CN107872588A - Call processing method, relevant apparatus and system - Google Patents
Call processing method, relevant apparatus and system Download PDFInfo
- Publication number
- CN107872588A CN107872588A CN201610864903.3A CN201610864903A CN107872588A CN 107872588 A CN107872588 A CN 107872588A CN 201610864903 A CN201610864903 A CN 201610864903A CN 107872588 A CN107872588 A CN 107872588A
- Authority
- CN
- China
- Prior art keywords
- calling
- request
- checking
- call request
- calling terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/009—Arrangements for interconnection between switching centres in systems involving PBX or KTS networks
Abstract
In embodiments of the present invention, SBC directly can't be sent, but first determine whether the call request is suspicious after the call request of calling terminal transmission is received to P CSCF equipment, in the case where call request is suspicious, further checking request is sent to calling terminal.SBC receives the auth response that calling terminal returns, and the feedback result carried in auth response the result corresponding with the checking request, when differing, it is abnormal call to assert the calling, then refuses the call request, so as to avoid abnormal call from being continued, the security of calling is enhanced.
Description
Technical field
The present invention relates to communication technical field, in particular to a kind of call processing method, relevant apparatus and system.
Background technology
Enterprise phone is generally all to exchange (private branch exchange, PBX) equipment by bay-line at present
Access IP multimedia subsystem (IP Multimedia Subsystem, IMS), and then access carrier network.The maintenance of enterprise
Maintenance work of the personnel to PBX equipment and internal communication network is difficult persistently to ensure that there is no leak.The PBX equipment of enterprise is once
After invading, hacker can utilize PBX equipment to initiate substantial amounts of international long-distance in the short time, be obtained by international traffic gain sharing
Economic interests.International long-distance is dialed in order to as much as possible in a short time, hacker would generally be dialled using automatic dialing system
Logical international long-distance.
If carrier network can identify that PBX equipment is invaded, it is possible to prevente effectively from or reducing enterprise at this
Loss in the case of kind.Prior art provides a kind of call processing method, and this method obtains the enterprise by analysis system in advance
History message registration in one period (such as some months) of industry user, then obtains the user's according to the history message registration
Calling fingerprint information.After new calling is produced in user, the ticket of user is analyzed, when multiple callings in user bill
When record and inconsistent calling fingerprint information, produce calling alarm and report attendant, whether calling is judged by attendant
Exception simultaneously takes corresponding measure, such as takes user measure out of service.
But the call processing method that prior art provides needs to analyze multiple callings in ticket, causes analysis efficiency
Relatively low, identification abnormal call that can not be promptly and accurately simultaneously takes corresponding measure.
The content of the invention
The embodiments of the invention provide a kind of identification abnormal call, and the method handled abnormal call in time, phase
Close device and system.
On the one hand, the embodiment of the present invention provides a kind of call processing method, applied to Session Border Controller SBC, its
Including the steps:
The call request that calling terminal is sent is received, when to determine the call request be suspicious calling, further acquisition is tested
Card request and corresponding the result;Wherein, the call request that calling terminal is sent can be by PBX device forwards to SBC.
SBC returns to the checking request by response message to the calling terminal, and the checking request is used to verify institute
State calling terminal;The auth response that the calling terminal returns is received, obtains the feedback result carried in the auth response,
When the feedback result carried in the auth response differs with the result, refuse the call request.
In embodiments of the present invention, SBC, can't be directly to P- after the call request of calling terminal transmission is received
CSCF equipment is sent, but first determines whether the call request is suspicious, in the case where call request is suspicious, further to caller
Terminal sends checking request.SBC receive calling terminal return auth response, and the feedback result carried in auth response with
When the result corresponding to the checking request differs, it is abnormal call to assert the calling, then refuses the call request, from
And avoid abnormal call from being continued, enhance the security of calling.
In a possible scheme, feedback result and institute that SBC is also carried in the auth response that calling terminal returns
State the result it is identical when, to call request described in Proxy Call Session Control Function device forwards, carry out normal calling and connect
It is continuous, avoid the normal call of enterprise network content from being prevented from.
In a possible scheme, SBC does not receive also described in the preset time for sending the response message
During the auth response that calling terminal returns, refuse the call request, so as to avoid abnormal call from being processed, there is provided network
Security.
Second aspect, the embodiment of the present invention provide a kind of Session Border Controller corresponding with first aspect, and it is mainly wrapped
Include calling determining module, checking sending module, checking receiving module and verification process module.
Wherein, determining module is called, for receiving the call request of calling terminal transmission, determines the call request for can
When doubting calling, checking request and corresponding the result are obtained;
Sending module is verified, for returning to the checking request, the checking to the calling terminal by response message
Ask to be used to verify the calling terminal;
Receiving module is verified, the auth response returned for receiving the calling terminal, obtains and is taken in the auth response
The feedback result of band;
Verification process module, feedback result and the result for being carried in the auth response differ
When, refuse the call request.
In a possible scheme, the verification process module in Session Border Controller is additionally operable in the auth response
, please to calling described in Proxy Call Session Control Function device forwards when the feedback result of middle carrying is identical with the result
Ask, avoid preventing normal call request.In addition, the verification process module is additionally operable to sending the pre- of the response message
If do not receive the auth response that the calling terminal returns in the time, then refuse the call request, improve the peace of network
Quan Xing.
The third aspect, the embodiment of the present invention provide a kind of call processing system, and it includes the border net described in second aspect
Gateway controller and the Proxy Call Session Control Function equipment being connected with borde gateway controller.
In the embodiment provided in terms of any of the above, SBC returns to the checking by response message to calling terminal please
The process asked can specifically include:
SBC sends to the calling terminal and establishes two-way media stream between 183 response messages, with the calling terminal, so
The calling terminal is flowed to by the two-way media of foundation afterwards and plays checking voice, verifies the legitimacy of the caller.
In the embodiment provided in terms of any of the above, SBC receives the auth response that calling terminal returns, and is tested described in acquisition
The feedback result carried in card response can specifically include:
SBC receives the voice response that calling terminal is returned by the two-way media stream, and language is carried out to the voice response
Sound processing obtains the feedback result wherein carried.
In the embodiment provided in terms of any of the above, SBC obtains checking request and corresponding the result specifically can be with
Including:SBC obtains checking request and corresponding the result at random from local problem base, or, SBC obtains to checking equipment
Checking request and corresponding the result.Wherein, it is the equipment beyond SBC to verify equipment, wherein being stored with checking request and right
The result answered, and can upgrade in time checking request and corresponding the result, to improve security.
In the embodiment provided in terms of any of the above, called number is carried in the call request that SBC is received, it is described
SBC determines that the call request can specifically include for suspicious calling:
Called numbers of the SBC in the time and the call request for receiving the call request is exhaled described in determining
Cry and determine whether include the called number in local suspicious number storehouse for suspicious calling, or SBC, if, it is determined that institute
It is suspicious calling to state call request.
In the embodiment provided in terms of any of the above, SBC can also receive fraud management system (Fraud
Management System, FMS) send suspicious number storehouse update the data, then update the suspicious number storehouse locally preserved,
Improve the recognition accuracy of suspicious number.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.Wherein:
Fig. 1 is the networking schematic diagram for the call processing system that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the call processing method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the call processing method that the embodiment of the present invention three provides;
Fig. 4 is the hardware structure diagram for the Session Border Controller that the embodiment of the present invention four provides;
Fig. 5 is the structural representation for the Session Border Controller that the embodiment of the present invention five provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are obtained every other under the premise of performing creative labour is not made
Embodiment, belong to the scope of protection of the invention.
The present invention provides a kind of call processing method, relevant apparatus and system, and referring to Fig. 1, Fig. 1 is the embodiment of the present invention one
The networking schematic diagram of the call processing system of offer.
As shown in figure 1, call processing system of the present invention includes the Session Border Controller in carrier network
(Session Border Controller, SBC), Proxy Call Session Control Function (Proxy Call Session
Control Function, P-CSCF) equipment and PBX equipment and terminal device in enterprise network, terminal device can wrap
Including IMS telephone set.
Wherein, PBX equipment can be used for gathering the call request that the terminal device inside enterprise network is initiated, and will calling
Request is sent out, such as is sent to Session Border Controller SBC.PBX equipment is additionally operable to the calling of outside being transmitted to correspondingly
Terminal device.
SBC has the function that terminal device being linked into IMS core net, and the equipment of core net includes P-CSCF equipment.SBC
Major function include access permission control, network topology hide etc..SBC will be called after normal call request is received
It please be transmitted to P-CSCF equipment and carry out call proceeding.P-CSCF equipment can be used for carrying out the call request that terminal device is initiated
Call proceeding.
As shown in Fig. 2 the call processing method that the embodiment of the present invention two provides specifically comprises the following steps:
Step 201, SBC receive the call request that calling terminal is sent, and when to determine the call request be suspicious calling, obtain
Take checking request and corresponding the result.
Wherein, the call request that calling terminal is sent can be by PBX device forwards to SBC.The call request can be by looking forward to
Normal users in industry network are initiated, and can also be initiated by the hacker for having invaded enterprise network by controlled terminal.
SBC can be by judging that time, called number etc. that call request initiates determine the call request for suspicious calling.
For example, the time that the call request is initiated is located at 23 points to 6 points of local time, called number is international long-distance number etc..This
Outside, SBC can also determine whether call request is suspicious calling according to the suspicious number storehouse locally preserved.Judge that calling please
Whether the called number asked belongs to included in suspicious number storehouse, if included in suspicious number storehouse, judges that the calling please
Ask as suspicious calling.Otherwise, it is suspicious calling to be not considered as the call request.
Wherein, SBC can be obtained to the fraud management system FMS in carrier network and updated the data, and carrying out local update can
Number storehouse is doubted, so as to improve the precision of call request identification.
Further, SBC it is determined that the call request be suspicious calling after, can at random obtain and test from local problem base
Card request and corresponding the result, SBC can also obtain checking request and corresponding the result to checking equipment.Checking is set
Standby can be special preservation checking request and the equipment of corresponding the result.
Wherein, checking request and the result are mutually corresponding.Checking request can be that picture is putd question to or verified to voice
Deng, such as " 15 plus 2 equal to how many ".Corresponding the result is " 17 ".
Step 202, SBC return to the checking request by response message to the calling terminal, and the checking request is used
In the checking calling terminal.
Specifically, SBC can send 183 response messages to calling terminal, it is double so as to be established between the calling terminal
To Media Stream, the calling terminal is flowed to by the two-way media and plays checking voice.Wherein, carried in 183 response messages
The media address of the Session Border Controller, it is easy to calling terminal to return to auth response to SBC according to the media address.
After calling terminal receives checking request, the checking voice in checking request is played, such as " 15 plus 2 are equal to for broadcasting
How much ".If the user of calling terminal is normal users, it is anti-that user can input (voice or dialing input) by calling terminal
Present result 17.If the user of calling terminal is hacker, hacker simulates multiple calling terminals usually using virtual dial-up software and dialled,
The checking request that each calling terminal receives can not be directed to and obtain feedback result, so as to which correct feedback result can not be returned.
Step 203, SBC receive the auth response that the calling terminal returns, obtain carried in the auth response it is anti-
Present result.
Specifically, SBC receives the voice response that calling terminal is returned by above-mentioned two-way media stream, and voice response is entered
Row speech processes (such as speech recognition) obtain the feedback result wherein carried.
In addition, SBC can start timing after checking request is sent, if user exceedes the non-input feedback knot of preset duration
Fruit, then SBC can consider the feedback result that is carried in auth response for sky.
When the feedback result that step 204, SBC are carried in auth response differs with the result, described in refusal
Call request.
Specifically, SBC judges the feedback result the result phase whether corresponding with checking request carried in auth response
Together, if it is different, then illustrating that the calling is abnormal call, the calling is refused, such as abandon the calling.
In addition, if user exceedes the non-input feedback result of preset duration, SBC is it is also assumed that the calling is exhaled to be abnormal
Cry, directly refuse the call request.
In the present embodiment, SBC directly can't be set after the call request of calling terminal transmission is received to P-CSCF
Preparation is sent, but first determines whether the call request is suspicious, in the case where call request is suspicious, is further sent out to calling terminal
Send checking request.SBC receives the auth response that calling terminal returns, and the feedback result carried in auth response is tested with described
When the result corresponding to card request differs, it is abnormal call to assert the calling, then refuses the call request, so as to avoid
Abnormal call is continued, and enhances the security of calling.
The calling-control method that the present embodiment provides can also comprise the following steps:
When step 205, the feedback result carried in the auth response are identical with the result, SBC is to agency
Call session control functional equipment forwards the call request.
Specifically, the feedback result that SBC is carried in auth response is judged is identical with the result corresponding to checking request
When, then the user that explanation initiates the calling is normal users, then performs normal call flows, the call request is not entered
Row intercepts.For example, to call request described in P-CSCF device forwards, P-CSCF equipment continues to the calling, so as to avoid
The call request of normal users is rejected.
Referring to Fig. 3, Fig. 3 is the flow chart for the call processing method that the embodiment of the present invention three provides.
In the present embodiment, hacker attacks enterprise network, virtual dial-up software simulation calling terminal is used to dial, calling
Specific international long-distance number, PBX equipment send out SBC of the call request into carrier network after call request is received
Send.Call processing method provided in an embodiment of the present invention comprises the following steps:
Step 301, SBC receive the call request of PBX device forwards, and called number is carried in call request.
Wherein, call request can specifically be sent by invitation (invite) message in session initiation protocol.
Called number, such as the international long-distance number of particular country are carried in invite message.
Step 302, SBC return to 100Trying message to PBX equipment, show that SBC have received invite message.
Step 303, SBC determine that the call request is suspicious calling according to suspicious number storehouse, are obtained from local problem base
Speech verification is asked and the result.
In the present embodiment, SBC locally saves suspicious number storehouse, for showing to dial number in the suspicious number storehouse
Call as suspicious calling.SBC is matched the called number carried in call request in suspicious number storehouse, if matching into
Work(, it is determined that the call request is suspicious calling.If matching is unsuccessful, illustrate that the calling belongs to normal call, to P-CSCF
Invite message described in device forwards.
In addition, SBC equipment can also determine whether the calling is suspicious calling according to the initiation time of call request, such as
The calling initiation time is 23 points to 6 points of local time, then it is assumed that is suspicious calling.Wherein, it is above-mentioned judge call request whether be
The condition of suspicious calling can be used in combination.
Specifically, SBC obtains speech verification request and the result at random from local problem base.Speech verification result can
Think " 16*2 is equal to how many ", corresponding the result is " 32 ".Wherein, multiple checkings are saved in the problem base of SBC locals please
Ask, SBC can strengthen the security of verification process from checking request is locally obtained at random.
Step 304, SBC return to 183 response messages to PBX equipment, and two-way media stream is established between calling terminal.
Wherein, SBC media address is carried in 183 response messages.In addition, calling terminal can also receive 183 sound
After answering message, return to Temporary Response and confirm (Provisional Response Acknowledgement, Prack) message, table
Bright calling terminal receives 183 response message.
Step 305, SBC flow to calling terminal by two-way media and send speech verification request.
In the present embodiment, hacker can by software analog subscriber send auth response, such as by software dialing or
Auth response can be sent to SBC by sending voice, and hacker can not also send auth response.
In addition, SBC, in local boot timer, can also be returned and test after speech verification request is sent to calling terminal
Card response carries out timing.
Step 306, SBC receive the auth response that calling terminal returns, and obtain the feedback knot carried in the auth response
Fruit.
The feedback carried specifically, SBC can be collected the digits by speech recognition technology or voice in technical limit spacing auth response
As a result.
When step 307, the feedback result carried in the auth response differ with the result, SBC is abandoned
The call request.
In the present embodiment, because hacker generally initiates substantial amounts of call request simultaneously, thus it is difficult to by for each
Checking request sends the auth response for carrying correct feedback result.The feedback knot carried in the auth response that thus SBC is received
Fruit is different from the result corresponding to checking request, and SBC directly abandons the call request, does not send the calling to P-CSCF equipment
Request.
If in addition, SBC local timer exceed preset time in do not receive also calling terminal return auth response,
It also hold that the calling is abnormal call, the calling is directly abandoned.
Compared with prior art, the embodiment of the present invention is sent out by increasing the judgement to suspicious calling, and for suspicious calling
Checking request is sent to calling terminal to verify whether the calling is abnormal call, actively blocks suspicious calling.It can thus avoid
Enterprise network is initiated to lose caused by substantial amounts of abnormal call, improves the security of enterprise network after by hacker attacks.
Meanwhile normal Client-initiated call request can be identified, normal call request is sent into P-CSCF equipment is called
Continue, do not influence being smoothed out for normal call.
Referring to Fig. 4, Fig. 4 is the hardware structure diagram for the Session Border Controller that the embodiment of the present invention four provides.
Wherein, the Session Border Controller described in Fig. 4 can be the Session Border Controller shown in Fig. 1.Session border control
Device processed employs general computer hardware, and it includes processor 401, memory 402, bus 403, input equipment 404, output
Equipment 405 and network interface 406.
Specifically, memory 402 can include the computer storage matchmaker in the form of volatibility and/or nonvolatile memory
Body, such as read-only storage and/or random access memory.Memory 402 can store an operating system, application program, other journeys
Sequence module, executable code and routine data.
Input equipment 404 can be used for Session Border Controller input order and information, input equipment 404 such as keyboard or
Sensing equipment, such as mouse, trace ball, touch pad, microphone, control stick, game mat, satellite tv antenna, scanner or similar
Equipment.These input equipments can be connected to processor 401 by bus 403.
Output equipment 405 can be used for Session Border Controller output information, in addition to the monitor, output equipment 405
Can also be that other periphery outputs are set respectively, such as loudspeaker and/or printing device, these output equipments can also pass through bus 403
It is connected to processor 401.
Session Border Controller can be connected in network by network interface 406, such as is connected to LAN (Local
Area Network, LAN).Under networked environment, the computer executed instructions stored in Session Border Controller can be stored in
In remote storage device, and it is not limited to be locally stored.
When the executable code stored in the execution memory 402 of processor 401 in Session Border Controller or using journey
During sequence, Session Border Controller can perform the method for the Session Border Controller side in above example two, embodiment three
Step, such as perform step 201-205,301-307 etc..Specific implementation procedure referring to above-described embodiment two and embodiment three,
This is repeated no more.
Referring to Fig. 5, Fig. 5 is the structural representation for the Session Border Controller that the embodiment of the present invention five provides.
As illustrated, Session Border Controller provided in an embodiment of the present invention includes:
Determining module 510 is called, for receiving the call request of calling terminal transmission, it is suspicious to determine the call request
During calling, checking request and corresponding the result are obtained.
Wherein, call the acquisition checking request of determining module 510 and corresponding the result specifically can be in the following way
Realize:Call determining module 510 and obtain checking request and corresponding the result at random from local problem base, or, calling
Determining module 510 obtains checking request and corresponding the result to checking equipment.
Called number is carried in the call request that calling terminal is sent, calling determining module 510 determines the call request
It can specifically be realized in the following way for suspicious calling:Determining module 510 is called according to the time for receiving call request
And the called number in call request determines that the calling is suspicious calling, or calling determining module 510 determines local
Whether the called number is included in suspicious number storehouse, if, it is determined that the call request is suspicious calling.
Sending module 520 is verified, it is described to test for returning to the checking request to the calling terminal by response message
Card request is used to verify the calling terminal.
Wherein, verify that sending module 520 returns to the checking request to calling terminal by response message and can specifically led to
Cross following manner realization:Checking sending module sends to 520 calling terminals and built between 183 response messages, with the calling terminal
Vertical two-way media stream;Then the calling terminal is flowed to by the two-way media of foundation and plays checking voice.
Receiving module 530 is verified, the auth response returned for receiving the calling terminal, is obtained in the auth response
The feedback result of carrying;
Wherein, verify that receiving module 530 receives the auth response that calling terminal returns, obtain and carried in the auth response
Feedback result can specifically realize in the following way:The checking reception calling terminal of receiving module 530 passes through described two-way
The voice response that Media Stream returns, speech processes are carried out to the voice response and obtain the feedback result wherein carried.
Verification process module 540, for the feedback result that is carried in the auth response and the result not phase
Meanwhile refuse the call request.
Session Border Controller provided in an embodiment of the present invention can be used in previous embodiment one, two and three, and it is logical
Cross above-mentioned calling determining module 510, checking sending module 520 and checking receiving module 530, verification process module 540 it
Between cooperation complete the method and step performed by the Session Border Controller in embodiment two, embodiment three.With prior art
In Session Border Controller compare, the present embodiment provide Session Border Controller when performing call request handling process,
With with preceding method embodiment identical beneficial effect, details referring to above method embodiment description.
In the Session Border Controller that the present embodiment provides, above-mentioned verification process module 540 is additionally operable to test described
When the feedback result carried in card response is identical with the result, to described in Proxy Call Session Control Function device forwards
Call request.
In the Session Border Controller that the present embodiment provides, verification process module 540 is additionally operable to sending the response
When not receiving the auth response that the calling terminal returns in the preset time that message rises, then refuse the call request, example
As abandoned the calling, so as to avoid abnormal call from being continued, the security of calling is enhanced.
In the present embodiment, Session Border Controller is presented in the form of functional unit.Here " unit " can be with
Refer to ASIC (application-specific integrated circuit, ASIC), circuit, perform one
The processor and memory of individual or multiple softwares or firmware program, integrated logic circuit, and/or other can provide above-mentioned function
Device.In a simple embodiment, those skilled in the art is contemplated that Session Border Controller can also use
Form shown in Fig. 4.Determining module 510 is called, verifies sending module 520, checking receiving module 530, verification process module 540
The function of being realized can be realized by the processor 401 in Fig. 4 and memory 402.For example, calling determining module 510
The call request that calling terminal is sent is received, when to determine call request be suspicious calling, acquisition checking request and corresponding checking
As a result specifically can be by performing the code stored in memory 402 by processor 401 to realize.
It will be recognized by those of ordinary skill in the art that the possibility implementation of various aspects of the invention or various aspects
System, method or computer program product can be embodied as.Therefore, each aspect of the present invention or various aspects
Possible implementation can use complete hardware embodiment, complete software embodiment (including firmware, resident software etc.), or
The form of the embodiment of integration software and hardware aspect, collectively referred to herein as " circuit ", " module " or " system ".In addition,
The possibility implementation of each aspect of the present invention or various aspects can use the form of computer program product, computer journey
Sequence product refers to be stored in the computer readable program code in computer-readable medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.
Claims (15)
- A kind of 1. call processing method, applied to Session Border Controller, it is characterised in that including:The call request that calling terminal is sent is received, when to determine the call request be suspicious calling, acquisition checking request and right The result answered;The checking request is returned to the calling terminal by response message, the checking request is used to verify that the caller is whole End;The auth response that the calling terminal returns is received, obtains the feedback result carried in the auth response;When the feedback result carried in the auth response differs with the result, refuse the call request.
- 2. the method as described in claim 1, it is characterised in that also include:When the feedback result carried in the auth response is identical with the result, to Proxy Call Session Control Function Call request described in device forwards.
- 3. method as claimed in claim 2, it is characterised in that described that the checking is returned to calling terminal by response message Request specifically includes:Sent to the calling terminal and establish two-way media stream between 183 response messages, with the calling terminal;The calling terminal is flowed to by the two-way media and plays checking voice.
- 4. method as claimed in claim 3, it is characterised in that the auth response for receiving calling terminal and returning, obtain institute Stating the feedback result carried in auth response includes:Receive the voice response that calling terminal is returned by the two-way media stream;Speech processes are carried out to the voice response and obtain the feedback result wherein carried.
- 5. method as claimed in claim 1 or 2, it is characterised in that also include:If not receiving the auth response that the calling terminal returns in the preset time for sending the response message, refuse The exhausted call request.
- 6. method as claimed in claim 1 or 2, it is characterised in that the acquisition checking request and corresponding the result bag Include:Obtain checking request and corresponding the result at random from local problem base, or,Checking request and corresponding the result are obtained to checking equipment.
- 7. method as claimed in claim 2, it is characterised in that called number, the determination institute are carried in the call request State call request includes for suspicious calling:Called number in the time and the call request for receiving the call request determines the calling for can Calling is doubted, orIt is determined that whether the called number is included in local suspicious number storehouse, if, it is determined that the call request is suspicious Calling.
- 8. method as claimed in claim 7, it is characterised in that also include:Receive the suspicious number storehouse that fraud management system FMS is sent to update the data, update the suspicious number storehouse locally preserved.
- A kind of 9. Session Border Controller, it is characterised in that including:Determining module is called, for receiving the call request of calling terminal transmission, when to determine the call request be suspicious calling, Obtain checking request and corresponding the result;Sending module is verified, for returning to the checking request, the checking request to the calling terminal by response message For verifying the calling terminal;Receiving module is verified, the auth response returned for receiving the calling terminal, obtains what is carried in the auth response Feedback result;Verification process module, when feedback result and the result for being carried in the auth response differ, refuse The exhausted call request.
- 10. Session Border Controller as claimed in claim 9, it is characterised in thatThe verification process module be additionally operable to the feedback result that is carried in the auth response it is identical with the result when, To call request described in Proxy Call Session Control Function device forwards.
- 11. Session Border Controller as claimed in claim 9, it is characterised in that the checking sending module is disappeared by response Cease and specifically included to the calling terminal return checking request:Checking sending module sends to the calling terminal and establishes two-way media between 183 response messages, with the calling terminal Stream;The calling terminal is flowed to by the two-way media and plays checking voice.
- 12. Session Border Controller as claimed in claim 9, it is characterised in that it is whole that the checking receiving module receives caller The auth response returned is held, the feedback result carried in the auth response is obtained and specifically includes:Checking receiving module receives the voice response that calling terminal is returned by the two-way media stream, and the voice response is entered Row speech processes obtain the feedback result wherein carried.
- 13. the Session Border Controller as described in claim any one of 9-12, it is characterised in thatThe verification process module is additionally operable to not receive the caller end in the preset time for sending the response message When holding the auth response returned, then refuse the call request.
- 14. the Session Border Controller as described in claim any one of 9-12, it is characterised in that the calling determining module obtains Checking request and corresponding the result is taken to specifically include:Call determining module and obtain checking request and corresponding the result at random from local problem base, or, calling determines Module obtains checking request and corresponding the result to checking equipment.
- 15. the Session Border Controller as described in claim any one of 9-12, it is characterised in that carried in the call request Called number, the calling determining module determine that the call request includes for suspicious calling:Called number of the determining module in the time and the call request for receiving the call request is called to determine The calling is suspicious calling, orCalling determining module determines whether include the called number in local suspicious number storehouse, if, it is determined that it is described to exhale It is suspicious calling to cry request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610864903.3A CN107872588B (en) | 2016-09-28 | 2016-09-28 | Call processing method, related device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610864903.3A CN107872588B (en) | 2016-09-28 | 2016-09-28 | Call processing method, related device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107872588A true CN107872588A (en) | 2018-04-03 |
CN107872588B CN107872588B (en) | 2021-06-29 |
Family
ID=61761401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864903.3A Active CN107872588B (en) | 2016-09-28 | 2016-09-28 | Call processing method, related device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107872588B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661922A (en) * | 2018-06-29 | 2020-01-07 | 中国移动通信有限公司研究院 | Call control method, network device and system |
CN110874911A (en) * | 2019-11-12 | 2020-03-10 | 上海盛付通电子支付服务有限公司 | Information transmission method, electronic device, and computer-readable storage medium |
CN114979980A (en) * | 2021-12-14 | 2022-08-30 | 中移互联网有限公司 | SIP message communication method, terminal equipment and network equipment thereof |
US11576048B1 (en) * | 2020-04-28 | 2023-02-07 | T-Mobile Innovations Llc | Mitigating authentication-based hacking of access restricted telecommunication services |
TWI803788B (en) * | 2020-11-12 | 2023-06-01 | 中華電信股份有限公司 | Method and system for preventing robots from dialing international fraudulent calls |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006025374A (en) * | 2004-07-09 | 2006-01-26 | Fujitsu Ltd | Unauthorized usage verifying system of wireless communication |
CN101207837A (en) * | 2007-12-12 | 2008-06-25 | 华为技术有限公司 | Apparatus and method for preventing telephone harassment |
CN101277341A (en) * | 2008-04-28 | 2008-10-01 | 华为技术有限公司 | Call processing method, system as well as verification server and interactive voice answering system |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN102118874A (en) * | 2009-12-31 | 2011-07-06 | 华为技术有限公司 | Call processing method and mobile switching center |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103167091A (en) * | 2011-12-14 | 2013-06-19 | 中国电信股份有限公司 | Countering device and method of malicious group phone calls |
JP2013183295A (en) * | 2012-03-01 | 2013-09-12 | Nec Commun Syst Ltd | Third party automatic notification system, telephone unit, third party automatic notification method and third party automatic notification program |
CN103327196A (en) * | 2012-03-19 | 2013-09-25 | 陈戈 | Method for telephone access and system thereof |
CN104717370A (en) * | 2013-12-11 | 2015-06-17 | 中国移动通信集团河北有限公司 | Internetwork dialing service monitoring method and device |
CN104767893A (en) * | 2015-02-13 | 2015-07-08 | 广州市讯飞樽鸿信息技术有限公司 | Crank call interception method and system |
CN104917905A (en) * | 2015-04-16 | 2015-09-16 | 腾讯科技(北京)有限公司 | Strange incoming call processing method, terminal and server |
CN105049647A (en) * | 2015-08-07 | 2015-11-11 | 北京思特奇信息技术股份有限公司 | Method and system for shielding crank call |
CN105187667A (en) * | 2015-10-09 | 2015-12-23 | 小米科技有限责任公司 | Incoming call processing method and device |
CN105188064A (en) * | 2015-08-07 | 2015-12-23 | 广东欧珀移动通信有限公司 | Method and device for shielding crank calls and short messages |
CN105306409A (en) * | 2014-05-30 | 2016-02-03 | 展讯通信(上海)有限公司 | Call verification system and method and mobile terminal |
CN105530389A (en) * | 2015-12-03 | 2016-04-27 | 中国联合网络通信集团有限公司 | Voice message leaving method and device based on IMS (IP Multimedia Subsystem) network |
CN105635071A (en) * | 2014-11-05 | 2016-06-01 | 中兴通讯股份有限公司 | Method and switch for preventing harassing call |
CN105828334A (en) * | 2015-01-09 | 2016-08-03 | 中国移动通信集团河北有限公司 | Monitoring method and system for positioning illegal callback service |
-
2016
- 2016-09-28 CN CN201610864903.3A patent/CN107872588B/en active Active
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006025374A (en) * | 2004-07-09 | 2006-01-26 | Fujitsu Ltd | Unauthorized usage verifying system of wireless communication |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101207837A (en) * | 2007-12-12 | 2008-06-25 | 华为技术有限公司 | Apparatus and method for preventing telephone harassment |
CN101277341A (en) * | 2008-04-28 | 2008-10-01 | 华为技术有限公司 | Call processing method, system as well as verification server and interactive voice answering system |
CN102118874A (en) * | 2009-12-31 | 2011-07-06 | 华为技术有限公司 | Call processing method and mobile switching center |
CN103167091A (en) * | 2011-12-14 | 2013-06-19 | 中国电信股份有限公司 | Countering device and method of malicious group phone calls |
JP2013183295A (en) * | 2012-03-01 | 2013-09-12 | Nec Commun Syst Ltd | Third party automatic notification system, telephone unit, third party automatic notification method and third party automatic notification program |
CN103327196A (en) * | 2012-03-19 | 2013-09-25 | 陈戈 | Method for telephone access and system thereof |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN104717370A (en) * | 2013-12-11 | 2015-06-17 | 中国移动通信集团河北有限公司 | Internetwork dialing service monitoring method and device |
CN105306409A (en) * | 2014-05-30 | 2016-02-03 | 展讯通信(上海)有限公司 | Call verification system and method and mobile terminal |
CN105635071A (en) * | 2014-11-05 | 2016-06-01 | 中兴通讯股份有限公司 | Method and switch for preventing harassing call |
CN105828334A (en) * | 2015-01-09 | 2016-08-03 | 中国移动通信集团河北有限公司 | Monitoring method and system for positioning illegal callback service |
CN104767893A (en) * | 2015-02-13 | 2015-07-08 | 广州市讯飞樽鸿信息技术有限公司 | Crank call interception method and system |
CN104917905A (en) * | 2015-04-16 | 2015-09-16 | 腾讯科技(北京)有限公司 | Strange incoming call processing method, terminal and server |
CN105049647A (en) * | 2015-08-07 | 2015-11-11 | 北京思特奇信息技术股份有限公司 | Method and system for shielding crank call |
CN105188064A (en) * | 2015-08-07 | 2015-12-23 | 广东欧珀移动通信有限公司 | Method and device for shielding crank calls and short messages |
CN105187667A (en) * | 2015-10-09 | 2015-12-23 | 小米科技有限责任公司 | Incoming call processing method and device |
CN105530389A (en) * | 2015-12-03 | 2016-04-27 | 中国联合网络通信集团有限公司 | Voice message leaving method and device based on IMS (IP Multimedia Subsystem) network |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661922A (en) * | 2018-06-29 | 2020-01-07 | 中国移动通信有限公司研究院 | Call control method, network device and system |
CN110661922B (en) * | 2018-06-29 | 2021-05-25 | 中国移动通信有限公司研究院 | Call control method, network device and system |
CN110874911A (en) * | 2019-11-12 | 2020-03-10 | 上海盛付通电子支付服务有限公司 | Information transmission method, electronic device, and computer-readable storage medium |
CN110874911B (en) * | 2019-11-12 | 2022-04-22 | 上海盛付通电子支付服务有限公司 | Information transmission method, electronic device, and computer-readable storage medium |
US11576048B1 (en) * | 2020-04-28 | 2023-02-07 | T-Mobile Innovations Llc | Mitigating authentication-based hacking of access restricted telecommunication services |
TWI803788B (en) * | 2020-11-12 | 2023-06-01 | 中華電信股份有限公司 | Method and system for preventing robots from dialing international fraudulent calls |
CN114979980A (en) * | 2021-12-14 | 2022-08-30 | 中移互联网有限公司 | SIP message communication method, terminal equipment and network equipment thereof |
CN114979980B (en) * | 2021-12-14 | 2023-07-21 | 中移互联网有限公司 | Communication method of SIP message, terminal equipment and network equipment thereof |
Also Published As
Publication number | Publication date |
---|---|
CN107872588B (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107872588A (en) | Call processing method, relevant apparatus and system | |
CN105119877B (en) | Speech verification method, apparatus and system | |
CN103891246B (en) | Webpage real-time Communication for Power call transfer method and device | |
US8457290B2 (en) | Method, apparatus, and computer program products for providing dynamic replacement communication identification service | |
WO2017091401A1 (en) | Identity authentication method, system, business server and authentication server | |
EP3162104B1 (en) | A method to authenticate calls in a telecommunication system | |
CN105141628B (en) | A kind of method and device for realizing push | |
JP5477379B2 (en) | Rogue call detection device, rogue call detection method, and rogue call detection program | |
RU2642483C2 (en) | Method and device for conference access | |
CN101150631A (en) | A method and device for setting call forward | |
CN107483398B (en) | A kind of silence verification method and device, electronic equipment | |
EP2963957B1 (en) | Method and device for calling by binding client to terminal | |
CN105471680A (en) | Network voice communication testing system and method | |
US20190007553A1 (en) | Method, System and Device for an Enhanced Call Setup with Verification of a User Equipment in a Telecommunications Network | |
CN106453799B (en) | Manipulative communications deception recognition methods and system | |
CN108353101A (en) | System and method for establishing communication on multiple communications platforms | |
US20230208967A1 (en) | Site link tester via unique phone emulation | |
CN106921951B (en) | Number method for secret protection and system and relevant device based on relationship number | |
CN107493293A (en) | A kind of method of sip terminal access authentication | |
CN102480487B (en) | Multi-user on-line video game method based on authentication and system thereof | |
CN106790199B (en) | Verification code processing method and device | |
CN109995707A (en) | A kind of high definition voice is anti-harassment and DDOS attack method and device | |
CN102833215B (en) | A kind of method and apparatus of enhancing SIP FORKING call functions | |
Voznak et al. | Web-based IP telephony penetration system evaluating level of protection from attacks and threats | |
CN107105430A (en) | A kind of number authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |