CN113542504A - Block chain-based harassing call marking method and device - Google Patents

Block chain-based harassing call marking method and device Download PDF

Info

Publication number
CN113542504A
CN113542504A CN202110799057.2A CN202110799057A CN113542504A CN 113542504 A CN113542504 A CN 113542504A CN 202110799057 A CN202110799057 A CN 202110799057A CN 113542504 A CN113542504 A CN 113542504A
Authority
CN
China
Prior art keywords
mobile phone
call duration
call
marking
blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110799057.2A
Other languages
Chinese (zh)
Other versions
CN113542504B (en
Inventor
张祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110799057.2A priority Critical patent/CN113542504B/en
Publication of CN113542504A publication Critical patent/CN113542504A/en
Application granted granted Critical
Publication of CN113542504B publication Critical patent/CN113542504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a block chain-based crank call marking method and device, and relates to a block chain, wherein the method comprises the following steps: acquiring the call duration and the corresponding telephone number of the mobile phone terminal; establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminals and the corresponding phone numbers; according to the whole network call duration database, marking harassing calls, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone; all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls. The invention realizes the accurate marking of the crank calls.

Description

Block chain-based harassing call marking method and device
Technical Field
The invention relates to the technical field of computer data processing, in particular to a block chain-based crank call marking method and device.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The amount of data in society is increasing sharply at present, but people do not pay attention to the protection awareness of personal information. According to investigation, student groups and old people are main victims who receive malicious calls, are low in risk consciousness, and are easy to cheat due to external temptation to reduce vigilance. The existing method for preventing the telephone harassment is a method for marking a label by a user, has strong subjective awareness, and wastes time and labor when the user is matched to mark a malicious telephone.
The existing anti-harassment interception technology needs a background central database server to support, and a server of a software provider is used as a main node to realize an interception function, so that higher maintenance cost is needed in the interception process.
Therefore, how to provide a new solution, which can solve the above technical problems, is a technical problem to be solved in the art.
Disclosure of Invention
The embodiment of the invention provides a block chain-based crank call marking method, which realizes accurate marking of crank calls and comprises the following steps:
acquiring the call duration and the corresponding telephone number of the mobile phone terminal;
establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminals and the corresponding phone numbers;
according to the whole network call duration database, marking harassing calls, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone;
all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls.
The embodiment of the invention also provides a block chain-based harassing call marking device, which comprises:
the call duration and corresponding telephone number acquisition module is used for acquiring the call duration and corresponding telephone number of the mobile phone terminal;
the system comprises a whole network call duration database establishing module, a whole network call duration database establishing module and a whole network call duration database establishing module, wherein the whole network call duration database establishing module is used for establishing a whole network call duration database of all mobile phone terminals associated with the system according to the call duration of the mobile phone terminals and corresponding telephone numbers;
the block packing module is used for marking crank calls according to the whole network call duration database, packing the crank calls into blocks and sending the blocks to all mobile phone terminals associated with the local machine;
and the block chain generating module is used for identifying the blocks by all the mobile phone terminals receiving the blocks and generating a block chain to commonly identify the crank calls.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the harassing call marking method based on the block chain when executing the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program for executing the above block chain-based harassing call tagging method is stored in the computer-readable storage medium.
The embodiment of the invention provides a block chain-based crank call marking method and device, which comprises the following steps: firstly, acquiring the call duration and the corresponding telephone number of a mobile phone terminal; then, according to the call duration of the mobile phone terminal and the corresponding phone number, a whole network call duration database of all the mobile phone terminals associated with the mobile phone is established; then, according to the whole network call duration database, crank calls are marked and packaged into blocks to be sent to all mobile phone terminals associated with the mobile phone; and finally, all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls. The invention solves the problems that the prior anti-harassment interception technology needs a background central database server for supporting, takes a server of a software provider as a main node to realize the interception function and needs higher maintenance cost in the interception process, counts the call duration by using a big data technology, changes the manual marking of a user into the automatic statistical marking, saves and recognizes the malicious harassment telephone numbers by means of the sharing and anti-tampering technology of a block chain, reduces the participation of the user, avoids the subjective misleading brought by the marking of the user and realizes the accurate marking of the harassment telephone.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic diagram of a block chain-based crank call marking method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a process of establishing a whole-network call duration database of all mobile phone terminals associated with a local machine in a block chain-based harassing call tagging method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating a process of sending blocks to all mobile phone terminals associated with the local computer in a block packing manner according to the block chain-based harassing call tagging method in the embodiment of the present invention.
Fig. 4 is a schematic diagram of a computer device for operating a block chain-based crank call marking method implemented by the present invention.
Fig. 5 is a schematic diagram of a harassing call marking apparatus based on a block chain according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
The invention relates to a block chain technology. Fig. 1 is a schematic diagram of a harassing call marking method based on a block chain in an embodiment of the present invention, and as shown in fig. 1, an embodiment of the present invention provides a harassing call marking method based on a block chain, which implements accurate marking of a harassing call, and includes:
step 101: acquiring the call duration and the corresponding telephone number of the mobile phone terminal;
step 102: establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminals and the corresponding phone numbers;
step 103: according to the whole network call duration database, marking harassing calls, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone;
step 104: all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls.
The embodiment of the invention provides a block chain-based crank call marking method, which comprises the following steps: firstly, acquiring the call duration and the corresponding telephone number of a mobile phone terminal; then, according to the call duration of the mobile phone terminal and the corresponding phone number, a whole network call duration database of all the mobile phone terminals associated with the mobile phone is established; then, according to the whole network call duration database, crank calls are marked and packaged into blocks to be sent to all mobile phone terminals associated with the mobile phone; and finally, all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls. The invention solves the problems that the prior anti-harassment interception technology needs a background central database server for supporting, takes a server of a software provider as a main node to realize the interception function and needs higher maintenance cost in the interception process, counts the call duration by using a big data technology, changes the manual marking of a user into the automatic statistical marking, saves and recognizes the malicious harassment telephone numbers by means of the sharing and anti-tampering technology of a block chain, reduces the participation of the user, avoids the subjective misleading brought by the marking of the user and realizes the accurate marking of the harassment telephone.
According to the method, the call duration is counted by using a big data technology, and according to experience, the call duration of the crank calls is kept short and the call duration of the non-crank calls is long in the unfamiliar numbers, so that the unfamiliar calls can be automatically marked according to the principle, and the accurate marking of the crank calls is realized.
When the method for marking the harassing call based on the block chain provided by the embodiment of the present invention is implemented specifically, in an embodiment, the method may include:
acquiring the call duration and the corresponding telephone number of the mobile phone terminal;
establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminals and the corresponding phone numbers;
according to the whole network call duration database, marking harassing calls, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone;
all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls.
When the method for marking the harassing call based on the block chain is implemented specifically, in one embodiment, the obtaining of the call duration and the corresponding telephone number of the mobile phone terminal includes:
and aiming at each mobile phone terminal, acquiring the time length of each call answered by the mobile phone terminal and a corresponding telephone number, and calculating the call time lengths of all calls answered by the mobile phone terminal in the set time length and the corresponding telephone numbers according to the dimension of the telephone numbers by taking the set time length as a period.
In the embodiment, firstly, the call duration and the corresponding phone number of the mobile phone terminal need to be acquired, and the main process comprises the following steps: and aiming at each mobile phone terminal, acquiring the time length of each call answered by each mobile phone terminal and a corresponding telephone number, taking the set time length as a period, for example, taking every week as the period, and calculating the call time lengths and the corresponding telephone numbers of all calls answered by the mobile phone terminal in the week according to the dimension of the telephone numbers. In one example, each call duration received by each mobile phone user is stored, and all calls received by each mobile phone user in the week and the corresponding call duration are calculated according to the dimension of the number in a cycle of each week.
Fig. 2 is a schematic diagram of a process of establishing a whole-network call duration database of all mobile phone terminals associated with a local computer in a block chain-based harassing call marking method according to an embodiment of the present invention, and as shown in fig. 2, when a block chain-based harassing call marking method provided in an embodiment of the present invention is specifically implemented, in an embodiment, the whole-network call duration database of all mobile phone terminals associated with the local computer is established according to the call duration and the corresponding phone number of the mobile phone terminal, including:
step 201: establishing a database table according to the structures of the call duration and the corresponding telephone number of the mobile phone terminal according to the main key, the date, the telephone number of the mobile phone, the incoming call telephone number and the call duration;
step 202: establishing an association relation between the mobile phone and a mobile phone terminal added with a crank call marking system;
step 203: and establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the database table and the association relation.
In the embodiment, the main process of establishing the whole network call duration database of all mobile phone terminals associated with the mobile phone comprises the following steps:
firstly, as shown in table 1, establishing a database table for the call duration and the corresponding telephone number of the mobile phone terminal according to the structures of a main key, a date, a local telephone number, an incoming call telephone number and the call duration;
TABLE 1
Key DATE PHONE_NUMBER ACCESS_NUMBER TALK_TIME
Main key Date Number of the machine Caller ID Duration of call
Then, establishing an association relation between the local mobile phone and the mobile phone terminal added into the harassing call marking system; the harassing call marking system is a block chain system added to the mobile phone terminal, and is used for identifying harassing calls;
and finally, establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the database table and the association relation.
Fig. 3 is a schematic diagram of a process of transmitting blocks of a harassing call tagging method based on a block chain to all mobile phone terminals associated with a local computer in a block packaging manner according to an embodiment of the present invention, as shown in fig. 3, when the harassing call tagging method based on the block chain provided by the embodiment of the present invention is implemented in detail, in an embodiment, according to a call duration database of a whole network, a harassing call is tagged and transmitted to all mobile phone terminals associated with the local computer in a block packaging manner, which includes:
step 301: extracting the call duration of the phone answered by the local phone from the whole network call duration database, judging whether the phone answered by the local phone is a harassing phone or not according to the call duration and temporarily marking the harassing phone, and sorting and recording the harassing phone in a storage device of the local phone as a temporary data file according to the call duration in a descending order;
step 302: sending temporary data files stored in the local machine to all mobile phone terminals associated with the local machine, returning corrected call duration from other associated mobile phone terminals, recalculating final call duration by combining the call duration of the local machine and temporary marks, sorting the call durations in a descending order as formal data files, and marking harassing calls on the formal data files according to the final call duration;
step 303: and sorting the formal data files for marking the crank calls in a descending order, packaging the formal data files into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone.
In the embodiment, according to a whole-network call duration database, crank calls are marked and packaged into blocks to be sent to all mobile phone terminals associated with the mobile phone, and the main process comprises the following steps:
firstly, extracting the call duration of the phone answered by the local phone from a whole-network call duration database, judging whether the phone answered by the local phone is a harassing phone and temporarily marking the harassing phone according to the call duration, wherein the temporary marking of the short phone duration of the answered phone is a harassing phone, and then sorting and recording the harassing phone in a storage device of the local phone as a temporary data file according to the call duration in a descending order;
secondly, sending the temporary data file stored in the local computer to all mobile phone terminals associated with the local computer, and correcting the temporary data by all the mobile phone terminals associated with the local computer, wherein the specific process comprises the following steps: comparing and correcting the call records of the mobile phone terminal associated with the mobile phone with the temporary data, and screening out the call records with short common call duration; then returning corrected call duration from other associated mobile phone terminals, recalculating final call duration by combining the call duration of the mobile phone and the temporary mark, sorting the call durations in a descending order according to the call durations to serve as formal data files, and marking harassing calls on the formal data files according to the final call durations;
and finally, sorting the formal data files for marking the crank calls in a descending order, packaging the formal data files into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone.
The embodiment of the invention solves the problems that the prior harassment-prevention interception technology needs a background central database server for supporting, takes a server of a software provider as a main node for realizing the interception function and needs higher maintenance cost in the interception process, counts the call duration by using a big data technology, changes the manual marking of a user into the automatic statistical marking,
when the method for marking the harassing calls based on the block chain is specifically implemented, in one embodiment, the method includes the following steps of sorting formal data files for marking the harassing calls in a descending order, packaging the data files into blocks, and sending the blocks to all mobile phone terminals associated with the local mobile phone, wherein the steps include:
according to the set duration, regularly sorting formal data files for marking crank calls in a descending order, taking a plurality of phones which are ranked at the top as the common recognition crank calls, and generating crank call data and packaging the crank call data into blocks; when a plurality of telephones with the front rank are taken, the number of the taken telephones is determined according to the frequency of answering the telephones;
calculating the Hash hash of the packed blocks;
generating a random number according to the Hash hash, and marking the random number and the processing time on the packed block;
and transmitting the marked block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
In the embodiment, telephones marked as formal data files are ordered and packaged into blocks at regular time (for example, each week is taken as a period) and then are sent to all mobile phone terminals associated with the mobile phone;
the top5 telephones which are sorted in the descending order are marked as harassing calls at regular time, and the top5 number data are sorted and then packaged into blocks;
calculating the Hash hash of the packed number data;
generating a random number, and marking processing time and the random number on the packed block;
and transmitting the processed block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
In one embodiment, when the method for marking a harassing call based on a block chain according to the embodiment of the present invention is specifically implemented, all mobile terminals that receive a block identify the block and generate the block chain to recognize a harassing call, including:
all the mobile phone terminals receiving the block identify the block and generate a block chain;
and extracting the crank calls in the block from the block chain, and identifying the crank calls to each mobile phone terminal in the block chain.
In the embodiment, all the mobile phone terminals receiving the block are identified to generate the block chain, then the crank calls in the block are extracted from the block chain, and the crank calls are identified to each mobile phone terminal in the block chain. The malicious crank call numbers are stored and identified by means of the sharing and anti-tampering technology of the block chain, the participation degree of users is reduced, subjective misleading brought by user marking is avoided, and accurate marking of crank calls is achieved.
The method for marking harassing calls based on the block chain provided by the embodiment of the invention is briefly described below by combining specific scenes:
according to the method, the call duration is counted by using a big data technology, and according to experience, the call duration of the harassing calls is kept short and the call duration of the non-harassing calls is kept long in the unfamiliar numbers, so that the unfamiliar calls can be automatically marked according to the principle.
The solution idea of the embodiment of the invention is as follows:
1) establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone;
2) the telephone numbers of the database are sorted according to duration, packaged into blocks and sent to all mobile phone terminals associated with the mobile phone;
3) and all the mobile phone terminals receiving the block identify the block and generate a block chain.
The invention provides a harassment incoming call short message intercepting method and system based on a block chain technology, and aims to solve the problems that a background central database server is required to support the current harassment-prevention intercepting technology, a server of a software provider is used as a main node to realize an intercepting function, and higher maintenance cost is required in the intercepting process.
To implement embodiments of the present invention, a technician needs to master statistics, blockchain knowledge, construct the structure of blockchains, and package. For the present invention, it is most important to count the call duration and the packing block.
The embodiment of the invention also provides a modularization example of the block chain-based harassing call marking method, which comprises the following steps:
1) a conversation time length counting module:
and aiming at each mobile phone user, storing each call duration received by the user, and calculating all calls heard by the user in the week and the corresponding call duration according to the dimension of the number by taking the period of each week as a period. Aiming at the problem, a database table is designed, and the table structure is shown in the table 1;
2) the telephone hang-up storage module:
the mobile phone is used for judging whether a current phone received by the mobile phone is a crank call or not according to the call duration, and sequencing and recording the call duration of the received phone in a memory card of the mobile phone as a temporary data file according to the call duration in a descending order;
3) telephone number transmission marking module:
sending the temporary data files stored in the local machine to all mobile phone terminals associated with the local machine, recalculating the call duration according to the call durations returned by other mobile phone terminals, and sorting the call durations in a descending order as formal data files;
4) a timing sending module:
the system is used for regularly (one period every week) sequencing the marked data files in a descending order as formal data files, packaging the formal data files into blocks and sending the blocks to all mobile phone terminals associated with the system;
5) a block identification module:
all mobile phone terminals used for receiving the blocks identify the blocks and generate block chains;
6) a packing block module:
sequencing the marked telephones serving as formal data files at regular time (each week is a period), packaging the telephones into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone:
(1) the top5 telephones which are sorted in the descending order are marked as harassing calls at regular time, and the top5 number data are sorted and then packaged into blocks;
(2) calculating the Hash hash of the packed number data;
(3) generating a random number, and marking processing time on the packed blocks;
(4) and transmitting the processed block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
For each mobile phone user, storing each call duration received by the user, and calculating all calls received by the user in the week and the corresponding call duration according to the dimension of the number by taking each week as a period.
The key points of the embodiment of the invention are as follows:
1) establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone;
2) sorting the telephone numbers of the database in a descending order according to duration, packaging the telephone numbers into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone;
3) and all the mobile phone terminals receiving the block identify the block and generate a block chain.
The advantages of the invention include: the manual marking of the user is changed into the statistical automatic marking, and the malicious number is stored by means of the sharing and anti-tampering technology of the block chain, so that the participation of the user is reduced, and the subjective misleading brought by the marking of the user is avoided.
The embodiment of the invention also provides a using process of the block chain-based crank call marking method, which comprises the following steps:
1) judging whether a call answered by a current mobile phone is a crank call or not according to the call duration, carrying out on-hook operation according to preset on-hook time when the answered call is the crank call, and storing the crank call in a memory card of the mobile phone as a temporary data file;
2) sending the crank calls to all mobile phone terminals associated with the local mobile phone, and marking the crank calls as formal data files according to information returned by other mobile phone terminals;
3) the harassing calls marked as formal data files are sequenced and packed into blocks at regular time and then sent to all mobile phone terminals associated with the mobile phone;
4) and all the mobile phone terminals receiving the block identify the block and generate a block chain.
Fig. 4 is a schematic diagram of a computer device for executing a block chain-based crank call marking method implemented by the present invention, and as shown in fig. 4, an embodiment of the present invention further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable on the processor, where when the processor executes the computer program, the block chain-based crank call marking method is implemented.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for executing the method for marking a block chain-based harassing call.
The embodiment of the invention also provides a block chain-based harassing call marking device, which is described in the following embodiments. Because the principle of the device for solving the problems is similar to the block chain-based harassing call marking method, the implementation of the device can refer to the implementation of the block chain-based harassing call marking method, and repeated parts are not described again.
Fig. 5 is a schematic diagram of a harassing call marking device based on a block chain according to an embodiment of the present invention, and as shown in fig. 5, an embodiment of the present invention further provides a harassing call marking device based on a block chain, which may include:
a call duration and corresponding phone number obtaining module 501, configured to obtain a call duration and a corresponding phone number of a mobile phone terminal;
a whole network call duration database establishing module 502, configured to establish a whole network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminal and the corresponding phone number;
the block packing module 503 is configured to mark a nuisance call according to the whole network call duration database, pack the nuisance call into blocks, and send the blocks to all mobile phone terminals associated with the local mobile phone;
the block chain generating module 504 is configured to identify the block by all the mobile terminals that receive the block, and generate a block chain to recognize the nuisance call.
In a specific implementation of the device for marking a harassing call based on a block chain according to the embodiment of the present invention, in an embodiment, the module for acquiring a call duration and a corresponding phone number is specifically configured to:
and aiming at each mobile phone terminal, acquiring the time length of each call answered by the mobile phone terminal and a corresponding telephone number, and calculating the call time lengths of all calls answered by the mobile phone terminal in the set time length and the corresponding telephone numbers according to the dimension of the telephone numbers by taking the set time length as a period.
In a specific implementation of the device for marking harassing calls based on a block chain according to the embodiment of the present invention, in an embodiment, the module for establishing a whole network call duration database is specifically configured to:
establishing a database table according to the structures of the call duration and the corresponding telephone number of the mobile phone terminal according to the main key, the date, the telephone number of the mobile phone, the incoming call telephone number and the call duration;
establishing an association relation between the mobile phone and a mobile phone terminal added with a crank call marking system;
and establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the database table and the association relation.
In an embodiment of the invention, when the device for marking a harassing call based on a block chain is implemented specifically, the block packing module is specifically configured to:
extracting the call duration of the phone answered by the local phone from the whole network call duration database, judging whether the phone answered by the local phone is a harassing phone or not according to the call duration and temporarily marking the harassing phone, and sorting and recording the harassing phone in a storage device of the local phone as a temporary data file according to the call duration in a descending order;
sending temporary data files stored in the local machine to all mobile phone terminals associated with the local machine, returning corrected call duration from other associated mobile phone terminals, recalculating final call duration by combining the call duration of the local machine and temporary marks, sorting the call durations in a descending order as formal data files, and marking harassing calls on the formal data files according to the final call duration;
and sorting the formal data files for marking the crank calls in a descending order, packaging the formal data files into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone.
In an embodiment of the invention, when the device for marking a harassing call based on a block chain is implemented specifically, the block packing module is further configured to:
according to the set duration, regularly sorting formal data files for marking crank calls in a descending order, taking a plurality of phones which are ranked at the top as the common recognition crank calls, and generating crank call data and packaging the crank call data into blocks; when a plurality of telephones with the front rank are taken, the number of the taken telephones is determined according to the frequency of answering the telephones;
calculating the Hash hash of the packed blocks;
generating a random number according to the Hash hash, and marking the random number and the processing time on the packed block;
and transmitting the marked block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
In an embodiment of the invention, when the device for marking a harassing call based on a block chain is implemented specifically, the block chain generation module is specifically configured to:
all the mobile phone terminals receiving the block identify the block and generate a block chain;
and extracting the crank calls in the block from the block chain, and identifying the crank calls to each mobile phone terminal in the block chain.
To sum up, the method and the device for marking harassing calls based on the block chain provided by the embodiment of the invention comprise the following steps: firstly, acquiring the call duration and the corresponding telephone number of a mobile phone terminal; then, according to the call duration of the mobile phone terminal and the corresponding phone number, a whole network call duration database of all the mobile phone terminals associated with the mobile phone is established; then, according to the whole network call duration database, crank calls are marked and packaged into blocks to be sent to all mobile phone terminals associated with the mobile phone; and finally, all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls. The invention solves the problems that the prior anti-harassment interception technology needs a background central database server for supporting, takes a server of a software provider as a main node to realize the interception function and needs higher maintenance cost in the interception process, counts the call duration by using a big data technology, changes the manual marking of a user into the automatic statistical marking, saves and recognizes the malicious harassment telephone numbers by means of the sharing and anti-tampering technology of a block chain, reduces the participation of the user, avoids the subjective misleading brought by the marking of the user and realizes the accurate marking of the harassment telephone.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (14)

1. A harassing call marking method based on a block chain is characterized by comprising the following steps:
acquiring the call duration and the corresponding telephone number of the mobile phone terminal;
establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminals and the corresponding phone numbers;
according to the whole network call duration database, marking harassing calls, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the mobile phone;
all the mobile phone terminals receiving the blocks identify the blocks and generate block chains to commonly identify the harassing calls.
2. The method of claim 1, wherein the obtaining of the call duration and the corresponding phone number of the mobile phone terminal comprises:
and aiming at each mobile phone terminal, acquiring the time length of each call answered by the mobile phone terminal and a corresponding telephone number, and calculating the call time lengths of all calls answered by the mobile phone terminal in the set time length and the corresponding telephone numbers according to the dimension of the telephone numbers by taking the set time length as a period.
3. The method of claim 1, wherein the step of establishing a full-network call duration database of all the mobile phone terminals associated with the mobile phone according to the call duration of the mobile phone terminal and the corresponding phone number comprises:
establishing a database table according to the structures of the call duration and the corresponding telephone number of the mobile phone terminal according to the main key, the date, the telephone number of the mobile phone, the incoming call telephone number and the call duration;
establishing an association relation between the mobile phone and a mobile phone terminal added with a crank call marking system;
and establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the database table and the association relation.
4. The method of claim 1, wherein the steps of marking harassing calls according to the whole network call duration database, packaging the harassing calls into blocks and sending the blocks to all mobile phone terminals associated with the local mobile phone comprise:
extracting the call duration of the phone answered by the local phone from the whole network call duration database, judging whether the phone answered by the local phone is a harassing phone or not according to the call duration and temporarily marking the harassing phone, and sorting and recording the harassing phone in a storage device of the local phone as a temporary data file according to the call duration in a descending order;
sending temporary data files stored in the local machine to all mobile phone terminals associated with the local machine, returning corrected call duration from other associated mobile phone terminals, recalculating final call duration by combining the call duration of the local machine and temporary marks, sorting the call durations in a descending order as formal data files, and marking harassing calls on the formal data files according to the final call duration;
and sorting the formal data files for marking the crank calls in a descending order, packaging the formal data files into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone.
5. The method of claim 4, wherein the formal data files for marking the harassing calls are sorted in a descending order, packed into blocks and then sent to all mobile phone terminals associated with the mobile phone, and the method comprises the following steps:
according to the set duration, regularly sorting formal data files for marking crank calls in a descending order, taking a plurality of phones which are ranked at the top as the common recognition crank calls, and generating crank call data and packaging the crank call data into blocks; when a plurality of telephones with the front rank are taken, the number of the taken telephones is determined according to the frequency of answering the telephones;
calculating the Hash hash of the packed blocks;
generating a random number according to the Hash hash, and marking the random number and the processing time on the packed block;
and transmitting the marked block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
6. The method of claim 5, wherein all mobile terminals receiving the block identify the block and generate a block chain, and the identifying the nuisance calls comprises:
all the mobile phone terminals receiving the block identify the block and generate a block chain;
and extracting the crank calls in the block from the block chain, and identifying the crank calls to each mobile phone terminal in the block chain.
7. A harassing call marking device based on a block chain is characterized by comprising:
the call duration and corresponding telephone number acquisition module is used for acquiring the call duration and corresponding telephone number of the mobile phone terminal;
the system comprises a whole network call duration database establishing module, a whole network call duration database establishing module and a whole network call duration database establishing module, wherein the whole network call duration database establishing module is used for establishing a whole network call duration database of all mobile phone terminals associated with the system according to the call duration of the mobile phone terminals and corresponding telephone numbers;
the block packing module is used for marking crank calls according to the whole network call duration database, packing the crank calls into blocks and sending the blocks to all mobile phone terminals associated with the local machine;
and the block chain generating module is used for identifying the blocks by all the mobile phone terminals receiving the blocks and generating a block chain to commonly identify the crank calls.
8. The apparatus of claim 7, wherein the call duration and corresponding phone number obtaining module is specifically configured to:
and aiming at each mobile phone terminal, acquiring the time length of each call answered by the mobile phone terminal and a corresponding telephone number, and calculating the call time lengths of all calls answered by the mobile phone terminal in the set time length and the corresponding telephone numbers according to the dimension of the telephone numbers by taking the set time length as a period.
9. The apparatus of claim 7, wherein the network-wide call duration database establishing module is specifically configured to:
establishing a database table according to the structures of the call duration and the corresponding telephone number of the mobile phone terminal according to the main key, the date, the telephone number of the mobile phone, the incoming call telephone number and the call duration;
establishing an association relation between the mobile phone and a mobile phone terminal added with a crank call marking system;
and establishing a whole-network call duration database of all mobile phone terminals associated with the mobile phone according to the database table and the association relation.
10. The apparatus of claim 7, wherein the block packing module is specifically configured to:
extracting the call duration of the phone answered by the local phone from the whole network call duration database, judging whether the phone answered by the local phone is a harassing phone or not according to the call duration and temporarily marking the harassing phone, and sorting and recording the harassing phone in a storage device of the local phone as a temporary data file according to the call duration in a descending order;
sending temporary data files stored in the local machine to all mobile phone terminals associated with the local machine, returning corrected call duration from other associated mobile phone terminals, recalculating final call duration by combining the call duration of the local machine and temporary marks, sorting the call durations in a descending order as formal data files, and marking harassing calls on the formal data files according to the final call duration;
and sorting the formal data files for marking the crank calls in a descending order, packaging the formal data files into blocks, and sending the blocks to all mobile phone terminals associated with the mobile phone.
11. The apparatus of claim 10, wherein the tile packing module is further configured to:
according to the set duration, regularly sorting formal data files for marking crank calls in a descending order, taking a plurality of phones which are ranked at the top as the common recognition crank calls, and generating crank call data and packaging the crank call data into blocks; when a plurality of telephones with the front rank are taken, the number of the taken telephones is determined according to the frequency of answering the telephones;
calculating the Hash hash of the packed blocks;
generating a random number according to the Hash hash, and marking the random number and the processing time on the packed block;
and transmitting the marked block to all mobile phone terminals associated with the mobile phone by adopting a P2P transmission mode.
12. The apparatus of claim 11, wherein the block chain generation module is specifically configured to:
all the mobile phone terminals receiving the block identify the block and generate a block chain;
and extracting the crank calls in the block from the block chain, and identifying the crank calls to each mobile phone terminal in the block chain.
13. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 6 when executing the computer program.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing a method according to any one of claims 1 to 6.
CN202110799057.2A 2021-07-15 2021-07-15 Block chain-based harassing call marking method and device Active CN113542504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110799057.2A CN113542504B (en) 2021-07-15 2021-07-15 Block chain-based harassing call marking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110799057.2A CN113542504B (en) 2021-07-15 2021-07-15 Block chain-based harassing call marking method and device

Publications (2)

Publication Number Publication Date
CN113542504A true CN113542504A (en) 2021-10-22
CN113542504B CN113542504B (en) 2022-12-23

Family

ID=78099307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110799057.2A Active CN113542504B (en) 2021-07-15 2021-07-15 Block chain-based harassing call marking method and device

Country Status (1)

Country Link
CN (1) CN113542504B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115733924A (en) * 2022-12-05 2023-03-03 深圳群峰通达科技有限公司 Call center telephone interception data recognition system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109327627A (en) * 2018-11-27 2019-02-12 深圳声笑科技有限公司 Telephone number recognition methods, device and storage medium based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109327627A (en) * 2018-11-27 2019-02-12 深圳声笑科技有限公司 Telephone number recognition methods, device and storage medium based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115733924A (en) * 2022-12-05 2023-03-03 深圳群峰通达科技有限公司 Call center telephone interception data recognition system
CN115733924B (en) * 2022-12-05 2024-08-16 深圳群峰通达科技有限公司 Call center telephone interception data identification system

Also Published As

Publication number Publication date
CN113542504B (en) 2022-12-23

Similar Documents

Publication Publication Date Title
CN104735272B (en) The hold-up interception method and system of a kind of harassing call
CN104253908B (en) Unknown number stage division, unknown number labeling method and device
CN102413169A (en) Cloud address list establishing and maintenance method and system thereof
CN105827459B (en) Method and device for calling maintenance center by intelligent equipment
DE60125637D1 (en) System and method to detect the residence or availability of a telephone user and to publish the telephone number on the Internet
CN109327627A (en) Telephone number recognition methods, device and storage medium based on block chain
CN110611929A (en) Abnormal user identification method and device
CN110855548A (en) Message pushing method and device
CN107734469A (en) A kind of fraudulent call based reminding method, device and computer-readable recording medium
CN113542504B (en) Block chain-based harassing call marking method and device
CN112866192A (en) Method and device for identifying abnormal aggregation behaviors
CN107682219B (en) Android system-based dial testing method and device for testing number
CN101389085A (en) Rubbish short message recognition system and method based on sending behavior
CN104917906B (en) Information acquisition method, information recommendation method, electronic device and network server
CN109474755B (en) Abnormal telephone active prediction method, system and computer readable storage medium based on sequencing learning and ensemble learning
CN109246282B (en) Call information storage method and device, storage medium and electronic device
CN111065062B (en) Call signaling processing method, device and storage medium
US6775696B1 (en) Systems and methods for collecting and providing call traffic information to end-users
CN108234778B (en) Method and device for generating digital graph rule
CN109121137B (en) Method and device for identifying user number use type of double-card terminal
CN110677539A (en) Method, terminal and edge server for identifying robot telephone
CN103259910A (en) Terminal and managing method of missed calls
CN113411828B (en) Method, device, equipment and computer readable storage medium for sensing call quality
CN113596260B (en) Abnormal telephone number detection method and electronic equipment
CN103812989A (en) Method and device for identifying unwanted calls

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant