CN104735272A - Crank call interception method and system - Google Patents

Crank call interception method and system Download PDF

Info

Publication number
CN104735272A
CN104735272A CN201310722846.1A CN201310722846A CN104735272A CN 104735272 A CN104735272 A CN 104735272A CN 201310722846 A CN201310722846 A CN 201310722846A CN 104735272 A CN104735272 A CN 104735272A
Authority
CN
China
Prior art keywords
harassing
clawback
wrecking
threshold value
predetermined threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310722846.1A
Other languages
Chinese (zh)
Other versions
CN104735272B (en
Inventor
任中岗
夏玉溪
周松
王捷
柳剑峰
郭光健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Guizhou Co Ltd
Original Assignee
China Mobile Group Guizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Guizhou Co Ltd filed Critical China Mobile Group Guizhou Co Ltd
Priority to CN201310722846.1A priority Critical patent/CN104735272B/en
Publication of CN104735272A publication Critical patent/CN104735272A/en
Application granted granted Critical
Publication of CN104735272B publication Critical patent/CN104735272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a crank call interception method. The method comprises the steps that a phone bill file is obtained, a user number in the phone bill file is analyzed, it is confirmed that the user number does not exist in a preset white list, it is confirmed that the user number conforms to a preset condition, and the user number is confirmed to be a suspected number; the suspected number is dialed back in a reverse direction, and the suspected number is confirmed to be a crank call number according to the dial-back result; a limiting command is sent to an application server, and the application server conducts service limitation to the crank call number; the limiting command comprises the crank call number. A crank call interception system is further disclosed simultaneously. By the adoption of the technical scheme of the method and the system, the crank call interception efficiency is raised, the user experience is improved, secondary operation of Internet telephony is effectively prevented, and losses of a user caused by the secondary operation of the Internet telephony are avoided.

Description

A kind of hold-up interception method of harassing call and system
Technical field
The present invention relates to the communication technology, be specifically related to a kind of hold-up interception method and system of harassing call.
Background technology
Present stage, the hold-up interception method for harassing call is all generally the process of being blocked by screening system, manual confirmation, artificial interception and manually being lifted a blockade, and is the artificial scheme participating in more simple poor efficiency.The effective solution of a kind of automatic identification, confirmation and interception automatically automatically is not also proposed at present.
Summary of the invention
For solving the technical problem of existing existence, the embodiment of the present invention provides a kind of hold-up interception method and system of harassing call, can realize automatic identification, automatically confirmation and automatically tackle function.
For achieving the above object, the technical scheme of the embodiment of the present invention is achieved in that
Embodiments provide a kind of hold-up interception method of harassing call, described method comprises:
Obtain CDR file, analyze the Subscriber Number in described CDR file, determine described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number;
Doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number according to clawback result;
Send restriction instruction to application server, by described application server, business restriction is carried out to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
In such scheme, describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
In such scheme, described according to clawback result determine described doubtful number for harassing and wrecking numbers, comprising:
When described clawback result is when clawback is obstructed or clawback directly breaks, determine that described doubtful number is for harassing and wrecking number;
When described clawback result is normal ON, by carrying out communication process recording, the voice document generated mates with the voice document in the sound bank preset, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number;
When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number.
In such scheme, described method also comprises:
Receive the instruction response results that returns of application server, when described instruction response results be instruction run succeeded time, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
In such scheme, the business restriction that described restriction instruction also comprises described harassing and wrecking number recovers the time limit.
In such scheme, described acquisition ticket, comprising: the application server address according to presetting logs in described application server, from described application server, obtain CDR file.
The embodiment of the present invention additionally provides a kind of intercepting system of harassing call, and described system comprises: bill record collection unit, ticket analytic unit, oppositely testing unit and instruction Transmit-Receive Unit; Wherein,
Described bill record collection unit, for gathering CDR file;
Described ticket analytic unit, for reading the CDR file in described bill record collection unit, analyze the Subscriber Number in described CDR file, determine described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number, described doubtful number is sent to described reverse testing unit;
According to clawback result, described reverse testing unit, for doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number;
Described instruction Transmit-Receive Unit, for sending restriction instruction to application server, carries out business restriction by described application server to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
In such scheme, describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
In such scheme, described reverse testing unit, for being when clawback is obstructed or clawback directly breaks when described clawback result, determines that described doubtful number is for harassing and wrecking number; When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number.
In such scheme, described system also comprises Speech comparison unit;
Described reverse testing unit, also for when described clawback result is normal ON, is sent to described Speech comparison unit by voice document communication process being carried out to recording generation;
Described Speech comparison file, mates with the voice document in the sound bank preset for the voice document sent by described reverse testing unit, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number.
In such scheme, described system also comprises information notification unit;
Described instruction Transmit-Receive Unit, also for receiving the instruction response results that application server returns;
Described information notification unit, for when the instruction response results that described instruction Transmit-Receive Unit receives be instruction run succeeded time, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
In such scheme, described bill record collection unit, for logging in described application server according to the application server address preset, obtains CDR file from described application server.
The technical scheme that the embodiment of the present invention provides, harassing and wrecking number is confirmed by system Preliminary screening, secondary system, and harassing and wrecking number is tackled, achieve the automatic identification to harassing call, automatically confirmation and automatically tackle, avoid the process of manual confirmation, artificial interception, save human cost, improve the intercepting efficiency of harassing call, improve the experience of user, and effectively preventing the secondary operation of the networking telephone, the secondary avoided due to the networking telephone runs the loss brought to user.
Accompanying drawing explanation
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention;
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention.
Embodiment
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention, and as shown in Figure 1, under normal circumstances, Generic End-User 11 accesses to IMS network by access device 12; And produce the network architecture of harassing call, usually in the network of access side, proxy server 13 is set up, described proxy server 13 is by being connected directly to IP multimedia system (IMS, IP Multimedia Subsystem) network or by integrated access equipment (IAD, Integrated Access Device)/subscriber exchange (PBX, Private BranchExchange) etc. access device 12 be connected to IMS network, downwards as the server of personal computer (PC, PersonalComputer) network telephone terminal 14 or cell phone network telephone terminal 15; In described proxy server 13, be equipped with a number resource pond, when having endpoint registration to described proxy server 13 and having traffic demand, described proxy server 13 to be conversed Random assignment vacant number resource for user at every turn.Network telephone service supplier, by arranging corresponding charging policy, carries out charging for per call, to seek exorbitant profit, in the embodiment of the present invention, described phenomenon is called the secondary operation of IMS network phone.The networking telephone runed by secondary has following feature: the caller call frequency is high especially, the incoming call frequency is low especially, the caller air time is long especially, incoming call time short especially, reverse clawback is abnormal etc.Therefore, as long as the Subscriber Number meeting above-mentioned feature can be identified, just can determine that described Subscriber Number is the Subscriber Number of harassing call, send instructions further to business platform and the call function of described Subscriber Number is closed, realize the function of shielding harassing call.
Below in conjunction with drawings and the specific embodiments, the present invention is further detailed explanation.
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention, as shown in Figure 2, comprises the following steps:
Step 201: obtain CDR file.
Here, the present embodiment can according to the address registration of the described application server pre-set application server, from described application server, download CDR file; Concrete, from application server, obtain CDR file by file transfer protocol (FTP) (FTP, File Transfer Protocol) downloading mode.
Preferably, described acquisition CDR file can pre-set the time interval, such as 5 seconds, obtains ticket, and be stored in assigned catalogue by the ticket of acquisition by the described time interval.
Wherein, described CDR file comprises Subscriber Number, air time, the duration of call, caller and the information such as called.
Step 202: analyze the Subscriber Number in described CDR file, determines described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number.
Concrete, the ticket of acquisition can be read in real time, judge that in the white list whether Subscriber Number in described ticket is arranged in preliminary election, the Subscriber Number in described white list is defined as the Subscriber Number of validated user; When the result judged is as being, next ticket of Direct Analysis; When the result judged is no, judges whether described Subscriber Number meets pre-conditioned, when the result judged is as being, determining that described Subscriber Number is doubtful number.
Here, according to the feature of the networking telephone of secondary operation, comprising: the features such as the caller call frequency is high especially, the incoming call frequency is low especially, the caller air time is long especially, the incoming call time is short especially arrange pre-conditioned.Describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
Wherein, described pre-conditioned between logical relation can flexible configuration according to the actual requirements.
Such as, according to Subscriber Number at T(T>0) ticket that produces in sky adds up.If the caller number of times of certain user's number is more than N within the described period, and (or) the total duration of call in the described period is more than K, and the ratio of called number of times and caller number of times is less than M, then judge that described Subscriber Number is as doubtful number.
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention, as shown in Figure 3, comprises the following steps:
Step 301: get (t, t+T), (t+P, t+P+T) successively ... the ticket of (t+nP, t+nP+T) period.
In the present embodiment, T represents the ticket obtained in every T time section; P represents that each time interval obtaining ticket is P; N represents the number of times obtaining ticket.
Step 302: respectively the institute's number number of calls in every T time section except the Subscriber Number in default list, call duration are added up;
Step 303: judge whether caller number of times is greater than N; Or caller number of times whether is greater than N and/or whether the total duration of caller is greater than K, when the result judged is as being, continue to perform step 304; Otherwise, process ends.
Step 304: judge whether the ratio of called number of times and caller number of times is greater than M when the result judged is as being, performs step 305; Otherwise, process ends.
Step 305: marking described Subscriber Number is doubtful number.
In the present embodiment, the deterministic process of described caller number of times and the total duration of caller and between logical relation can according to actual conditions flexible configuration.
According to clawback result, step 203: doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number.
Here, described according to clawback result determine described doubtful number for harassing and wrecking numbers, comprising:
When described clawback result is when clawback is obstructed or clawback directly breaks, determine that described doubtful number is for harassing and wrecking number; Here, the obstructed or clawback of described clawback directly breaks to show as does not have ring-back tone or does not have the scenes such as color bell sound or clawback directly break;
When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number;
When described clawback result is normal ON, by carrying out communication process recording, the voice document generated mates with the voice document in the sound bank preset, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number.
Here, confirmed abnormal speech file is stored in described sound bank, the voice document that communication process recording generates is mated with the voice document in described sound bank, the match is successful for the voice document determined in institute's voice file and described sound bank by coupling conversational nature information, matching process described here is prior art, repeats no more herein.
Step 204: send restriction instruction to application server, by described application server, business restriction is carried out to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
In the present embodiment, the harassing and wrecking number got is sent to application server by restriction instruction, by described application server business restriction is carried out to described harassing and wrecking number or add blacklist process; Described business restriction can be call business restriction etc.; Wherein, the business restriction that described restriction instruction also comprises described harassing and wrecking number recovers time limit or blacklist releasing time limit, so that the system that can realize automatically terminates the blockade to described harassing and wrecking number, avoids being removed by manual type, improves operating efficiency.
Here, send restriction instruction to after application server, receive the instruction response results that application server returns, when described instruction response results be instruction run succeeded time, described harassing and wrecking number is sent to business support system, send information by described business support system to described harassing and wrecking number, be limited with the business of this number of user reminding described harassing and wrecking number, make Consumer's Experience hommization more;
When described instruction response results be instruction perform unsuccessfully time, record corresponding daily record.
Wherein, if certain doubtful number is repeatedly judged to harass number, then the initial time of the business restriction of described harassing and wrecking number is last determination time.
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention, and as shown in Figure 4, described system comprises: bill record collection unit 41, ticket analytic unit 42, oppositely testing unit 43 and instruction Transmit-Receive Unit 45; Wherein,
Described bill record collection unit 41, for gathering CDR file;
Described ticket analytic unit 42, for reading the CDR file in described bill record collection unit 41, analyze the Subscriber Number in described CDR file, determine described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number, described doubtful number is sent to described reverse testing unit 43;
According to clawback result, described reverse testing unit 43, for doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number;
Described instruction Transmit-Receive Unit 45, for sending restriction instruction to application server, carries out business restriction by described application server to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
Wherein, describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
Preferably, described reverse testing unit 43, for being when clawback is obstructed or clawback directly breaks when described clawback result, determines that described doubtful number is for harassing and wrecking number; When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number.
Preferably, described system also comprises Speech comparison unit 44;
Described reverse testing unit 43, also for when described clawback result is normal ON, is sent to described Speech comparison unit 44 by voice document communication process being carried out to recording generation;
Described Speech comparison file 44, mate with the voice document in the sound bank preset for the voice document that sent by described reverse testing unit 43, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number.
Preferably, described system also comprises information notification unit 46;
Described instruction Transmit-Receive Unit 45, also for receiving the instruction response results that application server returns;
Described information notification unit 46, for when the instruction response results that described instruction Transmit-Receive Unit 45 receives be instruction run succeeded time, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
Preferably, described bill record collection unit 41, for logging in described application server according to the application server address preset, obtains ticket from described application server.
Concrete, bill record collection unit 41 can log in described application server according to the application server address preset, from described application server, obtain ticket; Ticket analytic unit 42 reads the ticket in described bill record collection unit 41, judges that in the white list whether Subscriber Number in described ticket is arranged in preliminary election, the Subscriber Number in described white list is defined as the Subscriber Number of validated user; When the result judged is as being, next ticket of Direct Analysis; When the result judged is no, judges whether described Subscriber Number meets pre-conditioned, when the result judged is as being, determine that described Subscriber Number is doubtful number, described doubtful number is sent to described reverse testing unit 43;
Doubtful number is carried out reverse clawback by described reverse testing unit 43, when described clawback result is when clawback is obstructed or clawback directly breaks, determines that described doubtful number is for harassing and wrecking number; When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number, is sent to instruction Transmit-Receive Unit 45 by described harassing and wrecking number;
When described clawback result is normal ON, voice document communication process being carried out to recording generation is delivered to described Speech comparison unit 44, the voice document that described reverse testing unit 43 sends by described Speech comparison file 44 mates with the voice document in the sound bank preset, doubtful number corresponding for the voice document that the match is successful is defined as harass number, described harassing and wrecking number is sent to instruction Transmit-Receive Unit 45;
Described harassing and wrecking number is sent to application server by restriction instruction by instruction Transmit-Receive Unit 45, carries out business restriction by described application server to described harassing and wrecking number; When the response results that described application server return instruction runs succeeded, described harassing and wrecking number is sent to information notification unit 46, by described information notification unit 46, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of hardware embodiment, software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.

Claims (12)

1. a hold-up interception method for harassing call, is characterized in that, described method comprises:
Obtain CDR file, analyze the Subscriber Number in described CDR file, determine described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number;
Doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number according to clawback result;
Send restriction instruction to application server, by described application server, business restriction is carried out to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
2. method according to claim 1, is characterized in that, describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
3. method according to claim 1, is characterized in that, described according to clawback result determine described doubtful number for harassing and wrecking numbers, comprising:
When described clawback result is when clawback is obstructed or clawback directly breaks, determine that described doubtful number is for harassing and wrecking number;
When described clawback result is normal ON, by carrying out communication process recording, the voice document generated mates with the voice document in the sound bank preset, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number;
When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number.
4. method according to claim 1, is characterized in that, described method also comprises:
Receive the instruction response results that returns of application server, when described instruction response results be instruction run succeeded time, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
5. method according to claim 1, is characterized in that, the business restriction that described restriction instruction also comprises described harassing and wrecking number recovers the time limit.
6. method according to claim 1, is characterized in that, described acquisition ticket, comprising: the application server address according to presetting logs in described application server, from described application server, obtain CDR file.
7. an intercepting system for harassing call, is characterized in that, described system comprises: bill record collection unit, ticket analytic unit, oppositely testing unit and instruction Transmit-Receive Unit; Wherein,
Described bill record collection unit, for gathering CDR file;
Described ticket analytic unit, for reading the CDR file in described bill record collection unit, analyze the Subscriber Number in described CDR file, determine described Subscriber Number not in the white list pre-set, and when determining that described Subscriber Number meets pre-conditioned, described Subscriber Number is defined as doubtful number, described doubtful number is sent to described reverse testing unit;
According to clawback result, described reverse testing unit, for doubtful number is carried out reverse clawback, determines that described doubtful number is for harassing and wrecking number;
Described instruction Transmit-Receive Unit, for sending restriction instruction to application server, carries out business restriction by described application server to described harassing and wrecking number; Described restriction instruction comprises described harassing and wrecking number.
8. system according to claim 7, is characterized in that, describedly pre-conditionedly to comprise: in preset period of time, the caller talk times of described Subscriber Number is greater than the first predetermined threshold value; Or,
The caller talk times of described Subscriber Number is greater than the first predetermined threshold value, and the caller duration of call of described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value; Or,
The caller duration of call that the caller talk times of described Subscriber Number is greater than the first predetermined threshold value or described Subscriber Number is greater than the second predetermined threshold value, and the ratio of the incoming call number of times of described Subscriber Number and caller talk times is less than the 3rd predetermined threshold value.
9. system according to claim 7, is characterized in that, described reverse testing unit, for being when clawback is obstructed or clawback directly breaks when described clawback result, determines that described doubtful number is for harassing and wrecking number; When described clawback result is for having ring-back tone but not connecting, periodically clawback is carried out to described doubtful number, when clawback number of times reaches the 4th predetermined threshold value, determine that described doubtful number is for harassing and wrecking number.
10. system according to claim 7, is characterized in that, described system also comprises Speech comparison unit;
Described reverse testing unit, also for when described clawback result is normal ON, is sent to described Speech comparison unit by voice document communication process being carried out to recording generation;
Described Speech comparison file, mates with the voice document in the sound bank preset for the voice document sent by described reverse testing unit, and doubtful number corresponding for the voice document that the match is successful is defined as harassing and wrecking number.
11. systems according to claim 7, is characterized in that, described system also comprises information notification unit;
Described instruction Transmit-Receive Unit, also for receiving the instruction response results that application server returns;
Described information notification unit, for when the instruction response results that described instruction Transmit-Receive Unit receives be instruction run succeeded time, described harassing and wrecking number is sent to business support system, sends information by described business support system to described harassing and wrecking number.
12. systems according to claim 7, is characterized in that, described bill record collection unit, for logging in described application server according to the application server address preset, from described application server, obtain CDR file.
CN201310722846.1A 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call Active CN104735272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310722846.1A CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310722846.1A CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Publications (2)

Publication Number Publication Date
CN104735272A true CN104735272A (en) 2015-06-24
CN104735272B CN104735272B (en) 2018-03-23

Family

ID=53458694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310722846.1A Active CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Country Status (1)

Country Link
CN (1) CN104735272B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017147804A1 (en) * 2016-03-02 2017-09-08 吴伟东 Cellphone application communication blocking method and system
CN108366173A (en) * 2018-01-05 2018-08-03 腾讯科技(深圳)有限公司 A kind of phone recognition methods, relevant device and system
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN109698885A (en) * 2017-10-20 2019-04-30 中国移动通信集团公司 A kind of processing method of call request, device, network side server and computer storage medium
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device
WO2019134441A1 (en) * 2018-01-02 2019-07-11 中兴通讯股份有限公司 Method and device for discovering nuisance call in volte
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN114710590A (en) * 2022-03-28 2022-07-05 恒安嘉新(北京)科技股份公司 Crank call detection method, device, equipment and medium
CN115580680A (en) * 2021-06-21 2023-01-06 中国移动通信集团重庆有限公司 Call restriction method, device, system, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132438A (en) * 2007-03-20 2008-02-27 中国移动通信集团江苏有限公司 Method for screen selecting and catching vicious disturbing calls
US20110135069A1 (en) * 2009-12-03 2011-06-09 Hitachi, Ltd. Phone conversation recording system using call control and functions of phone conversation recording
CN202231767U (en) * 2011-01-26 2012-05-23 北京炎强通信技术有限公司 Harassing call identifying system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132438A (en) * 2007-03-20 2008-02-27 中国移动通信集团江苏有限公司 Method for screen selecting and catching vicious disturbing calls
US20110135069A1 (en) * 2009-12-03 2011-06-09 Hitachi, Ltd. Phone conversation recording system using call control and functions of phone conversation recording
CN202231767U (en) * 2011-01-26 2012-05-23 北京炎强通信技术有限公司 Harassing call identifying system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017147804A1 (en) * 2016-03-02 2017-09-08 吴伟东 Cellphone application communication blocking method and system
CN109698885A (en) * 2017-10-20 2019-04-30 中国移动通信集团公司 A kind of processing method of call request, device, network side server and computer storage medium
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device
CN109995707B (en) * 2017-12-29 2021-11-02 中国移动通信集团陕西有限公司 Method and device for preventing harassment and DDOS (distributed denial of service) attack of high-definition voice
WO2019134441A1 (en) * 2018-01-02 2019-07-11 中兴通讯股份有限公司 Method and device for discovering nuisance call in volte
CN108366173A (en) * 2018-01-05 2018-08-03 腾讯科技(深圳)有限公司 A kind of phone recognition methods, relevant device and system
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN115580680A (en) * 2021-06-21 2023-01-06 中国移动通信集团重庆有限公司 Call restriction method, device, system, electronic equipment and storage medium
CN114710590A (en) * 2022-03-28 2022-07-05 恒安嘉新(北京)科技股份公司 Crank call detection method, device, equipment and medium

Also Published As

Publication number Publication date
CN104735272B (en) 2018-03-23

Similar Documents

Publication Publication Date Title
CN104735272A (en) Crank call interception method and system
WO2016197675A1 (en) Method and apparatus for identifying crank call
CN102917105B (en) Call information processing method and terminal equipment
CN102244592B (en) Network service quality testing system, method, testing center and testing terminal
CN101291362B (en) Harassing call preventing method in mobile phone calling process
CN109698885B (en) Call request processing method and device, network side server and computer storage medium
CN102892117A (en) Method and system for monitoring crank call
CN101472007A (en) Method and system for determining disturbance telephone
CN102143461A (en) Intelligent call forwarding method and device
CN104660809A (en) Answer management method and device for incoming call of private contact person
RU2429589C2 (en) Method of detecting fraud during roaming connections in mobile communication networks
CN101127949A (en) A method for realizing instant recording service based on mobile communication network
US10701205B2 (en) Communications network
CN109962893A (en) A kind of intelligent call method and its relevant device
CN109246316A (en) A kind of call processing method and system
CN109995950A (en) Method, system, equipment and the medium of telephone outbound call
JP2014504058A (en) Network device, called terminal, and method for processing a third-party call
CN114169438A (en) Telecommunication network fraud identification method, device, equipment and storage medium
EP2385726B1 (en) Apparatus and method for controlling amount of concurrent calls
CN1288874C (en) PHS system authentication method
CN104869262A (en) Method and device for intercepting terminal blacklist
CN106453927A (en) A number state automatic identification method and apparatus based on a PSTN network
CN103888923A (en) Call proceeding method, system and device applied to virtual private mobile network
CN110351439B (en) Telephone traffic processing method and system
CN111064850A (en) System and method for realizing prevention, control and reminding of crank calls based on communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant