CN101132438A - Method for screen selecting and catching vicious disturbing calls - Google Patents
Method for screen selecting and catching vicious disturbing calls Download PDFInfo
- Publication number
- CN101132438A CN101132438A CNA2007100206593A CN200710020659A CN101132438A CN 101132438 A CN101132438 A CN 101132438A CN A2007100206593 A CNA2007100206593 A CN A2007100206593A CN 200710020659 A CN200710020659 A CN 200710020659A CN 101132438 A CN101132438 A CN 101132438A
- Authority
- CN
- China
- Prior art keywords
- call
- interception
- vicious
- malicious call
- hold
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
This invention provides a method for selecting and holding up vicious annoying phones including the following steps: 1, getting short message call system log, 2, carrying out association analysis to call number generated by a short message call platform and the vicious phone character model to get a suspicious number, 3, showing the number to service personnel for further analysis, 4, the service determines if the number is vicious, if not, the related registration is canceled and the flow is stopped, if so, it enters into step 5 realizing automatic holding up according to the attribute of the vicious phone number.
Description
Technical field
The present invention relates to the information spy management domain. Especially a kind of suitable telecommunications industry communications field information monitoring and management are to the system of the detection of vicious disturbance call number and information security interception.
Background technology
Present call block system, mainly by being set, tackles by special equipment the shortcoming of this technology for particular number:
One, can only indivedual particular numbers be set by the user, can not intelligence be judged and interception by universal number.
Two, promptness is poor, can not set up the malicious call characteristic model, can't in time screen and tackle.
Three, adopt special equipment to be connected on the telecommunication line, can't satisfy the large call volume phone judgement of carrier class and interception and have network security risk.
Adopt this system telecom operators can't in proper communication, differentiate malicious call, cause being difficult to shield such phone.
Summary of the invention
In order to summarize purpose of the present invention, some aspect of the present invention, advantage and novel feature have been described here. Should be appreciated that, need not all these aspects, advantage and feature and be included among arbitrary special embodiment.
The problem and shortage part and the demand that exist for solving existing intercepting system, the present invention utilizes the existing network data to set up malicious call behavioural characteristic model, and sets up the system of detection and the information security interception of the vicious disturbance call number that screens and tackle according to this model Auto-matching from the magnanimity traffic. Its technical scheme is:
A kind of vicious disturbance call screening and hold-up interception method may further comprise the steps:
Step 1, get the daily record of note paging system;
Step 2, the call number that short message calling platform is generated and malicious call characteristic model carry out association analysis and draw suspicious number;
Step 4, customer service are confirmed whether it is the malicious call number, if not the malicious call user then deletes relative recording, flow process finishes; If the malicious call user then enters next step;
Step 5, realization system tackle automatically.
Above-mentioned vicious disturbance call screening and hold-up interception method, it is further characterized in that described malicious call characteristic model is:
A, phone are dialed the frequency high every day of the number of calls greater than the number of times of default;
B, called number feature are obviously called to be consecutive number, and the called number section is greater than the regulation section;
C, possess many days continuous calling records;
If having special number to meet above feature employing, D can set up " professional white list " mode to evade.
Above-mentioned vicious disturbance call screening and hold-up interception method, it further is characterised in that, the mode that described customer service is confirmed can be to adopt oppositely to dial mode to be confirmed whether the being malicious call number, if malicious call number, then according to malicious call number attribute: divide into number in the Intranet of area under one's jurisdiction, number and the number that interconnects are set up interception mode in the net of outer area under one's jurisdiction.
Number in the Intranet of area under one's jurisdiction: carry out the call out function restriction at BOSS;
Number in the net of outer area under one's jurisdiction: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL to Originating Office;
Number interconnects: according to just far going out the net principle, in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
Beneficial effect of the present invention:
Malicious call screening of the present invention and intercepting system have following advantage:
(1), set up the malicious call call model, be convenient to that related system is differentiated and action.
(2), promptness is strong, system can implement in time to screen malicious call and interception according to the malicious call model.
(3), convenient degree is high, the automatic recognition mechanism of employing system greatly reduces artificial input service amount.
(4), cost of investment is low, utilizes conventional network equipment to build intercepting system, do not need to increase the serial connection third party device in network.
Description of drawings
Fig. 1 is that the user calls the number of times statistical chart among the present invention;
Fig. 2 is malicious call screening and intercepting system Organization Chart in the embodiment of the invention;
Fig. 3 is malicious call screening and intercepting system network in the embodiment of the invention;
Fig. 4 is malicious call screening and interception flow chart in the embodiment of the invention.
The specific embodiment
Below in conjunction with drawings and Examples the present invention is further described.
The information recording/that the present invention includes telecommunications switch and note paging system is set up the malicious call characteristic model, and intercepting system carries out the screening of malice characteristic matching and interception to magnanimity access phone. Vicious disturbance call detects and the intercepting system detection accuracy is strong and comprehensively, the investment totle drilling cost is low.
The technical solution used in the present invention is:
(1), sets up the malicious call characteristic model
By the malicious call analysis being found illegal user adopts the proper communication means that the mobile subscriber is carried out malice harassing and wrecking, certain number section user is dialed on a large scale but disconnect, employing call forwarding mode forwards the message platform to or telegraphone is swindled during client's clawback by the time; Therefore malicious call is most for not taking on the telephone, and can't adopt the ticket screening;
Because the whole province's note exhales number of users to account for 50% of the whole network calling user number in the note paging system, is about about 1,200 ten thousand. Every day, short message calling platform generated record, utilized the internal association of these a large amount of secondary user call records and call number to analyze, and accurately found the malice number.
Short message calling platform has recorded the call log during called subscriber's shutdown, this daily record detail record the information such as calling number, called number, call time. As shown in Figure 1, for the user calls the number of times statistical chart, from this statistical chart can analyze 99.99% normal users daily the amount of dialing but in call record, also exist same calling subscribe's 200-1000 time high frequency time to call out less than 200 times, to its further analysis:
Average connecting time 8s can calculate according to network, and one day normal users maximum is dialed number of times and is:
24 * 3600/8=10800 time;
At present the whole province's note exhales the user to account for the whole network user 50%, and average daily shutdown is than being 10%, maximum fall into note z z z cry and be recorded as: 10800*50%*10%=540 time
1, therefore average daily surpass this call volume because suspicious malicious call.
2, malicious call is the importing section and automatically dials, so called number is characterized as jack per line section contact number.
For this reason, inventor design draws the malicious call characteristic model and is:
A, phone are dialed the frequency high every day of the number of calls, are defined as:>540 times/days
B, called number feature are obviously called to be consecutive number, and be defined as: the called number section is greater than 2 numbers sections; (different called number yardages/total call volume>80% jack per line segment number code>100);
C, possess many days continuous calling records, be defined as: continuous action>=2 day.
If having special number to meet above feature employing, D can set up " professional white list " mode to evade.
(2), set up automatic screening and intercepting system
As shown in Figure 2, be automatic screening in the embodiment of the invention and intercepting system Organization Chart.
Utilize the note paging system to the example that malicious call screened and judged in December, 2006, China Mobile Group Jiangsu Co., Ltd has set up malicious call automatic screening and intercepting system network, as shown in Figure 3.
System to December call log screen and count the Subscriber Number that satisfies corresponding conditions and automatic output malicious call number (table one):
The clawback test | Number section ownership | Time | Calling number | Dial number of times | The called number section |
The secretary of UNICOM platform | Number in the net of other provinces | 2006-12-9 | 13072940383 | 3024 | 15999632 |
Notarial office notifies you | Number in the net of other provinces | 2006-12-23 | 13074906401 | 3916 | 1599635/1599636 |
Notarial office congratulates you | Number in the net of other provinces | 2006-12-23 | 13074906491 | 2165 | 1599648 |
Hong Kong Wan Jia group | Number in the net of other provinces | 2006-12-13 | 13074974458 | 1515 | 1596163 |
The incoming call restriction | Number in the net of other provinces | 2006-12-23 | 13317628442 | 1293 | 1340586/1340587 |
Spacing | Number in the net of other provinces | 2006-12-23 | 13421968575 | 1815 | 1340148/1340149 |
Prize drawing | Number in the net of other provinces | 2006-12-26 | 13426052445 | 1523 | 1391290 |
Hong Kong prize drawing | Number in the net of other provinces | 2006-12-21 | 13426497621 | 2575 | 159955 |
Hong Kong Ford | Number in the net of other provinces | 2006-12-23 | 13481009257 | 1027 | 1345181/1345182 |
Shutdown | Number in the net of other provinces | 2006-12-13 | 13639631756 | 1330 | 1596163 |
Spacing | Number in the net of other provinces | 2006-12-25 | 13699204281 | 1150 | 1377651/1377652 |
Shut down | Number in the net of other provinces | 2006-12-7 | 13699285473 | 1808 | 1599551,1599552 |
Hong Kong Wanda group | Number in the net of other provinces | 2006-12-25 | 13713462706 | 1234 | 1345190 |
Music | Number in the net of other provinces | 2006-12-24 | 13788687341 | 1016 | 1381309 |
Nothing | Number in the net of other provinces | 2006-12-18 | 13790410619 | 1273 | 1377524 |
The judicial notarial office in Shenzhen notice. Advertisement | Number in the net of other provinces | 2006-12-14 | 13790751537 | 1033 | 1396123/1396124 |
The judicial notarial office in Shenzhen. Advertisement | Number in the net of other provinces | 2006-12-5 | 13810445331 | 1348 | 1377524,1377525 |
Celebrate Samsung. Advertisement | Number in the net of other provinces | 2006-12-23 | 15901243743 | 976 | 1345185 |
Korea S Samsung Group. Advertisement | Number in the net of other provinces | 2006-12-27 | 15994118574 | 4437 | 1599634 |
Then these suspicious numbers are represented to relevant departments' (customer service affirmation) by forms such as the WEB pages and further analyze and confirm. Relevant departments can confirm whether malicious call number of these suspicious numbers by oppositely dialing the forms such as analysis. System automatically distributes to take appropriate measures and implements interception after being confirmed to be the malicious call user. It is 100% that table one is oppositely dialed the proof accuracy rate.
Fig. 4 is malicious call screening and the interception flow chart of the embodiment of the invention, and according to malicious call number attribute: divide into number in province's Intranet, number and the number that interconnects are set up interception mode in the net of other provinces.
● economize number in the Intranet: number carries out the call out function restriction at BOSS in the Intranet to economizing; Send notifying messages to the user: " your phone is dialed unusually, and in order to protect your rights and interests, called restriction is asked the portable machine owner identification to demonstrate,prove local China Mobile Service Hall and lifted restrictions. "
● number in the net of other provinces: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL (user is busy) to Originating Office.
● number interconnects: in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
For other provinces mobile subscriber and the number that interconnects the releasing commit time is set, removes commit time point and put rear 1 month for commit time, commit time automatically distributes to rear system and removes interception worker list. Finish the interception of above-mentioned malice number.
Effect: by checking that such number no longer sends malicious call, reaches interception result, has improved CSAT January.
Although the present invention with preferred embodiment openly as above; but they are not to limit the present invention; anyly have the knack of this skill person; without departing from the spirit and scope of the invention; from when can making various changes or retouch, so being as the criterion of should being defined with the application's claim protection domain of protection scope of the present invention.
Claims (7)
1. a vicious disturbance call screens and hold-up interception method, may further comprise the steps:
Step 1, get the daily record of note paging system;
Step 2, the call number that short message calling platform is generated and malicious call characteristic model carry out association analysis and draw suspicious number;
Step 3, suspicious number represent to the contact staff further to be analyzed;
Step 4, customer service are confirmed whether it is the malicious call number, if not the malicious call user then deletes relative recording, flow process finishes; If the malicious call user then enters next step;
Step 5, realization system tackle automatically.
2. vicious disturbance call according to claim 1 screening and hold-up interception method is characterized in that described malicious call characteristic model is: phone is dialed frequency height, and every day, the number of calls was greater than the number of times of default.
3. vicious disturbance call according to claim 1 screens and hold-up interception method, it is characterized in that described malicious call characteristic model is: the called number feature is obviously called to be consecutive number, and the called number section is greater than the regulation section.
4. vicious disturbance call screening according to claim 1 and hold-up interception method is characterized in that described malicious call characteristic model is: possess many days continuous calling records.
5. according to claim 1 to one of 4 described vicious disturbance call screening and hold-up interception methods, it is characterized in that described malicious call characteristic model at first will be got rid of special number or the VIP user in the professional white list.
6. vicious disturbance call screening according to claim 1 and hold-up interception method is characterized in that the mode that described customer service is confirmed can be to adopt oppositely to dial mode to be confirmed whether the being malicious call number.
7. vicious disturbance call according to claim 1 screens and hold-up interception method, it is characterized in that, described system automatically interception is according to malicious call number attribute: divide into number in the Intranet of area under one's jurisdiction, number and the number that interconnects are set up interception mode in the net of outer area under one's jurisdiction
Number in the Intranet of area under one's jurisdiction: carry out the call out function restriction at BOSS;
Number in the net of outer area under one's jurisdiction: the calling of this number of interception is set by office data in soft switch A office, returns the message of REL to Originating Office;
Number interconnects: according to just far going out the net principle, in the interception of gateway exchange black and white lists, directly to Originating Office loopback backward clearing message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710020659A CN100579150C (en) | 2007-03-20 | 2007-03-20 | Method for screen selecting and catching vicious disturbing calls |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710020659A CN100579150C (en) | 2007-03-20 | 2007-03-20 | Method for screen selecting and catching vicious disturbing calls |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101132438A true CN101132438A (en) | 2008-02-27 |
CN100579150C CN100579150C (en) | 2010-01-06 |
Family
ID=39129557
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200710020659A Active CN100579150C (en) | 2007-03-20 | 2007-03-20 | Method for screen selecting and catching vicious disturbing calls |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100579150C (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196099A (en) * | 2010-03-10 | 2011-09-21 | 成都市华为赛门铁克科技有限公司 | Voice call detection method and device |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
CN101316427B (en) * | 2008-04-11 | 2012-07-18 | 浙江大学 | Method and system for recognizing delivery user of rubbish message through call community network |
CN102711188A (en) * | 2012-05-21 | 2012-10-03 | 中兴通讯股份有限公司 | Method and device for processing user resources |
CN102752406A (en) * | 2012-07-30 | 2012-10-24 | 北京中科金财电子商务有限公司 | Risk number abnormality recognition system and method |
CN102892117A (en) * | 2012-09-11 | 2013-01-23 | 北京中创信测科技股份有限公司 | Method and system for monitoring crank call |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103167502A (en) * | 2013-02-20 | 2013-06-19 | 广西英伦通信技术有限公司 | Method of punishing illegal calling based on over-the-air (OTA) technology |
CN103294948A (en) * | 2012-02-27 | 2013-09-11 | 百度在线网络技术(北京)有限公司 | Software malicious behavior modeling and judging method and device, and mobile terminal |
CN103368904A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Mobile terminal, and system and method for suspicious behavior detection and judgment |
CN103391520A (en) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | Method, terminal, server and system for intercepting malicious short message |
CN103906067A (en) * | 2012-12-28 | 2014-07-02 | 中国移动通信集团设计院有限公司 | Method and device for identifying false calling number |
CN104038648A (en) * | 2014-06-06 | 2014-09-10 | 陈伟 | Method and device for recognizing crank calls |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN104702800A (en) * | 2013-12-04 | 2015-06-10 | 中国移动通信集团公司 | Harassing number identifying method, device and system |
CN104735272A (en) * | 2013-12-24 | 2015-06-24 | 中国移动通信集团贵州有限公司 | Crank call interception method and system |
CN106254691A (en) * | 2016-09-29 | 2016-12-21 | 中国联合网络通信集团有限公司 | A kind of recognition methods swindling number and identification device |
CN106357912A (en) * | 2016-09-28 | 2017-01-25 | 北京奇虎科技有限公司 | Incoming/outgoing call processing method and incoming/outgoing call processing device |
CN106550155A (en) * | 2016-11-25 | 2017-03-29 | 上海欣方智能系统有限公司 | Suspicious number is carried out swindling the method and system that sample screens classification and interception |
CN106658512A (en) * | 2016-12-23 | 2017-05-10 | 广西英伦信息技术股份有限公司 | Method for rapidly locating malicious call number from bill statistics |
CN106657535A (en) * | 2016-09-28 | 2017-05-10 | 北京奇虎科技有限公司 | Incoming and outgoing call processing method and device |
CN106657689A (en) * | 2015-11-04 | 2017-05-10 | 中国移动通信集团公司 | Method for preventing and controlling international fraud call and apparatus thereof |
CN107483700A (en) * | 2016-06-07 | 2017-12-15 | 宇龙计算机通信科技(深圳)有限公司 | A kind of recognition methods of bad number and device |
CN113037699A (en) * | 2019-12-25 | 2021-06-25 | 中国电信股份有限公司 | Communication interception method, apparatus and computer readable storage medium |
-
2007
- 2007-03-20 CN CN200710020659A patent/CN100579150C/en active Active
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101316427B (en) * | 2008-04-11 | 2012-07-18 | 浙江大学 | Method and system for recognizing delivery user of rubbish message through call community network |
CN102196099B (en) * | 2010-03-10 | 2014-02-19 | 成都市华为赛门铁克科技有限公司 | Voice call detection method and device |
CN102196099A (en) * | 2010-03-10 | 2011-09-21 | 成都市华为赛门铁克科技有限公司 | Voice call detection method and device |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
CN102223431B (en) * | 2011-06-27 | 2017-03-29 | 杨子江 | A kind of method and system for preventing harassing call |
CN103294948B (en) * | 2012-02-27 | 2017-02-08 | 百度在线网络技术(北京)有限公司 | Software malicious behavior modeling and judging method and device, and mobile terminal |
CN103294948A (en) * | 2012-02-27 | 2013-09-11 | 百度在线网络技术(北京)有限公司 | Software malicious behavior modeling and judging method and device, and mobile terminal |
CN103368904A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Mobile terminal, and system and method for suspicious behavior detection and judgment |
CN103368904B (en) * | 2012-03-27 | 2016-12-28 | 百度在线网络技术(北京)有限公司 | The detection of mobile terminal, questionable conduct and decision-making system and method |
CN103391520A (en) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | Method, terminal, server and system for intercepting malicious short message |
CN102711188B (en) * | 2012-05-21 | 2018-06-15 | 中兴通讯股份有限公司 | User resources processing method and processing device |
CN102711188A (en) * | 2012-05-21 | 2012-10-03 | 中兴通讯股份有限公司 | Method and device for processing user resources |
CN102752406A (en) * | 2012-07-30 | 2012-10-24 | 北京中科金财电子商务有限公司 | Risk number abnormality recognition system and method |
CN102892117A (en) * | 2012-09-11 | 2013-01-23 | 北京中创信测科技股份有限公司 | Method and system for monitoring crank call |
CN103906067A (en) * | 2012-12-28 | 2014-07-02 | 中国移动通信集团设计院有限公司 | Method and device for identifying false calling number |
CN103906067B (en) * | 2012-12-28 | 2018-05-18 | 中国移动通信集团设计院有限公司 | The recognition methods of false calling number and device |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103095889B (en) * | 2013-01-07 | 2015-06-03 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103167502A (en) * | 2013-02-20 | 2013-06-19 | 广西英伦通信技术有限公司 | Method of punishing illegal calling based on over-the-air (OTA) technology |
CN103167502B (en) * | 2013-02-20 | 2015-09-02 | 广西英伦信息技术股份有限公司 | Based on the method for the illegal calling of OTA technology regulation |
CN104702800A (en) * | 2013-12-04 | 2015-06-10 | 中国移动通信集团公司 | Harassing number identifying method, device and system |
CN104702800B (en) * | 2013-12-04 | 2017-11-03 | 中国移动通信集团公司 | A kind of recognition methods for harassing number, device and system |
CN104735272A (en) * | 2013-12-24 | 2015-06-24 | 中国移动通信集团贵州有限公司 | Crank call interception method and system |
CN104735272B (en) * | 2013-12-24 | 2018-03-23 | 中国移动通信集团贵州有限公司 | The hold-up interception method and system of a kind of harassing call |
CN104038648A (en) * | 2014-06-06 | 2014-09-10 | 陈伟 | Method and device for recognizing crank calls |
CN104243727B (en) * | 2014-10-15 | 2017-01-25 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN106657689A (en) * | 2015-11-04 | 2017-05-10 | 中国移动通信集团公司 | Method for preventing and controlling international fraud call and apparatus thereof |
CN107483700A (en) * | 2016-06-07 | 2017-12-15 | 宇龙计算机通信科技(深圳)有限公司 | A kind of recognition methods of bad number and device |
CN106657535A (en) * | 2016-09-28 | 2017-05-10 | 北京奇虎科技有限公司 | Incoming and outgoing call processing method and device |
CN106357912A (en) * | 2016-09-28 | 2017-01-25 | 北京奇虎科技有限公司 | Incoming/outgoing call processing method and incoming/outgoing call processing device |
CN106357912B (en) * | 2016-09-28 | 2020-02-28 | 北京奇虎科技有限公司 | Incoming call and outgoing call processing method and device |
CN106657535B (en) * | 2016-09-28 | 2020-03-24 | 北京奇虎科技有限公司 | Incoming call and outgoing call processing method and device |
CN106254691A (en) * | 2016-09-29 | 2016-12-21 | 中国联合网络通信集团有限公司 | A kind of recognition methods swindling number and identification device |
CN106254691B (en) * | 2016-09-29 | 2019-02-15 | 中国联合网络通信集团有限公司 | It is a kind of cheat number recognition methods and identification device |
CN106550155A (en) * | 2016-11-25 | 2017-03-29 | 上海欣方智能系统有限公司 | Suspicious number is carried out swindling the method and system that sample screens classification and interception |
CN106550155B (en) * | 2016-11-25 | 2019-05-17 | 上海欣方智能系统有限公司 | Swindle sample is carried out to suspicious number and screens the method and system sorted out and intercepted |
CN106658512A (en) * | 2016-12-23 | 2017-05-10 | 广西英伦信息技术股份有限公司 | Method for rapidly locating malicious call number from bill statistics |
CN113037699A (en) * | 2019-12-25 | 2021-06-25 | 中国电信股份有限公司 | Communication interception method, apparatus and computer readable storage medium |
CN113037699B (en) * | 2019-12-25 | 2022-11-29 | 中国电信股份有限公司 | Communication interception method, device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN100579150C (en) | 2010-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100579150C (en) | Method for screen selecting and catching vicious disturbing calls | |
CN104244216B (en) | The method and system of real-time blocking fraudulent call in a kind of communication process | |
CN101350957B (en) | Method and equipment for shielding rubbish short message | |
WO2016197675A1 (en) | Method and apparatus for identifying crank call | |
CN107770777B (en) | Method for identifying recorded fraud calls | |
CN106331390B (en) | A kind of method and system identifying swindle number based on communicating data | |
CN101472007A (en) | Method and system for determining disturbance telephone | |
CN101217820A (en) | An identification system and identification method on disturbance telephone numbers | |
CN102572904B (en) | System and method for implementing automatic dial test business | |
CN102075639A (en) | Method and device for intercepting malicious call in international service communication network | |
CN105611084A (en) | User fraud suspiciousness degree calculation method and suspiciousness degree calculation system | |
CN104104772A (en) | Fraudulent phone call prompting method, service and system | |
CN107231494A (en) | A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment | |
CN102438243A (en) | Method for identifying harassing phone call by analyzing frequency of phone call | |
CN101262520A (en) | A terminal with suspicious call filtration function and its filtration method | |
CN108198086B (en) | Method and device for identifying disturbance source according to communication behavior characteristics | |
CN101771757A (en) | Method for detecting and intercepting nuisance calls | |
CN103167502B (en) | Based on the method for the illegal calling of OTA technology regulation | |
CN101409746B (en) | Method and system for detecting telephone signal tone facing to call centre | |
CN102256255A (en) | Detection method for parallel-used-card proof based on time and geographic location collisions | |
CN101600026A (en) | A kind of in communication network the method for monitoring harassing calls | |
CN101001280B (en) | Universal accounting card service and system thereof | |
CN1349339A (en) | Method of filtering phone call and avoiding harassing call | |
CN104581729A (en) | Junk information processing method and device | |
CN104301549B (en) | Defaulting downtime missed call prompting system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |