CN106888229B - Call management method and server - Google Patents

Call management method and server Download PDF

Info

Publication number
CN106888229B
CN106888229B CN201510933397.4A CN201510933397A CN106888229B CN 106888229 B CN106888229 B CN 106888229B CN 201510933397 A CN201510933397 A CN 201510933397A CN 106888229 B CN106888229 B CN 106888229B
Authority
CN
China
Prior art keywords
trust
terminal device
call
terminal
trust distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510933397.4A
Other languages
Chinese (zh)
Other versions
CN106888229A (en
Inventor
张峰
彭晋
粟栗
冉鹏
杜海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510933397.4A priority Critical patent/CN106888229B/en
Publication of CN106888229A publication Critical patent/CN106888229A/en
Application granted granted Critical
Publication of CN106888229B publication Critical patent/CN106888229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a call management method and a server, wherein the method comprises the following steps: acquiring at least two communication lists corresponding to at least two terminal devices; establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists; determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph; and processing the call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value.

Description

Call management method and server
Technical Field
The present invention relates to call management technologies in the field of communications, and in particular, to a call management method and a server.
Background
With the continuous advance of the national internet + strategy, a great deal of telemarketing or advertising has brought about serious troubles to users. According to statistics in the industry, harassing calls in the second quarter of 2015 exceed spam messages for the first time, which is becoming a main problem of telecommunication harassment and seriously affecting the normal life of people. In the face of so many strange calls every day, the user is very hesitant to answer or not, and whether the incoming call relates to advertising promotion, fraud or important business opportunities is not judged, so that the normal work and life order of the user is seriously influenced.
The current solution for strange incoming call treatment generally adopts two modes:
the first blacklist mode is as follows: and establishing a blacklist number library at the cloud based on various crank call numbers collected in the past. When the called user receives a strange incoming call, the called terminal sends the calling number to the cloud for comparison, and if the calling number is matched with the strange incoming call, the potential attribute corresponding to the call is prompted. However, this scheme is difficult to scale up and expand the black list number library, and once the calling number is changed, the method fails, and a long period of time and cost are required to learn and expand the black list number library continuously.
Second, signaling analysis: the signaling-based mode mainly judges whether the call is a harassing call according to the behavior characteristics of the calling call, wherein the behavior characteristics comprise call frequency, called number segment distribution, call duration, call completing rate and the like, and data for analysis are mainly collected from a signaling network of an operator. However, the solution cannot detect a harassing call in real time, and can only detect the harassing call when the harassing behavior characteristics are expressed, so that the solution has a certain hysteresis.
Disclosure of Invention
In view of the above, the present invention provides a call management method and a server, which can solve at least the above problems in the prior art.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the embodiment of the invention provides a call management method, which comprises the following steps:
acquiring at least two communication lists corresponding to at least two terminal devices;
establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists;
determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
and processing the call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value.
An embodiment of the present invention provides a server, including:
the information acquisition unit is used for acquiring at least two communication lists corresponding to at least two pieces of terminal equipment;
the processing unit is used for establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists; determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
and the call management unit is used for processing the call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value.
The embodiment of the invention provides a call management method and a server, which can establish a social network topological graph in advance based on a communication list of terminal equipment, determine a trust distance value between every two pieces of terminal equipment, and process based on the trust distance value when a call between the two pieces of terminal equipment is detected. Therefore, the call between the user terminal devices can be processed more timely and accurately based on the social relationship and the trust distance.
Drawings
FIG. 1 is a flow chart of a call management method according to an embodiment of the present invention;
FIG. 2 is a first scenario of the present invention;
FIG. 3 is a diagram illustrating a second scenario of the present invention;
FIG. 4 is a third scenario diagram according to an embodiment of the present invention;
FIG. 5 is an example of a social network topology according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating call management according to an embodiment of the present invention;
FIG. 7 is a diagram illustrating threshold setting according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a server composition structure according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The first embodiment,
An embodiment of the present invention provides a call management method, which is applied to a server, and as shown in fig. 1, includes:
step 101: acquiring at least two communication lists corresponding to at least two terminal devices;
step 102: establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists;
step 103: determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
step 104: and processing the call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value.
In this embodiment, the establishing a social network topology diagram formed by the at least two terminal devices based on the at least two communication lists includes:
establishing pointing path information between every two terminal devices based on the at least two communication lists; wherein, the pointing path information includes: the first type of pointing path information represents that the communication lists corresponding to the two terminal devices both comprise the user numbers of the opposite side; the second type of pointing path information represents that the user number of the terminal device corresponding to the other communication list is stored in only one communication list in the communication lists corresponding to the two terminal devices.
There are phone numbers in the communication list that are closely tied to the user. Generally, the following two cases are provided:
in case one, as shown in fig. 2, the number of the user a is stored in the communication list of the user B, but the number of the user B is not stored in the communication list of the user a; alternatively, as shown in fig. 3, the number of the user B is stored in the communication list of the user a, and the number of the user a is not stored in the communication list of the user B.
In the second case, the number of the user B is stored in the communication list of the user a, and the number of the user a is stored in the communication list of the user B.
Further, the establishing of the information of the pointing paths between two terminal devices may be as shown in fig. 5, where a bidirectional arrow between two users A, C indicates that there are numbers of opposite parties in two user address books, that is, a first type of pointing path is established between the two users; and a one-way arrow between A and B indicates that the number of A is in the address book of B, but the number of B is not in the address book of A, and a second type of pointing path for the user A to point to the user B is established. And so on for others. Blackhole indicates that the calling number does not exist in the existing social network topology when a certain call occurs.
Preferably, the method further includes calculating the degrees of trust that each pair of terminals has directivity based on the first type of directional path and the second type of directional path. Specifically, there are the following three cases:
in the first situation, when a first type of pointing path exists between two terminal devices, the trust degree between the two terminal devices is set to be one; for example, as shown in fig. 4, if the call from caller a to callee B is completely trusted, the trust level can be set to 1 (which can be adjusted according to the algorithm requirement).
In the second case, when a second type of directing path exists between two terminal devices, the trust level of the source terminal device of the second type of directing path is set to be a first preset value for the destination terminal device to which the second type of directing path is directed, for example, as shown in fig. 2, a call from the user a to the called B is relatively trusted, and generally, no malicious harassment or fraud is present, and the trust level can be set to be the first preset value of 0.7, which can be adjusted according to the algorithm requirement.
And in a third case, when a second type of directing path exists between the two terminal devices, setting the trust level of the destination terminal device pointed by the second type of directing path to a second preset value for the source terminal device of the second type of directing path, for example, as shown in fig. 2, the call from the user B to the called a is relatively trusted, and setting the trust level to the second preset value, for example, to 0.3, which may be specifically adjusted according to the algorithm requirement.
The mathematical model of confidence is represented as follows:
Figure BDA0000878645780000051
wherein L isBA communication list for user B; l isAA communication list for user A; TR (transmitter-receiver)ABRepresenting the degree of trust between user a and user B.
The determining a trust distance value between any two terminal devices of the at least two terminal devices based on the social network topological graph includes:
determining path information consisting of at least one pointing path between any two terminal devices of the at least two terminal devices based on the social network topological graph;
and determining a trust distance value between any two terminal devices in the at least two terminal devices based on at least one pointing path in the path information.
Before determining a trust distance value between any two terminal devices of the at least two terminal devices based on the type of the at least one pointed path in the path information, the method may further include:
calculating the sub-trust distance corresponding to each pointing path in the social network topological graph one by one; wherein the sub-trust distance is the reciprocal of the pointing path; for example, referring to FIG. 5, the sub-trust distance corresponding to the pointing path between user A and user B is defined as
Figure BDA0000878645780000052
The greater the confidence level, the shorter the sub-trust distance, and the more trusted user B is to user a.
The determining a trust distance value between any two terminal devices of the at least two terminal devices based on at least one pointed path in the path information includes:
and adding the sub-trust distances of the at least one pointing path to obtain a trust distance value between any two terminal devices in the at least two terminal devices.
On the basis of the established social network topological graph and the trust distance value, the call between the two terminals can be controlled. The method comprises the following specific steps:
the processing the call initiated by the first terminal device to the second terminal device based on the trust distance value includes:
when detecting that a first terminal device initiates a call to a second terminal device, inquiring to obtain a trust distance value between the first terminal device and the second terminal device;
and determining a processing mode aiming at the call based on the trust distance value and a preset trust distance threshold value.
In addition, the call processing is carried out based on the trust distance threshold, and the following two scenes are included:
scenario one, with only one confidence distance threshold: the determining a processing mode for the call based on the trust distance value and a preset trust distance threshold includes:
when the trust distance value is larger than the trust distance threshold value, transferring the call of the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and respectively sending prompt messages to the first terminal device and the second terminal device;
and when the trust distance value is not greater than the trust distance threshold value, sending the call of the first terminal device to the second terminal device.
The prompt message may be a short message, for example, notifying the second terminal device that there is a call from the first terminal device, and transferring the call to a voice mailbox. In addition, the prompt message sent to the first terminal device may be that the call has been transferred to voice message.
In scenario two, two trust distance thresholds can be set: the trust distance threshold comprises a first trust distance ion threshold and a second trust distance ion threshold, and the first trust distance sub-threshold is greater than the second trust distance ion threshold;
correspondingly, the determining a processing mode for the call based on the trust distance value and a preset trust distance threshold value includes:
when the trust distance value is greater than the first trust distance ion threshold value, transferring the call of the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and respectively sending first prompt information to the first terminal device and the second terminal device;
when the trust distance value is not greater than the first trust distance ion threshold value and is greater than a second trust distance ion threshold value, sending the call of the first terminal equipment to the second terminal equipment, and sending second prompt information to the second terminal equipment
And when the trust distance value is not greater than the second trust distance threshold value, sending the call of the first terminal equipment to the second terminal equipment.
The core idea of the proposal is that when the connection between two users is about to occur, a certain trust level exists between the two users by default, and the trust level between the two users without direct association can be transmitted through an intermediary. And when a calling behavior occurs, the relation between the trust distance between the calling party and the called party and a trust threshold value is compared, so that the calling is treated as direct ringing or a voice mailbox message is transferred. The handling mode can not cause disturbance to the called user and can not miss important calls.
Therefore, by adopting the scheme, the social network topological graph can be established in advance based on the communication list of the terminal equipment, the trust distance value between every two pieces of terminal equipment is determined, and when the call between the two pieces of terminal equipment is detected, the processing is carried out based on the trust distance value. Therefore, the call between the user terminal devices can be processed more timely and accurately based on the social relationship and the trust distance.
Therefore, the method can ensure that the harassing type unfamiliar call can be accurately judged, and provides accurate call attribute reminding for the user, so that malicious harassment of harassing calls is avoided, omission of important calls is also avoided, and the method has high practical value.
Example II,
The call management method provided by the embodiment of the present invention can be seen from fig. 6, and is specifically described as follows:
the method comprises the following steps: number information is collected based on a cloud service mode.
Based on the address book actively uploaded or backed up to the cloud server by the user, the fuzzification technology is adopted to protect the privacy of the user, the uploaded information is preprocessed, and the mobile phone number of the uploader of the address book of the user and the phone number in the address book are extracted.
Step two: and establishing a social network topological graph based on the address book.
Based on the user telephone numbers and the telephone numbers in the address book acquired by the cloud, combing the inclusion relationship between the telephone numbers and the address book, and establishing a social relationship diagram as shown in fig. 5, wherein a bidirectional arrow between two users A, C indicates that each other has a counterpart number in the two user address books; the one-way arrows between A and B indicate that the number of A is in the address book of B, but the number of B is not in the address book of A. And so on for others. Blackhole indicates that the calling number does not exist in the existing social network topology when a certain call occurs.
Step three: based on the social network topological graph, the shortest trust distance between any two users is calculated.
And calculating the shortest trust distance between any two users according to the user social network topological graph, wherein the optional algorithms comprise Dijkstra algorithm, Bellman-Ford algorithm and the like. The results of the algorithm calculations are shown in table 1:
calling subscriber Called party Distance of trust
A B 1
A D 2
E J 3.86
K C 4.33
Black Hole A 6
TABLE 1
It should be noted that if the calling number is not in the social network topology of the called number when the calling action occurs, i.e. is in Black hole set, the trust distance of the call can be set to a maximum value of 6 according to the network six-degree space theory proposed by professor mierland harvard university, i.e. "no more than five people are separated from any stranger, i.e. you can know any stranger through five intermediaries at most. "
Step four: reading a trust distance threshold value set by an administrator;
the trust distance threshold value is a default inter-user trust distance threshold value T flexibly set according to the severity of harassing call outbreak by an administrator (namely an operator)HAnd TLSuch as shown in fig. 7.
Step five: when a call between any two users occurs, the call is processed according to the trust distance calling behavior;
when telephone call occurs between any two users, the user trust distance table is checked to obtain the trust distance TL of the calling party and the called partyABComparing the relation between the trust distance and the trust distance threshold set by the system, and giving a corresponding disposal mode according to the comparison result, wherein the selectable disposal modes are as follows:
when TLAB>THDirectly converting the call into a voice mailbox to remind the calling party of leaving a message in voice and simultaneously push the voice message to the called partyA box reminder;
when T isL<TLAB≤THAnd ringing the called user and sending out prompt information.
When TLAB≤TLWhen the user answers, the ringing is directly given to the called user and the called user waits for answering;
in the technical concrete implementation process, T can be setL=THTo simplify the process flow.
The algorithm can also be applied to the technical fields of telecom fraud, spam short messages, social software spam information governance and the like.
Example III,
An embodiment of the present invention provides a server, as shown in fig. 8, including:
an information obtaining unit 81, configured to obtain at least two communication lists corresponding to at least two terminal devices;
the processing unit 82 is configured to establish a social network topology graph formed by the at least two terminal devices based on the at least two communication lists; determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
and the call management unit 83 is configured to process a call initiated by the first terminal device to the second terminal device based on the trust distance value.
In this embodiment, the processing unit is configured to establish pointing path information between each two terminal devices based on the at least two communication lists;
wherein, the pointing path information includes: the first type of pointing path information represents that the communication lists corresponding to the two terminal devices both comprise the user numbers of the opposite side; the second type of pointing path information represents that the user number of the terminal device corresponding to the other communication list is stored in only one communication list in the communication lists corresponding to the two terminal devices.
There are phone numbers in the communication list that are closely tied to the user. Generally, the following two cases are provided:
in case one, as shown in fig. 2, the number of the user a is stored in the communication list of the user B, but the number of the user B is not stored in the communication list of the user a; alternatively, as shown in fig. 3, the number of the user B is stored in the communication list of the user a, and the number of the user a is not stored in the communication list of the user B.
In the second case, the number of the user B is stored in the communication list of the user a, and the number of the user a is stored in the communication list of the user B.
Further, the establishing of the information of the pointing paths between two terminal devices may be as shown in fig. 5, where a bidirectional arrow between two users A, C indicates that there are numbers of opposite parties in two user address books, that is, a first type of pointing path is established between the two users; and a one-way arrow between A and B indicates that the number of A is in the address book of B, but the number of B is not in the address book of A, and a second type of pointing path for the user A to point to the user B is established. And so on for others. Blackhole indicates that the calling number does not exist in the existing social network topology when a certain call occurs.
Preferably, the method further includes calculating the degrees of trust that each pair of terminals has directivity based on the first type of directional path and the second type of directional path. Specifically, there are the following three cases:
in the first situation, when a first type of pointing path exists between two terminal devices, the trust degree between the two terminal devices is set to be one; for example, as shown in fig. 4, if the call from caller a to callee B is completely trusted, the trust level can be set to 1 (which can be adjusted according to the algorithm requirement).
In the second case, when a second type of directing path exists between two terminal devices, the trust level of the source terminal device of the second type of directing path is set to be a first preset value for the destination terminal device to which the second type of directing path is directed, for example, as shown in fig. 2, a call from the user a to the called B is relatively trusted, and generally, no malicious harassment or fraud is present, and the trust level can be set to be the first preset value of 0.7, which can be adjusted according to the algorithm requirement.
And in a third case, when a second type of directing path exists between the two terminal devices, setting the trust level of the destination terminal device pointed by the second type of directing path to a second preset value for the source terminal device of the second type of directing path, for example, as shown in fig. 2, the call from the user B to the called a is relatively trusted, and setting the trust level to the second preset value, for example, to 0.3, which may be specifically adjusted according to the algorithm requirement.
The mathematical model of confidence is represented as follows:
Figure BDA0000878645780000111
wherein L isBA communication list for user B; l isAA communication list for user A; TR (transmitter-receiver)ABRepresenting the degree of trust between user a and user B.
The processing unit is configured to determine, based on the social network topology map, path information composed of at least one directional path between any two terminal devices of the at least two terminal devices; and determining a trust distance value between any two terminal devices in the at least two terminal devices based on at least one pointing path in the path information.
Before determining a trust distance value between any two terminal devices of the at least two terminal devices based on the type of the at least one pointed path in the path information, the method may further include:
calculating the sub-trust distance corresponding to each pointing path in the social network topological graph one by one; wherein the sub-trust distance is the reciprocal of the pointing path; for example, referring to FIG. 5, the sub-trust distance corresponding to the pointing path between user A and user B is defined as
Figure BDA0000878645780000112
The greater the confidence level, the shorter the sub-trust distance, and the more trusted user B is to user a.
The call management unit is used for inquiring and obtaining a trust distance value between a first terminal device and a second terminal device when detecting that the first terminal device initiates a call to the second terminal device; and determining a processing mode aiming at the call based on the trust distance value and a preset trust distance threshold value.
In addition, the call processing is carried out based on the trust distance threshold, and the following two scenes are included:
scenario one, with only one confidence distance threshold:
the call management unit is configured to transfer, when the trust distance value is greater than the trust distance threshold, the call from the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and send prompt messages to the first terminal device and the second terminal device, respectively; and when the trust distance value is not greater than the trust distance threshold value, sending the call of the first terminal device to the second terminal device.
The prompt message may be a short message, for example, notifying the second terminal device that there is a call from the first terminal device, and transferring the call to a voice mailbox. In addition, the prompt message sent to the first terminal device may be that the call has been transferred to voice message.
In scenario two, two trust distance thresholds can be set: the trust distance threshold comprises a first trust distance ion threshold and a second trust distance ion threshold, and the first trust distance sub-threshold is greater than the second trust distance ion threshold;
correspondingly, the call management unit is configured to transfer the call from the first terminal device to the second terminal device to a voice mailbox of the second terminal device when the trust distance value is greater than the first trust distance ion threshold, and send first prompt information to the first terminal device and the second terminal device respectively; when the trust distance value is not greater than the first trust distance ion threshold value and is greater than the second trust distance ion threshold value, sending the call of the first terminal device to the second terminal device, and sending second prompt information to the second terminal device, and when the trust distance value is not greater than the second trust distance threshold value, sending the call of the first terminal device to the second terminal device.
Therefore, by adopting the scheme, the social network topological graph can be established in advance based on the communication list of the terminal equipment, the trust distance value between every two pieces of terminal equipment is determined, and when the call between the two pieces of terminal equipment is detected, the processing is carried out based on the trust distance value. Therefore, the user can more timely and accurately process the call based on the social relationship and the trust distance.
Therefore, the method can ensure that the harassing type unfamiliar call can be accurately judged, and provides accurate call attribute reminding for the user, so that malicious harassment of harassing calls is avoided, omission of important calls is also avoided, and the method has high practical value.
The integrated module according to the embodiment of the present invention may also be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as an independent product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a base station, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. A call management method applied to a server is characterized by comprising the following steps:
acquiring at least two communication lists corresponding to at least two terminal devices;
establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists;
determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
processing a call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value;
wherein the determining a trust distance value between any two terminal devices of the at least two terminal devices based on the social network topology includes:
determining path information consisting of at least one pointing path between any two terminal devices of the at least two terminal devices based on the social network topological graph;
calculating the sub-trust distance corresponding to at least one pointing path in the social network topological graph one by one; the sub-trust distance is the reciprocal of the trust degree of the corresponding pointing path, and the trust degree is obtained based on a preset trust degree model and the corresponding pointing path information;
and adding the sub-trust distances of the at least one pointing path to obtain a trust distance value between any two terminal devices in the at least two terminal devices.
2. The method of claim 1, wherein processing the call initiated by the first terminal device to the second terminal device based on the trust distance value comprises:
when detecting that a first terminal device initiates a call to a second terminal device, inquiring to obtain a trust distance value between the first terminal device and the second terminal device;
and determining a processing mode aiming at the call based on the trust distance value and a preset trust distance threshold value.
3. The method of claim 2, wherein determining the handling manner for the call based on the trust distance value and a preset trust distance threshold comprises:
when the trust distance value is larger than the trust distance threshold value, transferring the call of the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and respectively sending prompt messages to the first terminal device and the second terminal device;
and when the trust distance value is not greater than the trust distance threshold value, sending the call of the first terminal device to the second terminal device.
4. The method of claim 2, wherein the confidence distance threshold comprises a first confidence distance ion threshold and a second confidence distance ion threshold, and wherein the first confidence distance sub-threshold is greater than the second confidence distance ion threshold;
correspondingly, the determining a processing mode for the call based on the trust distance value and a preset trust distance threshold value includes:
when the trust distance value is greater than the first trust distance ion threshold value, transferring the call of the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and respectively sending first prompt information to the first terminal device and the second terminal device;
when the trust distance value is not greater than the first trust distance ion threshold value and is greater than a second trust distance ion threshold value, sending the call of the first terminal equipment to the second terminal equipment, and sending second prompt information to the second terminal equipment
And when the trust distance value is not greater than the second trust distance threshold value, sending the call of the first terminal equipment to the second terminal equipment.
5. The method according to any one of claims 1 to 4, wherein the establishing a social network topology graph formed by the at least two terminal devices based on the at least two communication lists comprises:
establishing pointing path information between every two terminal devices based on the at least two communication lists;
wherein, the pointing path information includes: the first type of pointing path information represents that the communication lists corresponding to the two terminal devices both comprise the user numbers of the opposite side; the second type of pointing path information represents that the user number of the terminal device corresponding to the other communication list is stored in only one communication list in the communication lists corresponding to the two terminal devices.
6. A server, comprising:
the information acquisition unit is used for acquiring at least two communication lists corresponding to at least two pieces of terminal equipment;
the processing unit is used for establishing a social network topological graph formed by the at least two terminal devices based on the at least two communication lists; determining a trust distance value between any two terminal devices in the at least two terminal devices based on the social network topological graph;
the call management unit is used for processing the call initiated by the first terminal equipment to the second terminal equipment based on the trust distance value;
the processing unit is configured to determine, based on the social network topology map, path information composed of at least one directional path between any two terminal devices of the at least two terminal devices; calculating sub-trust distances corresponding to at least one pointing path in the social network topological graph one by one, wherein the sub-trust distances are the inverse of the trust degrees of the corresponding pointing paths, and the trust degrees are obtained based on a preset trust degree model and the corresponding pointing path information; and adding the sub-trust distances of the at least one pointing path to obtain a trust distance value between any two terminal devices in the at least two terminal devices.
7. The server according to claim 6,
the call management unit is used for inquiring and obtaining a trust distance value between a first terminal device and a second terminal device when detecting that the first terminal device initiates a call to the second terminal device; and determining a processing mode aiming at the call based on the trust distance value and a preset trust distance threshold value.
8. The server according to claim 7,
the call management unit is configured to transfer, when the trust distance value is greater than the trust distance threshold, the call from the first terminal device to the second terminal device to a voice mailbox of the second terminal device, and send prompt messages to the first terminal device and the second terminal device, respectively; and when the trust distance value is not greater than the trust distance threshold value, sending the call of the first terminal device to the second terminal device.
9. The server according to claim 7,
the trust distance threshold comprises a first trust distance ion threshold and a second trust distance ion threshold, and the first trust distance sub-threshold is greater than the second trust distance ion threshold;
correspondingly, the call management unit is configured to transfer the call from the first terminal device to the second terminal device to a voice mailbox of the second terminal device when the trust distance value is greater than the first trust distance ion threshold, and send first prompt information to the first terminal device and the second terminal device respectively; when the trust distance value is not greater than the first trust distance ion threshold value and is greater than the second trust distance ion threshold value, sending the call of the first terminal device to the second terminal device, and sending second prompt information to the second terminal device, and when the trust distance value is not greater than the second trust distance threshold value, sending the call of the first terminal device to the second terminal device.
10. The server according to any one of claims 6 to 9, wherein the processing unit is configured to establish, based on the at least two communication lists, pointing path information between two of the at least two terminal devices;
wherein, the pointing path information includes: the first type of pointing path information represents that the communication lists corresponding to the two terminal devices both comprise the user numbers of the opposite side; the second type of pointing path information represents that the user number of the terminal device corresponding to the other communication list is stored in only one communication list in the communication lists corresponding to the two terminal devices.
CN201510933397.4A 2015-12-15 2015-12-15 Call management method and server Active CN106888229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510933397.4A CN106888229B (en) 2015-12-15 2015-12-15 Call management method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510933397.4A CN106888229B (en) 2015-12-15 2015-12-15 Call management method and server

Publications (2)

Publication Number Publication Date
CN106888229A CN106888229A (en) 2017-06-23
CN106888229B true CN106888229B (en) 2020-06-12

Family

ID=59173614

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510933397.4A Active CN106888229B (en) 2015-12-15 2015-12-15 Call management method and server

Country Status (1)

Country Link
CN (1) CN106888229B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040456B (en) * 2018-08-14 2020-10-09 中国联合网络通信集团有限公司 Terminal equipment calling method, device, equipment and storage medium
CN111465021B (en) * 2020-04-01 2023-06-09 北京中亦安图科技股份有限公司 Graph-based crank call identification model construction method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316427A (en) * 2008-04-11 2008-12-03 浙江大学 Method and system for recognizing delivery user of rubbish message through call community network
CN102547712A (en) * 2011-12-09 2012-07-04 成都市华为赛门铁克科技有限公司 Method and equipment for detecting junk incoming call
CN103052044A (en) * 2012-09-26 2013-04-17 东莞宇龙通信科技有限公司 Unknown incoming call processing method and mobile terminal
CN104219672A (en) * 2014-10-14 2014-12-17 北京奇虎科技有限公司 Incoming call or message identification method and device
CN104580385A (en) * 2014-12-16 2015-04-29 腾讯科技(深圳)有限公司 Method and device expanding user relationship chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8874076B2 (en) * 2008-02-15 2014-10-28 Alcatel Lucent Method to allow community-identity based communications using mobile phones

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316427A (en) * 2008-04-11 2008-12-03 浙江大学 Method and system for recognizing delivery user of rubbish message through call community network
CN102547712A (en) * 2011-12-09 2012-07-04 成都市华为赛门铁克科技有限公司 Method and equipment for detecting junk incoming call
CN103052044A (en) * 2012-09-26 2013-04-17 东莞宇龙通信科技有限公司 Unknown incoming call processing method and mobile terminal
CN104219672A (en) * 2014-10-14 2014-12-17 北京奇虎科技有限公司 Incoming call or message identification method and device
CN104580385A (en) * 2014-12-16 2015-04-29 腾讯科技(深圳)有限公司 Method and device expanding user relationship chain

Also Published As

Publication number Publication date
CN106888229A (en) 2017-06-23

Similar Documents

Publication Publication Date Title
US11695869B2 (en) System and method for identifying and handling unwanted callers using a call answering system
US9648163B2 (en) Generation of phone number lists and call filtering
US10116792B2 (en) Adding additional information to caller ID information
US7895154B2 (en) Communication reputation
CN107360300B (en) Crank call interception method and device
CN107770777B (en) Method for identifying recorded fraud calls
CN104883671B (en) A kind of judgment method and system of refuse messages
US11706336B2 (en) Managing spoofed calls to mobile devices
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
WO2019128930A1 (en) Operation processing method, account information processing method, device, and storage medium
CN102611746B (en) Method and system for sharing contact person information
CN105187605A (en) Telephone verification method and system
CN105376426A (en) Information management method based on address book and mobile terminal
CN107920154A (en) The processing method and terminal of Stranger Calls
CN106888229B (en) Call management method and server
CN114169438A (en) Telecommunication network fraud identification method, device, equipment and storage medium
KR100946983B1 (en) Method and apparatus for processing spam
KR101764920B1 (en) Method for determining spam phone number using spam model
CN101127777A (en) Method, device and system for processing security threat information of voice communication
US11770475B2 (en) Computerized system and method for robocall steering
CN104202462A (en) Communication control method and system
CN110166635B (en) Suspicious terminal identification method and suspicious terminal identification system
Lin et al. Potential fraudulent usage in mobile telecommunications networks
CN111405107B (en) Call control method, device, equipment and storage medium
KR20090096111A (en) Method and apparatus for processing spam

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant