CN111479274A - Called harassment prevention method, system and device of IMS network - Google Patents
Called harassment prevention method, system and device of IMS network Download PDFInfo
- Publication number
- CN111479274A CN111479274A CN202010184953.3A CN202010184953A CN111479274A CN 111479274 A CN111479274 A CN 111479274A CN 202010184953 A CN202010184953 A CN 202010184953A CN 111479274 A CN111479274 A CN 111479274A
- Authority
- CN
- China
- Prior art keywords
- password
- called
- server
- information
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000002265 prevention Effects 0.000 title claims abstract description 19
- 238000012795 verification Methods 0.000 claims abstract description 71
- 239000000284 extract Substances 0.000 claims description 7
- 230000009977 dual effect Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 7
- 230000004888 barrier function Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a called harassment prevention method, a system and a device of an IMS network, wherein the method comprises the following steps: a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal; a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result. The invention has at least the following beneficial effects: by setting the voice password, the called party receives the call invitation after the caller passes the password verification, and the harassment of the called party can be effectively prevented while the effective passing is ensured; meanwhile, passwords with different complexities can be set according to requirements so as to meet the safety requirements of different levels.
Description
Technical Field
The invention relates to the technical field of telephone communication, in particular to a called harassment prevention method, a system and a device of an IMS network.
Background
The harassing call becomes the biggest puzzlement of users, especially the user information leakage incident that constantly explodes causes the harassing call condition more serious, threatens user's conversation safety.
The current harassing call prevention scheme of operators is a harassing call interception scheme based on number segment blacklists. The main problem of the anti-harassment scheme based on the blacklist is that certain number segment (such as 95 number segment) harassment numbers are very many, but a large amount of normal services such as bank insurance and the like exist. The number segment is set as a blacklist, and many normal service calls cannot be received. On the other hand, the numbers and number sections of the harassing calls are changed continuously, and are often used for no complement after the harassing calls are set.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a called harassment prevention method of an IMS network, which can effectively prevent harassment.
The invention also provides an IMS network called anti-harassment system using the IMS network called anti-harassment method.
The invention also provides an IMS network called anti-harassment device using the IMS network called anti-harassment method.
According to the first aspect of the invention, the called harassment prevention method of the IMS network comprises the following steps: a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal; a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result.
The called harassment prevention method of the IMS network according to the embodiment of the invention at least has the following beneficial effects: by setting the voice password, the called receives the call invitation after the caller passes the password verification, so that the called harassment can be effectively prevented while the effective call is ensured; meanwhile, passwords with different complexities can be set according to requirements so as to meet the safety requirements of different levels.
According to some embodiments of the invention, the verification triggering step comprises: the server detects whether the called terminal activates a password anti-harassment service or not; and if the called terminal is opened, the server forwards password voice prompt information preset by the called terminal to the calling terminal. Triggering a password verification function only for a called terminal which opens a password anti-harassment service when the called terminal is called; for unopened calls, the call can be shielded or the call request can be directly forwarded according to the original segment blacklist, so that various flexible services are provided, and the requirements of different users are met.
According to some embodiments of the invention, the password reply information comprises: key press information or voice reply information. The key information can be used for simply preventing recording open-head type telephone harassment; the voice response information can be applied to high-privacy occasions.
According to some embodiments of the present invention, the key information is sent to the server via a SIP protocol INFO message, RFC2833 protocol mode or in-band dual tone multi-frequency mode. The key information may be transmitted in a variety of ways.
According to some embodiments of the invention, the password verification step comprises: if the password reply information is the key information and is sent to the server through an SIP protocol INFO message, the server directly extracts the key information from the INFO message and compares the key information with a password answer preset by the called terminal to obtain a password verification result; if the password reply information is the key information and is sent to the server in an RFC2833 protocol mode or an in-band dual tone multi-frequency mode, the server identifies the key information and compares the key information with a password answer preset by the called terminal to obtain a password verification result; if the password reply information is the voice reply information, the server performs voice recognition on the voice reply information, extracts features, and compares the features with a password answer preset by the called terminal to obtain a password verification result. Different password reply information is processed in a plurality of modes in the verification process.
According to some embodiments of the invention, the forwarding call step comprises: if the password verification result is passed, the server side forwards the call request to the called terminal; and if the password verification result is failure, the server rejects the call request. The calling terminal which fails verification directly rejects the call request of the calling terminal by the server, so that the called terminal is prevented from being harassed; and passing the verification so that the called terminal can receive a normal call request.
According to the second aspect of the invention, the called harassment prevention system of the IMS network comprises: the terminal module is used for sending or receiving a call request and carrying out a call; and the server module is used for carrying out password verification on the call request by using the called harassment prevention method of the IMS network in the embodiment of the first aspect of the invention.
The called harassment prevention system of the IMS network according to the embodiment of the invention at least has the following beneficial effects: the voice password is set to set a disturbance-prevention barrier for the called terminal module, and meanwhile, the calling terminal module passing the password verification is released, so that normal conversation is guaranteed; and passwords with different security levels can be set according to the needs of users.
According to some embodiments of the invention, the server module comprises: the media resource module is used for playing password voice prompt information preset by the called terminal module to the calling terminal module and identifying and analyzing keying information and voice response information in an RFC2833 protocol mode or an in-band dual-tone multi-frequency mode; the call control module is used for detecting whether the called terminal module opens a password authentication service, triggering password authentication, forwarding the call request to the called terminal module according to a password authentication result, and extracting key information transmitted by an SIP protocol INFO message; and the password verification module is used for comparing the password reply information of the terminal of the calling party with the password answer of the terminal of the called party to obtain the password verification result. The media resource module processes relatively complex voice reply information, and the call control module controls the flow of password verification and judges whether to forward a call request later, thereby ensuring the successful verification under various password modes.
According to some embodiments of the invention, the server module further comprises: and the password setting module is used for opening a password verification service and setting password voice prompt information and password answers. Through the password setting module, the user can select whether to open the password authentication service and order passwords with different security levels.
According to the called anti-harassment device of the IMS network in the third embodiment of the invention, the called anti-harassment method of the IMS network in the first embodiment of the invention is used for carrying out password verification on the call request.
The called harassment prevention system of the IMS network according to the embodiment of the invention at least has the following beneficial effects: the voice password is set to set a disturbance-prevention barrier for the called terminal module, and meanwhile, the calling terminal module passing the password verification is released, so that normal conversation is guaranteed; and passwords with different security levels can be set according to the needs of users.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic illustration of the method steps of an embodiment of the present invention;
FIG. 2 is a schematic block diagram of a system according to an embodiment of the present invention;
fig. 3 is an interaction diagram in a call flow according to an embodiment of the present invention.
Reference numerals:
a terminal module 100, a server module 200, a media resource module 210, a call control module 220, a password setting module 230, and a password verification module 240.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
The noun explains:
IMS (IP Multimedia Subsystem), which is an IP Multimedia system, is a new Multimedia service format and can meet the requirements of more novel and diversified Multimedia services for end users. The IMS is considered as a core technology of a next-generation network, and is also an important way to solve the convergence of mobile and fixed networks and introduce differentiated services such as triple convergence of voice, data, and video.
UE, (User Equipment), User Equipment.
AS, (full Application Server), Application Server.
MRS, (Media Resource Server) Media Resource service.
S-CSCF, (full serving Call Session Control Function), serving Call Control Function.
ACK (acknowledgement character) is a kind of transmission control character that the receiving station sends to the sending station in data communication, and indicates that the sent data has been acknowledged and received without error.
The method of the embodiment of the invention comprises three steps: a verification triggering step, a password verification step and a call forwarding step. Referring to fig. 1, a server receives a call request initiated by a calling terminal to a called terminal, and forwards password voice prompt information preset by the called terminal to the calling terminal; then, the server receives the password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and then, forwarding the call request to the called terminal according to the password verification result.
In the embodiment of the invention, a calling terminal calls a called terminal, a call request passes through a server, the server firstly detects whether the called terminal opens a password verification service, and if the called terminal opens the password verification service, a password verification process is triggered; otherwise, executing normal number segment blacklist verification or directly forwarding the call request to the called terminal. The password authentication process is as follows: the server side takes out the preset password voice prompt information of the called terminal and plays the calling terminal; the user of the calling terminal performs related operations according to the content of the password voice prompt information, and the calling terminal sends password reply information to the server; and the server receives the password reply information, analyzes and processes the password reply information, compares the password reply information with a password answer preset by the called terminal, and judges whether the password is verified. And for the call passing the password verification, the server forwards the call request to the called terminal.
In the embodiment of the invention, the preset of the called terminal password voice prompt information and the password answer can be set by connecting with an OSS system of an operator through any one of a WeChat public number, an operator APP or a short message mode.
In the embodiment of the invention, the password reply information is key information or voice reply information. Generally, if a user only wants to simply prevent telephone harassment at the beginning of a common recording, the user can simply request a caller to input a certain key (1-9, #) or input a simple four-rule operation result; if the user needs high privacy and only allows people who know the password to call in, the caller can be required to input a multi-digit password through keys or speak the password through voice, and the media resource server extracts features through voice recognition to judge whether the password is allowed to pass or not. The key is mainly sent to the server through three transmission modes: carrying SIP protocol INFO message; RFC2833 protocol mode; 3. in-band dual tone multi-frequency mode. For the first mode, the server side directly obtains a key value from the INFO message and compares the key value with a password answer preset by the called terminal; for the 2 nd and 3 rd modes, the media resource server needs to identify the mode and then compares the mode with the password answer preset by the called terminal.
The system of an embodiment of the present invention, referring to fig. 2, includes: a terminal module 100 and a service end module 200; for ease of understanding, fig. 2 shows 2 terminal modules 100, one of which is the calling terminal module and the other of which is the called terminal module. It should be understood that in embodiments of the present invention, multiple terminal modules may be included; the same terminal module can be used as a calling terminal module and a called terminal module. The terminal module 100 is configured to initiate or receive a call request to perform a call. The server module 200 is configured to perform password verification on the call request.
In the system of the embodiment of the present invention, the server module 200 further includes: a media resource module 210, a call control module 220, and a password authentication module 240, see fig. 2. The call control module 220 is mainly configured to detect whether a called terminal module activates a password authentication service, trigger password authentication, and forward the call request to the called terminal module according to a password authentication result; in addition, the call control module 220 is also responsible for extracting the key information carried in the SIP protocol INFO message. The media resource module 210 is configured to play password voice prompt information preset by the called terminal module to the calling terminal module, perform voice recognition on the voice reply information, and extract corresponding feature information; in addition, the media resource module 210 is also configured to identify RFC2833 and key information in the dual tone multi-frequency mode. And the password verification module 240 is configured to compare the identified password reply information of the calling terminal module with a password answer preset by the called terminal module, and obtain a password verification result.
In the system of the embodiment of the present invention, the server module 200 further includes: and a password setting module 230, configured to activate a password authentication service, and set password voice prompt information and a password answer. The settable password voice prompt information comprises the following contents: for example, "please press the X key", "please input 1+1 equal to several on the keyboard", "please speak the connector number", etc. The password voice prompt information and the password answer are preset, and the password voice prompt information and the password answer can be set by connecting with an OSS (open service system) of an operator through any one of a WeChat public number, an operator APP (application) or a short message mode, and the password voice prompt information and the password answer are opened.
Fig. 3 shows the interaction of modules in an embodiment of the present invention during a call process. In fig. 3, UE a is a terminal module as a calling party, and UE B is a terminal module as a called party. The media resource module 210 in the server module 200 is disposed on an MRS (i.e., a resource media server), and the call control module 230 is disposed on an S-CSCF (i.e., a call control function) of an authentication AS (an authentication application server). UE A sends a call request, and the call request is received by the verification AS to trigger verification service. And when the UE B opens the password verification service, the verification AS sends a signal in the process of conversation to the UE A, and the MRS plays the password voice prompt information preset by the UE B to the UE A. If the UE A sends a plurality of SIP protocol INFO information according to the operation of a user, and the INFO information carries key value information, the verification AS extracts the key information and compares the key information with a password answer preset by a called terminal module UE B; if UE A sends some voice reply information according to user's operation, then the voice reply information is sent to MRS, MRS will identify and verify the voice reply information through AI voice recognition, obtain the verification result. And the verification AS judges whether the verification is passed according to the verification information sent by the verification AS or the MRS, and forwards the call request to the UE B after the verification is passed. And the UE B receives the call request and returns a message code in the ringing to the UE A through the verification AS. If the user of UE B connects the call, the verification AS transfers the successful conversation information transmitted by UE B to UE A; UE A receives the successful information of the session and sends the successful information to UE B through verification AS; after receiving the acknowledgement message of the UE a, the UE B establishes a call connection between the calling terminal module UE a and the called terminal module UE B.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.
Claims (10)
1. A called harassment prevention method of an IMS network is characterized by comprising the following steps:
a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal;
a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result;
and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result.
2. The IMS network called harassment prevention method according to claim 1, wherein said verification triggering step includes:
the server detects whether the called terminal activates a password anti-harassment service or not;
and if the called terminal is opened, the server forwards password voice prompt information preset by the called terminal to the calling terminal.
3. The IMS network called harassment prevention method according to claim 1, wherein said password reply information includes: key press information or voice reply information.
4. The IMS network called harassment prevention method according to claim 3, wherein the key information is sent to the server side by way of SIP protocol INFO message, RFC2833 protocol or in-band DTMF.
5. The IMS network called harassment prevention method according to claim 4, wherein said password verification step includes:
if the password reply information is the key information and is sent to the server through an SIP protocol INFO message, the server directly extracts the key information from the INFO message and compares the key information with a password answer preset by the called terminal to obtain a password verification result;
if the password reply information is the key information and is sent to the server in an RFC2833 protocol mode or an in-band dual tone multi-frequency mode, the server identifies the key information and compares the key information with a password answer preset by the called terminal to obtain a password verification result;
if the password reply information is the voice reply information, the server performs voice recognition on the voice reply information, extracts features, and compares the features with a password answer preset by the called terminal to obtain a password verification result.
6. The IMS network called harassment prevention method according to claim 1, wherein said call forwarding step includes:
if the password verification result is passed, the server side forwards the call request to the called terminal;
and if the password verification result is failure, the server rejects the call request.
7. An IMS network called anti-harassment system, characterized by comprising:
the terminal module is used for sending or receiving a call request and carrying out a call;
a server module for performing password authentication on the call request using the method of any one of claims 1 to 6.
8. The IMS network called anti-harassment system according to claim 7, characterized in that said server side module comprises:
the media resource module is used for playing password voice prompt information preset by the called terminal module to the calling terminal module and identifying and analyzing keying information and voice response information in an RFC2833 protocol mode or an in-band dual-tone multi-frequency mode;
the call control module is used for detecting whether the called terminal module opens a password authentication service, triggering password authentication, forwarding the call request to the called terminal module according to a password authentication result, and extracting key information transmitted by an SIP protocol INFO message;
and the password verification module is used for comparing the password reply information of the terminal of the calling party with the password answer of the terminal of the called party to obtain the password verification result.
9. The IMS network called harassment prevention system according to claim 8, wherein said server module further includes:
and the password setting module is used for opening a password verification service and setting password voice prompt information and password answers.
10. An IMS network called anti-harassment device, characterized in that a call request is password verified using the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010184953.3A CN111479274A (en) | 2020-03-17 | 2020-03-17 | Called harassment prevention method, system and device of IMS network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010184953.3A CN111479274A (en) | 2020-03-17 | 2020-03-17 | Called harassment prevention method, system and device of IMS network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111479274A true CN111479274A (en) | 2020-07-31 |
Family
ID=71747596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010184953.3A Pending CN111479274A (en) | 2020-03-17 | 2020-03-17 | Called harassment prevention method, system and device of IMS network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111479274A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1984405A (en) * | 2006-06-05 | 2007-06-20 | 华为技术有限公司 | Method for transmitting cell-phone button information |
CN105450827A (en) * | 2015-11-11 | 2016-03-30 | 中国联合网络通信集团有限公司 | Call processing method, user terminal and server |
CN106506784A (en) * | 2015-09-07 | 2017-03-15 | 中兴通讯股份有限公司 | A kind of method and device of blocking disturbance call |
CN108234395A (en) * | 2016-12-14 | 2018-06-29 | 中兴通讯股份有限公司 | A kind of call monitoring method and device |
CN108574940A (en) * | 2017-03-07 | 2018-09-25 | 腾讯科技(深圳)有限公司 | A kind for the treatment of method and apparatus of incoming call |
CN108737665A (en) * | 2017-04-24 | 2018-11-02 | 中兴通讯股份有限公司 | A kind of implementation method and device that incoming call is anti-harassment |
-
2020
- 2020-03-17 CN CN202010184953.3A patent/CN111479274A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1984405A (en) * | 2006-06-05 | 2007-06-20 | 华为技术有限公司 | Method for transmitting cell-phone button information |
CN106506784A (en) * | 2015-09-07 | 2017-03-15 | 中兴通讯股份有限公司 | A kind of method and device of blocking disturbance call |
WO2017041568A1 (en) * | 2015-09-07 | 2017-03-16 | 中兴通讯股份有限公司 | Method and device for intercepting harassing telephone calls |
CN105450827A (en) * | 2015-11-11 | 2016-03-30 | 中国联合网络通信集团有限公司 | Call processing method, user terminal and server |
CN108234395A (en) * | 2016-12-14 | 2018-06-29 | 中兴通讯股份有限公司 | A kind of call monitoring method and device |
CN108574940A (en) * | 2017-03-07 | 2018-09-25 | 腾讯科技(深圳)有限公司 | A kind for the treatment of method and apparatus of incoming call |
CN108737665A (en) * | 2017-04-24 | 2018-11-02 | 中兴通讯股份有限公司 | A kind of implementation method and device that incoming call is anti-harassment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11778091B2 (en) | Utilizing sip messages to determine the status of a remote terminal in VOIP communication systems | |
US9961197B2 (en) | System, method and apparatus for authenticating calls | |
US8085915B2 (en) | System and method for spam detection | |
US8654956B2 (en) | Method and apparatus for treating potentially unauthorized calls | |
US20070171898A1 (en) | System and method for establishing universal real time protocol bridging | |
KR101126775B1 (en) | Centralized biometric authentication | |
US8050393B2 (en) | Method and apparatus for evaluating possible 3-way call events | |
US8150005B1 (en) | Method, architectures and technique for authentication of telephone calls | |
CN101355582B (en) | Method and system for authentication of web page pointing and dialing | |
KR20070039150A (en) | Voice over ip based biometric authentication | |
CN101317435A (en) | Method, system, terminal and server terminal for blocking rubbish calls | |
EP2563001A1 (en) | Method, system and apparatus for implementing secure call forwarding | |
CN107104979B (en) | Method and system for realizing voice callback verification service | |
WO2013067806A1 (en) | Terminal conversation switching method and device | |
US9571530B2 (en) | Internet based telephone line | |
US8804932B2 (en) | Protection of services in mobile network against CLI spoofing | |
CN108234395A (en) | A kind of call monitoring method and device | |
US6343117B1 (en) | Method of initiating a telephone security feature | |
CN111479274A (en) | Called harassment prevention method, system and device of IMS network | |
KR100967604B1 (en) | The call setup control method for reliability of the calling line identification presentation | |
CN113676604B (en) | Voice processing method, related equipment and storage medium | |
US10979561B1 (en) | PIN or secret-code based caller-id validation system | |
CN101420494B (en) | Method and apparatus for establishing session connection for prepaid user | |
CN101247572B (en) | Method and system for preventing communication terminal sequence vibration service loop nesting | |
CN101267428B (en) | A method for indication and prevention in related message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200731 |