CN106453799B - Manipulative communications deception recognition methods and system - Google Patents

Manipulative communications deception recognition methods and system Download PDF

Info

Publication number
CN106453799B
CN106453799B CN201610922296.1A CN201610922296A CN106453799B CN 106453799 B CN106453799 B CN 106453799B CN 201610922296 A CN201610922296 A CN 201610922296A CN 106453799 B CN106453799 B CN 106453799B
Authority
CN
China
Prior art keywords
call
calling
communication
node
verification record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610922296.1A
Other languages
Chinese (zh)
Other versions
CN106453799A (en
Inventor
郭铮铮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guo Zhengzheng
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610922296.1A priority Critical patent/CN106453799B/en
Publication of CN106453799A publication Critical patent/CN106453799A/en
Application granted granted Critical
Publication of CN106453799B publication Critical patent/CN106453799B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of manipulative communications deception recognition methods and systems, wherein recognition methods includes that initial call triggering node receives the call request that calling terminal is initiated, and generates the first call verification record of calling terminal and examines node to send first call verification record to communication;Communication examines node to receive the first call verification record, initiates reversed addressing request;After calling terminal belongs to the management node reception reversed addressing request, the second call verification record of the calling terminal is sent;Communication examines node to receive second call verification record, and second call verification record and the first call verification record are compared, and decides whether that stopping call establishing according to comparison result.Can be recognized accurately whether incoming call is that the real calling owner is initiated, and prevents the calling illegally pretended from being switched on through the invention.

Description

Manipulative communications deception recognition methods and system
Technical field
The present invention relates to computer communication technology field more particularly to a kind of manipulative communications deception recognition methods and systems.
Background technique
Internet communicates at present, fixed communication network, and mobile communications network, which all has, provides calling session communication knowledge Other display function.By taking mobile phone as an example, information of the people usually using caller identification number as identification conversation object.As shown It is shown as banking institution's communicating number, people are judged as the call from bank.So caller identification is weight in people's periodic traffic The information wanted.But caller identification can be forged due to there is the number of changing software and Internet Protocol telephone and software vulnerability, hacker, this Sample becomes the telephone number of certain service provider by forging, and the caller number for modifying and conversing and in establishing for display can be used in tricker Code is to usurp calling number owner's identity;Lack corresponding technological means for one side of calling session in call to know in time Not, and then there is a situation where information to cheat, and the present invention in real time, in call establishment by detecting camouflage number call Mode makes camouflage calling that cannot establish the injurious act for thoroughly terminating the number of changing software, protects the legitimate rights and interests of broad masses.
The method for using big data at present, will swindle and harassing and wrecking number mark comes out, when incoming call is shown and reports number Then it is determined as malicious call label prompt according to storehouse matching, thus decline fraudulent call percent of call completed, but those disguise oneself as really The telephone number of government offices, tissue cannot stop, so a technology is needed to identify whether incoming call is really to exhale It makes the owner initiate, and prevents the calling illegally pretended from being switched on.
Summary of the invention
The present invention includes communication terminal, and communication transmission network connects node and node is examined in communication;The communication transmission net It includes: initial call triggering node that network, which connects node, and communication terminal belongs to management node and communication transmission nodes;Institute Stating communication terminal ownership management node can be there are two types of logical type in call establishment: being that management is called respectively communicates eventually The called communication terminal ownership management node at end and the calling communication terminal for managing calling communication terminal belong to management node.
The communication terminal refers to fixed communication network, mobile communications network, enterprise's VOIP communication network, Internet application For initiating the fixed telephone terminal of calling or call establishment, mobile telephone terminal, IP phone terminal, or tool in communication etc. There is any one in the software client for calling identification information and being used to call and communicate;The communication terminal has communication eventually End calling identification information;The communication terminal is can be in communication process in calling communication terminal or called communication terminal A kind of session main body.
The calling communication terminal is the calling communication session main body that calling behavior is initiated to the called communication terminal;Institute It states the corresponding communication terminal calls identification information of calling communication terminal and is known as calling communication terminal calling identification information, use During call setup called communication terminal displays send a telegram here identification information.
The called communication terminal refers to the called communication terminal session main body of termination and call establishment;It is corresponding described logical Believe that terminal call identification information is known as called communication terminal calls identification information;The called communication terminal calls identification information is used In addressing the called communication terminal according to communication protocol in the call setup, thus eventually by call proceeding to the called communication End.
Calling behavior refers to the calling communication terminal using the calling identification information of the called communication terminal to described The call communication request that called communication terminal is initiated, the data type of communication can be voice, video, fax or interconnection netting index One of word information or a variety of combinations.
The communication terminal belongs to management node and is configured to real-time management, distributes, recycling, detects present communications terminal and leads to The regarding resource status of communication network connection, including managing the connecting interface with communication terminal, IP state, radio roaming state, note Volume region, the position of communication terminal and communication terminal real-time communication conditions etc..
The called communication terminal ownership management node refers to during replay call, real for the called communication terminal Shi Guanli is distributed, recycling, and the communication terminal for detecting the related resource that current called communication terminal is connect with communication network is returned Belong to management node.
The calling communication terminal ownership management node refers to during replay call, real for the calling communication terminal Shi Guanli is distributed, and recycling, the communication terminal for detecting the related resource that current calling communication terminal is connect with communication network is returned Belong to management node.
The communications network intermediate node is in calling communication terminal ownership management node and described called Communication terminal belongs to the communication switching node between management node, can have one or more can also during call setup Not need, be responsible for relaying during calling and connection setup the calling communication terminal ownership management node and it is described just The signaling and message to begin between calling triggering node and the called communication terminal ownership management node.
The initial call triggering node refers to logic function node during replay call, is configured to first and connects Receive from the calling communication terminal be calling session main body call request after, be called according to communication protocol using described The first calling for generating management calling communication terminal while letter terminal call identification information addresses called communication terminal in real time is tested Card record.
The first call verification record includes that presently described initial call triggers node identifier, establishes the port of communication Or connection, timestamp, the calling communication terminal call identification information, the called communication terminal calls identification information is exhaled It is the current state of foundation and the data category of communication;The data type of the calling includes: voice, video, fax or mutual One of networked digital information or a variety of combinations.
The initial call triggering node is while sending first call verification record according to communication protocol flow Continue handshaking procedure;The process of the camouflage calling communication test for identification can with the handshaking procedure of original communication protocol simultaneously into Row.
The communication examine node for receiving the first call verification record after, the master that will include in record Communication terminal calls identification information is made to initiate the reversed addressing request for calling communication terminal status monitoring as addressing target; After the calling communication terminal ownership management node receives the reversed addressing request, examined described in node transmission to the communication Second call verification of calling communication terminal records;The second call verification record includes that presently described calling communication terminal is returned Belong to management node identifier, port or the connection of communication, timestamp, the calling communication terminal calling identification letter has been established Breath, the called communication terminal calls identification information, the current state of call setup and the data category of communication.
The reversed addressing request includes the calling identification information of the calling communication terminal and for calling communication terminal The instruction of status monitoring.
After the communication examines node to receive the second call verification record, which is recorded and is exhaled with first It cries verifying record relatively and decides whether that stopping call establishing;
Compare the called communication terminal calls identification information and the second call verification note in the first call verification record Whether the called communication terminal calls identification information in record is consistent, such as consistent, then continues subsequent examination or notice is initial The node replay call that sets out is called, the initial call triggering node is otherwise notified to remove and terminate the calling communication terminal pair Should converse establishment process;
Compare the timestamp in the timestamp and the second call verification record in the first call verification record, when the two difference It is to judge within effective time in Network Transmission Delays and call setup, then continues subsequent examination or notice initial call sets out Otherwise node replay call notifies the initial call triggering node to remove and terminate the corresponding call of the calling communication terminal and build Vertical process;
Compare the communication data class in the communication data classification and the second call verification record in the first call verification record It is not whether not consistent, it is such as consistent, then continue subsequent examination or notice initial call sets out node replay call, otherwise described in notice The corresponding call establishment process of the calling communication terminal is removed and terminated to initial call triggering node;
Compare in initial call triggering node identifier and the second call verification record described in the first call verification record Calling communication terminal ownership management node identifier it is whether consistent, it is such as consistent, then continue subsequent examination or notice just Begin to call the node replay call that sets out, the initial call triggering node is otherwise notified to remove and terminate the calling communication terminal Corresponding call establishment process;
Compare in the port for establishing communication described in the first call verification record or connection and the second call verification record Foundation communication port or connection it is whether consistent, the calling communication identification and call request are checked if consistent Whether source port or connection allow, if receiving the port of call request or connection legal can initiate the calling communication The call request of identification then sends call setup and is indicated to calling triggering node, and otherwise sending, which terminates foundation, is indicated to calling triggering Node.
The present invention includes following technical scheme:
A kind of manipulative communications deception recognition methods, comprising the following steps:
(1) initial call triggering node receives the call request that calling terminal is initiated, and generates the first calling of calling terminal Verify recording and sending first call verification record;
(2) communication examines node to receive the first call verification record, initiates reversed addressing request;
(3) calling terminal ownership management node receives the reversed addressing request, and send the calling terminal second exhales Verifying is made to record;
(4) communication examines node to receive second call verification record, by second call verification record and the first calling Verifying record is compared, and decides whether that stopping call establishing according to comparison result.
The manipulative communications deception recognition methods, preferred:
First call verification record in the step (1) includes the triggering node identification of presently described initial call Number, establish communication port or connection, timestamp, calling terminal calling identification information, called terminal calling identification information, exhale It is one of current state of foundation and the data category of communication or combinations thereof.
The manipulative communications deception recognition methods, preferred:
The step (2) includes: that the communication examines node to receive the first call verification record, whole with the caller The calling identification information at end addresses the calling communication terminal ownership pipe that the calling terminal is registered or connected in a network Node is managed, and then sends reversed addressing request information and reaches the calling communication terminal ownership management node.
The manipulative communications deception recognition methods, preferred:
The second call verification record in the step (3) includes calling terminal ownership management node identifier, builds The port of vertical communication or connection, timestamp, calling terminal calling identification information, called terminal calling identification letter One of breath, the current state of call setup and data category of communication or combinations thereof.
The manipulative communications deception recognition methods, preferred:
In the step (4), the communication examines node to receive second call verification record, by second call verification Record is compared with the first call verification record and decides whether that stopping call foundation includes: according to comparison result
(4.1) compare the called terminal calling identification information and the second call verification note in the first call verification record Whether the called terminal calling identification information in record is consistent, such as consistent, then sends call setup and be indicated to initial call touching It sends out node or continues subsequent comparison, otherwise sending, which terminates foundation, is indicated to calling triggering node.
The manipulative communications deception recognition methods, it is preferred: to further include step below before or after the step (4.1) It is one or a combination set of rapid:
(4.2) compare the timestamp in the timestamp and the second call verification record in the first call verification record, when two The difference of person is then to send call setup within allowed band and be indicated to initial call triggering node or continue subsequent ratio Compared with otherwise sending, which terminates foundation, is indicated to calling triggering node;
(4.3) compare the communication number in the communication data classification and the second call verification record in the first call verification record It is whether consistent according to classification, it is such as consistent, then it sends call setup and is indicated to initial call triggering node or continues subsequent comparison, it is no It then sends end foundation and is indicated to calling triggering node;
(4.4) compare initial call triggering node identifier described in the first call verification record and the second call verification note Whether the calling terminal ownership management node identifier in record is consistent, such as consistent, then sends call setup and be indicated to calling It triggers node or continues subsequent comparison, otherwise sending, which terminates foundation, is indicated to calling triggering node;
(4.5) compare the port that communication is established described in the first call verification record or connection and the second call verification note Whether the port of the foundation communication in record or connection are consistent, and the calling communication identification and calling are checked if consistent Whether request source port or connection allow, if the port of reception calling communication terminal call request or connection can be legal The call request for initiating calling communication identification is then judged as permissions, and send call setup be indicated to calling trigger node or Person continues subsequent comparison, and end foundation is sent if inconsistent or do not allow and is indicated to calling triggering node.
The manipulative communications deception recognition methods, preferred further comprising the steps of:
(5) initial call triggering node indicates or terminates to establish to indicate to establish calling terminal according to the call setup received The communication of communication or the end calling terminal with called terminal.
The manipulative communications deception recognition methods, preferred:
The data type includes voice, video, one of fax or internet data information or a variety of combinations.
A kind of manipulative communications deception identifying system, including initial call trigger node, and node and calling terminal ownership are examined in communication Management node, wherein
The initial call triggering node is used to receive the call request of calling terminal initiation, generates the first of calling terminal Call verification recording and sending first call verification record;The communication examines node for receiving first call verification Record, initiates reversed addressing request;Calling terminal ownership management node sends the master for receiving the reversed addressing request The second call verification of terminal is made to record;Wherein:
The communication examines node to receive second call verification record, by second call verification record and the first calling Verifying record is compared, and decides whether that stopping call establishing according to comparison result.
The manipulative communications deception identifying system, preferred:
The first call verification record includes presently described initial call triggering node identifier, receives call request Port or connection, timestamp, calling terminal calling identification information, called terminal calling identification information, call setup it is current One of state and the data category of communication or combinations thereof.
The manipulative communications deception identifying system, preferred:
The communication examines node to receive the first call verification record, with the calling identification information of the calling terminal The calling terminal current calling communication terminal ownership management node in a network is addressed, and then sends reversed addressing request letter Breath reaches the calling communication terminal and belongs to management node.
The manipulative communications deception identifying system, preferred:
The second call verification record includes calling terminal ownership management node identifier, the end that communication has been established Mouth or connection, timestamp, calling terminal calling identification information, the called terminal calling identification information, call setup Current state and one of the data category of communication or combinations thereof.
The manipulative communications deception identifying system, preferred:
The communication examines node to receive second call verification record, by second call verification record and the first calling Verifying record is compared and includes executing to compare according to the comparison procedure that comparison result decides whether to stop in the foundation of call Mode 1: compare in the called terminal calling identification information and the second call verification record in the first call verification record Whether the called terminal calling identification information is consistent, such as consistent, then sends call setup and be indicated to initial call triggering node Or continue subsequent comparison, otherwise sending, which terminates foundation, is indicated to calling triggering node.
The manipulative communications deception identifying system, preferred: the communication examines node before executing the comparison pattern 1 Or later further include executing one or a combination set of following comparison pattern:
Comparison pattern 2: comparing the timestamp in the timestamp and the second call verification record in the first call verification record, When the two difference is then to send call setup within allowed band and be indicated to initial call triggering node or continue subsequent ratio Compared with otherwise sending, which terminates foundation, is indicated to initial call triggering node;
Comparison pattern 3: compare in the communication data classification and the second call verification record in the first call verification record Whether communication data classification is consistent, such as consistent, then sends call setup and be indicated to initial call triggering node or continue subsequent Compare, otherwise sending, which terminates foundation, is indicated to initial call triggering node;
Comparison pattern 4: compare initial call triggering node identifier described in the first call verification record and the second calling Whether the calling terminal ownership management node identifier in verifying record is consistent, such as consistent, then sends call setup instruction To calling triggering node or continue subsequent comparison, otherwise transmission, which terminates to establish, is indicated to initial call triggering node;
Comparison pattern 5: compare the port that communication is established described in the first call verification record or connection and the second calling Whether the port of the foundation communication in verifying record or connection are consistent, and the calling communication identification is checked if consistent Whether allow with call request source port or connect, if receiving the port of calling terminal call request or connection can close The call request that method initiates the calling communication identification is then judged as permission, and sends call setup and be indicated to calling triggering node Or continue subsequent comparison, end foundation is sent if inconsistent or do not allow is indicated to calling triggering node.
The manipulative communications deception identifying system, preferred:
Initial call triggering node according to receive call setup instruction or terminate establish instruction establish calling terminal and The call of called terminal or the call for terminating the calling terminal.
The manipulative communications deception identifying system, preferred:
The data type includes voice, video, one of fax or internet digital information or a variety of combinations.
Manipulative communications deception identifying system described in one of as above, preferred:
The system further includes communications network intermediate node, which is located at calling terminal ownership management section Between point and called terminal ownership management node, for relaying calling terminal ownership management node and described initially exhaling It is the signaling and message between triggering node and called terminal ownership management node.
Detailed description of the invention
Fig. 1 is that manipulative communications deception identifying system of the present invention constitutes schematic diagram;
Fig. 2 is the flow chart of manipulative communications deception of the present invention identification;
Fig. 3 is application schematic diagram of the present invention in communication network.
Specific embodiment
The communication switching network includes CDMA, TD-SCDMA, the mobile radio communication of 2G/3G/4G/5G wireless communication standard Network, fixed telephone network, enterprise's VOIP telephone network, Internet application layer communication network etc..
As described in Figure 1, manipulative communications deception identifying system of the invention includes communication terminal, communication transmission network connect node and Node is examined in communication.The communication terminal includes calling communication terminal and called communication terminal;The communication transmission network connects Node includes: initial call triggering node, and communication terminal belongs to management node and communication transmission nodes;The communication Terminal attaching management node can be there are two types of logical type in call establishment: being the quilt for managing called communication terminal respectively It is called letter terminal attaching management node and manages the calling communication terminal ownership management node of calling communication terminal.
The communication terminal can be mobile phone, fixed-line telephone, corporate intranet IP phone and offer real-time communication clothes The software client of business;It can be fixed communication network, mobile communications network, enterprise's VOIP communication network using the network of communication Network, Internet application communication;The communication terminal has communication terminal calls identification information, such as Mobile Directory Number, fixed electricity Talk about number, instant messaging service number.These communication terminal calls identification informations are in communication process according to the role for serving as calling It is different and can be accordingly one of calling communication terminal identification information or called communication terminal identification information.
Mobile phone, fixed-line telephone, instant communication client are works when initiating calling behavior to the called communication terminal For the session main body of calling communication;The corresponding phone number of the calling communication terminal, telephone number, communication ID etc. are known as caller Communication terminal calls identification information, being used to send a telegram here during call setup in called communication terminal displays identifies;Due to Communication protocol has used different technologies in definition, and the communication identification information can be the information of group information composition, Different stage of communication uses relevant communication identification information;Mobile subscriber number is used as mobile phone is shown in caller (MSISDN), but when registering mobile network using international mobile subscriber identification (IMSI), these can be communication end The component part of the communication identification information at end.
The called communication terminal refers to the called communication terminal session main body of termination and call establishment;It is corresponding described logical Believe that terminal call identification information is known as called communication terminal calls identification information;The called communication terminal calls identification information is used In addressing the called communication terminal according to communication protocol in the call setup, thus eventually by call proceeding to the called communication End.If mobile phone is as called communication terminal, then mobile subscriber number (MSISDN) is exactly called number, that is, described is called Believe the component part of terminal call identification information;Mobile communications network is for called mobile phones mobile subscriber number (MSISDN) By the addressing of mobile network 2G/3G/4G/5G to connect communication.
Calling behavior refers to calling mobile phone, fixed-line telephone, IP phone, the calling communications client such as corporate intranet phone The behavior that call communication is requested, communication are initiated to the called communication terminal using the called communication terminal calls identification information Content-form can be voice, video, one of fax or internet digital information or a variety of combinations.
The ownership management node of the communication terminal described in practical can be mobile switching center, in fixed communication exchange The heart, IP phone server, real-time communication server etc. can manage the mobile phone for being registered in mobile switching center, It is connected to the fixed-line telephone of fixed communication switching centre, the IP phone for being registered in IP phone server and real-time communication server is whole End or client real-time management distribute, recycling, the regarding resource status that detection present communications terminal is connect with communication network, packet Include the physical interface or connecting interface of management and serial communication, IP state, radio roaming state, registration area, communication The position of terminal and communication terminal real-time communication conditions.
The called communication terminal ownership management node refers to during replay call, be exactly in practical be the quilt Communication terminal real-time management is cried, is distributed, recycling detects the institute for the related resource that current called communication terminal is connect with communication network State communication terminal ownership management node;It can be the mobile switching center of called communication terminal registration roaming in practical, The either fixed communication switching centre of fixed-line telephone connection, or the IP phone server of management IP phone terminal, either The real-time communication server etc. of management client.
The calling communication terminal ownership management node refers to during replay call, real for the calling communication terminal Shi Guanli is distributed, and recycling, the communication terminal for detecting the related resource that current calling communication terminal is connect with communication network is returned Belong to management node;It can be the mobile switching center of calling communication terminal registration roaming, or fixed electricity in practical Talk about the fixed communication switching centre of connection, or the IP phone server or management client of management IP phone terminal Real-time communication server etc..
The communications network intermediate node described in practical be in calling communication terminal ownership management node and Communication switching node between the called communication terminal ownership management node;It, can also since the both sides of communication can be local To be the telecommunication needed across many network nodes, thus can have during call setup one, it is multiple can also To be not present;Be responsible for relaying during calling and connection setup the calling communication terminal ownership management node and it is described just The signaling and message to begin between calling triggering node and the called communication terminal ownership management node, it is fixed in mobile network Communication network can be region class convergence switching centre, national communication aggregation center in IP communication network;In instant messaging It can be multiple Server Relay communications and reach remote communication terminal.
The communication described in practical examines node to be used to receive set out that node sends from the initial call described the Reversed addressing request is issued to calling communication terminal ownership management node after one call verification record;The calling communication is whole After end ownership management node receives the reversed addressing request, node is examined to send the calling communication terminal to the communication Second call verification record;Node the first call verification record and second call verification note are examined in the communication Record decides whether to continue replay call connection setup or the communication that stops call according to comparison result.
If Fig. 2 is that method for distinguishing is known in manipulative communications deception of the present invention.
Firstly, by the initial call triggering node receive from the calling communication terminal calling identification information based on The call communication of session main body is made to request, the call request includes called communication terminal calls identification information, call data class Type etc..
The first call verification that initial call triggering node generates management calling communication terminal in real time records, and described the One call verification record includes that presently described initial call triggers node identifier, receives port or the connection of call request, Timestamp, the calling identification information of the calling communication terminal, the calling identification information of the called communication terminal, call setup Current state and communication data type;The data type of the calling includes: voice, video, fax or interconnection netting index One of word information or a variety of combinations.By taking mobile communications network as an example, it can be call request in an implementation and be sent to shifting Dynamic exchange gateway exchange, mobile switching centre trigger node as initial call, and first is generated after receiving the call request and is exhaled It makes verifying record and first call verification record is sent to communication and examines node.
The communication examines node to initiate the reversed addressing request for calling communication terminal status monitoring: with the caller The calling identification information of communication terminal addresses the calling communication terminal current node in a network, and it is reversed to retransmit (routing) Addressing request information reach calling communication terminal belong to management node, the solicited message include calling communication terminal identification information and It is required that the calling communication terminal ownership management node feeds back the instruction of the second call verification record.It is with mobile communications network Example, the communication examine node reversely to address calling communication terminal with the telephone number (MSISDN) of calling mobile phone in network In current registration and roaming mobile switching centre, i.e. the calling communication terminal of calling mobile phone belongs to management node; Calling communication terminal belongs to the current registration of management node management calling mobile phone;Calling communication terminal belongs to management node (such as roaming mobile switching centre) management includes the real-time communication conditions of calling communication terminal, resource, connection and session pair As, thus calling communication terminal ownership management node can be according to real-time, comprehensive calling communication state recording generates second and exhales Verifying is made to record.
The calling communication terminal belongs to management node, and by taking mobile communications network as an example, i.e., calling mobile phone is current Registration and roaming mobile switching centre generate the second call verification recording and sending to the communication inspection node.Subsequent implementation It is elaborated with regular meeting and states the present invention in the mobile communication network, the implementation in fixed communication network.Second call verification record packet Include calling terminal ownership management node identifier, the port for establishing communication or connection, timestamp, the calling terminal are exhaled It is one in identification information, called terminal calling identification information, the current state of call setup and the data category of communication Kind or combinations thereof.After the communication examines node to receive the second call verification record, by second call verification record and the One call verification records relatively and decides whether that stopping call establishing:
1, compare the called communication terminal calls identification information and the second call verification in the first call verification record Whether the called communication terminal calls identification information in record is consistent, such as consistent, then sends call setup and be indicated to initially Calling triggering node continues subsequent examination, and it is logical otherwise to notify that the caller is removed and terminated to the initial call triggering node Believe the corresponding call establishment process of terminal;
2, compare the timestamp in the timestamp and the second call verification record in the first call verification record, when the two is poor Different is such as to judge in the sum of effective time in Network Transmission Delays and call setup within the scope of the predetermined time, then send call setup It is vertical to be indicated to initial call triggering node or continue subsequent examination, otherwise notify the initial call triggering node dismounting and knot The corresponding call establishment process of Shu Suoshu calling communication terminal;
3, compare the communication data in the communication data classification and the second call verification record in the first call verification record Whether classification is consistent, such as consistent, then continues subsequent examination or notify the initial call trigger unit replay call, otherwise lead to Know that the corresponding call establishment process of the calling communication terminal is removed and terminated to the initial call triggering node.
4, compare initial call triggering node identifier described in the first call verification record and the second call verification record In calling communication terminal ownership management node identifier it is whether consistent, it is such as consistent, then continue subsequent examination or notice Otherwise it is logical to notify that the caller is removed and terminated to the initial call triggering node for the initial call trigger unit replay call Believe the corresponding call establishment process of terminal;
5, compare the port that communication is established described in the first call verification record or connection and the second call verification record In foundation communication port or connection it is whether consistent, check that the calling communication identification is asked with calling if consistent Ask whether source port or connection allow, i.e., if receiving the port of calling request or connection can be described in legal initiation The call request of calling communication identification then sends call setup and is indicated to calling triggering node or continues subsequent examination, otherwise sends out It send end to establish and is indicated to calling triggering node;The initial call triggering node is notified to remove and terminate institute if inconsistent State the corresponding call establishment process of calling communication terminal.
If Fig. 3 is the implementing procedure of the present invention in a communication network, this example is with the invention of mobile communications network basic description Itself.
In mobile communications network such as 2G/3G/4G/5G network, the calling communication terminal is calling mobile phone, The called communication terminal is called mobile phones, and the initial call triggering node is first and receives from caller shifting The call request of mobile phone and the mobile switching centre for generating the first call verification record, the calling communication terminal ownership management Node is the mobile switching centre that true calling mobile phone is currently registered and roamed, the called communication terminal ownership pipe Reason node is the mobile switching centre that called mobile phones are currently registered and roamed, and it is to be exclusively used in examining that node is examined in the communication Look into the functional entity node whether calling calls from camouflage.
Such as Fig. 3, step S31 initial call triggering node receives call communication request, and the call communication request includes master It is communication terminal calls identification information and called communication terminal calls identification information, can be caller cell-phone number in a mobile network Code and called mobile phone number;
Step S32 initial call triggering node can be mobile switching centre's gateway exchange in an implementation, eventually with called communication End calling identification information is addressing target, is started according to mobile communication protocol (the call routing agreement for including in such as 3GPP agreement) Call proceeding.
Step S33 initial call triggering node sends the first call verification and the communication inspection node is recorded;Implementing In can be mobile switching centre's gateway exchange and generate the first call verification and record and send it to communication inspection node;? In implementation, since mobile phone is possible to switch and exhales so as to cause calling communication terminal is corresponding during call setup It is change in resources, if the port of connection setup or connection can change, mobile switching centre after handover is needed (to become Leading role's call manager node after switching) new the first call verification record is initiated to exclude mobile phone switching bring interference.
After the communication examines node to receive first inspection record, the calling communication terminal calling identification letter is extracted Breath, can be calling mobile phone number in a mobile network;Identification information is called with the calling communication terminal, i.e. caller moves The reversed addressing request of mobile phone number step of initiating S34;Mobile communications network calls identification information with the calling communication terminal, That is calling mobile phone number addressing sends the reversed addressing request to the calling communication terminal and belongs to management node;Institute Stating calling communication terminal ownership management node is that the corresponding true calling communication terminal of caller mobile calls identification information is current The mobile switching centre of registration and roaming.
The calling communication terminal belongs to management node, is that true calling mobile phone is currently registered in the present embodiment With the mobile switching centre of roaming, second verifying is generated for the real-time status of calling mobile phone in node and is remembered Record, and the second call verification record is sent to the communication and examines node.
The second call verification record includes that presently described calling communication terminal belongs to management node identifier, is had been established The port of communication or connection, timestamp, the calling communication terminal call identification information, and the called communication terminal calls are known Other information, the current state of call setup and the data category of communication.The port for establishing communication or connection include receiving The outgoing interface of the incoming interface of communication signaling and call data relevant with forwarding replay call signaling and data.In a mobile network Including but not limited to E1/T1, optical interface, the port Ethernet10M/100M/1G/10G/40G, connection can be relaying group, The various connections such as ATM, TCP, UDP, SCTP, SIP, SSL/TLS, VPN, Tunne1, these interfaces correspond respectively to different nets Network disposes 2G/3G/4G/5G mobile communications network.
The communication examines node to compare the first verifying record and the second verifying record, and the letter of record is compared according to strategy configuration Interest statement member, will be gone through by the connection setup process of all audits by comparison, and the call communication foundation to fail inspection will It is required to remove and establishes.In mobile network's deployment, it is contemplated that, can will be by initial in the case where lower deployment cost and management cost Calling triggering node generates the function of the first call verification record in non-initial calling triggering node unlatching, such as Central Exchange or The gateway exchange of person's large size is open-minded.In this way since the switching centre for generating the first call verification record is not initial call triggering section Point, therefore the initial trigger cell node number for including in the first call verification record for generating and sending and foundation communication Port and connection cannot be used to verify manipulative communications deception identification.This deployment scheme passes through the first verifying record and the second verifying note Comparison pattern 1 in record, comparison pattern 2 and comparison pattern 3 realize manipulative communications deception identification, while reducing lower deployment cost, improve portion The practicability of administration.
Communication described in step S36 examines node to send the call setup based on verification result and is indicated to initial call triggering section Point.
Such as Fig. 3, implementation of the present invention in fixed communication network is shown.
In fixed communication network PSTN, NGN, the calling communication terminal is caller fixed-line telephone, described to be called Believe that terminal is called fixed-line telephone, the initial call triggering node is to receive call request and generate the first calling to test The fixed-line telephone switching centre of record is demonstrate,proved, the calling communication terminal ownership management node is consolidating for caller fixed-line telephone connection Determine telephone switching center, the called communication terminal ownership management node is the fixed-line telephone that called fixed-line telephone currently connects Switching centre, whether it is to be exclusively used in checking calling from the functional entity node for pretending calling that node is examined in the communication.
Such as Fig. 3, step S31: initial call triggering node receives call communication request, and the call communication request includes master It is communication terminal calls identification information and called communication terminal calls identification information, it is solid to can be caller in fixed communication network Determine telephone number and called fixed telephone number;
Step S32: initial call triggering node can be fixed switching centre's gateway exchange, initial call triggering in an implementation Node starts call proceeding according to fixed-line telephone communication protocol using called communication terminal calls identification information as addressing target;
Step S33: initial call triggering node can be fixed switching centre's gateway exchange, initial call triggering in an implementation Node generates the first call verification and records and send it to the communication inspection node;
Step 34: after the communication examines node to receive first inspection record, extracting the calling communication terminal and exhale It is identification information, can be caller fixed telephone number in fixed communication network;It is called and is identified with the calling communication terminal Information, i.e. caller fixed telephone number initiate reversed addressing request;Fixed communication network is called with the calling communication terminal to be known The addressing of other information, i.e. caller fixed telephone number sends the reversed addressing request and belongs to management section to told calling communication terminal Point;The calling communication terminal ownership management node is the fixed-line telephone switching centre of true caller fixed-line telephone connection;
Step 35: in the fixed exchange that the calling communication terminal ownership management node-caller fixed-line telephone currently connects The heart generates second verifying for the real-time status of caller fixed-line telephone in node and records, and second verification information is sent out It gives communication and examines node.The second call verification record includes the ownership management node identification of presently described calling communication terminal Number, port or the connecting interface of communication, timestamp has been established, the calling communication terminal calls identification information, described called Communication terminal calls identification information, the current state of call setup and the data category of communication.It is described establish communication port or Person's connection includes receiving the incoming interface signaling relevant with forwarding replay call of communication signaling and call data and connecing out for data Mouthful.It in fixed include but is not limited to E1/T1, optical interface, the port Ethernet 10M/100M/1G/10G/40G, connection It can be relaying group, ATM, TCP, UDP, SCTP, SIP, SSL/TLS, the various connections such as VPN, Tunne1.
Step 36: the communication examines node to compare the first verifying record and the second verifying record, and node packet is examined in communication It includes for recording the information unit that the first verifying records and the second verifying records, communication inspection node is sequentially in comparison information unit First verifying record of storage and each corresponding information of the second verifying record, pass through the connection setup mistake of all audits by comparison Journey will go through, and the call communication foundation to fail inspection, which will be required to remove, establishes.Communication examines node transmission to be based on The call setup instruction of verification result/dismounting foundation is indicated to initial call triggering node.In fixed network deployment, it is contemplated that In the case where lower deployment cost and management cost, the function of the first call verification record can will be generated by initial call triggering node It is opened in non-initial calling triggering node, the gateway exchange such as Central Exchange or large size is open-minded.It is exhaled in this way due to generating first The switching centre for making verifying record is not initial call triggering node, therefore wraps in the first call verification record for generating and sending The port of the initial trigger cell node number and foundation communication that include and connection cannot be used to verify manipulative communications deception identification.This Kind deployment scheme verifies comparison pattern 1 in record by the first verifying record and second, and comparison pattern 2 and comparison pattern 3 are realized Manipulative communications deception identification, while lower deployment cost is reduced, improve the practicability of deployment.
Can be recognized accurately whether incoming call is that the real calling owner is initiated, and makes illegal puppet through the invention The calling of dress cannot be switched on, and improve communications security.

Claims (6)

1. a kind of manipulative communications deception recognition methods, it is characterised in that the following steps are included:
(1) initial call triggering node receives the call request that calling terminal is initiated, and generates the first call verification of calling terminal Recording and sending first call verification record;
(2) communication checking function node receives the first call verification record, with the calling identification information of the calling terminal The ownership management node for the calling terminal that the calling terminal is registered or connected in a network is addressed, and then is sent reversed Addressing request information reaches the calling terminal and belongs to management node;
(3) the ownership management node of calling terminal receives the reversed addressing request, sends the second calling of the calling terminal Verifying record;
(4) communication checking function node receives second call verification record, by second call verification record and the first calling Verifying record is compared, and decides whether that stopping call establishing according to comparison result;
In the step (4), the communication checking function node receives second call verification record, by second call verification Record is compared with the first call verification record and decides whether that stopping call foundation includes: according to comparison result
(4.1) compare the institute in the called terminal calling identification information and the second call verification record in the first call verification record Whether consistent state called terminal calling identification information, it is such as consistent, then send call setup be indicated to initial call triggering node or Person continues subsequent comparison, and otherwise sending, which terminates foundation, is indicated to calling triggering node;
Include the steps that before or after the step (4.1) following:
(4.2) compare the timestamp in the timestamp and the second call verification record in the first call verification record, when the two Difference is then to send call setup within allowed band and be indicated to initial call triggering node or continue subsequent comparison, no It then sends end foundation and is indicated to calling triggering node;
(4.3) compare the communication data class in the communication data classification and the second call verification record in the first call verification record It is not whether not consistent, it is such as consistent, then it sends call setup and is indicated to initial call triggering node or continues subsequent comparison, otherwise send out It send end to establish and is indicated to calling triggering node;
(4.4) compare in initial call triggering node identifier and the second call verification record described in the first call verification record Calling terminal ownership management node identifier it is whether consistent, it is such as consistent, then send call setup and be indicated to calling triggering Node continues subsequent comparison, and otherwise sending, which terminates foundation, is indicated to calling triggering node;
(4.5) compare in the port for establishing communication described in the first call verification record or connection and the second call verification record Foundation communication port or connection it is whether consistent, the call request of the calling communication identification is checked if consistent Whether source port or connection allow, if receiving the port of calling terminal call request or connection can be described in legal initiation Calling communication identification call request be then judged as permissions, and send call setup be indicated to calling triggering node or continuation after It is continuous to compare, end foundation is sent if inconsistent or do not allow is indicated to calling triggering node.
2. manipulative communications deception recognition methods according to claim 1, it is characterised in that:
First call verification record in the step (1) includes presently described initial call triggering node identifier, builds The port of vertical communication or connection, timestamp, calling terminal calling identification information, called terminal calling identification information, call setup The data category of vertical current state and communication.
3. manipulative communications deception recognition methods according to claim 1, it is characterised in that:
The second call verification record in the step (3) includes calling terminal ownership management node identifier, establishes and lead to The port of letter or connection, timestamp, calling terminal calling identification information, called terminal calling identification information, call setup One of current state and the data category of communication or combinations thereof.
4. a kind of manipulative communications deception identifying system, including initial call trigger node, communicates checking function node and calling terminal is returned Belong to management node, wherein
The initial call triggering node is used to receive the call request of calling terminal initiation, generates the first calling of calling terminal Verify recording and sending first call verification record;The communication checking function node is for receiving first call verification Record addresses the ownership of the calling terminal current calling terminal in a network with the calling identification information of the calling terminal Management node, and then send reversed addressing request information and reach the calling terminal ownership management node;The ownership of calling terminal Management node sends the second call verification record of the calling terminal for receiving the reversed addressing request;Its feature exists In:
The communication checking function node receives second call verification record, by second call verification record and the first calling Verifying record is compared, and decides whether that stopping call establishing according to comparison result;
The communication checking function node receives second call verification record, by second call verification record and the first calling Verifying record is compared and includes executing to compare according to the comparison procedure that comparison result decides whether to stop in the foundation of call Mode 1: compare described in the called terminal calling identification information and the second call verification record in the first call verification record Whether called terminal calls identification information consistent, such as consistent, then send call setup be indicated to initial call triggering node or Continue subsequent comparison, otherwise sends to terminate to establish to be indicated to call and trigger node;
The communication checking function node further includes executing following comparison pattern before or after executing comparison pattern 1:
Comparison pattern 2: compare the timestamp in the timestamp and the second call verification record in the first call verification record, when two Person's difference is then to send call setup within allowed band and be indicated to initial call triggering node or continue subsequent comparison, Otherwise it sends to terminate to establish and is indicated to initial call triggering node;
Comparison pattern 3: compare the communication in the communication data classification and the second call verification record in the first call verification record Whether data category is consistent, such as consistent, then sends call setup and be indicated to initial call triggering node or continue subsequent comparison, Otherwise it sends to terminate to establish and is indicated to initial call triggering node;
Comparison pattern 4: compare initial call triggering node identifier and the second call verification described in the first call verification record Whether the calling terminal ownership management node identifier in record is consistent, such as consistent, then sends call setup and be indicated to and exhale It is triggering node or continues subsequent comparison, otherwise sending, which terminates foundation, is indicated to initial call triggering node;
Comparison pattern 5: compare the port that communication is established described in the first call verification record or connection and the second call verification Whether the port of the foundation communication in record or connection are consistent, and exhaling for the calling communication identification is checked if consistent Cry whether request source port or connection allow, if receiving the port of calling terminal call request or connection legal can send out The call request for playing calling communication identification is then judged as permissions, and send call setup be indicated to calling trigger node or Continue subsequent comparison, end foundation is sent if inconsistent or do not allow and is indicated to calling triggering node.
5. manipulative communications deception identifying system according to claim 4, it is characterised in that:
The first call verification record includes presently described initial call triggering node identifier, the port for receiving call request Or connection, timestamp, calling terminal calling identification information, called terminal calling identification information, the current state of call setup With one of the data category of communication or combinations thereof.
6. manipulative communications deception identifying system according to claim 4, it is characterised in that:
Second call verification record include calling terminal ownership management node identifier, the port that communication has been established or Person's connection, timestamp, calling terminal calling identification information, called terminal calling identification information, the current state of call setup and The data category of communication.
CN201610922296.1A 2016-10-25 2016-10-25 Manipulative communications deception recognition methods and system Expired - Fee Related CN106453799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610922296.1A CN106453799B (en) 2016-10-25 2016-10-25 Manipulative communications deception recognition methods and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610922296.1A CN106453799B (en) 2016-10-25 2016-10-25 Manipulative communications deception recognition methods and system

Publications (2)

Publication Number Publication Date
CN106453799A CN106453799A (en) 2017-02-22
CN106453799B true CN106453799B (en) 2019-06-04

Family

ID=58176967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610922296.1A Expired - Fee Related CN106453799B (en) 2016-10-25 2016-10-25 Manipulative communications deception recognition methods and system

Country Status (1)

Country Link
CN (1) CN106453799B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022173407A1 (en) * 2021-02-15 2022-08-18 Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi A system and method for preventing the network terminated fraud by using real calls

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756901A (en) * 2017-11-06 2019-05-14 中国电信股份有限公司 Anti- swindle method and apparatus
CN108391017B (en) * 2018-01-19 2021-07-20 五八有限公司 Statistical method, device, equipment and system of call information based on virtual telephone
CN110933013A (en) * 2018-09-19 2020-03-27 西安中兴新软件有限责任公司 Method and device for improving terminal security and computer readable storage medium
CN115550896A (en) * 2021-06-30 2022-12-30 中兴通讯股份有限公司 Calling method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798199A (en) * 2004-12-28 2006-07-05 乐金电子(中国)研究开发中心有限公司 Telephone number misappropriated confirmation method of mobile communication terminal
CN101569166A (en) * 2006-12-29 2009-10-28 朗讯科技公司 Validating caller ID information to protect against caller ID spoofing
CN103906067A (en) * 2012-12-28 2014-07-02 中国移动通信集团设计院有限公司 Method and device for identifying false calling number

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8437263B2 (en) * 2005-03-11 2013-05-07 Airmagnet, Inc. Tracing an access point in a wireless network
CN101345795B (en) * 2008-08-08 2012-07-04 中国移动通信集团山东有限公司 Method and system automatic monitoring and real-time blocking false calling of communication network
CN101340690B (en) * 2008-08-12 2011-08-31 中国移动通信集团江苏有限公司 Real-time monitoring and catching method for false calling number

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798199A (en) * 2004-12-28 2006-07-05 乐金电子(中国)研究开发中心有限公司 Telephone number misappropriated confirmation method of mobile communication terminal
CN101569166A (en) * 2006-12-29 2009-10-28 朗讯科技公司 Validating caller ID information to protect against caller ID spoofing
CN103906067A (en) * 2012-12-28 2014-07-02 中国移动通信集团设计院有限公司 Method and device for identifying false calling number

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022173407A1 (en) * 2021-02-15 2022-08-18 Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi A system and method for preventing the network terminated fraud by using real calls

Also Published As

Publication number Publication date
CN106453799A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN106453799B (en) Manipulative communications deception recognition methods and system
US7570743B2 (en) Method and apparatus for surveillance of voice over internet protocol communications
US8260290B2 (en) System and method for inbound roaming in IP multimedia subsystem networks
US11223955B2 (en) Mitigation of spoof communications within a telecommunications network
US10893140B2 (en) Method, system and device for an enhanced call setup with verification of a user equipment in a telecommunications network
US9131048B2 (en) Communication system and communication control method
CN105828334B (en) A kind of monitoring method and system positioning illegal callback service
CN107113301A (en) Voice and text data service for mobile subscriber
US20210314434A1 (en) Active Call Verification to Prevent Falsified Caller Information
JP5381086B2 (en) Communication system and communication control method
CN110224895A (en) A kind of VoLTE user's registration signaling delay analysis method and device
CN107104979A (en) A kind of voice clawback verifies the method and system of business
Sheoran et al. NASCENT: Tackling caller-ID spoofing in 4G networks via efficient network-assisted validation
Xie et al. The dark side of operational Wi-Fi calling services
US9225751B2 (en) Protection against unsolicited communication for internet protocol multimedia subsystem
CN107105430A (en) A kind of number authentication method and device
CN108632773A (en) A kind of call intercepting method, intelligent net system and Call Intercept system
CN104301450B (en) The method and device of addressing
KR101287588B1 (en) Security System of the SIP base VoIP service
CN101150448A (en) Method and system for legal monitoring for public service of IP multimedia subsystem
CN106254692B (en) Multi-service control processor co-group response method and device and service control processor
CN110300232A (en) Information collecting method and system, operation exchange and control device, evidence obtaining platform
CN101330319B (en) Tactics synchronizing method
CN101150447A (en) Monitoring agent device for legal monitoring for public service of IP multimedia subsystem
CN106534597A (en) Communication control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170824

Address after: 100107 Beijing Chaoyang District Wankexingyuan 4 Building 805

Applicant after: Guo Zhengzheng

Address before: 100084 Beijing Zhongguancun East Road, No. 1, building No. 8, ground floor, No. CB108-018, No.

Applicant before: BEIJING DONGSHI TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190604

Termination date: 20211025