CN106850552A - A kind of method that harmful Call Intercept is realized based on signaling re-injection - Google Patents

A kind of method that harmful Call Intercept is realized based on signaling re-injection Download PDF

Info

Publication number
CN106850552A
CN106850552A CN201611190962.3A CN201611190962A CN106850552A CN 106850552 A CN106850552 A CN 106850552A CN 201611190962 A CN201611190962 A CN 201611190962A CN 106850552 A CN106850552 A CN 106850552A
Authority
CN
China
Prior art keywords
signaling
harmful
calling
injection
headend equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611190962.3A
Other languages
Chinese (zh)
Inventor
庞韶敏
高华
薛二彭
田野
何文杰
张震
金红
杨满智
刘长永
陈晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eversec Beijing Technology Co Ltd
Original Assignee
Eversec Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eversec Beijing Technology Co Ltd filed Critical Eversec Beijing Technology Co Ltd
Priority to CN201611190962.3A priority Critical patent/CN106850552A/en
Publication of CN106850552A publication Critical patent/CN106850552A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to field of communication network security, a kind of method that harmful Call Intercept is realized based on signaling re-injection is disclosed, the method includes:Headend equipment gathers signaling and media information, obtains the caller information in signaling, is matched with the number in the information and date storehouse, if blacklist targeted customer, then headend equipment is intercepted using signaling re-injection mode to harmful calling;If gray list user sends into back-end server after then the signaling information of the calling is associated with media information, judge that the number is harmful caller through back-end server, then transmitting order to lower levels to headend equipment is intercepted, and headend equipment uses signaling re-injection mode, realizes the interception to being harmful to calling.The present invention can be to the calling of blacklist caller and by detecting that confirming as harmful calling realizes real-time blocking.

Description

A kind of method that harmful Call Intercept is realized based on signaling re-injection
Technical field
Realize that harmful calling is blocked based on signaling re-injection the invention belongs to safe technique in network in correspondence field, more particularly to one kind The method cut.
Background technology
The swindle way for being carried out using phone in recent years is in outburst trend, is deceived wide, great amount, and communication swindle turns into Huge user's pain spot.2013, whole nation communication fraud case more than 30 ten thousand, the masses were cheated 10,000,000,000 yuan;, whole nation communication in 2014 Fraud case more than 40 ten thousand, the masses lose 10,700,000,000 yuan;Telecommunication fraud case 590,000 is found altogether by national public security organ within 2015, on year-on-year basis Rise 32.5%, cause 22,200,000,000 yuan of economic loss.Telecommunication fraud case 35.5 ten thousand is found in January in this year to August, the whole nation altogether, on year-on-year basis Rise 36.4%, cause damage 114.2 hundred million yuan.Report display, in this year, because of leakage of personal information, junk information, swindle letter The reasons such as breath, cause about 80,500,000,000 yuan of netizen's overall loss, 124 yuan per capita, wherein the nearly economy being subjected to for 1 year of about 45,000,000 netizens Loss is more than 1000 yuan.The black product of movement has been hinted obliquely in the behind of these losses, and black the producing of movement is a complete chain, is related to To multiple links, only by the strength of one party, it is impossible to reach effective strike purpose, it is necessary to combine various resources, one rises Power.
2013 are so far, over nearly 10 years, China's telecommunication fraud annual speed rapid growth with 20%-30% of case.Entirely There is cheated more than ten million yuan telecommunication fraud case 104, more than million yuan of case 2392 in Kuomintang-Communist.Many masses' " endowment money " " lifesaving money " is cheated, and goes bankrupt or broke, with one's family broken up;Some business capitals are cheated, break, trigger colony's sexual behavior Part.
In view of above-mentioned electrical fraud case rate takes place frequently, therefore, how from numerous telephone numbers, rubbish number is analyzed, Malice number is irised out, carrying out interception to those doubtful harmful callings becomes for current problem demanding prompt solution.
The content of the invention
It is an object of the present invention to provide a kind of method that harmful Call Intercept is realized based on signaling re-injection, to realize to logical The interception of doubtful harmful calling in letter.
The technical solution adopted by the present invention is as follows:
A kind of method that harmful Call Intercept is realized based on signaling re-injection, methods described is included:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, headend equipment is directly intercepted to the calling;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again, Judge whether the number has as gray list place, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through rear end Server judges whether the number is harmful calling, if back-end server is judged to harmful calling, back-end server issues life Order to headend equipment is intercepted, if back-end server judges not to be harmful calling, allows its normal call.
Further, headend equipment is by the way that to existing network link, using bypassing and connecing pattern realization collection, headend equipment passes through The media information decoding for being acquired to medium surface information and being collected, completion signaling is associated with media, acquisition mode bag Include mirror image and light splitting.
Further, by all call bill report to back-end server, back-end server is based on call to headend equipment Outside input feature, Signaling characteristics and behavioural characteristic are analyzed, to doubtful harmful calling generation gray list and before being issued to In the gray list storehouse of end equipment.
Further, the order that headend equipment is issued according to the matching result and back-end server in blacklist storehouse, uses The mode of signaling re-injection generates the signaling bag of call release, and harmful calling is implemented to intercept, wherein the signaling re-injection includes structure The call information of correlation is made, the message is sent to network, realize the interception to being harmful to calling.
Further, it is the control signaling in SIP, BICC, ISUP to the network transmission protocol, is believed using different re-injections Order.
Compared with prior art, a kind of method that harmful Call Intercept is realized based on signaling re-injection provided by the present invention, By with blacklist telephone number matches, and to the voice analysis of semantic characteristics of gray list user, it is possible to achieve to swindle electricity The identification of words.After fraudulent call is identified, real-time blocking is carried out to the calling using the method for signaling re-injection.The present invention need not Larger transformation is carried out to existing network, and does not interfere with the normal talking in existing network.
Brief description of the drawings
Fig. 1 is to realize that the flow of the method for harmful Call Intercept is illustrated based on signaling re-injection described in the embodiment of the present invention Figure;
Fig. 2 is the system architecture of the method that harmful Call Intercept is realized based on signaling re-injection described in the embodiment of the present invention Figure.
Specific embodiment
The following examples are only intended to illustrate the technical solution of the present invention more clearly, and can not limit the present invention with this Protection domain.Some vocabulary have such as been used to censure particular elements in the middle of specification and claim.People in the art Member is, it is to be appreciated that hardware manufacturer may call same part with different nouns.This specification and claims are not In the way of the difference of title is used as distinguishing part, but the difference with part functionally is used as the criterion distinguished.Say To implement better embodiment of the invention, so description is to illustrate that this new rule is mesh to bright book subsequent descriptions , it is not limited to the scope of the present invention.Protection scope of the present invention ought be defined depending on the appended claims person of defining.
The present invention is described in further details with specific embodiment below in conjunction with the accompanying drawings.
The purpose of the present invention is to realize confirming as harmful calling realization to the calling of blacklist number and by detection Effectively intercept in real time.
As shown in Figure 1 and Figure 2, a kind of side that harmful Call Intercept is realized based on signaling re-injection described in the embodiment of the present invention Method, comprises the following steps:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, headend equipment is directly intercepted to the calling;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again, Judge whether the number has as gray list place, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through rear end Server judges whether the calling number is harmful calling, if back-end server is judged to harmful calling, under back-end server Say the word to headend equipment and intercepted, prevent the calling from continuing, if back-end server judges not to be harmful calling, allow it Normal call.
Specifically, the present invention is main is blocked by signal collecting with acquisition of media, harmful calling judgement and harmful calling Three steps are cut to confirm.
During the collection of signaling and acquisition of media, signaling is mainly bypassed and connects pattern reality by the use of existing network link Now gather, acquisition mode is mirror image or light splitting, or the two mode for being combined.Media are mainly adopted by medium surface information Collection, and the media information decoding that will be collected, are reduced to audio file.And decoded by agreement, complete signaling and matchmaker The association of body.Pattern is bypassed and connects, headend equipment is and connects relation with equipment in network, and advantage is that headend equipment breaks down The normal operation of the network equipment is not interfered with, and is capable of achieving without carrying out larger transformation to existing network.Mirror-image fashion is to construct Mirror image link, makes the signal in the network equipment in addition to normal transmission, and its mirror image is sent into headend equipment.Spectroscopic modes are then directed to The network equipment of signal transmission is carried out by optical-fiber network, optical splitting link is constructed, makes the optical signal in the network equipment except normal transmission Outward, its light splitting is sent to headend equipment.
In harmful calling decision process, harmful calling judges mainly there is two ways.
The first decision procedure is that headend equipment is provided with blacklist storehouse, and headend equipment is carried out to the signaling information for collecting Decoding Analysis, obtain the calling number in signaling, are matched with calling number with blacklist storehouse.Judge the number whether as black List place has, if being located in blacklist storehouse, judges that the calling is harmful calling.
The second way is that the calling number that signaling information Decoding Analysis are obtained is not in blacklist storehouse, then use The calling number is matched with doubtful harmful calling gray list storehouse, judges whether the number has as gray list place, if being located at In gray list storehouse, then the signaling information of the calling number and media information are reached into back-end server, back-end server is exhaled this It is called and to determine whether harmful calling, back-end server is judged to harmful calling, then intercept.
Wherein, before the judgement of harmful calling, headend equipment is by all call bill report to back-end server, rear end Server carries out independent or comprehensive analysis to outside input feature vector, Signaling characteristics and behavioural characteristic, to doubtful harmful calling Generation gray list is issued to headend equipment gray list storehouse, realizes the renewal in gray list storehouse.Back-end server is to regarding as harmful exhaling After crying the instruction except being intercepted to front-end server, the blacklist storehouse that blacklist is issued to front end also can be generated simultaneously, realized The renewal in blacklist storehouse.
Use signaling re-injection mode during harmful Call Intercept, headend equipment according to blacklist matching result and after End server transmitting order to lower levels, generates the signaling bag of call release, and harmful calling is implemented to intercept.It is related that signaling re-injection is construction Message related to calls, the message is sent to network, you can realize to be harmful to calling interception.Wherein, the construction of signaling re-injection message Completed by headend equipment.
The present invention uses different re-injection signalings for heterogeneous networks.
Called before intercepting call according to blacklist, specific re-injection signaling is as shown in the table:
Control signaling Control is carried Media bearer Re-injection signaling catching is controlled
SIP IP IP Send the message of SIP 486
BICC IP IP Send BICC REL message
ISUP TDM SS7 TDM Send ISUP REL message
Called after intercepting call according to gray list, specific re-injection signaling is as shown in the table:
Control signaling Control is carried Media bearer Re-injection signaling catching is controlled
SIP IP IP Send SIP BYE message
BICC IP IP Send BICC REL message
ISUP TDM SS7 TDM Send ISUP REL message
Three kinds of signaling transfer protocols are simply introduced below.
SIP (Session Initiation Protocol) is a signaling control protocol for application layer.For creating, Change and discharge the session of one or more participants.
SIP, using UDP (UDP) and transmission control protocol (TCP), will be independent of independently of transport layer Couple together to the user flexibility of underlying infrastructure.
SIP BYE message is used to terminate the session set up, can by calling party or callee send this message come Terminate session.
BICC is the abbreviation of Bearer Independent Call Control protocol, i.e., unrelated with carrying to exhale It is control protocol.BICC is a call control protocol based on ISUP (ISDN User Part).Since being Call- Control1 association View, BICC is only responsible for setting up, changes and terminating call.BICC is an agreement unrelated with carrying.REL is that the release of BICC disappears Breath;REL is also the release message of ISUP.
The present invention realizes the interception to being harmful to calling by signaling re-injection mode, and specific implementation is in soft switch office Existing network link is used and bypasses and connect pattern implementation signaling, acquisition of media.Headend equipment will converse bill report to back-end server, Back-end server generates blacklist and gray list according to outside input, Signaling characteristics and behavioural characteristic etc..Headend equipment is to grey name Singly realize that signaling is reported with media information, back-end server is judged the information for uploading, if it is determined that for harmful calling then to Headend equipment sends interception order.Headend equipment realizes the interception to being harmful to calling by way of signaling re-injection.
Method of the present invention on the basis of other network normal talkings in not influenceing existing network, without being carried out to existing network Larger transformation, you can realize the effective interception to being harmful to calling.
It is worth noting that, the foregoing is only presently preferred embodiments of the present invention, patent of the invention is not thereby limited Protection domain, the present invention can also carry out the improvement of material and structure to the construction of above-mentioned various parts, or use skill Art equivalent is replaced.Therefore all equivalent structure changes made with specification of the invention and diagramatic content, or directly or Apply to other correlative technology fields indirectly to be similarly all contained in the range of of the invention covering.

Claims (5)

1. a kind of method that harmful Call Intercept is realized based on signaling re-injection, it is characterised in that methods described includes:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, the calling is directly intercepted;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again, judged Whether the number is that gray list place has, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through back-end services Device judges whether the number is harmful caller, if back-end server is judged to harmful calling, back-end server transmitting order to lower levels is extremely Headend equipment is intercepted, if back-end server judges not to be harmful calling, allows its normal call.
2. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment By the way that to existing network link, using bypassing and connecing pattern realization collection, headend equipment is acquired and will adopt by medium surface information The media information decoding for collecting, completion signaling is associated with media, and acquisition mode includes mirror image and light splitting.
3. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment By all call bill report to back-end server, back-end server is based on outside input feature, Signaling characteristics and the row of call It is characterized and is analyzed, doubtful harmful calling is generated by gray list and is issued in the gray list storehouse of headend equipment.
4. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment The order that matching result and back-end server according to blacklist storehouse are issued, call release is generated by the way of signaling re-injection Signaling bag, harmful calling is implemented to intercept, wherein the signaling re-injection includes the related call information of construction, by message hair To network, the interception to being harmful to calling is realized.
5. it is as claimed in claim 4 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that network is passed Defeated agreement is the control signaling in SIP, BICC, ISUP, realizes intercepting using different re-injection signalings.
CN201611190962.3A 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection Pending CN106850552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611190962.3A CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611190962.3A CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Publications (1)

Publication Number Publication Date
CN106850552A true CN106850552A (en) 2017-06-13

Family

ID=59135066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611190962.3A Pending CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Country Status (1)

Country Link
CN (1) CN106850552A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833720A (en) * 2018-05-04 2018-11-16 北京邮电大学 Fraudulent call number identification method and system
CN109587114A (en) * 2018-10-31 2019-04-05 中国人民解放军战略支援部队信息工程大学 Based on the junk call identification device and protective device of media redirection of router, method
CN111314359A (en) * 2020-02-20 2020-06-19 上海欣方智能系统有限公司 Anti-fraud method based on SIP signaling collection
CN113691680A (en) * 2021-08-17 2021-11-23 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN114679432A (en) * 2022-02-28 2022-06-28 河南信大网御科技有限公司 Harmful telephone precaution device and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
WO2013091492A1 (en) * 2011-12-20 2013-06-27 中兴通讯股份有限公司 Method and device for limiting fraudulent calls of false caller
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN104301896A (en) * 2014-10-15 2015-01-21 上海欣方智能系统有限公司 Intelligent fraud short message monitor and alarm system and method
US20150256662A1 (en) * 2014-03-07 2015-09-10 Dialogtech Inc. Phone fraud deterrence system for use with toll free and other fee generating numbers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
WO2013091492A1 (en) * 2011-12-20 2013-06-27 中兴通讯股份有限公司 Method and device for limiting fraudulent calls of false caller
US20150256662A1 (en) * 2014-03-07 2015-09-10 Dialogtech Inc. Phone fraud deterrence system for use with toll free and other fee generating numbers
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN104301896A (en) * 2014-10-15 2015-01-21 上海欣方智能系统有限公司 Intelligent fraud short message monitor and alarm system and method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833720A (en) * 2018-05-04 2018-11-16 北京邮电大学 Fraudulent call number identification method and system
CN109587114A (en) * 2018-10-31 2019-04-05 中国人民解放军战略支援部队信息工程大学 Based on the junk call identification device and protective device of media redirection of router, method
CN111314359A (en) * 2020-02-20 2020-06-19 上海欣方智能系统有限公司 Anti-fraud method based on SIP signaling collection
CN113691680A (en) * 2021-08-17 2021-11-23 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN113691680B (en) * 2021-08-17 2024-01-30 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN114679432A (en) * 2022-02-28 2022-06-28 河南信大网御科技有限公司 Harmful telephone precaution device and method
CN114679432B (en) * 2022-02-28 2024-01-05 河南信大网御科技有限公司 Harmful telephone prevention equipment and method

Similar Documents

Publication Publication Date Title
CN106850552A (en) A kind of method that harmful Call Intercept is realized based on signaling re-injection
CN104936182B (en) A kind of method and system of intelligence management and control fraudulent call
CN104243727B (en) System and method for performing big data analysis confirmation and interception on phone scams
CN102572124B (en) Method and system for preventing telecommunication fraud by using No.7 signaling message of switch
CN106331390B (en) A kind of method and system identifying swindle number based on communicating data
US9001985B2 (en) Method of and system for discovering and reporting trustworthiness and credibility of calling party number information
CN100579150C (en) Method for screen selecting and catching vicious disturbing calls
CN104093153B (en) It is a kind of that the method and its system realized pseudo number call screening and intercepted are analyzed based on signalling route
CN107770777A (en) A kind of recognition methods for fraudulent call of recording
CN106970911A (en) A kind of strick precaution telecommunication fraud system and method based on big data and machine learning
CN106506769B (en) A kind of method and system for realizing malicious call filtering using real time algorithm
CN106936997B (en) A kind of rubbish voice recognition methods and system based on social networks map
CN104244216A (en) Method and system for intercepting fraud phones in real time during calling
WO2001082564A3 (en) Personal calling method for telephone subscriber (variants)
CN110072019A (en) A kind of method and device shielding harassing call
CN111314359B (en) Anti-fraud method based on SIP signaling collection
CN106657689A (en) Method for preventing and controlling international fraud call and apparatus thereof
CN107734461A (en) A kind of Novel telephone swindle detection and prevention method based on location determination
CN106453799B (en) Manipulative communications deception recognition methods and system
CN107395905A (en) Anti- the fraudulent call access system and method that a kind of signaling concatenation media redirect
CN110445944A (en) Call center prevents the method and system made nuisance calls
CN101771757A (en) Method for detecting and intercepting nuisance calls
CN106850567A (en) A kind of method and device that doubtful harmful call treatment is realized based on preceding slotting code
EP2676425A1 (en) A bypass detection system resembling human behaviour
KR101379779B1 (en) Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 100191 Beijing City, North Third Ring Road West, No. 27, building 25, room five, floor 5002

Applicant after: Heng Jia Jia (Beijing) Technology Co., Ltd.

Address before: 100089, room 27, building five, building 25, No. 5002 West Third Ring Road, Haidian District, Beijing

Applicant before: Eversec (Beijing) Technology Co., Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613