WO2015192450A1 - 身份识别方法、装置及通讯终端 - Google Patents
身份识别方法、装置及通讯终端 Download PDFInfo
- Publication number
- WO2015192450A1 WO2015192450A1 PCT/CN2014/084312 CN2014084312W WO2015192450A1 WO 2015192450 A1 WO2015192450 A1 WO 2015192450A1 CN 2014084312 W CN2014084312 W CN 2014084312W WO 2015192450 A1 WO2015192450 A1 WO 2015192450A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile phone
- phone number
- voiceprint feature
- address book
- extracted
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000004891 communication Methods 0.000 title claims abstract description 26
- 238000000605 extraction Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 11
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 5
- 239000000284 extract Substances 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
- G06F3/167—Audio in a user interface, e.g. using voice commands for navigating, audio feedback
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/02—Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/40—Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
- H04M2201/405—Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition involving speaker-dependent recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- the present invention relates to the field of communications, and in particular to an identity recognition method and apparatus, and a communication terminal.
- BACKGROUND OF THE INVENTION In today's society, there are many cases in which mobile phones are used for fraud. For example: Sometimes a scammer may pretend to be a victim of a family call to deceive. The scammers use a variety of methods, such as stealing mobile phones, and using special dial-up software. It shows the number it needs to induce the victim. In addition, there are many virus softwares on the smart phone. If the victim is planted with a Trojan virus on his mobile phone, he can also pretend to call the phone number that the victim knows. An effective solution has not been proposed for the problem that the identity of a communication object existing in the related art is difficult to identify effectively.
- an identification method including: extracting a voiceprint feature of a current call object and a mobile phone number of the current call object; and identifying the location according to the voiceprint feature and the mobile phone number The identity of the current call object.
- Extracting the voiceprint feature includes: collecting sound information of the current call object; extracting the voiceprint feature according to the sound information; converting the voiceprint feature into a predetermined voiceprint data format.
- Identifying the identity of the current call object according to the voiceprint feature and the mobile phone number comprising: querying, according to the extracted mobile phone number and the extracted voiceprint feature, a corresponding data record saved in an address book database; Determining the extracted voiceprint feature and the matching result of the mobile phone number and the corresponding data record; and identifying the identity of the current call object according to the matching result.
- the method further includes: adding a new data record to the address book database according to the mobile phone number input by the user and the collected voiceprint feature; and/or importing the saved data record to the address book database.
- Querying the corresponding data record stored in the address book database according to the extracted mobile phone number and the extracted voiceprint feature comprises: querying, according to the extracted mobile phone number, the corresponding to the mobile phone number saved in the address book database The voiceprint feature, and/or querying the mobile phone number corresponding to the voiceprint feature stored in the address book database according to the extracted voiceprint feature.
- Determining the extracted voiceprint feature and the matching result of the extracted mobile phone number and the corresponding data record includes: determining whether the extracted mobile phone number has a record in the address book database, and determining that the record is in the Whether the voiceprint feature corresponding to the mobile phone number in the address book database matches the extracted voiceprint feature; and/or determining whether the extracted voiceprint feature has a record in the address book database, and determining the record Whether the mobile phone number corresponding to the voiceprint feature in the address book database matches the extracted mobile phone number.
- Identifying, according to the matching result, the identity of the current call object includes at least one of the following: the mobile phone number extracted in the matching result is recorded in the address book database, and is recorded in the address book database.
- the voiceprint feature corresponding to the mobile phone number matches the extracted voiceprint feature, or if the matching result is the extracted voiceprint feature is recorded in the address book database, and recorded in the In the case that the mobile phone number corresponding to the voiceprint feature in the address book database matches the extracted mobile phone number, the current call object is identified as a trusted identity; and the matching result is the extracted mobile phone number In the case where there is a record in the address book database, but the voiceprint feature corresponding to the mobile phone number recorded in the address book database does not match the extracted voiceprint feature, the current call object is identified as non- a trusted identity; the voiceprint feature extracted in the matching result is recorded in the address book database, but recorded in the address book If the mobile phone number corresponding to the voiceprint feature in the library does not match the extracted mobile phone number, the mobile phone number identifying the current call object has been changed; and the matching result is the extracted voiceprint The feature is not recorded in the address book database, and the extracted mobile phone number is not recorded in the address book database, and the contact record data information of the current call object
- the method further includes: saving the mobile phone number and the voiceprint feature to the address book database.
- the method further includes: according to a recognition result of the identity of the current call object, during a call and/or a call process
- the prompt information includes at least one of the following: the voiceprint feature and the matching result of the mobile phone number and the record saved in the address book database, the voiceprint feature and the record in the address book database The degree of matching of the voiceprint features, the security risk alert information for different recognition results, the mobile phone number, and other address book information corresponding to the mobile phone number.
- the address book database is stored on a local and/or remote server.
- the method further includes: synchronously storing the local address book database and the address book database stored on the remote server.
- the address book database is stored on the local and/or remote server by encryption.
- an identification device is further provided, including: an extraction module, configured to extract a voiceprint feature of a current call object and a mobile phone number of the current call object; and an identification module configured to The voiceprint feature and the mobile phone number are used to identify the identity of the current call object.
- the extraction module includes: an acquisition unit configured to collect sound information of the current call object; an extracting unit configured to extract the voiceprint feature according to the sound information; and a conversion unit configured to convert the voiceprint feature For the predetermined voiceprint data format.
- the identification module includes: a query unit, configured to query a corresponding data record saved in the address book database according to the extracted mobile phone number and the extracted voiceprint feature; and the determining unit is configured to determine the extracted sound And a matching result of the phone number and the corresponding data record; and an identifying unit configured to identify an identity of the current call object according to the matching result.
- a communication terminal comprising the identity recognition device according to any of the above.
- the voiceprint feature of the current call object and the mobile phone number of the current call object are extracted; the manner of identifying the identity of the current call object is determined according to the voiceprint feature and the mobile phone number, and the communication existing in the related art is solved.
- the problem that the identity of the object is difficult to identify effectively provides a method for effectively identifying the identity of the current call object, which technically reduces the chance of the user being cheated by the phone.
- FIG. 2 is a schematic structural diagram of an identity recognition device according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of an identity recognition device according to an embodiment of the present invention
- FIG. 4 is a schematic diagram of a preferred structure of an identification device according to an embodiment of the present invention.
- FIG. 5 is a flow chart showing a method for automatically answering a user's mobile phone to answer a call according to a preferred embodiment of the present invention.
- FIG. 6 is a block diagram showing an apparatus for automatically recognizing a user's mobile phone answering a call according to a preferred embodiment of the present invention.
- FIG. 1 is a schematic flowchart of an identity recognition method according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps: Step S102: Extract a voiceprint feature of a current call object and a mobile phone number of a current call object. Step S104: Identify an identity of the current call object according to the voiceprint feature and the mobile phone number.
- the identity of the current call object is identified according to the extracted voiceprint feature and the mobile phone number of the current call object, thereby providing a method for effectively identifying the identity of the current call object, and solving the difficult identification in the related art.
- the problem of the identity of the current call object technically reduces the chance of the user being defrauded by the phone.
- the voiceprint feature may be extracted by using a voiceprint extraction technique commonly used in the related art, for example, collecting sound information of the current call object (including analog audio information or digital audio information converted according to the analog audio information).
- the voiceprint feature is extracted according to a predetermined feature extraction algorithm or strategy; the converted voiceprint feature is a predetermined voiceprint data format, and the voiceprint data format may be a string of characters for uniquely identifying the voiceprint feature or
- the numbers can be stored directly in the storage system. In this way, the digitization of the analog sound information is realized, or the voiceprint feature is converted into a string or a numeric string that can be stored and compared.
- the mobile phone number can be directly used to adopt the caller ID technology provided by the operator.
- step S104 when identifying the identity of the current call object, the following manner may be adopted: querying the corresponding data record saved in the address book database according to the extracted mobile phone number and the extracted voiceprint feature; The extracted voiceprint feature and the matching result of the mobile phone number and the corresponding data record; according to the matching result, the identity of the current call object is identified.
- the data record saved in the address book database can be added in two ways, including: adding new data according to the mobile phone number input by the user and the voiceprint feature collected by the communication terminal before or after the user inputs the mobile phone number. Record to the address book database.
- a package file of a data record is obtained from the external memory, and the data record stored therein is imported into the address book database according to the package file.
- the query may be performed in two ways, for example: querying the address book database according to the extracted mobile phone number.
- the stored voiceprint feature corresponding to the mobile phone number; or the mobile phone number corresponding to the voiceprint feature stored in the address book database is searched according to the extracted voiceprint feature.
- the voiceprint feature can be queried by the mobile phone number, or the mobile phone number can be queried according to the voiceprint feature.
- the processing may be separately performed according to different query modes, for example: determining whether the extracted mobile phone number is in the address book database Recording, and judging whether the voiceprint feature corresponding to the mobile phone number recorded in the address book database matches the extracted voiceprint feature; and/or determining whether the extracted voiceprint feature is recorded in the address book database, and determining whether the record is recorded in Whether the mobile phone number corresponding to the voiceprint feature in the address book database matches the extracted mobile phone number.
- identifying, according to the matching result, the identity of the current call object includes at least one of the following four manners: the mobile phone number that is extracted in the matching result is recorded in the address book database, and If the voiceprint feature corresponding to the mobile phone number recorded in the address book database matches the extracted voiceprint feature, or if the matching result is the extracted voiceprint feature, the record is recorded in the address book database, and is recorded in the address book database.
- the current call object is identified as a trusted identity; in the matching result, the extracted mobile phone number is recorded in the address book database, but recorded in the communication If the voiceprint feature corresponding to the mobile phone number in the database does not match the extracted voiceprint feature, the current call object is identified as a non-trusted identity; the voiceprint feature extracted in the database has a record in the address book database.
- the mobile phone number and extraction corresponding to the voiceprint feature recorded in the address book database did not match the phone number, identify the current call target mobile number has been changed;
- the address book data information of the current call object is identified as to be added.
- the mobile phone number and the voiceprint feature may also be saved in the address book database.
- the prompt may be displayed during the call and/or after the call process according to the recognition result of the identity of the current call object.
- the information includes: at least one of the following: a matching result of the voiceprint feature and the mobile phone number and the record stored in the address book database, a matching degree of the voiceprint feature and the voiceprint feature recorded in the address book database, and different recognition
- the resulting security risk alert information, mobile phone number, and other address book information corresponding to the mobile phone number Through the diversified display information, the user can be intuitively perceived; at the same time, while displaying, the sound can also be given to alert the user.
- the address book database can be saved on the local and/or remote server, where the address book database is stored on the remote server, and can be saved locally by using timing synchronization or synchronization at any time.
- the address book database is synchronized with the address book database stored on the remote server.
- the address book database is stored on the local and/or remote server by encryption.
- an identification device is provided, which is arranged to implement the above identification method.
- the identity identification device described in the device embodiment corresponds to the above-mentioned identity identification method embodiment, and the structure of a specific module or unit in the device may not be well known, but those skilled in the art may refer to known technologies. And the technical content disclosed in this embodiment can be easily realized.
- 2 is a schematic structural diagram of an identity recognition apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes: an extraction module 22 and an identification module 24, wherein the extraction module 22 is configured to extract voiceprint features of a current call object. And the mobile phone number of the current call object; the identification module 24 is coupled to the extraction module 22, and is configured to identify the identity of the current call object according to the voiceprint feature and the mobile phone number.
- FIG. 3 is a schematic diagram of a preferred structure of an identity recognition apparatus according to an embodiment of the present invention. As shown in FIG.
- the extraction module 22 may further include: an acquisition unit 222 configured to collect sound information of a current call object; 224 is coupled to acquisition unit 222, configured to extract voiceprint features based on the sound information; conversion unit 226 is coupled to extraction unit 224, configured to convert the voiceprint features into a predetermined voiceprint data format.
- FIG. 4 is a schematic diagram of a preferred structure of an identity recognition apparatus according to an embodiment of the present invention.
- the identification module 24 may include: an inquiry unit 242, configured to extract the mobile phone number and the extracted voiceprint according to the extracted mobile phone number.
- the embodiment further provides a communication terminal, including the above identity recognition device.
- the communication device comprises a communication device, such as a mobile communication device and a fixed communication device, which can be set to voice communication and has a communication object identifier (for example, a mobile phone number).
- a communication object identifier for example, a mobile phone number
- the preferred embodiment provides a method and a device for automatically recognizing a user's mobile phone answering a call, and relates to a technical field that can automatically identify a user's real identity when the mobile phone answers the call in the mobile terminal, and particularly relates to a voiceprint recognition technology.
- the inventor's research found that: no matter what means the scammer uses, pretending to be someone else's voice is vivid, his own voiceprint characteristics are unique and cannot be changed.
- the so-called voiceprint is a sound wave spectrum that carries speech information displayed by an electroacoustic instrument.
- Modern scientific research shows that voiceprints are not only specific but also relatively stable. After adulthood, the human voice can remain relatively stable for a long time. Experiments have shown that no matter whether the speaker deliberately imitates the voice and tone of others, or whispers softly, even if the imitation is vivid, the voiceprint is always the same.
- the investigators can compare the voiceprints of the obtained criminals and the voiceprints of the suspects through the voiceprint identification technology, quickly identify the criminals, and provide reliable evidence for investigation and resolution.
- the human voice can be divided into dozens of features according to different elements. In the preferred embodiment, these features can be converted into storable data and stored in a database to form a voiceprint library.
- manufacturers such as Nuance have mastered mature speech recognition and voiceprint recognition technologies and have successfully adopted them in various fields.
- the method provided in the preferred embodiment can be combined with today's high-end mobile phones, especially smart phones, with powerful processing capabilities, combined with existing voiceprint recognition technology, mobile database technology, cloud technology, and re-run the process of receiving calls by users.
- a mobile phone device is also provided by the method in the preferred embodiment.
- the preferred embodiment of the present invention is combined with the cloud technology, and the technical solution is implemented as follows: When the mobile phone answers the incoming call, the mobile phone records the voiceprint feature of the other party, and the voiceprint feature is the same as the user local and the cloud.
- the mobile phone can automatically match the information in the address book with the voiceprint feature and the caller number, thereby identifying the true identity and intention of the caller, and systematically summarizing the results into four decisions, giving the user a mobile phone interface for each result. Different tips.
- Each record in the user's address book database can include three basic fields: mobile phone number, name, and voice signature.
- the database can be saved locally or in the cloud.
- the mobile phone number and name are explicit data, which can be displayed on the user's mobile phone interface.
- the shape of the voiceprint feature is generally implicit data and does not need to be displayed on the user interface. That is to say, the information of the voiceprint feature is transparent to the user, and the various operations of the voiceprint characteristic parameter of the mobile phone need not be open to the user, and the user does not have to pay attention to the existence of the voiceprint feature.
- an index table of voiceprint features can be established in the database.
- the voiceprint feature is extracted from the voice of the opposite user. 6. First, query the voiceprint feature in the user address book database, and proceed to the next step according to the matching result.
- the voiceprint feature can be matched, but the mobile phone number does not match, in addition to displaying the person's name XXX in the call interface, and adding special prompt information, prompting the other party to be known, but using a new number, such as "please Note that XXX is talking to you with a new number.”
- the voiceprint feature is not matched, but the mobile phone number can match, in addition to displaying the person's name XXX in the call interface, and adding special prompt information, prompting the other party to use the mobile phone number is familiar, but the other party is a stranger For example, "Please note that the person currently calling you is not XXX".
- FIG. 5 is a schematic flowchart of a method for automatically answering a call by a user's mobile phone according to a preferred embodiment of the present invention. As shown in FIG. 5, the process includes the following steps: Step S502: The recorded information in the address book database of the user is already recorded. Each piece of information includes three fields: name, mobile phone number, and voiceprint feature.
- the user name can be entered or swept from other databases.
- the basis of the method is established in the user's address book database.
- the pattern characterizes the data of this field. Therefore, the user's address book is required to have these three basic fields. If the address of the voiceprint feature is absent in the address book, the mobile phone cannot accurately determine the true identity of the caller.
- This database can be used by the user It is gradually established. For example, after the first call, the voiceprint information of the caller can be saved and used later. In addition, the user can also improve the voiceprint information of his address book through other existing databases.
- Step S504 in the call interface, the mobile phone extracts and extracts the voiceprint feature from the peer voice, and matches the voiceprint feature and the mobile phone number; each time a call is established, the mobile phone can automatically collect the voice information of the opposite party, when the information After the data is sufficient, the voiceprint feature can be extracted by the voiceprint recognition device, and the voiceprint feature can be converted into the voiceprint data format saved in the mobile phone address book database for easy matching; the mobile phone first has all the voiceprints in the database. Feature matching, if a record A in the database is matched, the caller number is matched with the number saved in the record A. If the match is successful, the process proceeds to step S506, and if the match is not successful, the process proceeds to step S508.
- Step S506 the voiceprint and the number are matched, and the normal processing is performed; the voiceprint feature and the mobile phone number can be successfully matched with a record in the mobile phone address book, indicating that the person is indeed in a normal record in the address book, in this case Normal processing, the name of the caller can be displayed on the communication interface, no special prompt is required.
- Step S508 the voiceprint matching, the number does not match, prompting the other party to be the recognized person, but adopting the new number;
- the voiceprint feature can match, indicating that the caller is the person who knows, the information has been saved in the address book, but the caller The number is different from the mobile number used in the last call, indicating that the person is using the new mobile number.
- the owner needs to judge the processing by himself, and the mobile phone can give a prompt message on the interface. If it is confirmed that the acquaintance has changed the number, the owner can update the mobile phone number by himself.
- Step S510 the voiceprint does not match, the number matches, the other party's number is familiar, but the stranger; the voiceprint feature cannot match, the description and the caller did not pass the conversation before, this is a stranger, but the number of the caller
- it exists in the address book indicating that he is using the mobile phone of the owner of the number, or the mobile phone of the owner of the number obtained by illegal means. In this case, the owner needs to be highly alert to the intention of the incoming person, and the mobile phone can be given at the interface. Prompt message.
- Step S512 the voiceprint and the number do not match, prompting the user that the new number needs to be saved, and the voiceprint is saved while the user performs the save recording action;
- the voiceprint feature and the number can't match.
- the description is a strange number.
- the owner is willing to add the number to the address book database, the mobile phone only gives the prompt information.
- the technical solution of the present invention will be described in detail below with a specific use case.
- the user uses the phone, he needs to create an address book database containing voiceprint features, which can be stored locally or in the cloud. The user can make a phone call with the familiar person, and then save the call record to save the voiceprint information of the other party to the database.
- Scene 1 Wang got a call one day, the caller interface showed the classmate's phone, he immediately answered, the old classmate did not meet for a long time, the two people chatted cordially, after saying two sentences, the mobile phone was doing in the background The following actions are taken: the voice of the classmate is extracted from the voiceprint, and the contact record of the classmate is matched, and the voiceprint information is consistent, so that the confirmation is the classmate, the mobile phone does not make an abnormal prompt on the interface, and Wang is confidently chatting with the classmate.
- Scene 2 Wang received a call one day.
- the caller interface showed that he was a friend's phone. He immediately answered, and the voice was like a friend. The friend told him that he had a car accident on the road. At present, he needs to pay medical expenses. Contacting his family, I hope he will help me to pay for it first.
- Wang has a good relationship with the friend. When hesitating, the mobile phone does the following actions in the background: extracting the voice of the friend and matching the friend The contact record found that the voiceprint information is inconsistent, so the phone sends an abnormal message on the interface. "The person who is currently talking to you is not XXX, please be vigilant.” Wang stabilized the person and contacted the real friend XXX through other means.
- the caller interface display is a strange number. He immediately answers the phone. He can't hear who the phone is. The phone does the following actions in the background: The voice is extracted from the voice, and it can't be in the background. After matching the record, after the passage, the original phone is a sales call, and Wang did not record the number.
- the preferred embodiment of the present invention further provides a device for automatically recognizing a user's mobile phone answering a call.
- FIG. 6 is a schematic structural diagram of an apparatus for automatically recognizing a user's mobile phone to answer a call according to a preferred embodiment of the present invention.
- the device includes: an interface display module 601, a voiceprint feature extraction module 602, a voiceprint matching module 603, a number matching module 604, an address book database (voiceprint) 605, a matching result decision module 606, and an interface display module 601 including an incoming call interface and a call.
- Interface in the incoming call interface, the caller number can be extracted into the address book database (voiceprint) 605 to the caller's name and displayed to the owner; in the call interface, it is responsible for displaying the user's real information and prompt terms, and can The voice data is forwarded to the voiceprint feature extraction module 602.
- the voiceprint feature extraction module 602 extracts the voice features collected during the call, extracts the effective features of the voiceprint, and converts them into the voiceprint data format saved in the address book database for comparison.
- the voiceprint matching module 603 is responsible for the effective voiceprint data with the existing letter in the database. To compare and feedback the matching result, in order to speed up the query and the matching speed, the voiceprint data may be hashed and the index table of the voiceprint data is established; the number matching module 604 is responsible for the caller number in the database. There is information for comparison. The function of this module is generally available on the mobile phone, but the algorithm is different, resulting in different matching speeds.
- the address book database (voiceprint) 605 mainly stores three basic fields for each record: (mobile phone number, name, voiceprint feature) , adding a voiceprint field than the traditional address book database, the voiceprint field attribute can be set to be visible only to the mobile phone, the user is invisible, and the 605 can be local or cloud storage, the local and cloud data can be the same;
- the result decision module 606 mainly combines the four matching results of the voiceprint and the mobile phone number, gives relevant judgment information, and provides the judgment information to the interface display module 601 for display.
- the method or device provided by the above embodiments of the present invention utilizes the voiceprint recognition technology to recognize the real information of the user when the mobile phone answers the call, and can promptly give the user a prompt to help the user by analyzing the result of the decision.
- the method and device of being deceived When the user adopts the device, the mobile phone can automatically authenticate the incoming call user, and when the call is found to have a problem, the owner prompts the information to prevent the user from being deceived.
- the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
- the computing device may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into respective integrated circuit modules. Blocks, or a plurality of modules or steps in them, are implemented as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
- an identification method and device and a communication terminal provided by an embodiment of the present invention have the following beneficial effects: A method for effectively identifying the identity of a current call object is provided, which technically reduces the user's The opportunity for phone fraud.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Acoustics & Sound (AREA)
- Databases & Information Systems (AREA)
- Game Theory and Decision Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明公开了一种身份识别方法、装置及通讯终端。其中,该方法包括:提取当前通话对象的声纹特征和当前通话对象的手机号码;根据该声纹特征和该手机号码,识别当前通话对象的身份。通过本发明,解决了相关技术中存在的通信对象的身份难以有效识别的问题,从而提供了一种有效识别当前通话对象的身份的方法,从技术上降低了用户被电话欺诈的机会。
Description
身份识别方法、 装置及通讯终端 技术领域 本发明涉及通信领域, 具体而言, 涉及一种身份识别方法和装置及通讯终端。 背景技术 当今社会, 利用手机进行行骗的案例很多。 例如: 有时候骗子可能冒充受害者的 家人打电话行骗, 骗子采取的手段多种多样, 有盗窃手机的, 也有采用特殊的拨号软 件的, 这种拨号软件在给受害者打电话时, 能显示成它需要的号码以诱导受害者, 另 夕卜, 现在智能机上病毒软件也很多, 如果受害者手机上被种植木马病毒, 也可以伪装 成受害者认识的电话号码打电话, 防不胜防。 针对相关技术中存在的通信对象的身份难以有效识别的问题, 目前尚未提出有效 的解决方案。 发明内容 本发明实施例提供了一种身份识别方法和装置及通讯终端,以至少解决上述问题。 根据本发明的一个实施例, 提供了一种身份识别方法, 包括: 提取当前通话对象 的声纹特征和所述当前通话对象的手机号码; 根据所述声纹特征和所述手机号码, 识 别所述当前通话对象的身份。 提取所述声纹特征包括: 采集所述当前通话对象的声音信息;根据所述声音信息, 提取所述声纹特征; 转化所述声纹特征为预定的声纹数据格式。 根据所述声纹特征和所述手机号码, 识别所述当前通话对象的身份包括: 根据提 取的所述手机号码和提取的所述声纹特征, 查询通讯录数据库中保存的对应的数据记 录; 判断提取的所述声纹特征和所述手机号码与对应的所述数据记录的匹配结果; 根 据所述匹配结果, 识别所述当前通话对象的身份。 所述方法还包括: 根据用户输入的手机号码和采集的声纹特征, 添加新的数据记 录至所述通讯录数据库; 和 /或导入保存的数据记录至所述通讯录数据库。
根据提取的所述手机号码和提取的所述声纹特征查询通讯录数据库中保存的对应 的数据记录包括: 根据提取的所述手机号码查询所述通讯录数据库中保存的与所述手 机号码对应的声纹特征,和 /或根据提取的所述声纹特征查询所述通讯录数据库中保存 的与所述声纹特征对应的手机号码。 判断提取的所述声纹特征和提取的所述手机号码与对应的所述数据记录的匹配结 果包括: 判断提取的所述手机号码在所述通讯录数据库中是否有记录, 并判断记录在 所述通讯录数据库中的该手机号码对应的声纹特征与提取的所述声纹特征是否匹配; 和 /或判断提取的所述声纹特征在所述通讯录数据库中是否有记录, 并判断记录在所述 通讯录数据库中的该声纹特征对应的手机号码与提取的所述手机号码是否匹配。 根据所述匹配结果识别所述当前通话对象的身份包括以下至少之一: 在所述匹配 结果为提取的所述手机号码在所述通讯录数据库中有记录、 且记录在所述通讯录数据 库中的该手机号码对应的声纹特征与提取的所述声纹特征匹配的情况下, 或者在所述 匹配结果为提取的所述声纹特征在所述通讯录数据库中有记录、 且记录在所述通讯录 数据库中的该声纹特征对应的的手机号码与提取的所述手机号码匹配的情况下, 识别 所述当前通话对象为可信身份; 在所述匹配结果为提取的所述手机号码在所述通讯录 数据库中有记录、 但记录在所述通讯录数据库中的该手机号码对应的声纹特征与提取 的所述声纹特征未匹配的情况下, 识别所述当前通话对象为非可信身份; 在所述匹配 结果为提取的所述声纹特征在所述通讯录数据库中有记录、 但记录在所述通讯录数据 库中的该声纹特征对应的的手机号码与提取的所述手机号码未匹配的情况下, 识别所 述当前通话对象的手机号码已变更; 在所述匹配结果为提取的所述声纹特征在所述通 讯录数据库中无记录、且提取的所述手机号码在所述通讯录数据库中无记录的情况下, 识别所述当前通话对象的通讯录数据信息为待添加。 在识别所述当前通话对象的通讯录数据信息为待添加之后, 所述方法还包括: 将 所述手机号码和所述声纹特征保存至所述通讯录数据库中。 在根据所述声纹特征和所述手机号码识别所述当前通话对象的身份之后, 所述方 法还包括: 根据对所述当前通话对象的身份的识别结果, 在通话过程中和 /或通话过程 后显示提示信息, 其中, 所述提示信息包括以下至少之一: 所述声纹特征和所述手机 号码与通讯录数据库中保存的记录的匹配结果、 所述声纹特征与通讯录数据库中记录 的声纹特征的匹配程度、 针对不同识别结果的安全风险提示信息、 所述手机号码及所 述手机号码对应的其他通讯录信息。 所述通讯录数据库保存在本地和 /或远端的服务器上。
在所述通讯录数据库保存在远端的服务器上的情况下, 所述方法还包括: 同步保 存在本地的通讯录数据库和保存在远端的服务器上的通讯录数据库。 所述通讯录数据库通过加密方式保存在本地和 /或远端的服务器上。 根据本发明的另一个实施例, 还提供了一种身份识别装置, 包括: 提取模块, 设 置为提取当前通话对象的声纹特征和所述当前通话对象的手机号码; 识别模块, 设置 为根据所述声纹特征和所述手机号码, 识别所述当前通话对象的身份。 所述提取模块包括: 采集单元, 设置为采集所述当前通话对象的声音信息; 提取 单元, 设置为根据所述声音信息, 提取所述声纹特征; 转化单元, 设置为转化所述声 纹特征为预定的声纹数据格式。 所述识别模块包括: 查询单元, 设置为根据提取的所述手机号码和提取的所述声 纹特征, 查询通讯录数据库中保存的对应的数据记录; 判断单元, 设置为判断提取的 所述声纹特征和所述手机号码与对应的所述数据记录的匹配结果; 识别单元, 设置为 根据所述匹配结果, 识别所述当前通话对象的身份。 根据本发明的另一个实施例, 还提供了一种通讯终端, 包括如上述任一项所述的 身份识别装置。 通过本发明实施例, 采用提取当前通话对象的声纹特征和当前通话对象的手机号 码; 根据该声纹特征和该手机号码, 识别当前通话对象的身份的方式, 解决了相关技 术中存在的通信对象的身份难以有效识别的问题, 从而提供了一种有效识别当前通话 对象的身份的方法, 从技术上降低了用户被电话欺诈的机会。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例的身份识别方法的流程示意图; 图 2是根据本发明实施例的身份识别装置的结构示意图; 图 3是根据本发明实施例的身份识别装置的优选结构示意图一; 图 4是根据本发明实施例的身份识别装置的优选结构示意图二
图 5是根据本发明优选实施例的通过自动识别用户的手机接听电话的方法的流程 示意图; 图 6是根据本发明优选实施例的自动识别用户的手机接听电话的装置的结构示意 图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特征可以相 互组合。 下面将参考附图并结合实施例来详细说明本发明。 在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执 行, 并且, 虽然在流程图中示出了逻辑顺序, 但是在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤。 本实施例提供了一种身份识别方法, 图 1是根据本发明实施例的身份识别方法的 流程示意图。 如图 1所示, 该流程包括如下步骤: 步骤 S102, 提取当前通话对象的声纹特征和当前通话对象的手机号码; 步骤 S104, 根据声纹特征和手机号码, 识别当前通话对象的身份。 通过上述步骤, 根据提取到的当前通话对象的声纹特征和手机号码识别当前通话 对象的身份, 从而提供了一种有效识别当前通话对象的身份的方法, 解决了相关技术 中存在的难以有效识别当前通话对象的身份的问题, 从技术上降低了用户被诈骗电话 欺诈的机会。 可选地,在步骤 S102中,提取声纹特征可以采用相关技术中常用的声纹提取技术, 例如, 采集当前通话对象的声音信息 (包括模拟音频信息或者根据模拟音频信息转换 的数字音频信息); 根据声音信息, 按照预定的特征提取算法或者策略提取声纹特征; 转化声纹特征为预定的声纹数据格式, 该声纹数据格式可以是一串用于唯一标识该声 纹特征的字符或数字, 可以直接存储在存储系统中。 通过该方式, 实现了模拟声音信 息的数字化, 或者将声纹特征转换为可供存储和比对的字符串或者数字串。 可选地, 提取手机号码可以直接采用运营商提供的来电显示技术。 可选地, 在步骤 S104中, 识别当前通话对象的身份时, 可以采用下列方式: 根据 提取的手机号码和提取的声纹特征, 查询通讯录数据库中保存的对应的数据记录; 判
断提取的声纹特征和手机号码与对应的数据记录的匹配结果; 根据匹配结果, 识别当 前通话对象的身份。 可选地, 通讯录数据库中保存的数据记录可以通过两种方式进行添加, 包括: 根 据用户输入的手机号码和在用户输入手机号码之前或者之后使用通讯终端采集的声纹 特征, 添加新的数据记录至通讯录数据库。 或者, 从外部存储器中获得一个数据记录 的打包文件, 根据该打包文件导入其中保存的数据记录至通讯录数据库。 可选地, 在上述根据提取的手机号码和提取的声纹特征查询通讯录数据库中保存 的对应的数据记录时, 可以采用两种方式进行查询, 例如: 根据提取的手机号码查询 通讯录数据库中保存的与手机号码对应的声纹特征; 或根据提取的声纹特征查询通讯 录数据库中保存的与声纹特征对应的手机号码。 通过该方式, 可以支持通过手机号码 查询声纹特征, 或者根据声纹特征查询手机号码。 可选地, 在判断提取的声纹特征和提取的手机号码与对应的数据记录的匹配结果 时, 可以根据查询方式的不同分别进行处理, 例如: 判断提取的手机号码在通讯录数 据库中是否有记录, 并判断记录在通讯录数据库中的该手机号码对应的声纹特征与提 取的声纹特征是否匹配; 和 /或判断提取的声纹特征在通讯录数据库中是否有记录, 并 判断记录在通讯录数据库中的该声纹特征对应的手机号码与提取的手机号码是否匹 配。 可选地, 在根据上述方式获得匹配结果后, 根据匹配结果识别当前通话对象的身 份包括以下四种方式中的至少一种: 在匹配结果为提取的手机号码在通讯录数据库中有记录、 且记录在通讯录数据库 中的该手机号码对应的声纹特征与提取的声纹特征匹配的情况下, 或者在匹配结果为 提取的声纹特征在通讯录数据库中有记录、 且记录在通讯录数据库中的该声纹特征对 应的的手机号码与提取的手机号码匹配的情况下, 识别当前通话对象为可信身份; 在匹配结果为提取的手机号码在通讯录数据库中有记录、 但记录在通讯录数据库 中的该手机号码对应的声纹特征与提取的声纹特征未匹配的情况下, 识别当前通话对 象为非可信身份; 在匹配结果为提取的声纹特征在通讯录数据库中有记录、 但记录在通讯录数据库 中的该声纹特征对应的的手机号码与提取的手机号码未匹配的情况下, 识别当前通话 对象的手机号码已变更;
在匹配结果为提取的声纹特征在通讯录数据库中无记录、 且提取的手机号码在通 讯录数据库中无记录的情况下, 识别当前通话对象的通讯录数据信息为待添加。 其中, 可选地, 在识别当前通话对象的通讯录数据信息为待添加之后, 还可以将 手机号码和声纹特征保存至通讯录数据库中。 可选地, 在根据声纹特征和手机号码识别当前通话对象的身份之后, 为了能够提 示用户注意, 可以根据对当前通话对象的身份的识别结果, 在通话过程中和 /或通话过 程后显示提示信息, 其中, 提示信息包括以下至少之一: 声纹特征和手机号码与通讯 录数据库中保存的记录的匹配结果、 声纹特征与通讯录数据库中记录的声纹特征的匹 配程度、 针对不同识别结果的安全风险提示信息、 手机号码及手机号码对应的其他通 讯录信息。 通过多元化的显示信息, 可以给用户直观的感受; 同时, 在显示同时, 还 可以给出声音提醒用户注意。 可选地, 通讯录数据库可以保存在本地和 /或远端的服务器上, 其中, 在通讯录数 据库保存在远端的服务器上的情况下, 可以采用定时同步或者随时同步的方式对保存 在本地的通讯录数据库和保存在远端的服务器上的通讯录数据库进行同步。 可选地, 为了提高通讯数据库的安全性, 防止恶意软件的修改, 通讯录数据库通 过加密方式保存在本地和 /或远端的服务器上。 为了实现上述方法, 在本实施例中提供了一种身份识别装置, 该装置设置为实现 上述身份识别方法。 需要说明的是, 装置实施例中描述的身份识别装置对应于上述的 身份识别方法实施例, 其装置中具体的模块或单元的结构可能并不是公知的, 但是本 领域技术人员可以参照公知的技术以及本实施例中披露的技术内容得以轻松实现。 图 2是根据本发明实施例的身份识别装置的结构示意图, 如图 2所示, 该装置包 括: 提取模块 22和识别模块 24, 其中, 提取模块 22, 设置为提取当前通话对象的声 纹特征和当前通话对象的手机号码; 识别模块 24耦合至提取模块 22, 设置为根据声 纹特征和手机号码, 识别当前通话对象的身份。 本发明的实施例中所涉及到的模块、 单元可以通过软件的方式实现, 也可以通过 硬件的方式来实现。本实施例中的所描述的模块、单元也可以设置在处理器中, 例如, 可以描述为: 一种处理器包括提取模块 22和识别模块 24。 其中, 这些模块的名称在 某种情况下并不构成对该模块本身的限定, 例如, 提取模块 22还可以被描述为 "设置 为提取当前通话对象的声纹特征和当前通话对象的手机号码的模块"。
图 3是根据本发明实施例的身份识别装置的优选结构示意图一, 如图 3所示, 可 选地, 提取模块 22可以包括: 采集单元 222, 设置为采集当前通话对象的声音信息; 提取单元 224耦合至采集单元 222, 设置为根据声音信息, 提取声纹特征; 转化单元 226耦合至提取单元 224, 设置为转化声纹特征为预定的声纹数据格式。 图 4是根据本发明实施例的身份识别装置的优选结构示意图二, 如图 4所示, 可 选地, 识别模块 24可以包括: 查询单元 242, 设置为根据提取的手机号码和提取的声 纹特征, 查询通讯录数据库中保存的对应的数据记录; 判断单元 244耦合至查询单元 242, 设置为判断提取的声纹特征和手机号码与对应的数据记录的匹配结果; 识别单元 246耦合至判断单元 244, 设置为根据匹配结果, 识别当前通话对象的身份。 本实施例还提供了一种通讯终端, 包括上述的身份识别装置。 可选地, 该通讯装 置包括移动通讯装置和固定通讯装置等可以设置为语音通讯且具备通讯对象标识 (例 如手机号码) 的通讯设备。 为了使本发明的技术方案和实现方法更加清楚, 下面将结合优选的实施例对其实 现过程进行详细描述。 本优选实施例提供了一种能自动识别用户的手机接听电话的方法和装置, 涉及移 动终端中实现手机接听电话时能够自动识别用户真实身份的技术领域, 特别是指一种 结合声纹识别技术实现手机接听电话时能够识别出用户的真实信息, 并及时给予用户 提示, 协助用户正确判断的方法及装置。 为了解决相关技术中通过电话冒充机主进行诈骗的问题, 发明人研究发现: 不管 骗子采用什么手段, 冒充别人的声音再惟妙惟肖, 他本人的声纹特征却是唯一的, 无 法改变。 因此, 在本发明的实施例中可以利用这一点, 在手机上设计新的功能点来有 效地防止行骗。 其中, 所谓的声纹(Voiceprint)是用电声学仪器显示的携带言语信息的声波频谱。 现代科学研究表明, 声纹不仅具有特定性, 而且有相对稳定性的特点。 成年以后, 人 的声音可保持长期相对稳定不变。实验证明,无论讲话者是故意模仿他人声音和语气, 还是耳语轻声讲话, 即使模仿得惟妙惟肖, 其声纹却始终相同。 基于声纹的这两个特 征, 侦查人员就可将获取的犯罪分子的声纹和嫌疑人的声纹, 通过声纹鉴定技术进行 检验对比, 迅速认定罪犯, 为侦查破案提供可靠的证据。 人的声音按照不同的要素, 可以分为几十种特征, 在本优选实施例中, 可以将这 些特征转换成可存贮的数据保存在数据库中, 形成声纹库。
现在业界象 Nuance等厂家掌握了成熟的语音识别、声纹识别等技术, 已经成功在 多种领域采用。 本优选实施例中提供的方法可以结合当今的中高端手机, 尤其是智能 手机具备强大的处理能力, 结合现有的声纹识别技术、 手机数据库技术、 云端技术, 对于用户接听电话的流程重新进行创新性的设计, 从而可以很好地结合对来电用户进 行身份识别后, 通过给机主相应的提示信息, 以达到防止行骗目的。 另外, 为了实现一种自动识别用户身份的接听电话的方法, 在本优选实施例中还 通过此方法给出一种手机装置。 为达到上述目的, 本发明优选实施例结合云技术, 其技术方案是这样实现的: 当 手机接听来电时, 手机会将对方的声纹特征记录下来, 并将该声纹特征同用户本地和 云端数据库中保存的已有声纹特征进行匹配, 通过声纹特征和手机号码的综合匹配结 果自动识别出来电者的真实身份和意图, 并归纳成四种决策结果, 针对每种结果在手 机界面上给予用户提示, 协助用户作出正常的决断。 该技术方案的主要特征如下:
1、手机能够结合声纹特征和来电号码自动匹配通讯录中的信息,从而识别出来电 者的真实身份和意图, 并系统归纳成成四种决策结果, 针对每种结果在手机界面上给 予用户不同的提示。
2、 用户的通讯录数据库中每条记录可以包括三个基本字段: 手机号码、 姓名、 声 纹特征, 该数据库可以保存在手机本地或云端。
3、手机号码和姓名是显式数据, 在用户的手机界面能够显示出来。而声纹特征的 形态一般情况下是隐式数据, 不需要在用户界面上显示出来。 也就是说声纹特征的信 息对用户来说是透明的, 手机对声纹特征参数的各种操作不需要对用户不开放, 用户 也不必关注声纹特征的存在。
4、 为方便进行声纹特征的查询, 可以在数据库中建立声纹特征的索引表。
5、 当手机接听来电后, 从对端用户的声音中提取出声纹特征。 6、 首先将该声纹特征在用户通讯录数据库中查询, 根据匹配结果, 进行下一步处 理。
7、 进一步, 再将来电号码在用户通讯录数据库中查询, 根据匹配结果, 进行下一 步处理。
8、 根据声纹特征和号码的匹配如果, 分成如下三种情况处理:
1 )、声纹特征和手机号码均正确匹配, 正常显示来电号码的姓名, 不做特殊提示。
2 )、 声纹特征能够匹配到, 但手机号码不匹配, 则在通话界面除显示该人的姓名 XXX, 同时增加特殊提示信息, 提示对方是认识的人, 但采用了新号码, 例如 "请注 意, XXX正在用新号码与你通话"。
3 )、 声纹特征没有匹配到, 但手机号码能够匹配, 则在通话界面除显示该人的姓 名 XXX, 同时增加特殊提示信息, 提示对方采用的手机号码是熟悉的, 但对方是一个 陌生人, 例如 "请注意, 当前与你通话的人不是 XXX"。
4 )、如果声纹特征和手机号码均无法匹配,则在通话界面只显示该人的手机号码, 同时增加特殊提示信息, 例如 "此号码不在通讯录中, 是否保存? "。 用户可以选择是 否保存, 如果保存, 则将该条记录的姓名、 手机号码、 声纹特征存贮到通讯录的数据 库中。 从以上技术特征可以看到, 采用本发明优选实施例的方法, 让用户在通话过程中 能够及时发现, 对端用户的真实身份, 以方便用户做出正确的决定, 防止用户受损失, 保护了用户的利益。 下面结合附图来进一步对上述技术方案进行说明。 本发明优选实施例的基本思想是: 在用户通讯录的数据库中增加一个声纹特征的 字段, 通话过程中将对方的语音中的声纹特征提取出来, 结合来电号码, 在通讯录数 据库中进行查询匹配, 识别出对方的真实身份, 根据匹配的四种不同结果, 给予机主 相关提示信息。 图 5是根据本发明优选实施例的通过自动识别用户的手机接听电话的方法的流程 示意图, 如图 5所示, 该流程包括如下步骤: 步骤 S502, 用户的通讯录数据库中已经有记录的信息, 每条信息包括姓名、 手机 号码和声纹特征三个字段, 该信息用户名可以自行录入或从其它数据库冋步; 该方法的基础建立在用户的通讯录数据库中每条记录中都保存有声纹特征这个字 段的数据。 因此要求用户的通讯录中要有基本的这三个字段, 如果通讯录中缺乏声纹 特征这个字段, 那么手机无法准确判断来电人员的真实身份。 这个数据库可以由用户
逐步建立起来, 譬如第一次通话后可将来电人员的声纹信息保存, 后续就可以使用, 另外, 用户也可以通过已有的其它数据库完善自己的通讯录声纹信息。 步骤 S504, 在通话界面, 手机从对端声音中采集提取出声纹特征, 匹配声纹特征 和手机号码; 每当建立起一个通话以后, 手机能够自动采集对端人员的声音信息, 当该信息数 据足够以后, 就可以通过声纹识别装置提取出声纹特征, 并将该声纹特征转换成手机 通讯录数据库中保存的声纹数据格式, 便于进行匹配; 手机首先同数据库中所有的声 纹特征匹配, 如果匹配到了数据库中的一条记录 A, 那么就再将来电号码和记录 A中 保存的号码进行匹配, 如果匹配成功, 则转入步骤 S506, 如果没有匹配成功, 则转入 步骤 S508。 如果手机没有匹配上数据库中的任何一条记录, 那么就采用来电号码进行 查询, 如果来电号码匹配到了数据库的一条记录 B, 那么转入步骤 S510, 如果来电号 码也没有匹配上数据库中的任何一条记录, 则转入歩骤 S512。 步骤 S506, 声纹和号码均匹配, 正常处理; 声纹特征和手机号码能够正常与手机通讯录中的一条记录匹配成功, 说明来人确 实在通讯录中的一条正常记录中, 这种情况下正常处理, 在通讯界面显示来电人员的 姓名即可, 不需要特殊提示。 步骤 S508, 声纹匹配, 号码不匹配, 提示对方是认识的人, 但是采用新号码; 声纹特征能匹配, 说明来电人员是认识的人, 其信息已保存在通讯录中, 但这次 来电的号码和上次来电所采用的手机号码不一样, 说明该人用的是新手机号码。 至于 为什么来人要采用新手机号码, 就需要机主自行判断处理, 手机可在界面给出提示信 息。 如果确认是熟人换了号码, 可以由机主自行更新手机号码。 步骤 S510, 声纹不匹配, 号码匹配, 提示对方的号码是熟悉的, 但是陌生人; 声纹特征不能匹配, 说明和来电人员以前没有通过话, 这是一个陌生人, 但这次 来电的号码却存在通讯录中, 说明他正在使用该号码主人的手机, 或者是用非法手段 获取的该号码主人的手机, 这种情况下机主就需要高度警惕来人的意图, 手机可在界 面给出提示信息。 步骤 S512, 声纹和号码都不匹配, 提示用户该新号码需要保存, 在用户执行保存 记录动作的同时要保存其声纹;
声纹特征和号码都不能匹配, 说明是一个陌生的号码, 至于机主是否愿意将该号 码加入通讯录数据库中, 由其自行决定, 手机只给出提示信息。 下面以一个具体的使用案例, 来对本发明的技术方案进行详细阐述。 当用户使用该手机时, 他需要自行建立包含声纹特征的通讯录数据库, 该数据库 一般来讲可以保存在本地或云端。 用户可以同熟悉的人通个电话, 然后再将通话记录 保存一下, 就能够将对方的声纹信息保存到数据库中。 用户也可以采取其它方式, 将 声纹信息同步到自己的通讯录数据库中, 此处不再赘述。 设想几个可能的场景。 场景 1 : 王某有一天接到一个电话, 来电界面显示是同学的电话, 他立即接听, 老同学好长时间没见面, 两人亲切的聊天, 当说了两句话后, 手机在后台做了如下动 作: 将同学的语音提取出声纹, 并匹配该同学联系人记录, 发现声纹信息一致, 于是 确认就是同学, 手机在界面没有做异常提示, 王某放心地和同学聊天。 场景 2: 王某有一天接到一个电话, 来电界面显示是朋友 XXX的电话, 他立即接 听, 听声音象是朋友, 朋友告诉他路上遇到车祸, 目前在医院, 需要垫付医药费, 由 于没有联系上自己的家人, 希望请他先帮忙垫付下, 王某平时和该朋友关系较好, 正 在犹豫时, 手机在后台做了如下动作: 将朋友的语音提取出声纹, 并匹配了该朋友联 系人记录, 发现声纹信息不一致, 于是手机在界面发出异常提示 "当前与你通话的人 并非 XXX, 请提高警惕", 王某稳住该人, 通过其它方式联系上了真正的朋友 XXX, 确认 XXX的手机刚丢失, 王某立即报警。 场景 3 : 王某有一天接到一个电话, 来电界面显示是一个陌生号码, 他立即接听, 听来电声音是自己的爸爸, 为什么爸爸用了新号码?手机在后台做了如下动作: 将语 音提取出声纹, 并匹配到了爸爸手机号码的记录, 发现声纹信息确实和原来爸爸的号 码记录一致, 于是手机在界面发出异常提示 "当前与你通话的人是你的爸爸, 但他用 了一个新号码", 随后王某询问, 果然是自己的爸爸新换了个手机, 王某放心的将该新 号码保存到手机上。 场景 4: 王某有一天接到一个电话, 来电界面显示是一个陌生号码, 他立即接听, 听不出来电是谁, 手机在后台做了如下动作: 将语音提取出声纹, 在后台也无法匹配 到记录, 通过话后, 原来该电话是一个推销电话, 王某没有记录该号码。
本发明优选实施例还提供了一种自动识别用户的手机接听电话的装置, 图 6是根 据本发明优选实施例的自动识别用户的手机接听电话的装置的结构示意图, 如图 6所 示, 该装置包括: 界面显示模块 601、 声纹特征提取模块 602、 声纹匹配模块 603、 号 码匹配模块 604、 通讯录数据库 (声纹) 605、 匹配结果决策模块 606; 界面显示模块 601包括来电界面和通话界面, 在来电界面, 能够将来电号码到通 讯录数据库 (声纹) 605 中提取到来电人员的姓名并显示给机主; 在通话界面, 则负 责显示用户的真实信息和提示用语, 并且可以将声音数据转发给声纹特征提取模块 602; 声纹特征提取模块 602将通话时采集到的语音信息, 提取出声纹的有效特征, 转 换成通讯录数据库中保存的声纹数据格式, 以便于比较; 声纹匹配模块 603负责将有效声纹数据同数据库中已有信息进行比较, 并反馈匹 配结果, 为了加快查询和匹配的速度, 可以将声纹数据进行哈希 (Hash) 索引, 并建 立声纹数据的索引表; 号码匹配模块 604负责将来电号码同数据库中已有信息进行比较, 该模块功能一 般手机上都存在, 只是算法不同导致匹配速度不同; 通讯录数据库 (声纹) 605每条记录主要保存三个基本字段: (手机号码、 姓名、 声纹特征), 比传统的通讯录数据库增加一个声纹字段,声纹字段的属性可以设为只对 手机可见, 用户不可见, 同时 605可以是本地或云端存贮, 本地和云端的数据可以同 少; 匹配结果决策模块 606主要结合声纹和手机号码的四种匹配结果, 给出相关判断 信息, 并将判断信息提供给界面显示模块 601显示。 综上所述, 通过本发明上述实施例提供的方法或装置, 利用声纹识别技术, 手机 接听电话时能够识别出用户的真实信息,通过分析决策的结果, 能及时给予用户提示, 帮助用户不受骗的方法及装置。 用户采用该装置的时候, 手机能够自动对来电用户进 行身份认证, 当发现来电有问题时, 及时给予机主提示信息, 以防其上当受骗。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 或者将它们分别制作成各个集成电路模
块, 或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明 不限制于任何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 工业实用性 如上所述, 本发明实施例提供的一种身份识别方法和装置及通讯终端, 具有以下 有益效果: 提供了一种有效识别当前通话对象的身份的方法, 从技术上降低了用户被 电话欺诈的机会。
Claims
1. 一种身份识别方法, 包括: 提取当前通话对象的声纹特征和所述当前通话对象的手机号码; 根据所述声纹特征和所述手机号码, 识别所述当前通话对象的身份。
2. 根据权利要求 1所述的方法, 其中, 提取所述声纹特征包括: 采集所述当前通话对象的声音信息;
根据所述声音信息, 提取所述声纹特征;
转化所述声纹特征为预定的声纹数据格式。
3. 根据权利要求 1所述的方法, 其中, 根据所述声纹特征和所述手机号码, 识别 所述当前通话对象的身份包括:
根据提取的所述手机号码和提取的所述声纹特征, 查询通讯录数据库中保 存的对应的数据记录; 判断提取的所述声纹特征和所述手机号码与对应的所述数据记录的匹配结 果;
根据所述匹配结果, 识别所述当前通话对象的身份。
4. 根据权利要求 3所述的方法, 其中, 所述方法还包括: 根据用户输入的手机号码和采集的声纹特征, 添加新的数据记录至所述通 讯录数据库; 和 /或导入保存的数据记录至所述通讯录数据库。
5. 根据权利要求 3所述的方法, 其中, 根据提取的所述手机号码和提取的所述声 纹特征查询通讯录数据库中保存的对应的数据记录包括: 根据提取的所述手机号码查询所述通讯录数据库中保存的与所述手机号码 对应的声纹特征,和 /或根据提取的所述声纹特征查询所述通讯录数据库中保存 的与所述声纹特征对应的手机号码。
6. 根据权利要求 5所述的方法, 其中, 判断提取的所述声纹特征和提取的所述手 机号码与对应的所述数据记录的匹配结果包括:
判断提取的所述手机号码在所述通讯录数据库中是否有记录, 并判断记录 在所述通讯录数据库中的该手机号码对应的声纹特征与提取的所述声纹特征是 否匹配; 和 /或判断提取的所述声纹特征在所述通讯录数据库中是否有记录, 并 判断记录在所述通讯录数据库中的该声纹特征对应的手机号码与提取的所述手 机号码是否匹配。
7. 根据权利要求 6所述的方法, 其中, 根据所述匹配结果识别所述当前通话对象 的身份包括以下至少之一:
在所述匹配结果为提取的所述手机号码在所述通讯录数据库中有记录、 且 记录在所述通讯录数据库中的该手机号码对应的声纹特征与提取的所述声纹特 征匹配的情况下, 或者在所述匹配结果为提取的所述声纹特征在所述通讯录数 据库中有记录、 且记录在所述通讯录数据库中的该声纹特征对应的的手机号码 与提取的所述手机号码匹配的情况下, 识别所述当前通话对象为可信身份; 在所述匹配结果为提取的所述手机号码在所述通讯录数据库中有记录、 但 记录在所述通讯录数据库中的该手机号码对应的声纹特征与提取的所述声纹特 征未匹配的情况下, 识别所述当前通话对象为非可信身份; 在所述匹配结果为提取的所述声纹特征在所述通讯录数据库中有记录、 但 记录在所述通讯录数据库中的该声纹特征对应的的手机号码与提取的所述手机 号码未匹配的情况下, 识别所述当前通话对象的手机号码已变更; 在所述匹配结果为提取的所述声纹特征在所述通讯录数据库中无记录、 且 提取的所述手机号码在所述通讯录数据库中无记录的情况下, 识别所述当前通 话对象的通讯录数据信息为待添加。
8. 根据权利要求 7所述的方法, 其中, 在识别所述当前通话对象的通讯录数据信 息为待添加之后, 所述方法还包括: 将所述手机号码和所述声纹特征保存至所述通讯录数据库中。
9. 根据权利要求 1至 8中任一项所述的方法, 其中, 在根据所述声纹特征和所述 手机号码识别所述当前通话对象的身份之后, 所述方法还包括: 根据对所述当前通话对象的身份的识别结果,在通话过程中和 /或通话过程 后显示提示信息, 其中, 所述提示信息包括以下至少之一: 所述声纹特征和所 述手机号码与通讯录数据库中保存的记录的匹配结果、 所述声纹特征与通讯录 数据库中记录的声纹特征的匹配程度、针对不同识别结果的安全风险提示信息、 所述手机号码及所述手机号码对应的其他通讯录信息。
10. 根据权利要求 3至 8中任一项所述的方法, 其中, 所述通讯录数据库保存在本 地和 /或远端的服务器上。
11. 根据权利要求 10所述的方法,其中,在所述通讯录数据库保存在远端的服务器 上的情况下, 所述方法还包括: 同步保存在本地的通讯录数据库和保存在远端的服务器上的通讯录数据 库。
12. 根据权利要求 10所述的方法,其中,所述通讯录数据库通过加密方式保存在本 地和 /或远端的服务器上。
13. 一种身份识别装置, 包括: 提取模块, 设置为提取当前通话对象的声纹特征和所述当前通话对象的手 机号码;
识别模块, 设置为根据所述声纹特征和所述手机号码, 识别所述当前通话 对象的身份。
14. 根据权利要求 13所述的装置, 其中, 所述提取模块包括: 采集单元, 设置为采集所述当前通话对象的声音信息; 提取单元, 设置为根据所述声音信息, 提取所述声纹特征; 转化单元, 设置为转化所述声纹特征为预定的声纹数据格式。
15. 根据权利要求 13所述的装置, 其中, 所述识别模块包括: 查询单元, 设置为根据提取的所述手机号码和提取的所述声纹特征, 查询 通讯录数据库中保存的对应的数据记录;
判断单元, 设置为判断提取的所述声纹特征和所述手机号码与对应的所述 数据记录的匹配结果;
识别单元, 设置为根据所述匹配结果, 识别所述当前通话对象的身份。
16. 一种通讯终端, 包括如权利要求 13至 15中任一项所述的身份识别装置。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14895110.6A EP3160115A4 (en) | 2014-06-20 | 2014-08-13 | Identity identification method and apparatus and communication terminal |
US15/320,256 US9906642B2 (en) | 2014-06-20 | 2014-08-13 | Identity identification method and apparatus and communication terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410281624.5 | 2014-06-20 | ||
CN201410281624.5A CN105306657B (zh) | 2014-06-20 | 2014-06-20 | 身份识别方法、装置及通讯终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015192450A1 true WO2015192450A1 (zh) | 2015-12-23 |
Family
ID=54934744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/084312 WO2015192450A1 (zh) | 2014-06-20 | 2014-08-13 | 身份识别方法、装置及通讯终端 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9906642B2 (zh) |
EP (1) | EP3160115A4 (zh) |
CN (1) | CN105306657B (zh) |
WO (1) | WO2015192450A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454057A (zh) * | 2017-06-28 | 2017-12-08 | 深圳市佰仟金融服务有限公司 | 信息处理方法及装置 |
CN108900326A (zh) * | 2018-06-15 | 2018-11-27 | 中国联合网络通信集团有限公司 | 通信信息管理方法及装置 |
CN113140211A (zh) * | 2021-04-20 | 2021-07-20 | 武汉微物云联科技有限公司 | 基于可信呼叫的实时音视频流的智能语音识别技术 |
CN113347310A (zh) * | 2021-02-02 | 2021-09-03 | 杭州久冠网络科技有限公司 | 一种带声纹识别的监管场所管理系统 |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106710593B (zh) * | 2015-11-17 | 2020-07-14 | 腾讯科技(深圳)有限公司 | 一种添加账号的方法、终端、服务器 |
CN106341539A (zh) * | 2016-09-14 | 2017-01-18 | 北京奇虎科技有限公司 | 恶意来电者声纹的自动取证方法、装置和移动终端 |
CN106210239A (zh) * | 2016-09-14 | 2016-12-07 | 北京奇虎科技有限公司 | 恶意来电者声纹的自动识别方法、装置和移动终端 |
CN107026831B (zh) | 2016-09-26 | 2020-03-10 | 阿里巴巴集团控股有限公司 | 一种身份识别方法和装置 |
CN106504123A (zh) * | 2016-11-28 | 2017-03-15 | 国网山东省电力公司济宁供电公司 | 一种提高用户参与度的互动催费方法及系统 |
CN106559542A (zh) * | 2016-11-30 | 2017-04-05 | 努比亚技术有限公司 | 一种终端和骚扰拦截方法 |
CN108256542A (zh) * | 2016-12-29 | 2018-07-06 | 北京搜狗科技发展有限公司 | 一种通信标识的特征确定方法、装置及设备 |
CN110121879B (zh) * | 2016-12-30 | 2020-12-15 | 华为技术有限公司 | 识别通话对象身份的方法和终端设备 |
CN106998385A (zh) * | 2017-04-01 | 2017-08-01 | 深圳天珑无线科技有限公司 | 一种启动应用程序的方法及装置 |
CN107169460A (zh) * | 2017-05-18 | 2017-09-15 | 广东小天才科技有限公司 | 一种信息发送方法及装置、用户设备 |
CN107690036A (zh) * | 2017-06-24 | 2018-02-13 | 平安科技(深圳)有限公司 | 电子装置、进线身份识别方法和计算机可读存储介质 |
CN107731234A (zh) * | 2017-09-06 | 2018-02-23 | 阿里巴巴集团控股有限公司 | 一种身份验证的方法及装置 |
CN107666583B (zh) * | 2017-09-07 | 2020-09-11 | 宇龙计算机通信科技(深圳)有限公司 | 通话处理方法及终端 |
CN107993662A (zh) * | 2017-12-20 | 2018-05-04 | 广州势必可赢网络科技有限公司 | 一种应用于电话客服的用户身份识别方法及装置 |
CN108347512B (zh) * | 2018-01-22 | 2020-08-28 | 维沃移动通信有限公司 | 一种身份识别方法及移动终端 |
CN110071896B (zh) * | 2018-01-22 | 2021-11-05 | 中兴通讯股份有限公司 | 一种基于网络通讯的身份认证方法及计算机设备 |
CN108681934A (zh) * | 2018-04-25 | 2018-10-19 | 厦门快商通信息技术有限公司 | 一种交易平台及其不良用户的识别方法 |
CN108683789A (zh) * | 2018-05-23 | 2018-10-19 | Oppo广东移动通信有限公司 | 联系人信息添加方法、装置、终端及存储介质 |
CN109300277A (zh) * | 2018-12-19 | 2019-02-01 | 宏景科技股份有限公司 | 一种警务报警系统 |
CN109769099B (zh) * | 2019-01-15 | 2021-01-22 | 三星电子(中国)研发中心 | 通话人物异常的检测方法和装置 |
CN110602326B (zh) * | 2019-09-19 | 2021-06-04 | 中国联合网络通信集团有限公司 | 可疑来电识别方法和可疑来电识别系统 |
CN110992961A (zh) * | 2019-12-06 | 2020-04-10 | 广州国音智能科技有限公司 | 音频数据同步方法、装置及计算机可读存储介质 |
CN111246023A (zh) * | 2020-02-24 | 2020-06-05 | 中移(杭州)信息技术有限公司 | 身份识别方法、网络通信平台、主叫终端、电子设备 |
US11563846B1 (en) * | 2022-05-31 | 2023-01-24 | Intuit Inc. | System and method for predicting intelligent voice assistant content |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080089554A1 (en) * | 2006-03-03 | 2008-04-17 | Catcher Inc. | Device and method for digitally watermarking an image with data |
CN102869008A (zh) * | 2011-07-07 | 2013-01-09 | 上海先先信息科技有限公司 | 一种应用声纹验证作为移动应用安全密码的技术 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1020066A1 (en) * | 1997-10-01 | 2000-07-19 | Pulsepoint Communications | Method for customizing the dialogue of a voice mail system |
US7483520B2 (en) * | 2001-08-06 | 2009-01-27 | Qualcomm Incorporated | Method and apparatus for prompting a cellular telephone user with instructions |
US7003466B2 (en) * | 2001-12-12 | 2006-02-21 | International Business Machines Corporation | Destination device initiated caller identification |
US7327833B2 (en) * | 2002-03-20 | 2008-02-05 | At&T Bls Intellectual Property, Inc. | Voice communications menu |
US7263347B2 (en) | 2002-05-24 | 2007-08-28 | Cingular Wireless Ii, Llc | Biometric authentication of a wireless device user |
GB2391373A (en) * | 2002-07-31 | 2004-02-04 | David Toms | A system for the automatic detection of a fraudulent transaction |
EP1788809A1 (en) * | 2004-09-09 | 2007-05-23 | Matsushita Electric Industrial Co., Ltd. | Communication terminal and communication method thereof |
CN1852354A (zh) * | 2005-10-17 | 2006-10-25 | 华为技术有限公司 | 收集用户行为特征的方法和装置 |
US8654943B2 (en) * | 2006-04-14 | 2014-02-18 | At&T Intellectual Property I, L.P. | System and method of enhanced caller-ID display using a personal address book |
US20080159488A1 (en) * | 2006-12-27 | 2008-07-03 | Chander Raja | Voice based caller identification and screening |
US20170006445A1 (en) * | 2007-02-22 | 2017-01-05 | Silent Communication Ltd. | Systems, Methods, Circuits and Associated Software for Managing Communications from a Mobile Device to Other Parties and Retrieving and Managing Data Stored on the Mobile Device and Associated with the Communications to Other Parties |
US8050917B2 (en) * | 2007-09-27 | 2011-11-01 | Siemens Enterprise Communications, Inc. | Method and apparatus for identification of conference call participants |
CN101409881A (zh) * | 2007-10-12 | 2009-04-15 | 深圳富泰宏精密工业有限公司 | 手机资料保密装置及方法 |
US8086398B2 (en) * | 2007-10-25 | 2011-12-27 | Research In Motion Limited | Sending location information from within a communication application |
US8621214B2 (en) * | 2010-02-10 | 2013-12-31 | SecurenCrypt, LLC | Document encryption and decryption |
WO2012023643A1 (ko) * | 2010-08-19 | 2012-02-23 | 엘지전자 주식회사 | 이동 단말기 및 그 폰북 업데이트 방법 |
EP3825693A1 (en) | 2011-04-29 | 2021-05-26 | Cancer Prevention And Cure, Ltd. | Methods of identification and diagnosis of lung diseases using classification systems and kits thereof |
CN103067427A (zh) * | 2011-10-21 | 2013-04-24 | 腾讯科技(深圳)有限公司 | 联系人资料同步方法、终端和sns网络好友管理模块 |
US9350944B2 (en) * | 2012-08-24 | 2016-05-24 | Qualcomm Incorporated | Connecting to an onscreen entity |
CN103700371B (zh) * | 2013-12-13 | 2017-10-20 | 江苏大学 | 一种基于声纹识别的来电身份识别系统及其识别方法 |
-
2014
- 2014-06-20 CN CN201410281624.5A patent/CN105306657B/zh active Active
- 2014-08-13 EP EP14895110.6A patent/EP3160115A4/en not_active Withdrawn
- 2014-08-13 WO PCT/CN2014/084312 patent/WO2015192450A1/zh active Application Filing
- 2014-08-13 US US15/320,256 patent/US9906642B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080089554A1 (en) * | 2006-03-03 | 2008-04-17 | Catcher Inc. | Device and method for digitally watermarking an image with data |
CN102869008A (zh) * | 2011-07-07 | 2013-01-09 | 上海先先信息科技有限公司 | 一种应用声纹验证作为移动应用安全密码的技术 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3160115A4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454057A (zh) * | 2017-06-28 | 2017-12-08 | 深圳市佰仟金融服务有限公司 | 信息处理方法及装置 |
CN108900326A (zh) * | 2018-06-15 | 2018-11-27 | 中国联合网络通信集团有限公司 | 通信信息管理方法及装置 |
CN108900326B (zh) * | 2018-06-15 | 2021-08-31 | 中国联合网络通信集团有限公司 | 通信信息管理方法及装置 |
CN113347310A (zh) * | 2021-02-02 | 2021-09-03 | 杭州久冠网络科技有限公司 | 一种带声纹识别的监管场所管理系统 |
CN113140211A (zh) * | 2021-04-20 | 2021-07-20 | 武汉微物云联科技有限公司 | 基于可信呼叫的实时音视频流的智能语音识别技术 |
Also Published As
Publication number | Publication date |
---|---|
CN105306657B (zh) | 2019-07-26 |
US9906642B2 (en) | 2018-02-27 |
US20170163797A1 (en) | 2017-06-08 |
EP3160115A1 (en) | 2017-04-26 |
CN105306657A (zh) | 2016-02-03 |
EP3160115A4 (en) | 2017-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015192450A1 (zh) | 身份识别方法、装置及通讯终端 | |
CN105814535B (zh) | 呼叫中的虚拟助理 | |
US7920680B2 (en) | VoIP caller authentication by voice signature continuity | |
US9979721B2 (en) | Method, server, client and system for verifying verification codes | |
CN107205097B (zh) | 移动终端查找方法、装置以及计算机可读存储介质 | |
CN104954532B (zh) | 语音识别的方法及装置与移动终端 | |
WO2017201874A1 (zh) | 终端丢失提示方法及装置 | |
WO2016033988A1 (zh) | 业务处理方法及装置 | |
WO2017035945A1 (zh) | 一种对通话呼叫者进行标记的方法、装置及系统 | |
CA3064797A1 (en) | Identity verification method and apparatus, and electronic device | |
CN107995381B (zh) | 一种报警终端、云端及其报警处理方法、以及存储介质 | |
WO2015096429A1 (zh) | 通话声音识别方法及装置 | |
CN101217701A (zh) | 显示呼叫者识别信息的方法装置和系统 | |
US8457600B2 (en) | Electronic device and method for validating contact identification | |
JP2016149636A (ja) | 認証装置、電話端末、認証方法および認証プログラム | |
JP2014072701A (ja) | 通信端末 | |
CN106453882A (zh) | 信息处理方法、装置及电子设备 | |
CN102651784A (zh) | 联系人身份验证系统及方法 | |
JP2010212860A (ja) | メッセージ送信システム | |
EP3007417A1 (en) | Method and residential gateway for realizing voice message function | |
KR102335892B1 (ko) | 사운드를 이용한 사용자 식별 방법 및 그 장치 | |
CN215072555U (zh) | 一种具有可信通话功能的固话机 | |
JP2017134162A (ja) | 音声認識装置、音声認識方法、及び音声認識プログラム | |
KR100740775B1 (ko) | 영상통신단말에서의 배경영상편집장치와 그 방법, 및 이를이용한 사용자 맞춤형 배경 영상 전환 서비스 시스템 | |
TW200814728A (en) | Method for managing account of a web-phone and related apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14895110 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15320256 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2014895110 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014895110 Country of ref document: EP |