CN105049647B - A kind of method and system for shielding harassing call - Google Patents
A kind of method and system for shielding harassing call Download PDFInfo
- Publication number
- CN105049647B CN105049647B CN201510484742.0A CN201510484742A CN105049647B CN 105049647 B CN105049647 B CN 105049647B CN 201510484742 A CN201510484742 A CN 201510484742A CN 105049647 B CN105049647 B CN 105049647B
- Authority
- CN
- China
- Prior art keywords
- call
- privately owned
- identification marking
- asking
- control point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to a kind of method and system for shielding harassing call, including step S1, SCP, which has been obtained, to be called for asking, and will be risen to call for asking and be sent to OCS;Whether step S2, the called number that OCS has judged to call in asking include PID, if so, then performing step S3, if nothing, send failed authentication information to SCP, SCP refuses originating request;Step S3, OCS has judged whether the PID for calling for seeking middle called number is identical with default PID, if identical, sends authentication successful information to SCP, and SCP has allowed to call for asking, if it is different, then sending failed authentication information to SCP, SCP refuses originating request.The present invention, by the cooperation of telecom operators' online charging system and SCP, realizes effect shielding harassing call by increasing privately owned identification marking information on hand and number.
Description
Technical field
The present invention relates to communication field, more particularly to a kind of method and system for shielding harassing call.
Background technology
Identification, filtering and shielding to harassing call never have good solution.Ordinary circumstance is all that user is led to
Installation cell phone software is crossed, registers the number refusal of harassing call.This mode needs user first to know that calling number is harassing and wrecking electricity
Words, then again by hand be put into blacklist, can not initiative recognition caller be harassing call or plain old telephone.
In terms of the current domestic improvement situation to the improper communication calling such as harassing call, fraudulent call, " exhale dead you ", and
There is no effective Initiative defence means.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of method and system for shielding harassing call.
The technical solution that the present invention solves above-mentioned technical problem is as follows:A kind of method for shielding harassing call, including it is following
Step:
Step S1, service control point, which has obtained, to be called for asking, and will be risen to call for asking and be sent to online charging system;
Whether step S2, the called number that online charging system has judged to call in asking include privately owned identification marking, if so,
Step S3 is then performed, if nothing, sends failed authentication information to service control point, service control point refuses originating request;
Step S3, online charging system judged to call for the privately owned identification marking for seeking middle called number whether with it is default privately owned
Identification marking is identical, if identical, sends authentication successful information to service control point, service control point has allowed to call for
Ask, if it is different, then sending failed authentication information to service control point, service control point refuses originating request.
Based on the above technical solutions, the present invention can also be improved as follows.
Further, in step S3, rise and call for the privately owned identification marking for seeking middle called number with presetting privately owned identification marking
In the case of identical, online charging system starts execution calling and deducts fees.
Further, privately owned identification marking is preset described in step S3 to be applied and registered in telecom business office.
Further, the default privately owned identification marking is made of one or more characters in 0-9, * and #12 characters.
Further, the default privately owned identification marking has changeability.
The another technical solution that the present invention solves above-mentioned technical problem is as follows:A kind of system for shielding harassing call, bag
Include service control point and online charging system;
Service control point is used to obtain to call for asking, and will rise to call for asking and be sent to online charging system;It is additionally operable to receive
The failed authentication information or authentication successful information that online charging system is sent;
Online charging system be used for receive and judged to call for the called number in asking whether including privately owned identification marking with
And whether judged to call for the privately owned identification marking for seeking middle called number identical with presetting privately owned identification marking;And send authentication and lose
Information or authentication successful information are lost to service control point.
Based on the above technical solutions, the present invention can also be improved as follows.
Further, in online charging system has judged to call for asking called number privately owned identification marking whether with it is default
In the case that privately owned identification marking is identical, online charging system is additionally operable to execution calling and deducts fees.
Further, the default privately owned identification marking is applied and is registered in telecom business office.
Further, the default privately owned identification marking is made of one or more characters in 0-9, * and #12 characters.
Further, the default privately owned identification marking has changeability.
The beneficial effects of the invention are as follows:Personalized identification code is increased by the definition in subscriber phone number, so that mobile phone
Number is transformed into " operator and terminal client joint are formed " by " the single definition of operator is formed " in itself.So in user just
In normal social scope, phone number can be known, but outside social circle, for example, harassing call and fraudulent call that
In, Subscriber Number is sightless on the contrary, so as to effectively shield continuing for harassing call.And by analysis, can actively simultaneously
The effective harassing call that carries out takes precautions against improvement.
Brief description of the drawings
Fig. 1 is the method flow diagram of shielding harassing call of the present invention;
Fig. 2 is the system construction drawing of shielding harassing call of the present invention.
Embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the present invention.
Fig. 1 is the method flow diagram of shielding harassing call of the present invention.
As shown in Figure 1, a kind of method for shielding harassing call, comprises the following steps:
Step S1, SCP (Service Control Point, service control point, network element device in intelligent networks (in) it
One, the control function for all business that intelligent network is provided is undertaken, current country SCP has real time billing/mandate with charge system
Interface) obtain and called for asking, and will rise to call for asking and be sent to OCS (Online Charging System, online charging system);
Step S2, whether the called number that OCS has judged to call in asking includes PID (privately owned identification marking), if so, then holding
Row step S3, if nothing, sends failed authentication information to SCP, SCP refuses originating request;
Step S3, whether the PID that OCS has judged to call for seeking middle called number is with presetting the i.e. default PID of privately owned identification marking
It is identical, if identical, authentication successful information is sent to SCP, and SCP has allowed to call for asking, if it is different, then sending authentication
For failure information to SCP, SCP refuses originating request.
In wherein step S3, rise call for asking middle called number PID it is identical with default PID in the case of, OCS starts to perform
System calling is deducted fees.
Specific embodiment is:Client A according to oneself needs, buys number, telecom business office exists in telecom business office first
Sale one number blocks to after client A, and client A has been provided with basic call and short message sending, reception and service on net.
Client A applies and registers the i.e. default PID of the privately owned identification marking of oneself, presets OCS of the PID separate records in telecommunications
In.Default PID can be a string of characters from 12 character compositions such as 0-9 and * #.Client A has the electricity of 11 at this time
Talk about number and the new individual number of default PID.
When client B initiates to call to client A, it is assumed that B knows the phone number of A and default PID, rises and calls for asking from SCP
OCS is sent to, OCS judges the PID of called number A, if consistent with the default PID codes of client A registrations, OCS sends authentication
Successful information is to SCP, and SCP allows to connect, and OCS starts call charging.If B is the client of harassing call, B is not know
The default PID of road A, when direct of the PID that B does not carry PID secretly or carries mistake secretly is exhaled, acts to call for asking from SCP being sent to OCS,
OCS judges whether there is whether PID or PID is correct in called number A, if missing PID or the default PID mismatches with A,
This time failed authentication, client B can not continue to turn on audio call to client A to OCS notices SCP.
In the present invention, PID be with rise call for asking the opposite-terminal number of transmission to send jointly, used between SCP and OCS
Agreement is unrelated, and is just for voice call service.
Fig. 2 is the system construction drawing of shielding harassing call of the present invention.
As shown in Fig. 2, a kind of system for shielding harassing call, it is characterised in that including SCP and OCS;SCP is used to obtain
Rise and call for asking, and will rise to call for asking and be sent to OCS;It is additionally operable to receive failed authentication information or authentication successful information that OCS is sent;
OCS is used to receive and has judged to call for whether the called number in asking includes PID and judged to call for seeking middle called number
Whether PID is identical with default PID;And failed authentication information or authentication successful information are sent to SCP.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on, should all be included in the protection scope of the present invention.
Claims (8)
- A kind of 1. method for shielding harassing call, it is characterised in that comprise the following steps:Step S1, service control point, which has obtained, to be called for asking, and will be risen to call for asking and be sent to online charging system;Step S2, whether the called number that online charging system has judged to call in asking includes privately owned identification marking, if so, then holding Row step S3, if nothing, sends failed authentication information to service control point, service control point refuses originating request;Whether step S3, online charging system have judged to call for the privately owned identification marking for seeking middle called number with presetting privately owned identification Identify it is identical, if identical, send authentication successful information to service control point, service control point has allowed to call for asking, if it is different, Failed authentication information is then sent to service control point, service control point refuses originating request;In step S3, rise call for asking middle called number privately owned identification marking it is identical with default privately owned identification marking in the case of, Online charging system starts execution calling and deducts fees.
- 2. the method for shielding harassing call according to claim 1, it is characterised in that privately owned knowledge is preset described in step S3 Do not identify and applied in telecom business office and registered.
- 3. it is according to claim 1 shielding harassing call method, it is characterised in that it is described preset privately owned identification marking by One or more characters are formed in 0-9, * and #12 characters.
- 4. the method for shielding harassing call according to claim 1, it is characterised in that the default privately owned identification marking tool There is changeability.
- 5. a kind of system for shielding harassing call, it is characterised in that including service control point and online charging system;Service control point is used to obtain to call for asking, and will rise to call for asking and be sent to online charging system;It is additionally operable to receive online The failed authentication information or authentication successful information that charge system is sent;Online charging system is used to receive and has judged to call for whether the called number in asking includes privately owned identification marking and sentence Whether having broken, it is identical with presetting privately owned identification marking to call for the privately owned identification marking for seeking middle called number;And send failed authentication letter Breath or authentication successful information are to service control point;Whether the privately owned identification marking of called number is with presetting privately owned identification marking in online charging system has judged to call for asking In the case of identical, online charging system is additionally operable to execution calling and deducts fees.
- 6. the system of shielding harassing call according to claim 5, it is characterised in that the default privately owned identification marking exists Applied in telecom business office and registered.
- 7. it is according to claim 5 shielding harassing call system, it is characterised in that it is described preset privately owned identification marking by One or more characters are formed in 0-9, * and #12 characters.
- 8. the system of shielding harassing call according to claim 5, it is characterised in that the default privately owned identification marking tool There is changeability.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510484742.0A CN105049647B (en) | 2015-08-07 | 2015-08-07 | A kind of method and system for shielding harassing call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510484742.0A CN105049647B (en) | 2015-08-07 | 2015-08-07 | A kind of method and system for shielding harassing call |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049647A CN105049647A (en) | 2015-11-11 |
CN105049647B true CN105049647B (en) | 2018-04-17 |
Family
ID=54455837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510484742.0A Active CN105049647B (en) | 2015-08-07 | 2015-08-07 | A kind of method and system for shielding harassing call |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049647B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105873066A (en) * | 2016-04-15 | 2016-08-17 | 北京思特奇信息技术股份有限公司 | Junk short message interception method and junk short message interception system for intercepting junk short messages |
CN107872588B (en) * | 2016-09-28 | 2021-06-29 | 华为技术有限公司 | Call processing method, related device and system |
CN109474758B (en) * | 2018-12-20 | 2021-10-29 | 中国银行股份有限公司 | Processing method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1905744A (en) * | 2006-08-01 | 2007-01-31 | 中国移动通信集团公司 | Access method for mobile communication apparatus |
CN1905743A (en) * | 2006-08-01 | 2007-01-31 | 中国移动通信集团公司 | Access method for mobile communication apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009121419A1 (en) * | 2008-04-04 | 2009-10-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Managing communications |
-
2015
- 2015-08-07 CN CN201510484742.0A patent/CN105049647B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1905744A (en) * | 2006-08-01 | 2007-01-31 | 中国移动通信集团公司 | Access method for mobile communication apparatus |
CN1905743A (en) * | 2006-08-01 | 2007-01-31 | 中国移动通信集团公司 | Access method for mobile communication apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN105049647A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101146266B (en) | Method and system for adding special numbers of user | |
CN101208943A (en) | Controlling provision of services in a communications network | |
CN107360300B (en) | Crank call interception method and device | |
CN1863252B (en) | Method and system for adding special purpose number for user | |
CN107295491A (en) | The method and system of automatic screening calling subscribe during call forwarding | |
CN105049647B (en) | A kind of method and system for shielding harassing call | |
WO2012034316A1 (en) | Method and system for implementing call restriction service | |
CN100455057C (en) | System and method for realizing secrecy of mobile phone number | |
CN107708103B (en) | Method for realizing number security based on MAP signaling | |
CN101707771A (en) | Network authentication system and method for network side receiving terminal access | |
WO2013131647A2 (en) | Communication system | |
CN108966161A (en) | Call waiting method and system | |
CN102905241A (en) | USSD (Unstructured Supplementary Service Data) server, HLR (Home Location Register) server, and call forwarding method based on USSD | |
CN100536604C (en) | Charging method and system for prepaid subscriber in the course of across-network roaming | |
CZ2001630A3 (en) | Method for the real-time billing of telecommunication links when a subscriber is located outside his home network | |
CN107333266A (en) | Caller ID verification method and caller ID checking system | |
CN101516080A (en) | Calling method based on one-card multi-number service and one-card multi-number server | |
CN105472186A (en) | Communication method and system established in number transmission manner | |
CN100508463C (en) | Method, system and apparatus for realizing intelligent service | |
CN1983963A (en) | Method, module, network, terminal equipment and telecommunication system for managing SMS service | |
KR101024281B1 (en) | Method and system breaking spam calling | |
DE102013104383B4 (en) | Method for limiting a connection number of communication links | |
CN109005544B (en) | False caller identification method and device | |
CN101056471B (en) | Special network card implementation device and method | |
CN101179402A (en) | Method of selecting flexibly service on-line accounting system for WCDMA service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |