CN107360300A - Harassing call hold-up interception method and device - Google Patents

Harassing call hold-up interception method and device Download PDF

Info

Publication number
CN107360300A
CN107360300A CN201710648556.5A CN201710648556A CN107360300A CN 107360300 A CN107360300 A CN 107360300A CN 201710648556 A CN201710648556 A CN 201710648556A CN 107360300 A CN107360300 A CN 107360300A
Authority
CN
China
Prior art keywords
harassing
wrecking
calling party
interception
callee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710648556.5A
Other languages
Chinese (zh)
Other versions
CN107360300B (en
Inventor
赵友军
王蓓蓓
李显洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710648556.5A priority Critical patent/CN107360300B/en
Publication of CN107360300A publication Critical patent/CN107360300A/en
Application granted granted Critical
Publication of CN107360300B publication Critical patent/CN107360300B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present invention provides a kind of harassing call hold-up interception method and device.The embodiment of the present invention is by calling mobile exchanging center MSC when receiving the call request that caller direction callee initiates,The interception attribute request sent to harassing and wrecking intercept server,Intercept server is harassed according to the caller identification information and called identification information intercepted in attribute request,Obtain the harassing and wrecking attribute data of calling party and the interception rule of callee,According to the harassing and wrecking attribute data of calling party and the interception rule of callee,Determine the interception attribute of calling party,And the interception attribute of calling party is sent to caller MSC,So that interception attributes of the caller MSC according to the calling party received,Intercept process is carried out to call request,During so as to now determine that calling party can intercept in fact,Active interception is carried out to this call request by caller MSC,Intercepted call request will not take communication network resource,Communication network resource is taken so as to reduce harassing call,Save communication network resource.

Description

Harassing call hold-up interception method and device
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of harassing call hold-up interception method and device.
Background technology
With the development and the improvement of people's living standards of mobile communication technology, mobile terminal is popularized rapidly, turns into people Essential electronic product in daily life, working and learning.
The popularization of mobile terminal also brings many worries while being offered convenience for people, especially various distributions, The harassing calls such as advertisement, fraud are becoming increasingly rampant, very disruptive daily life, in addition also trigger it is extremely severe after Fruit.In recent years, as the rapid development of mobile Internet, personal information leakage increase, the trend of precision is presented in telephone fraud, Domestic consumer has been difficult to take precautions against telecommunication fraud only by the consciousness of improving the precaution.Therefore, how to efficiently identify and intercept Harassing call turns into one urgent problem to be solved of moving communicating field.
It is currently, there are the scheme of following two main flow blocking disturbance calls:First, black, the white name for passing through mobile terminal itself Single pair harassing call is implemented to intercept;Second, by installing firewall for received calls software, such as mobile phone house keeper, mobile phone on mobile terminals Bodyguard etc., harassing call is implemented to intercept.But the hold-up interception method of existing harassing call is all to implement to harass by mobile terminal The interception of phone, harassing call still take more communication network resource, cause the waste of communication network resource.
The content of the invention
The embodiment of the present invention provides a kind of harassing call hold-up interception method and device, to solve in the prior art by mobile terminal Implement the interception of harassing call, harassing call still takes more communication network resource, causes the waste of communication network resource The problem of.
The one side of the embodiment of the present invention is to provide a kind of harassing call hold-up interception method, including:
Harassing and wrecking intercept server receives calling Row control equipment and is receiving exhaling for caller direction callee initiation The interception attribute request sent during request is, the interception attribute request includes caller identification information and called identification information;
The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;
The harassing and wrecking intercept server obtains the interception rule of the callee according to the called identification information, described Intercepting rule includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
The harassing and wrecking intercept server is regular according to the harassing and wrecking attribute data of the calling party and the interception of the callee, Determine the interception attribute of the calling party;
The interception attribute of the calling party is sent to the calling Row control and set by the harassing and wrecking intercept server It is standby, so that interception attribute of the calling Row control equipment according to the calling party received, please to the calling Seek carry out intercept process.
Second aspect of the embodiment of the present invention is to provide a kind of harassing call hold-up interception method, including:
When receiving the call request that calling party is initiated callee, calling Row control equipment intercepts to harassing and wrecking Server, which is sent, intercepts attribute request, and the interception attribute request includes caller identification information and called identification information, so that institute The interception attribute that harassing and wrecking intercept server determines the calling party according to the caller identification information and called identification information is stated, and The interception attribute of the calling party is sent to the calling Row control equipment;
The calling Row control equipment receives the interception for the calling party that the harassing and wrecking intercept server is sent Attribute;
If the interception attribute of the calling party is can intercept, the calling Row control equipment is to the call request Carry out intercept process.
3rd aspect of the embodiment of the present invention is to provide a kind of harassing call blocking apparatus, including:
First receiving module, calling party is being received for harassing intercept server reception calling Row control equipment The interception attribute request that the sends during call request initiated to callee, the interception attribute request include caller identification information and Called identification information;
Acquisition module, for the harassing and wrecking intercept server according to the caller identification information, obtain the calling party's Harass attribute data;
The acquisition module is additionally operable to the harassing and wrecking intercept server according to the called identification information, obtains described called The interception rule of side, the rule that intercepts include intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
Determining module, for the harassing and wrecking intercept server according to the harassing and wrecking attribute data of the calling party and described called The interception rule of side, determine the interception attribute of the calling party;
Sending module, the interception attribute of the calling party is sent to the caller for the harassing and wrecking intercept server and exhaled Row control equipment is, so that interception attribute of the calling Row control equipment according to the calling party received, Intercept process is carried out to the call request.
4th aspect of the embodiment of the present invention is to provide a kind of harassing call blocking apparatus, including:
Sending module, for when receiving the call request that calling party is initiated callee, calling Row control Equipment sends to harassing and wrecking intercept server and intercepts attribute request, and the interception attribute request includes caller identification information and called mark Information is known, so that the harassing and wrecking intercept server determines the calling party according to the caller identification information and called identification information Interception attribute, and the interception attribute of the calling party is sent to the calling Row control equipment;
Receiving module, received for the calling Row control equipment described in the harassing and wrecking intercept server transmission The interception attribute of calling party;
Blocking module, if the interception attribute for the calling party is to intercept, the calling Row control equipment Intercept process is carried out to the call request.
The embodiment of the present invention is receiving caller direction by calling Row control device call Row control equipment During the call request that callee initiates, to the interception attribute request of harassing and wrecking intercept server transmission, intercepting attribute request includes master It is identification information and called identification information;Intercept server is harassed according to caller identification information and called identification information, obtains master The harassing and wrecking attribute data for the side of crying and the interception rule of callee, are advised according to the interception of the harassing and wrecking attribute data of calling party and callee Then, the interception attribute of calling party is determined, and the interception attribute of calling party is sent to calling Row control equipment, so that main The interception attribute of calling party of the call flow control device according to receiving is, intercept process is carried out to call request, so as to real When now determining that calling party can intercept, active interception is carried out to this call request by calling Row control equipment, blocked The call request cut will not take communication network resource, so as to reduce occupancy of the substantial amounts of harassing call to communication network resource, Communication network resource is saved.
Brief description of the drawings
Fig. 1 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention three provides;
Fig. 4 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention four provides;
Fig. 5 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention five provides;
Fig. 6 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention six provides;
Fig. 7 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention nine provides;
Fig. 8 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention ten provides.
Embodiment
It is right below in conjunction with the accompanying drawing in the embodiment of the present invention to make technical scheme and advantage clearer Technical scheme is clearly and completely described, it is clear that and described embodiment is part of the embodiment of the present invention, Rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative labor The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
In the embodiment of the present invention, call flow control device is to be used to control setting for call flow in mobile communication process Standby, in actual applications, call flow control device is usually mobile switching centre's (MobileSwitching Center, letter Claim MSC), mobile switching centre is the core of mobile communications network, and it completes most basic function of exchange, that is, realizes mobile subscriber With the communication connection between other network users.Enter in the present embodiment so that call flow control device is mobile switching centre as an example Row explanation.
Embodiment one
Fig. 1 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention one provides.The embodiment of the present invention is for existing There is the interception for implementing harassing call in technology by mobile terminal, harassing call still takes more communication network resource, caused The problem of waste of communication network resource, there is provided harassing call hold-up interception method.As shown in figure 1, this method comprises the following steps that:
Step S101, harass intercept server reception calling mobile exchanging center MSC and receive caller direction callee The interception attribute request sent during the call request of initiation, intercepting attribute request includes caller identification information and called identification letter Breath.
Wherein, caller identification information is the user identity information for the unique mark calling party, for example, the electricity of calling party Talk about number etc.;Called identification information is the user identity information for the unique mark callee, for example, the phone number of callee Code etc..
In the prior art, it is whole by existing call flow, calling party when the call request that caller direction callee initiates End sends call request to caller MSC first, to establish the connection of calling party end and caller MSC;Caller MSC is receiving master After the call request that the side's of crying terminal is sent, position, the international mobile subscriber identity of callee are asked to called MS C Routing iinformations such as (International Mobile Subscriber Identification Number, abbreviation IMSI), with Establish caller MSC and called MS C connection.
In the embodiment of the present invention, increase harassing and wrecking intercept server, harassing and wrecking intercept server is used exclusively for carrying out harassing and wrecking blocking The server cut, harassing and wrecking intercept server are used for the interception rule for storing all users.Calling mobile exchanging center refers to this In calling procedure, mobile switching centre that calling party end is currently located at, by calling mobile exchanging center in the embodiment of the present invention It is abbreviated as caller MSC.
In embodiments of the present invention, caller MSC is when receiving the call request of caller direction callee initiation, Zan Buxiang Called MS C asks the routing iinformations such as the position of callee, IMSI, but the interception attribute sent to harassing and wrecking intercept server please Ask, intercepting attribute request includes caller identification information and called identification information, so that harassing and wrecking intercept server determines that calling party is No to intercept, after the interception attribute of the calling party of harassing and wrecking intercept server feedback, caller MSC is according to the interception category of calling party Property carry out intercept process.
Step S102, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
Wherein, the harassing and wrecking attribute data of calling party can be the harassing and wrecking type and harassing and wrecking number that calling party is labeled.
In the present embodiment, the harassing and wrecking attribute data of calling party can be stored on harassing and wrecking intercept server, can also be by disturbing Disturb the third-party server acquisition that intercept server is stored with harassing call data from other.For example, third-party server can be with It is harassing call server of Tencent mobile phone manager etc..
Step S103, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.In the present embodiment, harassing and wrecking intercept server will User identity information storage corresponding with the interception rule of user, callee can be got according to the called identification information of callee Interception rule.
For example, it is assumed that the called identification information of callee is 18503110000, user identity information is obtained Rule is intercepted corresponding to 18503110000, as shown in table 1, blocked corresponding to the user identity information 18503110000 got Cut rule includes 4 rules, corresponds respectively to different harassing and wrecking types:In harassing call, fraudulent call, ad promotions, house property It is situated between, the interception threshold value being corresponding in turn to is 20,30,20,20.
Table 1
In the present embodiment, step S102 and S103 can be carried out parallel, and the embodiment of the present invention is for harassing intercept server The harassing and wrecking attribute data for obtaining calling party and the sequencing for the interception rule for obtaining callee are not specifically limited.
In addition, in another embodiment of the present embodiment, the harassing and wrecking attribute data of calling party can also be that other can Data of the calling party to the disturbance levels of each user are represented, correspondingly, the interception rule of callee only need to be with the harassing and wrecking of calling party Attribute data is correspondingly arranged.
Step S104, it is regular according to the harassing and wrecking attribute data of calling party and the interception of callee to harass intercept server, really Determine the interception attribute of calling party.
Wherein, intercepting attribute includes to intercept and can not intercepting.
In the present embodiment, harassing and wrecking intercept server determines calling party for callee according to the harassing and wrecking attribute data of calling party For whether can intercept, namely be to determine the interception attribute of calling party;If the interception attribute of calling party is said for that can intercept The incoming call of bright calling party is the harassing and wrecking to callee, it should is intercepted;If the interception attribute of calling party is said for that can not intercept The incoming call of bright calling party is not the harassing and wrecking to callee, should not be intercepted.
Step S105, the interception attribute of calling party is sent to caller MSC by harassing and wrecking intercept server, so that caller MSC roots According to the interception attribute of the calling party received, intercept process is carried out to call request.
In the present embodiment, after harassing and wrecking intercept server determines the interception attribute of calling party, by the interception attribute of calling party It is sent to caller MSC so that caller MSC determines the interception attribute of calling party for when can intercept, the call request to this is carried out Intercept process, terminate this calling;Caller MSC determines that the interception attribute of calling party is the not calling to this when can not intercept Request carries out intercept process, continues executing with the follow-up process of this calling, and position, the IMSI etc. of callee are asked to called MS C Routing iinformation, to complete this calling procedure.
Alternatively, caller MSC carries out intercept process to call request, can realize in the following way:This is terminated to exhale Cry;Or this calling is terminated, and notify callee to intercept the call request of calling party.Exhaled for example, being sent to callee It is the information such as time, the calling party information of request interception.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call To the occupancy of communication network resource, communication network resource has been saved.
Embodiment two
Fig. 2 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention two provides.In the base of above-described embodiment one On plinth, in the present embodiment, the harassing and wrecking type of calling party is determined according to the harassing and wrecking attribute data of calling party in harassing and wrecking intercept server Before harassing and wrecking number, in addition to:If the harassing and wrecking attribute data of calling party is sky, harassing and wrecking intercept server determines calling party's Attribute is intercepted as that can not intercept.As shown in Fig. 2 this method comprises the following steps that:
Step S201, harass intercept server reception calling mobile exchanging center MSC and receive caller direction callee The interception attribute request sent during the call request of initiation.
Step S201 is identical with above-mentioned steps S101 implementation, and here is omitted.
Step S202, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
Step S202 is similar with above-mentioned steps S102 implementation, and here is omitted.
In the present embodiment, harassing and wrecking intercept server obtains the harassing and wrecking attribute data of calling party, had according to caller identification information Body can also be realized in the following way:
Intercept server is harassed according to caller identification information, is inquired from harassing and wrecking information database and caller identification information Corresponding interception attribute data, and interception attribute data corresponding with caller identification information is defined as the harassing and wrecking attribute of calling party Data.
Wherein, harassing and wrecking information database can be the database or other being stored on harassing and wrecking intercept server Third-party server.If it is other third-party server to harass information database, harassing and wrecking intercept server is according to caller Identification information, the harassing and wrecking attribute data of calling party is obtained, can also specifically be realized in the following way:
Harass intercept server and send interception attribute data request to third-party server, intercepting attribute data request includes Caller identification information, so that third-party server is according to caller identification information, the inquiry from harassing and wrecking information database obtains and caller Interception attribute data corresponding to identification information, and interception attribute data corresponding with caller identification information is sent to harassing and wrecking and intercepted Server, harassing and wrecking intercept server will receive interception attribute data corresponding with caller identification information and be defined as calling party's Harass attribute data.
In the present embodiment, intercept server is harassed before the interception rule according to called identification acquisition of information callee, The harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine calling party's Attribute is intercepted as that can not intercept, without obtaining the interception rule of callee again, improves mobile communication to a certain extent Efficiency.
Whether the harassing and wrecking attribute data for step S203, judging calling party is empty.
In the present embodiment, if the harassing and wrecking attribute data in calling party is sky, step S204 is performed, harasses intercept server The interception attribute for determining calling party is to intercept.
If the harassing and wrecking attribute data of calling party is not sky, step S205-S207 is performed, harassing and wrecking intercept server is according to master The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the interception attribute of calling party.
Step S204, harassing and wrecking intercept server determines that the interception attribute of calling party is to intercept.
If the harassing and wrecking attribute data of calling party is sky, the interception attribute of calling party can be directly determined as that can not intercept, Without obtaining the interception rule of callee again, the efficiency of mobile communication is improved to a certain extent.
Step S205, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
Step S205 is identical with above-mentioned steps S103 implementation, and here is omitted.
Step S206, it is regular according to the harassing and wrecking attribute data of calling party and the interception of callee to harass intercept server, really Determine the interception attribute of calling party.
Step S206 is identical with above-mentioned steps S104 implementation, and here is omitted.
Step S207, the interception attribute of calling party is sent to caller MSC by harassing and wrecking intercept server, so that caller MSC roots According to the interception attribute of the calling party received, intercept process is carried out to call request.
Step S207 is identical with above-mentioned steps S105 implementation, and here is omitted.
The embodiment of the present invention in harassing and wrecking intercept server according to the interception of called identification acquisition of information callee by advising Before then, the harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine to lead The interception attribute for the side of crying, without obtaining the interception rule of callee again, improves movement to a certain extent for that can not intercept The efficiency of communication.
Embodiment three
Fig. 3 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention three provides.In above-described embodiment one or On the basis of embodiment two, in the present embodiment, to harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and callee Interception rule, determine that the process of the interception attribute of calling party is described in detail.As shown in Fig. 2 harassing and wrecking interception service Device determines the interception attribute of calling party, can specifically led to according to the harassing and wrecking attribute data of calling party and the interception rule of callee Cross following steps realization:
Step S301, harass intercept server according to the harassing and wrecking attribute data of calling party determine calling party harassing and wrecking type and Harass number.
In the present embodiment, the harassing and wrecking attribute data of calling party includes harassing and wrecking type and harassing and wrecking number that calling party is labeled.
In actual use, a calling party may be labeled as different harassing and wrecking types, this reality by different callees Apply in example, if the harassing and wrecking attribute data of calling party includes the two or more harassing and wrecking type that the calling party is labeled, harassing and wrecking are blocked Cut server and harass number according to corresponding to each harassing and wrecking type, the maximum harassing and wrecking type of number will be harassed and be defined as disturbing for calling party Disturb type, and the harassing and wrecking number using the harassing and wrecking number of the maximum as calling party.In addition, in the present embodiment, interception service is harassed Device determines the harassing and wrecking type and harassing and wrecking number of calling party, can also use the harassing and wrecking of any one determination calling party in the prior art Type and harass the method for number and realize that the present embodiment is not specifically limited to this.
Step S302, harassing and wrecking intercept server judges whether the interception rule of callee is empty.
If it is determined that the interception rule of callee is not sky, then step S303-S305 is performed, harassing and wrecking intercept server is according to master The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the interception attribute of calling party.
If it is determined that the interception rule of callee is sky, then step S306-S308 is performed, according to the harassing and wrecking attribute number of calling party According to the interception attribute that calling party is determined with the default second interception threshold value.
Step S303, if it is determined that the interception rule of callee is not sky, harassing and wrecking of the intercept server according to calling party are harassed The interception rule of type and callee, it is determined that corresponding with the harassing and wrecking type of calling party first intercepts threshold value.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
In the present embodiment, intercepting rule includes more rules, defines per rule and is blocked corresponding to a kind of harassing and wrecking type Threshold value is cut, when the harassing and wrecking number of calling party, which has exceeded, intercepts threshold value corresponding to the harassing and wrecking type of calling party, then can determine to lead The incoming call for the side of crying is the harassing and wrecking to callee, should intercept the call request of calling party.
Specifically, harass intercept server and intercept threshold value corresponding to the harassing and wrecking type of lookup calling party from interception rule, Will intercept rule in calling party harassing and wrecking type corresponding to intercept threshold value be defined as the first interception threshold value.
Step S304, harassing and wrecking intercept server judges whether the harassing and wrecking number of calling party is more than the harassing and wrecking type pair of calling party First answered intercepts threshold value.
Step S305, if it is determined that the harassing and wrecking number of calling party is more than the first interception threshold corresponding to the harassing and wrecking type of calling party Value, then harass intercept server and determine that the interception attribute of calling party is to intercept.
For example, it is assumed that harassing and wrecking intercept server determines that the harassing and wrecking type of calling party is " ad promotions ", harassing and wrecking number is 32, As shown in table 2, harassing and wrecking intercept server can determine and caller for the interception rule for the callee that harassing and wrecking intercept server is got Side harassing and wrecking type " ad promotions " for first intercept threshold value be 20, it may be determined that the harassing and wrecking number 32 of calling party be more than master First intercepts threshold value 20 corresponding to the harassing and wrecking type for the side of crying, and therefore, harassing and wrecking intercept server determines that the interception attribute of calling party is It can intercept.
Table 2
Above-mentioned steps S303-S305 is that harassing and wrecking intercept server is according to master if it is determined that the interception rule of callee is not empty The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the process of the interception attribute of calling party.
Step S306, if it is determined that the interception rule of callee is sky, harassing and wrecking intercept server judges the harassing and wrecking number for the side of crying Whether the harassing and wrecking type of calling party corresponding to second interception threshold value is more than.
Wherein, the second interception threshold value corresponding to type is harassed as interception threshold corresponding with the harassing and wrecking type set in advance Value.Preferably, the second interception threshold value corresponding to any harassing and wrecking type can be directed to by harassing and wrecking intercept server according to each user is somebody's turn to do The interception threshold value that harassing and wrecking type is set is calculated, and can be used for assessing disturbance levels of the harassing and wrecking type to each user. If the harassing and wrecking number of the calling party of the harassing and wrecking type is more than the second interception threshold value corresponding to the harassing and wrecking type, then it is assumed that the calling party It is more serious to the disturbance levels of each user;If the harassing and wrecking number of the calling party of the harassing and wrecking type is less than or equal to the harassing and wrecking type Corresponding second intercepts threshold value, then it is assumed that the calling party is not serious to the disturbance levels of each user.
In addition, the second interception threshold value corresponding to harassing and wrecking type can by callee or technical staff according to be actually needed into Row is freely set;Or it can be carried out by harassing and wrecking intercept server according to each user for the interception threshold value that the harassing and wrecking type is set It is calculated, for example, the average value for the interception threshold value that harassing and wrecking intercept server can be set each user for the harassing and wrecking type Threshold value is intercepted as corresponding to the harassing and wrecking type second, the present embodiment is not specifically limited to this.
Step S307, if it is determined that the harassing and wrecking number of calling party is less than or equal to second corresponding to the harassing and wrecking type of calling party Threshold value is intercepted, then harasses intercept server and determines that the interception attribute of calling party is to intercept.
When the harassing and wrecking number of calling party is less than or equal to the second interception threshold value corresponding with the harassing and wrecking type of calling party When, then it can determine that the incoming call of calling party will not cause to harass to callee, harassing and wrecking intercept server should not be to calling party's Call request is intercepted, therefore is harassed intercept server and determined that the interception attribute of calling party is to intercept.
Step S308, if it is determined that the harassing and wrecking number of calling party is more than the first interception threshold corresponding to the harassing and wrecking type of calling party Value, then harass the interception attribute that by fraud type is determined calling party of the intercept server according to callee.
Wherein, callee by fraud type is included easily being cheated and be not easy to be cheated.
In the present embodiment, when the harassing and wrecking number of calling party is more than the second interception threshold corresponding with the harassing and wrecking type of calling party During value, then it can determine that the incoming call of calling party may cause to harass to callee, according to callee by fraud type, if by The side of crying is easily to be cheated by fraud type, it is determined that the interception attribute of calling party is to intercept;If callee by fraud class Type is to be not easy to be cheated, it is determined that the interception attribute of calling party is to intercept.
Specifically, in the step, harassing and wrecking intercept server is determined that calling party is intercepted according to callee by fraud type Attribute, it can specifically realize in the following way:
Communications records and/or user profile that intercept server obtains callee are harassed, and are remembered according to the communication of callee Record and/or user profile determine callee by fraud type;If callee is easily to be cheated by fraud type, harassing and wrecking are blocked Cut server and determine that the interception attribute of calling party is to intercept;If callee is to be not easy to be cheated by fraud type, harass Intercept server determines that the interception attribute of calling party is to intercept.
Alternatively, callee should be asked to the business operation support system of callee's operator by harassing intercept server Communications records and/or user profile.Wherein the user profile of callee comprises at least age of user.
Further, harassing and wrecking intercept server determines callee's according to the communications records and/or user profile of callee By fraud type, can specifically realize in the following way:
(1) harass intercept server according to the communications records of callee determine callee by fraud type:
Communications records of the intercept server according to callee are harassed, count time that callee communicates in preset time period Number and/or frequency and the number of users to be communicated in preset time period with callee.
If the number that callee communicates in preset time period is more than or equal to the first preset value and in preset time The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type To be not easy to be cheated.
If the frequency that callee communicates in preset time period is more than or equal to the 3rd preset value and in preset time The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type To be not easy to be cheated.
If the number of users that callee is communicated in preset time period with callee be less than the second preset value or by The frequency that the number that the side of crying communicates in preset time period is less than the first preset value and callee communicates in preset time period Less than the 3rd preset value, it is determined that callee is easily to be cheated by fraud type.
(2) harass intercept server according to the communications records and user profile of callee determine callee by fraud class Type:
Communications records of the intercept server according to callee are harassed, count time that callee communicates in preset time period Number and/or frequency and the number of users to be communicated in preset time period with callee.
If the number that callee communicates in preset time period is more than or equal to the first preset value and in preset time The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type To be not easy to be cheated.
If the frequency that callee communicates in preset time period is more than or equal to the 3rd preset value and in preset time The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type To be not easy to be cheated.
If the number of users that callee is communicated in preset time period with callee be less than the second preset value or by The frequency that the number that the side of crying communicates in preset time period is less than the first preset value and callee communicates in preset time period Less than the 3rd preset value, then according to the user profile of callee, determine callee by fraud type.Specifically, callee User profile comprises at least age of user, determines whether the age of callee belongs to default age model according to the age of callee Enclose, if the age of callee belongs to default the range of age, it is determined that callee is easily to be cheated by fraud type;It is if called The age of side is not belonging to default the range of age, it is determined that callee is to be not easy to be cheated by fraud type.
Wherein, default the range of age represents the range of age of the crowd easily cheated, can be by technical staff according to reality Border is needed and experience is set.For example, 60 more than one full year of life old men, less than 18 one full year of life minor and do not participate in work The possibility that the adult of work is cheated is larger, under normal circumstances the artificial adult not worked of 18-24 one full year of life, therefore Default the range of age can be defined as being less than for 24 one full year of life and more than 60 one full year of life.
Alternatively, harassing and wrecking intercept server is also conceivable to the time of call request generation, if for example, call request occurs Time when being the period of period before and after college entrance examination or entrant's admission, for the age 16-20 one full year of life quilt The side of crying, it is determined that callee is easily to be cheated by fraud type.Residing for the time occurred in the present embodiment for call request The division of period be not specifically limited.
It should be noted that the first preset value, the second preset value and the 3rd preset value can be by technical staff according to reality Border needs to be set, and can be adjusted according to the actual conditions of different times, and the present embodiment is for the first preset value, the Two preset values and the 3rd preset value are not specifically limited.
Above-mentioned steps S306-S308 is that harassing and wrecking intercept server is according to caller if it is determined that the interception rule of callee is empty The harassing and wrecking attribute data of side and default second interception threshold value determine the process of the interception attribute of calling party.
The embodiments of the invention provide harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and blocking for callee Cut rule determines the detailed process of the interception attribute of calling party, if the interception rule of callee is sky, according to calling party's When the second interception threshold value determines that the disturbance levels of calling party are more serious corresponding to harassing and wrecking type, harassing and wrecking intercept server is according to called The communications records and/or user profile of side determine being determined by fraud type, and according to callee by fraud type for callee The interception attribute of calling party, realize the behavior based on caller and called both sides and carry out personalized harassing and wrecking interception for callee, So as to the significantly less callee for being not provided with intercepting rule by the number harassed.
Example IV
Fig. 4 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention four provides.In any of the above-described embodiment On the basis of, in the present embodiment, harassing and wrecking intercept server receives called MS C and is receiving the refuse to answer instruction of callee or master The interception rule maintenance request sent during dynamic not answer command;Intercepting regular maintenance request includes caller identification information and called mark Know information;Intercept server is harassed according to caller identification information and called identification information, establishes or update the interception of callee Rule.As shown in figure 4, this method is further comprising the steps of:
Step S401, harass intercept server reception called MS C and receive the refuse to answer instruction of callee or master The interception rule maintenance request sent during dynamic not answer command.
Wherein, intercepting regular maintenance request includes caller identification information and called identification information.
In the present embodiment, the call request of calling party is answered or do not answered actively to callee's terminal check callee refusal When, send instruction or active not answer command to called MS C.Called MS C receive the refuse to answer instruction of callee or Person actively not answer command when, to harassing and wrecking intercept server send interception rule maintenance request so that harassing and wrecking intercept server Establish the interception rule of callee or the existing rule that intercepts of callee is updated.
In the present embodiment, the calling that calling party was answered or do not answered actively to callee's terminal check callee refusal please Ask, can be realized using any one method of the prior art, here is omitted for the present embodiment.For example, callee without During response, callee's terminal first has to judge whether callee is not answer actively, and this can pass through callee's terminal shape after ring Whether the change of state, such as screen light, front camera whether capture user's head portrait judge callee incoming call when be It is no to check incoming information to judge.If callee checked incoming information but do not answered in incoming call, it can determine that it is called Side does not answer actively, and otherwise, can determine that callee is not not answer actively.
Step S402, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
The step is identical with above-mentioned steps S202 implementation, and here is omitted.
Step S403, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
The step is identical with above-mentioned steps S205 implementation, and here is omitted.
Whether the interception rule for step S404, judging callee is empty.
If step S405, the interception rule of callee is sky, harassing and wrecking attribute of the intercept server according to calling party is harassed Data establish the interception rule of callee.
Specifically, if the interception rule of callee is sky, harassing and wrecking attribute number of the intercept server according to calling party is harassed According to, determine calling party harassing and wrecking type and harassing and wrecking number;The interception rule of callee is established, the newly-built interception rule includes One rule, the harassing and wrecking type of this rule are the harassing and wrecking type of calling party, are blocked corresponding to the harassing and wrecking type of this rule Cut the harassing and wrecking number that threshold value is calling party.
For example, it is assumed that harassing and wrecking intercept server determines the harassing and wrecking type of calling party for " house property medium ", corresponding harassing and wrecking time Number is 18 times, if then the interception rule of callee is sky, harassing and wrecking intercept server establishes the interception rule of callee such as the institute of table 3 Show:
Table 3
User identity information Sequence number Harass type Intercept threshold value
18503110001 1 House property medium 18
If step S406, the interception rule of callee is not sky, harassing and wrecking intercept server obtains according to called identification information Take the communications records and/or user profile of callee.
In the present embodiment, harassing and wrecking intercept server should ask quilt to the business operation support system of callee's operator The communications records and/or user profile for the side of crying.Wherein the user profile of callee comprises at least age of user.
Step S407, intercept server is harassed according to the communications records and/or user profile of callee, determines callee's By fraud type.
Wherein, included easily being cheated and be not easy to be cheated by fraud type.
Intercept server is harassed in the step according to the communications records and/or user profile of callee, determines callee's By the specific implementation of fraud type, it can use in upper step S308 and harass intercept server according to the communication of callee note Record and/or user profile determine any one in two kinds of implementations by fraud type of callee, and the present embodiment is herein Repeat no more.
Step S408, harass intercept server according to calling party harassing and wrecking attribute data and callee by fraud class Type, update the interception rule of callee.
In the present embodiment, the step can specifically be realized in the following way:
Harassing and wrecking attribute data of the intercept server according to calling party is harassed, determines harassing and wrecking type and the harassing and wrecking time of calling party Number;Determine that rule corresponding with the harassing and wrecking type of calling party is rule to be modified and its interception threshold in the interception rule of callee Value.If callee is easily to be cheated by fraud type, by regular interception threshold value to be modified and the harassing and wrecking number of calling party In the minimum value interception threshold value new as the rule to be modified, treat alteration ruler and be updated.If callee's is cheated Type then treats the average value in the harassing and wrecking number of regular interception threshold value to be modified and calling party as this to be not easy to be cheated The new interception threshold value of alteration ruler, treats alteration ruler and is updated;Or do not treat alteration ruler and be updated.
For example, it is assumed that harassing and wrecking intercept server determines the harassing and wrecking type of calling party for " house property medium ", corresponding harassing and wrecking time Number is 18 times, and the interception rule of callee is as shown in table 4,
Table 4
Then harassing and wrecking intercept server can determine that rule to be modified corresponding with " house property medium " is serial number 4 in table 4 Rule, if callee, less than 18 one full year of life, can determine callee is easily to be cheated by fraud type, it may be determined that to be modified The interception threshold value 20 of rule is 18 with the minimum value in the harassing and wrecking number 18 of calling party, then the minimum value 18 is to be modified as this The new interception threshold value of rule, treats alteration ruler and is updated, and the interception rule of the callee after renewal is as shown in table 5.
Table 5
Above-mentioned steps S402-S408 be harassing and wrecking intercept server established according to caller identification information and called identification information or Person updates the process of the interception rule of callee.
The embodiment of the present invention is receiving the refuse to answer instruction of callee by harassing intercept server reception called MS C Or actively not answer command when the interception rule maintenance request that sends;If the interception rule of callee is sky, according to caller The harassing and wrecking attribute data of side establishes the interception rule of callee;If the interception rule of callee is not sky, according to calling party's Harass attribute data and callee by fraud type, update the interception rule of callee, so as to more personalized For callee intercept the foundation and renewal of rule.
Embodiment five
Fig. 5 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention five provides.The embodiment of the present invention is for existing There is the interception for implementing harassing call in technology by mobile terminal, harassing call still takes more communication network resource, caused The problem of waste of communication network resource, there is provided harassing call hold-up interception method.As shown in figure 5, this method comprises the following steps that:
Step S501, when receiving the call request that calling party is initiated callee, calling mobile exchanging center MSC to Harass intercept server and intercept attribute request, intercepting attribute request includes caller identification information and called identification information, so as to disturb Disturb the interception attribute that intercept server determines calling party according to caller identification information and called identification information, and blocking calling party Cut attribute and be sent to caller MSC.
Wherein, caller identification information is the user identity information for the unique mark calling party, for example, the electricity of calling party Talk about number etc.;Called identification information is the user identity information for the unique mark callee, for example, the phone number of callee Code etc..
In the prior art, it is whole by existing call flow, calling party when the call request that caller direction callee initiates End sends call request to caller MSC first, to establish the connection of calling party end and caller MSC;Caller MSC is receiving master After the call request that the side's of crying terminal is sent, position, the international mobile subscriber identity of callee are asked to called MS C Routing iinformations such as (International Mobile Subscriber Identification Number, abbreviation IMSI), with Establish caller MSC and called MS C connection.
In the embodiment of the present invention, increase harassing and wrecking intercept server, harassing and wrecking intercept server is used exclusively for carrying out harassing and wrecking blocking The server cut, harassing and wrecking intercept server are used for the interception rule for storing all users.Calling mobile exchanging center refers to this In calling procedure, mobile switching centre that calling party end is currently located at, by calling mobile exchanging center in the embodiment of the present invention It is abbreviated as caller MSC.
In embodiments of the present invention, caller MSC is when receiving the call request of caller direction callee initiation, Zan Buxiang Called MS C asks the routing iinformations such as the position of callee, IMSI, but the interception attribute sent to harassing and wrecking intercept server please Ask, intercepting attribute request includes caller identification information and called identification information, so that harassing and wrecking intercept server determines that calling party is No to intercept, after the interception attribute of the calling party of harassing and wrecking intercept server feedback, caller MSC is according to the interception category of calling party Property carry out intercept process.
Step S502, caller MSC receives the interception attribute for the calling party that harassing and wrecking intercept server is sent.
In the present embodiment, after harassing and wrecking intercept server determines the interception attribute of calling party, by the interception attribute of calling party Caller MSC is sent to, caller MSC receives the interception attribute for the calling party that harassing and wrecking intercept server is sent, with according to calling party's Intercept attribute and carry out intercept process.
If step S503, the interception attribute of calling party is can intercept, caller MSC carries out intercept process to call request.
In the present embodiment, caller MSC determines the interception attribute of calling party for when can intercept, the call request to this is carried out Intercept process, terminate this calling;Caller MSC determines that the interception attribute of calling party is the not calling to this when can not intercept Request carries out intercept process, continues executing with the follow-up process of this calling, and position, the IMSI etc. of callee are asked to called MS C Routing iinformation, to complete this calling procedure.
Alternatively, caller MSC carries out intercept process to call request, can realize in the following way:This is terminated to exhale Cry;Or this calling is terminated, and notify callee to intercept the call request of calling party.Exhaled for example, being sent to callee It is the information such as time, the calling party information of request interception.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call To the occupancy of communication network resource, communication network resource has been saved.
Embodiment six
Fig. 6 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention six provides.The embodiment of the present invention carries The harassing call blocking apparatus of confession can perform the handling process that the embodiment of harassing call hold-up interception method provides, as shown in fig. 6, The device 60 includes:First receiving module 601, acquisition module 602, determining module 603 and sending module 604.
Specifically, the first receiving module 601 is receiving for harassing intercept server reception calling mobile exchanging center MSC The interception attribute request that the sends during call request initiated to caller direction callee, intercepting attribute request includes calling identification letter Breath and called identification information.
Acquisition module 602 is used to harass intercept server according to caller identification information, obtains the harassing and wrecking attribute number of calling party According to.
Acquisition module 602 is additionally operable to harass intercept server according to called identification information, obtains the interception rule of callee, Intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
Determining module 603 is used to harass intercept server according to the harassing and wrecking attribute data of calling party and the interception rule of callee Then, the interception attribute of calling party is determined;
The interception attribute of calling party is sent to caller MSC by sending module 604 for harassing intercept server, so that caller MSC carries out intercept process according to the interception attribute of the calling party received to call request.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment one is provided, Here is omitted for concrete function.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call To the occupancy of communication network resource, communication network resource has been saved.
Embodiment seven
On the basis of above-described embodiment six, in the present embodiment, determining module includes:6th determination sub-module, if for The harassing and wrecking attribute data of calling party is sky, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
Optionally, the first acquisition module is additionally operable to:
Intercept server is harassed according to caller identification information, is inquired from harassing and wrecking information database and caller identification information Corresponding interception attribute data, and interception attribute data corresponding with caller identification information is defined as the harassing and wrecking attribute of calling party Data.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment two is provided, Here is omitted for concrete function.
The embodiment of the present invention in harassing and wrecking intercept server according to the interception of called identification acquisition of information callee by advising Before then, the harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine to lead The interception attribute for the side of crying, without obtaining the interception rule of callee again, improves movement to a certain extent for that can not intercept The efficiency of communication.
Embodiment eight
On the basis of above-described embodiment six or embodiment seven, in the present embodiment, as shown in figure 8, determining module includes:The One determination sub-module, the first judging submodule, the second determination sub-module, the second judging submodule, the 3rd determination sub-module, the 3rd Judging submodule, the 4th determination sub-module and the 5th determination sub-module.
Specifically, the first determination sub-module is used to harass intercept server according to the harassing and wrecking attribute data of calling party determination master The harassing and wrecking type and harassing and wrecking number for the side of crying.
First judging submodule judges whether the interception rule of callee is empty for harassing intercept server.
Second determination sub-module is used for if it is determined that the interception rule of callee is not sky, and harassing and wrecking intercept server is according to caller The harassing and wrecking type of side and the interception rule of callee, it is determined that corresponding with the harassing and wrecking type of calling party first intercepts threshold value.
Second judging submodule judges whether the harassing and wrecking number of calling party is more than calling party's for harassing intercept server Harass the first interception threshold value corresponding to type.
3rd determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is more than the corresponding to the harassing and wrecking type of calling party One intercepts threshold value, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
For 3rd judging submodule if it is determined that the interception rule of callee is sky, harassing and wrecking intercept server judges the harassing and wrecking for the side of crying Whether number is more than the second interception threshold value corresponding to the harassing and wrecking type of calling party.
4th determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is less than or equal to the harassing and wrecking type of calling party Corresponding second intercepts threshold value, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
5th determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is more than the corresponding to the harassing and wrecking type of calling party One intercepts threshold value, then harasses the interception attribute that by fraud type is determined calling party of the intercept server according to callee.
5th determination sub-module is additionally operable to:Communications records and/or user profile that intercept server obtains callee are harassed, And according to the communications records and/or user profile of callee determine callee by fraud type, by fraud type include easily by Cheat and be not easy to be cheated;If callee is easily to be cheated by fraud type, harassing and wrecking intercept server determines calling party's Attribute is intercepted as that can intercept;If callee is to be not easy to be cheated by fraud type, harassing and wrecking intercept server determines calling party Interception attribute can not to intercept.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment three is provided, Here is omitted for concrete function.
The embodiments of the invention provide harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and blocking for callee Cut rule determines the detailed process of the interception attribute of calling party, if the interception rule of callee is sky, according to calling party's When the second interception threshold value determines that the disturbance levels of calling party are more serious corresponding to harassing and wrecking type, harassing and wrecking intercept server is according to called The communications records and/or user profile of side determine being determined by fraud type, and according to callee by fraud type for callee The interception attribute of calling party, realize the behavior based on caller and called both sides and carry out personalized harassing and wrecking interception for callee, So as to the significantly less callee for being not provided with intercepting rule by the number harassed.
Embodiment nine
Fig. 7 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention nine provides.In any of the above-described device On the basis of embodiment, in the present embodiment, as shown in fig. 7, the device 60 also includes:Second receiving module 605 and rule are safeguarded Module 606.
Second receiving module 605 is answered for harassing intercept server reception called MS C in the refusal for receiving callee Instruction or actively not answer command when the interception rule maintenance request that sends;Regular maintenance request is intercepted including calling identification to believe Breath and called identification information.
Regular maintenance module 606 is used to harass intercept server according to caller identification information and called identification information, establishes Or the interception rule of renewal callee.
In the present embodiment, regular maintenance module includes:First acquisition submodule, the second acquisition submodule, rule establish son Module, the 3rd acquisition submodule, the 7th determination sub-module and Policy Updates submodule.
Specifically, the first acquisition submodule, for harassing intercept server according to caller identification information, obtain calling party's Harass attribute data.
Second acquisition submodule, for harassing intercept server according to called identification information, the interception for obtaining callee is advised Then.
Regular setting up submodule, if the interception rule for callee is sky, harassing and wrecking intercept server is according to calling party Harassing and wrecking attribute data establish callee interception rule.
3rd acquisition submodule, if the interception rule for callee is not sky, harassing and wrecking intercept server is according to called Identification information, obtain the communications records and/or user profile of callee.
7th determination sub-module, for harassing communications records and/or user profile of the intercept server according to callee, really Determine callee by fraud type, included easily being cheated and be not easy to be cheated by fraud type.
Policy Updates submodule, for harassing intercept server according to the harassing and wrecking attribute data of calling party and callee By fraud type, the interception for updating callee is regular.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment four is provided, Here is omitted for concrete function.
The embodiment of the present invention is receiving the refuse to answer instruction of callee by harassing intercept server reception called MS C Or actively not answer command when the interception rule maintenance request that sends;If the interception rule of callee is sky, according to caller The harassing and wrecking attribute data of side establishes the interception rule of callee;If the interception rule of callee is not sky, according to calling party's Harass attribute data and callee by fraud type, update the interception rule of callee, so as to more personalized For callee intercept the foundation and renewal of rule.
Embodiment ten
Fig. 8 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention ten provides.The embodiment of the present invention carries The harassing call blocking apparatus of confession can perform the handling process that the embodiment of harassing call hold-up interception method provides, as shown in figure 8, The device 70 includes:Sending module 701, receiving module 702 and blocking module 703.
Specifically, sending module 701 is used for when receiving the call request that calling party is initiated callee, caller movement Switching centre MSC to harassing and wrecking intercept server send intercept attribute request, intercept attribute request include caller identification information and by Identification information is, so that harassing and wrecking intercept server determines the interception category of calling party according to caller identification information and called identification information Property, and the interception attribute of calling party is sent to caller MSC.
Receiving module 702 is used for the interception attribute that caller MSC receives the calling party that harassing and wrecking intercept server is sent.Intercept mould If block 703 is used for the interception attribute of calling party for that can intercept, caller MSC carries out intercept process to call request.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment five is provided, Here is omitted for concrete function.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call To the occupancy of communication network resource, communication network resource has been saved.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or unit Letter connection, can be electrical, mechanical or other forms.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can be complete by different functional modules by above-mentioned function distribution as needed Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (16)

  1. A kind of 1. harassing call hold-up interception method, it is characterised in that including:
    Harassing and wrecking intercept server receives calling Row control equipment please in the calling for receiving caller direction callee initiation The interception attribute request sent when asking, the interception attribute request include caller identification information and called identification information;
    The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;
    The harassing and wrecking intercept server obtains the interception rule of the callee, the interception according to the called identification information Rule includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
    The harassing and wrecking intercept server is regular according to the harassing and wrecking attribute data of the calling party and the interception of the callee, it is determined that The interception attribute of the calling party;
    The interception attribute of the calling party is sent to the calling Row control equipment by the harassing and wrecking intercept server, with Make interception attribute of the calling Row control equipment according to the calling party received, the call request is carried out Intercept process.
  2. 2. according to the method for claim 1, it is characterised in that harassing and wrecking intercept server the disturbing according to the calling party Attribute data and the interception rule of the callee are disturbed, determines the interception attribute of the calling party, including:
    The harassing and wrecking intercept server judges whether the harassing and wrecking attribute data of calling party is empty;
    If the harassing and wrecking attribute data of the calling party is sky, the harassing and wrecking intercept server determines the interception category of the calling party Property can not to intercept;
    If the harassing and wrecking attribute data of the calling party is not sky, the harassing and wrecking for harassing intercept server according to the calling party Attribute data determines the harassing and wrecking type and harassing and wrecking number of the calling party;
    The harassing and wrecking intercept server judges whether the interception rule of the callee is empty;
    If it is determined that the interception rule of the callee is not sky, it is described to harass harassing and wrecking class of the intercept server according to the calling party The interception rule of type and the callee, it is determined that corresponding with the harassing and wrecking type of the calling party first intercepts threshold value;
    The harassing and wrecking intercept server judges whether the harassing and wrecking number of the calling party is more than the harassing and wrecking type pair of the calling party First answered intercepts threshold value;
    If it is determined that the harassing and wrecking number of the calling party, which is more than corresponding to the harassing and wrecking type of the calling party first, intercepts threshold value, then institute State harassing and wrecking intercept server and determine that the interception attribute of the calling party is to intercept.
  3. 3. according to the method for claim 2, it is characterised in that the harassing and wrecking intercept server judges blocking for the callee After whether cut rule is sky, in addition to:
    If it is determined that the interception rule of the callee is sky, the harassing and wrecking intercept server judges that the harassing and wrecking number of the side of crying is Second intercepts threshold value corresponding to the no harassing and wrecking type more than the calling party;
    If it is determined that the harassing and wrecking number of the calling party is less than or equal to the second interception corresponding to the harassing and wrecking type of the calling party Threshold value, then the harassing and wrecking intercept server determine the interception attribute of the calling party as that can not intercept;
    If it is determined that the harassing and wrecking number of the calling party, which is more than corresponding to the harassing and wrecking type of the calling party first, intercepts threshold value, then institute State the interception attribute that by fraud type is determined the calling party of the harassing and wrecking intercept server according to the callee.
  4. 4. according to the method for claim 3, it is characterised in that it is described harassing and wrecking intercept server according to the callee by Fraud type determines the interception attribute of the calling party, including:
    The harassing and wrecking intercept server obtains the communications records and/or user profile of the callee, and according to the callee Communications records and/or user profile determine the callee by fraud type, it is described to be included easily being cheated by fraud type Be not easy to be cheated;
    If the callee is easily to be cheated by fraud type, the harassing and wrecking intercept server determines blocking for the calling party Attribute is cut as that can intercept;
    If the callee is to be not easy to be cheated by fraud type, the harassing and wrecking intercept server determines the calling party's Attribute is intercepted as that can not intercept.
  5. 5. according to the method described in claim any one of 1-4, it is characterised in that the harassing and wrecking intercept server is according to the master Identification information is, obtains the harassing and wrecking attribute data of the calling party, including:
    The harassing and wrecking intercept server inquires and the caller according to the caller identification information from harassing and wrecking information database Interception attribute data corresponding to identification information, and the interception attribute data corresponding with the caller identification information is defined as The harassing and wrecking attribute data of the calling party.
  6. 6. according to the method described in claim any one of 1-4, it is characterised in that also include:
    The harassing and wrecking intercept server receives called call flow control device and answers finger in the refusal for receiving the callee Order or actively not answer command when the interception rule maintenance request that sends;The regular maintenance request of interception includes the caller Identification information and the called identification information;
    The harassing and wrecking intercept server according to the caller identification information and the called identification information, establish or renewal described in The interception rule of callee.
  7. 7. according to the method for claim 6, it is characterised in that the harassing and wrecking intercept server is believed according to the calling identification Breath and the called identification information, the interception rule of the callee is established or updates, including:
    The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;
    For the harassing and wrecking intercept server according to the called identification information, the interception for obtaining the callee is regular;
    It is described to harass harassing and wrecking attribute number of the intercept server according to the calling party if the interception rule of the callee is sky According to the interception rule for establishing the callee;
    If the interception rule of the callee is not sky, the harassing and wrecking intercept server obtains according to the called identification information Take the communications records and/or user profile of the callee;
    The harassing and wrecking intercept server determines the callee's according to the communications records and/or user profile of the callee It is described to be included easily being cheated and be not easy to be cheated by fraud type by fraud type;
    It is described harassing and wrecking intercept server according to the calling party harassing and wrecking attribute data and callee by fraud type, renewal The interception rule of the callee.
  8. A kind of 8. harassing call hold-up interception method, it is characterised in that including:
    When receiving the call request that calling party is initiated callee, calling Row control equipment to harassing and wrecking interception service Device, which is sent, intercepts attribute request, and the interception attribute request includes caller identification information and called identification information, so that described disturb Disturb the interception attribute that intercept server determines the calling party according to the caller identification information and called identification information, and by institute The interception attribute for stating calling party is sent to the calling Row control equipment;
    The calling Row control equipment receives the interception attribute for the calling party that the harassing and wrecking intercept server is sent;
    If the interception attribute of the calling party is can intercept, the calling Row control equipment is carried out to the call request Intercept process.
  9. A kind of 9. harassing call blocking apparatus, it is characterised in that including:
    First receiving module, caller direction quilt is being received for harassing intercept server reception calling Row control equipment The interception attribute request sent during the call request that the side of crying initiates, the interception attribute request include caller identification information and are called Identification information;
    Acquisition module, for the harassing and wrecking intercept server according to the caller identification information, obtain the harassing and wrecking of the calling party Attribute data;
    The acquisition module is additionally operable to the harassing and wrecking intercept server according to the called identification information, obtains the callee's Rule is intercepted, the rule that intercepts includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
    Determining module, for the harassing and wrecking intercept server according to the harassing and wrecking attribute data of the calling party and the callee Rule is intercepted, determines the interception attribute of the calling party;
    Sending module, the interception attribute of the calling party is sent to the calling stream for the harassing and wrecking intercept server Program control control equipment, so that interception attribute of the calling Row control equipment according to the calling party received, to institute State call request and carry out intercept process.
  10. 10. device according to claim 9, it is characterised in that the determining module includes:
    6th determination sub-module, whether the harassing and wrecking attribute data that calling party is judged for the harassing and wrecking intercept server is empty;If The harassing and wrecking attribute data of the calling party is sky, then the harassing and wrecking intercept server determines the interception attribute of the calling party for not It can intercept;
    First determination sub-module, if the harassing and wrecking attribute data for the calling party is not sky, the harassing and wrecking intercept server The harassing and wrecking type and harassing and wrecking number of the calling party is determined according to the harassing and wrecking attribute data of the calling party;
    First judging submodule, whether the interception rule that the callee is judged for the harassing and wrecking intercept server is empty;
    Second determination sub-module, for if it is determined that the callee interception rule for sky, it is described harassing and wrecking intercept server root According to the harassing and wrecking type of the calling party and the interception rule of the callee, it is determined that corresponding with the harassing and wrecking type of the calling party First intercepts threshold value;
    Second judging submodule, it is described to judge whether the harassing and wrecking number of the calling party is more than for the harassing and wrecking intercept server First intercepts threshold value corresponding to the harassing and wrecking type of calling party;
    3rd determination sub-module, for if it is determined that the harassing and wrecking type that the harassing and wrecking number of the calling party is more than the calling party corresponds to First intercept threshold value, then the harassing and wrecking intercept server determines the interception attribute of the calling party as that can intercept.
  11. 11. device according to claim 10, it is characterised in that the determining module also includes:
    3rd judging submodule, for if it is determined that the interception rule of the callee is sky, the harassing and wrecking intercept server to judge Whether the harassing and wrecking number of the side of crying is more than the second interception threshold value corresponding to the harassing and wrecking type of the calling party;
    4th determination sub-module, for if it is determined that the harassing and wrecking number of the calling party is less than or equal to the harassing and wrecking of the calling party Second intercepts threshold value corresponding to type, then the harassing and wrecking intercept server determines that the interception attribute of the calling party is to block Cut;
    5th determination sub-module, for if it is determined that the harassing and wrecking type that the harassing and wrecking number of the calling party is more than the calling party corresponds to First intercept threshold value, then it is described harassing and wrecking intercept server according to the callee by fraud type determine the calling party's Intercept attribute.
  12. 12. device according to claim 11, it is characterised in that the 5th determination sub-module is additionally operable to:
    The harassing and wrecking intercept server obtains the communications records and/or user profile of the callee, and according to the callee Communications records and/or user profile determine the callee by fraud type, it is described to be included easily being cheated by fraud type Be not easy to be cheated;
    If the callee is easily to be cheated by fraud type, the harassing and wrecking intercept server determines blocking for the calling party Attribute is cut as that can intercept;
    If the callee is to be not easy to be cheated by fraud type, the harassing and wrecking intercept server determines the calling party's Attribute is intercepted as that can not intercept.
  13. 13. according to the device described in claim any one of 9-12, it is characterised in that the acquisition module is additionally operable to:
    The harassing and wrecking intercept server inquires and the caller according to the caller identification information from harassing and wrecking information database Interception attribute data corresponding to identification information, and the interception attribute data corresponding with the caller identification information is defined as The harassing and wrecking attribute data of the calling party.
  14. 14. according to the device described in claim any one of 9-12, it is characterised in that also include:
    Second receiving module, receive called call flow control device for the harassing and wrecking intercept server and receiving the quilt The refuse to answer instruction of the side of crying or actively not answer command when the interception rule maintenance request that sends;The rule that intercepts is safeguarded Request includes the caller identification information and the called identification information;
    Regular maintenance module, believed for the harassing and wrecking intercept server according to the caller identification information and the called identification Breath, establish or update the interception rule of the callee.
  15. 15. device according to claim 14, it is characterised in that the regular maintenance module includes:
    First acquisition submodule, for the harassing and wrecking intercept server according to the caller identification information, obtain the calling party Harassing and wrecking attribute data;
    Second acquisition submodule, for the harassing and wrecking intercept server according to the called identification information, obtain the callee Interception rule;
    Regular setting up submodule, if the interception rule for the callee is sky, the harassing and wrecking intercept server is according to institute The harassing and wrecking attribute data for stating calling party establishes the interception rule of the callee;
    3rd acquisition submodule, if interception rule for the callee is not sky, the harassing and wrecking intercept server according to The called identification information, obtain the communications records and/or user profile of the callee;
    7th determination sub-module, believed for the harassing and wrecking intercept server according to the communications records of the callee and/or user Breath, determine the callee by fraud type, it is described to be included easily being cheated and be not easy to be cheated by fraud type;
    Policy Updates submodule, according to the harassing and wrecking attribute data of the calling party and it is called for the harassing and wrecking intercept server Side by fraud type, update the callee interception rule.
  16. A kind of 16. harassing call blocking apparatus, it is characterised in that including:
    Sending module, for when receiving the call request that calling party is initiated callee, calling Row control equipment Sent to harassing and wrecking intercept server and intercept attribute request, the interception attribute request includes caller identification information and called identification is believed Breath, so that the harassing and wrecking intercept server determines blocking for the calling party according to the caller identification information and called identification information Attribute is cut, and the interception attribute of the calling party is sent to the calling Row control equipment;
    Receiving module, the caller of the harassing and wrecking intercept server transmission is received for the calling Row control equipment The interception attribute of side;
    Blocking module, if the interception attribute for the calling party is can intercept, the calling Row control equipment is to institute State call request and carry out intercept process.
CN201710648556.5A 2017-08-01 2017-08-01 Crank call interception method and device Active CN107360300B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710648556.5A CN107360300B (en) 2017-08-01 2017-08-01 Crank call interception method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710648556.5A CN107360300B (en) 2017-08-01 2017-08-01 Crank call interception method and device

Publications (2)

Publication Number Publication Date
CN107360300A true CN107360300A (en) 2017-11-17
CN107360300B CN107360300B (en) 2020-03-13

Family

ID=60287282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710648556.5A Active CN107360300B (en) 2017-08-01 2017-08-01 Crank call interception method and device

Country Status (1)

Country Link
CN (1) CN107360300B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108153727A (en) * 2017-12-18 2018-06-12 浙江鹏信信息科技股份有限公司 Utilize the method for semantic mining algorithm mark sales calls and the system of improvement sales calls
CN109068014A (en) * 2018-08-21 2018-12-21 平安科技(深圳)有限公司 Call limitation method, device, electronic equipment and computer readable storage medium
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system
CN109451183A (en) * 2018-12-25 2019-03-08 吴吉梅 A method of preventing unwelcome phone
CN109886012A (en) * 2019-01-03 2019-06-14 腾讯科技(深圳)有限公司 A kind of management method and system of application permission
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN113163056A (en) * 2021-04-19 2021-07-23 深圳市安全守护科技有限公司 Telephone interception method, device, equipment and computer readable storage medium
CN113766069A (en) * 2021-09-06 2021-12-07 中国银行股份有限公司 Crank call interception method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601783A (en) * 2015-01-27 2015-05-06 深圳市中兴移动通信有限公司 Communication processing method based on subjective judgment, mobile terminal and system
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601783A (en) * 2015-01-27 2015-05-06 深圳市中兴移动通信有限公司 Communication processing method based on subjective judgment, mobile terminal and system
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108153727A (en) * 2017-12-18 2018-06-12 浙江鹏信信息科技股份有限公司 Utilize the method for semantic mining algorithm mark sales calls and the system of improvement sales calls
CN109068014A (en) * 2018-08-21 2018-12-21 平安科技(深圳)有限公司 Call limitation method, device, electronic equipment and computer readable storage medium
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system
CN109451183A (en) * 2018-12-25 2019-03-08 吴吉梅 A method of preventing unwelcome phone
CN109451183B (en) * 2018-12-25 2021-01-22 吴吉梅 Method for preventing unwelcome telephone
CN109886012A (en) * 2019-01-03 2019-06-14 腾讯科技(深圳)有限公司 A kind of management method and system of application permission
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN113163056A (en) * 2021-04-19 2021-07-23 深圳市安全守护科技有限公司 Telephone interception method, device, equipment and computer readable storage medium
CN113766069A (en) * 2021-09-06 2021-12-07 中国银行股份有限公司 Crank call interception method and device
CN113766069B (en) * 2021-09-06 2023-08-18 中国银行股份有限公司 Harassment call interception method and device

Also Published As

Publication number Publication date
CN107360300B (en) 2020-03-13

Similar Documents

Publication Publication Date Title
CN107360300A (en) Harassing call hold-up interception method and device
CN105915517A (en) Realization method for voice verification code service
CN110248029A (en) A kind of method of dynamic select communication line in call
CN106936997B (en) A kind of rubbish voice recognition methods and system based on social networks map
CN105187606A (en) Method for preventing crank calls based on identity authentication
CN104636439A (en) Method and device for analyzing user social relation
CN104822139B (en) A method of communicating number isolation and secret protection are realized based on intermediate number
CN106657547A (en) Method and system for preventing crank calls
CN106034185A (en) Method for responding to calling request and electronic equipment
CN108810290B (en) Method and system for recognizing fraud calls
CN109451183A (en) A method of preventing unwelcome phone
CN107295491A (en) The method and system of automatic screening calling subscribe during call forwarding
CN109962893A (en) A kind of intelligent call method and its relevant device
CN107708073A (en) The method for retrieving and its retrieving system of mobile phone
CN107135186A (en) A kind of method and device of preventing telephone from dialing without admission
CN109995707A (en) A kind of high definition voice is anti-harassment and DDOS attack method and device
CN110995937B (en) Method and device for identifying harassed user
CN109151828A (en) Support recognition methods, device, equipment and the storage medium of card user
CN101083842A (en) Incoming call filtering method and method, equipment and system for setting incoming identification
CN104184871B (en) A kind of method and apparatus prompting harassing call number
CN109639913A (en) A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN108966161A (en) Call waiting method and system
CN106162586A (en) Method for limiting incoming call, device and system
CN106791232A (en) The means of communication of identity-based certification
CN107708103A (en) The method and system of number secrecy are realized based on MAP signalings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant