CN106878528A - A kind of disturbance incoming call SMS interception method and system based on block chain technology - Google Patents

A kind of disturbance incoming call SMS interception method and system based on block chain technology Download PDF

Info

Publication number
CN106878528A
CN106878528A CN201710059109.6A CN201710059109A CN106878528A CN 106878528 A CN106878528 A CN 106878528A CN 201710059109 A CN201710059109 A CN 201710059109A CN 106878528 A CN106878528 A CN 106878528A
Authority
CN
China
Prior art keywords
block
mobile phone
harassing
harassing call
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710059109.6A
Other languages
Chinese (zh)
Inventor
李波涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN201710059109.6A priority Critical patent/CN106878528A/en
Publication of CN106878528A publication Critical patent/CN106878528A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code

Abstract

A kind of disturbance incoming call SMS interception method and system based on block chain technology, are related to harassing call to intercept field.Judge whether the phone that current phone is answered is harassing call according to dialog context, on-hook operation is carried out according to default hang time when receiving calls as harassing call, and the harassing call is stored in the storage card of the machine as ephemeral data file;Harassing call is sent to all mobile phone terminals being associated with the machine, and the information returned according to other mobile phone terminals is marked as actual data file to harassing call;Timing will be ranked up as the harassing call of actual data file after mark and be packaged as being sent to all mobile phone terminals being associated with the machine after block;The all mobile phone terminals for receiving block are assert to block and are generated block chain.Interception of the present invention suitable for harassing call information.

Description

A kind of disturbance incoming call SMS interception method and system based on block chain technology
Technical field
Field is intercepted the present invention relates to harassing call.
Background technology
Harassing call and short message are more and more, eternal to promote harassing call and short message, and personal information is usurped by people; The above-mentioned many people of these situations are not strange, and what is had deeply hurts;We generally can be intercepted using some softwares, example Such as Tencent mobile phone manager, the fail-safe software that 360 mobile guards or cell phone manufacturer carry is carried out when harassing call is beaten Prompting, after hanging, tells I has been marked as harassing call by how many people in log.Current this kind of anti-harassment safety is soft Part is required to the support of background data base server, and all labeled harassing calls are required for storage in central database service Device, all of data differentiate and transmission will be using the server of software supplier as host node, it is necessary to the maintenance of software vendor Function could be completed with data, services.
Block chain technology is occurred in that within 2009, the structure of database is innovated, data are divided into different blocks, pressed Certain order successively generates and records all exchange of value activities that it occurs during being created, and all blocks take together The data of complete set are presented with front and rear suitable company for one record intersection of formation.In block (block) chain (chain) technology, Data are got off in the form of the electronical record for successively generating one by one in chronological order by permanent storage, are combined in the way of chain Together, the database for being formed by this way is we term it block chain database.Current block chain technology is in field of telecommunications Application do not launch also substantially, harassing short message and phone with the technical intercept can ensure the science and security of certification, And can greatly reduce the operating cost of system.
The content of the invention
The present invention provides a kind of disturbance incoming call SMS interception method and system based on block chain technology, it is therefore intended that solve Current anti-harassment Interception Technology needs backstage central database server to support, and with the server of software supplier as host node Realize intercepting function, intercepting process needs the problem of maintenance cost higher.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of disturbance incoming call SMS interception method based on block chain technology, methods described includes:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, when receive calls for On-hook operation is carried out according to default hang time during harassing call, and the harassing call is stored in the storage card of the machine is made It is ephemeral data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals The information returned is marked as actual data file to harassing call;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as being sent after block to The all mobile phone terminals being associated with the machine;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in interior of mobile phone Harassing call number compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance, Then the number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information shape of other mobile phone terminals return State, when the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance, The state of the number is then set to harassing call, number of times that the telephone number is set is recorded and is stored in the machine as just Formula data file.
Further, the S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means.
Further, the S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random words Whether symbol string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block and to other hands Other areas that subsequent time is received are abandoned and assert to the machine terminal broadcast block, the block that will be received if differing Block;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone New block chain is created in terminal, and increases new block in block chain afterbody, the Hash hash addition of the block that will be received To in the block for increasing;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, do not existed Telephone number in the formal block is additionally stored in actual data file, remains to be added when next block is generated.
Further, the step of methods described also includes harassing call number searching, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and this area Block chain is read in mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID is to disturb When disturbing number, then harassing and wrecking number information is directly intercepted and is shown.
In order to solve the above-mentioned technical problem, blocked the invention allows for a kind of disturbance incoming call short message based on block chain technology The system of cutting, the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing and wrecking electricity according to dialog context Words, carry out on-hook operation, and the harassing call is preserved when receiving calls as harassing call according to default hang time As ephemeral data file in the storage card of the machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine, And the information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up and pack after mark for timing as the harassing call of actual data file To be sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
Further, the telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred into all mobile phones being associated with the machine Terminal;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in it The harassing call number of interior of mobile phone is compared, if the telephone number for receiving has had harassing call number set in advance In the middle of code, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, connects for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module The information state of other mobile phone terminals return is received, when the telephone number is set to harassing call by least one mobile phone terminal and reaches Threshold parameter amount set in advance, then be set to harassing call by the state of the number, records the telephone number and is set Number of times and store in the machine as actual data file.
Further, the timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as area Block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to the institute being associated with the machine the block after treatment using P2P transmission means There is mobile phone terminal.
Further, the block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random character String, judges whether random string is identical with the answer string for pre-setting, and if the same assert that the block for receiving is formal Block simultaneously broadcasts the block to other mobile phone terminals, and the block that will be received if differing is abandoned and assert that subsequent time connects Other blocks for receiving;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, judges the formal area Block is correct, and new block chain is created in mobile phone terminal, and increases new block in block chain afterbody, the block that will be received Hash hash be added in the block for increasing;
Comparison module, will be compared the local block for generating simultaneously when being linked into local block chain for formal block Compared with during the telephone number in the formal block is not additionally stored to actual data file, remaining to add when next block is generated Add.
Further, the system also includes number searching module, for searching harassing call number, the number searching mould Block includes:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, will disturb Disturb during number and local block chain read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if this comes When electric number is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
The beneficial effects of the invention are as follows:The propagation that each pen data is exchanged in block chain all uses distributed structure, root According to P2P network layer protocols, message is sent directly to the whole network other all of nodes by individual node, and node here is exactly to move Mobile phone terminal in dynamic network.Block chain need not reserve a specific position for each user for needing blocking disturbance call Put, but set up by the principle of voluntariness it is a set of everybody can participate in the distributed book keeping operation system of record information so that will note The responsibility of record is decentralized, is recorded jointly by the user of all mobile phone terminals being associated.
All data that block chain technology allows in database are stored in all of mobile nodes, and real-time update.It is complete The structure setting of full decentralization enables data real time record, and is updated in the network node of each participation data storage, The security of data can greatly be improved.
Brief description of the drawings
Fig. 1 is the flow chart of the disturbance incoming call SMS interception method based on block chain technology described in the embodiment of the present invention;
Fig. 2 is the flow chart of the step S2 described in the embodiment of the present invention;
Fig. 3 is the flow chart of the step S3 described in the embodiment of the present invention;
Fig. 4 is the flow chart of the step S4 described in the embodiment of the present invention;
The step of Fig. 5 is the harassing call number searching described in embodiment of the present invention flow chart;
Fig. 6 is the principle schematic of data transfer between the mobile phone terminal described in the embodiment of the present invention;
Fig. 7 is that the principle of the disturbance incoming call short message interception system based on block chain technology described in the embodiment of the present invention is illustrated Figure;
Fig. 8 is the principle schematic of the telephone number transmission mark module described in the embodiment of the present invention;
Fig. 9 is the principle schematic of the timing sending module described in the embodiment of the present invention;
Figure 10 is the principle schematic of the block identification module described in the embodiment of the present invention;
Figure 11 is the principle schematic of the number searching module described in the embodiment of the present invention.
Specific embodiment
Principle of the invention and feature are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and It is non-for limiting the scope of the present invention.
Block chain database is the transaction data base of all nodes sharings in system, and these nodes are based on exchange of value agreement Participate in the network of block chain and be stored in harassing call data on central server originally being preserved with block mode, each All data exchanges of generation are lived before the harassing call recorded on block is after a upper block is formed, the block is created Dynamic, this feature ensure that the integrality of database;In most cases, once being added into block after the completion of new block Chain it is last, then the data record of this block just can not again change or delete.This feature ensure that the preciseness of database, The characteristic that cannot be tampered.Realize that blocking disturbance call does not have central store, authentication calculations and hardware device with block chain technology, By each node on chain, the maintenance service and expense of application system become extremely simple and cheap for the operation of system, harass The authentication mode of phone also becomes more science.
The characteristics of based on above block chain, the present embodiment proposes a kind of disturbance incoming call SMS interception based on block chain technology Method, is used for realizing a decentralization, and ensure the preciseness of harassing call certification, authenticated by using block chain technology The numerical digit system of journey traceability, methods described includes as shown in Figure 1:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, when receive calls for On-hook operation is carried out according to default hang time during harassing call, and the harassing call is stored in the storage card of the machine is made It is ephemeral data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals The information returned is marked as actual data file to harassing call;
As shown in Fig. 2 the S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in interior of mobile phone Harassing call number compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance, Then the number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information shape of other mobile phone terminals return State, when the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance, The state of the number is then set to harassing call, number of times that the telephone number is set is recorded and is stored in the machine as just Formula data file;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as being sent after block to The all mobile phone terminals being associated with the machine;
As shown in figure 3, the S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain;
As shown in figure 4, the S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random words Whether symbol string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block and to other hands Other areas that subsequent time is received are abandoned and assert to the machine terminal broadcast block, the block that will be received if differing Block;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone New block chain is created in terminal, and increases new block in block chain afterbody, the Hash hash addition of the block that will be received To in the block for increasing;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, do not existed Telephone number in the formal block is additionally stored in actual data file, remains to be added when next block is generated.
By distributed recording harass number, it is distributed propagate, distributed storage this three big " distribution " we it can be found that Nobody, without tissue, even without which country need to deflorate it is costly go to manage this system, the data in system are deposited Storage, transaction verification, message transmitting procedure are entirely decentralization.It is large-scale to need to block in the case of no center The user for cutting harassing call/short message reaches common understanding, and constructs jointly " mobile interchange block chain database ".It can be said that this is structure A decentralization system is truly built.Even it can be said that we can use block chain technique construction a set of Immortality do not go out system --- all participation nodes in so long as not network collapses in same time collective, interception disturbance incoming call Database Systems can just operate down always.The security of data can greatly be improved and O&M cost is reduced.
Block chain is substantially a huge account book database for decentralization, used as the bottom for originating from bit coin application Technology, block chain is to be associated produced data chunks into being contained in each data block many using cryptographies by a string Secondary network effectively confirms the information of (once effectively transaction inspection is referred to as once confirming).As transaction is constantly produced, each hand Machine node constantly verifies that transaction creates new block to record newest transaction, and this account book can always increase extension.These areas Block is linearly added on original block chain sequentially in time.Each node (mobile phone terminal) has a complete have Block chain duplicated record, and these are automatically performed by carrying out miner's network of Data Authentication Algorithm decryption.On block chain The harassing call number information set on all about each node and node is remained with, these information are also recorded in complete On block chain.
The block of blocking disturbance call is made up of the transaction List Table that block head and the block are included.The size of block head is 103 bytes, by the version number of 4 bytes, the hashed value of a upper block of 32 bytes, the Merkle Root Hash of 32 bytes, The time of 15 bytes sews the random number composition of (current time), the current difficulty value of 4 bytes, 15 bytes.The transaction that block is included List is then attached to behind block head.
The structure of block is as shown in table 1:
Table 1
, it is necessary to the transaction List Table that the block to be included, is generated by HASH algorithms in the construction process of block Merkle Root Hash, and summary in this, as transaction List Table is stored in block head.Possess the block head of regular length, just It is the input character string for blocking disturbance call proof of work, therefore, the data in block head can embody block and be included All Activity (harassing call set record).
Data validity interval in block chain must be judged, more than threshold values (threshold values data are configurable as parameter), should Block then cancels.The control of the block term of validity is mainly prevents some numbers from being distributed telephone numbers again after tearing machine open, newly takes the number User is particularly likely that normal users, if will also be intercepted within a block, as controlling to avoid by the term of validity Situation occurs.
During mobile nodes generation new block, it is desirable to which, while generating the random number of 14, the random number can be set as If with the time consistency that most original block is generated, the block is identified as formal block, and the block can the whole network broadcast hair Cloth.
Difficulty value (difficulty) in block, was weight of the miners when ore deposit is dug in the computing of bit coin originally Reference index is wanted, it determines that miner takes around and could produce a legal block by how many times Hash operation.Blocking Cut in the application system of harassing call, the generation of block is in the daily set time, but the mobile nodes for participating in calculating can not Disconnected changes, and the starting stage may be fewer, and can constantly fluctuate within a certain period of time, so difficulty value must root The change for calculating power according to the whole network is adjusted.
The adjustment of difficulty is the independent automatic generation in each complete node.Every 1000 (tentative) individual block, Suo Youjie Point all can be by unified method adjust automatically difficulty, and this method can be the cost duration and expectation by newest 1000 blocks Time length ratio according to actual duration and the ratio for expecting duration, is adjusted accordingly (or become difficult or become different) compared with what is drawn.Such as area The original issuing time of block:20161009180817, totally 14, if the generation of new block was more than 1 minute, can only compare preceding ten Position, if the time of generation is again without lowering, can be only relatively more first 8.
Random number if multiple mobile nodes is all identical with original issuing time, can be according to the life of node block It is formal block into time more early person.The workload determination of bit coin is with sha algorithms, it is necessary to expend substantial amounts of Framework computing energy Power, it is inapplicable to mobile phone, formal block can be determined within the shortest time with the method for random number, nor affect on mobile phone other work( The normal of energy is used.
After one of them formal block is assert, the block of other node broadcasts is abandoned, and formal block is linked into locally Block chain when to do one with the block that locally generate and compare, partly the telephone number not in the formal block will be in addition It is then stored into actual data file, remains to be added when next block is generated.
As shown in figure 5, the step of the present embodiment methods described also includes harassing call number searching, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and this area Block chain is read in mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID is to disturb When disturbing number, then harassing and wrecking number information is directly intercepted and is shown.
Harassing the lookup of number has two kinds of data sources, and a kind of is to match caller ID from the block chain for having been formed to obtain Take, another kind be never formed block chain the machine harassing and wrecking number actual data file in search.From block chain and formally Speed is searched in data file relatively slow, it is necessary to this two parts data is read into internal memory in data genaration, and is ranked up, This partial data is with binary tree or the storage of hashmap forms in internal memory, and data search speed is very fast.
The present embodiment also proposed a kind of disturbance incoming call short message interception system based on block chain technology, such as Fig. 6 and Fig. 7 institutes Show, the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing and wrecking electricity according to dialog context Words, carry out on-hook operation, and the harassing call is preserved when receiving calls as harassing call according to default hang time As ephemeral data file in the storage card of the machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine, And the information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up and pack after mark for timing as the harassing call of actual data file To be sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
As shown in figure 8, the telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred into all mobile phones being associated with the machine Terminal;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in it The harassing call number of interior of mobile phone is compared, if the telephone number for receiving has had harassing call number set in advance In the middle of code, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, connects for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module The information state of other mobile phone terminals return is received, when the telephone number is set to harassing call by least one mobile phone terminal and reaches Threshold parameter amount set in advance, then be set to harassing call by the state of the number, records the telephone number and is set Number of times and store in the machine as actual data file.
As shown in figure 9, the timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as area Block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to the institute being associated with the machine the block after treatment using P2P transmission means There is mobile phone terminal.
As shown in Figure 10, the block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random character String, judges whether random string is identical with the answer string for pre-setting, and if the same assert that the block for receiving is formal Block simultaneously broadcasts the block to other mobile phone terminals, and the block that will be received if differing is abandoned and assert that subsequent time connects Other blocks for receiving;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, judges the formal area Block is correct, and new block chain is created in mobile phone terminal, and increases new block in block chain afterbody, the block that will be received Hash hash be added in the block for increasing;
Comparison module, will be compared the local block for generating simultaneously when being linked into local block chain for formal block Compared with during the telephone number in the formal block is not additionally stored to actual data file, remaining to add when next block is generated Add.
The all mobile phone terminals being associated with the machine generate random string, and judge random character after block is received Whether string is identical with the answer string for pre-setting, and if the same broadcasts the block to other mobile phone terminals, other mobile phone terminals After the block for receiving broadcast, judge that the block is correct, and new block chain is created in mobile phone terminal, the received area for arriving The Hash hash of block is added in the block chain.
The propagation that each pen data is exchanged in block chain all uses distributed structure, according to P2P network layer protocols, message The whole network other all of nodes are sent directly to by individual node, node here is exactly the mobile phone terminal in mobile network. Block chain need not reserve a specific position for each user for needing blocking disturbance call, but by the principle of voluntariness Come set up it is a set of everybody can participate in the distributed book keeping operation system of record information, so as to will record responsibility it is decentralized, by phase The user of all mobile phone terminals of association records jointly.
As shown in figure 11, system described in the present embodiment also includes number searching module, for searching harassing call number, institute Stating number searching module includes:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, will disturb Disturb during number and local block chain read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if this comes When electric number is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
All data that block chain technology allows in database are stored in all of mobile nodes, and real-time update.It is complete The structure setting of full decentralization enables data real time record, and is updated in the network node of each participation data storage, The security of data can greatly be improved.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all it is of the invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (10)

1. a kind of disturbance incoming call SMS interception method based on block chain technology, it is characterised in that methods described includes:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, be harassing and wrecking when receiving calls On-hook operation is carried out according to default hang time during phone, and the harassing call is stored in the storage card of the machine as facing When data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals Information is marked as actual data file to harassing call;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as sending after block to this The associated all mobile phone terminals of machine;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain.
2. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 1, it is characterised in that The S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in disturbing for interior of mobile phone Telephone number is disturbed to compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance, will The number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information state of other mobile phone terminals return, When the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance, then will The state of the number is set to harassing call, records number of times and the formal number of storage conduct in the machine that the telephone number is set According to file.
3. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 2, it is characterised in that The S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means.
4. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 3, it is characterised in that The S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random string It is whether identical with the answer string for pre-setting, if the same assert the block for receiving for formal block and to other mobile phone ends The block is broadcasted at end, and other blocks that subsequent time is received are abandoned and assert to the block that will be received if differing;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone terminal It is middle to create new block chain, and increase new block in block chain afterbody, the Hash hash of the block that will be received is added to increasing In the block for adding;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, not at this just Telephone number in formula block is additionally stored in actual data file, remains to be added when next block is generated.
5. a kind of disturbance incoming call SMS interception method based on block chain technology according to any one of Claims 1-4, its Be characterised by, methods described also include harassing call number searching the step of, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and local block chain In reading mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID for harassing and wrecking number During code, then harassing and wrecking number information is directly intercepted and is shown.
6. a kind of disturbance incoming call short message interception system based on block chain technology, it is characterised in that the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing call according to dialog context, On-hook operation is carried out according to default hang time when receiving calls as harassing call, and the harassing call is stored in this As ephemeral data file in the storage card of machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine, and root The information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up as the harassing call of actual data file after mark for timing and is packaged as area Sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
7. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 6, it is characterised in that The telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred to all mobile phone ends being associated with the machine End;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in mobile phone with it Internal harassing call number is compared, if the telephone number for receiving has had harassing call number set in advance and worked as In, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, it is received for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module The information state that his mobile phone terminal is returned, when the telephone number is set to harassing call by least one mobile phone terminal and has reached pre- The threshold parameter amount for first setting, then be set to harassing call by the state of the number, record that the telephone number is set time Count and store in the machine as actual data file.
8. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 7, it is characterised in that The timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to all hands being associated with the machine the block after treatment using P2P transmission means Machine terminal.
9. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 8, it is characterised in that The block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random string, sentences Whether disconnected random string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block simultaneously The block is broadcasted to other mobile phone terminals, the block that will be received if differing is abandoned and assert what subsequent time was received Other blocks;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, is judging the formal block just Really, and in mobile phone terminal new block chain is created, and increases new block in block chain afterbody, the Kazakhstan of the block that will be received Uncommon hash is added in the block for increasing;
Comparison module, the local block for generating will be compared simultaneously when being linked into local block chain for formal block, During the telephone number in the formal block is not additionally stored to actual data file, remain to be added to when next block is generated Go.
10. a kind of disturbance incoming call short message interception system based on block chain technology according to any one of claim 6 to 9, Characterized in that, the system also includes number searching module, for searching harassing call number, the number searching module bag Include:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, by harassing and wrecking number Code and local block chain are read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if the incoming call number When code is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
CN201710059109.6A 2017-01-23 2017-01-23 A kind of disturbance incoming call SMS interception method and system based on block chain technology Pending CN106878528A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710059109.6A CN106878528A (en) 2017-01-23 2017-01-23 A kind of disturbance incoming call SMS interception method and system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710059109.6A CN106878528A (en) 2017-01-23 2017-01-23 A kind of disturbance incoming call SMS interception method and system based on block chain technology

Publications (1)

Publication Number Publication Date
CN106878528A true CN106878528A (en) 2017-06-20

Family

ID=59158965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710059109.6A Pending CN106878528A (en) 2017-01-23 2017-01-23 A kind of disturbance incoming call SMS interception method and system based on block chain technology

Country Status (1)

Country Link
CN (1) CN106878528A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108512896A (en) * 2018-02-06 2018-09-07 北京东方棱镜科技有限公司 Mobile Internet security postures cognition technology based on big data and device
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN108830712A (en) * 2018-05-17 2018-11-16 易链科技(深圳)有限公司 Method, apparatus, equipment and the medium that block generates
CN109274837A (en) * 2018-08-22 2019-01-25 北京航空航天大学 Method and device can be traced in telephone source based on block chain technology
CN109327627A (en) * 2018-11-27 2019-02-12 深圳声笑科技有限公司 Telephone number recognition methods, device and storage medium based on block chain
CN109919768A (en) * 2019-03-12 2019-06-21 网易(杭州)网络有限公司 Block generation method, device, medium and calculating equipment
CN110213271A (en) * 2019-06-03 2019-09-06 重庆蓝岸通讯技术有限公司 A kind of safety management system based on block chain
CN111327771A (en) * 2018-12-17 2020-06-23 中国移动通信集团青海有限公司 Method and device for identifying crank call number
CN111355852A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Method and equipment for acquiring contact number based on block chain
WO2020135393A1 (en) * 2018-12-26 2020-07-02 中兴通讯股份有限公司 Nuisance call prevention method and device, terminal, and storage medium
CN111385322A (en) * 2018-12-28 2020-07-07 中国移动通信集团山西有限公司 Blacklist number sharing system, method, device, equipment and storage medium
CN111787159A (en) * 2020-07-02 2020-10-16 中国联合网络通信集团有限公司 Block chain-based crank call identification method and system
CN112532780A (en) * 2019-09-19 2021-03-19 中国电信股份有限公司 Anti-harassment information processing method and system
CN113542504A (en) * 2021-07-15 2021-10-22 中国银行股份有限公司 Block chain-based harassing call marking method and device
JP2021532427A (en) * 2019-10-11 2021-11-25 アリペイ (ハンジョウ) インフォメーション テクノロジー カンパニー リミテッドAlipay (Hangzhou) Information Technology Co., Ltd. Decentralized automatic phone fraud risk management

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090187887A1 (en) * 2008-01-17 2009-07-23 Microsoft Corporation Block count based procedure layout and splitting
CN101834857A (en) * 2010-04-20 2010-09-15 上海禹为通信技术有限公司 Method and system for identifying and controlling speech content in call
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN102572904A (en) * 2011-12-28 2012-07-11 上海禹为通信技术有限公司 System and method for implementing automatic dial test business
CN103179122A (en) * 2013-03-22 2013-06-26 马博 Telcom phone phishing-resistant method and system based on discrimination and identification content analysis
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN105100363A (en) * 2015-06-29 2015-11-25 小米科技有限责任公司 Information processing method, information processing device and terminal
CN105721660A (en) * 2016-02-03 2016-06-29 北京光年无限科技有限公司 Harassment call identification method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090187887A1 (en) * 2008-01-17 2009-07-23 Microsoft Corporation Block count based procedure layout and splitting
CN101834857A (en) * 2010-04-20 2010-09-15 上海禹为通信技术有限公司 Method and system for identifying and controlling speech content in call
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN102572904A (en) * 2011-12-28 2012-07-11 上海禹为通信技术有限公司 System and method for implementing automatic dial test business
CN103179122A (en) * 2013-03-22 2013-06-26 马博 Telcom phone phishing-resistant method and system based on discrimination and identification content analysis
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN105100363A (en) * 2015-06-29 2015-11-25 小米科技有限责任公司 Information processing method, information processing device and terminal
CN105721660A (en) * 2016-02-03 2016-06-29 北京光年无限科技有限公司 Harassment call identification method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
袁勇;王飞跃: "区块链技术发展现状与展望", 《自动化学报》 *
邵鹏: "《社交金融:共享经济时代金融新格局》", 31 December 2016 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108512896A (en) * 2018-02-06 2018-09-07 北京东方棱镜科技有限公司 Mobile Internet security postures cognition technology based on big data and device
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN108830712A (en) * 2018-05-17 2018-11-16 易链科技(深圳)有限公司 Method, apparatus, equipment and the medium that block generates
CN109274837A (en) * 2018-08-22 2019-01-25 北京航空航天大学 Method and device can be traced in telephone source based on block chain technology
CN109327627A (en) * 2018-11-27 2019-02-12 深圳声笑科技有限公司 Telephone number recognition methods, device and storage medium based on block chain
CN111327771A (en) * 2018-12-17 2020-06-23 中国移动通信集团青海有限公司 Method and device for identifying crank call number
CN111355852B (en) * 2018-12-21 2024-04-05 西安佰才邦网络技术有限公司 Method and equipment for acquiring contact number based on blockchain
CN111355852A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Method and equipment for acquiring contact number based on block chain
WO2020135393A1 (en) * 2018-12-26 2020-07-02 中兴通讯股份有限公司 Nuisance call prevention method and device, terminal, and storage medium
CN111371941A (en) * 2018-12-26 2020-07-03 中兴通讯股份有限公司 Method and device for preventing harassing call, terminal and storage medium
CN111385322B (en) * 2018-12-28 2023-11-21 中国移动通信集团山西有限公司 System, method, device, equipment and storage medium for sharing blacklist number
CN111385322A (en) * 2018-12-28 2020-07-07 中国移动通信集团山西有限公司 Blacklist number sharing system, method, device, equipment and storage medium
CN109919768A (en) * 2019-03-12 2019-06-21 网易(杭州)网络有限公司 Block generation method, device, medium and calculating equipment
CN109919768B (en) * 2019-03-12 2021-08-10 网易(杭州)网络有限公司 Block generation method, device, medium and computing equipment
CN110213271A (en) * 2019-06-03 2019-09-06 重庆蓝岸通讯技术有限公司 A kind of safety management system based on block chain
CN112532780A (en) * 2019-09-19 2021-03-19 中国电信股份有限公司 Anti-harassment information processing method and system
JP2021532427A (en) * 2019-10-11 2021-11-25 アリペイ (ハンジョウ) インフォメーション テクノロジー カンパニー リミテッドAlipay (Hangzhou) Information Technology Co., Ltd. Decentralized automatic phone fraud risk management
CN111787159B (en) * 2020-07-02 2022-03-18 中国联合网络通信集团有限公司 Block chain-based crank call identification method and system
CN111787159A (en) * 2020-07-02 2020-10-16 中国联合网络通信集团有限公司 Block chain-based crank call identification method and system
CN113542504A (en) * 2021-07-15 2021-10-22 中国银行股份有限公司 Block chain-based harassing call marking method and device
CN113542504B (en) * 2021-07-15 2022-12-23 中国银行股份有限公司 Block chain-based harassing call marking method and device

Similar Documents

Publication Publication Date Title
CN106878528A (en) A kind of disturbance incoming call SMS interception method and system based on block chain technology
AU2020205231B2 (en) Methods and apparatus for efficiently implementing a distributed database within a network
RU2754189C2 (en) Method and device for distributed database that allows deleting events
CN106357396B (en) Digital signature method and system and quantum key card
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN104704524B (en) Information discloses system, information open server, communication terminal, information published method and non-transient computer-readable medium
CN107079058A (en) The business of block chain node performs method, device and node device
CN108462573A (en) A kind of flexible quantum safety moving communication means
CN110033243A (en) Main chain based on block chain intelligence contract deposits card method, system and storage medium
CN101754182A (en) Packed-based network contact list implementation method and system
CN104394530A (en) Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN107948192A (en) A kind of block chain account customization identification and login method and system
CN109274837B (en) Telephone source traceable method and device based on block chain technology
CN112866380B (en) Chain network architecture based on block chain
CN110322678A (en) A kind of four table centralized meter-reading systems and method based on block chain
KR20140095148A (en) Method for processing financial transactions based on social network service and terminal
CN111861459A (en) Iota account book optimization system and method based on DPoS consensus algorithm
CN101087334A (en) Multi-user management method of mobile phone information
CN109754322A (en) A kind of data service system
CN103532709A (en) IBE (Identity Based Encryption) cryptographic equipment and data encryption and decryption method
CN104243153B (en) The method and user equipment of a kind of user for discovering device
CN106973040A (en) A kind of smart mobile phone secret short message security system and secret short message transmission method
CN104836881A (en) Information control method and electronic equipment
CN112860674A (en) Data sharing method and system
CN110661786B (en) User data system based on chain relation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620