CN110809082A - Private cloud-based harassing call interception method - Google Patents
Private cloud-based harassing call interception method Download PDFInfo
- Publication number
- CN110809082A CN110809082A CN201911042912.4A CN201911042912A CN110809082A CN 110809082 A CN110809082 A CN 110809082A CN 201911042912 A CN201911042912 A CN 201911042912A CN 110809082 A CN110809082 A CN 110809082A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- server
- length
- private cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a private cloud-based harassing call intercepting method. Firstly, a private cloud platform is built, a black and white list is built by using wildcards, and uploading is carried out; secondly, processing data in the black and white list and combining the interception rules; finally, the user downloads the latest list by using the client and manually imports the latest list to finish updating; the method and the device can obtain the confirmed harassing call number in a short time, so that the user is prevented from being influenced by harassing calls under the condition that the privacy is not invaded, the matching time is shortened, and the interception efficiency is improved.
Description
Technical Field
The invention belongs to the field of information transmission and processing, and particularly relates to a method for intercepting crank calls.
Background
At present, three methods are mainly used for intercepting crank calls. Firstly, using a mobile phone program, secondly, judging according to marks of other users, and thirdly, intercepting an outbound call.
The mobile phone program is mainly used for setting a blacklist on the mobile phone by using a program carried by the system or downloading interception software for interception so as to directly shield unexpected calls. However, the range of the intercepted numbers is small, and for example, only specific numbers or only numbers beginning with specific numbers can be intercepted, so that the interception is easy to avoid by harassers. In addition, the harassment interception software is based on a public cloud platform, and due to the fact that the harassment interception software has the right of accessing the user address list, the user privacy can be possibly stolen.
The judgment is carried out according to the marks of other users and the number of the marked people, and the type of the call can be subjectively judged, so that the aim of not answering harassing calls is fulfilled. But the effect of active interception can not be achieved, and a telephone prompt tone still exists. And the false hanging behavior is caused because the marking field is not comprehensive enough and the marking is inaccurate.
The interception of the outbound call means that the operator intercepts the outbound call for a number which has a continuous multi-day call completing rate lower than 50%, is not standard in the outbound call period or the outbound call behavior, or does not agree with the user to carry out the outbound call commercial marketing. The personal number is warned when the daily calling amount exceeds 300 times, and the daily calling amount exceeds 500 times or the daily calling amount exceeds 300 times after warning, so that the calling is directly intercepted. The method has long period and low efficiency for identifying the crank calls, and is not easy to intercept if the outbound call volume does not exceed 300 times.
Disclosure of Invention
The invention aims to provide a harassing call intercepting method which is based on a private cloud, can share a black and white list and fuses intercepting rules.
The technical scheme of the invention is as follows: a harassing call intercepting method based on private cloud comprises the following steps:
(1) connecting the server and the client by using different editing language building interfaces, and uploading and downloading a black and white list by a user; the sharing of black and white lists is directly realized at the client through uploading and downloading files;
(2) and preprocessing the data according to the hierarchical structure based on a greedy algorithm.
(3) The server processes data in the file, and merges the interception rules based on a prefix, a suffix and a digit method in a mode of comparing the data in the Mysq1 database;
(4) and packaging the sq1 statements into classes, calling the packaged classes by the server side, and transmitting the processed data into a Mysq1 database.
(5) And the client identifies the strange call in real time.
Further, the step (1) specifically includes the following steps:
(1.1) adding crank call numbers to be intercepted and unconditionally accepted numbers by the client, wherein the adding mode is to select and add complete numbers, prefix numbers and telephone digits;
and (1.2) after the server is started, the client can be connected with the server by selecting a manual connection party.
(1.3) when uploading the file, the client automatically encapsulates the number added by the user into a file and transmits the file to the server; when downloading the file, the server calls out the data in the database and transmits the data to the client in a file form; the client analyzes the file into specific data and transmits the data into the user interface.
Furthermore, in the step (2), each data is processed sequentially, then the existing data in the database is divided into different levels according to the length, and the new data is transmitted to the lowest level to be preprocessed.
Further, the step (3) specifically includes the following steps:
(3.1) the server sequentially processes each piece of received data, divides the data into different length ranges for matching, firstly divides the data into the data with the length smaller than the length of the data, searches for a matching rule which uses a prefix to represent the number, and if the matching rule is found, the number does not need to be added;
(3.2) dividing the data into data with the same length, and when the same number appears or a number which is the same as the number except the last digit is "#" is found, the new data does not need to be added;
and (3.3) finally dividing the data into data with the length longer than the data length, and judging whether the data can replace the old data or not.
(3.4) counting in different length ranges in the whole database after the data are completely received; when a number of a certain length is found to be all the same except for the last digit, and the last digit is all present from 0 to 9, the last digit is replaced with a "#".
Furthermore, when the data in the step (4) is transmitted into the database, the number of the harassing call and the account number of the client are intercepted after the merged interception rule is transmitted.
Further, the client in the step (5) adopts a pattern matching algorithm based on a finite automata to match the unfamiliar incoming call with a black and white list; if the blacklist is successfully matched, the reflection technology is utilized to realize the hanging up of the telephone through the program; and if the white list is matched successfully, continuing dialing and waiting for the user to answer.
The invention has the following beneficial effects: 1. trusts share in private cloud, ensuring information not to be revealed and privacy not to be violated; 2. the method can acquire more crank call information in a short time and effectively intercept crank calls. 3. The matching time can be shortened, and the interception is high in quality.
Drawings
FIG. 1 is a flow chart of a server side of the present invention;
FIG. 2 is a diagram of a method of use by a user of the present invention;
FIG. 3 is a block diagram of a client in the present invention;
fig. 4 is an exemplary diagram of a client real-time recognition algorithm in the present invention.
Detailed Description
The technical scheme of the invention is described in detail by combining the examples and the attached drawings of the specification:
a harassing call intercepting method based on private cloud comprises the following steps:
(1) connecting the server and the client by using different editing language building interfaces, and uploading and downloading a black and white list by a user; the sharing of black and white lists is directly realized at the client through uploading and downloading files;
(2) and preprocessing the data according to the hierarchical structure based on a greedy algorithm.
(3) The server processes data in the file, and merges the interception rules based on a prefix, a suffix and a digit method in a mode of comparing the data in the Mysq1 database;
(4) and packaging the sq1 statements into classes, calling the packaged classes by the server side, and transmitting the processed data into a Mysq1 database.
(5) And the client identifies the strange call in real time.
Further, the step (1) specifically includes the following steps:
(1.1) adding crank call numbers to be intercepted and unconditionally accepted numbers by the client, wherein the adding mode is to select and add complete numbers, prefix numbers and telephone digits; other similar numbers, etc.;
(1.2) after the server is started, selecting a manual connecting party at the client to connect the server; and not automatically connected.
(1.3) when uploading the file, the client automatically encapsulates the number added by the user into a file and transmits the file to the server; when downloading the file, the server calls out the data in the database and transmits the data to the client in a file form; the client analyzes the file into specific data and transmits the data into the user interface.
Furthermore, in the step (2), each data is processed sequentially, then the existing data in the database is divided into different levels according to the length, and the new data is transmitted to the lowest level to be preprocessed.
Further, the step (3) specifically includes the following steps:
(3.1) the server sequentially processes each piece of received data, divides the data into different length ranges for matching, firstly divides the data into the data with the length smaller than the length of the data, searches for a matching rule which uses a prefix to represent the number, and if the matching rule is found, the number does not need to be added;
(3.2) dividing the data into data with the same length, and when the same number appears or a number which is the same as the number except the last digit is "#" is found, the new data does not need to be added;
and (3.3) finally dividing the data into data with the length longer than the data length, and judging whether the data can replace the old data or not.
(3.4) counting in different length ranges in the whole database after the data are completely received; when a number of a certain length is found to be all the same except for the last digit, and the last digit is all from 0 to 9, then the last digit is replaced with a "#", for example: "1955622444 #".
Furthermore, when the data in the step (4) is transmitted into the database, the number of the harassing call and the account number of the client are intercepted after the merged interception rule is transmitted.
Further, the client in the step (5) adopts a pattern matching algorithm based on a finite automata to match the unfamiliar incoming call with a black and white list; if the blacklist is successfully matched, the reflection technology is utilized to realize the hanging up of the telephone through the program; and if the white list is matched successfully, continuing dialing and waiting for the user to answer.
1. Establishing a private cloud platform:
1.1, a user should set up a private cloud platform for storing and downloading interception rules; the private cloud platform can be purchased from a cloud server provider, and can also build a server and purchase a static IP address from an Internet service provider;
1.2, a secure socket protocol is selected as a transmission protocol to prevent information from being maliciously tampered;
the following combination cases are further illustrated; after a socket module is introduced, a server side creates a socket through a socket () function, and parameters are AF _ UNIX and SOCK _ STREAM (connection-oriented); the client establishes an unconnected socket by a socket () construction method through a system default type socket Impl; calling an InetSocketAddreress type packaging port; an accept () function of the server end blocks the connection of the passive waiting client end; after the connection is successful, the client receives and displays the data sent by the server, and the data uniformly adopts an utf-8 coding format.
2. And (3) black and white list construction and file uploading and downloading:
2.1, the invention relates to blacklists and whitelists: the blacklist is the number of the crank call, and the white list is the number which does not need to be intercepted; when a number appears in both the white list and the black list, the default operation is to take the number as the white list number;
2.2, allowing the use of wildcards by black and white list numbers; the supported wildcards include "+", "#", support use alone or in combination; "x" can represent zero position or multiple digit, if "952112 x" represents all numbers beginning with 952112, the interception range is wide, and the setting is simple; "#" represents a digit, if "8521 # # 87" represents an 8-digit number with the beginning of 8521 and arbitrary five-digit and six-digit numbers, the interception is set to each digit accurately, and the possibility of wrong interception is reduced;
2.3, the user can manually input the black and white list content.
2.4, when the user submits the application of uploading the list, the client automatically establishes the safe socket connection to the server, and sends the data to the server; the server needs to store the content after further processing.
3. Processing a black and white list at a server side:
3.1, storing information of the crank calls in a database according to the modes of numbers, lengths and numbers, wherein the numbers are main key keys and are set to be self-increment; the number transmitted into the database is the number after data processing, so that the interception rule in the database is guaranteed to be simplest all the time; if the rules need to be combined, the name is not named by a specific name or a company and is directly changed into a harasser;
3.2, the server side preprocesses the data after receiving the black and white list, and sequentially processes each received data; dividing the existing data in the database into different layers according to the length, firstly transferring the new data into the lowest layer, and then sequentially entering the different layers according to the sequence until the existing rule is matched or used as a new rule;
3.3, combining rules are that ① is compared with the existing rules, based on the large range, ② counts all complete numbers, if the last digit of a certain number is different and 0-9 exist, combining is carried out;
rule ① is used each time a single piece of data is received, the operation steps are as follows:
(1) after receiving the black and white list data, judging the length of the telephone number, recording the length as length, and dividing the length into data with the length smaller than the length;
(2) matching the telephone number with all current interception rules with the length less than the length in the database, wherein if the rules can represent the number, the number does not need to be added into the database;
(3) if the above rule can not represent the number, dividing the number into data with the same length as the number;
(4) if the same number is found in the comparison, the number does not need to be added into the database;
(5) if a number is found in the comparison, except the last digit is "#", the other digits are the same as the number, for example, "1321888729 #" exists in the database, and the number is "13218887290", the number does not need to be added into the database;
(6) if the number is not represented, dividing the telephone number into all data with the length larger than the number in the database; if a rule with an interception range smaller than that of the current data is found, replacing the old data with the current data;
(7) if the rule representing the data can not be found in the steps, storing the data into a database;
rule ② applies when all data has been uploaded, the complete mobile number length is 11 and the complete landline number length is 8 or 11 (plus zone number), statistics is performed on different length ranges in the entire database, if the number of a certain length is found to be all the same except the last digit and the last digit is all from 0 to 9, the last digit is replaced with "#", for example, "1955622444 #".
3.3, there is a conflict in the merge, i.e. numbers in the white list have priority when assigned as numbers in the black list are simultaneously present in the white list.
4. Real-time identification:
4.1, the client monitors the state of the call, matches the incoming call with the existing crank call in the list and adopts a pattern matching algorithm based on a finite automaton; after the matching is successful, the reflection technology is utilized to realize the hanging up of the telephone through the program;
4.2, the matching pattern algorithm of finite automata is usually represented by a five-tuple, where M is { Q, a, Σ, δ }; if the state of the current finite automaton is p and the read-in character is a, the process of changing the state from p to delta (p, a) is a transition; if δ (p, a) is ∈ Q, it means that the automaton accepts all characters input so far; when a text string has a state F belonging to A in the automatic squeezing and reading process, the current string is accepted and the matching is successful, otherwise, the matching is failed; in the invention, an automaton is generated by all data in the blacklist, an incoming call is used as a symbol sequence to be input, and the state is changed through a transfer function; if the final state belongs to the receiving state, the matching is successful; taking fig. 4 as an example, when prefixes are 137 × and 136 × the matching is performed according to bits, and the matching is successful, and the next state is entered until the receiving state is reached, indicating that the matching is successful.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (6)
1. A private cloud-based harassing call interception method is characterized by comprising the following steps:
(1) connecting the server and the client by using different editing language building interfaces, and uploading and downloading a black and white list by a user; the sharing of black and white lists is directly realized at the client through uploading and downloading files;
(2) and preprocessing the data according to the hierarchical structure based on a greedy algorithm.
(3) The server processes data in the file, and merges the interception rules based on a prefix, a suffix and a digit method in a mode of comparing the data in the Mysq1 database;
(4) and packaging the sq1 statements into classes, calling the packaged classes by the server side, and transmitting the processed data into a Mysq1 database.
(5) And the client identifies the strange call in real time.
2. The private cloud-based harassing call intercepting method according to claim 1, wherein the step (1) specifically comprises the steps of:
(1.1) adding crank call numbers to be intercepted and unconditionally accepted numbers by the client, wherein the adding mode is to select and add complete numbers, prefix numbers and telephone digits;
and (1.2) after the server is started, the client can be connected with the server by selecting a manual connection party.
(1.3) when uploading the file, the client automatically encapsulates the number added by the user into a file and transmits the file to the server; when downloading the file, the server calls out the data in the database and transmits the data to the client in a file form; the client analyzes the file into specific data and transmits the data into the user interface.
3. The private cloud-based crank call intercepting method according to claim 1, wherein in the step (2), each data is processed sequentially, then existing data in the database is divided into different layers according to length, new data is transmitted into the lowest layer, and the new data is preprocessed.
4. The private cloud-based harassing call intercepting method according to claim 1, wherein the step (3) specifically comprises the steps of:
(3.1) the server sequentially processes each piece of received data, divides the data into different length ranges for matching, firstly divides the data into the data with the length smaller than the length of the data, searches for a matching rule which uses a prefix to represent the number, and if the matching rule is found, the number does not need to be added;
(3.2) dividing the data into data with the same length, and when the same number appears or a number which is the same as the number except the last digit is "#" is found, the new data does not need to be added;
and (3.3) finally dividing the data into data with the length longer than the data length, and judging whether the data can replace the old data or not.
(3.4) counting in different length ranges in the whole database after the data are completely received; when a number of a certain length is found to be all the same except for the last digit, and the last digit is all present from 0 to 9, the last digit is replaced with a "#".
5. The private cloud-based crank call intercepting method according to claim 1, wherein a number for intercepting crank calls and an account of a client are intercepted after a merged intercepting rule is required to be transmitted when data is transmitted to the database in the step (4).
6. The private cloud-based harassing call intercepting method according to claim 1, wherein in the step (5), the client matches the unfamiliar incoming call with the black and white list by using a finite automaton-based pattern matching algorithm; if the blacklist is successfully matched, the reflection technology is utilized to realize the hanging up of the telephone through the program; and if the white list is matched successfully, continuing dialing and waiting for the user to answer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911042912.4A CN110809082B (en) | 2019-10-30 | 2019-10-30 | Private cloud-based harassing call interception method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911042912.4A CN110809082B (en) | 2019-10-30 | 2019-10-30 | Private cloud-based harassing call interception method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110809082A true CN110809082A (en) | 2020-02-18 |
CN110809082B CN110809082B (en) | 2021-04-16 |
Family
ID=69489630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911042912.4A Active CN110809082B (en) | 2019-10-30 | 2019-10-30 | Private cloud-based harassing call interception method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110809082B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102811202A (en) * | 2011-06-01 | 2012-12-05 | 网秦无限(北京)科技有限公司 | Method and system for preventing harassment calls through cloud computing |
CN106506769A (en) * | 2016-10-08 | 2017-03-15 | 浙江鹏信信息科技股份有限公司 | A kind of utilization real time algorithm realizes the method and system that malicious call is filtered |
CN108399233A (en) * | 2018-02-24 | 2018-08-14 | 山东汇贸电子口岸有限公司 | A kind of enquiring and optimizing method of the distributed data base based on algorithm |
CN109302539A (en) * | 2018-09-04 | 2019-02-01 | 湖南人文科技学院 | Harassing call hold-up interception method and device |
CN110113472A (en) * | 2019-05-10 | 2019-08-09 | 南京硅基智能科技有限公司 | A kind of method and system based on cloud virtual handset identity harassing call |
-
2019
- 2019-10-30 CN CN201911042912.4A patent/CN110809082B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102811202A (en) * | 2011-06-01 | 2012-12-05 | 网秦无限(北京)科技有限公司 | Method and system for preventing harassment calls through cloud computing |
CN106506769A (en) * | 2016-10-08 | 2017-03-15 | 浙江鹏信信息科技股份有限公司 | A kind of utilization real time algorithm realizes the method and system that malicious call is filtered |
CN108399233A (en) * | 2018-02-24 | 2018-08-14 | 山东汇贸电子口岸有限公司 | A kind of enquiring and optimizing method of the distributed data base based on algorithm |
CN109302539A (en) * | 2018-09-04 | 2019-02-01 | 湖南人文科技学院 | Harassing call hold-up interception method and device |
CN110113472A (en) * | 2019-05-10 | 2019-08-09 | 南京硅基智能科技有限公司 | A kind of method and system based on cloud virtual handset identity harassing call |
Also Published As
Publication number | Publication date |
---|---|
CN110809082B (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10244105B2 (en) | Methods and systems for real time display of caller location, profile, and trust relationship | |
US8971859B2 (en) | Method for blocking crank calls by using cloud computing and a system thereof | |
CA2916217C (en) | Determining a time to permit a communications session to be conducted | |
US8667136B2 (en) | Communication system | |
US20110294481A1 (en) | E-Mail to Phone Number Resolution for Mobile to Mobile, Mobile to Landline, And PC to Mobile Communications | |
JP2008507867A (en) | Realization of short message service | |
CN110809082B (en) | Private cloud-based harassing call interception method | |
US8457683B2 (en) | Method for establishing communication from a mobile terminal in dual mode | |
US20050259666A1 (en) | Method for distributing and collecting address information | |
KR20100057724A (en) | System and method for service caller information presentation | |
SG185836A1 (en) | System and method for displaying an identifier of a source on a recipient device | |
KR20030021065A (en) | Method of controlling connection of terminal to internet site | |
KR102321584B1 (en) | System for providing message sending service using safe keyword | |
EP2056561A1 (en) | Transmission of messages | |
EP1819132B1 (en) | Method and system for addressing in relation to multiple applications | |
KR100560631B1 (en) | Integrated management device for managing content providers and mobile communication service system including integrated management device | |
KR100893689B1 (en) | A method and system for providing telephone number information service using SMS | |
CN1731800A (en) | Short message web address telephonic communication system and its method | |
SE518175C2 (en) | Server and method for providing information to a subscriber's terminal | |
KR100590689B1 (en) | Method and system for connecting internet application service by using counterpart's telephone number | |
KR100600494B1 (en) | Subscriber information management method for mobile communication service system | |
CN111065094A (en) | Address book transmission method and device, storage medium and electronic equipment | |
WO2019061131A1 (en) | Method, server, and terminal for accessing conversation records | |
Harmat et al. | A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan | |
FR2823931A1 (en) | Centralised address book management system updates local copies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |