CN107872588A - Call processing method, relevant apparatus and system - Google Patents

Call processing method, relevant apparatus and system Download PDF

Info

Publication number
CN107872588A
CN107872588A CN201610864903.3A CN201610864903A CN107872588A CN 107872588 A CN107872588 A CN 107872588A CN 201610864903 A CN201610864903 A CN 201610864903A CN 107872588 A CN107872588 A CN 107872588A
Authority
CN
China
Prior art keywords
calling
request
checking
call request
calling terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610864903.3A
Other languages
Chinese (zh)
Other versions
CN107872588B (en
Inventor
孟斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201610864903.3A priority Critical patent/CN107872588B/en
Publication of CN107872588A publication Critical patent/CN107872588A/en
Application granted granted Critical
Publication of CN107872588B publication Critical patent/CN107872588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/009Arrangements for interconnection between switching centres in systems involving PBX or KTS networks

Abstract

In embodiments of the present invention, SBC directly can't be sent, but first determine whether the call request is suspicious after the call request of calling terminal transmission is received to P CSCF equipment, in the case where call request is suspicious, further checking request is sent to calling terminal.SBC receives the auth response that calling terminal returns, and the feedback result carried in auth response the result corresponding with the checking request, when differing, it is abnormal call to assert the calling, then refuses the call request, so as to avoid abnormal call from being continued, the security of calling is enhanced.

Description

Call processing method, relevant apparatus and system
Technical field
The present invention relates to communication technical field, in particular to a kind of call processing method, relevant apparatus and system.
Background technology
Enterprise phone is generally all to exchange (private branch exchange, PBX) equipment by bay-line at present Access IP multimedia subsystem (IP Multimedia Subsystem, IMS), and then access carrier network.The maintenance of enterprise Maintenance work of the personnel to PBX equipment and internal communication network is difficult persistently to ensure that there is no leak.The PBX equipment of enterprise is once After invading, hacker can utilize PBX equipment to initiate substantial amounts of international long-distance in the short time, be obtained by international traffic gain sharing Economic interests.International long-distance is dialed in order to as much as possible in a short time, hacker would generally be dialled using automatic dialing system Logical international long-distance.
If carrier network can identify that PBX equipment is invaded, it is possible to prevente effectively from or reducing enterprise at this Loss in the case of kind.Prior art provides a kind of call processing method, and this method obtains the enterprise by analysis system in advance History message registration in one period (such as some months) of industry user, then obtains the user's according to the history message registration Calling fingerprint information.After new calling is produced in user, the ticket of user is analyzed, when multiple callings in user bill When record and inconsistent calling fingerprint information, produce calling alarm and report attendant, whether calling is judged by attendant Exception simultaneously takes corresponding measure, such as takes user measure out of service.
But the call processing method that prior art provides needs to analyze multiple callings in ticket, causes analysis efficiency Relatively low, identification abnormal call that can not be promptly and accurately simultaneously takes corresponding measure.
The content of the invention
The embodiments of the invention provide a kind of identification abnormal call, and the method handled abnormal call in time, phase Close device and system.
On the one hand, the embodiment of the present invention provides a kind of call processing method, applied to Session Border Controller SBC, its Including the steps:
The call request that calling terminal is sent is received, when to determine the call request be suspicious calling, further acquisition is tested Card request and corresponding the result;Wherein, the call request that calling terminal is sent can be by PBX device forwards to SBC.
SBC returns to the checking request by response message to the calling terminal, and the checking request is used to verify institute State calling terminal;The auth response that the calling terminal returns is received, obtains the feedback result carried in the auth response, When the feedback result carried in the auth response differs with the result, refuse the call request.
In embodiments of the present invention, SBC, can't be directly to P- after the call request of calling terminal transmission is received CSCF equipment is sent, but first determines whether the call request is suspicious, in the case where call request is suspicious, further to caller Terminal sends checking request.SBC receive calling terminal return auth response, and the feedback result carried in auth response with When the result corresponding to the checking request differs, it is abnormal call to assert the calling, then refuses the call request, from And avoid abnormal call from being continued, enhance the security of calling.
In a possible scheme, feedback result and institute that SBC is also carried in the auth response that calling terminal returns State the result it is identical when, to call request described in Proxy Call Session Control Function device forwards, carry out normal calling and connect It is continuous, avoid the normal call of enterprise network content from being prevented from.
In a possible scheme, SBC does not receive also described in the preset time for sending the response message During the auth response that calling terminal returns, refuse the call request, so as to avoid abnormal call from being processed, there is provided network Security.
Second aspect, the embodiment of the present invention provide a kind of Session Border Controller corresponding with first aspect, and it is mainly wrapped Include calling determining module, checking sending module, checking receiving module and verification process module.
Wherein, determining module is called, for receiving the call request of calling terminal transmission, determines the call request for can When doubting calling, checking request and corresponding the result are obtained;
Sending module is verified, for returning to the checking request, the checking to the calling terminal by response message Ask to be used to verify the calling terminal;
Receiving module is verified, the auth response returned for receiving the calling terminal, obtains and is taken in the auth response The feedback result of band;
Verification process module, feedback result and the result for being carried in the auth response differ When, refuse the call request.
In a possible scheme, the verification process module in Session Border Controller is additionally operable in the auth response , please to calling described in Proxy Call Session Control Function device forwards when the feedback result of middle carrying is identical with the result Ask, avoid preventing normal call request.In addition, the verification process module is additionally operable to sending the pre- of the response message If do not receive the auth response that the calling terminal returns in the time, then refuse the call request, improve the peace of network Quan Xing.
The third aspect, the embodiment of the present invention provide a kind of call processing system, and it includes the border net described in second aspect Gateway controller and the Proxy Call Session Control Function equipment being connected with borde gateway controller.
In the embodiment provided in terms of any of the above, SBC returns to the checking by response message to calling terminal please The process asked can specifically include:
SBC sends to the calling terminal and establishes two-way media stream between 183 response messages, with the calling terminal, so The calling terminal is flowed to by the two-way media of foundation afterwards and plays checking voice, verifies the legitimacy of the caller.
In the embodiment provided in terms of any of the above, SBC receives the auth response that calling terminal returns, and is tested described in acquisition The feedback result carried in card response can specifically include:
SBC receives the voice response that calling terminal is returned by the two-way media stream, and language is carried out to the voice response Sound processing obtains the feedback result wherein carried.
In the embodiment provided in terms of any of the above, SBC obtains checking request and corresponding the result specifically can be with Including:SBC obtains checking request and corresponding the result at random from local problem base, or, SBC obtains to checking equipment Checking request and corresponding the result.Wherein, it is the equipment beyond SBC to verify equipment, wherein being stored with checking request and right The result answered, and can upgrade in time checking request and corresponding the result, to improve security.
In the embodiment provided in terms of any of the above, called number is carried in the call request that SBC is received, it is described SBC determines that the call request can specifically include for suspicious calling:
Called numbers of the SBC in the time and the call request for receiving the call request is exhaled described in determining Cry and determine whether include the called number in local suspicious number storehouse for suspicious calling, or SBC, if, it is determined that institute It is suspicious calling to state call request.
In the embodiment provided in terms of any of the above, SBC can also receive fraud management system (Fraud Management System, FMS) send suspicious number storehouse update the data, then update the suspicious number storehouse locally preserved, Improve the recognition accuracy of suspicious number.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.Wherein:
Fig. 1 is the networking schematic diagram for the call processing system that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the call processing method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the call processing method that the embodiment of the present invention three provides;
Fig. 4 is the hardware structure diagram for the Session Border Controller that the embodiment of the present invention four provides;
Fig. 5 is the structural representation for the Session Border Controller that the embodiment of the present invention five provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are obtained every other under the premise of performing creative labour is not made Embodiment, belong to the scope of protection of the invention.
The present invention provides a kind of call processing method, relevant apparatus and system, and referring to Fig. 1, Fig. 1 is the embodiment of the present invention one The networking schematic diagram of the call processing system of offer.
As shown in figure 1, call processing system of the present invention includes the Session Border Controller in carrier network (Session Border Controller, SBC), Proxy Call Session Control Function (Proxy Call Session Control Function, P-CSCF) equipment and PBX equipment and terminal device in enterprise network, terminal device can wrap Including IMS telephone set.
Wherein, PBX equipment can be used for gathering the call request that the terminal device inside enterprise network is initiated, and will calling Request is sent out, such as is sent to Session Border Controller SBC.PBX equipment is additionally operable to the calling of outside being transmitted to correspondingly Terminal device.
SBC has the function that terminal device being linked into IMS core net, and the equipment of core net includes P-CSCF equipment.SBC Major function include access permission control, network topology hide etc..SBC will be called after normal call request is received It please be transmitted to P-CSCF equipment and carry out call proceeding.P-CSCF equipment can be used for carrying out the call request that terminal device is initiated Call proceeding.
As shown in Fig. 2 the call processing method that the embodiment of the present invention two provides specifically comprises the following steps:
Step 201, SBC receive the call request that calling terminal is sent, and when to determine the call request be suspicious calling, obtain Take checking request and corresponding the result.
Wherein, the call request that calling terminal is sent can be by PBX device forwards to SBC.The call request can be by looking forward to Normal users in industry network are initiated, and can also be initiated by the hacker for having invaded enterprise network by controlled terminal.
SBC can be by judging that time, called number etc. that call request initiates determine the call request for suspicious calling. For example, the time that the call request is initiated is located at 23 points to 6 points of local time, called number is international long-distance number etc..This Outside, SBC can also determine whether call request is suspicious calling according to the suspicious number storehouse locally preserved.Judge that calling please Whether the called number asked belongs to included in suspicious number storehouse, if included in suspicious number storehouse, judges that the calling please Ask as suspicious calling.Otherwise, it is suspicious calling to be not considered as the call request.
Wherein, SBC can be obtained to the fraud management system FMS in carrier network and updated the data, and carrying out local update can Number storehouse is doubted, so as to improve the precision of call request identification.
Further, SBC it is determined that the call request be suspicious calling after, can at random obtain and test from local problem base Card request and corresponding the result, SBC can also obtain checking request and corresponding the result to checking equipment.Checking is set Standby can be special preservation checking request and the equipment of corresponding the result.
Wherein, checking request and the result are mutually corresponding.Checking request can be that picture is putd question to or verified to voice Deng, such as " 15 plus 2 equal to how many ".Corresponding the result is " 17 ".
Step 202, SBC return to the checking request by response message to the calling terminal, and the checking request is used In the checking calling terminal.
Specifically, SBC can send 183 response messages to calling terminal, it is double so as to be established between the calling terminal To Media Stream, the calling terminal is flowed to by the two-way media and plays checking voice.Wherein, carried in 183 response messages The media address of the Session Border Controller, it is easy to calling terminal to return to auth response to SBC according to the media address.
After calling terminal receives checking request, the checking voice in checking request is played, such as " 15 plus 2 are equal to for broadcasting How much ".If the user of calling terminal is normal users, it is anti-that user can input (voice or dialing input) by calling terminal Present result 17.If the user of calling terminal is hacker, hacker simulates multiple calling terminals usually using virtual dial-up software and dialled, The checking request that each calling terminal receives can not be directed to and obtain feedback result, so as to which correct feedback result can not be returned.
Step 203, SBC receive the auth response that the calling terminal returns, obtain carried in the auth response it is anti- Present result.
Specifically, SBC receives the voice response that calling terminal is returned by above-mentioned two-way media stream, and voice response is entered Row speech processes (such as speech recognition) obtain the feedback result wherein carried.
In addition, SBC can start timing after checking request is sent, if user exceedes the non-input feedback knot of preset duration Fruit, then SBC can consider the feedback result that is carried in auth response for sky.
When the feedback result that step 204, SBC are carried in auth response differs with the result, described in refusal Call request.
Specifically, SBC judges the feedback result the result phase whether corresponding with checking request carried in auth response Together, if it is different, then illustrating that the calling is abnormal call, the calling is refused, such as abandon the calling.
In addition, if user exceedes the non-input feedback result of preset duration, SBC is it is also assumed that the calling is exhaled to be abnormal Cry, directly refuse the call request.
In the present embodiment, SBC directly can't be set after the call request of calling terminal transmission is received to P-CSCF Preparation is sent, but first determines whether the call request is suspicious, in the case where call request is suspicious, is further sent out to calling terminal Send checking request.SBC receives the auth response that calling terminal returns, and the feedback result carried in auth response is tested with described When the result corresponding to card request differs, it is abnormal call to assert the calling, then refuses the call request, so as to avoid Abnormal call is continued, and enhances the security of calling.
The calling-control method that the present embodiment provides can also comprise the following steps:
When step 205, the feedback result carried in the auth response are identical with the result, SBC is to agency Call session control functional equipment forwards the call request.
Specifically, the feedback result that SBC is carried in auth response is judged is identical with the result corresponding to checking request When, then the user that explanation initiates the calling is normal users, then performs normal call flows, the call request is not entered Row intercepts.For example, to call request described in P-CSCF device forwards, P-CSCF equipment continues to the calling, so as to avoid The call request of normal users is rejected.
Referring to Fig. 3, Fig. 3 is the flow chart for the call processing method that the embodiment of the present invention three provides.
In the present embodiment, hacker attacks enterprise network, virtual dial-up software simulation calling terminal is used to dial, calling Specific international long-distance number, PBX equipment send out SBC of the call request into carrier network after call request is received Send.Call processing method provided in an embodiment of the present invention comprises the following steps:
Step 301, SBC receive the call request of PBX device forwards, and called number is carried in call request.
Wherein, call request can specifically be sent by invitation (invite) message in session initiation protocol. Called number, such as the international long-distance number of particular country are carried in invite message.
Step 302, SBC return to 100Trying message to PBX equipment, show that SBC have received invite message.
Step 303, SBC determine that the call request is suspicious calling according to suspicious number storehouse, are obtained from local problem base Speech verification is asked and the result.
In the present embodiment, SBC locally saves suspicious number storehouse, for showing to dial number in the suspicious number storehouse Call as suspicious calling.SBC is matched the called number carried in call request in suspicious number storehouse, if matching into Work(, it is determined that the call request is suspicious calling.If matching is unsuccessful, illustrate that the calling belongs to normal call, to P-CSCF Invite message described in device forwards.
In addition, SBC equipment can also determine whether the calling is suspicious calling according to the initiation time of call request, such as The calling initiation time is 23 points to 6 points of local time, then it is assumed that is suspicious calling.Wherein, it is above-mentioned judge call request whether be The condition of suspicious calling can be used in combination.
Specifically, SBC obtains speech verification request and the result at random from local problem base.Speech verification result can Think " 16*2 is equal to how many ", corresponding the result is " 32 ".Wherein, multiple checkings are saved in the problem base of SBC locals please Ask, SBC can strengthen the security of verification process from checking request is locally obtained at random.
Step 304, SBC return to 183 response messages to PBX equipment, and two-way media stream is established between calling terminal.
Wherein, SBC media address is carried in 183 response messages.In addition, calling terminal can also receive 183 sound After answering message, return to Temporary Response and confirm (Provisional Response Acknowledgement, Prack) message, table Bright calling terminal receives 183 response message.
Step 305, SBC flow to calling terminal by two-way media and send speech verification request.
In the present embodiment, hacker can by software analog subscriber send auth response, such as by software dialing or Auth response can be sent to SBC by sending voice, and hacker can not also send auth response.
In addition, SBC, in local boot timer, can also be returned and test after speech verification request is sent to calling terminal Card response carries out timing.
Step 306, SBC receive the auth response that calling terminal returns, and obtain the feedback knot carried in the auth response Fruit.
The feedback carried specifically, SBC can be collected the digits by speech recognition technology or voice in technical limit spacing auth response As a result.
When step 307, the feedback result carried in the auth response differ with the result, SBC is abandoned The call request.
In the present embodiment, because hacker generally initiates substantial amounts of call request simultaneously, thus it is difficult to by for each Checking request sends the auth response for carrying correct feedback result.The feedback knot carried in the auth response that thus SBC is received Fruit is different from the result corresponding to checking request, and SBC directly abandons the call request, does not send the calling to P-CSCF equipment Request.
If in addition, SBC local timer exceed preset time in do not receive also calling terminal return auth response, It also hold that the calling is abnormal call, the calling is directly abandoned.
Compared with prior art, the embodiment of the present invention is sent out by increasing the judgement to suspicious calling, and for suspicious calling Checking request is sent to calling terminal to verify whether the calling is abnormal call, actively blocks suspicious calling.It can thus avoid Enterprise network is initiated to lose caused by substantial amounts of abnormal call, improves the security of enterprise network after by hacker attacks. Meanwhile normal Client-initiated call request can be identified, normal call request is sent into P-CSCF equipment is called Continue, do not influence being smoothed out for normal call.
Referring to Fig. 4, Fig. 4 is the hardware structure diagram for the Session Border Controller that the embodiment of the present invention four provides.
Wherein, the Session Border Controller described in Fig. 4 can be the Session Border Controller shown in Fig. 1.Session border control Device processed employs general computer hardware, and it includes processor 401, memory 402, bus 403, input equipment 404, output Equipment 405 and network interface 406.
Specifically, memory 402 can include the computer storage matchmaker in the form of volatibility and/or nonvolatile memory Body, such as read-only storage and/or random access memory.Memory 402 can store an operating system, application program, other journeys Sequence module, executable code and routine data.
Input equipment 404 can be used for Session Border Controller input order and information, input equipment 404 such as keyboard or Sensing equipment, such as mouse, trace ball, touch pad, microphone, control stick, game mat, satellite tv antenna, scanner or similar Equipment.These input equipments can be connected to processor 401 by bus 403.
Output equipment 405 can be used for Session Border Controller output information, in addition to the monitor, output equipment 405 Can also be that other periphery outputs are set respectively, such as loudspeaker and/or printing device, these output equipments can also pass through bus 403 It is connected to processor 401.
Session Border Controller can be connected in network by network interface 406, such as is connected to LAN (Local Area Network, LAN).Under networked environment, the computer executed instructions stored in Session Border Controller can be stored in In remote storage device, and it is not limited to be locally stored.
When the executable code stored in the execution memory 402 of processor 401 in Session Border Controller or using journey During sequence, Session Border Controller can perform the method for the Session Border Controller side in above example two, embodiment three Step, such as perform step 201-205,301-307 etc..Specific implementation procedure referring to above-described embodiment two and embodiment three, This is repeated no more.
Referring to Fig. 5, Fig. 5 is the structural representation for the Session Border Controller that the embodiment of the present invention five provides.
As illustrated, Session Border Controller provided in an embodiment of the present invention includes:
Determining module 510 is called, for receiving the call request of calling terminal transmission, it is suspicious to determine the call request During calling, checking request and corresponding the result are obtained.
Wherein, call the acquisition checking request of determining module 510 and corresponding the result specifically can be in the following way Realize:Call determining module 510 and obtain checking request and corresponding the result at random from local problem base, or, calling Determining module 510 obtains checking request and corresponding the result to checking equipment.
Called number is carried in the call request that calling terminal is sent, calling determining module 510 determines the call request It can specifically be realized in the following way for suspicious calling:Determining module 510 is called according to the time for receiving call request And the called number in call request determines that the calling is suspicious calling, or calling determining module 510 determines local Whether the called number is included in suspicious number storehouse, if, it is determined that the call request is suspicious calling.
Sending module 520 is verified, it is described to test for returning to the checking request to the calling terminal by response message Card request is used to verify the calling terminal.
Wherein, verify that sending module 520 returns to the checking request to calling terminal by response message and can specifically led to Cross following manner realization:Checking sending module sends to 520 calling terminals and built between 183 response messages, with the calling terminal Vertical two-way media stream;Then the calling terminal is flowed to by the two-way media of foundation and plays checking voice.
Receiving module 530 is verified, the auth response returned for receiving the calling terminal, is obtained in the auth response The feedback result of carrying;
Wherein, verify that receiving module 530 receives the auth response that calling terminal returns, obtain and carried in the auth response Feedback result can specifically realize in the following way:The checking reception calling terminal of receiving module 530 passes through described two-way The voice response that Media Stream returns, speech processes are carried out to the voice response and obtain the feedback result wherein carried.
Verification process module 540, for the feedback result that is carried in the auth response and the result not phase Meanwhile refuse the call request.
Session Border Controller provided in an embodiment of the present invention can be used in previous embodiment one, two and three, and it is logical Cross above-mentioned calling determining module 510, checking sending module 520 and checking receiving module 530, verification process module 540 it Between cooperation complete the method and step performed by the Session Border Controller in embodiment two, embodiment three.With prior art In Session Border Controller compare, the present embodiment provide Session Border Controller when performing call request handling process, With with preceding method embodiment identical beneficial effect, details referring to above method embodiment description.
In the Session Border Controller that the present embodiment provides, above-mentioned verification process module 540 is additionally operable to test described When the feedback result carried in card response is identical with the result, to described in Proxy Call Session Control Function device forwards Call request.
In the Session Border Controller that the present embodiment provides, verification process module 540 is additionally operable to sending the response When not receiving the auth response that the calling terminal returns in the preset time that message rises, then refuse the call request, example As abandoned the calling, so as to avoid abnormal call from being continued, the security of calling is enhanced.
In the present embodiment, Session Border Controller is presented in the form of functional unit.Here " unit " can be with Refer to ASIC (application-specific integrated circuit, ASIC), circuit, perform one The processor and memory of individual or multiple softwares or firmware program, integrated logic circuit, and/or other can provide above-mentioned function Device.In a simple embodiment, those skilled in the art is contemplated that Session Border Controller can also use Form shown in Fig. 4.Determining module 510 is called, verifies sending module 520, checking receiving module 530, verification process module 540 The function of being realized can be realized by the processor 401 in Fig. 4 and memory 402.For example, calling determining module 510 The call request that calling terminal is sent is received, when to determine call request be suspicious calling, acquisition checking request and corresponding checking As a result specifically can be by performing the code stored in memory 402 by processor 401 to realize.
It will be recognized by those of ordinary skill in the art that the possibility implementation of various aspects of the invention or various aspects System, method or computer program product can be embodied as.Therefore, each aspect of the present invention or various aspects Possible implementation can use complete hardware embodiment, complete software embodiment (including firmware, resident software etc.), or The form of the embodiment of integration software and hardware aspect, collectively referred to herein as " circuit ", " module " or " system ".In addition, The possibility implementation of each aspect of the present invention or various aspects can use the form of computer program product, computer journey Sequence product refers to be stored in the computer readable program code in computer-readable medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (15)

  1. A kind of 1. call processing method, applied to Session Border Controller, it is characterised in that including:
    The call request that calling terminal is sent is received, when to determine the call request be suspicious calling, acquisition checking request and right The result answered;
    The checking request is returned to the calling terminal by response message, the checking request is used to verify that the caller is whole End;
    The auth response that the calling terminal returns is received, obtains the feedback result carried in the auth response;
    When the feedback result carried in the auth response differs with the result, refuse the call request.
  2. 2. the method as described in claim 1, it is characterised in that also include:
    When the feedback result carried in the auth response is identical with the result, to Proxy Call Session Control Function Call request described in device forwards.
  3. 3. method as claimed in claim 2, it is characterised in that described that the checking is returned to calling terminal by response message Request specifically includes:
    Sent to the calling terminal and establish two-way media stream between 183 response messages, with the calling terminal;
    The calling terminal is flowed to by the two-way media and plays checking voice.
  4. 4. method as claimed in claim 3, it is characterised in that the auth response for receiving calling terminal and returning, obtain institute Stating the feedback result carried in auth response includes:
    Receive the voice response that calling terminal is returned by the two-way media stream;
    Speech processes are carried out to the voice response and obtain the feedback result wherein carried.
  5. 5. method as claimed in claim 1 or 2, it is characterised in that also include:
    If not receiving the auth response that the calling terminal returns in the preset time for sending the response message, refuse The exhausted call request.
  6. 6. method as claimed in claim 1 or 2, it is characterised in that the acquisition checking request and corresponding the result bag Include:
    Obtain checking request and corresponding the result at random from local problem base, or,
    Checking request and corresponding the result are obtained to checking equipment.
  7. 7. method as claimed in claim 2, it is characterised in that called number, the determination institute are carried in the call request State call request includes for suspicious calling:
    Called number in the time and the call request for receiving the call request determines the calling for can Calling is doubted, or
    It is determined that whether the called number is included in local suspicious number storehouse, if, it is determined that the call request is suspicious Calling.
  8. 8. method as claimed in claim 7, it is characterised in that also include:
    Receive the suspicious number storehouse that fraud management system FMS is sent to update the data, update the suspicious number storehouse locally preserved.
  9. A kind of 9. Session Border Controller, it is characterised in that including:
    Determining module is called, for receiving the call request of calling terminal transmission, when to determine the call request be suspicious calling, Obtain checking request and corresponding the result;
    Sending module is verified, for returning to the checking request, the checking request to the calling terminal by response message For verifying the calling terminal;
    Receiving module is verified, the auth response returned for receiving the calling terminal, obtains what is carried in the auth response Feedback result;
    Verification process module, when feedback result and the result for being carried in the auth response differ, refuse The exhausted call request.
  10. 10. Session Border Controller as claimed in claim 9, it is characterised in that
    The verification process module be additionally operable to the feedback result that is carried in the auth response it is identical with the result when, To call request described in Proxy Call Session Control Function device forwards.
  11. 11. Session Border Controller as claimed in claim 9, it is characterised in that the checking sending module is disappeared by response Cease and specifically included to the calling terminal return checking request:
    Checking sending module sends to the calling terminal and establishes two-way media between 183 response messages, with the calling terminal Stream;The calling terminal is flowed to by the two-way media and plays checking voice.
  12. 12. Session Border Controller as claimed in claim 9, it is characterised in that it is whole that the checking receiving module receives caller The auth response returned is held, the feedback result carried in the auth response is obtained and specifically includes:
    Checking receiving module receives the voice response that calling terminal is returned by the two-way media stream, and the voice response is entered Row speech processes obtain the feedback result wherein carried.
  13. 13. the Session Border Controller as described in claim any one of 9-12, it is characterised in that
    The verification process module is additionally operable to not receive the caller end in the preset time for sending the response message When holding the auth response returned, then refuse the call request.
  14. 14. the Session Border Controller as described in claim any one of 9-12, it is characterised in that the calling determining module obtains Checking request and corresponding the result is taken to specifically include:
    Call determining module and obtain checking request and corresponding the result at random from local problem base, or, calling determines Module obtains checking request and corresponding the result to checking equipment.
  15. 15. the Session Border Controller as described in claim any one of 9-12, it is characterised in that carried in the call request Called number, the calling determining module determine that the call request includes for suspicious calling:
    Called number of the determining module in the time and the call request for receiving the call request is called to determine The calling is suspicious calling, or
    Calling determining module determines whether include the called number in local suspicious number storehouse, if, it is determined that it is described to exhale It is suspicious calling to cry request.
CN201610864903.3A 2016-09-28 2016-09-28 Call processing method, related device and system Active CN107872588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610864903.3A CN107872588B (en) 2016-09-28 2016-09-28 Call processing method, related device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610864903.3A CN107872588B (en) 2016-09-28 2016-09-28 Call processing method, related device and system

Publications (2)

Publication Number Publication Date
CN107872588A true CN107872588A (en) 2018-04-03
CN107872588B CN107872588B (en) 2021-06-29

Family

ID=61761401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610864903.3A Active CN107872588B (en) 2016-09-28 2016-09-28 Call processing method, related device and system

Country Status (1)

Country Link
CN (1) CN107872588B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661922A (en) * 2018-06-29 2020-01-07 中国移动通信有限公司研究院 Call control method, network device and system
CN110874911A (en) * 2019-11-12 2020-03-10 上海盛付通电子支付服务有限公司 Information transmission method, electronic device, and computer-readable storage medium
CN114979980A (en) * 2021-12-14 2022-08-30 中移互联网有限公司 SIP message communication method, terminal equipment and network equipment thereof
US11576048B1 (en) * 2020-04-28 2023-02-07 T-Mobile Innovations Llc Mitigating authentication-based hacking of access restricted telecommunication services
TWI803788B (en) * 2020-11-12 2023-06-01 中華電信股份有限公司 Method and system for preventing robots from dialing international fraudulent calls

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006025374A (en) * 2004-07-09 2006-01-26 Fujitsu Ltd Unauthorized usage verifying system of wireless communication
CN101207837A (en) * 2007-12-12 2008-06-25 华为技术有限公司 Apparatus and method for preventing telephone harassment
CN101277341A (en) * 2008-04-28 2008-10-01 华为技术有限公司 Call processing method, system as well as verification server and interactive voice answering system
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN102118874A (en) * 2009-12-31 2011-07-06 华为技术有限公司 Call processing method and mobile switching center
CN103095889A (en) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN103167091A (en) * 2011-12-14 2013-06-19 中国电信股份有限公司 Countering device and method of malicious group phone calls
JP2013183295A (en) * 2012-03-01 2013-09-12 Nec Commun Syst Ltd Third party automatic notification system, telephone unit, third party automatic notification method and third party automatic notification program
CN103327196A (en) * 2012-03-19 2013-09-25 陈戈 Method for telephone access and system thereof
CN104717370A (en) * 2013-12-11 2015-06-17 中国移动通信集团河北有限公司 Internetwork dialing service monitoring method and device
CN104767893A (en) * 2015-02-13 2015-07-08 广州市讯飞樽鸿信息技术有限公司 Crank call interception method and system
CN104917905A (en) * 2015-04-16 2015-09-16 腾讯科技(北京)有限公司 Strange incoming call processing method, terminal and server
CN105049647A (en) * 2015-08-07 2015-11-11 北京思特奇信息技术股份有限公司 Method and system for shielding crank call
CN105187667A (en) * 2015-10-09 2015-12-23 小米科技有限责任公司 Incoming call processing method and device
CN105188064A (en) * 2015-08-07 2015-12-23 广东欧珀移动通信有限公司 Method and device for shielding crank calls and short messages
CN105306409A (en) * 2014-05-30 2016-02-03 展讯通信(上海)有限公司 Call verification system and method and mobile terminal
CN105530389A (en) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 Voice message leaving method and device based on IMS (IP Multimedia Subsystem) network
CN105635071A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Method and switch for preventing harassing call
CN105828334A (en) * 2015-01-09 2016-08-03 中国移动通信集团河北有限公司 Monitoring method and system for positioning illegal callback service

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006025374A (en) * 2004-07-09 2006-01-26 Fujitsu Ltd Unauthorized usage verifying system of wireless communication
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101207837A (en) * 2007-12-12 2008-06-25 华为技术有限公司 Apparatus and method for preventing telephone harassment
CN101277341A (en) * 2008-04-28 2008-10-01 华为技术有限公司 Call processing method, system as well as verification server and interactive voice answering system
CN102118874A (en) * 2009-12-31 2011-07-06 华为技术有限公司 Call processing method and mobile switching center
CN103167091A (en) * 2011-12-14 2013-06-19 中国电信股份有限公司 Countering device and method of malicious group phone calls
JP2013183295A (en) * 2012-03-01 2013-09-12 Nec Commun Syst Ltd Third party automatic notification system, telephone unit, third party automatic notification method and third party automatic notification program
CN103327196A (en) * 2012-03-19 2013-09-25 陈戈 Method for telephone access and system thereof
CN103095889A (en) * 2013-01-07 2013-05-08 上海欣方智能系统有限公司 Junk call intercepting system based on talk mode identification and operating method thereof
CN104717370A (en) * 2013-12-11 2015-06-17 中国移动通信集团河北有限公司 Internetwork dialing service monitoring method and device
CN105306409A (en) * 2014-05-30 2016-02-03 展讯通信(上海)有限公司 Call verification system and method and mobile terminal
CN105635071A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Method and switch for preventing harassing call
CN105828334A (en) * 2015-01-09 2016-08-03 中国移动通信集团河北有限公司 Monitoring method and system for positioning illegal callback service
CN104767893A (en) * 2015-02-13 2015-07-08 广州市讯飞樽鸿信息技术有限公司 Crank call interception method and system
CN104917905A (en) * 2015-04-16 2015-09-16 腾讯科技(北京)有限公司 Strange incoming call processing method, terminal and server
CN105049647A (en) * 2015-08-07 2015-11-11 北京思特奇信息技术股份有限公司 Method and system for shielding crank call
CN105188064A (en) * 2015-08-07 2015-12-23 广东欧珀移动通信有限公司 Method and device for shielding crank calls and short messages
CN105187667A (en) * 2015-10-09 2015-12-23 小米科技有限责任公司 Incoming call processing method and device
CN105530389A (en) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 Voice message leaving method and device based on IMS (IP Multimedia Subsystem) network

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661922A (en) * 2018-06-29 2020-01-07 中国移动通信有限公司研究院 Call control method, network device and system
CN110661922B (en) * 2018-06-29 2021-05-25 中国移动通信有限公司研究院 Call control method, network device and system
CN110874911A (en) * 2019-11-12 2020-03-10 上海盛付通电子支付服务有限公司 Information transmission method, electronic device, and computer-readable storage medium
CN110874911B (en) * 2019-11-12 2022-04-22 上海盛付通电子支付服务有限公司 Information transmission method, electronic device, and computer-readable storage medium
US11576048B1 (en) * 2020-04-28 2023-02-07 T-Mobile Innovations Llc Mitigating authentication-based hacking of access restricted telecommunication services
TWI803788B (en) * 2020-11-12 2023-06-01 中華電信股份有限公司 Method and system for preventing robots from dialing international fraudulent calls
CN114979980A (en) * 2021-12-14 2022-08-30 中移互联网有限公司 SIP message communication method, terminal equipment and network equipment thereof
CN114979980B (en) * 2021-12-14 2023-07-21 中移互联网有限公司 Communication method of SIP message, terminal equipment and network equipment thereof

Also Published As

Publication number Publication date
CN107872588B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN107872588A (en) Call processing method, relevant apparatus and system
CN105119877B (en) Speech verification method, apparatus and system
CN103891246B (en) Webpage real-time Communication for Power call transfer method and device
US8457290B2 (en) Method, apparatus, and computer program products for providing dynamic replacement communication identification service
WO2017091401A1 (en) Identity authentication method, system, business server and authentication server
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
CN105141628B (en) A kind of method and device for realizing push
JP5477379B2 (en) Rogue call detection device, rogue call detection method, and rogue call detection program
RU2642483C2 (en) Method and device for conference access
CN101150631A (en) A method and device for setting call forward
CN107483398B (en) A kind of silence verification method and device, electronic equipment
EP2963957B1 (en) Method and device for calling by binding client to terminal
CN105471680A (en) Network voice communication testing system and method
US20190007553A1 (en) Method, System and Device for an Enhanced Call Setup with Verification of a User Equipment in a Telecommunications Network
CN106453799B (en) Manipulative communications deception recognition methods and system
CN108353101A (en) System and method for establishing communication on multiple communications platforms
US20230208967A1 (en) Site link tester via unique phone emulation
CN106921951B (en) Number method for secret protection and system and relevant device based on relationship number
CN107493293A (en) A kind of method of sip terminal access authentication
CN102480487B (en) Multi-user on-line video game method based on authentication and system thereof
CN106790199B (en) Verification code processing method and device
CN109995707A (en) A kind of high definition voice is anti-harassment and DDOS attack method and device
CN102833215B (en) A kind of method and apparatus of enhancing SIP FORKING call functions
Voznak et al. Web-based IP telephony penetration system evaluating level of protection from attacks and threats
CN107105430A (en) A kind of number authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant