A kind of call connection method and call attachment means
Technical field
The invention belongs to information security field, more particularly to a kind of call connection method and call attachment means.
Background technology
In recent years, the event of telecommunication fraud grows in intensity, and is not only caused any property loss to a large amount of victims, even more jeopardizes
The life security of many people.Mobile phone is also involved in telecommunication fraud frequently as widely available mobile network's terminal.
Such as, in existing swindle way, including the phone number A of first user is palmed off using pseudo-base station, or is passed through
The mode of virus controls the phone number A of first user, or to travel the phone number B of the second user of swindle, to cheated
The phone number C of the 3rd user send fraud information, such as swindling signal includes that " the phone number A of first user is more
Be changed to phone number B " information.
First user A is corresponding with phone number B in the 3rd cheated user C have modified address list according to fraud information
After relation, if the 3rd cheated user dial in amended address list first user A when (what is actually dialed is second
The phone number B of user), the phone number B of oneself is set to " automatic call forwarding to mobile phone by the second user for exercising swindle
Number A ".
After the first user of called transfer and the 3rd user connect phone, because the 3rd user is according to call voice,
It is exactly the phone number after first user change that phone number B may be mistakenly considered.Consequently, it is possible to causing the 3rd user to miss phase
Fraud information in letter swindle number (such as phone number B), the loss on property is caused to the 3rd user.
The content of the invention
It is an object of the invention to provide a kind of call connection method and call attachment means, to solve to lead in the prior art
The mode for crossing call forwarding misleads calling user and carries out the result of voice confirmation, consequently, it is possible to so that swindle molecule brings to user
The problem of property loss.
In a first aspect, the embodiment of the invention provides a kind of call connection method, methods described includes:
Receive call request, detect between the first correspondent and the second correspondent that the call request to be connected whether
There is call forwarding;
When there is call forwarding between first correspondent and second correspondent, then authentication is carried out;
When by authentication, the call connection set up between first correspondent and second correspondent.
With reference in a first aspect, in the first possible implementation of first aspect, it is described when first correspondent and
When there is call forwarding between second correspondent, then carrying out authentication step includes:
Selected called-number and the called-number corresponding name of contact person when calling is initiated are obtained, and
The number and the name of contact person are sent to carrier server;
Carrier server judge the number that receives and the name of contact person whether with the number and surname for prestoring
Name is consistent;
If inconsistent, can not be by authentication.
With reference in a first aspect, second of first aspect may in implementation, it is described when first correspondent and
When there is call forwarding between second correspondent, then carrying out authentication step includes:
The instant messaging account bound in the corresponding contact person of selected called-number when calling is initiated is obtained, and is led to
Cross JICQ and send contact person's confirmation request to the instant messaging account of the binding;
The communication data that the instant messaging account of the contact person is returned is received, identity is carried out according to the communication data for returning
Checking.
With reference to second possible implementation of first aspect, in the third possible implementation of first aspect, institute
State is included by JICQ to instant messaging account transmission contact person's confirmation request step of the binding:
By the JICQ, word confirmation request is sent to the instant messaging account of the binding;
Or, by the JICQ, send video to the instant messaging account of the contact person of the binding and connect
Connect or voice connection confirmation request;
Or, by the JICQ, photo confirmation request is sent to the instant messaging account of the binding.
Second possible realization side of the first possible implementation, first aspect with reference to first aspect, first aspect
The third possible implementation of formula or first aspect, in the 4th kind of possible implementation of first aspect, the detection institute
State and include with the presence or absence of call forwarding step between the first correspondent and the second correspondent that call request to be connected:
Detect whether the call number of the first correspondent opens call transfer service, or the calling for detecting the first correspondent
Whether number is identical with the number of the second correspondent, if the call number of the first correspondent opens call transfer service, or
The call number of the first correspondent is different from the number of the second correspondent, then exist between the first correspondent and the second correspondent and exhale
Cry transfer.
Second aspect, the embodiment of the invention provides a kind of call attachment means, and described device includes:
Calling detection unit, for receiving call request, detect call request first correspondent to be connected with
Whether there is call forwarding between second correspondent;
Identity authenticating unit, for when there is call forwarding between first correspondent and second correspondent,
Then carry out authentication;
Connection establishment unit, for when by authentication, setting up first correspondent with second correspondent
Between call connection.
With reference to second aspect, in the first possible implementation of second aspect, the identity authenticating unit includes:
Name transmission sub-unit, for obtaining selected called-number and the called-number when calling is initiated
Corresponding name of contact person, and the number and the name of contact person are sent to carrier server;
Checking subelement, for carrier server judge the number that receives and the name of contact person whether with
The number and name for prestoring are consistent;
Judgment sub-unit, if for inconsistent, can not be by authentication.
With reference to second aspect, in second possible implementation of second aspect, the identity authenticating unit includes:
Confirmation request transmission sub-unit, for obtaining selected called-number corresponding contact person institute when calling is initiated
The instant messaging account of binding, and confirm to ask to the instant messaging account transmission contact person of the binding by JICQ
Ask;
Communication data receiving subelement, the communication data that the instant messaging account for receiving the contact person is returned, root
Authentication is carried out according to the communication data for returning.
With reference to second possible implementation of second aspect, in the third possible implementation of second aspect, institute
State confirmation request transmission sub-unit specifically for:
By the JICQ, word confirmation request is sent to the instant messaging account of the binding;
Or, by the JICQ, send video to the instant messaging account of the contact person of the binding and connect
Connect or voice connection confirmation request;
Or, by the JICQ, photo confirmation request is sent to the instant messaging account of the binding.
Second possible realization side of the first possible implementation, first aspect with reference to second aspect, second aspect
The third possible implementation of formula or second aspect, in the 4th kind of possible implementation of first aspect, the calling inspection
Survey unit specifically for:
Detect whether the call number of the first correspondent opens call transfer service, or the calling for detecting the first correspondent
Whether number is identical with the number of the second correspondent, if the call number of the first correspondent opens call transfer service, or
The call number of the first correspondent is different from the number of the second correspondent, then exist between the first correspondent and the second correspondent and exhale
Cry transfer.
The present invention converses before connection in foundation, according to call request to the first correspondent to be connected and the second correspondent
Between carry out call forwarding detection.If bid transfer, carries out identity and tests between the first correspondent and the second correspondent
Card, when being verified, the call connection set up between the first correspondent and the second call.This method can turn there is calling
Whether it is timely that the contact person that user is currently being conversed timely is verified to called-number during shifting, so that
Can in time find that disabled user passes through call forwarding user cheating, it is to avoid bring property etc. to lose to user.
Brief description of the drawings
Fig. 1 is that the call connection method that first embodiment of the invention is provided realizes flow chart;
Fig. 2 is that the call connection method that second embodiment of the invention is provided realizes flow chart;
Fig. 3 is that the call connection method that third embodiment of the invention is provided realizes flow chart;
The structural representation of the call connection server that Fig. 4 is provided for fourth embodiment of the invention;
The structural representation of the terminal of the call connection that Fig. 5 is provided for fifth embodiment of the invention;
The structural representation of the terminal of the call connection that Fig. 6 is provided for sixth embodiment of the invention;
The structural representation of the mobile terminal of the another call connection that Fig. 7 is provided for seventh embodiment of the invention.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The purpose of the embodiment of the present invention is to provide a kind of method for preventing telecommunications from cheating, to solve in the prior art, swindleness
User is deceived by forging third party, or third party is poisoned, or directly transmitted and change the information of third party's number to being cheated
Deceive user so that the new swindle number that swindle molecule is used possibly cannot timely and effectively be recognized by swindle user, or cheated
When deceiving the fraudulent call that user is dialed in fraud information, to third party's number, user takes for swindle number to the automatic call forwarding of meeting
Code is the number of real third party user, it is impossible to the swindle number of effective identification swindle molecule, the property band that can be given people
To lose, the problem of the normal life of people is influenceed.The present invention is further illustrated below in conjunction with the accompanying drawings.
Embodiment one:
Fig. 1 shows that the call connection method that first embodiment of the invention is provided realizes flow, and details are as follows:
In step S101, call request is received, detect call request first correspondent and second to be connected
Whether there is call forwarding between correspondent.
Specifically, the calling connection sets up request, generally the first correspondent by that may be swindled is initiated.Such as use
Family receive remittance or charge filling short message content when, for security consideration, it will usually to short message sending side initiate phone it is true
Recognize request.
Swindle molecule would generally be obtained by the trust of short message sending side in advance, and the corresponding contact name of fraudulent call is repaiied
It is changed to the contact name falsely used.Such as, swindle molecule may falsely use the cell-phone number of the two or two correspondent using pseudo-base station
Code B sends the phone number A of number modification information to the first correspondent;Or by way of virus control, by the second call
Virus is run in the mobile phone of side so that the mobile phone of the second correspondent sends number modification information extremely using its phone number B
The phone number A of the first correspondent;Or the swindle user of enforcement swindle directly sends number modification information using phone number C
To the phone number A of the first correspondent.The content of the number modification information can be:" the phone number B of the second correspondent is
It is replaced by phone number C ".And phone number C actually swindles the phone number that molecule is used.Because number modification information does not have
Having directly carry swindle content, the first communication words side new digit often in direct fresh information, will swindle the hand of molecule
Machine number C is stored under the contact name of the first correspondent.
When the fraud information that the phone number C that the first correspondent receives swindle molecule sends, due in fraud information
Including fund or other may occur property transfer content.First correspondent is for security consideration, it will usually logical to second
Words side carries out telephone relation checking.And if the first correspondent dials phone number C, because swindle molecule is provided with phone number
C is phone number B of the automatic call forwarding to the second correspondent, then in the prior art, and the first correspondent is possibly cannot be effective
Completion voice confirm.
In order to overcome speech verification defect in the prior art, the server of communication network is set up in reception calling connection please
Ask, when the call set up between the first correspondent and the second call is connected, to the company between the first correspondent and the second correspondent
Tap into the detection of row connection procedure.
First correspondent and the second correspondent, are not limited to cheated user.Set up logical in any two correspondent
During words connection, can implement call connection method of the present invention.
The call request, before first correspondent and the foundation call of the second correspondent are connected.
In embodiments of the present invention, it can be assumed that the first correspondent is MPTY, the second correspondent is called party.Detection
Whether bid is shifted between first correspondent and second correspondent, that is, need the first correspondent of detection to initiate to exhale
When crying, if be transferred to other telephone numbers by call number.
The mode of the detection, the mode that can be based on number judgement is detected, it is also possible to the side based on service inquiry
Formula is detected.It is introduced separately below:
1), the mode judged based on number:
When calling connection foundation request is received, it may be determined that the calling connection sets up the initiator of request, and obtains
Take the call number transmitted by the initiator of the calling connection foundation request.
The such as number of the first correspondent is 133****, initiates calling connection and sets up request, and transmitted call number is
170**** (may be swindle number).The webserver can receive the call request of the first correspondent initiation, and store described
Call number 170****.Furthermore it is also possible to the number of the second correspondent conversed with the first correspondent is got, by institute
The number and the call number for stating the second correspondent are directly compared, you can judge whether current calling is by calling
The mode of transfer is set up, and will determine that result is sent to the first correspondent of call request initiation.
Such as, call number 170**** is swindle number, and is provided with automatic call forwarding or manual call transfer,
The phone that 170**** will be dialed is automatically transferred to the 135**** of the second correspondent.So, when number comparison is carried out, first leads to
The call number 170**** of words side will be different from the telephone number 135**** of the second correspondent.Therefore, by ringing number
Code and the comparing of the second correspondent number, can obtain whether current talking connection is to be built by call forwarding with simple and effective
Vertical call connection.
If the call number of the first correspondent is different from the number of second correspondent, it is verified as result and is:The
Call connection between one correspondent and the second correspondent is the connection set up by call forwarding.
If the call number of the first correspondent is identical with the number of second correspondent, the result is:Currently
Call is the call without call forwarding.
2), the mode based on service inquiry:
Due to the number in mobile network, corresponding service business, institute all can be in the server pre-registered or registered
The service business for stating call forwarding can also be registered in the server of mobile network in advance.
In the Service Database for prestoring in the server, if found corresponding to the outgoing call of the first correspondent
The status data of automatic call forward service, and the corresponding result of the status data is back to the first correspondent and/or
Two correspondents.
In step s 102, when there is call forwarding between first correspondent and second correspondent, then enter
Row authentication.
Wherein, the mode of the authentication, can include:
Instant messaging account when query call is initiated bound in the corresponding contact person of selected called-number, according to
The instant account carries out information exchange, including but not limited to sends the information of checking request, or send video calling connection,
Voice call connection etc..
The name of selected called-number corresponding contact person when query call is initiated, by the name and described
Called-number is sent to carrier server, and the judged result returned according to carrier server is determined whether by checking.
In follow-up embodiment, verification process will be further described.
In step s 103, when by authentication, set up between first correspondent and second correspondent
Call connection.
According to the testing result of step S101, and step S102 authentication result, can pass through in both call sides
When call forwarding sets up call connection, it is ensured that the security of call.
When the first correspondent and second correspondent are that the call set up by call forwarding is connected, and identity is tested
During card failure, represent that the second correspondent of current talking is inconsistent with the call number of the first correspondent.Prompting hair can be generated
The first correspondent that calling is initiated is given, such as can be shown on the mobile phone interface of the first correspondent for initiating call:" remove electricity
It is transferred ", or " it is XXXX to remove electric number " or " forwarding number is YYYY " can also be shown.The font of the display can
Shown with by way of highlighted or special color.Or, it is described go electric number, forwarding number can also store communication remember
In record, user is facilitated to look into use at any time.
So so that the first correspondent notes information privacy, it is to avoid property loss.It is of course also possible to remind the second call
Side, the prompt message can include:Current someone falsely uses its number and is swindled.
It is of course also possible to send prompting message from server to the second correspondent, such as can be shown on call interface:
" incoming call is transferred ", can also show the number of transfer incoming call and the number of call initiator.The font of the display can be with
Shown by way of highlighted or special color.Or, the caller ID, forwarding number can also be stored in log
In, facilitate user to look into use at any time.
When first correspondent and second correspondent are not the call connections that dial-up transfer is set up, then can be with
Need not be sent a warning message to the first correspondent or the second correspondent.Or can also be conversed to the first correspondent and second
Side sends the prompt message of current talking noncall transfer.
The present invention converses before connection in foundation, according to call request to the first correspondent to be connected and the second correspondent
Between carry out call forwarding detection.If bid transfer, carries out identity and tests between the first correspondent and the second correspondent
Card, when being verified, the call connection set up between the first correspondent and the second call.This method can turn there is calling
Whether it is timely that the contact person that user is currently being conversed timely is verified to called-number during shifting, so that
Can in time find that disabled user passes through call forwarding user cheating, it is to avoid bring property etc. to lose to user.
Embodiment two:
Fig. 2 is provided for second embodiment of the invention, based on a kind of specific identity in step S102 in embodiment one
Verification method realizes flow, and details are as follows:
In step s 201, selected called-number and the called-number when calling is initiated are obtained corresponding
Name of contact person, and the number and the name of contact person are sent to carrier server.
When the swindle request that the triggering mode of the called-number is triggered for user in contacts list, the quilt
The name for calling corresponding contact person can be obtained directly from contacts list.
When the number after the called-number is user modification contact person, the surname of the corresponding contact person of the called
Name can obtain the name of contact person in the contacts of modification.
When the called-number changes short message to monitor number (when such as changing keyword including specific number)
When, the name of the contact person can change the contact person corresponding to the number before changing identified in short message according to number
Name.Called number before changing can be identified by predetermined keyword.Such as can be for " in the past number
Code ", " old number " etc..
Such as, Zhang San receive new digit transmission number change message, content for " due to job change, old number
133**** is discarded, and new digit is 135****, please be presented to so-and-so ".After the short message is received, system can automatically generate swindle and test
Card request, it is " 135**** " to obtain called, and the corresponding contact person of the called can be number before changing
" 133**** " corresponding contact person.Due to the artificial Li Si of the contact of " 133**** ", therefore, get the spy bound in called
Reference breath can include that the name of contact person is " Li Si ".
In step S202, carrier server judge the number that receives and the name of contact person whether with advance
The number and name deposited are consistent.
Inquiry server corresponding to the name of the contact person, can determine according to the number of contact person, such as, different
Number segment belong to different mobile number operators, can be according to number searching to corresponding number operator, to described
The corresponding server of called-number operator sends checking request.Include the real name of the called-number due to operator
Information processed, therefore, the corresponding real name of number can be obtained by inquiry.
Such as, called-number is obtained in step S202 for " 135**** ", the characteristic information of called-number binding is
The name of contact person is " Li Si ", by the two content according to specified form, is compiled as short message sending and gives inquiry server, can be with
Obtain the Query Result that inquiry server is returned.
Certainly, if allowed, called-number can also only be sent, the corresponding surname of the called-number is returned
Name.Comparative result can be obtained according to the name for returning.
In step S203, if inconsistent, can not be by authentication.
If the result for returning shows the name matches of called-number and contact person, then it represents that current number is normal
Number, may be swindle number if both mismatch, then it represents that current number exception, may remind the user that careful swindle.
Call connection can also be prevented to set up, or intercept the short message transmitted by abnormal number.
Embodiment three:
The auth method based on embodiment one that Fig. 3 is provided for third embodiment of the invention realizes flow, describes in detail
It is as follows:
In step S301, the instant messaging account of the corresponding contact person of the called-number is searched, startup is described i.e.
When communications account correspondence JICQ.
Specifically, the instant messaging account of the corresponding contact person of the called-number, can be with QQ, wechat, microblogging etc..Or
Person, as implementation method of the invention optional in, other communication tools of contact person, such as phone, mailbox ground can also be obtained
Location etc..
Contact person's instant messaging account, can be arranged in the associated person information in address list by user in advance.
When determining the corresponding contact person of called-number, if called-number is the number in contact person, can be with direct access quilt
The corresponding contact person of call number.If called-number is the new digit in short message, can be included according to short message
Number before changing determine the corresponding contact person of called-number.Certainly, the corresponding contact person of the called-number, also may be used
Obtained with by way of receiving user input.
Such as, Zhang San receive new digit transmission number change message, content for " due to job change, old number
133**** is discarded, and new digit is 135****, please be presented to so-and-so ".After the short message is received, system can automatically generate swindle and test
Card request, it is " 135**** " to obtain called-number, and the corresponding contact person of the called-number can be number before changing
" 133**** " corresponding contact person.Due to the artificial Li Si of the contact of " 133**** ", therefore, get bound in called-number
Characteristic information can be contact person Li Si JICQ, including in QQ, wechat, microblogging bound in contact person Li Si
One or more.
When find the JICQ bound in the called-number include it is various when, can with detecting system transport
Capable immediate communication tool, and the swindle checking request is sent according to the immediate communication tool of operation.
In step s 302, by the JICQ, sent to the instant messaging account and verify described being exhaled
Call out the numbers the checking information of code.
The checking information of the called-number, the including but not limited to " number of changing", " number 135**** is that you are present
Number”.Certainly, the checking information can also be speech message or video messaging.In addition, in the checking information
May also select whether including the information of the number change for being received etc..Or in order to improve the security of checking, can be simultaneously
Verified using multiple JICQs.
In step S303, whether the called-number is judged according to the checking information that the third-party server is returned
It is abnormal number.
In embodiments of the present invention, the checking information that the third-party server is returned, is server from contact person end institute
JICQ in obtain confirmation, then return to the checking information via server.The judgement can be with root
Intelligent judgement is carried out according to default keyword, or checking information can also be shown, sentenced according to display information by user
Disconnected result.
The embodiment of the present invention is that the embodiment of the present invention is sent by JICQ and tested with the difference of embodiment two
Card message, can be verified, it is possible to increase the diversity of checking using different instant instruments.And in checking, can be with
Verified using one or more instant instruments, be conducive to improving the security verified.Certainly, described in the embodiment of the present invention
Verification method, it is also possible to be combined with the verification mode in embodiment two, or follow-up example IV.
Example IV:
The flow based on the auth method of step S102 in embodiment one that Fig. 4 is provided for fourth embodiment of the invention
Schematic diagram, details are as follows:
In step S401, the instant messaging account of the corresponding contact person of the called-number is searched, startup is described i.e.
When communications account correspondence JICQ.
Step S401 and step S301 in embodiment three is essentially identical, is not repeated repeats herein.
In step S402, by the JICQ, video connection request is sent to the instant messaging account.
After finding the account of JICQ corresponding to the called-number, can be regarded by user's selection transmission
The verification mode of frequency request, sets up video calling and is connected with the contact person, and confirms whether number changes in this connection
Information.
Because video calling can be directly viewable the character image of contact person and hear the sound of contact person, confirm face to face
Number after change whether the new digit used by contact person.So that the embodiment of the present invention for verify security more
It is high.
In step s 404, the checking information for being returned according to the server judges whether the called-number is abnormal
Number.
In embodiments of the present invention, the checking information that the server is returned, is the video and sound of contact person end upload
Data, by real-time interactive mode so that the confirmation number that user can be safer whether be abnormal number judgement knot
Really.Certainly, the checking request can also be asked by voice call.
Embodiment five:
Fig. 5 is the structural representation of call attachment means provided in an embodiment of the present invention, and details are as follows:
The identification server of telephone fraud described in the embodiment of the present invention, including:
Calling detection unit 501, for receiving call request, detects call request first correspondent to be connected
And second whether there is call forwarding between correspondent;
Identity authenticating unit 502, for when there is call forwarding between first correspondent and second correspondent
When, then carry out authentication;
Connection establishment unit 503, for when by authentication, setting up first correspondent with the described second call
Call connection between side.
Preferably, the identity authenticating unit includes:
Name transmission sub-unit, for obtaining selected called-number and the called-number when calling is initiated
Corresponding name of contact person, and the number and the name of contact person are sent to carrier server;
Checking subelement, for carrier server judge the number that receives and the name of contact person whether with
The number and name for prestoring are consistent;
Judgment sub-unit, if for inconsistent, can not be by authentication.
Preferably, the identity authenticating unit includes:
Confirmation request transmission sub-unit, for obtaining selected called-number corresponding contact person institute when calling is initiated
The instant messaging account of binding, and confirm to ask to the instant messaging account transmission contact person of the binding by JICQ
Ask;
Communication data receiving subelement, the communication data that the instant messaging account for receiving the contact person is returned, root
Authentication is carried out according to the communication data for returning.
Preferably, the confirmation request transmission sub-unit specifically for:
By the JICQ, word confirmation request is sent to the instant messaging account of the binding;
Or, by the JICQ, send video to the instant messaging account of the contact person of the binding and connect
Connect or voice connection confirmation request;
Or, by the JICQ, photo confirmation request is sent to the instant messaging account of the binding.
Preferably, the calling detection unit specifically for:
Detect whether the call number of the first correspondent opens call transfer service, or the calling for detecting the first correspondent
Whether number is identical with the number of the second correspondent, if the call number of the first correspondent opens call transfer service, or
The call number of the first correspondent is different from the number of the second correspondent, then exist between the first correspondent and the second correspondent and exhale
Cry transfer.
Conversed described in the embodiment of the present invention connection server, it is corresponding with call connection method described in embodiment one to four,
This is not repeated and repeats.
Embodiment six:
Fig. 6 is the block diagram of the call connection terminal of another embodiment of the present invention.Call connection terminal 600 shown in Fig. 6
Including:At least one processor 601, memory 602, at least one network interface 604 and other users interface 603.Call connects
Each component connect in terminal 600 is coupled by bus system 605.It is understood that bus system 605 is used to realize these
Connection communication between component.Bus system 605 in addition to including data/address bus, also including power bus, controlling bus and shape
State signal bus.But for the sake of for clear explanation, various buses are all designated as bus system 605 in figure 6.
Wherein, user interface 603 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-
OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM
(ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) dodge
Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as outside slow at a high speed
Deposit.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memory 602 of system and method described herein be intended to including but not limited to these and
The memory of any other suitable type.
In some embodiments, memory 602 stores following element, can perform module or data structure, or
Person their subset, or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, comprising various system programs, such as ccf layer, core library layer, driving layer etc. are used for
Realize various basic businesses and process hardware based task.Application program 6022, comprising various application programs, such as media
Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side
The program of method may be embodied in application program 6022.
In embodiments of the present invention, by the program for calling memory 602 to store or instruction, specifically, can be application
The program stored in program 6022 or instruction, processor 601 are used to receive call request, detect that the call request to be connected
The first correspondent and the second correspondent between whether there is call forwarding;When first correspondent and second correspondent
Between when there is call forwarding, then carry out authentication;When by authentication, first correspondent is set up with described
Call connection between two correspondents.
The method that the embodiments of the present invention are disclosed can apply in processor 601, or be realized by processor 601.
Processor 601 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 601 or software form.Above-mentioned treatment
Device 601 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), application specific integrated circuit
(ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic
Device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and box
Figure.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to the present invention
The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and perform completion, or use decoding processor
In hardware and software module combination perform completion.Software module may be located at random access memory, and flash memory, read-only storage can
In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, register.The storage
Medium is located at memory 602, and processor 601 reads the information in memory 602, and the step of the above method is completed with reference to its hardware
Suddenly.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuits
(ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, other the electronics lists for performing herein described function
In unit or its combination.
Realized for software, can be realized by performing the module (such as process, function etc.) of function described herein herein
Described technology.Software code is storable in memory and by computing device.Memory can within a processor or
Realize processor outside.
Alternatively, it is described when there is call forwarding between first correspondent and second correspondent, then carry out
Authentication step includes:
Selected called-number and the called-number corresponding name of contact person when calling is initiated are obtained, and
The number and the name of contact person are sent to carrier server;
Carrier server judge the number that receives and the name of contact person whether with the number and surname for prestoring
Name is consistent;
If inconsistent, can not be by authentication.
Alternatively, it is described when there is call forwarding between first correspondent and second correspondent, then carry out
Authentication step includes:
The instant messaging account bound in the corresponding contact person of selected called-number when calling is initiated is obtained, and is led to
Cross JICQ and send contact person's confirmation request to the instant messaging account of the binding;
The communication data that the instant messaging account of the contact person is returned is received, identity is carried out according to the communication data for returning
Checking.
Alternatively, it is described that contact person's confirmation request is sent to the instant messaging account of the binding by JICQ
Step includes:
By the JICQ, word confirmation request is sent to the instant messaging account of the binding;
Or, by the JICQ, send video to the instant messaging account of the contact person of the binding and connect
Connect or voice connection confirmation request;
Or, by the JICQ, photo confirmation request is sent to the instant messaging account of the binding.
Preferably, whether deposited between the detection call request to be connected the first correspondent and the second correspondent
Include in call forwarding step:
Detect whether the call number of the first correspondent opens call transfer service, or the calling for detecting the first correspondent
Whether number is identical with the number of the second correspondent, if the call number of the first correspondent opens call transfer service, or
The call number of the first correspondent is different from the number of the second correspondent, then exist between the first correspondent and the second correspondent and exhale
Cry transfer.
Call connection terminal 600 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating,
Here repeat no more.The present invention sets talking state detection program in the server, when calling connection foundation request is received,
The call connection set up between the first correspondent and the second correspondent, and to whether being sent out between the first correspondent and the second correspondent
Raw call forwarding is detected.If bid transfer between the first correspondent and the second correspondent, generation is exhaled accordingly
The prompting message of transfer is made to send to the first correspondent and/or the second correspondent, so that the first correspondent or second logical
Words side can timely view the exception of call bid transfer, effective to improve the accuracy rate for confirming result.
Embodiment seven:
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7
700 can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer
Deng.
Mobile terminal 700 in Fig. 7 includes that radio frequency (RadioFrequency, RF) circuit 710, memory 720, input are single
Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (WirelessFidelity) module 770 and power supply
790。
Wherein, input block 730 can be used to receive the numeral or character information of user input, and produce and mobile terminal
700 user is set and the relevant signal input of function control.Specifically, in the embodiment of the present invention, the input block 730 can
With including contact panel 731.Contact panel 731, also referred to as touch-screen, can collect user thereon or neighbouring touch operation
(such as user uses the operations of any suitable object or annex on contact panel 731 such as finger, stylus), and according to advance
The formula of setting drives corresponding attachment means.Optionally, contact panel 731 may include touch detecting apparatus and touch controller
Two parts.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, by signal
Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate,
Give the processor 760 again, and the order sent of receiving processor 760 and can be performed.Furthermore, it is possible to using resistance-type,
The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 731.Except contact panel 731, input block
730 can also include other input equipments 732, and other input equipments 732 can include but is not limited to physical keyboard, function key
One or more in (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 740 can be used for display by the information of user input or be supplied to information and the movement of user
The various menu interfaces of terminal 700.Display unit 740 may include display panel 741, optionally, can use LCD or organic hairs
The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 741.
It should be noted that contact panel 731 can cover display panel 741, touch display screen is formed, when touch display screen inspection
Measure thereon or after neighbouring touch operation, processor 760 is sent to determine the type of touch event, with preprocessor
760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area be used for show utilization rate control higher, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 760 is the control centre of mobile terminal 700, using various interfaces and connection whole mobile phone
Various pieces, by running or performing software program and/or module of the storage in first memory 721, and call storage
Data in second memory 722, perform the various functions and processing data of mobile terminal 700, so as to mobile terminal 700
Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/
Or the data in the second memory 722, processor 760 be used for perform set up call connection when, receive call connection clothes
The call forwarding judged result that business device sends;When the judged result of the call forwarding is connected as there occurs calling for current talking
The call connection of transfer, then according to the program of the call forwarding judged result outputting alarm information.
Preferably, it is described when there is call forwarding between first correspondent and second correspondent, then carry out
Authentication step includes:
Selected called-number and the called-number corresponding name of contact person when calling is initiated are obtained, and
The number and the name of contact person are sent to carrier server;
Carrier server judge the number that receives and the name of contact person whether with the number and surname for prestoring
Name is consistent;
If inconsistent, can not be by authentication.
Preferably, it is described when there is call forwarding between first correspondent and second correspondent, then carry out
Authentication step includes:
The instant messaging account bound in the corresponding contact person of selected called-number when calling is initiated is obtained, and is led to
Cross JICQ and send contact person's confirmation request to the instant messaging account of the binding;
The communication data that the instant messaging account of the contact person is returned is received, identity is carried out according to the communication data for returning
Checking.
Preferably, it is described that contact person's confirmation request is sent to the instant messaging account of the binding by JICQ
Step includes:
By the JICQ, word confirmation request is sent to the instant messaging account of the binding;
Or, by the JICQ, send video to the instant messaging account of the contact person of the binding and connect
Connect or voice connection confirmation request;
Or, by the JICQ, photo confirmation request is sent to the instant messaging account of the binding.
Preferably, whether deposited between the detection call request to be connected the first correspondent and the second correspondent
Include the step of call forwarding:
Detect whether the call number of the first correspondent opens call transfer service, or the calling for detecting the first correspondent
Whether number is identical with the number of the second correspondent, if the call number of the first correspondent opens call transfer service, or
The call number of the first correspondent is different from the number of the second correspondent, then exist between the first correspondent and the second correspondent and exhale
Cry transfer.
It can be seen that, the present invention converses before connection in foundation, according to call request to the first correspondent and second to be connected
Call forwarding detection is carried out between correspondent.If bid transfer, is carried out between the first correspondent and the second correspondent
Authentication, when being verified, the call connection set up between the first correspondent and the second call.This method can occur
Whether it is timely that the contact person that user is currently being conversed timely is tested to called-number during call forwarding
Card, such that it is able to find that disabled user passes through call forwarding user cheating in time, it is to avoid bring property etc. to lose to user.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, can be by it
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical of device or unit by some interfaces
Letter connection, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme
's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use
When, can store in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part for being contributed to prior art in other words or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are used to so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes
Medium.
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the invention, it is all in essence of the invention
Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.