主权项 |
1. A computer-implemented method, comprising:
receiving, at a computing device having one or more processors, a plurality of reported phone numbers from telephone users, each of the plurality of reported phone numbers being identified by one of the telephone users as being a source of unwanted phone messages; receiving, at the computing device, a plurality of posted phone numbers from one or more websites, each of the websites being identified as a directory of sources of unwanted phone messages; receiving, at the computing device, transcriptions of messages associated with a plurality of calling phone numbers, each transcription including textual data content of a message originating from one of the plurality of calling phone numbers; identifying, at the computing device, one or more of the calling phone numbers as potential sources of unwanted phone messages based on the transcriptions; generating, at the computing device, a machine-learning model based on: (i) the plurality of reported phone numbers, (ii) the plurality of posted phone numbers, and (iii) the one or more calling phone numbers identified as potential sources of unwanted phone messages, the machine-learning model being configured to determine a probability that an unknown phone message is unwanted based on a phone number from which the unknown phone message originated; and storing, at the computing device, the machine learning model. |