CN104821938B - A kind of service quality control system based on the networking telephone - Google Patents

A kind of service quality control system based on the networking telephone Download PDF

Info

Publication number
CN104821938B
CN104821938B CN201510141988.8A CN201510141988A CN104821938B CN 104821938 B CN104821938 B CN 104821938B CN 201510141988 A CN201510141988 A CN 201510141988A CN 104821938 B CN104821938 B CN 104821938B
Authority
CN
China
Prior art keywords
call
authentication information
abnormal
calling
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510141988.8A
Other languages
Chinese (zh)
Other versions
CN104821938A (en
Inventor
孙晓红
胡巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hardlink Science & Technology Co Ltd
Original Assignee
Beijing Hardlink Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hardlink Science & Technology Co Ltd filed Critical Beijing Hardlink Science & Technology Co Ltd
Priority to CN201510141988.8A priority Critical patent/CN104821938B/en
Publication of CN104821938A publication Critical patent/CN104821938A/en
Application granted granted Critical
Publication of CN104821938B publication Critical patent/CN104821938B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a kind of service quality control systems based on the networking telephone, module is reset including calling monitor module, improper call data memory and authentication information, the authentication information of calling monitor module monitoring calling subscribe and the call request of access called subscriber, and the improper call data combined at least one calling judge index and/or improper call data memory judge whether active calls are normal call;Calling monitor module resets module and send to call after judging active calls to called gatekeeper and/or authentication information judges signal, and calling monitor module judges that signal judges whether to record in active calls data and storage to improper call data memory according to calling;Called gatekeeper judges signal execution refusal according to calling or receives the action of call request;Authentication information resetting module receives calling and judges signal and judge that signal determines whether the authentication information of update calling subscribe according to calling.

Description

Service quality control system based on network telephone
Technical Field
The invention relates to the field of network telephones, in particular to a service quality control system based on a network telephone.
Background
The network telephone is also called voip (voice over Internet protocol) telephone, and is characterized in that it can directly perform voice communication through IP data network, and macroscopically speaking its terminal equipment can include software telephone and hardware telephone. The software telephone is to download software on a computer or an intelligent terminal, a user can realize the function of network telephone by running the software on the computer or the intelligent terminal, and the hardware telephone is divided into an analog telephone and an IP telephone, wherein the analog telephone is communicated with a network telephone system through a PSTN telephone network and a voice gateway, and the IP telephone is directly communicated with the network telephone system through an IP data network.
With the continuous promotion of internet phone technology and the continuous popularization of application, internet phones are accepted by more and more enterprises and common consumers, the complete problem of internet phones is also highlighted, and safety is one of the necessary and important components of internet phones. How to protect the privacy of the voice information of the network telephone becomes a difficult problem to be overcome when the network telephone is developed forward. For example, a hacker cracks the VoIP network telephone system to impersonate a legal user, and the VoIP network telephone system is used as a tool for implementing fraud. Lawless persons illegally access a legal network telephone system through network telephones to impersonate working personnel such as telecommunication offices, public security institutions, inspection yards, court yards and the like, so that 'protection of family capital and property safety' of victims is realized, or authentication information of network telephones of relatives and friends is stolen, the trust of the victims is enhanced by displaying the telephones of the relatives and the friends through cracking software, and then fraud is implemented on the victims.
In addition, some telephone interference technologies appearing in the current market also appear in the network telephone system, for example, a software named as 'call death you' is generated by using the network advantage of the network telephone, the software is actually an automatic network telephone call-following system, the network telephone with low communication cost is used as a call platform, and the international advanced network telephone communication technology is adopted, so that any telephone, fixed telephone or mobile phone number in any area can be conveniently set for call-following. The telephone dialed by the software of 'call death' is characterized in that the telephone is one in a few seconds, does not stop for several days and several nights, is turned off when a sound is given, and the incoming call is displayed as a special number.
The malicious harassing software can be set to continuously call a called user for hundreds of calls within one hour, while a common harassing call intercepting system identifies and intercepts the call after the call is called into the mobile phone of the user, and even though harassing calls can be intercepted to a certain extent, the 'call death' software automatically calls at a frequency of several seconds, so that other normal calls cannot be normally called, and the user cannot normally dial the call, which seriously affects the normal communication of the user.
Chinese patent publication No. CN101917235A discloses a method and system for implementing VoIP user authentication, in which an IP voice terminal sends a broadcast message to a DHCP relay device, encapsulates a VoIP account signal in the broadcast message, and a DHCP server receives the broadcast message and determines whether the binding relationship between VoIP account information and user line information is consistent, if so, the authentication is passed. Therefore, the user identity information can be safely and quickly authenticated, and the position of the user can be further positioned. However, the patent document does not relate to the problem of VoIP communication security, and most of the research on communication security relates to the traditional fixed phone or mobile phone, and currently, relatively few researches on communication security and service quality in the field of network telephony are carried out.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a service quality control system based on a network telephone, which comprises a call monitoring module, an abnormal call data memory and an authentication information resetting module, wherein the call monitoring module monitors the authentication information of a calling user and a call request of an accessed called user, and judges whether the current call is a normal call or not by combining at least one call judgment index and/or abnormal call data in the abnormal call data memory; the call monitoring module sends a call judgment signal to the called gatekeeper and/or the authentication information resetting module after judging the current call, and judges whether to record current call data according to the call judgment signal and stores the current call data into an abnormal call data memory; the called gatekeeper executes the action of rejecting or accepting the call request according to the call judgment signal; and the authentication information resetting module receives the call judgment signal and determines whether to update the authentication information of the calling subscriber according to the call judgment signal.
According to a preferred embodiment, the qos control system further includes a network data sharing unit, and the call monitoring module further determines whether the current call is a normal call through the network data sharing unit; the network data sharing unit stores abnormal call data in a network and updates the stored abnormal call data according to data in a network database.
According to a preferred implementation mode, the service quality control system further comprises a user prompting module, the call monitoring module detects whether the outgoing call of the calling user is abnormal call data and sends a call judgment signal to the user prompting module, and the user prompting module judges whether to send a prompting message that the current outgoing call is abnormal call to the calling user/the called user based on the call judgment signal.
According to a preferred embodiment, the service quality control system further includes a blacklist detection module, where the blacklist detection module is configured to detect a telephone number in a communication blacklist of a called subscriber and store the detected blacklist telephone number in the abnormal call data storage.
According to a preferred embodiment, the authentication information resetting module establishes a re-encrypted secure connection with the calling party before updating the authentication information of the calling party to form a secure connection channel, and the secure connection channel is used for sending new authentication information to the calling party.
According to a preferred embodiment, the call monitoring module specifically detects whether an abnormal action exists in the authentication information of the authorized user, where the abnormal action at least includes abnormal modification, replacement, and cracking operations on the authentication information.
According to a preferred embodiment, the authentication information resetting module updates the authentication information of the calling subscriber in a periodic or non-periodic manner and changes the encryption manner of the authentication information periodically/non-periodically.
According to a preferred embodiment, the abnormal call data of the abnormal call data storage includes at least one of an IP address, a call location, a country code, a local area code, a call type of the abnormal call; the authentication information is at least one of an IP address, a user name, a password and a DNS location of the user.
According to a preferred embodiment, the call judgment index includes at least one of a call type, a call duration, a call frequency, a call duration, and a call telephone of a specific time of day.
A network telephone system comprises a call monitoring module, an abnormal call data memory, an authentication information resetting module and a switch, wherein the switch comprises a first switch and a second switch, a calling gateway and a calling gatekeeper are integrated in the first switch, a called gateway and a called gatekeeper are integrated in the second switch, the call monitoring module monitors the authentication information of a calling user and a call request for accessing a called user, and judges whether a current call is a normal call or not by combining at least one call judgment index and/or abnormal call data in the abnormal call data memory; the call monitoring module sends a call judgment signal to the called gatekeeper and/or the authentication information resetting module after judging the current call, and judges whether to record current call data according to the call judgment signal and stores the current call data into an abnormal call data memory; the called gatekeeper receives the call judgment signal and executes rejection or acceptance of the call request according to the call judgment signal.
The invention has the beneficial effects that:
(1) the invention ensures the data security of the calling user, identifies and intercepts the harassing or fraudulent calls before the harassing or fraudulent calls are called into the called user equipment, avoids the harassing calls from calling into the called user equipment and ensures the normal communication of the called user equipment.
(2) The invention protects the security of the authorized user, prevents lawless persons from embezzling the authentication information of the user, makes calls to other users on the name of the authorized user to perform fraud activities, and improves the account security of the authorized user.
(3) The invention further realizes the detection of the telephone called by the authorized user, confirms whether the telephone is an abnormal telephone, and prompts the user, thereby avoiding economic losses such as telephone charge and the like caused by cheating of the user under the unknown or no defense condition.
Drawings
FIG. 1 is a block diagram of the architecture of an embodiment of the present invention;
FIG. 2 is a block diagram of the structure of another embodiment of the present invention;
FIG. 3 is a block diagram of another embodiment of the present invention; and
FIG. 4 is a diagram illustrating specific steps of an embodiment of the present invention.
List of reference numerals
10: quality of service control system 20: the VoIP system 30: calling subscriber
40: the called user 101: call monitoring module
102: authentication information resetting module 104: network data sharing unit
103: abnormal call data memory 105: user prompting module
106: the blacklist detection module 201: the first switch 202: calling gateway
203: calling gatekeeper 204: called gateway 205: called gatekeeper
206: second switch
Detailed Description
The following detailed description is made with reference to the accompanying drawings.
As shown in fig. 1, the present invention provides a service quality control system based on a network telephone. The service quality control system 10 includes a call monitoring module 101, an abnormal call data storage 103, and an authentication information resetting module 102. The abnormal call data memory 103 is connected to the output control terminal of the call monitoring module 101. The call monitoring module 101 searches the abnormal call data storage 103 for whether the current call data matches with some abnormal data in the abnormal call data storage. One end of the authentication information resetting module 102 is connected to the user equipment in a wired or wireless manner, the user equipment is connected wirelessly if the user equipment is a mobile device, the user equipment is connected to the call monitoring module 101 in a wired/wireless manner if the user equipment is a fixed telephone, and the other end of the authentication information resetting module is connected to the call monitoring module. The user can select the connection mode according to actual needs.
The call monitoring module 101 sends a signal of resetting the authentication information to the authentication information resetting module 102, and can perform related monitoring operations on the abnormal call data storage 103. The call monitoring module 101 is configured to monitor authentication information of the calling subscriber 30 and/or a call request accessing the called subscriber 40, and determine whether the current call is a normal call by combining at least one call determination indicator and/or abnormal call data in the abnormal call data storage 103. The call judgment index includes at least one of a call type, a call duration, a call frequency, a call duration, and a call telephone of a specific time of day.
The calling time is the on-hold waiting time of the accessed called user 40, and if the calling time is 1 second or several seconds, the abnormal calling can be basically judged; the calling frequency is specifically the frequency of accessing the called user equipment, i.e. one or even a few seconds, for making a call to the called user 40. The call duration is the call duration after the called user 40 is connected, and the malicious harassment software can be set to interrupt the call immediately as soon as the called user 40 answers the call, or the called user 40 immediately hangs up the call after recognizing that the call is an abnormal call, so the call duration is short and is generally less than ten seconds. The calling telephone in a specific time period in a day, particularly most of harassing calls are harassed to users at night, and the telephone has the characteristics of short calling time period and high calling frequency. The call monitoring module 101 may determine whether the call is an confirmed/potentially abnormal call through the data information of the current call, the abnormal call including but not limited to a harassing call, a fraudulent call, a telephone call for a fee, a telephone call for a promotion, and an advertisement call.
The call monitoring module 101 monitors authentication information of the calling subscriber 30 on the one hand and current call data on the other hand. Specifically, the call monitoring module 101 obtains call data of the current call from the calling gatekeeper 203/the called gatekeeper 205. A part of the abnormal call data in the abnormal call data storage 103 is the abnormal call data initially set at the system start-up. One part of the abnormal call data is from the abnormal call data published on the internet, and the other part is the abnormal call data monitored by the call monitoring system and stored in the abnormal call data memory 103 during the use of the internet phone by the user. Specifically, the call monitoring module 101 compares the call data with the call judgment index, and if at least one characteristic of the call data matches the call judgment index, it judges that the current call is an abnormal call. Or, the call monitoring module 101 matches the monitored current call data with the abnormal call data stored in the abnormal call data storage 103, and if the call data consistent with the current call data is stored in the abnormal call data storage 103, it determines that the current call is an abnormal call, otherwise, it determines that the current call is a normal call.
The call monitoring module 101 determines the current call and then sends a call determination signal to the called gatekeeper 205 and/or the authentication information resetting module 102. The call judgment signal is specifically a signal that the current call is a normal call or the current call is an abnormal call. The called gatekeeper 205 performs an action of rejecting or accepting the call request according to the call decision signal. The VoIP system 20 mainly includes a first switch 201, a second switch 206, a gateway, a gatekeeper, and the like, wherein the first switch and the second switch are IP switches, i.e., IP PBXs. When using the network telephone, the user firstly connects with the calling gateway 202 of the network where the user equipment is located through the first switch 201 and the relay interface. The calling gateway 202 sends query information to the calling gatekeeper 203 after obtaining the called number, the calling gatekeeper 203 queries the IP address of the called gatekeeper 205 through the called number, and sends a request signal to the called gatekeeper 205, and the called gatekeeper 205 determines whether to establish connection according to the current network resource condition. If the call monitoring module 101 in the embodiment of the present invention determines that the current call is a normal call and sends a call determination signal that the current call is a normal call to the called gatekeeper 205, the called gatekeeper 205 receives the current call request and allows the connection between the calling gatekeeper 203 and the called gatekeeper 205 under the condition of having other network conditions. If the call is determined to be an abnormal call, the call monitoring module 101 sends a determination signal that the current call is an abnormal call to the called gatekeeper 205, and the called gatekeeper 205 makes an action of rejecting the call request after receiving the determination signal. Therefore, the rejection and interception of abnormal calls are realized in the call request stage, and the influence on the normal communication of the user caused by the access of the abnormal calls into the user equipment is avoided. Meanwhile, the call monitoring module 101 sends a call judgment signal to the authentication information resetting module 102.
The call monitoring module 101 determines whether to record the current call data according to the call determination signal and stores the current call data in the abnormal call data storage 103. Specifically, if the call monitoring module 101 detects that the current call is an abnormal call, it records the detailed information of the current call data and stores the detailed information in the abnormal call data storage 103. Wherein the detailed information of the current call data includes at least one of an IP address, a call location, a country code, a local area code, and a call type of the abnormal call. The call types are long distance, international, roaming, short distance, etc. In practical applications, the information specifically included in the abnormal call data is subject to the information actually detected and recorded by the call monitoring module 101.
Authentication information resetting module 102 receives the call judgment signal and determines whether to update the authentication information of calling subscriber 30 according to the call judgment signal. Wherein the authentication information is at least one of an IP address, a user name, a password and a DNS location of the user. Specifically, if the authentication information resetting module 102 receives a call judgment signal indicating a normal call, it may optionally send authentication information to the calling party 30. If the authentication information resetting module 102 receives the call judgment signal indicating the abnormal call, the authentication information resetting module 102 prepares to send new authentication information to the calling subscriber 30. To further ensure that the authentication information is not illegally trapped and obtained, the authentication information resetting module 102 establishes a re-encrypted secure connection with the calling subscriber 30 to form a secure connection channel before updating the authentication information of the calling subscriber 30. The secure connection channel is used to send new authentication information to calling party 30. Specifically, the authentication information resetting module 102 sends a handshake signal to the calling subscriber 30, the calling subscriber 30 confirms the handshake signal and establishes a connection with the authentication information resetting module 102, and the security of the authentication information can be further enhanced by transmitting the authentication information based on the secure connection channel.
The call monitoring module 101 further monitors whether the authentication information of the user has abnormal actions, where the abnormal actions at least include abnormal modification, replacement, and cracking operations on the authentication information. The resetting of the authentication information may be performed not only when the call monitoring module 101 detects that the current call is an abnormal call, but also when the call monitoring module 101 detects that the authentication information of the user has an abnormal action. If the call monitoring module 101 detects that the authentication information of the user is illegally modified, replaced, cracked or intercepted, the call monitoring module 101 determines that the user account has potential safety hazard, sends an authentication information resetting instruction to the authentication information resetting module 102, and updates the authentication information of the user after the authentication information receives the resetting instruction.
Further, the authentication information resetting module 102 updates the authentication information of the calling subscriber 30 in a periodic or non-periodic manner and changes the encryption manner of the authentication information periodically/non-periodically. If the authentication information is kept unchanged all the time, hackers or lawless persons can easily attack and modify the authentication information or even steal the authentication information. If the authentication information resetting module 102 periodically or aperiodically updates the authentication information of the user at a certain time interval, the difficulty of a hacker stealing the legal authentication information is greatly increased. Meanwhile, the authentication information resetting module 102 may randomly select a different authentication information encryption mode, or change the encryption mode periodically/aperiodically. The encryption modes for sending the authentication information are different every time, so that a hacker needs to spend more time on cracking the legal authentication information. By shortening the time interval for sending the authentication information, new authentication information is sent before a hacker breaks down the authentication information, and the probability that the authentication information is acquired can be further reduced.
Fig. 2 is a block diagram of another embodiment of the present invention. As shown in fig. 2, the embodiment shown in fig. 1 is different from the embodiment shown in fig. 2 in that the embodiment shown in fig. 2 further includes a network data sharing unit 104, a user prompting module 105, and a blacklist detection module 106.
The call monitoring module 101 further determines whether the current call is a normal call through the network data sharing unit 104. The network data sharing unit 104 is connected to the call monitoring module 101 at one end and wirelessly connected to the internet at the other end. The network data sharing unit 104 is configured to store the abnormal call data in the network database and store the abnormal call data updated in the network database in the network data sharing unit 104. The net citizen or the public security organization can publish and expose after confirming a harassing or fraudulent call, and other people can search through the network, so that more people can be prevented from being cheated. Therefore, in order to improve the detection efficiency of the harassing and fraudulent calls, the judgment time can be shortened, and confirmed or potential harassing and fraudulent calls are matched from the network data. Specifically, the network data storage unit is used for storing abnormal call data in the network, where the abnormal call data are from data information published or exposed on the network, and the network data storage unit can monitor the change situation of the abnormal call in the network in real time, periodically or aperiodically, and when a new fraud or nuisance call is detected to be published, the new fraud or nuisance call is added to the network data sharing unit 104, so as to realize the timely update of the abnormal call data stored in the network data sharing unit 104.
The user prompting module 105 is connected to the call monitoring module 101 at one end and connected to the user equipment in a wireless or wired manner at the other end. The user prompting module 105 is used for prompting the user when the number being dialed is unknown to be a harassing or fraudulent call, so that the user is prevented from being cheated. The call monitoring module 101 detects whether the outgoing call of the calling subscriber 30 is abnormal call data and transmits a call judgment signal to the subscriber prompt module 105. The user prompt module 105 determines whether to give a prompt to the calling party 30 that the currently outgoing call is an abnormal call based on the call determination signal. Specifically, the call monitoring module 101 searches and matches the telephone call from the calling party 30 in the abnormal call data storage 103 and the network data sharing unit 104, or further searches and matches the telephone call in the blacklist detection module 106. The data information of the three is combined to judge whether the current ongoing call is an abnormal call and generate a judgment signal. If the call is judged to be abnormal, a prompt that the current outgoing call is a potential harassment/fraud call is sent to the calling user 30 to remind the user of defense.
Further, the user prompting module 105 also sends a prompting message to the called user 40. Specifically, when the call monitoring module 101 cannot determine whether the call is a normal call according to the data in the abnormal call data storage 103 and the network data sharing unit 104, but the call characteristics of the part of the call are similar to the indexes of the part of the judgment indexes, the user prompting module 105 sends a prompting message to the called user 40 to prompt the called user that the current incoming call may be a potential abnormal call.
Generally, after receiving a harassment/fraud call, the user will generally add the harassment/fraud call to the blacklist to prevent further harassment, or the interception software on the mobile phone will automatically intercept the harassment/fraud call to the blacklist. The service quality control system 10 further includes a blacklist detection module 106, and the blacklist detection module 106 is configured to detect a telephone number in a communication blacklist of the called subscriber and store the detected blacklist telephone number in the abnormal call data storage 103. This is beneficial for the call monitoring module 101 to classify the missed abnormal call into the next call detection range, further refining the abnormal call data in the abnormal call data storage 103.
Fig. 3 is a block diagram of another embodiment of the present invention. As shown in fig. 3, the present implementation differs from the embodiment shown in fig. 1 in that a gateway and/or gatekeeper is integrated inside the switch. The switch is an IP switch, i.e., an IP PBX. The switches include a first switch 201 and a second switch 206. The first switch 201 has integrated therein a calling gateway 202 and a calling gatekeeper 203. The second switch 206 has a called gateway 204 and a called gatekeeper 205 integrated therein. The embodiment has the advantages that the gateway and the gatekeeper are integrated in the switch, so that external gateway and gatekeeper equipment are not needed, the complexity of a network telephone system is reduced, and the safety and reliability of the network telephone are further improved. The embodiment of fig. 3 operates in the same manner as the rest of the embodiment of fig. 1.
Gateways (gateways), also known as protocol converters, are used to interconnect two networks with different higher layer protocols. The calling gateway/called gateway may be a microprocessor including a main controller, a memory module, an I/O interface, and a GPRS module. The main controller is used for controlling the I/O interface, has a peripheral expansion function and realizes high-speed processing, and can be an embedded ARM operating system. The storage module is used for storing information such as own IP address or call destination IP address, and comprises any one or combination of a volatile storage element (such as RAM) and a nonvolatile storage element (such as a hard disk, a ROM, a magnetic tape and the like). The I/O interface is used for interfaces including an ethernet interface, a USB interface, an ADSL interface, and a WLAN interface. The GPRS module is connected with the main controller through a serial port to realize connection with the internet.
The Gatekeeper (Gatekeeper) is used for call processing and management of a gateway or the like, and may be a microcontroller, such as a single chip or a general-purpose microprocessor. The system mainly comprises a registration information linked list module, a current call information linked list module, a call signaling routing module and a charging module.
The registration information linked list module is used for storing the detailed information of the registered terminal, such as the call signaling transport layer address, the RAS port address, the terminal type and the like. The current call information linked list module is used for storing the detailed information of the current call and the call, including the ID of the calling party and the called party, the ID of the call, the type of the call, the starting and ending time of the call and the like. The registration information link list module and the current call information link list module include any one or a combination of a read only memory (e.g., ROM), a random access memory (e.g., SRAM and DRAM), an erasable programmable read only memory (eprom) and a flash memory. The call signaling routing module is used for processing actions such as call establishment, call clearing, message processing and the like, and comprises a CPU chip, a Digital Signal Processing (DSP) chip or a combination thereof. The charging module is used for counting the telephone charge of each call, and specifically comprises a timer and a calculator, such as a timer/counter in a single chip microcomputer chip and a hardware multiplier in a digital signal processing chip. The time length of each call is calculated through a timer, and meanwhile, the calculator calculates the charge of each call according to the charging standard and the call time length of different call types stored in the current call information linked list module.
FIG. 4 is a diagram illustrating specific steps of an embodiment of the present invention. Referring to fig. 4, the specific implementation steps of the present invention are illustrated as follows:
s01: when the called gatekeeper receives the call request, an inquiry signal is sent to the call monitoring module, and the call monitoring module detects each call request to be called into the called user.
S02: after receiving the query signal, the call monitoring module extracts current call data information, wherein the current call data information at least comprises an IP address, a DNS address, call duration, call time and call frequency. The call monitoring module judges the current call by combining the abnormal call data in the abnormal call data memory.
S03: the call monitoring module further judges the current call by combining the preset call judgment index.
S04: the call monitoring module also judges the current call by combining the data in the network data sharing unit.
S05: when it is determined whether the current call is an abnormal call through at least one of steps S02, S03, and S04, the call monitoring module transmits a call determination signal to the authentication information resetting module and/or the called gatekeeper.
S06: the called gatekeeper executes the action of rejecting or accepting the call request after receiving the call judgment signal.
S07: the authentication information resetting module detects whether the authentication information of the user has abnormal actions in a periodic/aperiodic mode and changes the encryption mode of the authentication information periodically/aperiodically.
S08: if the authentication information resetting module detects that the authentication information has abnormal actions and/or the call monitoring module 101 sends a judgment signal that the current call is an abnormal call to the authentication information resetting module, the authentication information resetting module establishes a secure connection with the calling party to form a secure connection channel.
S09: and after establishing a secure connection with the calling party, the authentication information resetting module sends new authentication information to the calling party.
It should be noted that the above-mentioned embodiments are exemplary, and that those skilled in the art, having benefit of the present disclosure, may devise various arrangements that are within the scope of the present disclosure and that fall within the scope of the invention. It should be understood by those skilled in the art that the present specification and figures are illustrative only and are not limiting upon the claims. The scope of the invention is defined by the claims and their equivalents.

Claims (8)

1. A service quality control system based on network telephone is characterized in that the system comprises a call monitoring module (101), an abnormal call data memory (103) and an authentication information resetting module (102), wherein
The call monitoring module (101) monitors authentication information of a calling user and a call request for accessing a called user (40), and judges whether a current call is a normal call or not by combining at least one call judgment index and/or abnormal call data in the abnormal call data memory (103);
the call monitoring module (101) judges the current call and then sends a call judgment signal to the called gatekeeper (205) and the authentication information resetting module (102), and the call monitoring module (101) judges whether to record the current call data according to the call judgment signal and stores the current call data into the abnormal call data memory (103);
the called gatekeeper (205) performs an action of rejecting or accepting the call request according to the call judgment signal;
the authentication information resetting module (102) receives the call judgment signal and determines whether to update the authentication information of the calling subscriber (30) according to the call judgment signal; before updating the authentication information of the calling user, the authentication information resetting module (102) establishes a re-encrypted secure connection with the calling user to form a secure connection channel, the secure connection channel is used for sending new authentication information to the calling user, the call monitoring module (101) specifically detects whether abnormal actions exist in the authentication information of an authorized user, and the abnormal actions at least comprise abnormal modification, replacement and cracking operations of the authentication information;
the resetting of the authentication information is carried out when the call monitoring module (101) detects that the current call is an abnormal call and/or when the call monitoring module (101) detects that the authentication information of the user has abnormal action.
2. The QoS control system according to claim 1, wherein the QoS control system (10) further comprises a network data sharing unit (104), and the call monitoring module (101) further determines whether the current call is a normal call through the network data sharing unit (104); wherein
The network data sharing unit (104) stores abnormal call data in the network and updates the stored abnormal call data according to data in the network database.
3. The quality of service control system of claim 2,
the service quality control system (10) further comprises a user prompting module (105), the call monitoring module (101) detects whether the outgoing call of the calling party is abnormal call data and sends a call judgment signal to the user prompting module (105), and the user prompting module (105) judges whether to send a prompting message that the current outgoing call is abnormal call to the calling party/the called party based on the call judgment signal.
4. The quality of service control system of claim 3, wherein the quality of service control system (10) further comprises a blacklist detection module (106), the blacklist detection module (106) being configured to detect telephone numbers in a communication blacklist of the called subscriber and to store the detected blacklist telephone numbers in the abnormal call data storage (103).
5. The QoS control system according to any one of claims 1 to 4, wherein the authentication information resetting module (102) updates the authentication information of the caller periodically or aperiodically and periodically/aperiodically changes the encryption scheme of the authentication information.
6. The quality of service control system of one of the preceding claims 1 to 4,
the abnormal call data of the abnormal call data storage (103) includes at least one of an IP address, a call location, a country code, a local area code, a call type of an abnormal call;
the authentication information is at least one of an IP address, a user name, a password and a DNS location of the user.
7. The quality of service control system of one of the preceding claims 1 to 4,
the call judgment index includes at least one of a call type, a call duration, a call frequency, a call duration, and a call telephone of a specific time of day.
8. A network telephone system is characterized by comprising a call monitoring module (101), an abnormal call data storage (103), an authentication information resetting module (102) and a switch, wherein
The switch comprises a first switch (201) and a second switch (206), a calling gateway (202) and a calling gatekeeper (203) are integrated in the first switch (201), a called gateway (204) and a called gatekeeper (205) are integrated in the second switch (206),
the call monitoring module (101) monitors authentication information of a calling user and a call request for accessing a called user (40), and judges whether a current call is a normal call or not by combining at least one call judgment index and/or abnormal call data in the abnormal call data memory (103);
the call monitoring module (101) judges the current call and then sends a call judgment signal to the called gatekeeper and authentication information resetting module (102), and the call monitoring module (101) judges whether to record the current call data according to the call judgment signal and stores the current call data into an abnormal call data memory (103);
the called gatekeeper (205) receives the call judgment signal and performs rejection or acceptance of the call request according to the call judgment signal; wherein,
the authentication information resetting module (102) establishes a re-encrypted secure connection with the calling party before updating the authentication information of the calling party to form a secure connection channel, the secure connection channel is used for sending new authentication information to the calling party, the call monitoring module (101) specifically detects whether abnormal actions exist in the authentication information of an authorized user, and the abnormal actions at least comprise abnormal modification, replacement and cracking operations of the authentication information;
the resetting of the authentication information is carried out when the call monitoring module (101) detects that the current call is an abnormal call and/or when the call monitoring module (101) detects that the authentication information of the user has abnormal action.
CN201510141988.8A 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone Expired - Fee Related CN104821938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510141988.8A CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510141988.8A CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Publications (2)

Publication Number Publication Date
CN104821938A CN104821938A (en) 2015-08-05
CN104821938B true CN104821938B (en) 2018-06-15

Family

ID=53732101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510141988.8A Expired - Fee Related CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Country Status (1)

Country Link
CN (1) CN104821938B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743470A (en) * 2019-02-28 2019-05-10 上海市共进通信技术有限公司 The method for realizing non-proxy IP refusal incoming call function based on Session Initiation Protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1350391A (en) * 2000-10-19 2002-05-22 国伟 Barassment preventing telephone technology
WO2006103142A1 (en) * 2005-03-30 2006-10-05 Siemens Enterprise Communications Gmbh & Co.Kg Method for protection against undesirable telemarketing advertisements for communication networks
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103533192A (en) * 2013-10-22 2014-01-22 上海市共进通信技术有限公司 Method of realizing telephone no-disturbing function for VoIP home gateway based on SIP

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030023736A1 (en) * 2001-07-12 2003-01-30 Kurt Abkemeier Method and system for filtering messages
CN102196099B (en) * 2010-03-10 2014-02-19 成都市华为赛门铁克科技有限公司 Voice call detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1350391A (en) * 2000-10-19 2002-05-22 国伟 Barassment preventing telephone technology
WO2006103142A1 (en) * 2005-03-30 2006-10-05 Siemens Enterprise Communications Gmbh & Co.Kg Method for protection against undesirable telemarketing advertisements for communication networks
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103533192A (en) * 2013-10-22 2014-01-22 上海市共进通信技术有限公司 Method of realizing telephone no-disturbing function for VoIP home gateway based on SIP

Also Published As

Publication number Publication date
CN104821938A (en) 2015-08-05

Similar Documents

Publication Publication Date Title
EP3070969B1 (en) Intelligent number protection method and system for mobile terminal
US11316973B2 (en) Methods and systems for inbound and outbound call control
US8050394B2 (en) System and method for control of communications connections and notifications
EP3437313B1 (en) Method and system for detection of interconnect bypass using test calls to real subscribers
WO2010010060A2 (en) Telephony fraud prevention
US9467559B2 (en) Special emergency call treatment based on the caller
CA3013899C (en) Methods, telecommunication switches and computer programs for processing call setup signalling
Mustafa et al. End-to-end detection of caller ID spoofing attacks
CN109698885A (en) A kind of processing method of call request, device, network side server and computer storage medium
JP2010518735A (en) Method and system for establishing a telephone connection
WO2011160328A1 (en) Method and device for monitoring communications
US8379816B1 (en) Methods and arrangement for handling phishing calls for telecommunication-enabled devices
CN104821938B (en) A kind of service quality control system based on the networking telephone
CN110312221B (en) Call forwarding setting method, home location register and block chain network system
KR20150122558A (en) Device for blocking illegal internet international originating call and method for blocking illegal internet international originating call
KR101571100B1 (en) Device and method for detecting illegal originating call by using pattern analysis
KR20150047378A (en) Device of blocking voice phishing calls
CN109005544B (en) False caller identification method and device
US9407761B2 (en) Managing communications in a communication network
KR101787072B1 (en) System for detecting illegal internet international originating call using teminal double registration detection and method for detecting illegal internet international origination call
US9602657B2 (en) Callback telecommunication system
JP2009194777A (en) Method and system for preventing nuisance communication
US8848692B2 (en) Method and arrangement for providing VoIP communication
KR20140009685A (en) System and method for preventing alteration of calling line identification using connected line identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Sun Xiaohong

Inventor after: Hu Wei

Inventor before: Hu Wei

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180615

Termination date: 20200327