CN112399420A - Anti-harassment method and system, computer storage medium - Google Patents

Anti-harassment method and system, computer storage medium Download PDF

Info

Publication number
CN112399420A
CN112399420A CN201910741905.7A CN201910741905A CN112399420A CN 112399420 A CN112399420 A CN 112399420A CN 201910741905 A CN201910741905 A CN 201910741905A CN 112399420 A CN112399420 A CN 112399420A
Authority
CN
China
Prior art keywords
call
calling
preset
user
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910741905.7A
Other languages
Chinese (zh)
Inventor
宗一鸣
远生
张赟
郭雷
黄继禾
刘思爰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201910741905.7A priority Critical patent/CN112399420A/en
Publication of CN112399420A publication Critical patent/CN112399420A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure relates to a disturbance prevention method and system, and a computer storage medium, and relates to the field of mobile communication. The disturbance prevention method comprises the following steps: receiving a call forwarded by a serving call session control function S-CSCF to which a called user belongs; inquiring whether a preset blacklist and a preset white list of a called user comprise the number of a calling user of the call, wherein the preset blacklist comprises an interception number, and the preset white list comprises a connection number; intercepting the call under the condition that the preset blacklist comprises the number of the calling user; under the condition that neither the preset blacklist nor the preset white list comprises the number of the calling party, inquiring label information corresponding to the number of the calling party; and intercepting the call under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, wherein the first label is related to the call content characteristics of the number of the calling user.

Description

Anti-harassment method and system, computer storage medium
Technical Field
The present disclosure relates to the field of mobile communications, and in particular, to a method and system for preventing harassment, and a computer-readable storage medium.
Background
At present, the problems of people disturbed by marketing calls, malicious phone disturbance and the like are increasingly prominent, and the normal life of people is seriously influenced.
In the related art, the calling behavior of the calling number is basically analyzed and processed to judge whether the calling number is a harassing call.
Disclosure of Invention
The inventor thinks that: not all strange number calls need to be intercepted, and different called users have different requirements, so that the related technology cannot realize specific anti-harassment protection on different called users.
In order to solve the technical problems, the disclosure provides a solution, which realizes the difference and accurate disturbance prevention protection of called users.
According to a first aspect of the present disclosure, there is provided an anti-harassment method comprising: receiving a call forwarded by a serving call session control function S-CSCF to which a called user belongs; inquiring whether a preset blacklist and a preset white list of a called user comprise the number of a calling user of the call, wherein the preset blacklist comprises an interception number, and the preset white list comprises a connection number; intercepting the call under the condition that the preset blacklist comprises the number of the calling user; under the condition that neither the preset blacklist nor the preset white list comprises the number of the calling user, inquiring label information corresponding to the number of the calling user; and intercepting the call under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, wherein the first label is related to the call content characteristics of the number of the calling user.
In some embodiments, the method further includes intercepting the call if the tag information corresponding to the number of the calling party includes a second tag, where the second tag is related to a call behavior characteristic of the number of the calling party.
In some embodiments, the anti-harassment method further includes sending a voice verification message to the calling party when the tag information corresponding to the number of the calling party includes a first tag and the number of times of marking of the first tag corresponding to the number of the calling party is smaller than a preset threshold of the called party.
In some embodiments, the anti-harassment method further includes sending voice verification information to the calling party in the absence of the tag information corresponding to the number of the calling party.
In some embodiments, in the event of a voice authentication failure, the call is intercepted; in case the voice authentication is successful, the call is connected.
In some embodiments, the voice verification is determined to be successful by detecting a DTMF key of the calling subscriber.
In some embodiments, the voice authentication failure comprises a voice authentication error or a voice authentication timeout.
In some embodiments, the voice verification message includes a digital verification code or mathematical calculation.
In some embodiments, the method for preventing harassment further comprises putting through the call if the preset white list includes the number of the calling subscriber.
In some embodiments, intercepting the call comprises notifying an S-CSCF to which the called user belongs to release the call.
In some embodiments, completing the call comprises notifying an S-CSCF to which the called user belongs to continue the call to the called user.
In some embodiments, the anti-harassment method further comprises: and receiving a call forwarded by a service call session control function (S-CSCF) to which the called user belongs under the condition that the Initial Filter Criteria (iFC) subscription information of the called user comprises a specific service, wherein the iFC subscription information is obtained by the S-CSCF to which the called user belongs through query of a Home Subscriber Server (HSS) to which the called user belongs.
According to a second aspect of the present disclosure, there is provided an anti-harassment system comprising: a security authentication device configured to receive a call forwarded by a serving call session control function S-CSCF to which a called user belongs; and a fraud prevention platform configured to query whether a preset blacklist and a preset white list of a called user include numbers of calling users of the call, the preset blacklist including interception numbers, the preset white list including a call-through number; under the condition that the preset blacklist comprises the number of the calling user, informing the safety verification equipment to intercept the call; under the condition that neither the preset blacklist nor the preset white list comprises the number of the calling party, inquiring label information corresponding to the number of the calling party from an anti-fraud alliance big data platform; and under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, informing the safety verification equipment to intercept the call, wherein the first label is related to the call content characteristic of the number of the calling user.
In some embodiments, the anti-harassment system further comprises: and the anti-fraud alliance big data platform is configured to store the corresponding relation between the number and the label information.
According to a third aspect of the present disclosure, there is provided an anti-harassment system comprising: a memory; and a processor coupled to the memory, the processor configured to execute the anti-harassment method of any of the above embodiments based on instructions stored in the memory.
According to a fourth aspect of the present disclosure, a computer-storable medium has stored thereon computer program instructions which, when executed by a processor, implement the anti-harassment method according to any of the embodiments described above.
In the embodiment, the difference and accurate anti-harassment protection of the called user is realized.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
FIG. 1 illustrates a flow diagram of a method of preventing harassment, according to some embodiments of the present disclosure;
FIG. 2 illustrates a schematic diagram of an anti-harassment method according to some embodiments of the present disclosure;
FIG. 3 illustrates a signaling diagram of an anti-harassment method in the case of successful voice verification, in accordance with some embodiments of the present disclosure;
FIG. 4 illustrates a signaling diagram of an anti-harassment method in the event of a voice authentication failure, in accordance with some embodiments of the present disclosure;
FIG. 5 illustrates a block diagram of an anti-harassment system in accordance with some embodiments of the present disclosure;
FIG. 6 shows a block diagram of an anti-harassment system of further embodiments of the present disclosure;
FIG. 7 illustrates a block diagram of a computer system for implementing some embodiments of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
FIG. 1 illustrates a flow diagram of a method of preventing harassment, according to some embodiments of the present disclosure.
As shown in fig. 1, the anti-harassment method includes steps S110 to S150. In some embodiments, the anti-harassment method is performed by an anti-harassment system.
In step S110, a Call forwarded by an S-CSCF (serving Call Session Control Function) to which the called user belongs is received. For example, the called user is a VoLTE (Voice over Long-Term Evolution) user.
In some embodiments, a call forwarded by a serving call session control function, S-CSCF, to which a called user belongs is received in case the iFC (initial Filter criterion) subscription information of the called user comprises a specific service. The iFC subscription information is obtained by the S-CSCF to which the called Subscriber belongs querying from an HSS (Home Subscriber Server) to which the called Subscriber belongs.
For example, in case that a calling subscriber calls a called subscriber, the calling subscriber' S call is connected to the S-CSCF to which the called subscriber belongs. And under the condition that the iFC subscription information of the called user comprises a specific service, the S-CSCF to which the called user belongs forwards the call of the calling user to the anti-harassment system. For example, the specific traffic is disturbance interception class traffic. The harassment interception class service comprises a 'winged Baotou' service. The iFC subscription information is the capability set of the called user, i.e. the service set of the called user.
In some embodiments, the iFC subscription information is obtained as follows.
When a calling user calls a called user, an S-CSCF (S-CSCF) to which the called user belongs initiates an SAR (Server Assignment Request) message to an HSS to which the called user belongs. The SAR message is used to request the HSS to which the called user belongs to download user data such as iFC subscription information. The HSS to which the called user belongs returns an SAA (Server Assignment Answer) message to the S-CSCF to which the called user belongs, and the SAA message carries iFC subscription information.
In step S120, it is queried whether the preset blacklist and the preset white list of the called user include the number of the calling user of the call. The preset blacklist comprises an interception number, and the preset white list comprises a connection number. In some embodiments, the preset black list and the preset white list are preset by the called user on the interface of the WeChat public number H5.
In step S130, in case that the preset blacklist includes the number of the calling subscriber, the call is intercepted. In some embodiments, intercepting the call includes notifying an S-CSCF to which the called subscriber belongs to release the call. For example, a disconnect code is sent to the S-CSCF to which the called user belongs to inform the S-CSCF to which the called user belongs to release the call. In some embodiments, the tear-down code is SIP (Session Initiation Protocol) 600.
In some embodiments, the call is connected in case the preset white list comprises the number of the calling subscriber. In some embodiments, completing the call includes informing the called user of the S-CSCF to which the called user belongs to continue the call to the called user.
In step S140, in a case that neither the preset blacklist nor the preset whitelist includes the number of the calling party, the tag information corresponding to the number of the calling party is queried.
In step S150, the call is intercepted when the tag information corresponding to the number of the calling party includes the first tag, and the number of times of marking the first tag corresponding to the number of the calling party is greater than or equal to the preset threshold of the called party. The first tag is associated with a call content feature of the number of the calling subscriber. For example, the first tag includes at least one of a fraud call, a nuisance call, a business promotion, a real estate agency, and an insurance financing. In some embodiments, the first tag is an internet tag that a common called user marks numbers according to the calling content of the numbers of different calling users.
In some embodiments, the preset threshold is preset by the called user at the wechat public number H5 interface.
In some embodiments, the anti-harassment method further includes intercepting the call if the tag information corresponding to the number of the calling user includes the second tag. The second label is associated with a call behavior characteristic of the number of the calling subscriber. In some embodiments, the call behavior characteristics include call behavior characteristics of a signaling layer such as number of calls per unit time, call completing rate per unit time, and average call duration. For example, the number of the calling subscriber exceeds 100 times per day, and the tag information corresponding to the number includes the second tag. In some embodiments, the call behavior characteristics of the number can be comprehensively considered, and whether the label information corresponding to the number includes the second label is judged by using a machine learning model. In the present application, the number of the calling subscriber is intercepted only by the second tag associated with the call behavior feature.
In some embodiments, when the called user does not turn on the second tag intercepting function and the tag information corresponding to the number of the calling user includes the second tag, a voice verification message is sent to the calling user.
In some embodiments, when the called user does not turn on the interception function corresponding to the first tag and the tag information corresponding to the number of the calling user includes the first tag, a voice verification message is sent to the calling user. In some embodiments, for each type of the first labels, the called user may set the interception function corresponding to the corresponding first label, so as to implement different interception settings of the different types of the first labels.
In some embodiments, the anti-harassment method further includes sending a voice verification message to the calling party when the tag information corresponding to the number of the calling party includes a first tag and the number of times of marking of the first tag corresponding to the number of the calling party is smaller than a preset threshold of the called party.
In some other embodiments, the anti-harassment method further includes sending voice verification information to the calling party in the absence of the tag information corresponding to the number of the calling party.
In some embodiments, the anti-harassment method further comprises intercepting the call in the event of a failure of the voice authentication. In case the voice authentication is successful, the call is connected. In some embodiments, the voice authentication failure comprises a voice authentication error or a voice authentication timeout. The voice verification error is the verification code error input by the calling user. The voice verification timeout is that the calling user does not input the verification code or the timer is overtime. For example, the voice authentication message includes a digital authentication code or mathematical calculation.
In some embodiments, whether the voice authentication is successful is determined by detecting a DTMF (Dual Tone Multi Frequency) key of the calling user. And under the condition that the corresponding number of the DTMF key sent to the safety verification device by the calling user is correct, the voice verification is successful. And the voice verification fails under the condition that the number corresponding to the DTMF key sent by the calling user is wrong or the calling user does not send the number corresponding to the DTMF key within the specified time of the voice verification. For example, the specified time for voice authentication is one minute, and the time for the calling user to perform voice authentication is more than one minute, which is the time-out of voice authentication. In some embodiments, the voice verification message includes a digital verification code. For example, the voice verification message is "select call please press 30". In the case that the number corresponding to the DTMF key sent by the calling user is the same as the number verification code "30", the call is connected. In case that the corresponding number of the DTMF key and the number verification code '30' are different, the call is intercepted.
In other embodiments, the voice verification message includes a mathematical calculation. For example, the voice verification message is "1 plus 1 equals how much". In case that the number corresponding to the DTMF key sent by the calling user is the correct result "2" of the mathematical calculation, the call is connected. In case the corresponding number of the DTMF key is not the correct result of the mathematical calculation, the call is intercepted.
In some embodiments, the called user sets a tolerance on the wechat public H5 interface, the tolerance corresponding to a preset threshold for the called user. For example, tolerances include aggressive, balanced and conservative. The aggressive type indicates that a call is intercepted in the case where the number of times of marking is greater than or equal to 10 times. Balanced type means that the call is intercepted in the case where the number of times of marking is greater than or equal to 15. Conservative indicates that the call is intercepted if the number of markers is greater than or equal to 20. It should be understood that the thresholds for aggressive, equilibrium, and conservative correspondence are 10, 15, and 20, respectively.
FIG. 2 illustrates a schematic diagram of a disturbance prevention method according to some embodiments of the present disclosure.
As shown in fig. 2, the anti-harassment method includes steps S100 to S150.
In step S100, in case that the calling user calls the called user, the calling of the calling user is connected to the S-CSCF to which the called user belongs.
In step S101, the S-CSCF to which the called subscriber belongs sends an SAR message to the HSS to which the called subscriber belongs. The SAR message is used to request the HSS to which the called user belongs to download user data such as iFC subscription information.
In step S102, the HSS to which the called user belongs returns an SAA message to the S-CSCF to which the called user belongs. The SAA message carries iFC subscription information.
In step S110, in the case that the iFC subscription information of the called user includes a specific service, the S-CSCF to which the called user belongs forwards the call of the calling user to the security verification device. In some embodiments, the security authentication device is an AS (Application Server) device. For example, when the iFC subscription information of the called subscriber includes the harassment interception service, the S-CSCF to which the called subscriber belongs triggers the harassment interception service to the security verification device according to the iFC subscription information of the called subscriber.
In step S121, the security verification device sends a verification request to the fraud prevention platform, where the verification request carries the number of the calling party of the call. The checking request is used for checking whether the preset blacklist and the preset white list of the called user comprise the number of the calling user of the call.
In step S122, the fraud prevention platform queries whether a preset blacklist and a preset white list of the called user include the number of the calling user, where the preset blacklist includes an interception number, and the preset white list includes a connection number. In some embodiments, the preset black list and the preset white list are preset by the called user on the interface of the WeChat public number H5.
In case that the preset blacklist includes the number of the calling subscriber, the call is intercepted, i.e., step S131-step S133 are performed. In step S131, the fraud prevention platform notifies the security verification device to intercept the call. In step S132, in case that the fraud prevention platform notifies the security verification device to intercept the call, the security verification device notifies the S-CSCF to which the called user belongs to release the call. In step S133, in the case that the security authentication device notifies the S-CSCF to which the called user belongs to release the call, the S-CSCF to which the called user belongs releases the call.
In case the preset white list includes the number of the calling subscriber, the call is connected, i.e., step S131 '-step S133' is performed. In step S131', the fraud prevention platform notifies the security authentication apparatus to put through the call. In step S132', in case the anti-fraud platform informs the security authentication apparatus to put through the call, the security authentication apparatus informs the S-CSCF to which the called user belongs to continue the call to the called user. In step S133', in case the security authentication apparatus notifies the S-CSCF to which the called user belongs to connect the call to the called user, the S-CSCF to which the called user belongs connects the call to the called user.
In case that neither the preset blacklist nor the preset whitelist includes the number of the calling subscriber, step S140 is performed. In step S140, the fraud prevention platform queries the anti-fraud federation big data platform for the tag information corresponding to the number of the calling user. For example, the anti-fraud platform initiates a verification request carrying the number of the calling party to the anti-fraud alliance big data platform, so as to obtain the label information corresponding to the number of the calling party from the anti-fraud alliance big data platform.
And intercepting the call under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, namely executing the steps S131-S133.
In some embodiments, in the case that the tag information corresponding to the number of the calling user includes the second tag, the call is intercepted, i.e., steps S131 to S133 are performed.
For example, the anti-fraud alliance big data platform stores the corresponding relation between the number and the label information. In some embodiments, the preset threshold is preset by the called user at the wechat public number H5 interface.
And executing the step S140' when the tag information corresponding to the number of the calling party includes the first tag and the number of times of marking the first tag corresponding to the number of the calling party is less than the preset threshold of the called party.
In some embodiments, step S140' is performed in the absence of tag information corresponding to the number of the calling user.
In step S140', the anti-fraud platform notifies the security verification device, which sends a voice verification message to the calling user. In case of voice authentication failure, the call is intercepted, i.e., step S131-step S133 are performed. In case the voice authentication is successful, the call is connected, i.e. step S131 '-step S133' is performed. The voice authentication failure includes a voice authentication error or a voice authentication timeout.
Figure 3 illustrates a signaling diagram of an anti-harassment method in case of successful voice verification, in accordance with some embodiments of the present disclosure.
As shown in fig. 3, the disturbance prevention method in the case of successful voice verification includes steps S310 to S341. The security verification device 3 is an AS (Application Server) Server, and includes a traffic audit AS signaling module 31 configured to perform signaling interaction with an S-CSCF to which a called user belongs; a traffic auditing AS interface module 32 configured to interact with a fraud prevention platform; and a traffic auditing AS media module 33 configured to store and generate voice verification messages.
In step S310, the S-CSCF to which the called user belongs sends an INVITE message to the traffic auditing AS signaling module 31. The INVITE message is a call request message.
In step S311, the traffic auditing AS signaling module 31 returns 100 trying to the S-CSCF to which the called user belongs. 100 trying is a temporary response of the security authentication device 3 to the INVITE message.
In step S312, the traffic auditing AS signaling module 31 sends a number query message of the calling subscriber to the traffic auditing AS interface module 32. The number query message of the calling party is used to notify the telephone traffic auditing AS interface module 32 to interactively query whether the preset blacklist and the preset white list of the called party include the number of the calling party and whether the number of times of marking corresponding to the number of the calling party exceeds the preset threshold of the called party with the fraud prevention platform.
In step S313, the traffic auditing AS interface module 32 returns the number query result of the calling subscriber to the traffic auditing AS signaling module 31. In this embodiment, for example, neither the preset blacklist nor the preset white list of the called user includes the number of the calling user, the tag information corresponding to the number of the calling user includes a first tag, and the number of times of marking the first tag corresponding to the number of the calling user is smaller than the preset threshold of the called user.
In step S314, the traffic auditing AS signaling module 31 sends 110 a request local port message to the traffic auditing AS media module 33. The request local port message 110 is used to request establishment of a media bearer between the calling user and the security verification device.
In step S315, the traffic auditing AS media module 33 returns a 111 message to the traffic auditing AS signaling module 31. The 111 message is used to inform traffic auditing AS signaling module 31 that a media bearer can be established between the calling user and the security verification device.
In step S316, the traffic auditing AS signaling module 31 sends a 183 session progress message to the S-CSCF to which the called user belongs. The 183 session progress message is used to inform the calling user that a session is in progress. At this time, media negotiation is performed, that is, whether the media resource is a voice-authenticated media resource or a voice-conversation media resource is determined. In some embodiments, after the S-CSCF to which the called user belongs receives the 183 message, and the Session enters the voice verification mode, the S-CSCF to which the called user belongs encapsulates an IP and a port of a traffic auditing AS media module, which are returned by an RTP (Real-time Transport Protocol) server, into an SDP (Session Description Protocol) packet, and then sends the encapsulated SDP packet to a calling user side.
In step S317, the S-CSCF to which the called user belongs sends a PRACK (Provisional Response Acknowledgement) message to the traffic auditing AS signaling module 31. The PRACK message is an ACK (Acknowledgement) message for PR (Provisional Response). That is, the calling party side performs PRACK authentication.
In step S318, the traffic auditing AS signaling module 31 sends a PRACK 200 OK message to the S-CSCF to which the called user belongs. The PRACK 200 OK is a message that the provisional response acknowledgement is successful. To this end, a media bearer is established between the calling user and the security verification device 3.
In step S319, the traffic auditing AS signaling module 31 sends 210 a request local record message to the traffic auditing AS media module. It should be understood that the local recording is a voice verification message.
In step S320, the traffic auditing AS media module 33 sends 211 a message to the traffic auditing AS signaling module 31. The message 211 carries the local recording, i.e., the voice verification message, randomly returned by the traffic auditing AS media module 33. For example, a local recording is "1 +1 equals a few? Finish by # s ". To this end, the calling user can hear the voice authentication message "1 +1 equals to several? Press # end "and send DTMF key to the security authentication device 3.
In step S321, the traffic auditing AS media module 33 sends a DTMF key detection verification pass message to the traffic auditing AS signaling module 31.
In step S322, the traffic auditing AS signaling module 31 sends 310 a message to the traffic auditing AS media module 33. Message 310 is a port message that releases the traffic auditing AS media module. It should be understood that the port of the traffic auditing AS media module is released after the voice verification is finished.
In step S323, the traffic auditing AS media module 33 sends 311 a message to the traffic auditing AS signaling module 31. The 311 message indicates that the port release was successful.
In step S324, the traffic auditing AS signaling module 31 sends 183 message to the S-CSCF to which the called user belongs. 183 message is used to inform the calling subscriber that the voice authentication is successful and the call continues.
In step S325, the S-CSCF to which the called user belongs sends a PRACK message to the traffic audit AS signaling module 31, and performs PRACK verification for call continuation.
In step S326, the traffic auditing AS signaling module 31 sends a PRACK 200 OK message to the S-CSCF to which the called user belongs. PRACK 200 OK indicates that the PRACK verification was successful and the call continues.
In step S327, the S-CSCF to which the called user belongs sends an INVITE message to the traffic auditing AS signaling module 31. Here, the INVITE message is used for a call request, and the S-CSCF to which the called subscriber belongs receives a call signaling corresponding to the call request, and generates a new session record.
In step S328, the S-CSCF to which the called user belongs sends a 100 trying message to the traffic auditing AS signaling module 31. The 100 trying message is a temporary response of the S-CSCF to which the called user belongs to the INVITE message.
In step S329, the S-CSCF to which the called user belongs sends a 180ringing message to the traffic auditing AS signaling module. After receiving the INVITE message, the called user rings at the called user side and returns 180ringing message, and the calling user listens to the ring back tone.
In step S330, the traffic audit AS signaling module 31 sends a PRACK message to the S-CSCF to which the called user belongs.
In step S331, the traffic audit AS signaling module 31 sends an UPDATE message to the S-CSCF to which the called user belongs, so AS to negotiate the media resource on the calling user side, i.e., UPDATE the media resource on the calling user side. The media resources negotiated here are media resources of a voice call.
In step S332, the S-CSCF to which the called user belongs sends a PRACK 200 OK message to the traffic audit AS signaling module.
In step S333, the S-CSCF to which the called subscriber belongs sends an UPDATE 200 OK message to the traffic audit AS signaling module.
In step S334, when the called user goes off-hook, the S-CSCF to which the called user belongs sends a 200 OK message to the traffic audit AS signaling module. The 200 OK message is a response to the INVITE message in step S327.
In step S335, the traffic auditing AS signaling module 31 sends a 200 OK message to the S-CSCF to which the called user belongs.
In step S336, the S-CSCF to which the called user belongs sends an ACK message to the traffic audit AS signaling module.
In step S337, the traffic audit AS signaling module 31 sends an ACK message to the S-CSCF to which the called user belongs. At this point, the called user and the calling user establish a call connection and are in a call.
In step S338, under the condition that the calling subscriber hangs up, the S-CSCF to which the called subscriber belongs sends a BYE message to the traffic audit AS signaling module to terminate the session. I.e. the disconnection, the call is ended.
In step S339, the traffic audit AS signaling module 31 sends a BYE message to the S-CSCF to which the called user belongs to terminate the session.
In step S340, the S-CSCF to which the called user belongs sends a BYE 200 OK message to the traffic audit AS signaling module, and determines to terminate the session.
In step S341, the traffic audit AS signaling module 31 sends a BYE 200 OK message to the S-CSCF to which the called user belongs, and determines to terminate the session.
Fig. 4 illustrates a signaling diagram of an anti-harassment method in case of a voice authentication failure, according to some embodiments of the present disclosure.
As shown in fig. 4, the anti-harassment method includes steps S310 to S424. Fig. 4 is different from fig. 3 in that fig. 4 shows steps S421 to S424 in which voice authentication fails. Only the differences between fig. 4 and fig. 3 will be described, and the descriptions of the same parts (i.e., step S310 to step S320) will be omitted.
In step S421, in the case that the DTMF key of the calling user is wrong or the timer for detecting the DTMF key is overtime, the traffic auditing AS media module 33 sends a DTMF key detection verification failure message to the traffic auditing AS signaling module 31.
In step S422, the traffic auditing AS signaling module 31 sends 310 a message to the traffic auditing AS media module 33. The 310 message is a release port message.
In step S423, the traffic auditing AS media module 33 sends 311 a message to the traffic auditing AS signaling module 31. The 311 message indicates that the port release was successful.
In step S424, traffic auditing AS signaling module 31 sends SIP 600 to the S-CSCF to which the called user belongs. The SIP 600 is a disconnect code for releasing the calling party side, i.e., disconnecting, so that the call is terminated and the call is intercepted. FIG. 5 illustrates a block diagram of an anti-harassment system in accordance with some embodiments of the present disclosure.
As shown in fig. 5, the disturbance prevention system 5 includes: a security authentication device 51 configured to receive a call forwarded by a serving call session control function S-CSCF to which a called user belongs, e.g. to perform step S110 as shown in fig. 1; and a fraud prevention platform 52 configured to query whether a preset blacklist and a preset whitelist of called users, including intercepted numbers, include numbers of calling users of the call, for example, to perform step S120 as shown in fig. 1; if the preset blacklist includes the number of the calling user, notifying the security verification device to intercept the call, for example, performing step S130 shown in fig. 1; under the condition that neither the preset blacklist nor the preset white list includes the number of the calling party, querying, from an anti-fraud alliance big data platform, tag information corresponding to the number of the calling party, for example, executing step S140 shown in fig. 1; and when the tag information corresponding to the number of the calling user includes the first tag and the marking frequency of the first tag corresponding to the number of the calling user is greater than or equal to the preset threshold of the called user, notifying the security verification device to intercept the call, for example, executing step S140 shown in fig. 1.
In some embodiments, the anti-harassment system further comprises an anti-fraud federation big data platform 53 configured to store a correspondence of numbers to tag information.
In some embodiments, fraud prevention platform 52 provides Web services, interface services, and memory services. The Web service is used for the maintainer to check the operation condition of the harassment interception service, including the user number for opening specific service, the connection and interception record, the tolerance set by the user, and the like. Meanwhile, the Web service also provides recorded data of a WeChat public number H5 page call background and displays the recorded data to the user. The interface service is used for providing a server for the anti-fraud big data platform, the security verification equipment and the H5 page, and realizing data interaction. The memory service is used for storing data such as the number, the connection and interception records, the tolerance set by the user and the like of the user who opens the specific service.
FIG. 6 shows a block diagram of an anti-harassment system of further embodiments of the present disclosure.
As shown in fig. 6, the data transmission device 6 includes a memory 61; and a processor 62 coupled to the memory 61, the memory 61 being configured to store instructions for executing the corresponding embodiment of the data transfer method. The processor 62 is configured to execute the anti-harassment method in any of the embodiments of the present disclosure based on instructions stored in the memory 61.
FIG. 7 illustrates a block diagram of a computer system for implementing some embodiments of the present disclosure.
As shown in FIG. 7, the computer system 70 may be embodied in the form of a general purpose computing device. Computer system 70 includes a memory 710, a processor 720, and a bus 700 that connects the various system components.
The memory 710 may include, for example, system memory, non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs. The system memory may include volatile storage media such as Random Access Memory (RAM) and/or cache memory. The non-volatile storage medium stores, for instance, instructions to perform corresponding embodiments of at least one of the anti-harassment methods. Non-volatile storage media include, but are not limited to, magnetic disk storage, optical storage, flash memory, and the like.
Processor 720 may be implemented as discrete hardware components, such as a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gates or transistors, or the like. Accordingly, each of the modules, such as the judging module and the determining module, may be implemented by a Central Processing Unit (CPU) executing instructions in a memory for performing the corresponding step, or may be implemented by a dedicated circuit for performing the corresponding step.
Bus 700 may use any of a variety of bus architectures. For example, bus structures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, and Peripheral Component Interconnect (PCI) bus.
The computer system 70 may also include an input-output interface 730, a network interface 740, a storage interface 750, and the like. These interfaces 730, 740, 750, as well as the memory 77 and the processor 720, may be connected by a bus 700. The input/output interface 730 may provide a connection interface for input/output devices such as a display, a mouse, and a keyboard. The network interface 740 provides a connection interface for various networking devices. The storage interface 750 provides a connection interface for external storage devices such as a floppy disk, a usb disk, and an SD card.
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable apparatus to produce a machine, such that the execution of the instructions by the processor results in an apparatus that implements the functions specified in the flowchart and/or block diagram block or blocks.
These computer-readable program instructions may also be stored in a computer-readable memory that can direct a computer to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instructions which implement the function specified in the flowchart and/or block diagram block or blocks.
The present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
By the aid of the harassment prevention method, the harassment prevention system and the computer storage medium in the embodiment, the called user can set the preset blacklist, the preset white list and the preset threshold value by himself, and difference and accurate harassment prevention protection of the called user is achieved.
So far, the anti-harassment method, the system thereof, the computer-storable medium according to the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.

Claims (16)

1. An anti-harassment method comprising:
receiving a call forwarded by a serving call session control function S-CSCF to which a called user belongs;
inquiring whether a preset blacklist and a preset white list of a called user comprise the number of a calling user of the call, wherein the preset blacklist comprises an interception number, and the preset white list comprises a connection number;
intercepting the call under the condition that the preset blacklist comprises the number of the calling user;
under the condition that neither the preset blacklist nor the preset white list comprises the number of the calling user, inquiring label information corresponding to the number of the calling user;
and intercepting the call under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, wherein the first label is related to the call content characteristics of the number of the calling user.
2. A method of preventing harassment as defined in claim 1, further comprising:
and intercepting the call under the condition that the label information corresponding to the number of the calling user comprises a second label, wherein the second label is related to the call behavior characteristics of the number of the calling user.
3. A method of preventing harassment as defined in claim 1, further comprising:
and sending a voice verification message to the calling party under the condition that the label information corresponding to the number of the calling party comprises a first label and the marking frequency of the first label corresponding to the number of the calling party is less than a preset threshold value of the called party.
4. A method of preventing harassment as defined in claim 1, further comprising:
and sending voice verification information to the calling subscriber under the condition that the label information corresponding to the number of the calling subscriber does not exist.
5. A method of preventing harassment according to claim 3 or 4, further comprising:
intercepting the call in case of a failed voice authentication;
in case the voice authentication is successful, the call is connected.
6. A method as claimed in claim 5, wherein the success of the voice authentication is determined by detecting a DTMF key of the calling subscriber.
7. A method as claimed in claim 5, wherein the voice authentication failure comprises a voice authentication error or a voice authentication timeout.
8. A method as claimed in claim 3 or 4, wherein the voice verification message comprises a digital verification code or a mathematical calculation.
9. A method of preventing harassment as defined in claim 1, further comprising: and under the condition that the preset white list comprises the number of the calling user, the call is put through.
10. A method as claimed in claim 1, wherein intercepting said call comprises notifying an S-CSCF to which said called subscriber belongs to release said call.
11. A method as claimed in claim 5 or 9, wherein completing the call comprises informing an S-CSCF to which the called subscriber belongs to continue the call to the called subscriber.
12. A method of preventing harassment as defined in claim 1, further comprising: and receiving a call forwarded by a service call session control function (S-CSCF) to which the called user belongs under the condition that the Initial Filter Criteria (iFC) subscription information of the called user comprises a specific service, wherein the iFC subscription information is obtained by the S-CSCF to which the called user belongs through query of a Home Subscriber Server (HSS) to which the called user belongs.
13. An anti-harassment system comprising:
a security authentication device configured to receive a call forwarded by a serving call session control function S-CSCF to which a called user belongs; and
a fraud prevention platform configured to query whether a preset blacklist and a preset white list of a called user include numbers of calling users of the call, the preset blacklist including interception numbers, the preset white list including a call-through number;
under the condition that the preset blacklist comprises the number of the calling user, informing the safety verification equipment to intercept the call;
under the condition that neither the preset blacklist nor the preset white list comprises the number of the calling party, inquiring label information corresponding to the number of the calling party from an anti-fraud alliance big data platform;
and under the condition that the label information corresponding to the number of the calling user comprises a first label and the marking frequency of the first label corresponding to the number of the calling user is greater than or equal to a preset threshold value of the called user, informing the safety verification equipment to intercept the call, wherein the first label is related to the call content characteristic of the number of the calling user.
14. A disturbance prevention system according to claim 13, further comprising: and the anti-fraud alliance big data platform is configured to store the corresponding relation between the number and the label information.
15. An anti-harassment system comprising:
a memory; and
a processor coupled to the memory, the processor being configured to execute the anti-harassment method of any one of claims 1 to 12 based on instructions stored in the memory.
16. A computer-storable medium having stored thereon computer program instructions which, when executed by a processor, implement a method of preventing a disturbance as claimed in any of claims 1 to 12.
CN201910741905.7A 2019-08-13 2019-08-13 Anti-harassment method and system, computer storage medium Pending CN112399420A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910741905.7A CN112399420A (en) 2019-08-13 2019-08-13 Anti-harassment method and system, computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910741905.7A CN112399420A (en) 2019-08-13 2019-08-13 Anti-harassment method and system, computer storage medium

Publications (1)

Publication Number Publication Date
CN112399420A true CN112399420A (en) 2021-02-23

Family

ID=74602385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910741905.7A Pending CN112399420A (en) 2019-08-13 2019-08-13 Anti-harassment method and system, computer storage medium

Country Status (1)

Country Link
CN (1) CN112399420A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905129A (en) * 2021-09-27 2022-01-07 上海欣方智能系统有限公司 Method and device for intercepting crank call
CN114286329A (en) * 2021-12-02 2022-04-05 中国联合网络通信集团有限公司 Call control method and device for Internet of things equipment and storage medium
CN114710591A (en) * 2022-06-01 2022-07-05 浙江鹏信信息科技股份有限公司 Method and system for preventing harassment fraud calls

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003264857A (en) * 2002-03-06 2003-09-19 Ntt Comware Corp Nuisance call preventing system, nuisance call preventing method, nuisance call preventing program, and recording medium
CN106161715A (en) * 2015-04-20 2016-11-23 北京搜狗科技发展有限公司 A kind of communication control method, the webserver and electronic equipment
WO2017041568A1 (en) * 2015-09-07 2017-03-16 中兴通讯股份有限公司 Method and device for intercepting harassing telephone calls
CN107404589A (en) * 2017-08-10 2017-11-28 北京泰迪熊移动科技有限公司 Kind identification method, device and the terminal device of call number
CN108605226A (en) * 2016-01-30 2018-09-28 华为技术有限公司 A kind of method of call reminding, terminal device and graphic user interface
CN109246321A (en) * 2018-07-27 2019-01-18 平安科技(深圳)有限公司 Call management-control method, system, computer equipment and its storage medium
CN109451183A (en) * 2018-12-25 2019-03-08 吴吉梅 A method of preventing unwelcome phone
CN109698885A (en) * 2017-10-20 2019-04-30 中国移动通信集团公司 A kind of processing method of call request, device, network side server and computer storage medium
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003264857A (en) * 2002-03-06 2003-09-19 Ntt Comware Corp Nuisance call preventing system, nuisance call preventing method, nuisance call preventing program, and recording medium
CN106161715A (en) * 2015-04-20 2016-11-23 北京搜狗科技发展有限公司 A kind of communication control method, the webserver and electronic equipment
WO2017041568A1 (en) * 2015-09-07 2017-03-16 中兴通讯股份有限公司 Method and device for intercepting harassing telephone calls
CN108605226A (en) * 2016-01-30 2018-09-28 华为技术有限公司 A kind of method of call reminding, terminal device and graphic user interface
CN107404589A (en) * 2017-08-10 2017-11-28 北京泰迪熊移动科技有限公司 Kind identification method, device and the terminal device of call number
CN109698885A (en) * 2017-10-20 2019-04-30 中国移动通信集团公司 A kind of processing method of call request, device, network side server and computer storage medium
CN109995707A (en) * 2017-12-29 2019-07-09 中国移动通信集团陕西有限公司 A kind of high definition voice is anti-harassment and DDOS attack method and device
CN109246321A (en) * 2018-07-27 2019-01-18 平安科技(深圳)有限公司 Call management-control method, system, computer equipment and its storage medium
CN109451183A (en) * 2018-12-25 2019-03-08 吴吉梅 A method of preventing unwelcome phone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905129A (en) * 2021-09-27 2022-01-07 上海欣方智能系统有限公司 Method and device for intercepting crank call
CN114286329A (en) * 2021-12-02 2022-04-05 中国联合网络通信集团有限公司 Call control method and device for Internet of things equipment and storage medium
CN114286329B (en) * 2021-12-02 2023-06-20 中国联合网络通信集团有限公司 Call control method, device and storage medium of Internet of things equipment
CN114710591A (en) * 2022-06-01 2022-07-05 浙江鹏信信息科技股份有限公司 Method and system for preventing harassment fraud calls

Similar Documents

Publication Publication Date Title
CN101009737B (en) Method and device for preventing rubbish voice call
CN112399420A (en) Anti-harassment method and system, computer storage medium
US8744053B2 (en) Methods, apparatus, and computer program products for providing dynamic replacement communication identification service
US8594637B2 (en) System and method for modifying calling behavior
WO2010048806A1 (en) A method, an apparatus, a proxy server and a terminal for filtering the spam call
CN105307158B (en) A kind of auth method of the phone number of communication terminal
WO2016141629A1 (en) Method of generation additional voice revenue for mobile carriers by processing of non-established calls and short messages
CN101217598A (en) A call-back method and system in busy circumstances
US9025587B2 (en) Auto answer in voice over internet protocol
WO2011017967A1 (en) Service control point in intelligent network and method for intercepting call
CN103841528A (en) Realization method and system for incoming-call prompting service of IMS system
CN108449517B (en) Call method and device based on one-number multi-card service
CN100433752C (en) Method of subscriber registration and communication in telephone terminal of session initiation protocol (SIP)
EP3987738A1 (en) Apparatus, method, and computer program for updating user subscription profiles
US8804928B2 (en) System and method for allowing virtual private network users to obtain presence status and/or location of others on demand
KR100705581B1 (en) Apparatus and method for MCID Registrating of terminal in VoIP system for using SIP
EP3231165A1 (en) Telephone call processing
TW202029789A (en) A system and method for intelligent call
CN109982275B (en) WiFi network conversation method and device under weak coverage
US10979561B1 (en) PIN or secret-code based caller-id validation system
CN113660622B (en) Method and device for processing call forwarding exception
CN102045318B (en) User's processing method of application server and application server
KR102393653B1 (en) Apparatus and method for call processing
KR20050023853A (en) Method for providing a service of assignment numbers display using other's mobile
WO2015150767A1 (en) Method and apparatus for detecting whether a fixed-line/landline telephone number has an active call forwarding condition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination