US 9,813,538 B2
Malicious call recognition method and apparatus
Chaowei Cai, Shenzhen (CN); Hua Zhang, Shenzhen (CN); and Bo Wang, Shenzhen (CN)
Assigned to TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, Shenzhen (CN)
Filed by TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, Shenzhen (CN)
Filed on Jan. 18, 2017, as Appl. No. 15/408,556.
Application 15/408,556 is a continuation of application No. PCT/CN2016/072792, filed on Jan. 29, 2016.
Claims priority of application No. 2015 1 0089138 (CN), filed on Feb. 27, 2015.
Prior Publication US 2017/0126874 A1, May 4, 2017
Int. Cl. H04Q 7/22 (2006.01); H04M 1/663 (2006.01); H04M 3/42 (2006.01)
CPC H04M 1/663 (2013.01) [H04M 3/42059 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A malicious call recognition method, comprising:
obtaining call detail record information of the call when a local end makes a call to a peer end, the call detail record information of the call comprising at least one of a call record of the local end within first preset duration that is closest to current time, and a call record of the peer end within the first preset duration that is closest to the current time;
matching the call detail record information of the call with a malicious model corresponding to a malicious call event comprised in a preset malicious model library; and
determining the call to be a malicious call if the malicious model that matches with the call detail record information of the call is found,
wherein the malicious model corresponding to the malicious call event describes a process in which a lawbreaker commits a malicious behavior by using the malicious call, and defines a malicious condition that the malicious behavior meets.