CN114710590A - Crank call detection method, device, equipment and medium - Google Patents

Crank call detection method, device, equipment and medium Download PDF

Info

Publication number
CN114710590A
CN114710590A CN202210312973.3A CN202210312973A CN114710590A CN 114710590 A CN114710590 A CN 114710590A CN 202210312973 A CN202210312973 A CN 202210312973A CN 114710590 A CN114710590 A CN 114710590A
Authority
CN
China
Prior art keywords
telephone number
suspicious
harassment
call
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210312973.3A
Other languages
Chinese (zh)
Inventor
傅昕
傅强
徐涛
梁彧
阿曼太
杨满智
田野
王杰
金红
陈晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eversec Beijing Technology Co Ltd
Original Assignee
Eversec Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eversec Beijing Technology Co Ltd filed Critical Eversec Beijing Technology Co Ltd
Priority to CN202210312973.3A priority Critical patent/CN114710590A/en
Publication of CN114710590A publication Critical patent/CN114710590A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, a device, equipment and a medium for detecting a crank call. The method comprises the following steps: acquiring call ticket data in a preset time interval; according to a preset number detection rule, determining suspicious telephone numbers in all telephone numbers contained in the call ticket data; respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply messages of the suspicious telephone number aiming at the test short messages; and determining whether the suspicious telephone number is a harassing telephone number or not according to the reply information of the suspicious telephone number aiming at each test short message. The embodiment of the invention can send each test short message to the suspicious telephone number on the basis of the determined suspicious telephone number, further deeply analyzes the reply message of each test short message according to the suspicious telephone number, determines whether the suspicious telephone number is a crank telephone number, and realizes the high-efficiency and accurate detection of whether the telephone number is the crank telephone number.

Description

Crank call detection method, device, equipment and medium
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, equipment and a medium for detecting crank calls.
Background
With the development of technology and the dependence on timely communication, besides the normal communication function, many telephone numbers are also used for carrying out illegal behaviors such as telemarketing, malicious debt, high-frequency harassment, telecommunication fraud and the like. In the process of using the mobile communication terminal by a user, more and more crank calls are received, which causes great interference to the work and life of the user.
In the related art, the following two harassing call detection schemes are generally used: detecting whether the telephone number is a harassing telephone number or not according to the voice call content of the telephone number; and establishing a detection model according to the call behavior of the telephone number, and detecting whether the telephone number is a harassing telephone number through the detection model.
According to the harassing call detection scheme for detecting the voice call content of the telephone number, the voice call content needs to be monitored and identified, personal privacy of a user is involved, a large amount of computing resources are needed for text transcription and analysis of a voice file, investment cost is high, and detection efficiency is low. According to the harassing call detection scheme by using the detection model, an unspecified harassing scene needs to be analyzed, the number false alarm is large, and the detection accuracy is low. The crank call detection scheme of the related technology cannot efficiently and accurately detect whether the telephone number is a crank call number.
Disclosure of Invention
The invention provides a method, a device, equipment and a medium for detecting a crank call, which aim to solve the problem that a crank call detection scheme of the related technology cannot efficiently and accurately detect whether a telephone number is a crank call number.
According to one aspect of the invention, a crank call detection method is provided, which comprises the following steps:
acquiring call ticket data in a preset time interval; the call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the method comprises the following steps of (1) calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, called telephone number, the current location of the called telephone number and the number type of the called telephone number;
according to a preset number detection rule, determining suspicious telephone numbers in all telephone numbers contained in the call ticket data;
respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number aiming at each test short message; wherein, the reply information is a reply short message or a callback voice file;
and determining whether the suspicious telephone number is a harassing telephone number or not according to the reply information of the suspicious telephone number to each test short message.
According to another aspect of the invention, a crank call detection device is provided, which comprises:
the call ticket data acquisition module is used for acquiring call ticket data in a preset time interval; the call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the method comprises the following steps of (1) calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, called telephone number, the current location of the called telephone number and the number type of the called telephone number;
the suspicious telephone detection module is used for determining suspicious telephone numbers in all telephone numbers contained in the call ticket data according to a preset number detection rule;
the test short message sending module is used for sending the test short message corresponding to each preset mobile communication terminal to the suspicious telephone number through at least two preset mobile communication terminals respectively and acquiring reply information of the suspicious telephone number aiming at each test short message; wherein, the reply information is a reply short message or a callback voice file;
and the harassing call determining module is used for determining whether the suspicious telephone number is a harassing call number according to the reply information of the suspicious telephone number to each test short message.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor, and the computer program is executed by the at least one processor to enable the at least one processor to execute the method for detecting the harassing calls according to any embodiment of the invention.
According to another aspect of the present invention, a computer-readable storage medium is provided, where computer instructions are stored, and the computer instructions are used for causing a processor to implement the method for detecting a harassing call according to any one of the embodiments of the present invention when executed.
According to the technical scheme of the embodiment of the invention, by acquiring the call ticket data in the preset time interval, according to the preset number detection rule, the suspicious telephone numbers in all the telephone numbers contained in the call ticket data are determined; then, respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number aiming at each test short message; finally, according to the reply information of the suspicious telephone number aiming at each test short message, whether the suspicious telephone number is a harassing telephone number is determined, the problem that the harassing telephone number detection scheme of the related technology cannot efficiently and accurately detect whether the telephone number is a harassing telephone number is solved, the suspicious telephone number which is possibly a harassing telephone number and is abnormal in the call state in all the telephone numbers contained in the call bill data can be determined according to the preset number detection rule, each test short message can be sent to the suspicious telephone number on the basis of the determined suspicious telephone number, the reply information of the suspicious telephone number aiming at each test short message is obtained, according to the reply information of the suspicious telephone number aiming at each test short message, further deep analysis is carried out to determine whether the suspicious telephone number is a harassing telephone number, the detection efficiency is improved, and the accuracy is higher, the method and the device have the beneficial effect of efficiently and accurately detecting whether the telephone number is the harassing telephone number.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for detecting a crank call according to an embodiment of the present invention.
Fig. 2 is a flowchart of a crank call detection method according to a second embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a crank call detection device according to a third embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an electronic device implementing the method for detecting a crank call according to the embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "object," "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
Fig. 1 is a flowchart of a method for detecting a crank call according to an embodiment of the present invention, where the embodiment is applicable to a case where a phone number is detected as a crank call number, the method may be executed by a crank call detection device, the crank call detection device may be implemented in a hardware and/or software manner, and the crank call detection device may be configured in an electronic device. Such as a server. As shown in fig. 1, the method includes:
step 101, obtaining call ticket data in a preset time interval.
The call bill data comprises associated information of each call within a preset time interval, wherein the associated information at least comprises: the calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, the called telephone number, the current location of the called telephone number and the number type of the called telephone number.
Optionally, the ticket data in the preset time interval is related information of each call in the preset time interval. The call ticket data in the preset time interval comprises the associated information of each call in the preset time interval. The associated information for each call includes, but is not limited to: a calling phone number, a current Location of the calling phone number, a number type of the calling phone number, a called phone number, a current Location of the called phone number, a number type of the called phone number, a call start time, a call duration, a Location Area Code (LAC), a cell number cellID, an International Mobile Equipment Identity (IMEI), and the like in each phone call.
Optionally, the calling telephone number is the calling party in the two telephone numbers for making the telephone call. The called telephone number is the called party of the two telephone numbers at which the telephone call is made. And the current location of the calling telephone number is the current actual location of the calling telephone number determined according to the base station information corresponding to the calling telephone number. The current location of the called telephone number is the current actual location of the called telephone number determined according to the base station information corresponding to the called telephone number. The number type of the calling phone number is used to indicate that the calling phone number is a mobile phone number or a landline phone number. The number type of the called phone number is used to indicate that the called phone number is a cellular phone number or a landline phone number.
Optionally, the preset time interval may be set according to a service requirement. The preset time interval can be the date of the current time and a plurality of days before the date of the current time. Illustratively, the current time is a date of 1 month 31 day 2022 year, a preset time interval of 1 month 31 day 2022 year, and 6 days before 1 month 31 day 2022 year. Namely, the preset time interval is from 25 days at 1 month in 2022 to 31 days at 1 month in 2022.
Optionally, the obtaining of the ticket data within the preset time interval includes: and acquiring the ticket data in a preset time interval from the operator system. All the call ticket data are stored in the operator system, and the call ticket data comprise call ticket data in each time interval. The electronic equipment acquires the call ticket data within a preset time interval from all the call ticket data stored in the operator system.
Optionally, the obtaining of the ticket data within the preset time interval includes: and acquiring the call ticket data uploaded by the user within the preset duration. And the user uploads the ticket data within the preset duration to the electronic equipment. The electronic equipment acquires call ticket data uploaded by a user within a preset duration.
And step 102, determining suspicious telephone numbers in all telephone numbers contained in the call ticket data according to a preset number detection rule.
Optionally, all the telephone numbers included in the ticket data are the calling telephone number and the called telephone number of each call within a preset time interval. The preset number detection rule is a rule for determining a suspicious telephone number in all telephone numbers contained in the call ticket data.
Optionally, the suspicious telephone numbers in all the telephone numbers included in the ticket data are one or more telephone numbers with abnormal call states in all the telephone numbers included in the ticket data. The suspect telephone number may be a nuisance telephone number.
Optionally, the determining, according to a preset number detection rule, a suspicious phone number in all phone numbers included in the ticket data includes: and aiming at each telephone number contained in the call ticket data, executing the following operations: dividing a preset time interval into at least two sub-time intervals, and determining a time interval which is closest to the current time in each sub-time interval as a target sub-time interval; according to the call bill data, counting the calling times of the currently processed telephone number in the target sub-time interval, and judging whether the calling times are more than or equal to a preset time threshold value; if yes, determining the current processing telephone number as a suspicious telephone number; if not, counting the number of the first telephone numbers and the number of the second telephone numbers corresponding to the currently processed telephone numbers according to the call bill data; the first telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval, and the second telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval and the communication frequency is 1; judging whether the ratio of the second telephone number quantity to the first telephone number quantity is greater than or equal to a first preset ratio threshold value or not; and if so, determining that the currently processed telephone number is a suspicious telephone number.
Optionally, after determining whether a ratio between the second number of telephone numbers and the first number of telephone numbers is greater than or equal to a first preset ratio threshold, the method further includes: if not, counting a first call frequency and a second call frequency corresponding to the current processing telephone number according to the call bill data; the first call times are the total call times of the currently processed telephone number in the target sub-time interval, and the second call times are the call times of the current location of the currently processed telephone number in the target sub-time interval and the same call times of the current location of the called telephone number; judging whether the ratio of the second call times to the first call times is larger than a second preset ratio threshold value or not; if yes, determining the current processing telephone number as a suspicious telephone number; if not, counting the number of the third telephone numbers and the number of the fourth telephone numbers corresponding to the currently processed telephone numbers according to the call bill data; the third telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within a preset time interval, and the fourth telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within the preset time interval and the communication times of which are more than 2 times; judging whether the ratio of the number of the fourth telephone numbers to the number of the third telephone numbers is smaller than a third preset ratio threshold value or not; if yes, determining the current processing telephone number as a suspicious telephone number; if not, determining that the current processing telephone number is a normal telephone number.
Optionally, the preset time interval is a date of the current time and a plurality of days before the date of the current time. Dividing each day in a preset time interval into a sub-time interval to obtain at least two sub-time intervals. And then determining the time interval closest to the current time in the sub-time intervals, namely the date of the current time, as the target sub-time interval.
Illustratively, the current time is a date of 1 month 31 day 2022 year, a preset time interval of 1 month 31 day 2022 year, and 6 days before 1 month 31 day 2022 year. Namely, the preset time interval is from 25 days at 1 month in 2022 to 31 days at 1 month in 2022. Each day in the preset time interval is divided into a sub-time interval, and 7 sub-time intervals are obtained. And then, the time interval closest to the current time in each sub-time interval, namely the current time is 2022 years, 1 month and 31 days, which is determined as the target sub-time interval.
Optionally, in a general case, the telephone number meeting the following conditions is a suspicious telephone number in all telephone numbers included in the ticket data: the calling times of the telephone numbers in the target sub-time interval are more than or equal to a preset time threshold; the ratio between the number of the second telephone numbers corresponding to the telephone numbers and the number of the first telephone numbers is greater than or equal to a first preset ratio threshold; the number of the mobile phone numbers is the number of the mobile phone numbers which are communicated with the phone numbers in the target sub-time interval, and the number of the second phone numbers is the number of the mobile phone numbers which are communicated with the phone numbers in the target sub-time interval and the number of times of communication is 1; the ratio of the second call times corresponding to the telephone number to the first call times is larger than a second preset ratio threshold; the first call times are the total call times of the telephone numbers in the target sub-time interval, and the second call times are the call times of the current location of the telephone numbers in the target sub-time interval and the same call times of the current location of the telephone numbers; the ratio between the number of the fourth telephone numbers corresponding to the telephone numbers and the number of the third telephone numbers is smaller than a third preset ratio threshold; the third number of the telephone numbers is the number of the called telephone numbers which are communicated with the telephone numbers in the preset time interval, and the fourth number of the telephone numbers is the number of the called telephone numbers which are communicated with the telephone numbers in the preset time interval and the number of times of communication is more than 2.
Optionally, the preset number threshold, the first preset ratio threshold, the second preset ratio threshold, and the third preset ratio threshold may be set according to historical experience values and/or service requirements.
Optionally, according to the ticket data, counting the number of calling times of the currently processed telephone number within the target sub-time interval, and judging whether the number of calling times is greater than or equal to a preset number threshold. And the calling times of the currently processed telephone number in the target sub-time interval are the times of taking the currently processed telephone number in the target sub-time interval as a calling party in the telephone call. And if the calling times are more than or equal to a preset time threshold, determining that the currently processed telephone number is a suspicious telephone number. And if the calling times are not less than the preset times threshold value, counting the number of the first telephone numbers and the number of the second telephone numbers corresponding to the currently processed telephone numbers according to the call bill data, and continuously detecting whether the currently processed telephone numbers are suspicious telephone numbers according to the number of the first telephone numbers and the number of the second telephone numbers corresponding to the currently processed telephone numbers.
Optionally, it is determined whether a ratio between the number of the second phone numbers and the number of the first phone numbers is greater than or equal to a first preset ratio threshold. And the first telephone number quantity is the quantity of the mobile phone telephone numbers which are communicated with the currently processed telephone number in the target sub-time interval. Namely, the number of the telephone numbers with the number type of the mobile phone number in all the telephone numbers which are communicated with the currently processed telephone number in the target sub-time interval. And the second telephone number quantity is the quantity of the mobile phone telephone numbers which are communicated with the currently processed telephone number within the target sub-time interval and the communication times of which are 1. Namely, the number of the telephone numbers with the number type of the mobile phone telephone number and the number of calls with the currently processed telephone number of 1 time in all the telephone numbers which are communicated with the currently processed telephone number in the target sub-time interval.
Optionally, if the ratio between the second number of telephone numbers and the first number of telephone numbers is greater than or equal to a first preset ratio threshold, it is determined that the currently processed telephone number is a suspicious telephone number. If the ratio of the second telephone number quantity to the first telephone number quantity is smaller than a first preset ratio threshold value, counting the first call times and the second call times corresponding to the currently processed telephone number according to the call bill data, and continuously detecting whether the currently processed telephone number is a suspicious telephone number according to the first call times and the second call times corresponding to the currently processed telephone number.
Optionally, it is determined whether a ratio between the second number of times of call and the first number of times of call is greater than a second preset ratio threshold. The first call times are the total call times of the currently processed telephone number in the target sub-time interval. And the second call times are the call times of the current location of the currently processed telephone number in the target sub-time interval and the same as the current location of the called telephone number.
Optionally, if the ratio between the second number of times of call and the first number of times of call is greater than a second preset ratio threshold, it is determined that the currently processed phone number is a suspicious phone number. If the ratio of the second call times to the first call times is smaller than or equal to a second preset ratio threshold, counting the number of third telephone numbers and the number of fourth telephone numbers corresponding to the currently processed telephone number according to the call bill data, and continuously detecting whether the currently processed telephone number is a suspicious telephone number according to the number of third telephone numbers and the number of fourth telephone numbers corresponding to the currently processed telephone number.
Optionally, it is determined whether a ratio between the number of the fourth phone numbers and the number of the third phone numbers is smaller than a third preset ratio threshold. The third number of telephone numbers is the number of called telephone numbers which are communicated with the currently processed telephone number within a preset time interval. And the fourth telephone number is the number of called telephone numbers which have a call with the currently processed telephone number within a preset time interval and the number of calls is more than 2.
Optionally, if a ratio between the number of the fourth phone numbers and the number of the third phone numbers is smaller than a third preset ratio threshold, it is determined that the currently processed phone number is a suspicious phone number. And if the ratio of the number of the fourth telephone numbers to the number of the third telephone numbers is greater than or equal to a third preset ratio threshold, determining that the currently processed telephone number is a normal telephone number.
Step 103, sending the test short message corresponding to each preset mobile communication terminal to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number to each test short message.
Wherein, the reply information is a reply short message or a callback voice file.
Optionally, test short messages corresponding to the disturbance types are set for different disturbance types. Types of disturbance include, but are not limited to: loans, product sales, and investments, etc. The test short message is used for indicating the crank telephone number of the corresponding crank type to call back or reply the short message.
Optionally, if a harassment telephone number corresponding to the harassment type receives the test short message, a callback or a reply short message is performed. The voice of the call back or the short message of the reply will contain the corresponding harassing voice or harassing words.
Optionally, if the normal telephone number receives the test short message, the callback or the reply short message is not usually performed, and even if the callback or the reply short message is performed, the callback voice or the reply short message does not contain corresponding harassing voice or harassing text.
Optionally, a corresponding preset mobile communication terminal is set for each test short message. The preset mobile communication terminal is used for sending the corresponding test short message to the suspicious telephone number and acquiring the reply information of the suspicious telephone number to the test short message. The mobile communication terminal includes, but is not limited to, a mobile phone or an electronic device having a call function. The preset mobile communication terminal is provided with a communication card, can send short messages to other telephone numbers, can receive short messages sent by other telephone numbers, and can also communicate with other telephone numbers.
Optionally, the sending, by at least two preset mobile communication terminals, the test short message corresponding to each preset mobile communication terminal to the suspicious phone number, and obtaining reply information of the suspicious phone number to each test short message includes: the electronic equipment instructs each preset mobile communication terminal to execute the following operations: sending a test short message corresponding to a preset mobile communication terminal to a suspicious telephone number, and recording the sending time of the test short message; if the suspicious telephone number sends the reply short message after receiving the test short message, recording the receiving time of the received reply short message, determining the reply short message as the reply information of the suspicious telephone number aiming at the test short message, and feeding back the reply information of the suspicious telephone number aiming at the test short message, the sending time of the test short message and the receiving time of the received reply short message to the electronic equipment; if the suspicious telephone number is dialed back after receiving the test short message, recording the callback time, recording the callback voice to obtain a callback voice file, recording the recording time length, determining the callback voice file as the reply information of the suspicious telephone number to the test short message, and feeding back the reply information of the suspicious telephone number to the test short message, the sending time of the test short message, the callback time and the recording time length to the electronic equipment.
And step 104, determining whether the suspicious telephone number is a harassing telephone number according to the reply information of the suspicious telephone number to each test short message.
Optionally, the determining whether the suspicious telephone number is a harassing telephone number according to the reply message of the suspicious telephone number to each test short message includes: determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set; and determining whether the suspicious telephone number is a harassing telephone number or not according to the number detection result corresponding to each reply message.
Optionally, a matching harassment voice database and a harassment keyword set are set for the test short messages corresponding to each harassment type.
Optionally, the harassment voice database corresponding to the test short message includes at least two harassment voice files corresponding to the test short message. At least two harassment voice files corresponding to the test short message are voice files containing harassment voice which is possibly output when the harassment telephone number of the corresponding harassment type is called back.
Optionally, the harassment keyword set corresponding to the test short message includes at least two harassment keywords corresponding to the test short message. At least two harassment keywords corresponding to the test short message are a plurality of words which can be contained in the short message replied after the test short message is received by the harassment telephone number of the corresponding harassment type.
Optionally, the determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set include: for each reply message, the following operations are performed: if the current processing reply information is the reply short message, determining a harassment keyword set matched with the test short message corresponding to the current processing reply information as a harassment keyword set corresponding to the current processing reply information; the harassment keyword set comprises at least two harassment keywords corresponding to the test short message; detecting whether each harassment keyword in the harassment keyword set exists in the short message content of the current processing reply message; if the target harassment keywords in the harassment keyword set exist in the short message content of the current processing reply message, determining a number detection result corresponding to the current processing reply message as a harassment telephone number; and if any harassment keyword in the harassment keyword set does not exist in the short message content of the current processing reply message, determining that the number detection result corresponding to the current processing reply message is a normal telephone number.
Optionally, the determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set include: for each reply message, the following operations are performed: if the current processing reply information is a callback voice file, determining a harassment voice database matched with the test short message corresponding to the current processing reply information as a harassment voice database corresponding to the current processing reply information; the harassment voice database comprises at least two harassment voice files corresponding to the test short messages; detecting whether a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database; if a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database, determining a number detection result corresponding to the current processing reply information as a harassing telephone number; and if the harassing voice files in the harassing voice database do not have target harassing voice files matched with the current processing reply information, determining that the number detection result corresponding to the current processing reply information is a normal telephone number.
Optionally, detecting whether a target harassment voice file matched with the currently processed reply information exists in each harassment voice file in the harassment voice database includes: converting the current processing reply information into reply texts through a preset voice text conversion module, and converting each harassing voice file into a harassing voice text; respectively calculating the similarity between the reply text and each harassing voice text; sequencing each harassing voice text according to the similarity from high to low; and determining the harassment voice file before the harassment voice text in the first order of the sequencing result is converted into a target harassment voice file matched with the current processing reply information.
Optionally, the determining, according to the number detection result corresponding to each reply message, whether the suspicious telephone number is a harassing telephone number includes: detecting whether the number detection result corresponding to each reply message is a normal telephone number; if the number detection result corresponding to each reply message is a normal telephone number, determining that the suspicious telephone number is a normal telephone number; and if at least one corresponding number detection result exists in each reply message as the target reply message of the harassing phone number, determining that the suspicious phone number is the harassing phone number, and determining the harassing type of the suspicious phone number according to the harassing type corresponding to each target reply message.
Optionally, determining a harassment type of the suspicious telephone number according to the harassment type corresponding to each target reply message includes: if only one number detection result corresponding to one reply short message of the suspicious telephone number is a harassing telephone number, determining the suspicious telephone number as a harassing telephone number, and determining the harassing type of the reply short message as the harassing type of the suspicious telephone number; and the disturbance type of the reply short message is the disturbance type corresponding to the test short message corresponding to the reply short message.
Optionally, if the number detection results corresponding to the multiple reply messages of the suspicious telephone number are the harassing telephone numbers, determining that the suspicious telephone number is a harassing telephone number, and determining the harassing type of the reply message with the earliest receiving time as the harassing type of the suspicious telephone number.
Optionally, if only a number detection result corresponding to one callback voice file of the suspicious telephone number is a harassing telephone number, determining that the suspicious telephone number is a harassing telephone number, and determining a harassing type of the callback voice file as a harassing type of the suspicious telephone number; and the harassment type of the callback voice file is the harassment type corresponding to the test short message corresponding to the callback voice file.
Optionally, if the number detection results corresponding to the multiple callback voice files of the suspicious telephone number are the harassing telephone numbers, determining that the suspicious telephone number is a harassing telephone number, and determining the harassing type of the callback voice file with the longest recording duration as the harassing type of the suspicious telephone number.
Optionally, if the number detection results corresponding to the multiple callback voice files of the suspicious telephone number are harassing telephone numbers and the number detection results corresponding to the multiple reply messages of the suspicious telephone number are harassing telephone numbers, determining that the suspicious telephone number is a harassing telephone number, and determining the harassing type of the callback voice file with the longest recording duration as the harassing type of the suspicious telephone number.
Optionally, if the suspicious telephone number does not make a callback or reply a short message, determining that the suspicious telephone number is a normal telephone number.
Optionally, after determining that the suspicious telephone number is a harassing telephone number and determining that the harassment type of the reply short message is a harassment type of the suspicious telephone number, the method further includes: and providing the suspicious telephone number and the harassment type of the suspicious telephone number to a target user.
Optionally, the target user is a staff member for processing the harassing telephone numbers.
Optionally, providing the suspicious telephone number and the harassment type of the suspicious telephone number to the target user includes: and providing the suspicious telephone number and the harassment type of the suspicious telephone number to a target user through a number output page. The number output page is a page for showing the suspicious telephone number and the harassment type of the suspicious telephone number to the user. And the electronic equipment displays a number output page and provides the suspicious telephone number and the harassment type of the suspicious telephone number to a target user through the number output page.
Optionally, providing the suspicious telephone number and the harassment type of the suspicious telephone number to the target user includes: and sending the suspicious telephone number and the harassment type of the suspicious telephone number to terminal equipment used by a target user.
According to the technical scheme of the embodiment of the invention, by acquiring the call ticket data in the preset time interval, the suspicious telephone number in all the telephone numbers contained in the call ticket data is determined according to the preset number detection rule; then, respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number aiming at each test short message; finally, according to the reply information of the suspicious telephone number aiming at each test short message, whether the suspicious telephone number is a harassing telephone number is determined, the problem that the harassing telephone number detection scheme of the related technology cannot efficiently and accurately detect whether the telephone number is a harassing telephone number is solved, the suspicious telephone number which is possibly a harassing telephone number and is abnormal in the call state in all the telephone numbers contained in the call bill data can be determined according to the preset number detection rule, each test short message can be sent to the suspicious telephone number on the basis of the determined suspicious telephone number, the reply information of the suspicious telephone number aiming at each test short message is obtained, according to the reply information of the suspicious telephone number aiming at each test short message, further deep analysis is carried out to determine whether the suspicious telephone number is a harassing telephone number, the detection efficiency is improved, and the accuracy is higher, the method and the device have the beneficial effect of efficiently and accurately detecting whether the telephone number is the harassing telephone number.
In the embodiment of the invention, the test short messages can be adjusted at any time according to requirements, the flexibility is high, the adaptability is strong, and the harassment evidence can be left according to the suspicious telephone numbers aiming at the reply information of each test short message, so that the complaint of users can be prevented when the follow-up treatment is convenient.
Example two
Fig. 2 is a flowchart of a crank call detection method provided in a second embodiment of the present invention, and the second embodiment of the present invention may be combined with various alternatives in one or more of the above embodiments. As shown in fig. 2, the method includes:
step 201, obtaining the ticket data within a preset time interval.
The call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, the called telephone number, the current location of the called telephone number and the number type of the called telephone number.
Step 202, according to a preset number detection rule, determining a suspicious telephone number in all telephone numbers contained in the call ticket data.
Step 203, sending the test short message corresponding to each preset mobile communication terminal to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number to each test short message.
Wherein, the reply information is a reply short message or a callback voice file.
And 204, determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set.
Optionally, a matching harassment voice database and a harassment keyword set are set for the test short messages corresponding to each harassment type. The harassment voice database corresponding to the test short message comprises at least two harassment voice files corresponding to the test short message. At least two harassment voice files corresponding to the test short message are voice files containing harassment voice which is possibly output when the harassment telephone number of the corresponding harassment type is called back. The harassment keyword set corresponding to the test short message comprises at least two harassment keywords corresponding to the test short message. At least two harassment keywords corresponding to the test short message are a plurality of words which can be contained in the short message replied after the test short message is received by the harassment telephone number of the corresponding harassment type.
Optionally, the determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set include: for each reply message, the following operations are performed: if the current processing reply information is the reply short message, determining a harassment keyword set matched with the test short message corresponding to the current processing reply information as a harassment keyword set corresponding to the current processing reply information; the harassment keyword set comprises at least two harassment keywords corresponding to the test short message; detecting whether each harassment keyword in the harassment keyword set exists in the short message content of the current processing reply message; if the target harassment keywords in the harassment keyword set exist in the short message content of the current processing reply message, determining a number detection result corresponding to the current processing reply message as a harassment telephone number; and if any harassment keyword in the harassment keyword set does not exist in the short message content of the current processing reply message, determining that the number detection result corresponding to the current processing reply message is a normal telephone number.
Optionally, the determining a harassment voice database or a harassment keyword set corresponding to each reply message and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set include: for each reply message, the following operations are performed: if the current processing reply information is a callback voice file, determining a harassment voice database matched with the test short message corresponding to the current processing reply information as a harassment voice database corresponding to the current processing reply information; the harassment voice database comprises at least two harassment voice files corresponding to the test short messages; detecting whether a target harassment voice file matched with the current processing reply information exists in each harassment voice file in the harassment voice database; if a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database, determining a number detection result corresponding to the current processing reply information as a harassing telephone number; and if the harassing voice files in the harassing voice database do not have target harassing voice files matched with the current processing reply information, determining that the number detection result corresponding to the current processing reply information is a normal telephone number.
Optionally, detecting whether a target harassment voice file matched with the currently processed reply information exists in each harassment voice file in the harassment voice database includes: converting the current processing reply information into reply texts through a preset voice text conversion module, and converting each harassment voice file into a harassment voice text; respectively calculating the similarity between the reply text and each harassing voice text; sequencing each harassing voice text according to the similarity from high to low; and determining the harassing voice file before the harassing voice text in the first order of the sequencing result is converted as a target harassing voice file matched with the current processing reply information.
And step 205, determining whether the suspicious telephone number is a harassing telephone number according to the number detection result corresponding to each reply message.
Optionally, the determining, according to the number detection result corresponding to each reply message, whether the suspicious telephone number is a harassing telephone number includes: detecting whether the number detection result corresponding to each reply message is a normal telephone number; if the number detection result corresponding to each reply message is a normal telephone number, determining that the suspicious telephone number is a normal telephone number; and if at least one corresponding number detection result exists in each reply message as the target reply message of the harassing phone number, determining that the suspicious phone number is the harassing phone number, and determining the harassing type of the suspicious phone number according to the harassing type corresponding to each target reply message.
Optionally, determining a harassment type of the suspicious telephone number according to the harassment type corresponding to each target reply message includes: if only one number detection result corresponding to one reply short message of the suspicious telephone number is a harassing telephone number, determining the suspicious telephone number as a harassing telephone number, and determining the harassing type of the reply short message as the harassing type of the suspicious telephone number; and the disturbance type of the reply short message is the disturbance type corresponding to the test short message corresponding to the reply short message.
Optionally, if the number detection results corresponding to the multiple reply messages of the suspicious telephone number are the harassing telephone numbers, determining that the suspicious telephone number is a harassing telephone number, and determining the harassing type of the reply message with the earliest receiving time as the harassing type of the suspicious telephone number.
Optionally, if only a number detection result corresponding to one callback voice file of the suspicious telephone number is a harassing telephone number, determining that the suspicious telephone number is a harassing telephone number, and determining a harassing type of the callback voice file as a harassing type of the suspicious telephone number; and the harassment type of the callback voice file is the harassment type corresponding to the test short message corresponding to the callback voice file.
Optionally, if the number detection results corresponding to the multiple callback voice files of the suspicious telephone number are the harassing telephone numbers, determining that the suspicious telephone number is a harassing telephone number, and determining the harassing type of the callback voice file with the longest recording duration as the harassing type of the suspicious telephone number.
Optionally, if the number detection results corresponding to the multiple callback voice files of the suspicious telephone number are crank telephone numbers and the number detection results corresponding to the multiple reply messages of the suspicious telephone number are crank telephone numbers, determining that the suspicious telephone number is a crank telephone number, and determining the crank type of the callback voice file with the longest recording duration as the crank type of the suspicious telephone number.
Optionally, if the suspicious telephone number does not make a callback or reply a short message, determining that the suspicious telephone number is a normal telephone number.
Optionally, after determining that the suspicious telephone number is a harassing telephone number and determining that the harassment type of the reply short message is a harassment type of the suspicious telephone number, the method further includes: and providing the suspicious telephone number and the harassment type of the suspicious telephone number to a target user. The target user is a staff member who processes the crank telephone number.
Optionally, providing the suspicious telephone number and the harassment type of the suspicious telephone number to the target user includes: and providing the suspicious telephone number and the harassment type of the suspicious telephone number to a target user through a number output page. The number output page is a page for showing the suspicious telephone number and the harassment type of the suspicious telephone number to the user. And the electronic equipment displays a number output page and provides the suspicious telephone number and the harassment type of the suspicious telephone number to a target user through the number output page.
According to the technical scheme of the embodiment of the invention, the suspicious telephone number which is possibly a harassing telephone number and can determine that the call state of all telephone numbers contained in the call bill data is abnormal according to the preset number detection rule is obtained, each test short message can be sent to the suspicious telephone number on the basis of the determined suspicious telephone number, the reply information of the suspicious telephone number to each test short message is obtained, and the suspicious telephone number is further deeply analyzed according to the reply information of the suspicious telephone number to each test short message to determine whether the suspicious telephone number is a harassing telephone number, so that the detection efficiency is improved, the accuracy is higher, and the beneficial effect of efficiently and accurately detecting whether the telephone number is a harassing telephone number is realized.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a crank call detection device according to a third embodiment of the present invention. The apparatus may be configured in an electronic device. As shown in fig. 3, the apparatus includes: the system comprises a call bill data acquisition module 301, a suspicious call detection module 302, a test short message sending module 303 and a harassing call determination module 304.
The call ticket data acquisition module 301 is configured to acquire call ticket data within a preset time interval; the call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the method comprises the following steps of (1) calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, called telephone number, the current location of the called telephone number and the number type of the called telephone number; the suspicious telephone detection module 302 is configured to determine a suspicious telephone number in all telephone numbers included in the ticket data according to a preset number detection rule; a test short message sending module 303, configured to send, through at least two preset mobile communication terminals, a test short message corresponding to each preset mobile communication terminal to the suspicious phone number, and obtain a reply message of the suspicious phone number to each test short message; wherein, the reply information is a reply short message or a callback voice file; and a harassing call determination module 304, configured to determine whether the suspicious telephone number is a harassing call number according to reply information of the suspicious telephone number to each test short message.
According to the technical scheme of the embodiment of the invention, by acquiring the call ticket data in the preset time interval, according to the preset number detection rule, the suspicious telephone numbers in all the telephone numbers contained in the call ticket data are determined; then, respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number aiming at each test short message; finally, according to the reply information of the suspicious telephone number aiming at each test short message, whether the suspicious telephone number is a harassing telephone number is determined, the problem that the harassing telephone number detection scheme of the related technology cannot efficiently and accurately detect whether the telephone number is a harassing telephone number is solved, the suspicious telephone number which is possibly a harassing telephone number and is abnormal in the call state in all the telephone numbers contained in the call bill data can be determined according to the preset number detection rule, each test short message can be sent to the suspicious telephone number on the basis of the determined suspicious telephone number, the reply information of the suspicious telephone number aiming at each test short message is obtained, according to the reply information of the suspicious telephone number aiming at each test short message, further deep analysis is carried out to determine whether the suspicious telephone number is a harassing telephone number, the detection efficiency is improved, and the accuracy is higher, the method and the device have the beneficial effects that whether the telephone number is a harassing telephone number is detected efficiently and accurately.
In an optional implementation manner of the embodiment of the present invention, optionally, the suspicious telephone detecting module 302 is specifically configured to: and aiming at each telephone number contained in the call ticket data, executing the following operations: dividing a preset time interval into at least two sub-time intervals, and determining a time interval which is closest to the current time in each sub-time interval as a target sub-time interval; counting the calling times of the currently processed telephone number in the target sub-time interval according to the call bill data, and judging whether the calling times are greater than or equal to a preset time threshold value; if yes, determining the current processing telephone number as a suspicious telephone number; if not, counting the number of the first telephone numbers and the number of the second telephone numbers corresponding to the currently processed telephone numbers according to the call bill data; the first telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval, and the second telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval and the communication frequency is 1; judging whether the ratio of the second telephone number quantity to the first telephone number quantity is greater than or equal to a first preset ratio threshold value or not; and if so, determining the currently processed telephone number as a suspicious telephone number.
In an optional implementation manner of the embodiment of the present invention, optionally, the suspicious telephone detecting module 302 is further configured to: if not, counting a first call frequency and a second call frequency corresponding to the currently processed telephone number according to the call bill data; the first call times are the total call times of the currently processed telephone number in the target sub-time interval, and the second call times are the call times of the current location of the currently processed telephone number in the target sub-time interval and the same call times of the current location of the called telephone number; judging whether the ratio of the second call times to the first call times is larger than a second preset ratio threshold value or not; if yes, determining the current processing telephone number as a suspicious telephone number; if not, counting the number of the third telephone numbers and the number of the fourth telephone numbers corresponding to the currently processed telephone numbers according to the call bill data; the third telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within a preset time interval, and the fourth telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within the preset time interval and the communication times of which are more than 2 times; judging whether the ratio of the number of the fourth telephone numbers to the number of the third telephone numbers is smaller than a third preset ratio threshold value or not; if yes, determining the current processing telephone number as a suspicious telephone number; if not, determining that the current processing telephone number is a normal telephone number.
In an optional implementation manner of the embodiment of the present invention, optionally, the harassing call determination module 304 is specifically configured to: determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set; and determining whether the suspicious telephone number is a harassing telephone number or not according to the number detection result corresponding to each reply message.
In an optional implementation manner of the embodiment of the present invention, optionally, when the harassing call determination module 304 performs an operation of determining a harassing speech database or a harassing keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassing speech database or the harassing keyword set, the operation is specifically configured to: for each reply message, the following operations are performed: if the current processing reply information is the reply short message, determining a harassment keyword set matched with the test short message corresponding to the current processing reply information as a harassment keyword set corresponding to the current processing reply information; the harassment keyword set comprises at least two harassment keywords corresponding to the test short message; detecting whether each harassment keyword in the harassment keyword set exists in the short message content of the current processing reply message; if the target harassment keywords in the harassment keyword set exist in the short message content of the current processing reply message, determining a number detection result corresponding to the current processing reply message as a harassment telephone number; and if any harassment keyword in the harassment keyword set does not exist in the short message content of the current processing reply message, determining that the number detection result corresponding to the current processing reply message is a normal telephone number.
In an optional implementation manner of the embodiment of the present invention, optionally, when the harassing call determination module 304 performs an operation of determining a harassing speech database or a harassing keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassing speech database or the harassing keyword set, the operation is further configured to: for each reply message, the following operations are performed: if the current processing reply information is a callback voice file, determining a harassment voice database matched with the test short message corresponding to the current processing reply information as a harassment voice database corresponding to the current processing reply information; the harassment voice database comprises at least two harassment voice files corresponding to the test short messages; detecting whether a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database; if a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database, determining a number detection result corresponding to the current processing reply information as a harassing telephone number; and if the harassing voice files in the harassing voice database do not have target harassing voice files matched with the current processing reply information, determining that the number detection result corresponding to the current processing reply information is a normal telephone number.
In an optional implementation manner of the embodiment of the present invention, optionally, when the crank call determining module 304 performs an operation of determining whether the suspicious telephone number is a crank call number according to a number detection result corresponding to each reply message, the operation is specifically configured to: detecting whether the number detection result corresponding to each reply message is a normal telephone number; if the number detection result corresponding to each reply message is a normal telephone number, determining that the suspicious telephone number is a normal telephone number; and if at least one corresponding target reply message with the number detection result being the crank telephone number exists in each reply message, determining that the suspicious telephone number is the crank telephone number, and determining the crank type of the suspicious telephone number according to the crank type corresponding to each target reply message.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The crank call detection device can execute the crank call detection method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the crank call detection method.
Example four
Fig. 4 shows a schematic structural diagram of an electronic device 10 that may be used to implement the method for detecting a crank call according to the embodiment of the present invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory communicatively connected to the at least one processor 11, such as a Read Only Memory (ROM)12, a Random Access Memory (RAM)13, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM)12 or the computer program built into the Random Access Memory (RAM)13 from a storage unit 18. In the RAM 13, various programs and data necessary for the operation of the electronic apparatus 10 can also be stored. The processor 11, the ROM 12, and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A number of components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, or the like; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The processor 11 performs the various methods and processes described above, such as a nuisance call detection method.
In some embodiments, the crank call detection method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is built into the RAM 13 and executed by the processor 11, one or more steps of the above described method of crank call detection may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the nuisance call detection method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the nuisance call detection method of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable nuisance call detection device such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A crank call detection method is characterized by comprising the following steps:
acquiring call ticket data in a preset time interval; the call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the method comprises the following steps of (1) calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, called telephone number, the current location of the called telephone number and the number type of the called telephone number;
according to a preset number detection rule, determining suspicious telephone numbers in all telephone numbers contained in the call ticket data;
respectively sending the test short messages corresponding to the preset mobile communication terminals to the suspicious telephone number through at least two preset mobile communication terminals, and acquiring reply information of the suspicious telephone number aiming at each test short message; wherein, the reply information is a reply short message or a callback voice file;
and determining whether the suspicious telephone number is a harassing telephone number or not according to the reply information of the suspicious telephone number to each test short message.
2. The method according to claim 1, wherein the determining a suspicious phone number in all phone numbers included in the ticket data according to a preset number detection rule comprises:
and aiming at each telephone number contained in the call ticket data, executing the following operations:
dividing a preset time interval into at least two sub-time intervals, and determining a time interval which is closest to the current time in each sub-time interval as a target sub-time interval;
counting the calling times of the currently processed telephone number in the target sub-time interval according to the call bill data, and judging whether the calling times are greater than or equal to a preset time threshold value;
if yes, determining the current processing telephone number as a suspicious telephone number;
if not, counting a first telephone number quantity and a second telephone number quantity corresponding to the currently processed telephone number according to the call bill data; the first telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval, and the second telephone number quantity is the quantity of the mobile phone numbers which are communicated with the currently processed telephone number in the target sub-time interval and the communication frequency is 1;
judging whether the ratio of the second telephone number quantity to the first telephone number quantity is greater than or equal to a first preset ratio threshold value or not;
and if so, determining that the currently processed telephone number is a suspicious telephone number.
3. The method of claim 2, wherein after determining whether the ratio between the second number of telephone numbers and the first number of telephone numbers is greater than or equal to a first preset ratio threshold, the method further comprises:
if not, counting a first call frequency and a second call frequency corresponding to the currently processed telephone number according to the call bill data; the first call times are the total call times of the currently processed telephone number in the target sub-time interval, and the second call times are the call times of the current location of the currently processed telephone number in the target sub-time interval and the same call times of the current location of the called telephone number;
judging whether the ratio of the second call times to the first call times is larger than a second preset ratio threshold value or not;
if yes, determining the current processing telephone number as a suspicious telephone number;
if not, counting the number of the third telephone numbers and the number of the fourth telephone numbers corresponding to the currently processed telephone numbers according to the call bill data; the third telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within a preset time interval, and the fourth telephone number is the number of called telephone numbers which are communicated with the currently processed telephone number within the preset time interval and the communication times of which are more than 2 times;
judging whether the ratio of the number of the fourth telephone numbers to the number of the third telephone numbers is smaller than a third preset ratio threshold value or not;
if yes, determining the current processing telephone number as a suspicious telephone number;
if not, determining that the current processing telephone number is a normal telephone number.
4. The method according to claim 1, wherein the determining whether the suspicious telephone number is a harassing telephone number according to the reply message of the suspicious telephone number to each test message comprises:
determining a harassment voice database or a harassment keyword set corresponding to each reply message, and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set;
and determining whether the suspicious telephone number is a harassing telephone number or not according to the number detection result corresponding to each reply message.
5. The method according to claim 4, wherein the determining a harassment voice database or a harassment keyword set corresponding to each reply message and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set comprise:
for each reply message, the following operations are performed:
if the current processing reply information is the reply short message, determining a harassment keyword set matched with the test short message corresponding to the current processing reply information as a harassment keyword set corresponding to the current processing reply information; the harassment keyword set comprises at least two harassment keywords corresponding to the test short message;
detecting whether each harassment keyword in the harassment keyword set exists in the short message content of the current processing reply message;
if the target harassment keywords in the harassment keyword set exist in the short message content of the current processing reply message, determining that a number detection result corresponding to the current processing reply message is a harassment telephone number;
and if any harassment keyword in the harassment keyword set does not exist in the short message content of the current processing reply message, determining that the number detection result corresponding to the current processing reply message is a normal telephone number.
6. The method according to claim 4, wherein the determining a harassment voice database or a harassment keyword set corresponding to each reply message and determining a number detection result corresponding to each reply message according to the harassment voice database or the harassment keyword set comprise:
for each reply message, the following operations are performed:
if the current processing reply information is a callback voice file, determining a harassment voice database matched with the test short message corresponding to the current processing reply information as a harassment voice database corresponding to the current processing reply information; the harassment voice database comprises at least two harassment voice files corresponding to the test short messages;
detecting whether a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database;
if a target harassing voice file matched with the current processing reply information exists in each harassing voice file in the harassing voice database, determining a number detection result corresponding to the current processing reply information as a harassing telephone number;
and if the harassing voice files in the harassing voice database do not have target harassing voice files matched with the current processing reply information, determining that the number detection result corresponding to the current processing reply information is a normal telephone number.
7. The method of claim 4, wherein the determining whether the suspicious telephone number is a harassing telephone number according to the number detection result corresponding to each reply message comprises:
detecting whether the number detection result corresponding to each reply message is a normal telephone number;
if the number detection result corresponding to each reply message is a normal telephone number, determining that the suspicious telephone number is the normal telephone number;
and if at least one corresponding target reply message with the number detection result being the crank telephone number exists in each reply message, determining that the suspicious telephone number is the crank telephone number, and determining the crank type of the suspicious telephone number according to the crank type corresponding to each target reply message.
8. A crank call detection device, comprising:
the call ticket data acquisition module is used for acquiring call ticket data in a preset time interval; the call ticket data comprises associated information of each call in a preset time interval, and the associated information at least comprises: the method comprises the following steps of (1) calling telephone number, the current location of the calling telephone number, the number type of the calling telephone number, called telephone number, the current location of the called telephone number and the number type of the called telephone number;
the suspicious telephone detection module is used for determining suspicious telephone numbers in all telephone numbers contained in the call ticket data according to a preset number detection rule;
the test short message sending module is used for sending the test short message corresponding to each preset mobile communication terminal to the suspicious telephone number through at least two preset mobile communication terminals respectively and acquiring reply information of the suspicious telephone number aiming at each test short message; wherein, the reply information is a reply short message or a callback voice file;
and the crank call determining module is used for determining whether the suspicious telephone number is a crank telephone number according to the reply information of the suspicious telephone number to each test short message.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform a method of detecting a nuisance call as set forth in any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores computer instructions for causing a processor to implement the method of detecting a crank call as claimed in any one of claims 1-7 when executed.
CN202210312973.3A 2022-03-28 2022-03-28 Crank call detection method, device, equipment and medium Pending CN114710590A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210312973.3A CN114710590A (en) 2022-03-28 2022-03-28 Crank call detection method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210312973.3A CN114710590A (en) 2022-03-28 2022-03-28 Crank call detection method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114710590A true CN114710590A (en) 2022-07-05

Family

ID=82171136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210312973.3A Pending CN114710590A (en) 2022-03-28 2022-03-28 Crank call detection method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114710590A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102892117A (en) * 2012-09-11 2013-01-23 北京中创信测科技股份有限公司 Method and system for monitoring crank call
CN104702800A (en) * 2013-12-04 2015-06-10 ***通信集团公司 Harassing number identifying method, device and system
CN104735272A (en) * 2013-12-24 2015-06-24 ***通信集团贵州有限公司 Crank call interception method and system
CN105187605A (en) * 2015-06-16 2015-12-23 惠州Tcl移动通信有限公司 Telephone verification method and system
CN105187606A (en) * 2015-08-05 2015-12-23 郑卫兵 Method for preventing crank calls based on identity authentication
CN106657547A (en) * 2016-09-28 2017-05-10 武汉工程大学 Method and system for preventing crank calls
CN110602326A (en) * 2019-09-19 2019-12-20 中国联合网络通信集团有限公司 Suspicious incoming call identification method and suspicious incoming call identification system
CN113992798A (en) * 2021-10-26 2022-01-28 中国联合网络通信集团有限公司 Telephone identification method, device, equipment and readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102892117A (en) * 2012-09-11 2013-01-23 北京中创信测科技股份有限公司 Method and system for monitoring crank call
CN104702800A (en) * 2013-12-04 2015-06-10 ***通信集团公司 Harassing number identifying method, device and system
CN104735272A (en) * 2013-12-24 2015-06-24 ***通信集团贵州有限公司 Crank call interception method and system
CN105187605A (en) * 2015-06-16 2015-12-23 惠州Tcl移动通信有限公司 Telephone verification method and system
CN105187606A (en) * 2015-08-05 2015-12-23 郑卫兵 Method for preventing crank calls based on identity authentication
CN106657547A (en) * 2016-09-28 2017-05-10 武汉工程大学 Method and system for preventing crank calls
CN110602326A (en) * 2019-09-19 2019-12-20 中国联合网络通信集团有限公司 Suspicious incoming call identification method and suspicious incoming call identification system
CN113992798A (en) * 2021-10-26 2022-01-28 中国联合网络通信集团有限公司 Telephone identification method, device, equipment and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王玉申;: "骚扰电话治理方案研究", 通信电源技术, 31 December 2011 (2011-12-31) *

Similar Documents

Publication Publication Date Title
CN107809331B (en) Method and device for identifying abnormal flow
CN113055523B (en) Crank call interception method and device, electronic equipment and storage medium
CN114143402A (en) AI outbound method, device, computer equipment and storage medium
CN115048352B (en) Log field extraction method, device, equipment and storage medium
CN114710590A (en) Crank call detection method, device, equipment and medium
CN113590447B (en) Buried point processing method and device
CN104767880A (en) Communication number management method
CN114706610A (en) Business flow chart generation method, device, equipment and storage medium
CN114924937A (en) Batch task processing method and device, electronic equipment and computer readable medium
CN113010571A (en) Data detection method, data detection device, electronic equipment, storage medium and program product
CN111429257A (en) Transaction monitoring method and device
CN113157911A (en) Service verification method and device
CN114567698A (en) Detection method, device, equipment and storage medium for fraud-related numbers
CN114286343B (en) Multi-way outbound system, risk identification method, equipment, medium and product
CN110992067B (en) Message pushing method, device, computer equipment and storage medium
CN114444611A (en) Number recognition model training method, number recognition device, number recognition equipment and medium
CN117714561A (en) Alarm message processing method, device, equipment and storage medium
CN115603947A (en) Abnormal access detection method and device
CN116524959A (en) Voice emotion determining method, device, equipment and medium
CN117611175A (en) Fraud-prevention account transfer method and device, electronic equipment and storage medium
CN117076988A (en) Abnormal behavior detection method, device, equipment and medium
CN114423009A (en) Fraud user identification method, apparatus, electronic device, and computer-readable medium
CN114663095A (en) Method, device, equipment, medium and product for processing consultation service
CN115424252A (en) Public health information acquisition method, device, equipment and medium
CN116663555A (en) Business customer complaint information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination