CN107360300A - Harassing call hold-up interception method and device - Google Patents
Harassing call hold-up interception method and device Download PDFInfo
- Publication number
- CN107360300A CN107360300A CN201710648556.5A CN201710648556A CN107360300A CN 107360300 A CN107360300 A CN 107360300A CN 201710648556 A CN201710648556 A CN 201710648556A CN 107360300 A CN107360300 A CN 107360300A
- Authority
- CN
- China
- Prior art keywords
- harassing
- wrecking
- calling party
- interception
- callee
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present invention provides a kind of harassing call hold-up interception method and device.The embodiment of the present invention is by calling mobile exchanging center MSC when receiving the call request that caller direction callee initiates,The interception attribute request sent to harassing and wrecking intercept server,Intercept server is harassed according to the caller identification information and called identification information intercepted in attribute request,Obtain the harassing and wrecking attribute data of calling party and the interception rule of callee,According to the harassing and wrecking attribute data of calling party and the interception rule of callee,Determine the interception attribute of calling party,And the interception attribute of calling party is sent to caller MSC,So that interception attributes of the caller MSC according to the calling party received,Intercept process is carried out to call request,During so as to now determine that calling party can intercept in fact,Active interception is carried out to this call request by caller MSC,Intercepted call request will not take communication network resource,Communication network resource is taken so as to reduce harassing call,Save communication network resource.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of harassing call hold-up interception method and device.
Background technology
With the development and the improvement of people's living standards of mobile communication technology, mobile terminal is popularized rapidly, turns into people
Essential electronic product in daily life, working and learning.
The popularization of mobile terminal also brings many worries while being offered convenience for people, especially various distributions,
The harassing calls such as advertisement, fraud are becoming increasingly rampant, very disruptive daily life, in addition also trigger it is extremely severe after
Fruit.In recent years, as the rapid development of mobile Internet, personal information leakage increase, the trend of precision is presented in telephone fraud,
Domestic consumer has been difficult to take precautions against telecommunication fraud only by the consciousness of improving the precaution.Therefore, how to efficiently identify and intercept
Harassing call turns into one urgent problem to be solved of moving communicating field.
It is currently, there are the scheme of following two main flow blocking disturbance calls:First, black, the white name for passing through mobile terminal itself
Single pair harassing call is implemented to intercept;Second, by installing firewall for received calls software, such as mobile phone house keeper, mobile phone on mobile terminals
Bodyguard etc., harassing call is implemented to intercept.But the hold-up interception method of existing harassing call is all to implement to harass by mobile terminal
The interception of phone, harassing call still take more communication network resource, cause the waste of communication network resource.
The content of the invention
The embodiment of the present invention provides a kind of harassing call hold-up interception method and device, to solve in the prior art by mobile terminal
Implement the interception of harassing call, harassing call still takes more communication network resource, causes the waste of communication network resource
The problem of.
The one side of the embodiment of the present invention is to provide a kind of harassing call hold-up interception method, including:
Harassing and wrecking intercept server receives calling Row control equipment and is receiving exhaling for caller direction callee initiation
The interception attribute request sent during request is, the interception attribute request includes caller identification information and called identification information;
The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;
The harassing and wrecking intercept server obtains the interception rule of the callee according to the called identification information, described
Intercepting rule includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
The harassing and wrecking intercept server is regular according to the harassing and wrecking attribute data of the calling party and the interception of the callee,
Determine the interception attribute of the calling party;
The interception attribute of the calling party is sent to the calling Row control and set by the harassing and wrecking intercept server
It is standby, so that interception attribute of the calling Row control equipment according to the calling party received, please to the calling
Seek carry out intercept process.
Second aspect of the embodiment of the present invention is to provide a kind of harassing call hold-up interception method, including:
When receiving the call request that calling party is initiated callee, calling Row control equipment intercepts to harassing and wrecking
Server, which is sent, intercepts attribute request, and the interception attribute request includes caller identification information and called identification information, so that institute
The interception attribute that harassing and wrecking intercept server determines the calling party according to the caller identification information and called identification information is stated, and
The interception attribute of the calling party is sent to the calling Row control equipment;
The calling Row control equipment receives the interception for the calling party that the harassing and wrecking intercept server is sent
Attribute;
If the interception attribute of the calling party is can intercept, the calling Row control equipment is to the call request
Carry out intercept process.
3rd aspect of the embodiment of the present invention is to provide a kind of harassing call blocking apparatus, including:
First receiving module, calling party is being received for harassing intercept server reception calling Row control equipment
The interception attribute request that the sends during call request initiated to callee, the interception attribute request include caller identification information and
Called identification information;
Acquisition module, for the harassing and wrecking intercept server according to the caller identification information, obtain the calling party's
Harass attribute data;
The acquisition module is additionally operable to the harassing and wrecking intercept server according to the called identification information, obtains described called
The interception rule of side, the rule that intercepts include intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;
Determining module, for the harassing and wrecking intercept server according to the harassing and wrecking attribute data of the calling party and described called
The interception rule of side, determine the interception attribute of the calling party;
Sending module, the interception attribute of the calling party is sent to the caller for the harassing and wrecking intercept server and exhaled
Row control equipment is, so that interception attribute of the calling Row control equipment according to the calling party received,
Intercept process is carried out to the call request.
4th aspect of the embodiment of the present invention is to provide a kind of harassing call blocking apparatus, including:
Sending module, for when receiving the call request that calling party is initiated callee, calling Row control
Equipment sends to harassing and wrecking intercept server and intercepts attribute request, and the interception attribute request includes caller identification information and called mark
Information is known, so that the harassing and wrecking intercept server determines the calling party according to the caller identification information and called identification information
Interception attribute, and the interception attribute of the calling party is sent to the calling Row control equipment;
Receiving module, received for the calling Row control equipment described in the harassing and wrecking intercept server transmission
The interception attribute of calling party;
Blocking module, if the interception attribute for the calling party is to intercept, the calling Row control equipment
Intercept process is carried out to the call request.
The embodiment of the present invention is receiving caller direction by calling Row control device call Row control equipment
During the call request that callee initiates, to the interception attribute request of harassing and wrecking intercept server transmission, intercepting attribute request includes master
It is identification information and called identification information;Intercept server is harassed according to caller identification information and called identification information, obtains master
The harassing and wrecking attribute data for the side of crying and the interception rule of callee, are advised according to the interception of the harassing and wrecking attribute data of calling party and callee
Then, the interception attribute of calling party is determined, and the interception attribute of calling party is sent to calling Row control equipment, so that main
The interception attribute of calling party of the call flow control device according to receiving is, intercept process is carried out to call request, so as to real
When now determining that calling party can intercept, active interception is carried out to this call request by calling Row control equipment, blocked
The call request cut will not take communication network resource, so as to reduce occupancy of the substantial amounts of harassing call to communication network resource,
Communication network resource is saved.
Brief description of the drawings
Fig. 1 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention three provides;
Fig. 4 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention four provides;
Fig. 5 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention five provides;
Fig. 6 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention six provides;
Fig. 7 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention nine provides;
Fig. 8 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention ten provides.
Embodiment
It is right below in conjunction with the accompanying drawing in the embodiment of the present invention to make technical scheme and advantage clearer
Technical scheme is clearly and completely described, it is clear that and described embodiment is part of the embodiment of the present invention,
Rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative labor
The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
In the embodiment of the present invention, call flow control device is to be used to control setting for call flow in mobile communication process
Standby, in actual applications, call flow control device is usually mobile switching centre's (MobileSwitching Center, letter
Claim MSC), mobile switching centre is the core of mobile communications network, and it completes most basic function of exchange, that is, realizes mobile subscriber
With the communication connection between other network users.Enter in the present embodiment so that call flow control device is mobile switching centre as an example
Row explanation.
Embodiment one
Fig. 1 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention one provides.The embodiment of the present invention is for existing
There is the interception for implementing harassing call in technology by mobile terminal, harassing call still takes more communication network resource, caused
The problem of waste of communication network resource, there is provided harassing call hold-up interception method.As shown in figure 1, this method comprises the following steps that:
Step S101, harass intercept server reception calling mobile exchanging center MSC and receive caller direction callee
The interception attribute request sent during the call request of initiation, intercepting attribute request includes caller identification information and called identification letter
Breath.
Wherein, caller identification information is the user identity information for the unique mark calling party, for example, the electricity of calling party
Talk about number etc.;Called identification information is the user identity information for the unique mark callee, for example, the phone number of callee
Code etc..
In the prior art, it is whole by existing call flow, calling party when the call request that caller direction callee initiates
End sends call request to caller MSC first, to establish the connection of calling party end and caller MSC;Caller MSC is receiving master
After the call request that the side's of crying terminal is sent, position, the international mobile subscriber identity of callee are asked to called MS C
Routing iinformations such as (International Mobile Subscriber Identification Number, abbreviation IMSI), with
Establish caller MSC and called MS C connection.
In the embodiment of the present invention, increase harassing and wrecking intercept server, harassing and wrecking intercept server is used exclusively for carrying out harassing and wrecking blocking
The server cut, harassing and wrecking intercept server are used for the interception rule for storing all users.Calling mobile exchanging center refers to this
In calling procedure, mobile switching centre that calling party end is currently located at, by calling mobile exchanging center in the embodiment of the present invention
It is abbreviated as caller MSC.
In embodiments of the present invention, caller MSC is when receiving the call request of caller direction callee initiation, Zan Buxiang
Called MS C asks the routing iinformations such as the position of callee, IMSI, but the interception attribute sent to harassing and wrecking intercept server please
Ask, intercepting attribute request includes caller identification information and called identification information, so that harassing and wrecking intercept server determines that calling party is
No to intercept, after the interception attribute of the calling party of harassing and wrecking intercept server feedback, caller MSC is according to the interception category of calling party
Property carry out intercept process.
Step S102, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
Wherein, the harassing and wrecking attribute data of calling party can be the harassing and wrecking type and harassing and wrecking number that calling party is labeled.
In the present embodiment, the harassing and wrecking attribute data of calling party can be stored on harassing and wrecking intercept server, can also be by disturbing
Disturb the third-party server acquisition that intercept server is stored with harassing call data from other.For example, third-party server can be with
It is harassing call server of Tencent mobile phone manager etc..
Step S103, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.In the present embodiment, harassing and wrecking intercept server will
User identity information storage corresponding with the interception rule of user, callee can be got according to the called identification information of callee
Interception rule.
For example, it is assumed that the called identification information of callee is 18503110000, user identity information is obtained
Rule is intercepted corresponding to 18503110000, as shown in table 1, blocked corresponding to the user identity information 18503110000 got
Cut rule includes 4 rules, corresponds respectively to different harassing and wrecking types:In harassing call, fraudulent call, ad promotions, house property
It is situated between, the interception threshold value being corresponding in turn to is 20,30,20,20.
Table 1
In the present embodiment, step S102 and S103 can be carried out parallel, and the embodiment of the present invention is for harassing intercept server
The harassing and wrecking attribute data for obtaining calling party and the sequencing for the interception rule for obtaining callee are not specifically limited.
In addition, in another embodiment of the present embodiment, the harassing and wrecking attribute data of calling party can also be that other can
Data of the calling party to the disturbance levels of each user are represented, correspondingly, the interception rule of callee only need to be with the harassing and wrecking of calling party
Attribute data is correspondingly arranged.
Step S104, it is regular according to the harassing and wrecking attribute data of calling party and the interception of callee to harass intercept server, really
Determine the interception attribute of calling party.
Wherein, intercepting attribute includes to intercept and can not intercepting.
In the present embodiment, harassing and wrecking intercept server determines calling party for callee according to the harassing and wrecking attribute data of calling party
For whether can intercept, namely be to determine the interception attribute of calling party;If the interception attribute of calling party is said for that can intercept
The incoming call of bright calling party is the harassing and wrecking to callee, it should is intercepted;If the interception attribute of calling party is said for that can not intercept
The incoming call of bright calling party is not the harassing and wrecking to callee, should not be intercepted.
Step S105, the interception attribute of calling party is sent to caller MSC by harassing and wrecking intercept server, so that caller MSC roots
According to the interception attribute of the calling party received, intercept process is carried out to call request.
In the present embodiment, after harassing and wrecking intercept server determines the interception attribute of calling party, by the interception attribute of calling party
It is sent to caller MSC so that caller MSC determines the interception attribute of calling party for when can intercept, the call request to this is carried out
Intercept process, terminate this calling;Caller MSC determines that the interception attribute of calling party is the not calling to this when can not intercept
Request carries out intercept process, continues executing with the follow-up process of this calling, and position, the IMSI etc. of callee are asked to called MS C
Routing iinformation, to complete this calling procedure.
Alternatively, caller MSC carries out intercept process to call request, can realize in the following way:This is terminated to exhale
Cry;Or this calling is terminated, and notify callee to intercept the call request of calling party.Exhaled for example, being sent to callee
It is the information such as time, the calling party information of request interception.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC
When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called
Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party
With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined
Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received
Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC
Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call
To the occupancy of communication network resource, communication network resource has been saved.
Embodiment two
Fig. 2 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention two provides.In the base of above-described embodiment one
On plinth, in the present embodiment, the harassing and wrecking type of calling party is determined according to the harassing and wrecking attribute data of calling party in harassing and wrecking intercept server
Before harassing and wrecking number, in addition to:If the harassing and wrecking attribute data of calling party is sky, harassing and wrecking intercept server determines calling party's
Attribute is intercepted as that can not intercept.As shown in Fig. 2 this method comprises the following steps that:
Step S201, harass intercept server reception calling mobile exchanging center MSC and receive caller direction callee
The interception attribute request sent during the call request of initiation.
Step S201 is identical with above-mentioned steps S101 implementation, and here is omitted.
Step S202, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
Step S202 is similar with above-mentioned steps S102 implementation, and here is omitted.
In the present embodiment, harassing and wrecking intercept server obtains the harassing and wrecking attribute data of calling party, had according to caller identification information
Body can also be realized in the following way:
Intercept server is harassed according to caller identification information, is inquired from harassing and wrecking information database and caller identification information
Corresponding interception attribute data, and interception attribute data corresponding with caller identification information is defined as the harassing and wrecking attribute of calling party
Data.
Wherein, harassing and wrecking information database can be the database or other being stored on harassing and wrecking intercept server
Third-party server.If it is other third-party server to harass information database, harassing and wrecking intercept server is according to caller
Identification information, the harassing and wrecking attribute data of calling party is obtained, can also specifically be realized in the following way:
Harass intercept server and send interception attribute data request to third-party server, intercepting attribute data request includes
Caller identification information, so that third-party server is according to caller identification information, the inquiry from harassing and wrecking information database obtains and caller
Interception attribute data corresponding to identification information, and interception attribute data corresponding with caller identification information is sent to harassing and wrecking and intercepted
Server, harassing and wrecking intercept server will receive interception attribute data corresponding with caller identification information and be defined as calling party's
Harass attribute data.
In the present embodiment, intercept server is harassed before the interception rule according to called identification acquisition of information callee,
The harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine calling party's
Attribute is intercepted as that can not intercept, without obtaining the interception rule of callee again, improves mobile communication to a certain extent
Efficiency.
Whether the harassing and wrecking attribute data for step S203, judging calling party is empty.
In the present embodiment, if the harassing and wrecking attribute data in calling party is sky, step S204 is performed, harasses intercept server
The interception attribute for determining calling party is to intercept.
If the harassing and wrecking attribute data of calling party is not sky, step S205-S207 is performed, harassing and wrecking intercept server is according to master
The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the interception attribute of calling party.
Step S204, harassing and wrecking intercept server determines that the interception attribute of calling party is to intercept.
If the harassing and wrecking attribute data of calling party is sky, the interception attribute of calling party can be directly determined as that can not intercept,
Without obtaining the interception rule of callee again, the efficiency of mobile communication is improved to a certain extent.
Step S205, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
Step S205 is identical with above-mentioned steps S103 implementation, and here is omitted.
Step S206, it is regular according to the harassing and wrecking attribute data of calling party and the interception of callee to harass intercept server, really
Determine the interception attribute of calling party.
Step S206 is identical with above-mentioned steps S104 implementation, and here is omitted.
Step S207, the interception attribute of calling party is sent to caller MSC by harassing and wrecking intercept server, so that caller MSC roots
According to the interception attribute of the calling party received, intercept process is carried out to call request.
Step S207 is identical with above-mentioned steps S105 implementation, and here is omitted.
The embodiment of the present invention in harassing and wrecking intercept server according to the interception of called identification acquisition of information callee by advising
Before then, the harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine to lead
The interception attribute for the side of crying, without obtaining the interception rule of callee again, improves movement to a certain extent for that can not intercept
The efficiency of communication.
Embodiment three
Fig. 3 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention three provides.In above-described embodiment one or
On the basis of embodiment two, in the present embodiment, to harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and callee
Interception rule, determine that the process of the interception attribute of calling party is described in detail.As shown in Fig. 2 harassing and wrecking interception service
Device determines the interception attribute of calling party, can specifically led to according to the harassing and wrecking attribute data of calling party and the interception rule of callee
Cross following steps realization:
Step S301, harass intercept server according to the harassing and wrecking attribute data of calling party determine calling party harassing and wrecking type and
Harass number.
In the present embodiment, the harassing and wrecking attribute data of calling party includes harassing and wrecking type and harassing and wrecking number that calling party is labeled.
In actual use, a calling party may be labeled as different harassing and wrecking types, this reality by different callees
Apply in example, if the harassing and wrecking attribute data of calling party includes the two or more harassing and wrecking type that the calling party is labeled, harassing and wrecking are blocked
Cut server and harass number according to corresponding to each harassing and wrecking type, the maximum harassing and wrecking type of number will be harassed and be defined as disturbing for calling party
Disturb type, and the harassing and wrecking number using the harassing and wrecking number of the maximum as calling party.In addition, in the present embodiment, interception service is harassed
Device determines the harassing and wrecking type and harassing and wrecking number of calling party, can also use the harassing and wrecking of any one determination calling party in the prior art
Type and harass the method for number and realize that the present embodiment is not specifically limited to this.
Step S302, harassing and wrecking intercept server judges whether the interception rule of callee is empty.
If it is determined that the interception rule of callee is not sky, then step S303-S305 is performed, harassing and wrecking intercept server is according to master
The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the interception attribute of calling party.
If it is determined that the interception rule of callee is sky, then step S306-S308 is performed, according to the harassing and wrecking attribute number of calling party
According to the interception attribute that calling party is determined with the default second interception threshold value.
Step S303, if it is determined that the interception rule of callee is not sky, harassing and wrecking of the intercept server according to calling party are harassed
The interception rule of type and callee, it is determined that corresponding with the harassing and wrecking type of calling party first intercepts threshold value.
Wherein, intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
In the present embodiment, intercepting rule includes more rules, defines per rule and is blocked corresponding to a kind of harassing and wrecking type
Threshold value is cut, when the harassing and wrecking number of calling party, which has exceeded, intercepts threshold value corresponding to the harassing and wrecking type of calling party, then can determine to lead
The incoming call for the side of crying is the harassing and wrecking to callee, should intercept the call request of calling party.
Specifically, harass intercept server and intercept threshold value corresponding to the harassing and wrecking type of lookup calling party from interception rule,
Will intercept rule in calling party harassing and wrecking type corresponding to intercept threshold value be defined as the first interception threshold value.
Step S304, harassing and wrecking intercept server judges whether the harassing and wrecking number of calling party is more than the harassing and wrecking type pair of calling party
First answered intercepts threshold value.
Step S305, if it is determined that the harassing and wrecking number of calling party is more than the first interception threshold corresponding to the harassing and wrecking type of calling party
Value, then harass intercept server and determine that the interception attribute of calling party is to intercept.
For example, it is assumed that harassing and wrecking intercept server determines that the harassing and wrecking type of calling party is " ad promotions ", harassing and wrecking number is 32,
As shown in table 2, harassing and wrecking intercept server can determine and caller for the interception rule for the callee that harassing and wrecking intercept server is got
Side harassing and wrecking type " ad promotions " for first intercept threshold value be 20, it may be determined that the harassing and wrecking number 32 of calling party be more than master
First intercepts threshold value 20 corresponding to the harassing and wrecking type for the side of crying, and therefore, harassing and wrecking intercept server determines that the interception attribute of calling party is
It can intercept.
Table 2
Above-mentioned steps S303-S305 is that harassing and wrecking intercept server is according to master if it is determined that the interception rule of callee is not empty
The harassing and wrecking attribute data for the side of crying and the interception rule of callee, determine the process of the interception attribute of calling party.
Step S306, if it is determined that the interception rule of callee is sky, harassing and wrecking intercept server judges the harassing and wrecking number for the side of crying
Whether the harassing and wrecking type of calling party corresponding to second interception threshold value is more than.
Wherein, the second interception threshold value corresponding to type is harassed as interception threshold corresponding with the harassing and wrecking type set in advance
Value.Preferably, the second interception threshold value corresponding to any harassing and wrecking type can be directed to by harassing and wrecking intercept server according to each user is somebody's turn to do
The interception threshold value that harassing and wrecking type is set is calculated, and can be used for assessing disturbance levels of the harassing and wrecking type to each user.
If the harassing and wrecking number of the calling party of the harassing and wrecking type is more than the second interception threshold value corresponding to the harassing and wrecking type, then it is assumed that the calling party
It is more serious to the disturbance levels of each user;If the harassing and wrecking number of the calling party of the harassing and wrecking type is less than or equal to the harassing and wrecking type
Corresponding second intercepts threshold value, then it is assumed that the calling party is not serious to the disturbance levels of each user.
In addition, the second interception threshold value corresponding to harassing and wrecking type can by callee or technical staff according to be actually needed into
Row is freely set;Or it can be carried out by harassing and wrecking intercept server according to each user for the interception threshold value that the harassing and wrecking type is set
It is calculated, for example, the average value for the interception threshold value that harassing and wrecking intercept server can be set each user for the harassing and wrecking type
Threshold value is intercepted as corresponding to the harassing and wrecking type second, the present embodiment is not specifically limited to this.
Step S307, if it is determined that the harassing and wrecking number of calling party is less than or equal to second corresponding to the harassing and wrecking type of calling party
Threshold value is intercepted, then harasses intercept server and determines that the interception attribute of calling party is to intercept.
When the harassing and wrecking number of calling party is less than or equal to the second interception threshold value corresponding with the harassing and wrecking type of calling party
When, then it can determine that the incoming call of calling party will not cause to harass to callee, harassing and wrecking intercept server should not be to calling party's
Call request is intercepted, therefore is harassed intercept server and determined that the interception attribute of calling party is to intercept.
Step S308, if it is determined that the harassing and wrecking number of calling party is more than the first interception threshold corresponding to the harassing and wrecking type of calling party
Value, then harass the interception attribute that by fraud type is determined calling party of the intercept server according to callee.
Wherein, callee by fraud type is included easily being cheated and be not easy to be cheated.
In the present embodiment, when the harassing and wrecking number of calling party is more than the second interception threshold corresponding with the harassing and wrecking type of calling party
During value, then it can determine that the incoming call of calling party may cause to harass to callee, according to callee by fraud type, if by
The side of crying is easily to be cheated by fraud type, it is determined that the interception attribute of calling party is to intercept;If callee by fraud class
Type is to be not easy to be cheated, it is determined that the interception attribute of calling party is to intercept.
Specifically, in the step, harassing and wrecking intercept server is determined that calling party is intercepted according to callee by fraud type
Attribute, it can specifically realize in the following way:
Communications records and/or user profile that intercept server obtains callee are harassed, and are remembered according to the communication of callee
Record and/or user profile determine callee by fraud type;If callee is easily to be cheated by fraud type, harassing and wrecking are blocked
Cut server and determine that the interception attribute of calling party is to intercept;If callee is to be not easy to be cheated by fraud type, harass
Intercept server determines that the interception attribute of calling party is to intercept.
Alternatively, callee should be asked to the business operation support system of callee's operator by harassing intercept server
Communications records and/or user profile.Wherein the user profile of callee comprises at least age of user.
Further, harassing and wrecking intercept server determines callee's according to the communications records and/or user profile of callee
By fraud type, can specifically realize in the following way:
(1) harass intercept server according to the communications records of callee determine callee by fraud type:
Communications records of the intercept server according to callee are harassed, count time that callee communicates in preset time period
Number and/or frequency and the number of users to be communicated in preset time period with callee.
If the number that callee communicates in preset time period is more than or equal to the first preset value and in preset time
The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type
To be not easy to be cheated.
If the frequency that callee communicates in preset time period is more than or equal to the 3rd preset value and in preset time
The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type
To be not easy to be cheated.
If the number of users that callee is communicated in preset time period with callee be less than the second preset value or by
The frequency that the number that the side of crying communicates in preset time period is less than the first preset value and callee communicates in preset time period
Less than the 3rd preset value, it is determined that callee is easily to be cheated by fraud type.
(2) harass intercept server according to the communications records and user profile of callee determine callee by fraud class
Type:
Communications records of the intercept server according to callee are harassed, count time that callee communicates in preset time period
Number and/or frequency and the number of users to be communicated in preset time period with callee.
If the number that callee communicates in preset time period is more than or equal to the first preset value and in preset time
The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type
To be not easy to be cheated.
If the frequency that callee communicates in preset time period is more than or equal to the 3rd preset value and in preset time
The number of users that is communicated with callee is more than or equal to the second preset value in section, it is determined that callee by cheating type
To be not easy to be cheated.
If the number of users that callee is communicated in preset time period with callee be less than the second preset value or by
The frequency that the number that the side of crying communicates in preset time period is less than the first preset value and callee communicates in preset time period
Less than the 3rd preset value, then according to the user profile of callee, determine callee by fraud type.Specifically, callee
User profile comprises at least age of user, determines whether the age of callee belongs to default age model according to the age of callee
Enclose, if the age of callee belongs to default the range of age, it is determined that callee is easily to be cheated by fraud type;It is if called
The age of side is not belonging to default the range of age, it is determined that callee is to be not easy to be cheated by fraud type.
Wherein, default the range of age represents the range of age of the crowd easily cheated, can be by technical staff according to reality
Border is needed and experience is set.For example, 60 more than one full year of life old men, less than 18 one full year of life minor and do not participate in work
The possibility that the adult of work is cheated is larger, under normal circumstances the artificial adult not worked of 18-24 one full year of life, therefore
Default the range of age can be defined as being less than for 24 one full year of life and more than 60 one full year of life.
Alternatively, harassing and wrecking intercept server is also conceivable to the time of call request generation, if for example, call request occurs
Time when being the period of period before and after college entrance examination or entrant's admission, for the age 16-20 one full year of life quilt
The side of crying, it is determined that callee is easily to be cheated by fraud type.Residing for the time occurred in the present embodiment for call request
The division of period be not specifically limited.
It should be noted that the first preset value, the second preset value and the 3rd preset value can be by technical staff according to reality
Border needs to be set, and can be adjusted according to the actual conditions of different times, and the present embodiment is for the first preset value, the
Two preset values and the 3rd preset value are not specifically limited.
Above-mentioned steps S306-S308 is that harassing and wrecking intercept server is according to caller if it is determined that the interception rule of callee is empty
The harassing and wrecking attribute data of side and default second interception threshold value determine the process of the interception attribute of calling party.
The embodiments of the invention provide harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and blocking for callee
Cut rule determines the detailed process of the interception attribute of calling party, if the interception rule of callee is sky, according to calling party's
When the second interception threshold value determines that the disturbance levels of calling party are more serious corresponding to harassing and wrecking type, harassing and wrecking intercept server is according to called
The communications records and/or user profile of side determine being determined by fraud type, and according to callee by fraud type for callee
The interception attribute of calling party, realize the behavior based on caller and called both sides and carry out personalized harassing and wrecking interception for callee,
So as to the significantly less callee for being not provided with intercepting rule by the number harassed.
Example IV
Fig. 4 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention four provides.In any of the above-described embodiment
On the basis of, in the present embodiment, harassing and wrecking intercept server receives called MS C and is receiving the refuse to answer instruction of callee or master
The interception rule maintenance request sent during dynamic not answer command;Intercepting regular maintenance request includes caller identification information and called mark
Know information;Intercept server is harassed according to caller identification information and called identification information, establishes or update the interception of callee
Rule.As shown in figure 4, this method is further comprising the steps of:
Step S401, harass intercept server reception called MS C and receive the refuse to answer instruction of callee or master
The interception rule maintenance request sent during dynamic not answer command.
Wherein, intercepting regular maintenance request includes caller identification information and called identification information.
In the present embodiment, the call request of calling party is answered or do not answered actively to callee's terminal check callee refusal
When, send instruction or active not answer command to called MS C.Called MS C receive the refuse to answer instruction of callee or
Person actively not answer command when, to harassing and wrecking intercept server send interception rule maintenance request so that harassing and wrecking intercept server
Establish the interception rule of callee or the existing rule that intercepts of callee is updated.
In the present embodiment, the calling that calling party was answered or do not answered actively to callee's terminal check callee refusal please
Ask, can be realized using any one method of the prior art, here is omitted for the present embodiment.For example, callee without
During response, callee's terminal first has to judge whether callee is not answer actively, and this can pass through callee's terminal shape after ring
Whether the change of state, such as screen light, front camera whether capture user's head portrait judge callee incoming call when be
It is no to check incoming information to judge.If callee checked incoming information but do not answered in incoming call, it can determine that it is called
Side does not answer actively, and otherwise, can determine that callee is not not answer actively.
Step S402, intercept server is harassed according to caller identification information, obtains the harassing and wrecking attribute data of calling party.
The step is identical with above-mentioned steps S202 implementation, and here is omitted.
Step S403, intercept server is harassed according to called identification information, and the interception for obtaining callee is regular.
The step is identical with above-mentioned steps S205 implementation, and here is omitted.
Whether the interception rule for step S404, judging callee is empty.
If step S405, the interception rule of callee is sky, harassing and wrecking attribute of the intercept server according to calling party is harassed
Data establish the interception rule of callee.
Specifically, if the interception rule of callee is sky, harassing and wrecking attribute number of the intercept server according to calling party is harassed
According to, determine calling party harassing and wrecking type and harassing and wrecking number;The interception rule of callee is established, the newly-built interception rule includes
One rule, the harassing and wrecking type of this rule are the harassing and wrecking type of calling party, are blocked corresponding to the harassing and wrecking type of this rule
Cut the harassing and wrecking number that threshold value is calling party.
For example, it is assumed that harassing and wrecking intercept server determines the harassing and wrecking type of calling party for " house property medium ", corresponding harassing and wrecking time
Number is 18 times, if then the interception rule of callee is sky, harassing and wrecking intercept server establishes the interception rule of callee such as the institute of table 3
Show:
Table 3
User identity information | Sequence number | Harass type | Intercept threshold value |
18503110001 | 1 | House property medium | 18 |
If step S406, the interception rule of callee is not sky, harassing and wrecking intercept server obtains according to called identification information
Take the communications records and/or user profile of callee.
In the present embodiment, harassing and wrecking intercept server should ask quilt to the business operation support system of callee's operator
The communications records and/or user profile for the side of crying.Wherein the user profile of callee comprises at least age of user.
Step S407, intercept server is harassed according to the communications records and/or user profile of callee, determines callee's
By fraud type.
Wherein, included easily being cheated and be not easy to be cheated by fraud type.
Intercept server is harassed in the step according to the communications records and/or user profile of callee, determines callee's
By the specific implementation of fraud type, it can use in upper step S308 and harass intercept server according to the communication of callee note
Record and/or user profile determine any one in two kinds of implementations by fraud type of callee, and the present embodiment is herein
Repeat no more.
Step S408, harass intercept server according to calling party harassing and wrecking attribute data and callee by fraud class
Type, update the interception rule of callee.
In the present embodiment, the step can specifically be realized in the following way:
Harassing and wrecking attribute data of the intercept server according to calling party is harassed, determines harassing and wrecking type and the harassing and wrecking time of calling party
Number;Determine that rule corresponding with the harassing and wrecking type of calling party is rule to be modified and its interception threshold in the interception rule of callee
Value.If callee is easily to be cheated by fraud type, by regular interception threshold value to be modified and the harassing and wrecking number of calling party
In the minimum value interception threshold value new as the rule to be modified, treat alteration ruler and be updated.If callee's is cheated
Type then treats the average value in the harassing and wrecking number of regular interception threshold value to be modified and calling party as this to be not easy to be cheated
The new interception threshold value of alteration ruler, treats alteration ruler and is updated;Or do not treat alteration ruler and be updated.
For example, it is assumed that harassing and wrecking intercept server determines the harassing and wrecking type of calling party for " house property medium ", corresponding harassing and wrecking time
Number is 18 times, and the interception rule of callee is as shown in table 4,
Table 4
Then harassing and wrecking intercept server can determine that rule to be modified corresponding with " house property medium " is serial number 4 in table 4
Rule, if callee, less than 18 one full year of life, can determine callee is easily to be cheated by fraud type, it may be determined that to be modified
The interception threshold value 20 of rule is 18 with the minimum value in the harassing and wrecking number 18 of calling party, then the minimum value 18 is to be modified as this
The new interception threshold value of rule, treats alteration ruler and is updated, and the interception rule of the callee after renewal is as shown in table 5.
Table 5
Above-mentioned steps S402-S408 be harassing and wrecking intercept server established according to caller identification information and called identification information or
Person updates the process of the interception rule of callee.
The embodiment of the present invention is receiving the refuse to answer instruction of callee by harassing intercept server reception called MS C
Or actively not answer command when the interception rule maintenance request that sends;If the interception rule of callee is sky, according to caller
The harassing and wrecking attribute data of side establishes the interception rule of callee;If the interception rule of callee is not sky, according to calling party's
Harass attribute data and callee by fraud type, update the interception rule of callee, so as to more personalized
For callee intercept the foundation and renewal of rule.
Embodiment five
Fig. 5 is the flow chart for the harassing call hold-up interception method that the embodiment of the present invention five provides.The embodiment of the present invention is for existing
There is the interception for implementing harassing call in technology by mobile terminal, harassing call still takes more communication network resource, caused
The problem of waste of communication network resource, there is provided harassing call hold-up interception method.As shown in figure 5, this method comprises the following steps that:
Step S501, when receiving the call request that calling party is initiated callee, calling mobile exchanging center MSC to
Harass intercept server and intercept attribute request, intercepting attribute request includes caller identification information and called identification information, so as to disturb
Disturb the interception attribute that intercept server determines calling party according to caller identification information and called identification information, and blocking calling party
Cut attribute and be sent to caller MSC.
Wherein, caller identification information is the user identity information for the unique mark calling party, for example, the electricity of calling party
Talk about number etc.;Called identification information is the user identity information for the unique mark callee, for example, the phone number of callee
Code etc..
In the prior art, it is whole by existing call flow, calling party when the call request that caller direction callee initiates
End sends call request to caller MSC first, to establish the connection of calling party end and caller MSC;Caller MSC is receiving master
After the call request that the side's of crying terminal is sent, position, the international mobile subscriber identity of callee are asked to called MS C
Routing iinformations such as (International Mobile Subscriber Identification Number, abbreviation IMSI), with
Establish caller MSC and called MS C connection.
In the embodiment of the present invention, increase harassing and wrecking intercept server, harassing and wrecking intercept server is used exclusively for carrying out harassing and wrecking blocking
The server cut, harassing and wrecking intercept server are used for the interception rule for storing all users.Calling mobile exchanging center refers to this
In calling procedure, mobile switching centre that calling party end is currently located at, by calling mobile exchanging center in the embodiment of the present invention
It is abbreviated as caller MSC.
In embodiments of the present invention, caller MSC is when receiving the call request of caller direction callee initiation, Zan Buxiang
Called MS C asks the routing iinformations such as the position of callee, IMSI, but the interception attribute sent to harassing and wrecking intercept server please
Ask, intercepting attribute request includes caller identification information and called identification information, so that harassing and wrecking intercept server determines that calling party is
No to intercept, after the interception attribute of the calling party of harassing and wrecking intercept server feedback, caller MSC is according to the interception category of calling party
Property carry out intercept process.
Step S502, caller MSC receives the interception attribute for the calling party that harassing and wrecking intercept server is sent.
In the present embodiment, after harassing and wrecking intercept server determines the interception attribute of calling party, by the interception attribute of calling party
Caller MSC is sent to, caller MSC receives the interception attribute for the calling party that harassing and wrecking intercept server is sent, with according to calling party's
Intercept attribute and carry out intercept process.
If step S503, the interception attribute of calling party is can intercept, caller MSC carries out intercept process to call request.
In the present embodiment, caller MSC determines the interception attribute of calling party for when can intercept, the call request to this is carried out
Intercept process, terminate this calling;Caller MSC determines that the interception attribute of calling party is the not calling to this when can not intercept
Request carries out intercept process, continues executing with the follow-up process of this calling, and position, the IMSI etc. of callee are asked to called MS C
Routing iinformation, to complete this calling procedure.
Alternatively, caller MSC carries out intercept process to call request, can realize in the following way:This is terminated to exhale
Cry;Or this calling is terminated, and notify callee to intercept the call request of calling party.Exhaled for example, being sent to callee
It is the information such as time, the calling party information of request interception.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC
When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called
Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party
With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined
Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received
Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC
Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call
To the occupancy of communication network resource, communication network resource has been saved.
Embodiment six
Fig. 6 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention six provides.The embodiment of the present invention carries
The harassing call blocking apparatus of confession can perform the handling process that the embodiment of harassing call hold-up interception method provides, as shown in fig. 6,
The device 60 includes:First receiving module 601, acquisition module 602, determining module 603 and sending module 604.
Specifically, the first receiving module 601 is receiving for harassing intercept server reception calling mobile exchanging center MSC
The interception attribute request that the sends during call request initiated to caller direction callee, intercepting attribute request includes calling identification letter
Breath and called identification information.
Acquisition module 602 is used to harass intercept server according to caller identification information, obtains the harassing and wrecking attribute number of calling party
According to.
Acquisition module 602 is additionally operable to harass intercept server according to called identification information, obtains the interception rule of callee,
Intercepting rule includes intercepting threshold value corresponding to each harassing and wrecking type.
Determining module 603 is used to harass intercept server according to the harassing and wrecking attribute data of calling party and the interception rule of callee
Then, the interception attribute of calling party is determined;
The interception attribute of calling party is sent to caller MSC by sending module 604 for harassing intercept server, so that caller
MSC carries out intercept process according to the interception attribute of the calling party received to call request.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment one is provided,
Here is omitted for concrete function.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC
When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called
Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party
With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined
Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received
Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC
Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call
To the occupancy of communication network resource, communication network resource has been saved.
Embodiment seven
On the basis of above-described embodiment six, in the present embodiment, determining module includes:6th determination sub-module, if for
The harassing and wrecking attribute data of calling party is sky, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
Optionally, the first acquisition module is additionally operable to:
Intercept server is harassed according to caller identification information, is inquired from harassing and wrecking information database and caller identification information
Corresponding interception attribute data, and interception attribute data corresponding with caller identification information is defined as the harassing and wrecking attribute of calling party
Data.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment two is provided,
Here is omitted for concrete function.
The embodiment of the present invention in harassing and wrecking intercept server according to the interception of called identification acquisition of information callee by advising
Before then, the harassing and wrecking attribute data of calling party is first obtained, if the harassing and wrecking attribute data of calling party is sky, can directly determine to lead
The interception attribute for the side of crying, without obtaining the interception rule of callee again, improves movement to a certain extent for that can not intercept
The efficiency of communication.
Embodiment eight
On the basis of above-described embodiment six or embodiment seven, in the present embodiment, as shown in figure 8, determining module includes:The
One determination sub-module, the first judging submodule, the second determination sub-module, the second judging submodule, the 3rd determination sub-module, the 3rd
Judging submodule, the 4th determination sub-module and the 5th determination sub-module.
Specifically, the first determination sub-module is used to harass intercept server according to the harassing and wrecking attribute data of calling party determination master
The harassing and wrecking type and harassing and wrecking number for the side of crying.
First judging submodule judges whether the interception rule of callee is empty for harassing intercept server.
Second determination sub-module is used for if it is determined that the interception rule of callee is not sky, and harassing and wrecking intercept server is according to caller
The harassing and wrecking type of side and the interception rule of callee, it is determined that corresponding with the harassing and wrecking type of calling party first intercepts threshold value.
Second judging submodule judges whether the harassing and wrecking number of calling party is more than calling party's for harassing intercept server
Harass the first interception threshold value corresponding to type.
3rd determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is more than the corresponding to the harassing and wrecking type of calling party
One intercepts threshold value, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
For 3rd judging submodule if it is determined that the interception rule of callee is sky, harassing and wrecking intercept server judges the harassing and wrecking for the side of crying
Whether number is more than the second interception threshold value corresponding to the harassing and wrecking type of calling party.
4th determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is less than or equal to the harassing and wrecking type of calling party
Corresponding second intercepts threshold value, then harasses intercept server and determine that the interception attribute of calling party is to intercept.
5th determination sub-module is used for if it is determined that the harassing and wrecking number of calling party is more than the corresponding to the harassing and wrecking type of calling party
One intercepts threshold value, then harasses the interception attribute that by fraud type is determined calling party of the intercept server according to callee.
5th determination sub-module is additionally operable to:Communications records and/or user profile that intercept server obtains callee are harassed,
And according to the communications records and/or user profile of callee determine callee by fraud type, by fraud type include easily by
Cheat and be not easy to be cheated;If callee is easily to be cheated by fraud type, harassing and wrecking intercept server determines calling party's
Attribute is intercepted as that can intercept;If callee is to be not easy to be cheated by fraud type, harassing and wrecking intercept server determines calling party
Interception attribute can not to intercept.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment three is provided,
Here is omitted for concrete function.
The embodiments of the invention provide harassing and wrecking intercept server according to the harassing and wrecking attribute data of calling party and blocking for callee
Cut rule determines the detailed process of the interception attribute of calling party, if the interception rule of callee is sky, according to calling party's
When the second interception threshold value determines that the disturbance levels of calling party are more serious corresponding to harassing and wrecking type, harassing and wrecking intercept server is according to called
The communications records and/or user profile of side determine being determined by fraud type, and according to callee by fraud type for callee
The interception attribute of calling party, realize the behavior based on caller and called both sides and carry out personalized harassing and wrecking interception for callee,
So as to the significantly less callee for being not provided with intercepting rule by the number harassed.
Embodiment nine
Fig. 7 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention nine provides.In any of the above-described device
On the basis of embodiment, in the present embodiment, as shown in fig. 7, the device 60 also includes:Second receiving module 605 and rule are safeguarded
Module 606.
Second receiving module 605 is answered for harassing intercept server reception called MS C in the refusal for receiving callee
Instruction or actively not answer command when the interception rule maintenance request that sends;Regular maintenance request is intercepted including calling identification to believe
Breath and called identification information.
Regular maintenance module 606 is used to harass intercept server according to caller identification information and called identification information, establishes
Or the interception rule of renewal callee.
In the present embodiment, regular maintenance module includes:First acquisition submodule, the second acquisition submodule, rule establish son
Module, the 3rd acquisition submodule, the 7th determination sub-module and Policy Updates submodule.
Specifically, the first acquisition submodule, for harassing intercept server according to caller identification information, obtain calling party's
Harass attribute data.
Second acquisition submodule, for harassing intercept server according to called identification information, the interception for obtaining callee is advised
Then.
Regular setting up submodule, if the interception rule for callee is sky, harassing and wrecking intercept server is according to calling party
Harassing and wrecking attribute data establish callee interception rule.
3rd acquisition submodule, if the interception rule for callee is not sky, harassing and wrecking intercept server is according to called
Identification information, obtain the communications records and/or user profile of callee.
7th determination sub-module, for harassing communications records and/or user profile of the intercept server according to callee, really
Determine callee by fraud type, included easily being cheated and be not easy to be cheated by fraud type.
Policy Updates submodule, for harassing intercept server according to the harassing and wrecking attribute data of calling party and callee
By fraud type, the interception for updating callee is regular.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment four is provided,
Here is omitted for concrete function.
The embodiment of the present invention is receiving the refuse to answer instruction of callee by harassing intercept server reception called MS C
Or actively not answer command when the interception rule maintenance request that sends;If the interception rule of callee is sky, according to caller
The harassing and wrecking attribute data of side establishes the interception rule of callee;If the interception rule of callee is not sky, according to calling party's
Harass attribute data and callee by fraud type, update the interception rule of callee, so as to more personalized
For callee intercept the foundation and renewal of rule.
Embodiment ten
Fig. 8 is the structural representation for the harassing call blocking apparatus that the embodiment of the present invention ten provides.The embodiment of the present invention carries
The harassing call blocking apparatus of confession can perform the handling process that the embodiment of harassing call hold-up interception method provides, as shown in figure 8,
The device 70 includes:Sending module 701, receiving module 702 and blocking module 703.
Specifically, sending module 701 is used for when receiving the call request that calling party is initiated callee, caller movement
Switching centre MSC to harassing and wrecking intercept server send intercept attribute request, intercept attribute request include caller identification information and by
Identification information is, so that harassing and wrecking intercept server determines the interception category of calling party according to caller identification information and called identification information
Property, and the interception attribute of calling party is sent to caller MSC.
Receiving module 702 is used for the interception attribute that caller MSC receives the calling party that harassing and wrecking intercept server is sent.Intercept mould
If block 703 is used for the interception attribute of calling party for that can intercept, caller MSC carries out intercept process to call request.
Device provided in an embodiment of the present invention can be specifically used for performing the embodiment of the method that above-described embodiment five is provided,
Here is omitted for concrete function.
The embodiment of the present invention please in the calling for receiving caller direction callee initiation by calling mobile exchanging center MSC
When asking, to the interception attribute request of harassing and wrecking intercept server transmission, intercept attribute request and marked including caller identification information with called
Know information;Intercept server is harassed according to caller identification information and called identification information, obtains the harassing and wrecking attribute data of calling party
With the interception rule of callee, according to the harassing and wrecking attribute data of calling party and the interception rule of callee, blocking for calling party is determined
Attribute is cut, and the interception attribute of calling party is sent to caller MSC, so that interceptions of the caller MSC according to the calling party received
Attribute, intercept process is carried out to call request, so that when now determining that calling party can intercept in fact, this called by caller MSC
Request carries out active interception, and intercepted call request will not take communication network resource, so as to reduce substantial amounts of harassing call
To the occupancy of communication network resource, communication network resource has been saved.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or unit
Letter connection, can be electrical, mechanical or other forms.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer
It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can be complete by different functional modules by above-mentioned function distribution as needed
Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (16)
- A kind of 1. harassing call hold-up interception method, it is characterised in that including:Harassing and wrecking intercept server receives calling Row control equipment please in the calling for receiving caller direction callee initiation The interception attribute request sent when asking, the interception attribute request include caller identification information and called identification information;The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;The harassing and wrecking intercept server obtains the interception rule of the callee, the interception according to the called identification information Rule includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;The harassing and wrecking intercept server is regular according to the harassing and wrecking attribute data of the calling party and the interception of the callee, it is determined that The interception attribute of the calling party;The interception attribute of the calling party is sent to the calling Row control equipment by the harassing and wrecking intercept server, with Make interception attribute of the calling Row control equipment according to the calling party received, the call request is carried out Intercept process.
- 2. according to the method for claim 1, it is characterised in that harassing and wrecking intercept server the disturbing according to the calling party Attribute data and the interception rule of the callee are disturbed, determines the interception attribute of the calling party, including:The harassing and wrecking intercept server judges whether the harassing and wrecking attribute data of calling party is empty;If the harassing and wrecking attribute data of the calling party is sky, the harassing and wrecking intercept server determines the interception category of the calling party Property can not to intercept;If the harassing and wrecking attribute data of the calling party is not sky, the harassing and wrecking for harassing intercept server according to the calling party Attribute data determines the harassing and wrecking type and harassing and wrecking number of the calling party;The harassing and wrecking intercept server judges whether the interception rule of the callee is empty;If it is determined that the interception rule of the callee is not sky, it is described to harass harassing and wrecking class of the intercept server according to the calling party The interception rule of type and the callee, it is determined that corresponding with the harassing and wrecking type of the calling party first intercepts threshold value;The harassing and wrecking intercept server judges whether the harassing and wrecking number of the calling party is more than the harassing and wrecking type pair of the calling party First answered intercepts threshold value;If it is determined that the harassing and wrecking number of the calling party, which is more than corresponding to the harassing and wrecking type of the calling party first, intercepts threshold value, then institute State harassing and wrecking intercept server and determine that the interception attribute of the calling party is to intercept.
- 3. according to the method for claim 2, it is characterised in that the harassing and wrecking intercept server judges blocking for the callee After whether cut rule is sky, in addition to:If it is determined that the interception rule of the callee is sky, the harassing and wrecking intercept server judges that the harassing and wrecking number of the side of crying is Second intercepts threshold value corresponding to the no harassing and wrecking type more than the calling party;If it is determined that the harassing and wrecking number of the calling party is less than or equal to the second interception corresponding to the harassing and wrecking type of the calling party Threshold value, then the harassing and wrecking intercept server determine the interception attribute of the calling party as that can not intercept;If it is determined that the harassing and wrecking number of the calling party, which is more than corresponding to the harassing and wrecking type of the calling party first, intercepts threshold value, then institute State the interception attribute that by fraud type is determined the calling party of the harassing and wrecking intercept server according to the callee.
- 4. according to the method for claim 3, it is characterised in that it is described harassing and wrecking intercept server according to the callee by Fraud type determines the interception attribute of the calling party, including:The harassing and wrecking intercept server obtains the communications records and/or user profile of the callee, and according to the callee Communications records and/or user profile determine the callee by fraud type, it is described to be included easily being cheated by fraud type Be not easy to be cheated;If the callee is easily to be cheated by fraud type, the harassing and wrecking intercept server determines blocking for the calling party Attribute is cut as that can intercept;If the callee is to be not easy to be cheated by fraud type, the harassing and wrecking intercept server determines the calling party's Attribute is intercepted as that can not intercept.
- 5. according to the method described in claim any one of 1-4, it is characterised in that the harassing and wrecking intercept server is according to the master Identification information is, obtains the harassing and wrecking attribute data of the calling party, including:The harassing and wrecking intercept server inquires and the caller according to the caller identification information from harassing and wrecking information database Interception attribute data corresponding to identification information, and the interception attribute data corresponding with the caller identification information is defined as The harassing and wrecking attribute data of the calling party.
- 6. according to the method described in claim any one of 1-4, it is characterised in that also include:The harassing and wrecking intercept server receives called call flow control device and answers finger in the refusal for receiving the callee Order or actively not answer command when the interception rule maintenance request that sends;The regular maintenance request of interception includes the caller Identification information and the called identification information;The harassing and wrecking intercept server according to the caller identification information and the called identification information, establish or renewal described in The interception rule of callee.
- 7. according to the method for claim 6, it is characterised in that the harassing and wrecking intercept server is believed according to the calling identification Breath and the called identification information, the interception rule of the callee is established or updates, including:The harassing and wrecking intercept server obtains the harassing and wrecking attribute data of the calling party according to the caller identification information;For the harassing and wrecking intercept server according to the called identification information, the interception for obtaining the callee is regular;It is described to harass harassing and wrecking attribute number of the intercept server according to the calling party if the interception rule of the callee is sky According to the interception rule for establishing the callee;If the interception rule of the callee is not sky, the harassing and wrecking intercept server obtains according to the called identification information Take the communications records and/or user profile of the callee;The harassing and wrecking intercept server determines the callee's according to the communications records and/or user profile of the callee It is described to be included easily being cheated and be not easy to be cheated by fraud type by fraud type;It is described harassing and wrecking intercept server according to the calling party harassing and wrecking attribute data and callee by fraud type, renewal The interception rule of the callee.
- A kind of 8. harassing call hold-up interception method, it is characterised in that including:When receiving the call request that calling party is initiated callee, calling Row control equipment to harassing and wrecking interception service Device, which is sent, intercepts attribute request, and the interception attribute request includes caller identification information and called identification information, so that described disturb Disturb the interception attribute that intercept server determines the calling party according to the caller identification information and called identification information, and by institute The interception attribute for stating calling party is sent to the calling Row control equipment;The calling Row control equipment receives the interception attribute for the calling party that the harassing and wrecking intercept server is sent;If the interception attribute of the calling party is can intercept, the calling Row control equipment is carried out to the call request Intercept process.
- A kind of 9. harassing call blocking apparatus, it is characterised in that including:First receiving module, caller direction quilt is being received for harassing intercept server reception calling Row control equipment The interception attribute request sent during the call request that the side of crying initiates, the interception attribute request include caller identification information and are called Identification information;Acquisition module, for the harassing and wrecking intercept server according to the caller identification information, obtain the harassing and wrecking of the calling party Attribute data;The acquisition module is additionally operable to the harassing and wrecking intercept server according to the called identification information, obtains the callee's Rule is intercepted, the rule that intercepts includes intercepting threshold value corresponding to harassing and wrecking type and each harassing and wrecking type;Determining module, for the harassing and wrecking intercept server according to the harassing and wrecking attribute data of the calling party and the callee Rule is intercepted, determines the interception attribute of the calling party;Sending module, the interception attribute of the calling party is sent to the calling stream for the harassing and wrecking intercept server Program control control equipment, so that interception attribute of the calling Row control equipment according to the calling party received, to institute State call request and carry out intercept process.
- 10. device according to claim 9, it is characterised in that the determining module includes:6th determination sub-module, whether the harassing and wrecking attribute data that calling party is judged for the harassing and wrecking intercept server is empty;If The harassing and wrecking attribute data of the calling party is sky, then the harassing and wrecking intercept server determines the interception attribute of the calling party for not It can intercept;First determination sub-module, if the harassing and wrecking attribute data for the calling party is not sky, the harassing and wrecking intercept server The harassing and wrecking type and harassing and wrecking number of the calling party is determined according to the harassing and wrecking attribute data of the calling party;First judging submodule, whether the interception rule that the callee is judged for the harassing and wrecking intercept server is empty;Second determination sub-module, for if it is determined that the callee interception rule for sky, it is described harassing and wrecking intercept server root According to the harassing and wrecking type of the calling party and the interception rule of the callee, it is determined that corresponding with the harassing and wrecking type of the calling party First intercepts threshold value;Second judging submodule, it is described to judge whether the harassing and wrecking number of the calling party is more than for the harassing and wrecking intercept server First intercepts threshold value corresponding to the harassing and wrecking type of calling party;3rd determination sub-module, for if it is determined that the harassing and wrecking type that the harassing and wrecking number of the calling party is more than the calling party corresponds to First intercept threshold value, then the harassing and wrecking intercept server determines the interception attribute of the calling party as that can intercept.
- 11. device according to claim 10, it is characterised in that the determining module also includes:3rd judging submodule, for if it is determined that the interception rule of the callee is sky, the harassing and wrecking intercept server to judge Whether the harassing and wrecking number of the side of crying is more than the second interception threshold value corresponding to the harassing and wrecking type of the calling party;4th determination sub-module, for if it is determined that the harassing and wrecking number of the calling party is less than or equal to the harassing and wrecking of the calling party Second intercepts threshold value corresponding to type, then the harassing and wrecking intercept server determines that the interception attribute of the calling party is to block Cut;5th determination sub-module, for if it is determined that the harassing and wrecking type that the harassing and wrecking number of the calling party is more than the calling party corresponds to First intercept threshold value, then it is described harassing and wrecking intercept server according to the callee by fraud type determine the calling party's Intercept attribute.
- 12. device according to claim 11, it is characterised in that the 5th determination sub-module is additionally operable to:The harassing and wrecking intercept server obtains the communications records and/or user profile of the callee, and according to the callee Communications records and/or user profile determine the callee by fraud type, it is described to be included easily being cheated by fraud type Be not easy to be cheated;If the callee is easily to be cheated by fraud type, the harassing and wrecking intercept server determines blocking for the calling party Attribute is cut as that can intercept;If the callee is to be not easy to be cheated by fraud type, the harassing and wrecking intercept server determines the calling party's Attribute is intercepted as that can not intercept.
- 13. according to the device described in claim any one of 9-12, it is characterised in that the acquisition module is additionally operable to:The harassing and wrecking intercept server inquires and the caller according to the caller identification information from harassing and wrecking information database Interception attribute data corresponding to identification information, and the interception attribute data corresponding with the caller identification information is defined as The harassing and wrecking attribute data of the calling party.
- 14. according to the device described in claim any one of 9-12, it is characterised in that also include:Second receiving module, receive called call flow control device for the harassing and wrecking intercept server and receiving the quilt The refuse to answer instruction of the side of crying or actively not answer command when the interception rule maintenance request that sends;The rule that intercepts is safeguarded Request includes the caller identification information and the called identification information;Regular maintenance module, believed for the harassing and wrecking intercept server according to the caller identification information and the called identification Breath, establish or update the interception rule of the callee.
- 15. device according to claim 14, it is characterised in that the regular maintenance module includes:First acquisition submodule, for the harassing and wrecking intercept server according to the caller identification information, obtain the calling party Harassing and wrecking attribute data;Second acquisition submodule, for the harassing and wrecking intercept server according to the called identification information, obtain the callee Interception rule;Regular setting up submodule, if the interception rule for the callee is sky, the harassing and wrecking intercept server is according to institute The harassing and wrecking attribute data for stating calling party establishes the interception rule of the callee;3rd acquisition submodule, if interception rule for the callee is not sky, the harassing and wrecking intercept server according to The called identification information, obtain the communications records and/or user profile of the callee;7th determination sub-module, believed for the harassing and wrecking intercept server according to the communications records of the callee and/or user Breath, determine the callee by fraud type, it is described to be included easily being cheated and be not easy to be cheated by fraud type;Policy Updates submodule, according to the harassing and wrecking attribute data of the calling party and it is called for the harassing and wrecking intercept server Side by fraud type, update the callee interception rule.
- A kind of 16. harassing call blocking apparatus, it is characterised in that including:Sending module, for when receiving the call request that calling party is initiated callee, calling Row control equipment Sent to harassing and wrecking intercept server and intercept attribute request, the interception attribute request includes caller identification information and called identification is believed Breath, so that the harassing and wrecking intercept server determines blocking for the calling party according to the caller identification information and called identification information Attribute is cut, and the interception attribute of the calling party is sent to the calling Row control equipment;Receiving module, the caller of the harassing and wrecking intercept server transmission is received for the calling Row control equipment The interception attribute of side;Blocking module, if the interception attribute for the calling party is can intercept, the calling Row control equipment is to institute State call request and carry out intercept process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710648556.5A CN107360300B (en) | 2017-08-01 | 2017-08-01 | Crank call interception method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710648556.5A CN107360300B (en) | 2017-08-01 | 2017-08-01 | Crank call interception method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107360300A true CN107360300A (en) | 2017-11-17 |
CN107360300B CN107360300B (en) | 2020-03-13 |
Family
ID=60287282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710648556.5A Active CN107360300B (en) | 2017-08-01 | 2017-08-01 | Crank call interception method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107360300B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108153727A (en) * | 2017-12-18 | 2018-06-12 | 浙江鹏信信息科技股份有限公司 | Utilize the method for semantic mining algorithm mark sales calls and the system of improvement sales calls |
CN109068014A (en) * | 2018-08-21 | 2018-12-21 | 平安科技(深圳)有限公司 | Call limitation method, device, electronic equipment and computer readable storage medium |
CN109195168A (en) * | 2018-11-06 | 2019-01-11 | 中国联合网络通信集团有限公司 | A kind of voice intercepting processing method and system |
CN109451183A (en) * | 2018-12-25 | 2019-03-08 | 吴吉梅 | A method of preventing unwelcome phone |
CN109886012A (en) * | 2019-01-03 | 2019-06-14 | 腾讯科技(深圳)有限公司 | A kind of management method and system of application permission |
CN110445944A (en) * | 2019-08-19 | 2019-11-12 | 携程旅游信息技术(上海)有限公司 | Call center prevents the method and system made nuisance calls |
CN113163056A (en) * | 2021-04-19 | 2021-07-23 | 深圳市安全守护科技有限公司 | Telephone interception method, device, equipment and computer readable storage medium |
CN113766069A (en) * | 2021-09-06 | 2021-12-07 | 中国银行股份有限公司 | Crank call interception method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104601783A (en) * | 2015-01-27 | 2015-05-06 | 深圳市中兴移动通信有限公司 | Communication processing method based on subjective judgment, mobile terminal and system |
CN106878993A (en) * | 2015-12-10 | 2017-06-20 | 中国移动通信集团公司 | A kind of information processing method, system, server and terminal |
-
2017
- 2017-08-01 CN CN201710648556.5A patent/CN107360300B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104601783A (en) * | 2015-01-27 | 2015-05-06 | 深圳市中兴移动通信有限公司 | Communication processing method based on subjective judgment, mobile terminal and system |
CN106878993A (en) * | 2015-12-10 | 2017-06-20 | 中国移动通信集团公司 | A kind of information processing method, system, server and terminal |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108153727A (en) * | 2017-12-18 | 2018-06-12 | 浙江鹏信信息科技股份有限公司 | Utilize the method for semantic mining algorithm mark sales calls and the system of improvement sales calls |
CN109068014A (en) * | 2018-08-21 | 2018-12-21 | 平安科技(深圳)有限公司 | Call limitation method, device, electronic equipment and computer readable storage medium |
CN109195168A (en) * | 2018-11-06 | 2019-01-11 | 中国联合网络通信集团有限公司 | A kind of voice intercepting processing method and system |
CN109451183A (en) * | 2018-12-25 | 2019-03-08 | 吴吉梅 | A method of preventing unwelcome phone |
CN109451183B (en) * | 2018-12-25 | 2021-01-22 | 吴吉梅 | Method for preventing unwelcome telephone |
CN109886012A (en) * | 2019-01-03 | 2019-06-14 | 腾讯科技(深圳)有限公司 | A kind of management method and system of application permission |
CN110445944A (en) * | 2019-08-19 | 2019-11-12 | 携程旅游信息技术(上海)有限公司 | Call center prevents the method and system made nuisance calls |
CN113163056A (en) * | 2021-04-19 | 2021-07-23 | 深圳市安全守护科技有限公司 | Telephone interception method, device, equipment and computer readable storage medium |
CN113766069A (en) * | 2021-09-06 | 2021-12-07 | 中国银行股份有限公司 | Crank call interception method and device |
CN113766069B (en) * | 2021-09-06 | 2023-08-18 | 中国银行股份有限公司 | Harassment call interception method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107360300B (en) | 2020-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107360300A (en) | Harassing call hold-up interception method and device | |
CN105915517A (en) | Realization method for voice verification code service | |
CN110248029A (en) | A kind of method of dynamic select communication line in call | |
CN106936997B (en) | A kind of rubbish voice recognition methods and system based on social networks map | |
CN105187606A (en) | Method for preventing crank calls based on identity authentication | |
CN104636439A (en) | Method and device for analyzing user social relation | |
CN104822139B (en) | A method of communicating number isolation and secret protection are realized based on intermediate number | |
CN106657547A (en) | Method and system for preventing crank calls | |
CN106034185A (en) | Method for responding to calling request and electronic equipment | |
CN108810290B (en) | Method and system for recognizing fraud calls | |
CN109451183A (en) | A method of preventing unwelcome phone | |
CN107295491A (en) | The method and system of automatic screening calling subscribe during call forwarding | |
CN109962893A (en) | A kind of intelligent call method and its relevant device | |
CN107708073A (en) | The method for retrieving and its retrieving system of mobile phone | |
CN107135186A (en) | A kind of method and device of preventing telephone from dialing without admission | |
CN109995707A (en) | A kind of high definition voice is anti-harassment and DDOS attack method and device | |
CN110995937B (en) | Method and device for identifying harassed user | |
CN109151828A (en) | Support recognition methods, device, equipment and the storage medium of card user | |
CN101083842A (en) | Incoming call filtering method and method, equipment and system for setting incoming identification | |
CN104184871B (en) | A kind of method and apparatus prompting harassing call number | |
CN109639913A (en) | A kind of automatic speech harassing and wrecking number processing method, apparatus and system | |
CN108966161A (en) | Call waiting method and system | |
CN106162586A (en) | Method for limiting incoming call, device and system | |
CN106791232A (en) | The means of communication of identity-based certification | |
CN107708103A (en) | The method and system of number secrecy are realized based on MAP signalings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |