CN111405107B - Call control method, device, equipment and storage medium - Google Patents

Call control method, device, equipment and storage medium Download PDF

Info

Publication number
CN111405107B
CN111405107B CN202010225899.2A CN202010225899A CN111405107B CN 111405107 B CN111405107 B CN 111405107B CN 202010225899 A CN202010225899 A CN 202010225899A CN 111405107 B CN111405107 B CN 111405107B
Authority
CN
China
Prior art keywords
user
value
user number
call
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010225899.2A
Other languages
Chinese (zh)
Other versions
CN111405107A (en
Inventor
崔铁虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Xiongan ICT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Xiongan ICT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Xiongan ICT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010225899.2A priority Critical patent/CN111405107B/en
Publication of CN111405107A publication Critical patent/CN111405107A/en
Application granted granted Critical
Publication of CN111405107B publication Critical patent/CN111405107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a call control method, a device, equipment and a storage medium, wherein the method comprises the following steps: receiving a call request message of calling a second user number by a first user number; acquiring a feature tag and a credit value corresponding to a first user number; determining a user affinity value corresponding to the first user number and the second user number according to call data of the first user number and the second user number in a preset time period; inputting the feature tag and the affinity value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message; and intercepting the call request message when the credit value is smaller than the risk quantized value. According to the method and the device, risk evaluation can be performed on the call request message through the dynamic risk quantification model, accurate interception of the harassing calls can be achieved based on the obtained evaluation result and the current credit value of the calling number, and the conversation experience of the user is improved.

Description

Call control method, device, equipment and storage medium
Technical Field
The present invention relates to the field of core network technologies, and in particular, to a call control method, apparatus, device, and storage medium.
Background
The harassing calls refer to the acts of promoting products or cheating and intentional harassing calls by impersonating police and bank staff, and the harassing calls bring great troubles to the daily life of users.
A traditional scheme of a telecommunication operator harassment protection platform is mainly characterized in that an operator statically generates a user label of whether the number is a harassment call or not by combining an established high-frequency harassment call model based on historical call data of the number, user complaints and the like, then a high-frequency harassment user portrait of the number is constructed according to the user label, and the number with the high-frequency harassment label is brought into the harassment call protection platform to carry out call control.
However, when the harassing calls are treated by the above scheme, call control is usually performed based on a predefined static control policy, and when a call occurs, a system defaults that a call behavior meeting the static control policy is an acceptable risk, but in fact, the risk of each call behavior cannot be accurately evaluated only by depending on the static control policy, and based on the risk that the call behavior of a calling user cannot be clearly determined, the probability of wrong interception also increases greatly, thereby seriously affecting the call experience of the user.
Disclosure of Invention
The embodiment of the invention provides a call control method, a call control device, call control equipment and a computer-readable storage medium, wherein risk evaluation can be performed on a call request message through a dynamic risk quantification model, and based on an obtained evaluation result and a current credit value of a calling number, accurate interception of a crank call can be realized, and the call experience of a user is improved.
In a first aspect, a call control method is provided, and the method includes: receiving a call request message of calling a second user number by a first user number; acquiring a feature tag and a credit value corresponding to a first user number; determining a user affinity value corresponding to the first user number and the second user number according to call data of the first user number and the second user number in a preset time period; inputting the feature tag and the affinity value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message; and intercepting the call request message when the credit value is smaller than the risk quantized value.
In some implementations of the first aspect, before inputting the feature label and the affinity value into the preset dynamic risk quantification model, the method further includes: acquiring a preset static rule, wherein the static rule comprises an operator whole network blacklist and a user-defined blacklist of a second user number; and intercepting the call request message when determining that the operator whole network blacklist and/or the user-defined blacklist contain the first user number.
In some implementations of the first aspect, intercepting the call request message when the credit value is less than the risk quantification value includes: when the credit value is smaller than the risk quantitative value, performing identity authentication on a first user corresponding to the first user number according to a preset authentication problem; and when the first user identity authentication is not passed, intercepting the call request message.
In some implementation manners of the first aspect, performing identity authentication on a first user corresponding to a first user number according to a preset authentication problem includes: the method comprises the steps of broadcasting an authentication question to a first user in a voice mode, wherein the authentication question is used for the first user to send a response message through a digital key; and when the received response message is inconsistent with the message of the preset value, the first user identity authentication is failed.
In some implementations of the first aspect, the authentication question is preset for a second user corresponding to the second user number.
In some implementations of the first aspect, the call request message is put through when the credit value is not less than the risk quantification value, and the credit value for the first user number is updated according to the risk quantification value.
In some implementations of the first aspect, updating the credit value for the first user number based on the risk quantified value includes: and updating the credit value according to the risk quantized value to obtain an updated credit value of the first user number, wherein the updated credit value is a difference value between the credit value and the risk quantized value.
In a second aspect, a call control apparatus is provided, the apparatus comprising: the receiving module is used for receiving a calling request message of calling a second user number by a first user number; the acquisition module is used for acquiring the feature tag and the credit value corresponding to the first user number; the determining module is used for determining the affinity value of the user corresponding to the first user number and the second user number according to the call data of the first user number and the second user number in a preset time period; the evaluation module is used for inputting the feature tag and the affinity value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message; and the execution module is used for intercepting the call request message when the credit value is smaller than the risk quantized value.
In some implementations of the second aspect, prior to inputting the feature tag and the affinity value into the preset dynamic risk quantification model, the execution module is further to: acquiring a preset static rule, wherein the static rule comprises an operator whole network blacklist and a user-defined blacklist of a second user number; and intercepting the call request message when determining that the operator whole network blacklist and/or the user-defined blacklist contain the first user number.
In some implementations of the second aspect, the execution module is further to: when the credit value is smaller than the risk quantitative value, performing identity authentication on a first user corresponding to the first user number according to a preset authentication problem; and when the first user identity authentication is not passed, intercepting the call request message.
In some implementations of the second aspect, the execution module is specifically configured to: the method comprises the steps of broadcasting an authentication question to a first user in a voice mode, wherein the authentication question is used for the first user to send a response message through a digital key; and when the received response message is inconsistent with the message of the preset value, the first user identity authentication is failed.
In some implementations of the second aspect, the authentication question is preset for a second user corresponding to the second user number.
In some implementations of the second aspect, the execution module is further to: and when the credit value is not less than the risk quantized value, putting through the call request message, and updating the credit value of the first user number according to the risk quantized value.
In some implementations of the second aspect, the execution module is specifically configured to: and updating the credit value according to the risk quantized value to obtain an updated credit value of the first user number, wherein the updated credit value is a difference value between the credit value and the risk quantized value.
In a third aspect, a call control device is provided, the device comprising: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the call control method of the first aspect or some realizations of the first aspect.
In a fourth aspect, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the call control method of the first aspect or some realizations of the first aspect.
The invention relates to the technical field of core networks, in particular to a call control method, a device, equipment and a storage medium.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a call control method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another call control method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a call control device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a call control device according to an embodiment of the present invention.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone.
In order to solve the problem of false interception caused by the traditional telecom operator disturbance prevention scheme during call control, the embodiment of the invention provides a call control method, a device, equipment and a computer readable storage medium.
The technical solutions of the embodiments of the present invention are described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a call control method provided in an embodiment of the present invention, as shown in fig. 1, an execution subject of the method may be a server of a telecommunications carrier, and the call control method may include the following steps:
s101, receiving a call request message of calling a second user number by a first user number.
Specifically, the first user number is a calling number corresponding to a calling user, the second user number is a called number corresponding to a called user, and when the calling user initiates a call request to the called user, the server receives a call request message containing the calling number and the called number.
S102, acquiring a feature tag and a credit value corresponding to the first user number.
Before obtaining the feature tag of the calling number, the server needs to generate at least one feature tag according to the historical communication data of the calling user and store the feature tag in a local database, and the feature tags can well embody the image of the calling user.
The historical communication data may include call target, call time, call duration, call times and call geographic location of the calling subscriber, and the feature tags may include sales promotion, fraud and real estate.
In one embodiment, credit values of users are stored in a local database in advance, the credit values adopt a quota system, each user has a highest upper limit value, and the credit values are used for evaluating conversation behaviors of the users, can be consumed rapidly along with a large number of malicious harassing calls actively initiated by the users, and can also shrink rapidly along with intensive harassing calls until the harassing calls are not made by the users, so that the function of call control adaptive adjustment is achieved.
It can be understood that the embodiment of the present invention may also establish a natural growth and recovery model of the credit value, in which the credit value gradually grows and recovers with the time lapse and the stop of the harassing call, so that the credit value of the malicious calling party is not unchanged but gradually recovers with time when the malicious calling party has not performed harassing call for a long time.
In one embodiment, the credit growth recovery process may include the steps of:
calculating the equivalent time t of the current credit value of the user according to the formula (1)i
Figure BDA0002427623910000061
Wherein S is0Is the highest upper limit of the credit value,Siis the current credit value, L, of the useriIs a tag of the characteristics of the user,
Figure BDA0002427623910000062
is an increase factor of the credit value.
After the time Δ t has elapsed, the credit value of the user's growth over time is calculated according to equation (2).
Figure BDA0002427623910000063
Wherein S is1The credit obtained after growth.
S103, determining the user affinity value corresponding to the first user number and the second user number according to the call data of the first user number and the second user number in a preset time period.
Specifically, determining the intimacy between the calling party and the called party according to the historical call data of the calling number and the called number within the preset time period may include the following steps:
step 1, based on stored historical call data of a calling number and a called number in a preset time period, obtaining the call success times, the call failure times, the call time, the call duration, the calling times and the called times between the calling number and the called number;
step 2, determining the call success rate based on the call success times and the call failure times in the specified call time, determining a call symmetry ratio based on the ratio of the call times and the called times in the specified call time, and determining the call interaction time and the average value of the intervals between the call times based on the average value of the call times;
step 3, based on the calling number and the called number respectively as the historical communication data of the calling and the called, generating a calling interaction graph between the calling number and the called number, and based on the calling interaction graph and the historical communication data, calculating a common calling index between the calling number and the called number, wherein the common calling index represents the degree of the called number and the calling number respectively as the calling and the called;
and 4, respectively adding the obtained call success rate, call symmetry ratio, call interaction duration, average call interval and common call index and the product of the corresponding preset specific gravity coefficient to obtain the intimacy between the calling user and the called user.
And S104, inputting the feature label and the affinity value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message.
The dynamic risk quantification model integrates the intimacy between the calling party and the called party and the feature label of the calling party, and when the calling party initiates a call request message to the called party, risk assessment can be performed on the release or interception of the call request message according to the dynamic risk quantification model to obtain a risk quantification value.
Specifically, the calculation process of the risk quantification value may include the following steps:
step 1, calculating the probability of calling the called user by the user set corresponding to the feature tag of the calling user.
In one embodiment, assuming that the calling number is a, the called number is B, the feature label of the calling number a is "fraud", and the set of users tagged with "fraud" as feature label is a1, then at this step the probability of a1 calling B needs to be calculated.
Specifically, the probability that all users corresponding to the feature tag call the called user is calculated according to the formula (3).
Figure BDA0002427623910000071
Wherein, x is calling number, its characteristic label is L, y is called number, gx(y, L) represents the number of times all users with L as feature tag called y, D0Represents the set of users for all calls y,
Figure BDA0002427623910000072
indicating y as the number of times the called party is calledNumber, Px(yL) represents the probability that all users with L as feature tag call y.
And 2, calculating the uncertainty of calling the called user by the user set corresponding to the feature tag of the calling user.
In one embodiment, assuming that the calling number is a, the called number is B, the feature label of the calling number a is "fraud", and the set of users tagged with "fraud" as feature label is a1, then the uncertainty (entropy) of the a1 call B needs to be calculated at this step.
And (4) calculating the uncertainty of calling the called user by the user set corresponding to the feature tag of the calling user according to the formula (4).
Figure BDA0002427623910000073
Wherein, x is calling number, its characteristic label is L, y is called number, D0Set of users, P, representing all calls yx(yL) represents the probability that all users with L as feature tag call y, Hx(L, y) represents the uncertainty of all user calls y tagged with L as a feature.
And 3, calculating the risk quantitative value of the call request message according to the intimacy between the calling user and the called user.
And calculating the risk quantitative value of the call request message according to the formula (5).
Rx(y|L)=max{Hx(L,y)-H(L,y),0}/Intimacy(x,y) (5)
Wherein, x is calling number, its characteristic label is L, y is called number, Hx(L, y) denotes the uncertainty of all subscriber calls y tagged with L as a feature, Hx(L, y) -H (L, y) denotes the uncertainty of this call request message, max { H }x(L, y) -H (L, y), 0) indicates that the molecule can not be a negative value, Intimacy (x, y) is the Intimacy between the calling subscriber and the called subscriber, R isx(y | L) is the risk assessment result, i.e. the risk quantification value, of the call request message.
In one embodiment, before the feature tag and the affinity value are input into the preset dynamic risk quantification model, whether to intercept the call request message of the calling party number may be determined according to a preset static rule, where the static rule may include an operator whole-network blacklist and a user-defined blacklist of the called party number, and when it is determined that the operator whole-network blacklist and/or the user-defined blacklist includes the calling party number, the call request message is directly intercepted.
In one embodiment, the static rules may further include a custom white list of called subscriber numbers, and the call request message is put through directly when it is determined that the custom white list includes the calling subscriber number.
And S105, intercepting the call request message when the credit value is smaller than the risk quantitative value.
Specifically, the credit value corresponding to the calling number is compared with the risk quantization value of the call request message, and when the credit value is smaller than the risk quantization value, the call request message is intercepted.
When the existing call control method is used for treating harassing calls, only a large number of harassing calls are dialed by malicious callers and a large number of users are restricted after complaints, and the numbers are faced with malicious numbers newly accessed to the network or numbers which are normally used and then called by a large number of malicious calls.
According to the credit quota-based method provided by the embodiment of the invention, when the malicious numbers newly accessed to the network are faced or the numbers which are always normal but are subjected to a large number of malicious calls are carried out next, the malicious calling party can only carry out a few times of malicious calls within a short time through a risk adaptive adjustment mechanism, and then strict call limitation is carried out, so that the malicious numbers can be effectively intercepted, and the conversation experience of a user is improved.
In one embodiment, when the credit value is less than the risk quantitative value, the caller of the call request message may be authenticated before intercepting the call request message, and when the caller authentication fails, the call request message may be intercepted.
The identity authentication process for the calling subscriber may include the steps of:
step 1, an authentication question preset by a called user is broadcasted to a calling user in a voice mode, and the authentication question is used for the calling user to send a response message through a digital key in a ringing stage;
and 2, verifying the received response message, and if the response message is inconsistent with the message of the preset value, considering the response message as a wrong answer, and failing to authenticate the identity of the calling party.
In one embodiment, when the credit value corresponding to the calling number is not less than the risk quantification value, the call request message is put through directly, and meanwhile, the credit value of the calling number is updated according to the risk quantification value, including: and (4) making a difference between the current credit value of the calling number and the risk quantized value, wherein the updated credit value is a difference value obtained by making the difference.
It can be understood that after the call request message of the calling number is put through, the credit value of the calling number may be updated in some other manners, for example, a preset value is directly reduced on the basis of the current credit value, or other credit value update rules are set according to the calling times, the call time, the call duration and other call behaviors of the calling number in a preset period, which is not described herein again for brevity.
According to the call control method, after the call request message is received, risk evaluation is carried out on the call request message through the dynamic risk quantification model, a risk quantification value of the call request message is obtained, when the current credit value of the calling number is smaller than the risk quantification value, the call request message is intercepted, the risk of calling behavior of a calling user can be determined according to the risk quantification value, the problems of missed interception and wrong interception caused by a cut-off static control strategy are solved, accurate interception of harassing calls is achieved, and the conversation experience of the user is improved.
Fig. 2 is a flowchart of another call control method according to an embodiment of the present invention, and as shown in fig. 2, the call control method may include the following steps:
s201, receiving a call request message of calling a called user number by a calling user number.
S202, acquiring a feature tag corresponding to the number of the calling user, an intimacy value between the calling user and the called user and a preset static rule.
The static rules may include an operator full-network blacklist and a user-defined blacklist of called subscriber numbers.
S203, judging whether the calling user number meets the static rule, if so, directly intercepting the calling request message of the calling user number, and if not, executing S204.
And when the operator whole network blacklist and/or the user-defined blacklist is determined to contain the calling user number, directly intercepting the call request message.
And S204, carrying out risk evaluation on the call request message through the dynamic risk quantification model to obtain a risk quantification value.
S205, obtaining the current credit value of the calling user number.
And S206, judging whether the current credit value of the calling user number is smaller than the risk quantized value, if so, executing S207, otherwise, putting through the calling request message of the calling user number.
And S207, performing identity authentication on the calling subscriber according to a preset authentication problem.
And broadcasting an authentication question preset by the called user to the calling user by voice, wherein the authentication question is used for sending a response message by the calling user through a digital key in a ringing stage.
And S208, judging whether to intercept the call request message of the number of the calling party according to the identity authentication result of the calling party.
Verifying the received response message, and when the response message is consistent with the preset message, considering the response message as a correct answer, passing the identity authentication of the calling party and passing the calling request message of the number of the calling party; and when the response message is inconsistent with the preset message, the response message is considered as an error answer, the identity authentication of the calling subscriber is not passed, and the calling request message of the calling subscriber number is intercepted.
The call control method of the embodiment of the invention adopts a risk self-adaptive mechanism combining the static control strategy and the dynamic control strategy, solves the problems of missed call interception and wrong call interception caused by the subjectively defined static control strategy, improves the call experience of the user, and simultaneously avoids the life and property loss of the user caused by the wrong call interception.
Fig. 3 is a schematic structural diagram of a call control device according to an embodiment of the present invention, and as shown in fig. 3, the call control device 300 may include: a receiving module 310, an obtaining module 320, a determining module 330, an evaluating module 340, and an executing module 350.
The receiving module 310 is configured to receive a call request message that a first user number calls a second user number; an obtaining module 320, configured to obtain a feature tag and a credit value corresponding to a first user number; the determining module 330 is configured to determine, according to call data of the first user number and the second user number within a preset time period, a user affinity value corresponding to the first user number and the second user number; the evaluation module 340 is configured to input the feature tag and the affinity value into a preset dynamic risk quantization model to obtain a risk quantization value of the call request message; and an executing module 350, configured to intercept the call request message when the credit value is less than the risk quantification value.
In some embodiments, the execution module 350 is further configured to: acquiring a preset static rule, wherein the static rule comprises an operator whole network blacklist and a user-defined blacklist of a second user number; and intercepting the call request message when determining that the operator whole network blacklist and/or the user-defined blacklist contain the first user number.
In some embodiments, the execution module 350 is further configured to: when the credit value is smaller than the risk quantitative value, performing identity authentication on a first user corresponding to the first user number according to a preset authentication problem; and when the first user identity authentication is not passed, intercepting the call request message.
In some embodiments, the execution module 350 is specifically configured to: the method comprises the steps of broadcasting an authentication question to a first user in a voice mode, wherein the authentication question is used for the first user to send a response message through a digital key; and when the received response message is inconsistent with the message of the preset value, the first user identity authentication is failed.
In some embodiments, the authentication question is preset for the second user corresponding to the second user number.
In some embodiments, the execution module 350 is further configured to: and when the credit value is not less than the risk quantized value, putting through the call request message, and updating the credit value of the first user number according to the risk quantized value.
In some embodiments, the execution module 350 is specifically configured to: and updating the credit value according to the risk quantized value to obtain an updated credit value of the first user number, wherein the updated credit value is a difference value between the credit value and the risk quantized value.
According to the call control device, after the call request message is received, risk evaluation is carried out on the call request message through the dynamic risk quantification model, a risk quantification value of the call request message is obtained, when the current credit value of the calling number is smaller than the risk quantification value, the call request message is intercepted, the risk of calling behavior of a calling user can be determined according to the risk quantification value, the problems of missed interception and wrong interception caused by a cut-off static control strategy are solved, accurate interception of harassing calls is achieved, and the conversation experience of the user is improved.
Fig. 4 is a schematic diagram of a hardware structure of a call control device according to an embodiment of the present invention.
As shown in fig. 4, the call control device 400 in the present embodiment includes an input device 401, an input interface 402, a central processor 403, a memory 404, an output interface 405, and an output device 406. The input interface 402, the central processing unit 403, the memory 404, and the output interface 405 are connected to each other through a bus 410, and the input device 401 and the output device 406 are connected to the bus 410 through the input interface 402 and the output interface 405, respectively, and further connected to other components of the information acquisition device 400.
Specifically, the input device 401 receives input information from the outside and transmits the input information to the central processor 403 through the input interface 402; the central processor 403 processes the input information based on computer-executable instructions stored in the memory 404 to generate output information, stores the output information temporarily or permanently in the memory 404, and then transmits the output information to the output device 406 through the output interface 405; the output device 406 outputs the output information to the outside of the information acquisition device 300 for use by the user.
In one embodiment, the call control device 400 shown in fig. 4 comprises: a memory 404 for storing programs; the processor 403 is configured to execute the program stored in the memory to perform the method of the embodiment shown in fig. 1 or fig. 2 according to the embodiment of the present invention.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium has computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement the method of the embodiment of fig. 1 or fig. 2 provided by the embodiments of the present invention.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic Circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuits, semiconductor Memory devices, Read-Only memories (ROMs), flash memories, erasable ROMs (eroms), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
As described above, only the specific embodiments of the present invention are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present invention, and these modifications or substitutions should be covered within the scope of the present invention.

Claims (10)

1. A method for call control, the method comprising:
receiving a call request message of calling a second user number by a first user number;
acquiring a feature tag and a credit value corresponding to the first user number, wherein the credit value is determined according to call behaviors in a preset time period, and the call behaviors in the preset time period comprise the number of times of harassing calls of the first user number in the preset time period;
determining a user affinity value corresponding to the first user number and the second user number according to call data of the first user number and the second user number in a preset time period;
inputting the feature tag and the intimacy value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message;
intercepting the call request message when the credit value is less than the risk quantification value.
2. The method of claim 1, wherein prior to said inputting said signature and said affinity value into a preset dynamic risk quantification model, said method further comprises:
acquiring a preset static rule, wherein the static rule comprises an operator whole network blacklist and a user-defined blacklist of the second user number;
and intercepting the call request message when the operator whole network blacklist and/or the user-defined blacklist contains the first user number.
3. The method of claim 1, wherein intercepting the call request message when the credit value is less than the risk quantification value comprises:
when the credit value is smaller than the risk quantitative value, performing identity authentication on a first user corresponding to the first user number according to a preset authentication problem;
and when the first user identity authentication is not passed, intercepting the call request message.
4. The method according to claim 3, wherein the performing identity authentication on the first user corresponding to the first user number according to a preset authentication problem comprises:
the authentication question is broadcasted to the first user in a voice mode, and the authentication question is used for the first user to send a response message through a number key;
and when the received response message is inconsistent with the message of the preset value, the first user identity authentication is not passed.
5. The method according to claim 3 or 4, wherein the authentication problem is preset for the second user corresponding to the second user number.
6. The method of claim 1, further comprising:
and when the credit value is not less than the risk quantized value, putting through the call request message, and updating the credit value of the first user number according to the risk quantized value.
7. The method of claim 6, wherein updating the credit value for the first user number based on the risk quantification value comprises:
and updating the credit value according to the risk quantitative value to obtain an updated credit value of the first user number, wherein the updated credit value is a difference value between the credit value and the risk quantitative value.
8. A call control apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving a calling request message of calling a second user number by a first user number;
the acquisition module is used for acquiring a feature tag and a credit value corresponding to the first user number, wherein the credit value is determined according to call behaviors in a preset time period, and the call behaviors in the preset time period comprise the times of harassing calls of the first user number in the preset time period;
the determining module is used for determining the affinity value of the user corresponding to the first user number and the second user number according to the call data of the first user number and the second user number in a preset time period;
the evaluation module is used for inputting the feature tag and the intimacy value into a preset dynamic risk quantification model to obtain a risk quantification value of the call request message;
and the execution module is used for intercepting the call request message when the credit value is smaller than the risk quantitative value.
9. A call control apparatus, characterized in that the apparatus comprises:
a processor and a memory storing computer program instructions;
the processor, when executing the computer instructions, implements the call control method of any one of claims 1-7.
10. A computer-readable storage medium having computer program instructions stored thereon which, when executed by a processor, implement the call control method of any one of claims 1-7.
CN202010225899.2A 2020-03-26 2020-03-26 Call control method, device, equipment and storage medium Active CN111405107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010225899.2A CN111405107B (en) 2020-03-26 2020-03-26 Call control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010225899.2A CN111405107B (en) 2020-03-26 2020-03-26 Call control method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111405107A CN111405107A (en) 2020-07-10
CN111405107B true CN111405107B (en) 2021-08-06

Family

ID=71433114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010225899.2A Active CN111405107B (en) 2020-03-26 2020-03-26 Call control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111405107B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511697A (en) * 2020-11-13 2021-03-16 中移雄安信息通信科技有限公司 Voice call control method, device, medium and voice call controller

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557441A (en) * 2009-05-12 2009-10-14 成都市华为赛门铁克科技有限公司 Method and device for call filtering
CN104023109A (en) * 2014-06-27 2014-09-03 深圳市中兴移动通信有限公司 Incoming call prompt method and device as well as incoming call classifying method and device
CN105162931A (en) * 2015-07-30 2015-12-16 小米科技有限责任公司 Method and device for classifying communication numbers
CN107295146A (en) * 2016-04-01 2017-10-24 中国移动通信集团设计院有限公司 A kind of call processing method and device
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140349623A1 (en) * 2013-05-27 2014-11-27 Tencent Technology (Shenzhen) Company Limited Method and apparatus for alerting harassing phone numbers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557441A (en) * 2009-05-12 2009-10-14 成都市华为赛门铁克科技有限公司 Method and device for call filtering
CN104023109A (en) * 2014-06-27 2014-09-03 深圳市中兴移动通信有限公司 Incoming call prompt method and device as well as incoming call classifying method and device
CN105162931A (en) * 2015-07-30 2015-12-16 小米科技有限责任公司 Method and device for classifying communication numbers
CN107295146A (en) * 2016-04-01 2017-10-24 中国移动通信集团设计院有限公司 A kind of call processing method and device
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device

Also Published As

Publication number Publication date
CN111405107A (en) 2020-07-10

Similar Documents

Publication Publication Date Title
US11063972B2 (en) Method and system for preventing illicit use of a telephony platform
US10659602B1 (en) Using calling party number for caller authentication
AU2018294658A1 (en) Fraud detection system for incoming calls
US11956382B2 (en) Validating telephone calls by verifying entity identities using blockchains
US11706336B2 (en) Managing spoofed calls to mobile devices
CN102572059A (en) Method and system for incoming call processing
CN104219672A (en) Incoming call or message identification method and device
CN108810290B (en) Method and system for recognizing fraud calls
CN111567012A (en) Decentralized automated phone fraud risk management
CN111405107B (en) Call control method, device, equipment and storage medium
CN105704337A (en) Number-marking method and system
KR101306074B1 (en) Method and system to prevent phishing
US8600022B2 (en) System and method for providing an anti-marketing feature in a network
CN112511697A (en) Voice call control method, device, medium and voice call controller
US11909912B2 (en) Methods and apparatus for call traffic anomaly mitigation
US20230120358A1 (en) Passively qualifying contacts
CN111246019B (en) Network telephone number identification method, device, equipment and medium
CN111818216B (en) Incoming call processing method and device
US20230179696A1 (en) Method for managing an unallocated telephone number in a communication network, method for processing a request for allocating a telephone number, corresponding devices, item of communication equipment, system and computer programs
EP3633964A1 (en) Method for assisting a callee with a reputation score of a caller
CN113194206A (en) Marking method and marking device
CN115733924A (en) Call center telephone interception data recognition system
TWM610432U (en) Digital communication system
CN116017452A (en) Block chain-based number privacy protection method, system, equipment and medium
CN114860792A (en) Telephone fraud early warning method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant