CN103428376A - Junk call preventing method, device and system - Google Patents

Junk call preventing method, device and system Download PDF

Info

Publication number
CN103428376A
CN103428376A CN2013103258203A CN201310325820A CN103428376A CN 103428376 A CN103428376 A CN 103428376A CN 2013103258203 A CN2013103258203 A CN 2013103258203A CN 201310325820 A CN201310325820 A CN 201310325820A CN 103428376 A CN103428376 A CN 103428376A
Authority
CN
China
Prior art keywords
terminal
calling terminal
identifying code
center
call spam
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013103258203A
Other languages
Chinese (zh)
Other versions
CN103428376B (en
Inventor
田新雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201310325820.3A priority Critical patent/CN103428376B/en
Publication of CN103428376A publication Critical patent/CN103428376A/en
Application granted granted Critical
Publication of CN103428376B publication Critical patent/CN103428376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a junk call preventing method, device and system. The method includes that a calling party terminal is registered in a junk call preventing center, and a verification code is obtained; the calling party terminal launches a communication interaction request to a called terminal through an internet protocol (IP) channel, and the communication interaction request carries a calling party terminal name and a calling party terminal IP address. The calling party terminal is interacted with the called terminal so as to enable the called terminal to judge whether the calling party terminal is legal according to the verification code. By means of registration of the calling party terminal and legality verification of the called terminal on the calling party terminal, whether communication interaction launched by the calling party terminal should be connected is judged, a large number of junk calls of an IP network are prevented, communication reliability is guaranteed, and client experience is improved.

Description

Call spam prevention method, equipment and system
Technical field
The present invention relates to mobile communication technology, relate in particular to a kind of call spam prevention method, equipment and system.
Background technology
Along with the development of the Internet and the communication technology, IP phone (Voice over Internet Portocol, be called for short: VoIP) arise at the historic moment by technology.In this technology application scenarios, after the mobile phone accessing Internet, as long as any one mobile phone is known the Internet protocol of another mobile phone, (Internet Portocol, be called for short: IP) address, just directly initiating communication is mutual.Like this, when this mobile phone, forge other Subscriber Number initiating communications when mutual, according to existing method, can't be identified and block.
Summary of the invention
The invention provides a kind of for call spam prevention method, equipment and system, to prevent the generation of a large amount of call spam of IP network.
First aspect, the invention provides a kind of call spam prevention method, comprising:
Calling terminal is registered at call spam strick precaution center, obtains identifying code;
Described calling terminal is asked to the terminal called initiating communication alternately by the Internet protocol IP tunnel, carries described calling terminal title and described calling terminal IP address in described communication interaction request;
Described calling terminal and described terminal called are mutual, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
Second aspect, the invention provides a kind of call spam prevention method, comprising:
Terminal called receives the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carries described calling terminal title and described calling terminal IP address in described communication interaction request;
Described terminal called and described calling terminal are mutual, and the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
The third aspect, the invention provides a kind of call spam prevention method, comprising:
Call spam is taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal;
At terminal called internet protocol-based IP tunnel, set up with before the communicating by letter of calling terminal, described call spam strick precaution center receives the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result;
Described call spam strick precaution center sends described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
Fourth aspect, the invention provides a kind of calling terminal, comprising:
The first Registering modules, for being registered at call spam strick precaution center, obtain identifying code;
The first sending module, for asking alternately to the terminal called initiating communication by the Internet protocol IP tunnel, carry described calling terminal title and described calling terminal IP address in described communication interaction request;
The first processing module, for mutual with described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
The 5th aspect, the invention provides a kind of terminal called, comprising:
The first receiver module, for receive the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request;
The second processing module, for mutual with described calling terminal, the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
The 6th aspect, the invention provides a kind of server, comprising:
The second Registering modules, the registration request sent for receiving terminal, the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal;
The 3rd processing module, for setting up at terminal called internet protocol-based IP tunnel with before the communicating by letter of calling terminal, receive the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result;
The second sending module, for sending described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
The 7th aspect, the invention provides a kind of call spam crime prevention system, comprising: the calling terminal provided as fourth aspect, the terminal called provided as the 5th aspect and as the server that provides of the 6th aspect.
Call spam method provided by the invention, equipment and system are by registration and the terminal called checking whether legal to described calling terminal of calling terminal, determine whether to connect the communication interaction request that described calling terminal is initiated, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
The accompanying drawing explanation
The schematic flow sheet that Fig. 1 is call spam prevention method embodiment mono-of the present invention;
The schematic flow sheet that Fig. 2 is call spam prevention method embodiment bis-of the present invention;
The schematic flow sheet that Fig. 3 is call spam prevention method embodiment tri-of the present invention;
The schematic flow sheet that Fig. 4 and Fig. 5 are call spam prevention method embodiment tetra-of the present invention;
Fig. 6 and Fig. 7 are the register flow path schematic diagram in call spam prevention method embodiment tetra-of the present invention;
The structural representation that Fig. 8 is calling terminal embodiment mono-of the present invention;
The structural representation that Fig. 9 is calling terminal embodiment bis-of the present invention;
The structural representation that Figure 10 is calling terminal embodiment tri-of the present invention;
The structural representation that Figure 11 is terminal called embodiment mono-of the present invention;
The structural representation that Figure 12 is server example one of the present invention;
The structural representation that Figure 13 is server example two of the present invention;
The structural representation that Figure 14 is call spam crime prevention system embodiment mono-of the present invention.
Embodiment
Embodiment mono-
The schematic flow sheet that Fig. 1 is call spam prevention method embodiment mono-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by calling terminal, and this calling terminal can be the terminal equipments such as smart mobile phone.As shown in Figure 1, the method for the present embodiment comprises:
Step 101, calling terminal are registered at call spam strick precaution center, obtain identifying code.
Particularly, terminal is opened Internet protocol, and (Internet Protocol, be called for short: IP), after the functional software of communication, at first at call spam strick precaution center, registered, so that each terminal is taken precautions against center remarks self information at call spam, obtain the identifying code that is different from other terminal.This identifying code is taken precautions against center with the terminal corresponding stored of initiating registration request at call spam; Simultaneously, this identifying code is kept in the terminal of this initiation registration request.Wherein, terminal comprises calling terminal and terminal called, and the two is relative, and the terminal of the mutual request of initiating communication is calling terminal, and the terminal of the mutual request of received communication is terminal called.
Calling terminal is registered at call spam strick precaution center, can obtain identifying code by following two kinds of modes:
Mode one, single channel obtain identifying code.
1, calling terminal sends registration request to call spam strick precaution center, carries the calling terminal title in described registration request, for example, and caller@domain.com, and calling terminal IP address;
2, calling terminal receives and stores call spam and takes precautions against center according to the calling terminal title by IP tunnel, for example, and caller domain.com, the identifying code of generation.
Mode two, binary channels are obtained identifying code.
1, calling terminal sends registration request to call spam strick precaution center, carries described calling terminal number in described registration request, for example, and 15612345678; The calling terminal title, for example, caller@domain.com; Calling terminal IP address;
2, calling terminal is by short message channel, and the mobile switch net, receive call spam and take precautions against center according to calling terminal number, and 15612345678, the first identifying code of generation;
3, calling terminal receives call spam by IP tunnel and takes precautions against center according to the calling terminal title, for example, and caller domain.com, the second identifying code of generation;
4, calling terminal adopts the first preset algorithm, and the first identifying code and the second identifying code are calculated to identifying code, and preserves.
Step 102, described calling terminal are asked to the terminal called initiating communication alternately by IP tunnel.
Wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request.Calling terminal, for example, mobile phone, after accessing Internet, ask alternately by the IP tunnel initiating communication, carry the calling terminal title in this communication interaction request, for example, caller@domain.com and calling terminal IP address, for example, 10.1.2.3, and this communication interaction request is not limited to voice call.
Step 103, described calling terminal and described terminal called are mutual, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
Particularly, after the mutual request of calling terminal initiating communication, the terminal called of its corresponding end receives this communication interaction request, obtains calling terminal title and the calling terminal IP address of carrying in this communication interaction request, and is judged whether this calling terminal is legal.
Below enumerate a kind of feasible execution mode explanation calling terminal and terminal called mutual, so that terminal called is judged whether calling terminal is legal according to identifying code:
Calling terminal, for example, caller@domain.com, receive terminal called by IP tunnel, for example, callee@domain.com, the random number sent, this random number is terminal called random generation after the communication interaction request that receives the calling terminal initiation, and for example, this random number can be aaa;
The second preset algorithm and identifying code that calling terminal prestores according to self, and random number, for example, aaa, generate the first operation result;
Calling terminal sends this first operation result to terminal called, so that terminal called judged whether calling terminal is legal according to the first operation result, if not, blocks communication interaction this time.
When terminal called is judged whether calling terminal is legal according to the first operation result, simultaneously according to by call spam, taking precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of calling terminal, and the second operation result of described random number generation, relatively whether this first operation result is consistent with the second operation result, and then judges that whether this calling terminal is legal.
The present invention is by registration and the terminal called checking whether legal to described calling terminal of calling terminal, determine whether to connect the communication interaction that described calling terminal is initiated, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
Embodiment bis-
The schematic flow sheet that Fig. 2 is call spam prevention method embodiment bis-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by terminal called, and this terminal called can be the terminal equipments such as smart mobile phone.As shown in Figure 2, the method for the present embodiment comprises:
Step 201, terminal called receive the communication interaction request that calling terminal is initiated in IP tunnel.
Wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request.This step is the operation of step 102 respective side in embodiment mono-, does not repeat them here.
Step 202, described terminal called and described calling terminal are mutual, and the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
Particularly, the calling terminal of the mutual request of initiating communication is registered and is obtained identifying code at call spam strick precaution center, be that the identifying code that this calling terminal is corresponding is all preserved at calling terminal and the call spam center of taking precautions against, according to this identifying code, by terminal called, the legitimacy to this calling terminal is judged.
On the basis of the above, below enumerate a kind of feasible execution mode explanation terminal called and calling terminal mutual, the identifying code obtained in the registration of call spam strick precaution center according to calling terminal is judged whether calling terminal is legal:
Terminal called, for example, callee@domain.com, generate random number, and for example, aaa, and be consistent in step 101;
Terminal called is by random number, and for example, aaa, send to calling terminal by IP tunnel, for example, and caller@domain.com;
Terminal called is random number, for example, aaa, and calling terminal title, for example, caller@domain.com, send to call spam to take precautions against center;
Terminal called receives the first operation result from calling terminal, and this first operation result is the second preset algorithm of prestoring according to self of calling terminal and the identifying code of self, and random number, for example, aaa, generation, concrete generative process is existing in embodiment mono-to be introduced in detail, repeats no more herein;
Terminal called receives the second operation result from call spam strick precaution center, this second operation result is that call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of calling terminal, and random number, for example, aaa, generation, concrete generative process refers to embodiment tri-, repeats no more herein;
Terminal called judges that whether the first operation result is consistent with the second operation result, if consistent, calling terminal is legal; If not, calling terminal is illegal.
In the present embodiment, terminal called is asked alternately to initiating communication, and the legitimacy of obtaining the calling terminal of identifying code in the registration of call spam strick precaution center is judged, determine whether to connect by this judged result the communication interaction that this calling terminal is initiated, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
Embodiment tri-
The schematic flow sheet that Fig. 3 is call spam prevention method embodiment tri-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by call spam strick precaution center, and this call spam is taken precautions against center can be specially server.As shown in Figure 3, the method for the present embodiment comprises:
Step 301, call spam are taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal.
In this step, terminal comprises calling terminal and terminal called, and the terminal of the mutual request of initiating communication is as calling terminal, and calling terminal and terminal called are corresponding to be existed.Calling terminal in this step and embodiment mono-is registered at call spam strick precaution center, obtain the setting of identifying code operational correspondence, call spam strick precaution center receives the registration request that calling terminal sends, generate the identifying code that is different from other terminal corresponding to calling terminal according to the calling terminal information that carries in this registration request, and be kept in the call spam strick precaution in the heart this identifying code is corresponding with the calling terminal that obtains this identifying code; Call spam is taken precautions against center and also this identifying code is returned to calling terminal, by this calling terminal, is preserved.
Particularly, call spam is taken precautions against center and can be generated identifying code according to following two kinds of modes:
Mode one, single channel generate identifying code.
1, call spam strick precaution center obtains the terminal name in registration request, for example, and caller@domain.com, and IP address of terminal;
2, call spam is taken precautions against center according to terminal name, and for example, caller domain.com, generate identifying code;
3, call spam is taken precautions against center corresponding preservation identifying code and terminal name and IP address of terminal, and by IP tunnel, this identifying code is sent to terminal.
Mode two, binary channels generate identifying code.
1, call spam strick precaution center obtains the terminal name in registration request, for example, and caller@domain.com; Termination number, for example, 15612345678; IP address of terminal;
2, call spam is taken precautions against center according to termination number, and 15612345678, generate and preserve the first identifying code, send to terminal by short message channel;
3, call spam is taken precautions against center according to terminal name, and for example, caller domain.com, generate and preserve the second identifying code, by IP tunnel, sends to terminal;
4, the call spam center of taking precautions against prestores according to self the first preset algorithm, the first identifying code and the second identifying code generate identifying code, and preserve.This first preset algorithm is identical with the first preset algorithm in embodiment mono-, and the preservation here refer to by the first identifying code, the second identifying code and identifying code corresponding with terminal be kept at call spam take precautions against in the heart.
Step 302, at terminal called, based on IP tunnel, set up with before the communicating by letter of calling terminal, described call spam strick precaution center receives the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result.
Particularly, terminal called, for example, callee@domain.com, after the communication interaction request that receives the calling terminal transmission, obtain the calling terminal title of carrying in this communication interaction request, for example, caller@domain.com, and calling terminal IP address, for example, 10.1.2.3, simultaneously, generate a random number, for example, aaa, and calling terminal title and random number are sent to strick precaution center, rubbish center.Call spam strick precaution center receives this calling terminal title and random number, and the second preset algorithm prestored according to self and corresponding identifying code and the random number of this calling terminal title, generates the second operation result.Wherein, the second preset algorithm prestored in the second preset algorithm that call spam strick precaution center prestores and calling terminal is identical.
Step 303, described call spam strick precaution center send described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
Particularly, described call spam strick precaution center sends described the second operation result to described terminal called, correspondingly, described terminal called receives this second operation result, and according to this second operation result and initiate the first operation result that the calling terminal of this communication interaction request sends and judge that whether this calling terminal is legal, and then determine whether to connect this time communication interaction.
In the present embodiment, the registration request of each terminal is accepted at call spam strick precaution center, makes and himself with each terminal, has identical identifying code; Generate the second operation result and feed back to terminal called according to this identifying code, whether the calling terminal of by terminal called, according to this second operation result judgement, initiating this communication interaction request is legal, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
It should be noted that, in all embodiment of the present invention, be terminal called to the executive agent of the proof procedure of calling terminal legitimacy, has following potential safety hazard:
1, hacker's terminal called that disguises oneself as, ceaselessly send message and take precautions against center to call spam, causes the magnanimity computing of strick precaution center;
2, hacker's terminal called that disguises oneself as, the mass data of attempt corresponding operation result by certain terminal of call spam strick precaution center feedback in communication repeatedly calculates the identifying code of this terminal.
Therefore, on the basis of above-mentioned steps, described call spam strick precaution center sends described the second operation result to before described terminal called, can also comprise: the behavior that the described call spam center of taking precautions against sends message according to described terminal called judges that whether terminal called is legal.
Particularly, whether legal by following operation judges terminal called:
Call spam strick precaution center judges whether the message number that terminal called sends in setting-up time reaches setting quantity; If the message number reaches while setting quantity, judge that whether the calling terminal of each message is identical; When if calling terminal is identical, to calling terminal, sends and confirm that whether request is abnormal with the message of checking terminal called transmission; The confirmation the result whether message returned according to calling terminal is abnormal, determine that whether terminal called is legal.Wherein, terminal called legitimate verification process is referred to step 501 in embodiment tetra-.By to the terminal called legitimate verification, avoiding the hacker to be forged into terminal called, attack call spam and take precautions against center, or the premeditated identifying code that obtains other terminal, realize the assurance of communication quality.
Embodiment tetra-
The present embodiment is mutual embodiment between calling terminal, terminal called and call spam strick precaution center.The application scenarios of the present embodiment is that calling terminal and terminal called complete registration at call spam strick precaution center, obtains identifying code separately.
The schematic flow sheet that Fig. 4 is call spam prevention method embodiment tetra-of the present invention, as shown in Figure 4, the method can comprise:
Step 401, the request of transmission communication interaction.
Calling terminal sends the communication interaction request by IP tunnel to terminal called, carries calling terminal title and calling terminal IP address in this communication interaction request.Wherein, this communication interaction is not limited to voice communication.
Step 402, obtain calling terminal title and calling terminal IP address, generate random number.
Terminal called obtains calling terminal title and the calling terminal IP address of carrying in this communication interaction request after receiving the communication interaction request that calling terminal sends by IP tunnel, simultaneously, generates a random number.
Step 403, transmission random number.
Terminal called sends to calling terminal by the random number of its generation by IP tunnel.
Step 404, generate the first operation result.
Calling terminal receives by IP tunnel the random number that terminal called sends, and identifying code and this random number that the second preset algorithm prestored according to self prestores to himself calculated, and generates the first operation result.
Step 405, send the first operation result.
Calling terminal sends the first operation result to terminal called, so that terminal called judged whether calling terminal is legal according to this first operation result, if not, blocks communication interaction this time.
Step 403-step 405 generates the related operation of the first operation result for calling terminal.
Step 406, transmission calling terminal title and random number.
Terminal called sends to call spam to take precautions against center the random number of its generation and the calling terminal title of obtaining.
Step 407, generate the second operation result.
Call spam strick precaution center receives random number and the calling terminal title that terminal called sends, and corresponding identifying code and this random number of the second preset algorithm prestored according to self this calling terminal title that himself is prestored calculated, generate the second operation result.Wherein, the second preset algorithm in this step and the second preset algorithm in step 404 are same algorithms.
Step 408, send the second operation result.
Call spam strick precaution center sends the second operation result to terminal called, so that terminal called is judged whether calling terminal is legal according to this second operation result.
Step 406-step 408 generates the related operation of the second operation result for call spam strick precaution center.Wherein, the first operation result and the second operation result can generate simultaneously, and step 403-step 405 and step 406-step 408 can executed in parallel, to improve time efficiency.
Step 409, calling terminal legitimate verification.
Terminal called receives the first operation result from calling terminal, from call spam strick precaution center, receives the second operation result; Judge that whether this first operation result is consistent with the second operation result, if consistent, determine that calling terminal is legal, performs step 410; If not, determine that calling terminal is illegal, performs step 411.
Step 410, communication interaction.
Execution is legal to this step explanation calling terminal, and terminal called is connected this communication interaction that calling terminal is initiated.
Step 411, calling terminal is added to blacklist.
Execution to this step explanation calling terminal is illegal, this communication interaction that terminal called refusal calling terminal is initiated, and calling terminal IP address is set in the blacklist of this terminal called, perform step 412 simultaneously, wherein, calling terminal IP address and calling terminal number are mutual bindings, one to one.
Step 412, report calling terminal information.
Terminal called is by illegal calling terminal information, and for example, the information such as calling terminal title and calling terminal IP address, report call spam and take precautions against center, by call spam strick precaution center, carries out subsequent treatment.
The reciprocal process that the present embodiment is taken precautions against center to calling terminal, terminal called and call spam has been described in detail, by in call spam is taken precautions against, completing registration in the heart, obtain the checking of legitimacy of the calling terminal of identifying code, determine whether to connect the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication.
In above-mentioned steps, to the executive agent of the proof procedure of calling terminal legitimacy, be terminal called, exist with potential safety hazard same in embodiment tri-.Therefore, as shown in Figure 5, on the basis of Fig. 4, call spam strick precaution center sends the second operation result to before terminal called, can also comprise:
Step 501, terminal called legitimate verification.
The behavior that the call spam center of taking precautions against sends message according to terminal called judges that whether terminal called is legal.This step can be refined as following operation:
1, call spam strick precaution center judges whether the message number that terminal called sends in setting-up time reaches setting quantity.
Take precautions against center in setting-up time when call spam, for example, 180 seconds, whether the number of the message from terminal called received reached setting quantity, for example, and 5, if carry out 2; If not, illustrate that this terminal called is legal, send the second operation result to terminal called.
If 2 message numbers reach while setting quantity, judge that whether the calling terminal of each message is identical.
If the message number reaches while setting quantity, the information whether each message comprises same calling terminal is inquired about at call spam strick precaution center, if carry out 3; If not, think that the terminal called of this forgery is the malicious attack user, the message that this terminal called IP address is refused at call spam strick precaution center receives, and refusal is connected this communication interaction, and blacklists it.
If 3 calling terminals are when identical, to described calling terminal, send and confirm that whether request is abnormal with the message of verifying described terminal called and sending.
If calling terminal is identical, call spam is taken precautions against center and is sent and confirm request to this calling terminal by mobile switch net or IP tunnel, and whether this calling terminal has been initiated the communication interaction request of this number to this terminal called in checking.
The confirmation the result whether message 4, returned according to described calling terminal is abnormal, determine that whether described terminal called is legal.
If this calling terminal confirms that result is that message is normal, call spam strick precaution center thinks that this terminal called is legal, sends the second operation result to this terminal called; If this calling terminal confirms that result is that message is abnormal, call spam strick precaution center thinks that this terminal called is for the disabled user, and the message reception of the IP address of this terminal called is refused at call spam strick precaution center, and blacklists it.
By aforesaid operations, can avoid the hacker to be forged into terminal called, attack call spam and take precautions against center, or the premeditated identifying code that obtains other terminal, realize the assurance of communication quality.
Fig. 6 and Fig. 7 are the register flow path schematic diagram in call spam prevention method embodiment tetra-of the present invention.On the basis of above-described embodiment, calling terminal is registered at call spam strick precaution center, obtain the further refinement of operation of identifying code.
As shown in Figure 6, this operation can comprise:
Step 601, described calling terminal send registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request.
Particularly, calling terminal sends registration request to call spam strick precaution center, and this registration request comprises the information such as calling terminal title and calling terminal IP address, and wherein, the calling terminal title, can be for example ABC qq.com.
After this registration request is received at call spam strick precaution center, extract calling terminal title and calling terminal IP address in this registration request, and the random generation identifying code corresponding with this calling terminal title, send to this calling terminal by IP tunnel, and preserve this identifying code.
Step 602, described calling terminal receive and store described call spam and take precautions against the identifying code that center generates according to described calling terminal title by IP tunnel.
This step is directly by IP tunnel Receipt Validation code, there is the hidden danger of easily being intercepted and captured by the hacker in single channel transmission identifying code, therefore, if consider the needs of secure communication, adopt schematic flow sheet as shown in Figure 7 to complete the registration of calling terminal at call spam strick precaution center, this register flow path can comprise:
Step 701, described calling terminal send registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request.
This step, with respect to step 601, is carried calling terminal number in registration request.
After this registration request is received at call spam strick precaution center, obtain calling terminal title, calling terminal number and calling terminal IP address in described registration request, and generate and preserve the first identifying code according to this calling terminal number, send to this calling terminal by short message channel; Generate and preserve the second identifying code according to this calling terminal title, by IP tunnel, send to this calling terminal.In addition, the first preset algorithm that the call spam center of taking precautions against prestores according to self, described the first identifying code and described the second identifying code generate identifying code, and preserve.
Step 702, described calling terminal receive described call spam by short message channel and take precautions against the first identifying code that center generates according to described calling terminal number.
Step 703, described calling terminal receive described call spam by IP tunnel and take precautions against the second identifying code that center generates according to described calling terminal title.
In above-mentioned two steps, execution sequence does not have sequential relationship, can carry out simultaneously, can first carry out one of them yet, is carrying out another.Calling terminal is by short message channel, and the mobile switch net, receive the first identifying code, by IP tunnel, receives the second identifying code, and during the binary channels transmission, the hidden danger that the hacker intercepts and captures reduces greatly, further ensures communication safety.
Step 704, described calling terminal adopt the first preset algorithm, and described the first identifying code and the second identifying code are calculated to described identifying code, and preserve.
In this step, the first preset algorithm is identical with the first preset algorithm that in step 701, call spam strick precaution center generation identifying code is used.
Embodiment five
The structural representation that Fig. 8 is calling terminal embodiment mono-of the present invention, this calling terminal can be the terminal equipments such as smart mobile phone.As shown in Figure 8, the calling terminal of the present embodiment comprises: the first Registering modules 81, the first sending module 82 and the first processing module 83.
Wherein, the first Registering modules 81, for being registered at call spam strick precaution center, obtains identifying code; The first sending module 82, for asking alternately to the terminal called initiating communication by the Internet protocol IP tunnel, carries described calling terminal title and described calling terminal IP address in described communication interaction request; The first processing module 83 is for mutual with described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
The calling terminal of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment mono-, its realize principle and technique effect similar, repeat no more herein.
In a kind of implementation, as shown in Figure 9, the first Registering modules 81 can comprise: the first transmitting element 911, for send registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request; The first receiving element 912, take precautions against for receive and store described call spam by IP tunnel the identifying code that center generates according to described calling terminal title.
In another kind of implementation, as shown in figure 10, the first Registering modules 81 can comprise: the second transmitting element 1001, for send registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request; The second receiving element 1002, take precautions against for receive described call spam by short message channel the first identifying code that center generates according to described calling terminal number; And, receive described call spam by IP tunnel and take precautions against the second identifying code that center generates according to described calling terminal title; The first computing unit 1003, for adopting the first preset algorithm, calculated described identifying code to described the first identifying code and the second identifying code, and preserve.
Further, the first processing module 83 can specifically for: receive by IP tunnel the random number that described terminal called sends; The second preset algorithm prestored according to self and described identifying code, and described random number generates the first operation result; And, send described the first operation result to described terminal called, so that described terminal called judged whether described calling terminal is legal according to described the first operation result, if not, block communication interaction this time.
The present embodiment completes the registration of calling terminal by the first Registering modules, make calling terminal and call spam strick precaution center there is identical identifying code, then, by the first sending module initiating communication, ask alternately, and first processing module and terminal called mutual, and determine whether to connect by terminal called the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication, strengthen customer experience.
Embodiment six
The structural representation that Figure 11 is terminal called embodiment mono-of the present invention, this terminal called can be the terminal equipments such as smart mobile phone, with the calling terminal of mentioning in above-described embodiment, carries out alternately.As shown in figure 11, the terminal called of the present embodiment comprises: the first receiver module 111, for receive the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request; The second processing module 112, for mutual with described calling terminal, the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
The terminal called of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment bis-, its realize principle and technique effect similar, repeat no more herein.
Further, the second processing module 112 specifically for:
Generate random number;
Described random number is sent to described calling terminal by IP tunnel;
Send to described call spam to take precautions against center described random number and described calling terminal title;
Receive the first operation result from described calling terminal, described the first operation result is the second preset algorithm of prestoring according to self of described calling terminal and the identifying code of self, and described random number generates;
Receive the second operation result from described call spam strick precaution center, described the second operation result is that described call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of described calling terminal, and the generation of described random number;
Judge that whether described the first operation result is consistent with the second operation result, if consistent, described calling terminal is legal; If not, described calling terminal is illegal.
Embodiment seven
The structural representation that Figure 12 is server example one of the present invention, as shown in figure 11, the server of the present embodiment comprises: the second Registering modules 121, the 3rd processing module 122 and the second sending module 123.
Wherein, the second Registering modules 121, the registration request sent for receiving terminal, the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal; The 3rd processing module 122, for setting up at terminal called internet protocol-based IP tunnel with before the communicating by letter of calling terminal, receive the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result; The second sending module 123, for sending described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
The server of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment tri-, its realize principle and technique effect similar, repeat no more herein.
Further, in a kind of implementation, the second Registering modules 121 can specifically for:
Obtain terminal name and IP address of terminal in described registration request;
Generate identifying code according to described terminal name;
Preserve described identifying code, and send to described terminal by IP tunnel.
Further, in another kind of implementation, the second Registering modules 121 can specifically for:
Obtain terminal name, termination number and IP address of terminal in described registration request;
Generate and preserve the first identifying code according to described termination number, by short message channel, send to described terminal;
Generate and preserve the second identifying code according to described terminal name, by IP tunnel, send to described terminal;
The first preset algorithm prestored according to self, described the first identifying code and described the second identifying code generate described identifying code, and preserve.
Closer, as shown in figure 13, server provided by the invention can also comprise: judge module 131, at the second sending module, send described the second operation result to described terminal called before, the behavior that sends message according to described terminal called judges that whether terminal called legal.
On the basis of the above, described judge module 131 can comprise:
Whether the first judging unit 1311, reach setting quantity for judging the message number that described terminal called sends in setting-up time;
The second judging unit 1312, if be yes for the first judging unit Output rusults, judge that whether the calling terminal of each message is identical;
The 3rd judging unit 1313, if be yes for the second judging unit Output rusults, send and confirm that whether request is abnormal with the message of verifying described terminal called transmission to described calling terminal;
The 4th judging unit 1314, the whether abnormal confirmation result for the message returned according to described calling terminal, determine that whether described terminal called is legal.
Embodiment eight
The structural representation that Figure 14 is call spam crime prevention system embodiment mono-of the present invention, as shown in figure 14, the call spam crime prevention system of the present embodiment comprises: calling terminal 141, terminal called 142 and server 143.Wherein, calling terminal 141 can be the calling terminal as shown in arbitrary in Fig. 8-Figure 10; Terminal called 142 can be terminal called as shown in figure 11; Server 143 can be the server as shown in Figure 12 or 13.
The present embodiment is mutual by calling terminal, terminal called and server, calling terminal completes registration in server, the checking of terminal called to the legitimacy of the calling terminal that obtains identifying code, determine whether to connect the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication.
One of ordinary skill in the art will appreciate that: realize that the hardware that all or part of step of above-mentioned each embodiment of the method can be relevant by program command completes.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: above each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to aforementioned each embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: its technical scheme that still can put down in writing aforementioned each embodiment is modified, or some or all of technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the scope of various embodiments of the present invention technical scheme.

Claims (23)

1. a call spam prevention method, is characterized in that, comprising:
Calling terminal is registered at call spam strick precaution center, obtains identifying code;
Described calling terminal is asked to the terminal called initiating communication alternately by the Internet protocol IP tunnel, carries described calling terminal title and described calling terminal IP address in described communication interaction request;
Described calling terminal and described terminal called are mutual, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
2. method according to claim 1, is characterized in that, described calling terminal is registered at call spam strick precaution center, obtains identifying code, comprising:
Described calling terminal sends registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request;
Described calling terminal receives and stores described call spam and takes precautions against the identifying code that center generates according to described calling terminal title by IP tunnel.
3. method according to claim 1, is characterized in that, described calling terminal is registered at call spam strick precaution center, obtains identifying code, comprising:
Described calling terminal sends registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request;
Described calling terminal receives described call spam by short message channel and takes precautions against the first identifying code that center generates according to described calling terminal number;
Described calling terminal receives described call spam by IP tunnel and takes precautions against the second identifying code that center generates according to described calling terminal title;
Described calling terminal adopts the first preset algorithm, and described the first identifying code and the second identifying code are calculated to described identifying code, and preserves.
4. according to the described method of claim 1-3 any one, it is characterized in that, described calling terminal and described terminal called are mutual so that described terminal called according to described identifying code to described calling terminal whether legal judge comprise:
Described calling terminal receives by IP tunnel the random number that described terminal called sends;
The second preset algorithm that described calling terminal prestores according to self and described identifying code, and described random number generates the first operation result;
Described calling terminal sends described the first operation result to described terminal called, so that described terminal called judged whether described calling terminal is legal according to described the first operation result, if not, blocks communication interaction this time.
5. a call spam prevention method, is characterized in that, comprising:
Terminal called receives the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carries described calling terminal title and described calling terminal IP address in described communication interaction request;
Described terminal called and described calling terminal are mutual, and the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
6. method according to claim 5, is characterized in that, described terminal called and described calling terminal are mutual, the identifying code obtained in call spam strick precaution center registration according to described calling terminal to described calling terminal whether legal judge comprise:
Described terminal called generates random number;
Described terminal called sends to described calling terminal by described random number by IP tunnel;
Described terminal called sends to described call spam to take precautions against center described random number and described calling terminal title;
Described terminal called receives the first operation result from described calling terminal, described the first operation result is the second preset algorithm of prestoring according to self of described calling terminal and the identifying code of self, and described random number generates;
Described terminal called receives the second operation result from described call spam strick precaution center, described the second operation result is that described call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of described calling terminal, and the generation of described random number;
Described terminal called judges that whether described the first operation result is consistent with the second operation result, if consistent, described calling terminal is legal; If not, described calling terminal is illegal.
7. a call spam prevention method, is characterized in that, comprising:
Call spam is taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal;
At terminal called internet protocol-based IP tunnel, set up with before the communicating by letter of calling terminal, described call spam strick precaution center receives the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result;
Described call spam strick precaution center sends described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
8. method according to claim 7, is characterized in that, call spam is taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal, comprising:
Call spam strick precaution center obtains terminal name and the IP address of terminal in described registration request;
Described call spam is taken precautions against center and is generated identifying code according to described terminal name;
Described identifying code is preserved at described call spam strick precaution center, and sends to described terminal by IP tunnel.
9. method according to claim 7, is characterized in that, call spam is taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal, comprising:
Call spam strick precaution center obtains terminal name, termination number and the IP address of terminal in described registration request;
Described call spam is taken precautions against center and is generated and preserve the first identifying code according to described termination number, by short message channel, sends to described terminal;
Described call spam is taken precautions against center and is generated and preserve the second identifying code according to described terminal name, by IP tunnel, sends to described terminal;
The first preset algorithm, described the first identifying code and described the second identifying code that the described call spam center of taking precautions against prestores according to self generate described identifying code, and preserve.
10. according to the described method of claim 7-9 any one, it is characterized in that, described call spam strick precaution center sends described the second operation result to before described terminal called, also comprises:
The behavior that the described call spam center of taking precautions against sends message according to described terminal called judges that whether terminal called is legal.
11. method according to claim 10, is characterized in that, the behavior that the described call spam center of taking precautions against sends message according to described terminal called judges that whether terminal called is legal, comprising:
Described call spam strick precaution center judges whether the message number that described terminal called sends in setting-up time reaches setting quantity;
If the message number reaches while setting quantity, judge that whether the calling terminal of each message is identical;
When if calling terminal is identical, to described calling terminal, sends and confirm that whether request is abnormal with the message of verifying described terminal called transmission;
The confirmation the result whether message returned according to described calling terminal is abnormal, determine that whether described terminal called is legal.
12. a calling terminal, is characterized in that, comprising:
The first Registering modules, for being registered at call spam strick precaution center, obtain identifying code;
The first sending module, for asking alternately to the terminal called initiating communication by the Internet protocol IP tunnel, carry described calling terminal title and described calling terminal IP address in described communication interaction request;
The first processing module, for mutual with described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
13. calling terminal according to claim 12, is characterized in that, described the first Registering modules comprises:
The first transmitting element, for send registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request;
The first receiving element, take precautions against for receive and store described call spam by IP tunnel the identifying code that center generates according to described calling terminal title.
14. calling terminal according to claim 12, is characterized in that, described the first Registering modules comprises:
The second transmitting element, for send registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request;
The second receiving element, take precautions against for receive described call spam by short message channel the first identifying code that center generates according to described calling terminal number; And, receive described call spam by IP tunnel and take precautions against the second identifying code that center generates according to described calling terminal title;
The first computing unit, for adopting the first preset algorithm, calculated described identifying code to described the first identifying code and the second identifying code, and preserve.
15. according to the described calling terminal of claim 12-14 any one, it is characterized in that, described the first processing module specifically for:
Receive by IP tunnel the random number that described terminal called sends; The second preset algorithm prestored according to self and described identifying code, and described random number generates the first operation result; And, send described the first operation result to described terminal called, so that described terminal called judged whether described calling terminal is legal according to described the first operation result, if not, block communication interaction this time.
16. a terminal called, is characterized in that, comprising:
The first receiver module, for receive the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request;
The second processing module, for mutual with described calling terminal, the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
17. terminal called according to claim 16, is characterized in that, described the second processing module specifically for:
Generate random number;
Described random number is sent to described calling terminal by IP tunnel;
Send to described call spam to take precautions against center described random number and described calling terminal title;
Receive the first operation result from described calling terminal, described the first operation result is the second preset algorithm of prestoring according to self of described calling terminal and the identifying code of self, and described random number generates;
Receive the second operation result from described call spam strick precaution center, described the second operation result is that described call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of described calling terminal, and the generation of described random number;
Judge that whether described the first operation result is consistent with the second operation result, if consistent, described calling terminal is legal; If not, described calling terminal is illegal.
18. a server, is characterized in that, comprising:
The second Registering modules, the registration request sent for receiving terminal, the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal;
The 3rd processing module, for setting up at terminal called internet protocol-based IP tunnel with before the communicating by letter of calling terminal, receive the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result;
The second sending module, for sending described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
19. server according to claim 18, is characterized in that, described the second Registering modules specifically for:
Obtain terminal name and IP address of terminal in described registration request;
Generate identifying code according to described terminal name;
Preserve described identifying code, and send to described terminal by IP tunnel.
20. server according to claim 18, is characterized in that, described the second Registering modules specifically for:
Obtain terminal name, termination number and IP address of terminal in described registration request;
Generate and preserve the first identifying code according to described termination number, by short message channel, send to described terminal;
Generate and preserve the second identifying code according to described terminal name, by IP tunnel, send to described terminal;
The first preset algorithm prestored according to self, described the first identifying code and described the second identifying code generate described identifying code, and preserve.
21. according to the described server of claim 18-20 any one, it is characterized in that, also comprise:
Judge module, at the second sending module, send described the second operation result to described terminal called before, the behavior that sends message according to described terminal called judges that whether terminal called legal.
22. server according to claim 21, is characterized in that, described judge module comprises:
Whether the first judging unit, reach setting quantity for judging the message number that described terminal called sends in setting-up time;
The second judging unit, if be yes for the first judging unit Output rusults, judge that whether the calling terminal of each message is identical;
The 3rd judging unit, if be yes for the second judging unit Output rusults, send and confirm that whether request is abnormal with the message of verifying described terminal called transmission to described calling terminal;
The 4th judging unit, the whether abnormal confirmation result for the message returned according to described calling terminal, determine that whether described terminal called is legal.
23. a call spam crime prevention system, is characterized in that, comprising:
As the described calling terminal of claim 12-15 any one, terminal called as described as claim 16 or 17 with as the described server of claim 18-22 any one.
CN201310325820.3A 2013-07-30 2013-07-30 Junk call preventing method, device and system Active CN103428376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310325820.3A CN103428376B (en) 2013-07-30 2013-07-30 Junk call preventing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310325820.3A CN103428376B (en) 2013-07-30 2013-07-30 Junk call preventing method, device and system

Publications (2)

Publication Number Publication Date
CN103428376A true CN103428376A (en) 2013-12-04
CN103428376B CN103428376B (en) 2015-07-22

Family

ID=49652527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310325820.3A Active CN103428376B (en) 2013-07-30 2013-07-30 Junk call preventing method, device and system

Country Status (1)

Country Link
CN (1) CN103428376B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469716A (en) * 2014-12-01 2015-03-25 中国联合网络通信集团有限公司 Registering industrial rubbish short message intercepting method and system
CN104601783A (en) * 2015-01-27 2015-05-06 深圳市中兴移动通信有限公司 Communication processing method based on subjective judgment, mobile terminal and system
CN105306409A (en) * 2014-05-30 2016-02-03 展讯通信(上海)有限公司 Call verification system and method and mobile terminal
CN107124519A (en) * 2017-04-26 2017-09-01 林海 A kind of means of communication based on cell phone address book
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132641A (en) * 2006-12-30 2008-02-27 陈鹏 Authentication method for telephone subscriber identity
CN101540758A (en) * 2008-03-19 2009-09-23 华为技术有限公司 Method, device and system for inhibiting waste service
US20120321064A1 (en) * 2011-06-17 2012-12-20 Asd Inc. System and Method Employed by Answering Service to Dynamically Shield Against Unwanted Telephonic Contact Attempts

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132641A (en) * 2006-12-30 2008-02-27 陈鹏 Authentication method for telephone subscriber identity
CN101540758A (en) * 2008-03-19 2009-09-23 华为技术有限公司 Method, device and system for inhibiting waste service
US20120321064A1 (en) * 2011-06-17 2012-12-20 Asd Inc. System and Method Employed by Answering Service to Dynamically Shield Against Unwanted Telephonic Contact Attempts

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105306409A (en) * 2014-05-30 2016-02-03 展讯通信(上海)有限公司 Call verification system and method and mobile terminal
CN104469716A (en) * 2014-12-01 2015-03-25 中国联合网络通信集团有限公司 Registering industrial rubbish short message intercepting method and system
CN104469716B (en) * 2014-12-01 2018-04-27 中国联合网络通信集团有限公司 A kind of hold-up interception method and system of registration class industry junk short message
CN104601783A (en) * 2015-01-27 2015-05-06 深圳市中兴移动通信有限公司 Communication processing method based on subjective judgment, mobile terminal and system
CN107124519A (en) * 2017-04-26 2017-09-01 林海 A kind of means of communication based on cell phone address book
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system

Also Published As

Publication number Publication date
CN103428376B (en) 2015-07-22

Similar Documents

Publication Publication Date Title
CN107733852B (en) A kind of auth method and device, electronic equipment
CN101594269B (en) Method, device and gateway device for detecting abnormal connection
TWI468002B (en) Method and system for authentication
CN103051633B (en) A kind of method and apparatus of defensive attack
EP2632103A1 (en) Ims multimedia communication method and system, terminal and ims core network
CN103428376B (en) Junk call preventing method, device and system
CN102572815B (en) Method, system and device for processing terminal application request
CN104185176B (en) A kind of long-range initial method of Internet of Things virtual user identification module card and system
CN109345245B (en) Short message verification method, device, network and storage medium based on block chain
WO2006136028A1 (en) System and method of registering a mobile device identifier as an instance id
KR20070077062A (en) System and method for spam detection
CN102802150B (en) phone number verification method, system and terminal
CN101877850B (en) Access authentication method and device
JP2008148310A (en) Method and system for managing multimedia session
CN101771564A (en) Method, device and system for processing session context
CN108881233A (en) anti-attack processing method, device, equipment and storage medium
Castiglione et al. Do you trust your phone?
CN101341700A (en) Method and arrangement for verifying an originating address transmitted in a call request for the purpose of establishing a communications link in an IP communications network
CN103973543B (en) Instant communicating method and device
CN101621455A (en) Method for managing network equipment, network management station and network management equipment
Peeters et al. SMS OTP security (SOS) hardening SMS-based two factor authentication
CN104753872A (en) Authentication method, authentication platform, service platform, network elements and system
CN113438081B (en) Authentication method, device and equipment
Zhang et al. Blocking attacks on SIP VoIP proxies caused by external processing
CN103947173A (en) Method and system for managing the communication between two users

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant