CN106850552A - A kind of method that harmful Call Intercept is realized based on signaling re-injection - Google Patents
A kind of method that harmful Call Intercept is realized based on signaling re-injection Download PDFInfo
- Publication number
- CN106850552A CN106850552A CN201611190962.3A CN201611190962A CN106850552A CN 106850552 A CN106850552 A CN 106850552A CN 201611190962 A CN201611190962 A CN 201611190962A CN 106850552 A CN106850552 A CN 106850552A
- Authority
- CN
- China
- Prior art keywords
- signaling
- harmful
- calling
- injection
- headend equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention belongs to field of communication network security, a kind of method that harmful Call Intercept is realized based on signaling re-injection is disclosed, the method includes:Headend equipment gathers signaling and media information, obtains the caller information in signaling, is matched with the number in the information and date storehouse, if blacklist targeted customer, then headend equipment is intercepted using signaling re-injection mode to harmful calling;If gray list user sends into back-end server after then the signaling information of the calling is associated with media information, judge that the number is harmful caller through back-end server, then transmitting order to lower levels to headend equipment is intercepted, and headend equipment uses signaling re-injection mode, realizes the interception to being harmful to calling.The present invention can be to the calling of blacklist caller and by detecting that confirming as harmful calling realizes real-time blocking.
Description
Technical field
Realize that harmful calling is blocked based on signaling re-injection the invention belongs to safe technique in network in correspondence field, more particularly to one kind
The method cut.
Background technology
The swindle way for being carried out using phone in recent years is in outburst trend, is deceived wide, great amount, and communication swindle turns into
Huge user's pain spot.2013, whole nation communication fraud case more than 30 ten thousand, the masses were cheated 10,000,000,000 yuan;, whole nation communication in 2014
Fraud case more than 40 ten thousand, the masses lose 10,700,000,000 yuan;Telecommunication fraud case 590,000 is found altogether by national public security organ within 2015, on year-on-year basis
Rise 32.5%, cause 22,200,000,000 yuan of economic loss.Telecommunication fraud case 35.5 ten thousand is found in January in this year to August, the whole nation altogether, on year-on-year basis
Rise 36.4%, cause damage 114.2 hundred million yuan.Report display, in this year, because of leakage of personal information, junk information, swindle letter
The reasons such as breath, cause about 80,500,000,000 yuan of netizen's overall loss, 124 yuan per capita, wherein the nearly economy being subjected to for 1 year of about 45,000,000 netizens
Loss is more than 1000 yuan.The black product of movement has been hinted obliquely in the behind of these losses, and black the producing of movement is a complete chain, is related to
To multiple links, only by the strength of one party, it is impossible to reach effective strike purpose, it is necessary to combine various resources, one rises
Power.
2013 are so far, over nearly 10 years, China's telecommunication fraud annual speed rapid growth with 20%-30% of case.Entirely
There is cheated more than ten million yuan telecommunication fraud case 104, more than million yuan of case 2392 in Kuomintang-Communist.Many masses'
" endowment money " " lifesaving money " is cheated, and goes bankrupt or broke, with one's family broken up;Some business capitals are cheated, break, trigger colony's sexual behavior
Part.
In view of above-mentioned electrical fraud case rate takes place frequently, therefore, how from numerous telephone numbers, rubbish number is analyzed,
Malice number is irised out, carrying out interception to those doubtful harmful callings becomes for current problem demanding prompt solution.
The content of the invention
It is an object of the present invention to provide a kind of method that harmful Call Intercept is realized based on signaling re-injection, to realize to logical
The interception of doubtful harmful calling in letter.
The technical solution adopted by the present invention is as follows:
A kind of method that harmful Call Intercept is realized based on signaling re-injection, methods described is included:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, headend equipment is directly intercepted to the calling;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again,
Judge whether the number has as gray list place, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through rear end
Server judges whether the number is harmful calling, if back-end server is judged to harmful calling, back-end server issues life
Order to headend equipment is intercepted, if back-end server judges not to be harmful calling, allows its normal call.
Further, headend equipment is by the way that to existing network link, using bypassing and connecing pattern realization collection, headend equipment passes through
The media information decoding for being acquired to medium surface information and being collected, completion signaling is associated with media, acquisition mode bag
Include mirror image and light splitting.
Further, by all call bill report to back-end server, back-end server is based on call to headend equipment
Outside input feature, Signaling characteristics and behavioural characteristic are analyzed, to doubtful harmful calling generation gray list and before being issued to
In the gray list storehouse of end equipment.
Further, the order that headend equipment is issued according to the matching result and back-end server in blacklist storehouse, uses
The mode of signaling re-injection generates the signaling bag of call release, and harmful calling is implemented to intercept, wherein the signaling re-injection includes structure
The call information of correlation is made, the message is sent to network, realize the interception to being harmful to calling.
Further, it is the control signaling in SIP, BICC, ISUP to the network transmission protocol, is believed using different re-injections
Order.
Compared with prior art, a kind of method that harmful Call Intercept is realized based on signaling re-injection provided by the present invention,
By with blacklist telephone number matches, and to the voice analysis of semantic characteristics of gray list user, it is possible to achieve to swindle electricity
The identification of words.After fraudulent call is identified, real-time blocking is carried out to the calling using the method for signaling re-injection.The present invention need not
Larger transformation is carried out to existing network, and does not interfere with the normal talking in existing network.
Brief description of the drawings
Fig. 1 is to realize that the flow of the method for harmful Call Intercept is illustrated based on signaling re-injection described in the embodiment of the present invention
Figure;
Fig. 2 is the system architecture of the method that harmful Call Intercept is realized based on signaling re-injection described in the embodiment of the present invention
Figure.
Specific embodiment
The following examples are only intended to illustrate the technical solution of the present invention more clearly, and can not limit the present invention with this
Protection domain.Some vocabulary have such as been used to censure particular elements in the middle of specification and claim.People in the art
Member is, it is to be appreciated that hardware manufacturer may call same part with different nouns.This specification and claims are not
In the way of the difference of title is used as distinguishing part, but the difference with part functionally is used as the criterion distinguished.Say
To implement better embodiment of the invention, so description is to illustrate that this new rule is mesh to bright book subsequent descriptions
, it is not limited to the scope of the present invention.Protection scope of the present invention ought be defined depending on the appended claims person of defining.
The present invention is described in further details with specific embodiment below in conjunction with the accompanying drawings.
The purpose of the present invention is to realize confirming as harmful calling realization to the calling of blacklist number and by detection
Effectively intercept in real time.
As shown in Figure 1 and Figure 2, a kind of side that harmful Call Intercept is realized based on signaling re-injection described in the embodiment of the present invention
Method, comprises the following steps:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, headend equipment is directly intercepted to the calling;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again,
Judge whether the number has as gray list place, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through rear end
Server judges whether the calling number is harmful calling, if back-end server is judged to harmful calling, under back-end server
Say the word to headend equipment and intercepted, prevent the calling from continuing, if back-end server judges not to be harmful calling, allow it
Normal call.
Specifically, the present invention is main is blocked by signal collecting with acquisition of media, harmful calling judgement and harmful calling
Three steps are cut to confirm.
During the collection of signaling and acquisition of media, signaling is mainly bypassed and connects pattern reality by the use of existing network link
Now gather, acquisition mode is mirror image or light splitting, or the two mode for being combined.Media are mainly adopted by medium surface information
Collection, and the media information decoding that will be collected, are reduced to audio file.And decoded by agreement, complete signaling and matchmaker
The association of body.Pattern is bypassed and connects, headend equipment is and connects relation with equipment in network, and advantage is that headend equipment breaks down
The normal operation of the network equipment is not interfered with, and is capable of achieving without carrying out larger transformation to existing network.Mirror-image fashion is to construct
Mirror image link, makes the signal in the network equipment in addition to normal transmission, and its mirror image is sent into headend equipment.Spectroscopic modes are then directed to
The network equipment of signal transmission is carried out by optical-fiber network, optical splitting link is constructed, makes the optical signal in the network equipment except normal transmission
Outward, its light splitting is sent to headend equipment.
In harmful calling decision process, harmful calling judges mainly there is two ways.
The first decision procedure is that headend equipment is provided with blacklist storehouse, and headend equipment is carried out to the signaling information for collecting
Decoding Analysis, obtain the calling number in signaling, are matched with calling number with blacklist storehouse.Judge the number whether as black
List place has, if being located in blacklist storehouse, judges that the calling is harmful calling.
The second way is that the calling number that signaling information Decoding Analysis are obtained is not in blacklist storehouse, then use
The calling number is matched with doubtful harmful calling gray list storehouse, judges whether the number has as gray list place, if being located at
In gray list storehouse, then the signaling information of the calling number and media information are reached into back-end server, back-end server is exhaled this
It is called and to determine whether harmful calling, back-end server is judged to harmful calling, then intercept.
Wherein, before the judgement of harmful calling, headend equipment is by all call bill report to back-end server, rear end
Server carries out independent or comprehensive analysis to outside input feature vector, Signaling characteristics and behavioural characteristic, to doubtful harmful calling
Generation gray list is issued to headend equipment gray list storehouse, realizes the renewal in gray list storehouse.Back-end server is to regarding as harmful exhaling
After crying the instruction except being intercepted to front-end server, the blacklist storehouse that blacklist is issued to front end also can be generated simultaneously, realized
The renewal in blacklist storehouse.
Use signaling re-injection mode during harmful Call Intercept, headend equipment according to blacklist matching result and after
End server transmitting order to lower levels, generates the signaling bag of call release, and harmful calling is implemented to intercept.It is related that signaling re-injection is construction
Message related to calls, the message is sent to network, you can realize to be harmful to calling interception.Wherein, the construction of signaling re-injection message
Completed by headend equipment.
The present invention uses different re-injection signalings for heterogeneous networks.
Called before intercepting call according to blacklist, specific re-injection signaling is as shown in the table:
Control signaling | Control is carried | Media bearer | Re-injection signaling catching is controlled |
SIP | IP | IP | Send the message of SIP 486 |
BICC | IP | IP | Send BICC REL message |
ISUP | TDM SS7 | TDM | Send ISUP REL message |
Called after intercepting call according to gray list, specific re-injection signaling is as shown in the table:
Control signaling | Control is carried | Media bearer | Re-injection signaling catching is controlled |
SIP | IP | IP | Send SIP BYE message |
BICC | IP | IP | Send BICC REL message |
ISUP | TDM SS7 | TDM | Send ISUP REL message |
Three kinds of signaling transfer protocols are simply introduced below.
SIP (Session Initiation Protocol) is a signaling control protocol for application layer.For creating,
Change and discharge the session of one or more participants.
SIP, using UDP (UDP) and transmission control protocol (TCP), will be independent of independently of transport layer
Couple together to the user flexibility of underlying infrastructure.
SIP BYE message is used to terminate the session set up, can by calling party or callee send this message come
Terminate session.
BICC is the abbreviation of Bearer Independent Call Control protocol, i.e., unrelated with carrying to exhale
It is control protocol.BICC is a call control protocol based on ISUP (ISDN User Part).Since being Call- Control1 association
View, BICC is only responsible for setting up, changes and terminating call.BICC is an agreement unrelated with carrying.REL is that the release of BICC disappears
Breath;REL is also the release message of ISUP.
The present invention realizes the interception to being harmful to calling by signaling re-injection mode, and specific implementation is in soft switch office
Existing network link is used and bypasses and connect pattern implementation signaling, acquisition of media.Headend equipment will converse bill report to back-end server,
Back-end server generates blacklist and gray list according to outside input, Signaling characteristics and behavioural characteristic etc..Headend equipment is to grey name
Singly realize that signaling is reported with media information, back-end server is judged the information for uploading, if it is determined that for harmful calling then to
Headend equipment sends interception order.Headend equipment realizes the interception to being harmful to calling by way of signaling re-injection.
Method of the present invention on the basis of other network normal talkings in not influenceing existing network, without being carried out to existing network
Larger transformation, you can realize the effective interception to being harmful to calling.
It is worth noting that, the foregoing is only presently preferred embodiments of the present invention, patent of the invention is not thereby limited
Protection domain, the present invention can also carry out the improvement of material and structure to the construction of above-mentioned various parts, or use skill
Art equivalent is replaced.Therefore all equivalent structure changes made with specification of the invention and diagramatic content, or directly or
Apply to other correlative technology fields indirectly to be similarly all contained in the range of of the invention covering.
Claims (5)
1. a kind of method that harmful Call Intercept is realized based on signaling re-injection, it is characterised in that methods described includes:
Headend equipment gathers signaling and media information, obtains the dialing number information in signaling and media information;
Matched with calling number in database with the dialing number information for obtaining, determined whether harmful calling;Wherein,
If matching is blacklist targeted customer, the calling is directly intercepted;
If matching is not black list user, matched with the calling number with doubtful harmful calling gray list storehouse again, judged
Whether the number is that gray list place has, wherein,
If matching allows its normal call not for gray list place has;
If matching is present in gray list storehouse, the signaling of the calling and media information are reached into back-end server through back-end services
Device judges whether the number is harmful caller, if back-end server is judged to harmful calling, back-end server transmitting order to lower levels is extremely
Headend equipment is intercepted, if back-end server judges not to be harmful calling, allows its normal call.
2. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment
By the way that to existing network link, using bypassing and connecing pattern realization collection, headend equipment is acquired and will adopt by medium surface information
The media information decoding for collecting, completion signaling is associated with media, and acquisition mode includes mirror image and light splitting.
3. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment
By all call bill report to back-end server, back-end server is based on outside input feature, Signaling characteristics and the row of call
It is characterized and is analyzed, doubtful harmful calling is generated by gray list and is issued in the gray list storehouse of headend equipment.
4. it is as claimed in claim 1 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that headend equipment
The order that matching result and back-end server according to blacklist storehouse are issued, call release is generated by the way of signaling re-injection
Signaling bag, harmful calling is implemented to intercept, wherein the signaling re-injection includes the related call information of construction, by message hair
To network, the interception to being harmful to calling is realized.
5. it is as claimed in claim 4 to be based on the method that harmful Call Intercept is realized in signaling re-injection, it is characterised in that network is passed
Defeated agreement is the control signaling in SIP, BICC, ISUP, realizes intercepting using different re-injection signalings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190962.3A CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190962.3A CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106850552A true CN106850552A (en) | 2017-06-13 |
Family
ID=59135066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611190962.3A Pending CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850552A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833720A (en) * | 2018-05-04 | 2018-11-16 | 北京邮电大学 | Fraudulent call number identification method and system |
CN109587114A (en) * | 2018-10-31 | 2019-04-05 | 中国人民解放军战略支援部队信息工程大学 | Based on the junk call identification device and protective device of media redirection of router, method |
CN111314359A (en) * | 2020-02-20 | 2020-06-19 | 上海欣方智能系统有限公司 | Anti-fraud method based on SIP signaling collection |
CN113691680A (en) * | 2021-08-17 | 2021-11-23 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN114679432A (en) * | 2022-02-28 | 2022-06-28 | 河南信大网御科技有限公司 | Harmful telephone precaution device and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415161A (en) * | 2008-11-26 | 2009-04-22 | 深圳华为通信技术有限公司 | Method and apparatus for filtrating rubbish short message |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101453522A (en) * | 2008-12-19 | 2009-06-10 | 中国移动通信集团浙江有限公司 | Method for non-standardized dialing service monitoring between networks |
WO2013091492A1 (en) * | 2011-12-20 | 2013-06-27 | 中兴通讯股份有限公司 | Method and device for limiting fraudulent calls of false caller |
CN104093153A (en) * | 2014-06-25 | 2014-10-08 | 东方通信股份有限公司 | Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof |
CN104301896A (en) * | 2014-10-15 | 2015-01-21 | 上海欣方智能系统有限公司 | Intelligent fraud short message monitor and alarm system and method |
US20150256662A1 (en) * | 2014-03-07 | 2015-09-10 | Dialogtech Inc. | Phone fraud deterrence system for use with toll free and other fee generating numbers |
-
2016
- 2016-12-21 CN CN201611190962.3A patent/CN106850552A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101415161A (en) * | 2008-11-26 | 2009-04-22 | 深圳华为通信技术有限公司 | Method and apparatus for filtrating rubbish short message |
CN101453522A (en) * | 2008-12-19 | 2009-06-10 | 中国移动通信集团浙江有限公司 | Method for non-standardized dialing service monitoring between networks |
WO2013091492A1 (en) * | 2011-12-20 | 2013-06-27 | 中兴通讯股份有限公司 | Method and device for limiting fraudulent calls of false caller |
US20150256662A1 (en) * | 2014-03-07 | 2015-09-10 | Dialogtech Inc. | Phone fraud deterrence system for use with toll free and other fee generating numbers |
CN104093153A (en) * | 2014-06-25 | 2014-10-08 | 东方通信股份有限公司 | Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof |
CN104301896A (en) * | 2014-10-15 | 2015-01-21 | 上海欣方智能系统有限公司 | Intelligent fraud short message monitor and alarm system and method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833720A (en) * | 2018-05-04 | 2018-11-16 | 北京邮电大学 | Fraudulent call number identification method and system |
CN109587114A (en) * | 2018-10-31 | 2019-04-05 | 中国人民解放军战略支援部队信息工程大学 | Based on the junk call identification device and protective device of media redirection of router, method |
CN111314359A (en) * | 2020-02-20 | 2020-06-19 | 上海欣方智能系统有限公司 | Anti-fraud method based on SIP signaling collection |
CN113691680A (en) * | 2021-08-17 | 2021-11-23 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN113691680B (en) * | 2021-08-17 | 2024-01-30 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN114679432A (en) * | 2022-02-28 | 2022-06-28 | 河南信大网御科技有限公司 | Harmful telephone precaution device and method |
CN114679432B (en) * | 2022-02-28 | 2024-01-05 | 河南信大网御科技有限公司 | Harmful telephone prevention equipment and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850552A (en) | A kind of method that harmful Call Intercept is realized based on signaling re-injection | |
CN104936182B (en) | A kind of method and system of intelligence management and control fraudulent call | |
CN104243727B (en) | System and method for performing big data analysis confirmation and interception on phone scams | |
CN102572124B (en) | Method and system for preventing telecommunication fraud by using No.7 signaling message of switch | |
CN106331390B (en) | A kind of method and system identifying swindle number based on communicating data | |
US9001985B2 (en) | Method of and system for discovering and reporting trustworthiness and credibility of calling party number information | |
CN100579150C (en) | Method for screen selecting and catching vicious disturbing calls | |
CN104093153B (en) | It is a kind of that the method and its system realized pseudo number call screening and intercepted are analyzed based on signalling route | |
CN107770777A (en) | A kind of recognition methods for fraudulent call of recording | |
CN106970911A (en) | A kind of strick precaution telecommunication fraud system and method based on big data and machine learning | |
CN106506769B (en) | A kind of method and system for realizing malicious call filtering using real time algorithm | |
CN106936997B (en) | A kind of rubbish voice recognition methods and system based on social networks map | |
CN104244216A (en) | Method and system for intercepting fraud phones in real time during calling | |
WO2001082564A3 (en) | Personal calling method for telephone subscriber (variants) | |
CN110072019A (en) | A kind of method and device shielding harassing call | |
CN111314359B (en) | Anti-fraud method based on SIP signaling collection | |
CN106657689A (en) | Method for preventing and controlling international fraud call and apparatus thereof | |
CN107734461A (en) | A kind of Novel telephone swindle detection and prevention method based on location determination | |
CN106453799B (en) | Manipulative communications deception recognition methods and system | |
CN107395905A (en) | Anti- the fraudulent call access system and method that a kind of signaling concatenation media redirect | |
CN110445944A (en) | Call center prevents the method and system made nuisance calls | |
CN101771757A (en) | Method for detecting and intercepting nuisance calls | |
CN106850567A (en) | A kind of method and device that doubtful harmful call treatment is realized based on preceding slotting code | |
EP2676425A1 (en) | A bypass detection system resembling human behaviour | |
KR101379779B1 (en) | Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information |
Address after: 100191 Beijing City, North Third Ring Road West, No. 27, building 25, room five, floor 5002 Applicant after: Heng Jia Jia (Beijing) Technology Co., Ltd. Address before: 100089, room 27, building five, building 25, No. 5002 West Third Ring Road, Haidian District, Beijing Applicant before: Eversec (Beijing) Technology Co., Ltd. |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |