CN101132438A - Method for screen selecting and catching vicious disturbing calls - Google Patents

Method for screen selecting and catching vicious disturbing calls Download PDF

Info

Publication number
CN101132438A
CN101132438A CNA2007100206593A CN200710020659A CN101132438A CN 101132438 A CN101132438 A CN 101132438A CN A2007100206593 A CNA2007100206593 A CN A2007100206593A CN 200710020659 A CN200710020659 A CN 200710020659A CN 101132438 A CN101132438 A CN 101132438A
Authority
CN
China
Prior art keywords
call
interception
vicious
malicious call
hold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100206593A
Other languages
Chinese (zh)
Other versions
CN100579150C (en
Inventor
王建
吴维宏
王鹰
于明
钱康
方宁
胡晓菲
王玉申
张昱
钱辉兵
唐声波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Group Jiangsu Co Ltd
Priority to CN200710020659A priority Critical patent/CN100579150C/en
Publication of CN101132438A publication Critical patent/CN101132438A/en
Application granted granted Critical
Publication of CN100579150C publication Critical patent/CN100579150C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

This invention provides a method for selecting and holding up vicious annoying phones including the following steps: 1, getting short message call system log, 2, carrying out association analysis to call number generated by a short message call platform and the vicious phone character model to get a suspicious number, 3, showing the number to service personnel for further analysis, 4, the service determines if the number is vicious, if not, the related registration is canceled and the flow is stopped, if so, it enters into step 5 realizing automatic holding up according to the attribute of the vicious phone number.

Description

Vicious disturbance call screening and hold-up interception method
Technical field
The present invention relates to the information spy management domain. Especially a kind of suitable telecommunications industry communications field information monitoring and management are to the system of the detection of vicious disturbance call number and information security interception.
Background technology
Present call block system, mainly by being set, tackles by special equipment the shortcoming of this technology for particular number:
One, can only indivedual particular numbers be set by the user, can not intelligence be judged and interception by universal number.
Two, promptness is poor, can not set up the malicious call characteristic model, can't in time screen and tackle.
Three, adopt special equipment to be connected on the telecommunication line, can't satisfy the large call volume phone judgement of carrier class and interception and have network security risk.
Adopt this system telecom operators can't in proper communication, differentiate malicious call, cause being difficult to shield such phone.
Summary of the invention
In order to summarize purpose of the present invention, some aspect of the present invention, advantage and novel feature have been described here. Should be appreciated that, need not all these aspects, advantage and feature and be included among arbitrary special embodiment.
The problem and shortage part and the demand that exist for solving existing intercepting system, the present invention utilizes the existing network data to set up malicious call behavioural characteristic model, and sets up the system of detection and the information security interception of the vicious disturbance call number that screens and tackle according to this model Auto-matching from the magnanimity traffic. Its technical scheme is:
A kind of vicious disturbance call screening and hold-up interception method may further comprise the steps:
Step 1, get the daily record of note paging system;
Step 2, the call number that short message calling platform is generated and malicious call characteristic model carry out association analysis and draw suspicious number;
Step 3, suspicious number represent to the contact staff further to be analyzed;
Step 4, customer service are confirmed whether it is the malicious call number, if not the malicious call user then deletes relative recording, flow process finishes; If the malicious call user then enters next step;
Step 5, realization system tackle automatically.
Above-mentioned vicious disturbance call screening and hold-up interception method, it is further characterized in that described malicious call characteristic model is:
A, phone are dialed the frequency high every day of the number of calls greater than the number of times of default;
B, called number feature are obviously called to be consecutive number, and the called number section is greater than the regulation section;
C, possess many days continuous calling records;
If having special number to meet above feature employing, D can set up " professional white list " mode to evade.
Above-mentioned vicious disturbance call screening and hold-up interception method, it further is characterised in that, the mode that described customer service is confirmed can be to adopt oppositely to dial mode to be confirmed whether the being malicious call number, if malicious call number, then according to malicious call number attribute: divide into number in the Intranet of area under one's jurisdiction, number and the number that interconnects are set up interception mode in the net of outer area under one's jurisdiction.
Number in the Intranet of area under one's jurisdiction: carry out the call out function restriction at BOSS;
Number in the net of outer area under one's jurisdiction: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL to Originating Office;
Number interconnects: according to just far going out the net principle, in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
Beneficial effect of the present invention:
Malicious call screening of the present invention and intercepting system have following advantage:
(1), set up the malicious call call model, be convenient to that related system is differentiated and action.
(2), promptness is strong, system can implement in time to screen malicious call and interception according to the malicious call model.
(3), convenient degree is high, the automatic recognition mechanism of employing system greatly reduces artificial input service amount.
(4), cost of investment is low, utilizes conventional network equipment to build intercepting system, do not need to increase the serial connection third party device in network.
Description of drawings
Fig. 1 is that the user calls the number of times statistical chart among the present invention;
Fig. 2 is malicious call screening and intercepting system Organization Chart in the embodiment of the invention;
Fig. 3 is malicious call screening and intercepting system network in the embodiment of the invention;
Fig. 4 is malicious call screening and interception flow chart in the embodiment of the invention.
The specific embodiment
Below in conjunction with drawings and Examples the present invention is further described.
The information recording/that the present invention includes telecommunications switch and note paging system is set up the malicious call characteristic model, and intercepting system carries out the screening of malice characteristic matching and interception to magnanimity access phone. Vicious disturbance call detects and the intercepting system detection accuracy is strong and comprehensively, the investment totle drilling cost is low.
The technical solution used in the present invention is:
(1), sets up the malicious call characteristic model
By the malicious call analysis being found illegal user adopts the proper communication means that the mobile subscriber is carried out malice harassing and wrecking, certain number section user is dialed on a large scale but disconnect, employing call forwarding mode forwards the message platform to or telegraphone is swindled during client's clawback by the time; Therefore malicious call is most for not taking on the telephone, and can't adopt the ticket screening;
Because the whole province's note exhales number of users to account for 50% of the whole network calling user number in the note paging system, is about about 1,200 ten thousand. Every day, short message calling platform generated record, utilized the internal association of these a large amount of secondary user call records and call number to analyze, and accurately found the malice number.
Short message calling platform has recorded the call log during called subscriber's shutdown, this daily record detail record the information such as calling number, called number, call time. As shown in Figure 1, for the user calls the number of times statistical chart, from this statistical chart can analyze 99.99% normal users daily the amount of dialing but in call record, also exist same calling subscribe's 200-1000 time high frequency time to call out less than 200 times, to its further analysis:
Average connecting time 8s can calculate according to network, and one day normal users maximum is dialed number of times and is:
24 * 3600/8=10800 time;
At present the whole province's note exhales the user to account for the whole network user 50%, and average daily shutdown is than being 10%, maximum fall into note z z z cry and be recorded as: 10800*50%*10%=540 time
1, therefore average daily surpass this call volume because suspicious malicious call.
2, malicious call is the importing section and automatically dials, so called number is characterized as jack per line section contact number.
For this reason, inventor design draws the malicious call characteristic model and is:
A, phone are dialed the frequency high every day of the number of calls, are defined as:>540 times/days
B, called number feature are obviously called to be consecutive number, and be defined as: the called number section is greater than 2 numbers sections; (different called number yardages/total call volume>80% jack per line segment number code>100);
C, possess many days continuous calling records, be defined as: continuous action>=2 day.
If having special number to meet above feature employing, D can set up " professional white list " mode to evade.
(2), set up automatic screening and intercepting system
As shown in Figure 2, be automatic screening in the embodiment of the invention and intercepting system Organization Chart.
Utilize the note paging system to the example that malicious call screened and judged in December, 2006, China Mobile Group Jiangsu Co., Ltd has set up malicious call automatic screening and intercepting system network, as shown in Figure 3.
System to December call log screen and count the Subscriber Number that satisfies corresponding conditions and automatic output malicious call number (table one):
The clawback test Number section ownership Time Calling number Dial number of times The called number section
The secretary of UNICOM platform Number in the net of other provinces   2006-12-9   13072940383   3024   15999632
Notarial office notifies you Number in the net of other provinces   2006-12-23   13074906401   3916   1599635/1599636
Notarial office congratulates you Number in the net of other provinces   2006-12-23   13074906491   2165   1599648
Hong Kong Wan Jia group Number in the net of other provinces   2006-12-13   13074974458   1515   1596163
The incoming call restriction Number in the net of other provinces   2006-12-23   13317628442   1293   1340586/1340587
Spacing Number in the net of other provinces   2006-12-23   13421968575   1815   1340148/1340149
Prize drawing Number in the net of other provinces   2006-12-26   13426052445   1523   1391290
Hong Kong prize drawing Number in the net of other provinces   2006-12-21   13426497621   2575   159955
Hong Kong Ford Number in the net of other provinces   2006-12-23   13481009257   1027   1345181/1345182
Shutdown Number in the net of other provinces   2006-12-13   13639631756   1330   1596163
Spacing Number in the net of other provinces   2006-12-25   13699204281   1150   1377651/1377652
Shut down Number in the net of other provinces   2006-12-7   13699285473   1808   1599551,1599552
Hong Kong Wanda group Number in the net of other provinces   2006-12-25   13713462706   1234   1345190
Music Number in the net of other provinces   2006-12-24   13788687341   1016   1381309
Nothing Number in the net of other provinces   2006-12-18   13790410619   1273   1377524
The judicial notarial office in Shenzhen notice. Advertisement Number in the net of other provinces   2006-12-14   13790751537   1033   1396123/1396124
The judicial notarial office in Shenzhen. Advertisement Number in the net of other provinces   2006-12-5   13810445331   1348   1377524,1377525
Celebrate Samsung. Advertisement Number in the net of other provinces   2006-12-23   15901243743   976   1345185
Korea S Samsung Group. Advertisement Number in the net of other provinces   2006-12-27   15994118574   4437   1599634
Then these suspicious numbers are represented to relevant departments' (customer service affirmation) by forms such as the WEB pages and further analyze and confirm. Relevant departments can confirm whether malicious call number of these suspicious numbers by oppositely dialing the forms such as analysis. System automatically distributes to take appropriate measures and implements interception after being confirmed to be the malicious call user. It is 100% that table one is oppositely dialed the proof accuracy rate.
Fig. 4 is malicious call screening and the interception flow chart of the embodiment of the invention, and according to malicious call number attribute: divide into number in province's Intranet, number and the number that interconnects are set up interception mode in the net of other provinces.
● economize number in the Intranet: number carries out the call out function restriction at BOSS in the Intranet to economizing; Send notifying messages to the user: " your phone is dialed unusually, and in order to protect your rights and interests, called restriction is asked the portable machine owner identification to demonstrate,prove local China Mobile Service Hall and lifted restrictions. "
● number in the net of other provinces: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL (user is busy) to Originating Office.
● number interconnects: in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
For other provinces mobile subscriber and the number that interconnects the releasing commit time is set, removes commit time point and put rear 1 month for commit time, commit time automatically distributes to rear system and removes interception worker list. Finish the interception of above-mentioned malice number.
Effect: by checking that such number no longer sends malicious call, reaches interception result, has improved CSAT January.
Although the present invention with preferred embodiment openly as above; but they are not to limit the present invention; anyly have the knack of this skill person; without departing from the spirit and scope of the invention; from when can making various changes or retouch, so being as the criterion of should being defined with the application's claim protection domain of protection scope of the present invention.

Claims (7)

1. a vicious disturbance call screens and hold-up interception method, may further comprise the steps:
Step 1, get the daily record of note paging system;
Step 2, the call number that short message calling platform is generated and malicious call characteristic model carry out association analysis and draw suspicious number;
Step 3, suspicious number represent to the contact staff further to be analyzed;
Step 4, customer service are confirmed whether it is the malicious call number, if not the malicious call user then deletes relative recording, flow process finishes; If the malicious call user then enters next step;
Step 5, realization system tackle automatically.
2. vicious disturbance call according to claim 1 screening and hold-up interception method is characterized in that described malicious call characteristic model is: phone is dialed frequency height, and every day, the number of calls was greater than the number of times of default.
3. vicious disturbance call according to claim 1 screens and hold-up interception method, it is characterized in that described malicious call characteristic model is: the called number feature is obviously called to be consecutive number, and the called number section is greater than the regulation section.
4. vicious disturbance call screening according to claim 1 and hold-up interception method is characterized in that described malicious call characteristic model is: possess many days continuous calling records.
5. according to claim 1 to one of 4 described vicious disturbance call screening and hold-up interception methods, it is characterized in that described malicious call characteristic model at first will be got rid of special number or the VIP user in the professional white list.
6. vicious disturbance call screening according to claim 1 and hold-up interception method is characterized in that the mode that described customer service is confirmed can be to adopt oppositely to dial mode to be confirmed whether the being malicious call number.
7. vicious disturbance call according to claim 1 screens and hold-up interception method, it is characterized in that, described system automatically interception is according to malicious call number attribute: divide into number in the Intranet of area under one's jurisdiction, number and the number that interconnects are set up interception mode in the net of outer area under one's jurisdiction
Number in the Intranet of area under one's jurisdiction: carry out the call out function restriction at BOSS;
Number in the net of outer area under one's jurisdiction: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL to Originating Office;
Number interconnects: according to just far going out the net principle, in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
CN200710020659A 2007-03-20 2007-03-20 Method for screen selecting and catching vicious disturbing calls Active CN100579150C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710020659A CN100579150C (en) 2007-03-20 2007-03-20 Method for screen selecting and catching vicious disturbing calls

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710020659A CN100579150C (en) 2007-03-20 2007-03-20 Method for screen selecting and catching vicious disturbing calls

Publications (2)

Publication Number Publication Date
CN101132438A true CN101132438A (en) 2008-02-27
CN100579150C CN100579150C (en) 2010-01-06

Family

ID=39129557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710020659A Active CN100579150C (en) 2007-03-20 2007-03-20 Method for screen selecting and catching vicious disturbing calls

Country Status (1)

Country Link
CN (1) CN100579150C (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196099A (en) * 2010-03-10 2011-09-21 成都市华为赛门铁克科技有限公司 Voice call detection method and device
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN101316427B (en) * 2008-04-11 2012-07-18 浙江大学 Method and system for recognizing delivery user of rubbish message through call community network
CN102711188A (en) * 2012-05-21 2012-10-03 中兴通讯股份有限公司 Method and device for processing user resources
CN102752406A (en) * 2012-07-30 2012-10-24 北京中科金财电子商务有限公司 Risk number abnormality recognition system and method
CN102892117A (en) * 2012-09-11 2013-01-23 北京中创信测科技股份有限公司 Method and system for monitoring crank call
CN103095889A (en) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN103167502A (en) * 2013-02-20 2013-06-19 广西英伦通信技术有限公司 Method of punishing illegal calling based on over-the-air (OTA) technology
CN103294948A (en) * 2012-02-27 2013-09-11 百度在线网络技术(北京)有限公司 Software malicious behavior modeling and judging method and device, and mobile terminal
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN103906067A (en) * 2012-12-28 2014-07-02 中国移动通信集团设计院有限公司 Method and device for identifying false calling number
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104702800A (en) * 2013-12-04 2015-06-10 中国移动通信集团公司 Harassing number identifying method, device and system
CN104735272A (en) * 2013-12-24 2015-06-24 中国移动通信集团贵州有限公司 Crank call interception method and system
CN106254691A (en) * 2016-09-29 2016-12-21 中国联合网络通信集团有限公司 A kind of recognition methods swindling number and identification device
CN106357912A (en) * 2016-09-28 2017-01-25 北京奇虎科技有限公司 Incoming/outgoing call processing method and incoming/outgoing call processing device
CN106550155A (en) * 2016-11-25 2017-03-29 上海欣方智能系统有限公司 Suspicious number is carried out swindling the method and system that sample screens classification and interception
CN106658512A (en) * 2016-12-23 2017-05-10 广西英伦信息技术股份有限公司 Method for rapidly locating malicious call number from bill statistics
CN106657535A (en) * 2016-09-28 2017-05-10 北京奇虎科技有限公司 Incoming and outgoing call processing method and device
CN106657689A (en) * 2015-11-04 2017-05-10 中国移动通信集团公司 Method for preventing and controlling international fraud call and apparatus thereof
CN107483700A (en) * 2016-06-07 2017-12-15 宇龙计算机通信科技(深圳)有限公司 A kind of recognition methods of bad number and device
CN113037699A (en) * 2019-12-25 2021-06-25 中国电信股份有限公司 Communication interception method, apparatus and computer readable storage medium

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316427B (en) * 2008-04-11 2012-07-18 浙江大学 Method and system for recognizing delivery user of rubbish message through call community network
CN102196099B (en) * 2010-03-10 2014-02-19 成都市华为赛门铁克科技有限公司 Voice call detection method and device
CN102196099A (en) * 2010-03-10 2011-09-21 成都市华为赛门铁克科技有限公司 Voice call detection method and device
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN102223431B (en) * 2011-06-27 2017-03-29 杨子江 A kind of method and system for preventing harassing call
CN103294948B (en) * 2012-02-27 2017-02-08 百度在线网络技术(北京)有限公司 Software malicious behavior modeling and judging method and device, and mobile terminal
CN103294948A (en) * 2012-02-27 2013-09-11 百度在线网络技术(北京)有限公司 Software malicious behavior modeling and judging method and device, and mobile terminal
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103368904B (en) * 2012-03-27 2016-12-28 百度在线网络技术(北京)有限公司 The detection of mobile terminal, questionable conduct and decision-making system and method
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN102711188B (en) * 2012-05-21 2018-06-15 中兴通讯股份有限公司 User resources processing method and processing device
CN102711188A (en) * 2012-05-21 2012-10-03 中兴通讯股份有限公司 Method and device for processing user resources
CN102752406A (en) * 2012-07-30 2012-10-24 北京中科金财电子商务有限公司 Risk number abnormality recognition system and method
CN102892117A (en) * 2012-09-11 2013-01-23 北京中创信测科技股份有限公司 Method and system for monitoring crank call
CN103906067A (en) * 2012-12-28 2014-07-02 中国移动通信集团设计院有限公司 Method and device for identifying false calling number
CN103906067B (en) * 2012-12-28 2018-05-18 中国移动通信集团设计院有限公司 The recognition methods of false calling number and device
CN103095889A (en) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN103095889B (en) * 2013-01-07 2015-06-03 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN103167502A (en) * 2013-02-20 2013-06-19 广西英伦通信技术有限公司 Method of punishing illegal calling based on over-the-air (OTA) technology
CN103167502B (en) * 2013-02-20 2015-09-02 广西英伦信息技术股份有限公司 Based on the method for the illegal calling of OTA technology regulation
CN104702800A (en) * 2013-12-04 2015-06-10 中国移动通信集团公司 Harassing number identifying method, device and system
CN104702800B (en) * 2013-12-04 2017-11-03 中国移动通信集团公司 A kind of recognition methods for harassing number, device and system
CN104735272A (en) * 2013-12-24 2015-06-24 中国移动通信集团贵州有限公司 Crank call interception method and system
CN104735272B (en) * 2013-12-24 2018-03-23 中国移动通信集团贵州有限公司 The hold-up interception method and system of a kind of harassing call
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104243727B (en) * 2014-10-15 2017-01-25 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN106657689A (en) * 2015-11-04 2017-05-10 中国移动通信集团公司 Method for preventing and controlling international fraud call and apparatus thereof
CN107483700A (en) * 2016-06-07 2017-12-15 宇龙计算机通信科技(深圳)有限公司 A kind of recognition methods of bad number and device
CN106657535A (en) * 2016-09-28 2017-05-10 北京奇虎科技有限公司 Incoming and outgoing call processing method and device
CN106357912A (en) * 2016-09-28 2017-01-25 北京奇虎科技有限公司 Incoming/outgoing call processing method and incoming/outgoing call processing device
CN106357912B (en) * 2016-09-28 2020-02-28 北京奇虎科技有限公司 Incoming call and outgoing call processing method and device
CN106657535B (en) * 2016-09-28 2020-03-24 北京奇虎科技有限公司 Incoming call and outgoing call processing method and device
CN106254691A (en) * 2016-09-29 2016-12-21 中国联合网络通信集团有限公司 A kind of recognition methods swindling number and identification device
CN106254691B (en) * 2016-09-29 2019-02-15 中国联合网络通信集团有限公司 It is a kind of cheat number recognition methods and identification device
CN106550155A (en) * 2016-11-25 2017-03-29 上海欣方智能系统有限公司 Suspicious number is carried out swindling the method and system that sample screens classification and interception
CN106550155B (en) * 2016-11-25 2019-05-17 上海欣方智能系统有限公司 Swindle sample is carried out to suspicious number and screens the method and system sorted out and intercepted
CN106658512A (en) * 2016-12-23 2017-05-10 广西英伦信息技术股份有限公司 Method for rapidly locating malicious call number from bill statistics
CN113037699A (en) * 2019-12-25 2021-06-25 中国电信股份有限公司 Communication interception method, apparatus and computer readable storage medium
CN113037699B (en) * 2019-12-25 2022-11-29 中国电信股份有限公司 Communication interception method, device and computer readable storage medium

Also Published As

Publication number Publication date
CN100579150C (en) 2010-01-06

Similar Documents

Publication Publication Date Title
CN100579150C (en) Method for screen selecting and catching vicious disturbing calls
CN104244216B (en) The method and system of real-time blocking fraudulent call in a kind of communication process
CN101350957B (en) Method and equipment for shielding rubbish short message
WO2016197675A1 (en) Method and apparatus for identifying crank call
CN107770777B (en) Method for identifying recorded fraud calls
CN106331390B (en) A kind of method and system identifying swindle number based on communicating data
CN101472007A (en) Method and system for determining disturbance telephone
CN101217820A (en) An identification system and identification method on disturbance telephone numbers
CN102572904B (en) System and method for implementing automatic dial test business
CN102075639A (en) Method and device for intercepting malicious call in international service communication network
CN105611084A (en) User fraud suspiciousness degree calculation method and suspiciousness degree calculation system
CN104104772A (en) Fraudulent phone call prompting method, service and system
CN107231494A (en) A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment
CN102438243A (en) Method for identifying harassing phone call by analyzing frequency of phone call
CN101262520A (en) A terminal with suspicious call filtration function and its filtration method
CN108198086B (en) Method and device for identifying disturbance source according to communication behavior characteristics
CN101771757A (en) Method for detecting and intercepting nuisance calls
CN103167502B (en) Based on the method for the illegal calling of OTA technology regulation
CN101409746B (en) Method and system for detecting telephone signal tone facing to call centre
CN102256255A (en) Detection method for parallel-used-card proof based on time and geographic location collisions
CN101600026A (en) A kind of in communication network the method for monitoring harassing calls
CN101001280B (en) Universal accounting card service and system thereof
CN1349339A (en) Method of filtering phone call and avoiding harassing call
CN104581729A (en) Junk information processing method and device
CN104301549B (en) Defaulting downtime missed call prompting system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant