CN111479274A - Called harassment prevention method, system and device of IMS network - Google Patents

Called harassment prevention method, system and device of IMS network Download PDF

Info

Publication number
CN111479274A
CN111479274A CN202010184953.3A CN202010184953A CN111479274A CN 111479274 A CN111479274 A CN 111479274A CN 202010184953 A CN202010184953 A CN 202010184953A CN 111479274 A CN111479274 A CN 111479274A
Authority
CN
China
Prior art keywords
password
called
server
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010184953.3A
Other languages
Chinese (zh)
Inventor
王文重
张建军
鲍尚策
徐汝存
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Comleader Information Technology Co Ltd
Original Assignee
Zhuhai Comleader Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Comleader Information Technology Co Ltd filed Critical Zhuhai Comleader Information Technology Co Ltd
Priority to CN202010184953.3A priority Critical patent/CN111479274A/en
Publication of CN111479274A publication Critical patent/CN111479274A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a called harassment prevention method, a system and a device of an IMS network, wherein the method comprises the following steps: a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal; a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result. The invention has at least the following beneficial effects: by setting the voice password, the called party receives the call invitation after the caller passes the password verification, and the harassment of the called party can be effectively prevented while the effective passing is ensured; meanwhile, passwords with different complexities can be set according to requirements so as to meet the safety requirements of different levels.

Description

Called harassment prevention method, system and device of IMS network
Technical Field
The invention relates to the technical field of telephone communication, in particular to a called harassment prevention method, a system and a device of an IMS network.
Background
The harassing call becomes the biggest puzzlement of users, especially the user information leakage incident that constantly explodes causes the harassing call condition more serious, threatens user's conversation safety.
The current harassing call prevention scheme of operators is a harassing call interception scheme based on number segment blacklists. The main problem of the anti-harassment scheme based on the blacklist is that certain number segment (such as 95 number segment) harassment numbers are very many, but a large amount of normal services such as bank insurance and the like exist. The number segment is set as a blacklist, and many normal service calls cannot be received. On the other hand, the numbers and number sections of the harassing calls are changed continuously, and are often used for no complement after the harassing calls are set.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a called harassment prevention method of an IMS network, which can effectively prevent harassment.
The invention also provides an IMS network called anti-harassment system using the IMS network called anti-harassment method.
The invention also provides an IMS network called anti-harassment device using the IMS network called anti-harassment method.
According to the first aspect of the invention, the called harassment prevention method of the IMS network comprises the following steps: a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal; a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result.
The called harassment prevention method of the IMS network according to the embodiment of the invention at least has the following beneficial effects: by setting the voice password, the called receives the call invitation after the caller passes the password verification, so that the called harassment can be effectively prevented while the effective call is ensured; meanwhile, passwords with different complexities can be set according to requirements so as to meet the safety requirements of different levels.
According to some embodiments of the invention, the verification triggering step comprises: the server detects whether the called terminal activates a password anti-harassment service or not; and if the called terminal is opened, the server forwards password voice prompt information preset by the called terminal to the calling terminal. Triggering a password verification function only for a called terminal which opens a password anti-harassment service when the called terminal is called; for unopened calls, the call can be shielded or the call request can be directly forwarded according to the original segment blacklist, so that various flexible services are provided, and the requirements of different users are met.
According to some embodiments of the invention, the password reply information comprises: key press information or voice reply information. The key information can be used for simply preventing recording open-head type telephone harassment; the voice response information can be applied to high-privacy occasions.
According to some embodiments of the present invention, the key information is sent to the server via a SIP protocol INFO message, RFC2833 protocol mode or in-band dual tone multi-frequency mode. The key information may be transmitted in a variety of ways.
According to some embodiments of the invention, the password verification step comprises: if the password reply information is the key information and is sent to the server through an SIP protocol INFO message, the server directly extracts the key information from the INFO message and compares the key information with a password answer preset by the called terminal to obtain a password verification result; if the password reply information is the key information and is sent to the server in an RFC2833 protocol mode or an in-band dual tone multi-frequency mode, the server identifies the key information and compares the key information with a password answer preset by the called terminal to obtain a password verification result; if the password reply information is the voice reply information, the server performs voice recognition on the voice reply information, extracts features, and compares the features with a password answer preset by the called terminal to obtain a password verification result. Different password reply information is processed in a plurality of modes in the verification process.
According to some embodiments of the invention, the forwarding call step comprises: if the password verification result is passed, the server side forwards the call request to the called terminal; and if the password verification result is failure, the server rejects the call request. The calling terminal which fails verification directly rejects the call request of the calling terminal by the server, so that the called terminal is prevented from being harassed; and passing the verification so that the called terminal can receive a normal call request.
According to the second aspect of the invention, the called harassment prevention system of the IMS network comprises: the terminal module is used for sending or receiving a call request and carrying out a call; and the server module is used for carrying out password verification on the call request by using the called harassment prevention method of the IMS network in the embodiment of the first aspect of the invention.
The called harassment prevention system of the IMS network according to the embodiment of the invention at least has the following beneficial effects: the voice password is set to set a disturbance-prevention barrier for the called terminal module, and meanwhile, the calling terminal module passing the password verification is released, so that normal conversation is guaranteed; and passwords with different security levels can be set according to the needs of users.
According to some embodiments of the invention, the server module comprises: the media resource module is used for playing password voice prompt information preset by the called terminal module to the calling terminal module and identifying and analyzing keying information and voice response information in an RFC2833 protocol mode or an in-band dual-tone multi-frequency mode; the call control module is used for detecting whether the called terminal module opens a password authentication service, triggering password authentication, forwarding the call request to the called terminal module according to a password authentication result, and extracting key information transmitted by an SIP protocol INFO message; and the password verification module is used for comparing the password reply information of the terminal of the calling party with the password answer of the terminal of the called party to obtain the password verification result. The media resource module processes relatively complex voice reply information, and the call control module controls the flow of password verification and judges whether to forward a call request later, thereby ensuring the successful verification under various password modes.
According to some embodiments of the invention, the server module further comprises: and the password setting module is used for opening a password verification service and setting password voice prompt information and password answers. Through the password setting module, the user can select whether to open the password authentication service and order passwords with different security levels.
According to the called anti-harassment device of the IMS network in the third embodiment of the invention, the called anti-harassment method of the IMS network in the first embodiment of the invention is used for carrying out password verification on the call request.
The called harassment prevention system of the IMS network according to the embodiment of the invention at least has the following beneficial effects: the voice password is set to set a disturbance-prevention barrier for the called terminal module, and meanwhile, the calling terminal module passing the password verification is released, so that normal conversation is guaranteed; and passwords with different security levels can be set according to the needs of users.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic illustration of the method steps of an embodiment of the present invention;
FIG. 2 is a schematic block diagram of a system according to an embodiment of the present invention;
fig. 3 is an interaction diagram in a call flow according to an embodiment of the present invention.
Reference numerals:
a terminal module 100, a server module 200, a media resource module 210, a call control module 220, a password setting module 230, and a password verification module 240.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
The noun explains:
IMS (IP Multimedia Subsystem), which is an IP Multimedia system, is a new Multimedia service format and can meet the requirements of more novel and diversified Multimedia services for end users. The IMS is considered as a core technology of a next-generation network, and is also an important way to solve the convergence of mobile and fixed networks and introduce differentiated services such as triple convergence of voice, data, and video.
UE, (User Equipment), User Equipment.
AS, (full Application Server), Application Server.
MRS, (Media Resource Server) Media Resource service.
S-CSCF, (full serving Call Session Control Function), serving Call Control Function.
ACK (acknowledgement character) is a kind of transmission control character that the receiving station sends to the sending station in data communication, and indicates that the sent data has been acknowledged and received without error.
The method of the embodiment of the invention comprises three steps: a verification triggering step, a password verification step and a call forwarding step. Referring to fig. 1, a server receives a call request initiated by a calling terminal to a called terminal, and forwards password voice prompt information preset by the called terminal to the calling terminal; then, the server receives the password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result; and then, forwarding the call request to the called terminal according to the password verification result.
In the embodiment of the invention, a calling terminal calls a called terminal, a call request passes through a server, the server firstly detects whether the called terminal opens a password verification service, and if the called terminal opens the password verification service, a password verification process is triggered; otherwise, executing normal number segment blacklist verification or directly forwarding the call request to the called terminal. The password authentication process is as follows: the server side takes out the preset password voice prompt information of the called terminal and plays the calling terminal; the user of the calling terminal performs related operations according to the content of the password voice prompt information, and the calling terminal sends password reply information to the server; and the server receives the password reply information, analyzes and processes the password reply information, compares the password reply information with a password answer preset by the called terminal, and judges whether the password is verified. And for the call passing the password verification, the server forwards the call request to the called terminal.
In the embodiment of the invention, the preset of the called terminal password voice prompt information and the password answer can be set by connecting with an OSS system of an operator through any one of a WeChat public number, an operator APP or a short message mode.
In the embodiment of the invention, the password reply information is key information or voice reply information. Generally, if a user only wants to simply prevent telephone harassment at the beginning of a common recording, the user can simply request a caller to input a certain key (1-9, #) or input a simple four-rule operation result; if the user needs high privacy and only allows people who know the password to call in, the caller can be required to input a multi-digit password through keys or speak the password through voice, and the media resource server extracts features through voice recognition to judge whether the password is allowed to pass or not. The key is mainly sent to the server through three transmission modes: carrying SIP protocol INFO message; RFC2833 protocol mode; 3. in-band dual tone multi-frequency mode. For the first mode, the server side directly obtains a key value from the INFO message and compares the key value with a password answer preset by the called terminal; for the 2 nd and 3 rd modes, the media resource server needs to identify the mode and then compares the mode with the password answer preset by the called terminal.
The system of an embodiment of the present invention, referring to fig. 2, includes: a terminal module 100 and a service end module 200; for ease of understanding, fig. 2 shows 2 terminal modules 100, one of which is the calling terminal module and the other of which is the called terminal module. It should be understood that in embodiments of the present invention, multiple terminal modules may be included; the same terminal module can be used as a calling terminal module and a called terminal module. The terminal module 100 is configured to initiate or receive a call request to perform a call. The server module 200 is configured to perform password verification on the call request.
In the system of the embodiment of the present invention, the server module 200 further includes: a media resource module 210, a call control module 220, and a password authentication module 240, see fig. 2. The call control module 220 is mainly configured to detect whether a called terminal module activates a password authentication service, trigger password authentication, and forward the call request to the called terminal module according to a password authentication result; in addition, the call control module 220 is also responsible for extracting the key information carried in the SIP protocol INFO message. The media resource module 210 is configured to play password voice prompt information preset by the called terminal module to the calling terminal module, perform voice recognition on the voice reply information, and extract corresponding feature information; in addition, the media resource module 210 is also configured to identify RFC2833 and key information in the dual tone multi-frequency mode. And the password verification module 240 is configured to compare the identified password reply information of the calling terminal module with a password answer preset by the called terminal module, and obtain a password verification result.
In the system of the embodiment of the present invention, the server module 200 further includes: and a password setting module 230, configured to activate a password authentication service, and set password voice prompt information and a password answer. The settable password voice prompt information comprises the following contents: for example, "please press the X key", "please input 1+1 equal to several on the keyboard", "please speak the connector number", etc. The password voice prompt information and the password answer are preset, and the password voice prompt information and the password answer can be set by connecting with an OSS (open service system) of an operator through any one of a WeChat public number, an operator APP (application) or a short message mode, and the password voice prompt information and the password answer are opened.
Fig. 3 shows the interaction of modules in an embodiment of the present invention during a call process. In fig. 3, UE a is a terminal module as a calling party, and UE B is a terminal module as a called party. The media resource module 210 in the server module 200 is disposed on an MRS (i.e., a resource media server), and the call control module 230 is disposed on an S-CSCF (i.e., a call control function) of an authentication AS (an authentication application server). UE A sends a call request, and the call request is received by the verification AS to trigger verification service. And when the UE B opens the password verification service, the verification AS sends a signal in the process of conversation to the UE A, and the MRS plays the password voice prompt information preset by the UE B to the UE A. If the UE A sends a plurality of SIP protocol INFO information according to the operation of a user, and the INFO information carries key value information, the verification AS extracts the key information and compares the key information with a password answer preset by a called terminal module UE B; if UE A sends some voice reply information according to user's operation, then the voice reply information is sent to MRS, MRS will identify and verify the voice reply information through AI voice recognition, obtain the verification result. And the verification AS judges whether the verification is passed according to the verification information sent by the verification AS or the MRS, and forwards the call request to the UE B after the verification is passed. And the UE B receives the call request and returns a message code in the ringing to the UE A through the verification AS. If the user of UE B connects the call, the verification AS transfers the successful conversation information transmitted by UE B to UE A; UE A receives the successful information of the session and sends the successful information to UE B through verification AS; after receiving the acknowledgement message of the UE a, the UE B establishes a call connection between the calling terminal module UE a and the called terminal module UE B.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (10)

1. A called harassment prevention method of an IMS network is characterized by comprising the following steps:
a verification triggering step, in which a server receives a call request initiated by a calling terminal to a called terminal and forwards password voice prompt information preset by the called terminal to the calling terminal;
a password verification step, in which the server receives password reply information sent by the calling terminal, analyzes the password reply information and compares the password reply information with a password answer preset by the called terminal to obtain a password verification result;
and a call forwarding step, in which the server forwards the call request to the called terminal according to the password verification result.
2. The IMS network called harassment prevention method according to claim 1, wherein said verification triggering step includes:
the server detects whether the called terminal activates a password anti-harassment service or not;
and if the called terminal is opened, the server forwards password voice prompt information preset by the called terminal to the calling terminal.
3. The IMS network called harassment prevention method according to claim 1, wherein said password reply information includes: key press information or voice reply information.
4. The IMS network called harassment prevention method according to claim 3, wherein the key information is sent to the server side by way of SIP protocol INFO message, RFC2833 protocol or in-band DTMF.
5. The IMS network called harassment prevention method according to claim 4, wherein said password verification step includes:
if the password reply information is the key information and is sent to the server through an SIP protocol INFO message, the server directly extracts the key information from the INFO message and compares the key information with a password answer preset by the called terminal to obtain a password verification result;
if the password reply information is the key information and is sent to the server in an RFC2833 protocol mode or an in-band dual tone multi-frequency mode, the server identifies the key information and compares the key information with a password answer preset by the called terminal to obtain a password verification result;
if the password reply information is the voice reply information, the server performs voice recognition on the voice reply information, extracts features, and compares the features with a password answer preset by the called terminal to obtain a password verification result.
6. The IMS network called harassment prevention method according to claim 1, wherein said call forwarding step includes:
if the password verification result is passed, the server side forwards the call request to the called terminal;
and if the password verification result is failure, the server rejects the call request.
7. An IMS network called anti-harassment system, characterized by comprising:
the terminal module is used for sending or receiving a call request and carrying out a call;
a server module for performing password authentication on the call request using the method of any one of claims 1 to 6.
8. The IMS network called anti-harassment system according to claim 7, characterized in that said server side module comprises:
the media resource module is used for playing password voice prompt information preset by the called terminal module to the calling terminal module and identifying and analyzing keying information and voice response information in an RFC2833 protocol mode or an in-band dual-tone multi-frequency mode;
the call control module is used for detecting whether the called terminal module opens a password authentication service, triggering password authentication, forwarding the call request to the called terminal module according to a password authentication result, and extracting key information transmitted by an SIP protocol INFO message;
and the password verification module is used for comparing the password reply information of the terminal of the calling party with the password answer of the terminal of the called party to obtain the password verification result.
9. The IMS network called harassment prevention system according to claim 8, wherein said server module further includes:
and the password setting module is used for opening a password verification service and setting password voice prompt information and password answers.
10. An IMS network called anti-harassment device, characterized in that a call request is password verified using the method of any one of claims 1 to 6.
CN202010184953.3A 2020-03-17 2020-03-17 Called harassment prevention method, system and device of IMS network Pending CN111479274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010184953.3A CN111479274A (en) 2020-03-17 2020-03-17 Called harassment prevention method, system and device of IMS network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010184953.3A CN111479274A (en) 2020-03-17 2020-03-17 Called harassment prevention method, system and device of IMS network

Publications (1)

Publication Number Publication Date
CN111479274A true CN111479274A (en) 2020-07-31

Family

ID=71747596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010184953.3A Pending CN111479274A (en) 2020-03-17 2020-03-17 Called harassment prevention method, system and device of IMS network

Country Status (1)

Country Link
CN (1) CN111479274A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984405A (en) * 2006-06-05 2007-06-20 华为技术有限公司 Method for transmitting cell-phone button information
CN105450827A (en) * 2015-11-11 2016-03-30 中国联合网络通信集团有限公司 Call processing method, user terminal and server
CN106506784A (en) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 A kind of method and device of blocking disturbance call
CN108234395A (en) * 2016-12-14 2018-06-29 中兴通讯股份有限公司 A kind of call monitoring method and device
CN108574940A (en) * 2017-03-07 2018-09-25 腾讯科技(深圳)有限公司 A kind for the treatment of method and apparatus of incoming call
CN108737665A (en) * 2017-04-24 2018-11-02 中兴通讯股份有限公司 A kind of implementation method and device that incoming call is anti-harassment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984405A (en) * 2006-06-05 2007-06-20 华为技术有限公司 Method for transmitting cell-phone button information
CN106506784A (en) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 A kind of method and device of blocking disturbance call
WO2017041568A1 (en) * 2015-09-07 2017-03-16 中兴通讯股份有限公司 Method and device for intercepting harassing telephone calls
CN105450827A (en) * 2015-11-11 2016-03-30 中国联合网络通信集团有限公司 Call processing method, user terminal and server
CN108234395A (en) * 2016-12-14 2018-06-29 中兴通讯股份有限公司 A kind of call monitoring method and device
CN108574940A (en) * 2017-03-07 2018-09-25 腾讯科技(深圳)有限公司 A kind for the treatment of method and apparatus of incoming call
CN108737665A (en) * 2017-04-24 2018-11-02 中兴通讯股份有限公司 A kind of implementation method and device that incoming call is anti-harassment

Similar Documents

Publication Publication Date Title
US11778091B2 (en) Utilizing sip messages to determine the status of a remote terminal in VOIP communication systems
US9961197B2 (en) System, method and apparatus for authenticating calls
US8085915B2 (en) System and method for spam detection
US8654956B2 (en) Method and apparatus for treating potentially unauthorized calls
US20070171898A1 (en) System and method for establishing universal real time protocol bridging
KR101126775B1 (en) Centralized biometric authentication
US8050393B2 (en) Method and apparatus for evaluating possible 3-way call events
US8150005B1 (en) Method, architectures and technique for authentication of telephone calls
CN101355582B (en) Method and system for authentication of web page pointing and dialing
KR20070039150A (en) Voice over ip based biometric authentication
CN101317435A (en) Method, system, terminal and server terminal for blocking rubbish calls
EP2563001A1 (en) Method, system and apparatus for implementing secure call forwarding
CN107104979B (en) Method and system for realizing voice callback verification service
WO2013067806A1 (en) Terminal conversation switching method and device
US9571530B2 (en) Internet based telephone line
US8804932B2 (en) Protection of services in mobile network against CLI spoofing
CN108234395A (en) A kind of call monitoring method and device
US6343117B1 (en) Method of initiating a telephone security feature
CN111479274A (en) Called harassment prevention method, system and device of IMS network
KR100967604B1 (en) The call setup control method for reliability of the calling line identification presentation
CN113676604B (en) Voice processing method, related equipment and storage medium
US10979561B1 (en) PIN or secret-code based caller-id validation system
CN101420494B (en) Method and apparatus for establishing session connection for prepaid user
CN101247572B (en) Method and system for preventing communication terminal sequence vibration service loop nesting
CN101267428B (en) A method for indication and prevention in related message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200731