CN106878528A - A kind of disturbance incoming call SMS interception method and system based on block chain technology - Google Patents
A kind of disturbance incoming call SMS interception method and system based on block chain technology Download PDFInfo
- Publication number
- CN106878528A CN106878528A CN201710059109.6A CN201710059109A CN106878528A CN 106878528 A CN106878528 A CN 106878528A CN 201710059109 A CN201710059109 A CN 201710059109A CN 106878528 A CN106878528 A CN 106878528A
- Authority
- CN
- China
- Prior art keywords
- block
- mobile phone
- harassing
- harassing call
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
Abstract
A kind of disturbance incoming call SMS interception method and system based on block chain technology, are related to harassing call to intercept field.Judge whether the phone that current phone is answered is harassing call according to dialog context, on-hook operation is carried out according to default hang time when receiving calls as harassing call, and the harassing call is stored in the storage card of the machine as ephemeral data file;Harassing call is sent to all mobile phone terminals being associated with the machine, and the information returned according to other mobile phone terminals is marked as actual data file to harassing call;Timing will be ranked up as the harassing call of actual data file after mark and be packaged as being sent to all mobile phone terminals being associated with the machine after block;The all mobile phone terminals for receiving block are assert to block and are generated block chain.Interception of the present invention suitable for harassing call information.
Description
Technical field
Field is intercepted the present invention relates to harassing call.
Background technology
Harassing call and short message are more and more, eternal to promote harassing call and short message, and personal information is usurped by people;
The above-mentioned many people of these situations are not strange, and what is had deeply hurts;We generally can be intercepted using some softwares, example
Such as Tencent mobile phone manager, the fail-safe software that 360 mobile guards or cell phone manufacturer carry is carried out when harassing call is beaten
Prompting, after hanging, tells I has been marked as harassing call by how many people in log.Current this kind of anti-harassment safety is soft
Part is required to the support of background data base server, and all labeled harassing calls are required for storage in central database service
Device, all of data differentiate and transmission will be using the server of software supplier as host node, it is necessary to the maintenance of software vendor
Function could be completed with data, services.
Block chain technology is occurred in that within 2009, the structure of database is innovated, data are divided into different blocks, pressed
Certain order successively generates and records all exchange of value activities that it occurs during being created, and all blocks take together
The data of complete set are presented with front and rear suitable company for one record intersection of formation.In block (block) chain (chain) technology,
Data are got off in the form of the electronical record for successively generating one by one in chronological order by permanent storage, are combined in the way of chain
Together, the database for being formed by this way is we term it block chain database.Current block chain technology is in field of telecommunications
Application do not launch also substantially, harassing short message and phone with the technical intercept can ensure the science and security of certification,
And can greatly reduce the operating cost of system.
The content of the invention
The present invention provides a kind of disturbance incoming call SMS interception method and system based on block chain technology, it is therefore intended that solve
Current anti-harassment Interception Technology needs backstage central database server to support, and with the server of software supplier as host node
Realize intercepting function, intercepting process needs the problem of maintenance cost higher.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of disturbance incoming call SMS interception method based on block chain technology, methods described includes:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, when receive calls for
On-hook operation is carried out according to default hang time during harassing call, and the harassing call is stored in the storage card of the machine is made
It is ephemeral data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals
The information returned is marked as actual data file to harassing call;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as being sent after block to
The all mobile phone terminals being associated with the machine;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in interior of mobile phone
Harassing call number compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance,
Then the number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information shape of other mobile phone terminals return
State, when the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance,
The state of the number is then set to harassing call, number of times that the telephone number is set is recorded and is stored in the machine as just
Formula data file.
Further, the S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means.
Further, the S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random words
Whether symbol string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block and to other hands
Other areas that subsequent time is received are abandoned and assert to the machine terminal broadcast block, the block that will be received if differing
Block;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone
New block chain is created in terminal, and increases new block in block chain afterbody, the Hash hash addition of the block that will be received
To in the block for increasing;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, do not existed
Telephone number in the formal block is additionally stored in actual data file, remains to be added when next block is generated.
Further, the step of methods described also includes harassing call number searching, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and this area
Block chain is read in mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID is to disturb
When disturbing number, then harassing and wrecking number information is directly intercepted and is shown.
In order to solve the above-mentioned technical problem, blocked the invention allows for a kind of disturbance incoming call short message based on block chain technology
The system of cutting, the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing and wrecking electricity according to dialog context
Words, carry out on-hook operation, and the harassing call is preserved when receiving calls as harassing call according to default hang time
As ephemeral data file in the storage card of the machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine,
And the information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up and pack after mark for timing as the harassing call of actual data file
To be sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
Further, the telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred into all mobile phones being associated with the machine
Terminal;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in it
The harassing call number of interior of mobile phone is compared, if the telephone number for receiving has had harassing call number set in advance
In the middle of code, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, connects for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module
The information state of other mobile phone terminals return is received, when the telephone number is set to harassing call by least one mobile phone terminal and reaches
Threshold parameter amount set in advance, then be set to harassing call by the state of the number, records the telephone number and is set
Number of times and store in the machine as actual data file.
Further, the timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as area
Block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to the institute being associated with the machine the block after treatment using P2P transmission means
There is mobile phone terminal.
Further, the block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random character
String, judges whether random string is identical with the answer string for pre-setting, and if the same assert that the block for receiving is formal
Block simultaneously broadcasts the block to other mobile phone terminals, and the block that will be received if differing is abandoned and assert that subsequent time connects
Other blocks for receiving;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, judges the formal area
Block is correct, and new block chain is created in mobile phone terminal, and increases new block in block chain afterbody, the block that will be received
Hash hash be added in the block for increasing;
Comparison module, will be compared the local block for generating simultaneously when being linked into local block chain for formal block
Compared with during the telephone number in the formal block is not additionally stored to actual data file, remaining to add when next block is generated
Add.
Further, the system also includes number searching module, for searching harassing call number, the number searching mould
Block includes:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, will disturb
Disturb during number and local block chain read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if this comes
When electric number is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
The beneficial effects of the invention are as follows:The propagation that each pen data is exchanged in block chain all uses distributed structure, root
According to P2P network layer protocols, message is sent directly to the whole network other all of nodes by individual node, and node here is exactly to move
Mobile phone terminal in dynamic network.Block chain need not reserve a specific position for each user for needing blocking disturbance call
Put, but set up by the principle of voluntariness it is a set of everybody can participate in the distributed book keeping operation system of record information so that will note
The responsibility of record is decentralized, is recorded jointly by the user of all mobile phone terminals being associated.
All data that block chain technology allows in database are stored in all of mobile nodes, and real-time update.It is complete
The structure setting of full decentralization enables data real time record, and is updated in the network node of each participation data storage,
The security of data can greatly be improved.
Brief description of the drawings
Fig. 1 is the flow chart of the disturbance incoming call SMS interception method based on block chain technology described in the embodiment of the present invention;
Fig. 2 is the flow chart of the step S2 described in the embodiment of the present invention;
Fig. 3 is the flow chart of the step S3 described in the embodiment of the present invention;
Fig. 4 is the flow chart of the step S4 described in the embodiment of the present invention;
The step of Fig. 5 is the harassing call number searching described in embodiment of the present invention flow chart;
Fig. 6 is the principle schematic of data transfer between the mobile phone terminal described in the embodiment of the present invention;
Fig. 7 is that the principle of the disturbance incoming call short message interception system based on block chain technology described in the embodiment of the present invention is illustrated
Figure;
Fig. 8 is the principle schematic of the telephone number transmission mark module described in the embodiment of the present invention;
Fig. 9 is the principle schematic of the timing sending module described in the embodiment of the present invention;
Figure 10 is the principle schematic of the block identification module described in the embodiment of the present invention;
Figure 11 is the principle schematic of the number searching module described in the embodiment of the present invention.
Specific embodiment
Principle of the invention and feature are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and
It is non-for limiting the scope of the present invention.
Block chain database is the transaction data base of all nodes sharings in system, and these nodes are based on exchange of value agreement
Participate in the network of block chain and be stored in harassing call data on central server originally being preserved with block mode, each
All data exchanges of generation are lived before the harassing call recorded on block is after a upper block is formed, the block is created
Dynamic, this feature ensure that the integrality of database;In most cases, once being added into block after the completion of new block
Chain it is last, then the data record of this block just can not again change or delete.This feature ensure that the preciseness of database,
The characteristic that cannot be tampered.Realize that blocking disturbance call does not have central store, authentication calculations and hardware device with block chain technology,
By each node on chain, the maintenance service and expense of application system become extremely simple and cheap for the operation of system, harass
The authentication mode of phone also becomes more science.
The characteristics of based on above block chain, the present embodiment proposes a kind of disturbance incoming call SMS interception based on block chain technology
Method, is used for realizing a decentralization, and ensure the preciseness of harassing call certification, authenticated by using block chain technology
The numerical digit system of journey traceability, methods described includes as shown in Figure 1:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, when receive calls for
On-hook operation is carried out according to default hang time during harassing call, and the harassing call is stored in the storage card of the machine is made
It is ephemeral data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals
The information returned is marked as actual data file to harassing call;
As shown in Fig. 2 the S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in interior of mobile phone
Harassing call number compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance,
Then the number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information shape of other mobile phone terminals return
State, when the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance,
The state of the number is then set to harassing call, number of times that the telephone number is set is recorded and is stored in the machine as just
Formula data file;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as being sent after block to
The all mobile phone terminals being associated with the machine;
As shown in figure 3, the S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain;
As shown in figure 4, the S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random words
Whether symbol string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block and to other hands
Other areas that subsequent time is received are abandoned and assert to the machine terminal broadcast block, the block that will be received if differing
Block;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone
New block chain is created in terminal, and increases new block in block chain afterbody, the Hash hash addition of the block that will be received
To in the block for increasing;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, do not existed
Telephone number in the formal block is additionally stored in actual data file, remains to be added when next block is generated.
By distributed recording harass number, it is distributed propagate, distributed storage this three big " distribution " we it can be found that
Nobody, without tissue, even without which country need to deflorate it is costly go to manage this system, the data in system are deposited
Storage, transaction verification, message transmitting procedure are entirely decentralization.It is large-scale to need to block in the case of no center
The user for cutting harassing call/short message reaches common understanding, and constructs jointly " mobile interchange block chain database ".It can be said that this is structure
A decentralization system is truly built.Even it can be said that we can use block chain technique construction a set of
Immortality do not go out system --- all participation nodes in so long as not network collapses in same time collective, interception disturbance incoming call
Database Systems can just operate down always.The security of data can greatly be improved and O&M cost is reduced.
Block chain is substantially a huge account book database for decentralization, used as the bottom for originating from bit coin application
Technology, block chain is to be associated produced data chunks into being contained in each data block many using cryptographies by a string
Secondary network effectively confirms the information of (once effectively transaction inspection is referred to as once confirming).As transaction is constantly produced, each hand
Machine node constantly verifies that transaction creates new block to record newest transaction, and this account book can always increase extension.These areas
Block is linearly added on original block chain sequentially in time.Each node (mobile phone terminal) has a complete have
Block chain duplicated record, and these are automatically performed by carrying out miner's network of Data Authentication Algorithm decryption.On block chain
The harassing call number information set on all about each node and node is remained with, these information are also recorded in complete
On block chain.
The block of blocking disturbance call is made up of the transaction List Table that block head and the block are included.The size of block head is
103 bytes, by the version number of 4 bytes, the hashed value of a upper block of 32 bytes, the Merkle Root Hash of 32 bytes,
The time of 15 bytes sews the random number composition of (current time), the current difficulty value of 4 bytes, 15 bytes.The transaction that block is included
List is then attached to behind block head.
The structure of block is as shown in table 1:
Table 1
, it is necessary to the transaction List Table that the block to be included, is generated by HASH algorithms in the construction process of block
Merkle Root Hash, and summary in this, as transaction List Table is stored in block head.Possess the block head of regular length, just
It is the input character string for blocking disturbance call proof of work, therefore, the data in block head can embody block and be included
All Activity (harassing call set record).
Data validity interval in block chain must be judged, more than threshold values (threshold values data are configurable as parameter), should
Block then cancels.The control of the block term of validity is mainly prevents some numbers from being distributed telephone numbers again after tearing machine open, newly takes the number
User is particularly likely that normal users, if will also be intercepted within a block, as controlling to avoid by the term of validity
Situation occurs.
During mobile nodes generation new block, it is desirable to which, while generating the random number of 14, the random number can be set as
If with the time consistency that most original block is generated, the block is identified as formal block, and the block can the whole network broadcast hair
Cloth.
Difficulty value (difficulty) in block, was weight of the miners when ore deposit is dug in the computing of bit coin originally
Reference index is wanted, it determines that miner takes around and could produce a legal block by how many times Hash operation.Blocking
Cut in the application system of harassing call, the generation of block is in the daily set time, but the mobile nodes for participating in calculating can not
Disconnected changes, and the starting stage may be fewer, and can constantly fluctuate within a certain period of time, so difficulty value must root
The change for calculating power according to the whole network is adjusted.
The adjustment of difficulty is the independent automatic generation in each complete node.Every 1000 (tentative) individual block, Suo Youjie
Point all can be by unified method adjust automatically difficulty, and this method can be the cost duration and expectation by newest 1000 blocks
Time length ratio according to actual duration and the ratio for expecting duration, is adjusted accordingly (or become difficult or become different) compared with what is drawn.Such as area
The original issuing time of block:20161009180817, totally 14, if the generation of new block was more than 1 minute, can only compare preceding ten
Position, if the time of generation is again without lowering, can be only relatively more first 8.
Random number if multiple mobile nodes is all identical with original issuing time, can be according to the life of node block
It is formal block into time more early person.The workload determination of bit coin is with sha algorithms, it is necessary to expend substantial amounts of Framework computing energy
Power, it is inapplicable to mobile phone, formal block can be determined within the shortest time with the method for random number, nor affect on mobile phone other work(
The normal of energy is used.
After one of them formal block is assert, the block of other node broadcasts is abandoned, and formal block is linked into locally
Block chain when to do one with the block that locally generate and compare, partly the telephone number not in the formal block will be in addition
It is then stored into actual data file, remains to be added when next block is generated.
As shown in figure 5, the step of the present embodiment methods described also includes harassing call number searching, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and this area
Block chain is read in mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID is to disturb
When disturbing number, then harassing and wrecking number information is directly intercepted and is shown.
Harassing the lookup of number has two kinds of data sources, and a kind of is to match caller ID from the block chain for having been formed to obtain
Take, another kind be never formed block chain the machine harassing and wrecking number actual data file in search.From block chain and formally
Speed is searched in data file relatively slow, it is necessary to this two parts data is read into internal memory in data genaration, and is ranked up,
This partial data is with binary tree or the storage of hashmap forms in internal memory, and data search speed is very fast.
The present embodiment also proposed a kind of disturbance incoming call short message interception system based on block chain technology, such as Fig. 6 and Fig. 7 institutes
Show, the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing and wrecking electricity according to dialog context
Words, carry out on-hook operation, and the harassing call is preserved when receiving calls as harassing call according to default hang time
As ephemeral data file in the storage card of the machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine,
And the information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up and pack after mark for timing as the harassing call of actual data file
To be sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
As shown in figure 8, the telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred into all mobile phones being associated with the machine
Terminal;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in it
The harassing call number of interior of mobile phone is compared, if the telephone number for receiving has had harassing call number set in advance
In the middle of code, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, connects for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module
The information state of other mobile phone terminals return is received, when the telephone number is set to harassing call by least one mobile phone terminal and reaches
Threshold parameter amount set in advance, then be set to harassing call by the state of the number, records the telephone number and is set
Number of times and store in the machine as actual data file.
As shown in figure 9, the timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as area
Block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to the institute being associated with the machine the block after treatment using P2P transmission means
There is mobile phone terminal.
As shown in Figure 10, the block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random character
String, judges whether random string is identical with the answer string for pre-setting, and if the same assert that the block for receiving is formal
Block simultaneously broadcasts the block to other mobile phone terminals, and the block that will be received if differing is abandoned and assert that subsequent time connects
Other blocks for receiving;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, judges the formal area
Block is correct, and new block chain is created in mobile phone terminal, and increases new block in block chain afterbody, the block that will be received
Hash hash be added in the block for increasing;
Comparison module, will be compared the local block for generating simultaneously when being linked into local block chain for formal block
Compared with during the telephone number in the formal block is not additionally stored to actual data file, remaining to add when next block is generated
Add.
The all mobile phone terminals being associated with the machine generate random string, and judge random character after block is received
Whether string is identical with the answer string for pre-setting, and if the same broadcasts the block to other mobile phone terminals, other mobile phone terminals
After the block for receiving broadcast, judge that the block is correct, and new block chain is created in mobile phone terminal, the received area for arriving
The Hash hash of block is added in the block chain.
The propagation that each pen data is exchanged in block chain all uses distributed structure, according to P2P network layer protocols, message
The whole network other all of nodes are sent directly to by individual node, node here is exactly the mobile phone terminal in mobile network.
Block chain need not reserve a specific position for each user for needing blocking disturbance call, but by the principle of voluntariness
Come set up it is a set of everybody can participate in the distributed book keeping operation system of record information, so as to will record responsibility it is decentralized, by phase
The user of all mobile phone terminals of association records jointly.
As shown in figure 11, system described in the present embodiment also includes number searching module, for searching harassing call number, institute
Stating number searching module includes:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, will disturb
Disturb during number and local block chain read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if this comes
When electric number is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
All data that block chain technology allows in database are stored in all of mobile nodes, and real-time update.It is complete
The structure setting of full decentralization enables data real time record, and is updated in the network node of each participation data storage,
The security of data can greatly be improved.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all it is of the invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (10)
1. a kind of disturbance incoming call SMS interception method based on block chain technology, it is characterised in that methods described includes:
S1, judge whether the phone that current phone is answered is harassing call according to dialog context, be harassing and wrecking when receiving calls
On-hook operation is carried out according to default hang time during phone, and the harassing call is stored in the storage card of the machine as facing
When data file;
S2, harassing call is sent to all mobile phone terminals being associated with the machine, and returned according to other mobile phone terminals
Information is marked as actual data file to harassing call;
S3, will be regularly ranked up as the harassing call of actual data file after mark and be packaged as sending after block to this
The associated all mobile phone terminals of machine;
S4, all mobile phone terminals for receiving block are assert to block and are generated block chain.
2. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 1, it is characterised in that
The S2 includes:
S21, the telephone number of harassing call is transferred to all mobile phone terminals being associated with the machine;
S22, receive the mobile phone terminal of telephone number by the telephone number for receiving and its be set in advance in disturbing for interior of mobile phone
Telephone number is disturbed to compare, if the telephone number for receiving has been present in the middle of harassing call number set in advance, will
The number is broadcasted to other mobile phone terminals plus corresponding information state;
The mobile phone terminal that the telephone number of harassing call is sent in S23, S21 receives the information state of other mobile phone terminals return,
When the telephone number is set to harassing call by least one mobile phone terminal and has reached threshold parameter amount set in advance, then will
The state of the number is set to harassing call, records number of times and the formal number of storage conduct in the machine that the telephone number is set
According to file.
3. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 2, it is characterised in that
The S3 includes:
S31, the number datas sequence for being regularly marked as harassing call by all and then it is packaged as block;
S32, the Hash hash for calculating the number data after packing;
S33, one random number of generation, and put on process time on block after packing;
S34, the block after treatment is sent to all mobile phone terminals being associated with the machine using P2P transmission means.
4. a kind of disturbance incoming call SMS interception method based on block chain technology according to claim 3, it is characterised in that
The S4 includes:
All mobile phone terminals that S41 is associated with the machine generate random string after block is received, and judge random string
It is whether identical with the answer string for pre-setting, if the same assert the block for receiving for formal block and to other mobile phone ends
The block is broadcasted at end, and other blocks that subsequent time is received are abandoned and assert to the block that will be received if differing;
S42, other mobile phone terminals judge that the formal block is correct after the formal block for receiving broadcast, and in mobile phone terminal
It is middle to create new block chain, and increase new block in block chain afterbody, the Hash hash of the block that will be received is added to increasing
In the block for adding;
The local block for generating to be compared simultaneously when S43, formal block are linked into local block chain, not at this just
Telephone number in formula block is additionally stored in actual data file, remains to be added when next block is generated.
5. a kind of disturbance incoming call SMS interception method based on block chain technology according to any one of Claims 1-4, its
Be characterised by, methods described also include harassing call number searching the step of, the step includes:
Sa, harassing and wrecking number actual data file generated and local block chain generation after, will harass number and local block chain
In reading mobile phone EMS memory;
Sb, the harassing and wrecking number to being stored in are ranked up and are then placed in binary tree or list;
Sc, when mobile phone is connected to incoming call, binary chop or find are carried out in mobile phone EMS memory, if the caller ID for harassing and wrecking number
During code, then harassing and wrecking number information is directly intercepted and is shown.
6. a kind of disturbance incoming call short message interception system based on block chain technology, it is characterised in that the system includes:
Phone hangs up memory module, for judging whether the phone that current phone is answered is harassing call according to dialog context,
On-hook operation is carried out according to default hang time when receiving calls as harassing call, and the harassing call is stored in this
As ephemeral data file in the storage card of machine;
Telephone number transmits mark module, for harassing call to be sent to all mobile phone terminals being associated with the machine, and root
The information returned according to other mobile phone terminals is marked as actual data file to harassing call;
Timing sending module, will be ranked up as the harassing call of actual data file after mark for timing and is packaged as area
Sent after block to all mobile phone terminals being associated with the machine;
Block assert module, and all mobile phone terminals for receiving block are assert to block and generated block chain.
7. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 6, it is characterised in that
The telephone number transmission mark module includes:
Telephone number transport module, for the telephone number of harassing call to be transferred to all mobile phone ends being associated with the machine
End;
Number contrast module, receives the telephone number that the mobile phone terminal of telephone number will receive and is set in advance in mobile phone with it
Internal harassing call number is compared, if the telephone number for receiving has had harassing call number set in advance and worked as
In, then the number is broadcasted to other mobile phone terminals plus corresponding information state;
Number mark module, it is received for sending the mobile phone terminal of telephone number of harassing call in telephone number transport module
The information state that his mobile phone terminal is returned, when the telephone number is set to harassing call by least one mobile phone terminal and has reached pre-
The threshold parameter amount for first setting, then be set to harassing call by the state of the number, record that the telephone number is set time
Count and store in the machine as actual data file.
8. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 7, it is characterised in that
The timing sending module includes:
Sequence packetization module, for timing to be by all number data sequences for being marked as harassing call and then is packaged as block;
Computing module, the Hash hash for calculating the number data after packing;
Random number generation module, put on process time in a random number, and block after packing for generating;
Block sending module, for being sent to all hands being associated with the machine the block after treatment using P2P transmission means
Machine terminal.
9. a kind of disturbance incoming call short message interception system based on block chain technology according to claim 8, it is characterised in that
The block assert that module includes:
Block broadcast module, for all mobile phone terminals for being associated with the machine after block is received, generates random string, sentences
Whether disconnected random string is identical with the answer string for pre-setting, and if the same assert the block for receiving for formal block simultaneously
The block is broadcasted to other mobile phone terminals, the block that will be received if differing is abandoned and assert what subsequent time was received
Other blocks;
Block chain generation module, for other mobile phone terminals after the formal block for receiving broadcast, is judging the formal block just
Really, and in mobile phone terminal new block chain is created, and increases new block in block chain afterbody, the Kazakhstan of the block that will be received
Uncommon hash is added in the block for increasing;
Comparison module, the local block for generating will be compared simultaneously when being linked into local block chain for formal block,
During the telephone number in the formal block is not additionally stored to actual data file, remain to be added to when next block is generated
Go.
10. a kind of disturbance incoming call short message interception system based on block chain technology according to any one of claim 6 to 9,
Characterized in that, the system also includes number searching module, for searching harassing call number, the number searching module bag
Include:
Memory modules are read in, for after harassing and wrecking number actual data file generated and the generation of local block chain, by harassing and wrecking number
Code and local block chain are read in mobile phone EMS memory;
Number order module, binary tree or list are then placed in for being ranked up to the harassing and wrecking number being stored in;
Blocking module, for when mobile phone is connected to incoming call, binary chop or find being carried out in mobile phone EMS memory, if the incoming call number
When code is for harassing and wrecking number, then harassing and wrecking number information is directly intercepted and is shown.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710059109.6A CN106878528A (en) | 2017-01-23 | 2017-01-23 | A kind of disturbance incoming call SMS interception method and system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710059109.6A CN106878528A (en) | 2017-01-23 | 2017-01-23 | A kind of disturbance incoming call SMS interception method and system based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106878528A true CN106878528A (en) | 2017-06-20 |
Family
ID=59158965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710059109.6A Pending CN106878528A (en) | 2017-01-23 | 2017-01-23 | A kind of disturbance incoming call SMS interception method and system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106878528A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108512896A (en) * | 2018-02-06 | 2018-09-07 | 北京东方棱镜科技有限公司 | Mobile Internet security postures cognition technology based on big data and device |
CN108810901A (en) * | 2018-04-17 | 2018-11-13 | 中国地质大学(武汉) | A kind of malice number mark recognition methods based on block chain |
CN108830712A (en) * | 2018-05-17 | 2018-11-16 | 易链科技(深圳)有限公司 | Method, apparatus, equipment and the medium that block generates |
CN109274837A (en) * | 2018-08-22 | 2019-01-25 | 北京航空航天大学 | Method and device can be traced in telephone source based on block chain technology |
CN109327627A (en) * | 2018-11-27 | 2019-02-12 | 深圳声笑科技有限公司 | Telephone number recognition methods, device and storage medium based on block chain |
CN109919768A (en) * | 2019-03-12 | 2019-06-21 | 网易(杭州)网络有限公司 | Block generation method, device, medium and calculating equipment |
CN110213271A (en) * | 2019-06-03 | 2019-09-06 | 重庆蓝岸通讯技术有限公司 | A kind of safety management system based on block chain |
CN111327771A (en) * | 2018-12-17 | 2020-06-23 | 中国移动通信集团青海有限公司 | Method and device for identifying crank call number |
CN111355852A (en) * | 2018-12-21 | 2020-06-30 | 西安佰才邦网络技术有限公司 | Method and equipment for acquiring contact number based on block chain |
WO2020135393A1 (en) * | 2018-12-26 | 2020-07-02 | 中兴通讯股份有限公司 | Nuisance call prevention method and device, terminal, and storage medium |
CN111385322A (en) * | 2018-12-28 | 2020-07-07 | 中国移动通信集团山西有限公司 | Blacklist number sharing system, method, device, equipment and storage medium |
CN111787159A (en) * | 2020-07-02 | 2020-10-16 | 中国联合网络通信集团有限公司 | Block chain-based crank call identification method and system |
CN112532780A (en) * | 2019-09-19 | 2021-03-19 | 中国电信股份有限公司 | Anti-harassment information processing method and system |
CN113542504A (en) * | 2021-07-15 | 2021-10-22 | 中国银行股份有限公司 | Block chain-based harassing call marking method and device |
JP2021532427A (en) * | 2019-10-11 | 2021-11-25 | アリペイ (ハンジョウ) インフォメーション テクノロジー カンパニー リミテッドAlipay (Hangzhou) Information Technology Co., Ltd. | Decentralized automatic phone fraud risk management |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090187887A1 (en) * | 2008-01-17 | 2009-07-23 | Microsoft Corporation | Block count based procedure layout and splitting |
CN101834857A (en) * | 2010-04-20 | 2010-09-15 | 上海禹为通信技术有限公司 | Method and system for identifying and controlling speech content in call |
CN102413169A (en) * | 2011-10-12 | 2012-04-11 | 盛乐信息技术(上海)有限公司 | Cloud address list establishing and maintenance method and system thereof |
CN102572904A (en) * | 2011-12-28 | 2012-07-11 | 上海禹为通信技术有限公司 | System and method for implementing automatic dial test business |
CN103179122A (en) * | 2013-03-22 | 2013-06-26 | 马博 | Telcom phone phishing-resistant method and system based on discrimination and identification content analysis |
CN103685613A (en) * | 2013-12-05 | 2014-03-26 | 江苏大学 | Telephone-fraud-resistant system based on voice recognition and method thereof |
CN105100363A (en) * | 2015-06-29 | 2015-11-25 | 小米科技有限责任公司 | Information processing method, information processing device and terminal |
CN105721660A (en) * | 2016-02-03 | 2016-06-29 | 北京光年无限科技有限公司 | Harassment call identification method and system |
-
2017
- 2017-01-23 CN CN201710059109.6A patent/CN106878528A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090187887A1 (en) * | 2008-01-17 | 2009-07-23 | Microsoft Corporation | Block count based procedure layout and splitting |
CN101834857A (en) * | 2010-04-20 | 2010-09-15 | 上海禹为通信技术有限公司 | Method and system for identifying and controlling speech content in call |
CN102413169A (en) * | 2011-10-12 | 2012-04-11 | 盛乐信息技术(上海)有限公司 | Cloud address list establishing and maintenance method and system thereof |
CN102572904A (en) * | 2011-12-28 | 2012-07-11 | 上海禹为通信技术有限公司 | System and method for implementing automatic dial test business |
CN103179122A (en) * | 2013-03-22 | 2013-06-26 | 马博 | Telcom phone phishing-resistant method and system based on discrimination and identification content analysis |
CN103685613A (en) * | 2013-12-05 | 2014-03-26 | 江苏大学 | Telephone-fraud-resistant system based on voice recognition and method thereof |
CN105100363A (en) * | 2015-06-29 | 2015-11-25 | 小米科技有限责任公司 | Information processing method, information processing device and terminal |
CN105721660A (en) * | 2016-02-03 | 2016-06-29 | 北京光年无限科技有限公司 | Harassment call identification method and system |
Non-Patent Citations (2)
Title |
---|
袁勇;王飞跃: "区块链技术发展现状与展望", 《自动化学报》 * |
邵鹏: "《社交金融:共享经济时代金融新格局》", 31 December 2016 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108512896A (en) * | 2018-02-06 | 2018-09-07 | 北京东方棱镜科技有限公司 | Mobile Internet security postures cognition technology based on big data and device |
CN108810901A (en) * | 2018-04-17 | 2018-11-13 | 中国地质大学(武汉) | A kind of malice number mark recognition methods based on block chain |
CN108830712A (en) * | 2018-05-17 | 2018-11-16 | 易链科技(深圳)有限公司 | Method, apparatus, equipment and the medium that block generates |
CN109274837A (en) * | 2018-08-22 | 2019-01-25 | 北京航空航天大学 | Method and device can be traced in telephone source based on block chain technology |
CN109327627A (en) * | 2018-11-27 | 2019-02-12 | 深圳声笑科技有限公司 | Telephone number recognition methods, device and storage medium based on block chain |
CN111327771A (en) * | 2018-12-17 | 2020-06-23 | 中国移动通信集团青海有限公司 | Method and device for identifying crank call number |
CN111355852B (en) * | 2018-12-21 | 2024-04-05 | 西安佰才邦网络技术有限公司 | Method and equipment for acquiring contact number based on blockchain |
CN111355852A (en) * | 2018-12-21 | 2020-06-30 | 西安佰才邦网络技术有限公司 | Method and equipment for acquiring contact number based on block chain |
WO2020135393A1 (en) * | 2018-12-26 | 2020-07-02 | 中兴通讯股份有限公司 | Nuisance call prevention method and device, terminal, and storage medium |
CN111371941A (en) * | 2018-12-26 | 2020-07-03 | 中兴通讯股份有限公司 | Method and device for preventing harassing call, terminal and storage medium |
CN111385322B (en) * | 2018-12-28 | 2023-11-21 | 中国移动通信集团山西有限公司 | System, method, device, equipment and storage medium for sharing blacklist number |
CN111385322A (en) * | 2018-12-28 | 2020-07-07 | 中国移动通信集团山西有限公司 | Blacklist number sharing system, method, device, equipment and storage medium |
CN109919768A (en) * | 2019-03-12 | 2019-06-21 | 网易(杭州)网络有限公司 | Block generation method, device, medium and calculating equipment |
CN109919768B (en) * | 2019-03-12 | 2021-08-10 | 网易(杭州)网络有限公司 | Block generation method, device, medium and computing equipment |
CN110213271A (en) * | 2019-06-03 | 2019-09-06 | 重庆蓝岸通讯技术有限公司 | A kind of safety management system based on block chain |
CN112532780A (en) * | 2019-09-19 | 2021-03-19 | 中国电信股份有限公司 | Anti-harassment information processing method and system |
JP2021532427A (en) * | 2019-10-11 | 2021-11-25 | アリペイ (ハンジョウ) インフォメーション テクノロジー カンパニー リミテッドAlipay (Hangzhou) Information Technology Co., Ltd. | Decentralized automatic phone fraud risk management |
CN111787159B (en) * | 2020-07-02 | 2022-03-18 | 中国联合网络通信集团有限公司 | Block chain-based crank call identification method and system |
CN111787159A (en) * | 2020-07-02 | 2020-10-16 | 中国联合网络通信集团有限公司 | Block chain-based crank call identification method and system |
CN113542504A (en) * | 2021-07-15 | 2021-10-22 | 中国银行股份有限公司 | Block chain-based harassing call marking method and device |
CN113542504B (en) * | 2021-07-15 | 2022-12-23 | 中国银行股份有限公司 | Block chain-based harassing call marking method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106878528A (en) | A kind of disturbance incoming call SMS interception method and system based on block chain technology | |
AU2020205231B2 (en) | Methods and apparatus for efficiently implementing a distributed database within a network | |
RU2754189C2 (en) | Method and device for distributed database that allows deleting events | |
CN106357396B (en) | Digital signature method and system and quantum key card | |
CN101197674B (en) | Encrypted communication method, server and encrypted communication system | |
CN104704524B (en) | Information discloses system, information open server, communication terminal, information published method and non-transient computer-readable medium | |
CN107079058A (en) | The business of block chain node performs method, device and node device | |
CN108462573A (en) | A kind of flexible quantum safety moving communication means | |
CN110033243A (en) | Main chain based on block chain intelligence contract deposits card method, system and storage medium | |
CN101754182A (en) | Packed-based network contact list implementation method and system | |
CN104394530A (en) | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system | |
CN107948192A (en) | A kind of block chain account customization identification and login method and system | |
CN109274837B (en) | Telephone source traceable method and device based on block chain technology | |
CN112866380B (en) | Chain network architecture based on block chain | |
CN110322678A (en) | A kind of four table centralized meter-reading systems and method based on block chain | |
KR20140095148A (en) | Method for processing financial transactions based on social network service and terminal | |
CN111861459A (en) | Iota account book optimization system and method based on DPoS consensus algorithm | |
CN101087334A (en) | Multi-user management method of mobile phone information | |
CN109754322A (en) | A kind of data service system | |
CN103532709A (en) | IBE (Identity Based Encryption) cryptographic equipment and data encryption and decryption method | |
CN104243153B (en) | The method and user equipment of a kind of user for discovering device | |
CN106973040A (en) | A kind of smart mobile phone secret short message security system and secret short message transmission method | |
CN104836881A (en) | Information control method and electronic equipment | |
CN112860674A (en) | Data sharing method and system | |
CN110661786B (en) | User data system based on chain relation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |