch panel 1531 detects a touch operation on or near it, it transmits to the processor 1580 to determine the type of the touch event, and then the processor 1580 determines the type of the touch event according to the The type provides a corresponding visual output on the display panel 1541 . Although in FIG. 3 , the touch panel 1531 and the display panel 1541 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 1531 and the display panel 1541 can be integrated to form a mobile phone. Realize the input and output functions of the mobile phone.

手机还可包括至少一种传感器1550,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1541的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1541和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one sensor 1550, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1541 according to the brightness of the ambient light, and the proximity sensor may turn off the display panel 1541 and/or when the mobile phone is moved to the ear. or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is stationary, and can be used to identify the application of mobile phone posture (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.

音频电路1560、扬声器1561,传声器1562可提供用户与手机之间的音频接口。音频电路1560可将接收到的音频数据转换后的电信号,传输到扬声器1561,由扬声器1561转换为声纹信号输出;另一方面,传声器1562将收集的声纹信号转换为电信号,由音频电路1560接收后转换为音频数据,再将音频数据输出处理器1580处理后,经RF电路1510以发送给比如另一手机,或者将音频数据输出至存储器1520以便进一步处理。The audio circuit 1560, the speaker 1561, and the microphone 1562 can provide an audio interface between the user and the mobile phone. The audio circuit 1560 can transmit the electrical signal converted from the received audio data to the speaker 1561, and the speaker 1561 converts it into a voiceprint signal for output; The circuit 1560 converts the received audio data into audio data, and then outputs the audio data to the processor 1580 for processing, and sends the audio data to another mobile phone through the RF circuit 1510, or outputs the audio data to the memory 1520 for further processing.

WiFi属于短距离无线传输技术,手机通过WiFi模块1570可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图3示出了WiFi模块1570,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 1570. It provides users with wireless broadband Internet access. Although Fig. 3 shows the WiFi module 1570, it can be understood that it is not an essential component of the mobile phone, and can be completely omitted as required without changing the essence of the invention.

处理器1580是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1520内的软件程序和/或模块,以及调用存储在存储器1520内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1580中。The processor 1580 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. By running or executing software programs and/or modules stored in the memory 1520, and calling data stored in the memory 1520, execution Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole. Optionally, the processor 1580 may include one or more processing units; preferably, the processor 1580 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 1580 .

手机还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1590 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 1580 through the power management system, so that functions such as charging, discharging, and power consumption management can be realized through the power management system.

尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.

在本发明实施例中,该终端所包括的处理器1580还具有以下功能:确定来电呼叫相对应的来电号码为恶意来电;获取通话过程中来电者的语音数据,从该语音数据中提取来电者的声纹特征;判断该来电者的声纹特征是否已经存储在恶意声纹数据库中,若没有存储则存储该来电者的声纹特征到该恶意声纹数据库中。也即处理器1580具备执行上述的任一实施例恶意来电者声纹的自动取证方法的功能,在此不再赘述。In the embodiment of the present invention, the processor 1580 included in the terminal also has the following functions: determine that the incoming call number corresponding to the incoming call is a malicious incoming call; obtain the voice data of the caller during the call, and extract the caller number from the voice data judge whether the voiceprint feature of the caller has been stored in the malicious voiceprint database, and if not, store the voiceprint feature of the caller in the malicious voiceprint database. That is to say, the processor 1580 has the function of executing the method for automatically obtaining evidence of a malicious caller's voiceprint in any of the above-mentioned embodiments, which will not be repeated here.

应该理解的是,虽然图1的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,图1中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flow chart of FIG. 1 are displayed sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and they can be executed in other orders. Moreover, at least some of the steps in Figure 1 may include multiple sub-steps or multiple stages, these sub-steps or stages are not necessarily executed at the same time, but may be executed at different times, and the execution order is not necessarily performed sequentially, but may be performed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.

以上所述仅是本发明的部分实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above descriptions are only part of the embodiments of the present invention. It should be pointed out that those skilled in the art can make some improvements and modifications without departing from the principles of the present invention. It should be regarded as the protection scope of the present invention.

Claims (10)

1. a kind of automatic evidence-collecting method of malice caller's vocal print is it is characterised in that comprise the steps:
Determine that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Obtain the speech data of caller in communication process, extract the vocal print feature of caller from described speech data;
Judging whether the vocal print feature of described caller has stored in malice voice print database, if not storing, storing institute The vocal print feature stating caller is in described malice voice print database.
2. the automatic evidence-collecting method of malice caller's vocal print according to claim 1 is it is characterised in that described determination is sent a telegram here Call the process that corresponding caller ID is malice incoming call to include:
Obtain the corresponding caller ID of incoming call;
Determine that caller ID is malice incoming call, and determine its malice type.
3. the automatic evidence-collecting method of malice caller's vocal print according to claim 2 is it is characterised in that described malice type More than one, including swindle type, promote at least one of type, harassing and wrecking type.
4. the automatic evidence-collecting method of malice caller's vocal print according to claim 3 is it is characterised in that described malice vocal print Database is more than one, and each malice voice print database corresponds to respective malice type, and each malice voice print database is stored with The vocal print feature that prestores of corresponding malice type.
5. the automatic evidence-collecting method of malice caller's vocal print according to claim 4 is it is characterised in that the described vocal print that prestores Feature is associated with telephone number.
6. the automatic evidence-collecting method of malice caller's vocal print according to claim 5 is it is characterised in that described in described judgement Whether the vocal print feature of caller has stored in malice voice print database includes:
Obtain, from described malice voice print database, the vocal print feature that prestores associating with described caller ID, judge described caller Vocal print feature whether mate with the described vocal print feature that prestores.
7. the automatic evidence-collecting method of malice caller's vocal print according to claim 1 is it is characterised in that described determination is sent a telegram here Call the process that corresponding caller ID is malice incoming call to include:
Judge whether described caller ID has stored in malice number blacklist, if then determining corresponding incoming call as malice Incoming call.
8. the automatic evidence-collecting method of malice caller's vocal print according to claim 7 is it is characterised in that described malice number Blacklist is stored in local or server.
9. a kind of automatic evidence-collecting device of malice caller's vocal print is it is characterised in that include:
Identification module, for determining that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Analysis module, for obtaining the speech data of caller in communication process, extracts caller's from described speech data Vocal print feature;
Memory module, whether the vocal print feature for judging described caller has stored in malice voice print database, if not having Storage is had then to store the vocal print feature of described caller in described malice voice print database.
10. a kind of mobile terminal it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein said one or more application programs are stored in described memory and are configured It is by one or more of computing devices, one or more of programs are configured to: execution is according to claim 1~8 The automatic evidence-collecting method of the malice caller's vocal print described in any one.
CN201610827254.XA 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof Pending CN106341539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610827254.XA CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610827254.XA CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Publications (1)

Publication Number Publication Date
CN106341539A true CN106341539A (en) 2017-01-18

Family

ID=57840062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610827254.XA Pending CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Country Status (1)

Country Link
CN (1) CN106341539A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Incoming call interception method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN108234485A (en) * 2017-12-30 2018-06-29 广东世纪网通信设备股份有限公司 Swindle vocal print acquisition device based on VOIP platforms and the methods, devices and systems that fraudulent call is intercepted using the device
CN109819089A (en) * 2017-11-21 2019-05-28 中国移动通信集团广东有限公司 Voiceprint extraction method, core network element, electronic device and storage medium
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN111429918A (en) * 2020-03-26 2020-07-17 云知声智能科技股份有限公司 Phone call fraud visiting method and system based on voiceprint recognition and intention analysis
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN113160831A (en) * 2021-04-14 2021-07-23 浙江百应科技有限公司 Voiceprint recognition-based outbound method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072499A1 (en) * 2009-09-18 2011-03-24 Chung-Yu Lin Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN105306657A (en) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 Identity identification method, identity identification device and communication terminal
CN105872185A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Information prompting method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072499A1 (en) * 2009-09-18 2011-03-24 Chung-Yu Lin Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN105306657A (en) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 Identity identification method, identity identification device and communication terminal
CN105872185A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Information prompting method, device and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Incoming call interception method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN109819089A (en) * 2017-11-21 2019-05-28 中国移动通信集团广东有限公司 Voiceprint extraction method, core network element, electronic device and storage medium
CN108234485A (en) * 2017-12-30 2018-06-29 广东世纪网通信设备股份有限公司 Swindle vocal print acquisition device based on VOIP platforms and the methods, devices and systems that fraudulent call is intercepted using the device
CN108234485B (en) * 2017-12-30 2020-09-01 广东世纪网通信设备股份有限公司 Fraud voiceprint acquisition device based on VOIP platform and method, device and system for intercepting fraudulent calls by using the device
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN110010135B (en) * 2018-01-05 2024-05-07 北京搜狗科技发展有限公司 Speech-based identity recognition method and device and electronic equipment
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN111429918A (en) * 2020-03-26 2020-07-17 云知声智能科技股份有限公司 Phone call fraud visiting method and system based on voiceprint recognition and intention analysis
CN113160831A (en) * 2021-04-14 2021-07-23 浙江百应科技有限公司 Voiceprint recognition-based outbound method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106210239A (en) The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
US11403065B2 (en) User interface customization based on speaker characteristics
EP4064276A1 (en) Method and device for speech recognition, terminal and storage medium
CN105940407B (en) System and method for assessing the intensity of audio password
CN106341539A (en) Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof
US10079014B2 (en) Name recognition system
EP2821992B1 (en) Method for updating voiceprint feature model and terminal
WO2021008538A1 (en) Voice interaction method and related device
CN106201424B (en) A kind of information interacting method, device and electronic equipment
CN104834847B (en) Auth method and device
CN112464661B (en) Model training method, speech dialogue detection method and related equipment
CN107919138B (en) Emotion processing method in voice and mobile terminal
CN108735209A (en) Wake up word binding method, smart machine and storage medium
CN111738100B (en) Voice recognition method based on mouth shape and terminal equipment
CN108962241B (en) Location prompting method, device, storage medium and electronic device
TW202018696A (en) Voice recognition method and device and computing device
CN113129867B (en) Training method of voice recognition model, voice recognition method, device and equipment
CN108900965A (en) Position prompting method and device, storage medium and electronic equipment
CN111835522A (en) Audio processing method and device
CN109688271A (en) The method, apparatus and terminal device of contact information input
CN108600559B (en) Control method, device, storage medium and electronic device for silent mode
CN116403573A (en) Speech recognition method
CN109471664A (en) Intelligent assistant's management method, terminal and computer readable storage medium
CN109064720B (en) Position prompting method and device, storage medium and electronic equipment
CN108989551B (en) Location prompting method, device, storage medium and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170721

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170118

RJ01 Rejection of invention patent application after publication