Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
As shown in fig. 1, which is a flowchart of a first embodiment of the method for acquiring security information according to the present invention, the method specifically includes the following steps:
step 11, the home location server sends a security information acquisition request message for acquiring security information of the calling terminal to the security information server according to a status information acquisition request message sent by a Gateway Mobile Switching Center (GMSC), wherein the security information acquisition request message comprises a called terminal number of the called terminal and a calling terminal number of the calling terminal;
step 12, the home location server receives a security information acquisition response message sent by the security information server, wherein the security information acquisition response message comprises security information of the calling terminal inquired by the security information server according to the called terminal number and the calling terminal number;
step 13, the home location server determines the state information of the called terminal according to the safety information of the calling terminal, and sends the state information carrying the state information of the called terminal to the gateway mobile switching center to acquire a response message;
then, the gateway mobile switching center can process the call from the calling terminal to the called terminal according to the state information of the called terminal.
In the embodiment, the home location server acquires the security information of the calling terminal from the security information server, determines the state information of the called terminal according to the security information, and sends the state information of the called terminal to the gateway mobile switching center so that the gateway mobile switching center processes the call from the calling terminal to the called terminal according to the state information of the called terminal, can effectively intercept the harassing call, does not need to additionally install software on the mobile terminal, saves the resources of the mobile terminal, and can realize answering only the call of the VIP list at a certain special moment.
As shown in fig. 2, which is a flowchart of a second embodiment of the method for acquiring security information according to the present invention, the method may specifically include the following steps:
step 21, the security information server receives a security information acquisition request message which is sent by the home location server and used for acquiring the security information of the calling terminal, wherein the security information acquisition request message comprises a called terminal number of the called terminal and a calling terminal number of the calling terminal;
step 22, the safety information server obtains the safety information of the calling terminal by inquiring the stored list information of the called terminal according to the called terminal number and the calling terminal number;
step 23, the security information server sends a security information acquisition response message carrying the security information of the calling terminal to the home location server;
then, the home location server can determine the state information of the called terminal according to the security information and send the state information to the gateway mobile switching center, and the gateway mobile switching center can process the call from the calling terminal to the called terminal according to the state information of the called terminal.
In the embodiment, the safety information server inquires the stored list information of the called terminal according to the number of the calling terminal and the number of the called terminal, acquires the safety information of the calling terminal and sends the safety information to the home location server, so that the home location server determines the state information of the called terminal according to the safety information and sends the state information to the gateway mobile switching center, and the gateway mobile switching center can process the call of the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting crank calls, needing no additional software installation of the mobile terminal, saving the resources of the mobile terminal, and simultaneously realizing only answering the calls of a VIP list at a certain special moment.
As shown in fig. 3, which is a flowchart of a third embodiment of the method for acquiring security information according to the present invention, the method specifically includes the following steps:
step 31, the gateway mobile switching center sends a state information acquisition request message carrying a calling terminal number of the calling terminal and a called terminal number of the called terminal to the home location server according to the call of the calling terminal to the called terminal;
step 32, the gateway mobile switching center receives a status information acquisition response message sent by the home location server, wherein the status information acquisition response message comprises the status information of the called terminal determined by the home location server according to the safety information of the calling terminal; the safety information of the calling terminal is acquired from the safety information server by the home location server according to the calling terminal number and the called terminal number.
Then the gateway mobile switching center can process the call from the calling terminal to the called terminal according to the state information of the called terminal.
In the embodiment, the gateway mobile switching center receives the state information of the called terminal, which is sent by the home location server and determined according to the security information of the calling terminal, so that the call from the calling terminal to the called terminal is processed according to the state information of the called terminal, thereby effectively intercepting crank calls, avoiding the need of additionally installing software on the mobile terminal, saving the resources of the mobile terminal, and simultaneously realizing the purpose of answering only calls of a VIP (very important person) list at a certain special moment.
Method for obtaining security information fourth embodiment
In this embodiment, the security information of the calling terminal may specifically include whether the number of the calling terminal is in a blacklist of the called terminal, and a security level of the blacklist; the calling terminal can be a fixed terminal of a fixed network user or a mobile terminal of a mobile user. The Home Location Register may be a Home Location Register (HLR) or a Home Subscriber Server (HSS).
As shown in fig. 4, a flowchart of an application scenario in a fourth embodiment of the method for acquiring security information of the present invention may specifically include the following steps:
step 41, calling the called terminal by the calling terminal, and recording information such as the calling terminal number of the calling terminal, the calling time of the calling, the called terminal number of the called terminal and the like by the GMSC;
step 42, the GMSC SENDs a status INFORMATION acquisition request message (MAP _ SEND _ ROUTING _ INFORMATION) for the user to acquire status INFORMATION of the called terminal to the home location server, where the status INFORMATION acquisition request message includes a calling terminal number and a called terminal number;
specifically, a private cell may be extended in the status information acquisition request message to carry the calling terminal number and the called terminal number.
Step 43, the home location server judges whether the called terminal customizes the call firewall service, if the home location server judges that the called terminal customizes the call firewall service, step 44 is executed, otherwise the home location server sends the current state information of the called terminal to the GMSC;
step 44, the home location server sends a security information acquisition request message for acquiring whether the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist to the security information server, wherein the security information acquisition request message comprises the number of the calling terminal and the number of the called terminal;
step 45, the safety information server returns a safety information acquisition response message carrying safety information that the number of the calling terminal is in a blacklist of the called terminal and the safety level of the blacklist is first grade and the like to the home location server;
step 46, the home location server determines that the state information of the called terminal is that the called terminal is shut down;
step 47, the home location server SENDs a status INFORMATION acquisition response message (MAP _ SEND _ ROUTING _ INFORMATION _ ACK) to the GMSC, where the status INFORMATION acquisition response message includes status INFORMATION that the called terminal has been stopped;
step 48, after GMSC plays the corresponding prompt tone to the calling terminal, the calling terminal refuses the calling to the called terminal;
the prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: the GMSC prompts the calling terminal that the number called by the user is not right, the number called by the user is stopped or the number called by the user is not right, and then the calling terminal is directly hung up.
It should be noted that the short message sent by the calling terminal number listed in the blacklist of the called terminal and having the first security level of the blacklist does not reach the called terminal.
As shown in fig. 5, a flowchart of another application scenario in the fourth embodiment of the method for acquiring security information according to the present invention may specifically include the following steps:
step 51, calling a called terminal by a calling terminal, and recording information such as a calling terminal number of the calling terminal, calling time of the calling, a called terminal number of the called terminal and the like by the GMSC;
step 52, the GMSC sends a status information acquisition request message for the user to acquire status information of the called terminal to the home location server, where the routing request message includes a calling terminal number and a called terminal number;
step 53, the home location server judges whether the called terminal customizes the call firewall service, if the home location server judges that the called terminal customizes the call firewall service, step 54 is executed, otherwise the home location server sends the current state information of the called terminal to the GMSC;
step 54, the home location server sends a security information acquisition request message for acquiring whether the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist to the security information server, wherein the security information acquisition request message comprises the number of the calling terminal and the number of the called terminal;
step 55, the security information server returns a security information acquisition response message carrying security information that the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist is two-level and the like to the home location server;
step 56, the home location server determines that the state information of the called terminal is that the called terminal is powered off;
step 57, the home location server SENDs a status INFORMATION acquisition response message (MAP _ SEND _ ROUTING _ INFORMATION _ ACK) to the GMSC, where the status INFORMATION acquisition response message includes the status INFORMATION that the called terminal has been powered off;
step 58, after playing the corresponding prompt tone to the calling terminal, the GMSC refuses the calling terminal to the called terminal;
the prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: the GMSC prompts the calling terminal to hang up the call after the number called by the calling party is turned off.
And step 59, the safety information server sends a prompt message for prompting the calling of the calling terminal to the called terminal through the short message center.
Specifically, the security information server sends a FORWARD SHORT MESSAGE (MAP _ MO _ FORWARD _ SHORT _ MESSAGE) to the SHORT MESSAGE center, the sender of the SHORT MESSAGE may be set as a calling subscriber, and the MESSAGE content may be "user XXX on your blacklist calls you by X minutes at X year". If a call is received to a number on the blacklist while the user is powered off, no processing may be required. In addition, whether the calling condition of the calling terminal is transmitted to the called terminal in the form of a short message or not can be customized by the called terminal.
It should be noted that step 59 and step 55 may be performed simultaneously. In addition, the called terminal can normally receive the short message sent by the calling terminal number which is listed in the blacklist of the called terminal and the security level of the blacklist is the second level.
As shown in fig. 6, a flowchart of another application scenario in the fourth embodiment of the method for acquiring security information according to the present invention may specifically include the following steps:
step 61, calling the called terminal by the calling terminal, and recording information such as the calling terminal number of the calling terminal, the calling time of the calling, the called terminal number of the called terminal and the like by the GMSC;
step 62, the GMSC sends a status information acquisition request message for the user to acquire status information of the called terminal to the home location server, where the routing request message includes a calling terminal number and a called terminal number;
step 63, the home location server judges whether the called terminal customizes the call firewall service, if the home location server judges that the called terminal customizes the call firewall service, step 64 is executed, otherwise, the home location server sends the current state information of the called terminal to the GMSC;
step 64, the home location server sends a security information acquisition request message for acquiring whether the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist to the security information server, wherein the security information acquisition request message comprises the number of the calling terminal and the number of the called terminal;
step 65, the security information server returns a security information acquisition response message carrying security information that the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist is three levels to the home location server;
step 66, the home location server determines that the state information of the called terminal is that the called terminal can not respond temporarily;
step 67, the home location server SENDs a status INFORMATION acquisition response message (MAP _ SEND _ ROUTING _ INFORMATION _ ACK) to the GMSC, where the status INFORMATION acquisition response message includes status INFORMATION that the called terminal cannot respond temporarily;
68, after playing the corresponding prompt tone to the calling terminal, the GMSC refuses the calling terminal to the called terminal;
the prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: the GMSC directly hangs up the call after prompting the calling terminal that the number called by the user cannot answer temporarily.
Step 69, the GMSC sends the ringing tone to the called terminal through the mobile switching center to which the called terminal belongs and hangs up the phone;
whether the calling condition of the calling terminal is informed to the called terminal in a mode of ringing first and then hanging up or not can be customized by the called terminal.
It should be noted that the called terminal can normally receive the short message sent by the calling terminal number which is listed in the blacklist of the called terminal and the security level of the blacklist is three levels.
In this embodiment, if the number of the calling terminal is not in the blacklist of the called terminal, and the home location server determines that the state information of the called terminal is the current state information of the called terminal, the GMSC processes the call from the calling terminal to the called terminal according to the current state information of the called terminal. The current state information of the called terminal may include: the called terminal is shut down, the called terminal cannot respond temporarily, and the called terminal can be connected. When the current state information of the called terminal is that the called terminal is shut down, the GMSC plays a shut-down prompt tone to the calling terminal and hangs up the call, when the current state information of the called terminal is that the called terminal cannot temporarily respond, the GMSC plays a temporarily unresponsive prompt tone and hangs up the call, and when the current state information of the called terminal is that the called terminal can be connected, the GMSC connects the call of the calling terminal to the called terminal.
In the embodiment, the called terminal applies for opening the call firewall service and sets the blacklist and the security level thereof, when any calling terminal number calls the called terminal, whether the calling terminal number is in the blacklist of the called terminal is firstly inquired, if yes, the called terminal number is processed according to the preset security level of the called terminal, and the harassing calls are directly rejected from a network side by hanging up and playing corresponding prompt tones. Therefore, the harassing calls are not harassed, and the function of a firewall is really realized.
In addition, the embodiment processes the call from the calling terminal to the called terminal at the network side, so that the called terminal can be in an idle state, the call at the same time can be made, and the cost for playing the prompt tone by the called terminal in the prior art can be reduced. In addition, the embodiment can also realize that the called terminal knows the calling condition of the calling terminal number which is not wanted to be accessed but needs to know the dialing condition, and the called terminal can realize the calling condition without knowing the called terminal. In addition, the called terminal can set the safety level of the blacklist of the called terminal, and the prompt information given to the calling terminal can be customized according to the preference of the called terminal.
Method for acquiring Security information in a fifth embodiment
In this embodiment, the security information of the calling terminal may specifically include whether the number of the calling terminal is in a list of Important people (hereinafter referred to as VIP) of the called terminal, and a listening time period of the list of Important people; the calling terminal can be a fixed terminal of a fixed network user or a mobile terminal of a mobile user. The home location register may be an HLR or an HSS.
As shown in fig. 7, which is a flowchart of a fifth embodiment of the method for acquiring security information according to the present invention, the method specifically includes the following steps:
step 71, the calling terminal calls the called terminal, and the GMSC records the information of the calling terminal number of the calling terminal, the calling time of the calling, the called terminal number of the called terminal and the like;
step 72, the GMSC sends a status information acquisition request message for acquiring status information of the called terminal to the home location server, where the routing request message includes a calling terminal number and a called terminal number;
step 73, the home location server judges whether the called terminal customizes the call firewall service, if the home location server judges that the called terminal customizes the call firewall service, step 74 is executed, otherwise the home location server sends the current state information of the called terminal to the GMSC;
step 74, the home location server sends a security information acquisition request message for acquiring whether the calling terminal number is in the VIP list of the called terminal and whether the calling terminal number is in the answering time period of the VIP list at the current moment to the security information server, wherein the security information acquisition request message comprises the calling terminal number and the called terminal number;
step 75, the security information server returns a security information acquisition response message carrying security information that the number of the calling terminal is not in the VIP list of the called terminal and/or the calling time of the call is not in the answering time period of the VIP list to the home location server;
step 76, the home location server determines that the state information of the called terminal is that the called terminal is powered off;
step 77, the home location server sends a status information acquisition response message to the GMSC, where the status information acquisition response message includes the status information of the called terminal;
step 78, when the state information of the called terminal is that the called terminal is turned off, the GMSC refuses the call of the calling terminal to the called terminal after playing a corresponding prompt tone to the calling terminal;
the prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: the GMSC prompts the calling terminal to hang up the call after the number called by the calling party is shut down;
and 79, the safety information server sends a prompt message for prompting the calling of the calling terminal to the called terminal through the short message center.
Specifically, the security information server sends a forward short message to the short message center, the sender of the short message may be set as a calling user, and the message content may be "user XXX on your blacklist calls you by X minutes at X month X day X of X year". If a call is received to a number on the blacklist while the user is powered off, no processing may be required.
It should be noted that step 79 and step 75 may be performed simultaneously.
In this embodiment, if the number of the calling terminal is in the VIP list of the called terminal and the calling time of the call is in the answering time period of the important person list, the home location server determines that the state information of the called terminal is that the called terminal can be connected, and the GMSC connects the call from the calling terminal to the called terminal.
In this embodiment, the current state information of the called terminal may include: the called terminal is shut down, the called terminal cannot respond temporarily, and the called terminal can be connected. When the current state information of the called terminal is that the called terminal is shut down, the GMSC plays a shut-down prompt tone to the calling terminal and hangs up the call, when the current state information of the called terminal is that the called terminal cannot temporarily respond, the GMSC plays a temporarily unresponsive prompt tone and hangs up the call, and when the current state information of the called terminal is that the called terminal can be connected, the GMSC connects the call of the calling terminal to the called terminal.
In the embodiment, the called terminal applies for opening a call firewall service and sets a VIP list and a receiving time period of the VIP list, when any calling terminal number calls the called terminal, whether the calling terminal number is in the VIP list of the called terminal or not and whether the calling time of the calling is in the receiving time period of the VIP list or not are firstly inquired, if yes, the calling terminal number is answered, otherwise, the calling terminal number is processed according to the preset security level of the called terminal, the call is hung up and corresponding prompt tones are played, and therefore the purpose that only calls of the VIP list can be answered at a certain special moment, and harassing calls can be directly rejected from a network side is achieved. Therefore, the harassing calls are not harassed, and the function of a firewall is really realized.
In addition, the embodiment processes the call from the calling terminal to the called terminal at the network side, so that the called terminal can be in an idle state, the call at the same time can be made, and the cost for playing the prompt tone by the called terminal in the prior art can be reduced. In addition, the embodiment can also realize that the called terminal knows the calling condition of the calling terminal number which is not wanted to be accessed but needs to know the dialing condition, and the called terminal can realize the calling condition without knowing the called terminal. In addition, the prompt message to the calling terminal can also be customized according to the preference of the called terminal.
Home location register first embodiment
As shown in fig. 8, which is a schematic structural diagram of the home location server according to the first embodiment of the present invention, the home location server may specifically include a first sending module 81, a first receiving module 82, and a determining module 83.
The first sending module 81 is configured to send a security information obtaining request message for obtaining security information of the calling terminal to the security information server according to the status information obtaining request message sent by the GMSC, where the security information obtaining request message includes a called terminal number of the called terminal and a calling terminal number of the calling terminal. The first receiving module 82 is configured to receive a security information acquisition response message sent by the security information server, where the security information acquisition response message includes security information of the calling terminal queried by the security information server according to the called terminal number and the calling terminal number. The determining module 83 is configured to determine the status information of the called terminal according to the security information of the calling terminal. The first sending module 81 is further configured to send a status information acquisition response message carrying the status information of the called terminal to the GMSC. The GMSC may then process the call from the calling terminal to the called terminal based on the status information of the called terminal.
In this embodiment, the first receiving module 82 receives the security information of the calling terminal from the security information server, the determining module 83 determines the state information of the called terminal according to the security information, and the first sending module 81 sends the state information of the called terminal to the GMSC, so that the GMSC can process a call from the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting a crank call, and simultaneously, the mobile terminal does not need to install additional software, thereby saving resources of the mobile terminal.
Home location server second embodiment
In this embodiment, the security information of the calling terminal may specifically include whether the number of the calling terminal is in a blacklist of the called terminal, and a security level of the blacklist; the calling terminal can be a fixed terminal of a fixed network user or a mobile terminal of a mobile user. The home location register may specifically be an HLR or an HSS.
As shown in fig. 9, which is a schematic structural diagram of a home location server according to a second embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 8, the determining module 83 may specifically include a first determining unit 91, a second determining unit 92, a third determining unit 93, and a fourth determining unit 94.
The first determining unit 91 is configured to determine that the called terminal is stopped when the number of the calling terminal is in a blacklist of the called terminal and a security level of the blacklist is one level. The second determining unit 92 is configured to determine that the called terminal is powered off when the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist is two levels. The third determining unit 93 is configured to determine that the called terminal cannot respond temporarily when the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist is three levels. The fourth determining unit 94 is configured to determine that the status information of the called terminal is the current status information of the called terminal when the number of the calling terminal is not in the blacklist of the called terminal.
Further, the embodiment may further include a determining module 95, configured to determine whether the called terminal customizes the call firewall service. When the called terminal customizes the call firewall service, the first sending module 81 sends a security information acquisition request message for acquiring the security information of the calling terminal to the security information server according to the state information acquisition request message sent by the GMSC. When the called terminal does not customize the call firewall service, the first transmitting module 81 transmits the current state information of the called terminal to the GMSC.
In this embodiment, the current state information of the called terminal may include: the called terminal is shut down, the called terminal cannot respond temporarily, and the called terminal can be connected.
In this embodiment, the determining module 95 determines whether the called terminal customizes the call firewall service, and when the called terminal applies for opening the call firewall service and sets a blacklist and its security level, and any calling terminal number calls the called terminal, the first determining unit 91, the second determining unit 92, the third determining unit 93, and the fourth determining unit 94 determine whether the calling terminal number is in the blacklist of the called terminal and the security level of the blacklist, so that the GMSC processes the call from the calling terminal to the called terminal according to the state information of the called terminal, and thus the harassing call is directly rejected from the network side. Therefore, the harassing calls are not harassed, and the function of a firewall is really realized.
Home location server third embodiment
In this embodiment, the security information of the calling terminal includes whether the number of the calling terminal is in a VIP list of the called terminal and a listening time period of the VIP list; the calling terminal can be a fixed terminal of a fixed network user or a mobile terminal of a mobile user. The home location register may specifically be an HLR or an HSS.
As shown in fig. 10, which is a schematic structural diagram of a home location server according to a third embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 8, the determining module 83 may specifically include a fifth determining unit 101 and a sixth determining unit 102.
The fifth determining unit 101 is configured to determine that the called terminal can be connected when the calling terminal number is in the VIP list of the called terminal and the current time is in the answering time period of the VIP list. The sixth determining unit 102 is configured to determine that the called terminal is powered off when the number of the calling terminal is not in the VIP list of the called terminal and/or the call time of the calling terminal calling the called terminal is not in the answering time period of the VIP list.
Further, the embodiment may further include a determining module 95, configured to determine whether the called terminal customizes the call firewall service. When the called terminal customizes the call firewall service, the first sending module 81 sends a security information acquisition request message for acquiring the security information of the calling terminal to the security information server according to the state information acquisition request message sent by the GMSC. When the called terminal does not customize the call firewall service, the first transmitting module 81 transmits the current state information of the called terminal to the GMSC.
The current state information of the called terminal may include: the called terminal is shut down, the called terminal cannot respond temporarily, and the called terminal can be connected.
In this embodiment, the determining module 95 determines whether the called terminal customizes the call firewall service, and when the called terminal applies for opening the call firewall service and sets a VIP list and its answering time period, and any calling terminal number calls the called terminal, the fifth determining unit 101 and the sixth determining unit 102 determine whether the calling terminal number is in the VIP list of the called terminal and whether the current time is in the answering time period of the VIP list, so that the GMSC processes the call from the calling terminal to the called terminal according to the state information of the called terminal, and realizes that only the call of the VIP list is answered at a specific time, thereby ensuring that the called terminal is not disturbed at the specific time and no important call is missed.
First embodiment of a Security information Server
As shown in fig. 11, which is a schematic structural diagram of the security information server according to the first embodiment of the present invention, the security information server may specifically include a second receiving module 111, an obtaining module 112, and a second sending module 113.
The second receiving module 111 is configured to receive a security information obtaining request message sent by the home location server and used for obtaining security information of the calling terminal, where the security information obtaining request message includes a called terminal number of the called terminal and a calling terminal number of the calling terminal. The obtaining module 112 is configured to obtain the security information of the calling terminal by querying the stored list information of the called terminal according to the called terminal number and the calling terminal number. The second sending module 113 is configured to send a security information obtaining response message carrying the security information of the calling terminal to the home location server.
Then, the home location server may determine the state information of the called terminal according to the security information and send the state information to the GMSC, and the GMSC may process the call from the calling terminal to the called terminal according to the state information of the called terminal.
In the embodiment, the obtaining module 112 obtains the security information of the calling terminal by querying the stored list information of the called terminal according to the calling terminal number and the called terminal number, and the second sending module 113 sends the security information to the home location server, so that the home location server determines the state information of the called terminal according to the security information and sends the state information to the GMSC, and the GMSC can process the call from the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting crank calls, and simultaneously, the mobile terminal does not need to additionally install software, thereby saving resources of the mobile terminal.
Second embodiment of a secure information Server
In this embodiment, the list information of the called terminal includes a black list of the called terminal.
As shown in fig. 12, which is a schematic structural diagram of a security information server according to a second embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 11, the obtaining module 112 may specifically include a first obtaining unit 121, configured to obtain, by querying a stored blacklist of a called terminal, whether a number of a calling terminal is in the blacklist of the called terminal and a security level of the blacklist.
In this embodiment, the first obtaining unit 121 queries the stored blacklist of the called terminal according to the number of the calling terminal and the number of the called terminal, and obtains whether the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist, the second sending module 113 sends the security information to the home location server, so that the home location server determines the state information of the called terminal according to the security information and sends the state information to the GMSC, the GMSC can process the call from the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting a harassing call, and simultaneously, the mobile terminal does not need to additionally install software, thereby saving resources of the mobile terminal.
Third embodiment of a secure information Server
In this embodiment, the list information of the called terminal may specifically include a VIP list of the called terminal.
As shown in fig. 13, which is a schematic structural diagram of a security information server according to a third embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 11, the obtaining module 112 may specifically include a second obtaining unit 131, configured to obtain whether the calling terminal is in the VIP list of the called terminal and a listening time period of the VIP list by querying the stored VIP list of the called terminal.
In this embodiment, the second obtaining unit 131 queries the stored blacklist of the called terminal according to the number of the calling terminal and the number of the called terminal, and obtains whether the number of the calling terminal is in the VIP list of the called terminal and whether the current time is in the answering time period of the VIP list, the second sending module 113 sends the security information to the home location server, so that the home location server determines the state information of the called terminal according to the security information and sends the state information to the GMSC, and the GMSC can process the call from the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting harassing calls and avoiding missing important calls, and simultaneously, the mobile terminal does not need to additionally install software and does not occupy limited resources of the mobile terminal.
GMSC first embodiment
As shown in fig. 14, which is a schematic structural diagram of a GMSC according to a first embodiment of the present invention, the GMSC may specifically include a third sending module 141 and a third receiving module 142.
The third sending module 141 is configured to send a status information obtaining request message carrying a calling terminal number of the calling terminal and a called terminal number of the called terminal to the home location server according to a call from the calling terminal to the called terminal. Specifically, a private cell may be extended in the status information acquisition request message to carry the calling terminal number and the called terminal number.
The third receiving module 142 is configured to receive a status information acquisition response message sent by the home location server, where the status information acquisition response message includes status information of the called terminal that is determined by the home location server according to the security information of the calling terminal; the safety information of the calling terminal is acquired from the safety information server by the home location server according to the calling terminal number and the called terminal number.
The GMSC may then process the call from the calling terminal to the called terminal based on the status information of the called terminal.
In this embodiment, the third receiving module 142 receives the state information of the called terminal, which is sent by the home location server and determined according to the security information of the calling terminal, so as to process the call from the calling terminal to the called terminal according to the state information of the called terminal, thereby effectively intercepting a crank call without additionally installing software on the mobile terminal and occupying limited resources of the mobile terminal.
GMSC second embodiment
In this embodiment, the security information of the calling terminal may specifically include whether the number of the calling terminal is in a blacklist of the called terminal and a security level of the blacklist.
As shown in fig. 15, which is a schematic structural diagram of a GMSC according to a second embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 14, this embodiment may further include a processing module 151, configured to obtain status information carried in the response message according to the status information, and process a call from the calling terminal to the called terminal.
The state information of the called terminal may specifically include: when the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist is first level, the state information of the called terminal is that the called terminal is shut down; or when the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist is two levels, the state information of the called terminal is that the called terminal is powered off; or when the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist is three levels, the state information of the called terminal is that the called terminal can not respond temporarily; or, when the number of the calling terminal is not in the blacklist of the called terminal, the state information of the called terminal is the current state information of the called terminal. The current state information of the called terminal may include: the called terminal is shut down, the called terminal cannot respond temporarily, and the called terminal can be connected.
In this implementation, the processing module 151 may further include a first processing unit 152, a second processing unit 153, a third processing unit 154, and a fourth processing unit 155.
The first processing unit 152 is configured to, when the state information of the called terminal indicates that the called terminal is stopped, play a corresponding alert tone to the calling terminal and then reject the call from the calling terminal to the called terminal. The prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: and prompting that the number called by a caller is not up, the number called by the caller is stopped or that the number called by the caller is an empty number to the calling terminal and then directly hanging up the call.
The second processing unit 153 is configured to, when the state information of the called terminal is that the called terminal is powered off, play a corresponding alert tone to the calling terminal, reject the call from the calling terminal to the called terminal, and send a prompt message for prompting the call of the calling terminal to the called terminal through the short message center. The prompt tone may be a default or customized prompt tone for the called terminal, for example: the calling terminal is prompted to directly hang up the telephone after the number called by a user is switched off but can not be started, meanwhile, a FORWARD SHORT MESSAGE (MAP _ MO _ FORWARD _ SHORT _ MESSAGE) is sent to the SHORT MESSAGE center, a sender of the SHORT MESSAGE can be set as a calling user, and the MESSAGE content can be that the user XXX on a blacklist calls you by X minutes at X years. If a call is received to a number on the blacklist while the user is powered off, no processing may be required.
The third processing unit 154 is configured to, when the status information of the called terminal indicates that the called terminal cannot respond temporarily, play a corresponding alert tone to the calling terminal, reject the call from the calling terminal to the called terminal, and send a ring tone to the called terminal through the GMSC where the called terminal is located.
The prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: and (4) prompting that the calling terminal can not answer the call and the called number can not answer temporarily to hang up the call directly.
The fourth processing unit 155 is configured to connect the call from the calling terminal to the called terminal when the status information of the called terminal is that the called terminal is connectable.
In this embodiment, the third receiving module 142 receives the status information of the called terminal, which is sent by the home location server and determined according to the security information of the calling terminal, and the first processing unit 152, the second processing unit 153, the third processing unit 154, and the fourth processing unit 155 process the call from the calling terminal to the called terminal according to whether the number of the calling terminal is in the blacklist of the called terminal and the security level of the blacklist, so as to directly reject the harassing call from the network side. Therefore, the harassing calls are not harassed, and the function of a firewall is really realized.
In addition, the embodiment processes the call from the calling terminal to the called terminal at the network side, so that the called terminal can be in an idle state, the call at the same time can be made, and the cost for playing the prompt tone by the called terminal in the prior art can be reduced. In addition, the embodiment can also realize that the called terminal knows the calling condition of the calling terminal number which is not wanted to be accessed but needs to know the dialing condition, and the called terminal can realize the calling condition without knowing the called terminal. In addition, the prompt message to the calling terminal can also be customized according to the preference of the called terminal.
GMSC third embodiment
In this embodiment, the security information of the calling terminal may specifically include whether the number of the calling terminal is in a VIP list of the called terminal and a listening time period of the VIP list.
As shown in fig. 16, which is a schematic structural diagram of a GMSC according to a third embodiment of the present invention, on the basis of the schematic structural diagram shown in fig. 14, this embodiment may further include a processing module 151, configured to obtain, according to the state information, the state information of the called terminal carried in the response message, and process a call from the calling terminal to the called terminal.
The state information of the called terminal may specifically include: when the calling terminal number is in the VIP list of the called terminal and the calling time of the call is in the answering time period of the VIP list, the state information of the called terminal is that the called terminal can be connected; or when the calling terminal number is not in the VIP list of the called terminal and/or the calling time of the call is not in the answering time period of the VIP list, the state information of the called terminal is that the called terminal is powered off.
The processing module 151 may further include a fifth processing unit 161 and a sixth processing unit 162. The fifth processing unit 161 is configured to, when the status information of the called terminal is that the called terminal is accessible, connect the call from the calling terminal to the called terminal. The sixth processing unit 162 is configured to, when the state information of the called terminal indicates that the called terminal is powered off, directly hang up the telephone after playing a corresponding alert tone to the calling terminal, and send a prompt message for prompting the call of the calling terminal to the called terminal through a short message center. The prompt tone may be a default, or may be a customized prompt tone for the called terminal, for example: the calling terminal is prompted to hang up the telephone after the number called by a user is shut down but the calling terminal is not called by the user, a sender of the short message can be set as a calling user, and the message content can be that the user XXX on the blacklist calls the user by X minutes at X month X year.
In this embodiment, the third receiving module 142 receives the state information of the called terminal, which is sent by the home location server and determined according to the security information of the calling terminal, and the fifth processing unit 161 and the sixth processing unit 162 process the call from the calling terminal to the called terminal according to whether the number of the calling terminal is in the VIP list of the called terminal and whether the call time of the call is in the answering time period of the VIP list, so that not only is the call from the calling terminal to the called terminal not disturbed at a certain time realized, but also important calls are not missed, thereby really playing a role of a firewall.
In addition, the embodiment processes the call from the calling terminal to the called terminal at the network side, so that the called terminal can be in an idle state, the call at the same time can be made, and the cost for playing the prompt tone by the called terminal in the prior art can be reduced. In addition, the embodiment can also realize that the called terminal knows the calling condition of the calling terminal number which is not wanted to be accessed but needs to know the dialing condition, and the called terminal can realize the calling condition without knowing the called terminal. In addition, the prompt message to the calling terminal can also be customized according to the preference of the called terminal.
Communication system embodiments
As shown in fig. 17, which is a schematic structural diagram of an embodiment of the communication system of the present invention, the communication system may specifically include a GMSC171, a home location server 172, and a security information server 173.
The GMSC171 transmits a status information acquisition request message carrying a calling terminal number of the calling terminal and a called terminal number of the called terminal to the home location server 172 according to a call from the calling terminal to the called terminal, the home location server 172 transmits a security information acquisition request message for acquiring security information of the calling terminal to the security information server 173 according to the status information acquisition request message, the security information acquisition request message including the called terminal number of the called terminal and the calling terminal number of the calling terminal, the security information server 173 receives the security information acquisition request message, acquires security information of the calling terminal by inquiring stored list information of the called terminal according to the called terminal number and the calling terminal number, transmits a security information acquisition response message carrying the security information of the calling terminal to the home location server 172, the home location server 172 receives the security information acquisition response message, determines the state information of the called terminal according to the security information of the calling terminal carried in the security information acquisition response message, and sends the state information acquisition response message carrying the state information of the called terminal to the GMSC 171; the GMSC171 receives the status information acquisition response message.
In this embodiment, the security information of the calling terminal may specifically include: whether the number of the calling terminal is in a blacklist of the called terminal and the security level of the blacklist; or whether the calling terminal number is in the VIP list of the called terminal and the answering time period of the VIP list. The calling terminal can be a fixed terminal of a fixed network user or a mobile terminal of a mobile user. The home location server 172 may specifically be an HLR or an HSS.
Further, the GMSC171 may include any module in the foregoing GMSC embodiment, the home location server 172 may include any module in the foregoing home location server embodiment, and the secure information server 173 may include any module in the foregoing secure information server embodiment, which is not described herein again.
According to the embodiment, the harassing calls can be effectively intercepted, the mobile terminal does not need to be additionally provided with software, the resources of the mobile terminal are saved, and meanwhile, the effect that only calls of the VIP list can be answered at a certain special moment can be realized.
Finally, it should be noted that: although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.