CN113596057B - Voice communication system, method and device, electronic equipment and storage medium - Google Patents

Voice communication system, method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113596057B
CN113596057B CN202110931267.2A CN202110931267A CN113596057B CN 113596057 B CN113596057 B CN 113596057B CN 202110931267 A CN202110931267 A CN 202110931267A CN 113596057 B CN113596057 B CN 113596057B
Authority
CN
China
Prior art keywords
voice
verification
request
security
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110931267.2A
Other languages
Chinese (zh)
Other versions
CN113596057A (en
Inventor
王心军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maipu Communication Technology Co Ltd
Original Assignee
Maipu Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maipu Communication Technology Co Ltd filed Critical Maipu Communication Technology Co Ltd
Priority to CN202110931267.2A priority Critical patent/CN113596057B/en
Publication of CN113596057A publication Critical patent/CN113596057A/en
Application granted granted Critical
Publication of CN113596057B publication Critical patent/CN113596057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1076Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
    • H04L65/1079Screening of IP real time communications, e.g. spam over Internet telephony [SPIT] of unsolicited session attempts, e.g. SPIT
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Abstract

The application provides a voice call system, a method, a device, electronic equipment and a storage medium, wherein terminal equipment generates a voice call request according to equipment information, a calling number and a called number, and sends the voice call request to a security check voice gateway; the security check voice gateway receives the voice call request, generates a check authentication request according to equipment information, a calling number and a called number in the voice call request when the voice call request is determined not to belong to the local call, and then sends the check authentication request to the security operation and maintenance platform; the security operation and maintenance platform receives the verification and authentication request, performs security verification and authentication on equipment information, a calling number and a called number in the verification and authentication request to obtain a verification and authentication result, and then sends the verification and authentication result to the security verification voice gateway; and the security check voice gateway receives the check authentication result and processes the voice call request according to the check authentication result.

Description

Voice communication system, method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the technical field of network communication and voice communication, and in particular, to a voice communication system, a method, an apparatus, an electronic device, and a storage medium.
Background
The internet protocol (Internet Protocol, IP), which is a generic term for a cluster of protocols, is not itself any protocol, and IP protocols that may be used include: file transfer protocol, email protocol, hypertext transfer protocol, etc.
Currently, a telecom operator is used as a Service Provider (SP) of a voice call, and a voice Service network (for example, an international long-distance call Service) of some telecom operators does not use a private network, but uses an IP multimedia subsystem (IP Multimedia Subsystem) technology to transmit voice data on the internet, thereby completing a function of the voice call. However, there are many network attackers on the internet, and the network attackers can use the access device of the telecom operator as a springboard, so as to enter the internal network of the telecom operator, and then export from other places of the internal network of the telecom operator to dial international long distance calls, so that security problems such as difficult monitoring and the like exist. That is, the security of transmitting voice data over the internet is low at present using IP multimedia subsystem technology.
Disclosure of Invention
An objective of the embodiments of the present application is to provide a voice call system, a method, an apparatus, an electronic device, and a storage medium, which are used for improving the problem of low security of voice data transmission over the internet.
The embodiment of the application provides a voice call system, which comprises: the system comprises terminal equipment, a security verification voice gateway and a security operation and maintenance platform; the security check voice gateway is respectively communicated with the terminal equipment and the security operation and maintenance platform; the terminal equipment generates a voice call request according to the equipment information, the calling number and the called number, and sends the voice call request to the security check voice gateway; the security check voice gateway receives a voice call request sent by the terminal equipment, generates a check authentication request according to equipment information, a calling number and a called number in the voice call request when the voice call request is determined not to belong to local call, and then sends the check authentication request to the security operation and maintenance platform; the security operation and maintenance platform receives a verification and authentication request sent by the security verification voice gateway, performs security verification and authentication on equipment information, a calling number and a called number in the verification and authentication request by using a preset call policy, obtains a verification and authentication result, and then sends the verification and authentication result to the security verification voice gateway; and the security check voice gateway receives a check authentication result sent by the security operation and maintenance platform and processes the voice call request according to the check authentication result. In the implementation process, the equipment information of the terminal equipment, the calling number and the called number sent by the terminal equipment are subjected to safety verification to obtain a verification result, and the voice call request is processed according to the verification result, so that a safety access mechanism is set for voice service of a telecom operator, the risk that a network attacker steals a voice service network to dial an international long distance call is avoided, and the safety of transmitting voice data on the Internet is effectively improved.
Optionally, in an embodiment of the present application, the voice call system further includes: the Session Initiation Protocol (SIP) server is respectively communicated with the security check voice gateway and the security operation and maintenance platform; processing the voice call request according to the verification authentication result, including: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending a voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment; the SIP server receives a voice call request sent by the security check voice gateway, generates a path monitoring request according to call path information of the voice call request when the voice call request is determined not to belong to the call in the network, and then sends the path monitoring request to the security operation and maintenance platform; the safety operation and maintenance platform receives a path monitoring request sent by the SIP server, monitors call path information in the path monitoring request, obtains a path monitoring result, and then sends the path monitoring result to the SIP server; the SIP server receives the path monitoring result sent by the security operation and maintenance platform and judges whether the path monitoring result passes or not; if yes, the voice call request is released, otherwise, the call blocking response is sent to the terminal equipment through the security check voice gateway. In the implementation process, a path monitoring request is sent to a safe operation and maintenance platform through an SIP server, and a voice call request is processed according to the path monitoring result; therefore, the problem that the voice call request is released under the condition that the path monitoring is not passed is avoided, and the safety of transmitting voice data on the Internet is effectively improved.
The embodiment of the application also provides a voice call method which is applied to the safety operation and maintenance platform, and the safety operation and maintenance platform and the safety verification voice gateway are communicated with each other; the voice call method comprises the following steps: receiving a verification authentication request sent by a security verification voice gateway, wherein the verification authentication request is sent when the security verification voice gateway determines that the received voice call request does not belong to a local call; performing security verification and authentication on equipment information, a calling number and a called number in a verification and authentication request by using a preset call policy to obtain a verification and authentication result; and sending a verification authentication result to the security verification voice gateway. In the implementation process, the equipment information, the calling number and the called number in the verification authentication request are subjected to safety verification authentication by using the preset call policy, so that a safety access mechanism is set for voice service of a telecom operator, the risk that a network attacker steals a voice service network to dial an international long distance call is avoided, and the safety of transmitting voice data on the Internet is effectively improved.
Optionally, in the embodiment of the present application, the secure operation and maintenance platform also communicates with a session initiation protocol SIP server; the voice call method further comprises the following steps: receiving a path monitoring request sent by an SIP server, wherein the path monitoring request is sent by the SIP server when the received voice call request is determined not to belong to the network for call; monitoring call path information in the path monitoring request to obtain a path monitoring result; and sending the path monitoring result to the SIP server. In the implementation process, the SIP server is used for sending the path monitoring request when determining that the received voice call request does not belong to the call in the network, and the security operation and maintenance platform is used for monitoring the call path information in the path monitoring request, so that the risk that a network attacker steals the voice service network by utilizing the loopholes without path monitoring is avoided, and the security of transmitting voice data on the Internet is effectively improved.
The embodiment of the application also provides a voice call method which is applied to the safety verification voice gateway, and the safety verification voice gateway is respectively communicated with the terminal equipment and the safety operation and maintenance platform; the voice call method comprises the following steps: receiving a voice call request sent by terminal equipment; when the voice call request is determined not to belong to the local call, generating a verification authentication request according to equipment information, a calling number and a called number in the voice call request; sending a verification authentication request to the security operation and maintenance platform, so that the security operation and maintenance platform uses a preset call strategy to carry out security verification authentication on equipment information, a calling number and a called number in the verification authentication request, and obtaining and returning a verification authentication result; and receiving a verification and authentication result sent by the security operation and maintenance platform, and processing the voice call request according to the verification and authentication result.
Optionally, in the embodiment of the present application, the security check voice gateway also communicates with the session initiation protocol SIP server; processing the voice call request according to the verification authentication result, including: judging whether the verification authentication result is passed or not; if yes, sending a voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment.
The embodiment of the application also provides a voice call method which is applied to the Session Initiation Protocol (SIP) server, wherein the SIP server is respectively communicated with the security check voice gateway and the security operation and maintenance platform; the voice call method comprises the following steps: receiving a voice call request sent by a security check voice gateway; when the voice call request is determined not to belong to the call in the network, generating a path monitoring request according to call path information of the voice call request; sending a path monitoring request to the safe operation and maintenance platform so that the safe operation and maintenance platform monitors call path information in the path monitoring request to obtain and return a path monitoring result; receiving a path monitoring result sent by the safety operation and maintenance platform, and judging whether the path monitoring result passes or not; if yes, the voice call request is released, otherwise, the call blocking response is sent to the terminal equipment through the security check voice gateway.
The embodiment of the application also provides a voice communication device which is applied to the safety operation and maintenance platform, and the safety operation and maintenance platform and the safety verification voice gateway are communicated with each other; a voice telephony device comprising: the authentication request receiving module is used for receiving a verification authentication request sent by the security verification voice gateway, wherein the verification authentication request is sent by the security verification voice gateway when the received voice call request is determined not to belong to a local call; the authentication result obtaining module is used for carrying out safety verification and authentication on the equipment information, the calling number and the called number in the verification and authentication request by using a preset call strategy to obtain a verification and authentication result; and the authentication result sending module is used for sending a verification authentication result to the security verification voice gateway.
Optionally, in the embodiment of the present application, the secure operation and maintenance platform also communicates with a session initiation protocol SIP server; the voice call device further comprises: the path monitoring request receiving module is used for receiving a path monitoring request sent by the SIP server, wherein the path monitoring request is sent by the SIP server when the received voice call request is determined not to belong to the network for call; the path monitoring result obtaining module is used for monitoring call path information in the path monitoring request to obtain a path monitoring result; and the path monitoring result sending module is used for sending the path monitoring result to the SIP server.
The embodiment of the application also provides electronic equipment, which comprises: a processor and a memory storing machine-readable instructions executable by the processor to perform the method as described above when executed by the processor.
Embodiments of the present application also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs a method as described above.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of a voice call system according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a voice call method executed by the secure operation platform according to the embodiment of the present application;
fig. 3 is a schematic flow chart of a voice call method executed by a security check voice gateway according to an embodiment of the present application;
fig. 4 is a schematic flow chart of a voice call method executed by a SIP server according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a voice call device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Before introducing the voice call method provided in the embodiments of the present application, some concepts involved in the embodiments of the present application are first described:
session initiation protocol (Session Initiation Protocol, SIP), also known as session initiation protocol, is a multimedia communication protocol established by the internet engineering task force (Internet Engineering Task Force, IETF), which is a text-based application-layer control protocol proposed as a standard for creating, modifying and terminating interactive user sessions involving a variety of multimedia elements, including video, voice, instant messaging, online gaming and virtual reality.
Voice over IP (VoIP), which is a Voice call technology, is to implement Voice call and multimedia conference via IP protocol, that is, to communicate via internet; other informal names are IP phones, internet phones, broadband phone services, etc.
Please refer to fig. 1, which illustrates a schematic structural diagram of a voice call system provided in an embodiment of the present application; the voice call system includes: the system comprises terminal equipment, a security verification voice gateway and a security operation and maintenance platform; the security check voice gateway is respectively communicated with the terminal equipment and the security operation and maintenance platform; specific examples are: the first security check voice gateway is respectively communicated with the first terminal equipment and the security operation and maintenance platform, and the second security check voice gateway is respectively communicated with the second terminal equipment and the security operation and maintenance platform.
The above voice call system may further include: the Session Initiation Protocol (SIP) server is respectively communicated with the security check voice gateway and the security operation and maintenance platform; specific examples are: the first SIP server is respectively communicated with the first security check voice gateway and the security operation and maintenance platform, the second SIP server is respectively communicated with the security check voice gateway and the second security operation and maintenance platform, and the first SIP server and the second SIP server can be communicated with each other through a wide area network (such as the Internet).
And the terminal equipment generates a VoIP voice call request according to the equipment information, the calling number and the called number, and sends the voice call request to the security check voice gateway. The terminal device refers to a sending device of a voice call request, for example: personal computer, video telephone and voice fixed telephone with voice call function, the voice call request sent by the terminal equipment is passed through the safety check voice gateway.
And the security check voice gateway receives a voice call request sent by the terminal equipment, generates a check authentication request according to equipment information, a calling number and a called number in the voice call request when the voice call request is determined not to belong to the local call, and then sends the check authentication request to the security operation and maintenance platform. Conversely, when it is determined that the voice call request belongs to the local call, the voice call request may be directly released without checking authentication with the secure operation and maintenance platform.
It should be noted that, the above-mentioned security check voice gateway refers to a voice gateway with a security check function added thereto, where the security check function may be embodied as a software program deployed and running in the voice gateway (the security check voice gateway at this time may be a server that performs both the voice gateway function and the security check function), or may be embodied as a hardware device that performs the security check function (the security check voice gateway at this time may be an integral device of two devices that communicate with each other, including a voice gateway and a server that performs the security check function, where the voice gateway and the server may communicate with each other).
The security operation and maintenance platform receives a verification and authentication request sent by the security verification voice gateway, performs security verification and authentication on equipment information, a calling number and a called number in the verification and authentication request by using a preset call policy, obtains a verification and authentication result, and then sends the verification and authentication result to the security verification voice gateway.
The security check voice gateway receives the check authentication result sent by the security operation and maintenance platform, processes the voice call request according to the check authentication result, and the specific process of processing the voice call request can include: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending a voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment. The SIP server receives the voice call request sent by the security check voice gateway, generates a path monitoring request according to call path information of the voice call request when the voice call request is determined not to belong to the call in the network, and then sends the path monitoring request to the security operation and maintenance platform. The safety operation and maintenance platform receives the path monitoring request sent by the SIP server, monitors call path information in the path monitoring request, obtains a path monitoring result, and then sends the path monitoring result to the SIP server. The SIP server receives the path monitoring result sent by the security operation and maintenance platform and judges whether the path monitoring result passes or not; if yes, the voice call request is released, otherwise, the call blocking response is sent to the terminal equipment through the security check voice gateway.
The voice call method provided in the embodiment of the present application may be executed by an electronic device, where the electronic device refers to a server or a network device that executes a computer program function, and the server refers to a device that provides a computing service through a network, and the server is for example: an x86 server and a non-x 86 server, the non-x 86 server comprising: mainframe, mini-computer and UNIX server; the network device includes: three layers of switches and routers, etc.
Application scenarios to which the voice call method is applicable are described below, where the application scenarios include, but are not limited to: the voice call method is used for avoiding the telephone fee loss of the voice service of the voice operator, thereby improving the safety of the voice service for the voice operator, or enhancing the functions of the safety voice service server and the safety check voice gateway, thereby customizing and developing the safety voice service server, the safety check voice gateway or providing the safety voice operation and maintenance solution service for the voice operator, and the like.
Please refer to fig. 2, which illustrates a flowchart of a voice call method executed by the secure operation platform according to an embodiment of the present application; the voice communication method can be applied to a safe operation and maintenance platform (namely, the safe operation and maintenance platform can be executed), and the safe operation and maintenance platform and the safe verification voice gateway are communicated with each other; the main idea of the voice call method is that the equipment information of the terminal equipment, the calling number and the called number sent by the terminal equipment are subjected to safety verification to obtain a verification result, and the voice call request is processed according to the verification result, so that a safety access mechanism is set for voice service of a telecom operator, the risk that a network attacker steals a voice service network to dial an international long distance call is avoided, and the safety of transmitting voice data on the Internet is effectively improved. The voice call method executed by the secure operation platform may include:
Step S110: the security operation and maintenance platform receives a verification authentication request sent by the security verification voice gateway, wherein the verification authentication request is sent when the security verification voice gateway determines that the received voice call request does not belong to a local call.
The embodiment of step S110 described above is, for example: the security check voice gateway receives a VoIP voice call request sent by the terminal equipment, judges whether the voice call request belongs to a local call, and can directly pass if the voice call request belongs to the local call; if the voice call request does not belong to the local call, generating a verification authentication request according to the equipment information, the calling number and the called number in the voice call request, and then sending the verification authentication request to the security operation and maintenance platform.
After step S110, step S120 is performed: and the safety operation and maintenance platform uses a preset call strategy to carry out safety verification and authentication on the equipment information, the calling number and the called number in the verification and authentication request, and a verification and authentication result is obtained.
The preset call policy refers to a preset call policy, and the authentication process using the preset call policy includes: acquiring a preset strategy corresponding to the service scene from a strategy center library, and authenticating the equipment information by using the preset strategy corresponding to the service scene to obtain a verification authentication result.
The security verification authentication method in step S120 includes, but is not limited to:
the first security verification authentication method performs security verification authentication on equipment information, where the equipment information includes subscriber identity module (Subscriber Identity Module, SIM) card information and a call location of the SIM card. The authentication of the SIM card specifically includes: in the incoming call scene of the security call service, a security call strategy corresponding to the incoming call scene is obtained from a strategy center library, and the security call strategy is used for checking and authenticating the equipment information, so that the use record of the SIM card can be queried according to the SIM card information, and whether the SIM card is illegal or in a blacklist is judged according to the use record of the SIM card, and if the SIM card is illegal or in the blacklist, the checking and authenticating result is set as not passing; and if the SIM card is in the white list, setting the verification authentication result to pass. Also for example: the equipment information comprises the call position of the SIM card, and if the call position of the SIM card is the geographic position in the process of frequent call, the authentication is passed; if the call position of the SIM card is not the geographical position in the process of frequent call, further authenticating whether the SIM card is stolen, and the like, if the SIM card is not stolen, setting the verification authentication result to pass, otherwise, setting the verification authentication result to not pass.
The second security check authentication method performs security check authentication on the calling number and the called number, and judges whether the calling number and the called number pass the security check according to preset rules, where the preset rules include: whether the number of call minutes of the calling number or the called number exceeds the number of allowed local call minutes of the host number or the called number in the month (for example, only 100 minutes can be called in the month, an alarm message is sent after exceeding a preset proportion, etc.), or whether the calling number and the called number are in a managed list (white list or black list, etc.), or whether a history call record and a history message record are queried according to the calling number or the called number, then whether abnormal (stolen) conditions are generated in the call and the message of the calling number and the called number are judged according to the history call record and the history message record, or whether the calling number is in the black list of the called number is judged, etc.
The third security verification authentication mode is combined with the first security verification authentication mode and the second security verification authentication mode to carry out security verification authentication on the equipment information, the calling number and the called number; the specific embodiment is similar to the first security check authentication method and the second security check authentication method described above, and therefore, will not be described herein.
After step S120, step S130 is performed: and the security operation and maintenance platform sends a verification authentication result to the security verification voice gateway.
The embodiment of step S130 described above is, for example: the security operation and maintenance platform sends a verification authentication result to the security verification voice gateway; the security check voice gateway receives a check authentication result sent by the security operation and maintenance platform and judges whether the check authentication result passes or not; if the verification authentication result is passed, the security verification voice gateway sends a voice call request to the SIP server; if the verification authentication result is not passed, the security verification voice gateway sends a call blocking response to the terminal equipment.
After step S130, step S140 is performed: the security operation and maintenance platform receives a path monitoring request sent by the SIP server, wherein the path monitoring request is sent by the SIP server when the received voice call request is determined not to belong to the network for call.
The embodiment of step S140 described above is, for example: the SIP server receives the voice call request sent by the security check voice gateway, and if the voice call request is determined to belong to the call in the network, the voice call request is directly released. And the SIP server searches call path information corresponding to the voice call request in a database or a file system only when the voice call request is determined not to belong to the call in the network, generates a path monitoring request according to the call path information of the voice call request, and sends the path monitoring request to the security operation and maintenance platform. The secure operation platform receives the path monitoring request sent by the SIP server through a transmission control protocol (Transmission Control Protocol, TCP) or a user datagram protocol (User Datagram Protocol, UDP).
After step S140, step S150 is performed: and the safety operation and maintenance platform monitors call path information in the path monitoring request to obtain a path monitoring result.
The call path information may include: a start ingress device identity, an ingress operator identity and a next hop device identity; the initial ingress device identifier may be understood as a device identifier of a call initial ingress, the ingress operator identifier may be understood as an operator identifier of the initial ingress on the call path, and the next hop device identifier may be understood as a device identifier of a next hop of the call path.
The embodiment of the above step S150 is divided into two scenarios (here, taking the case that the first terminal device sends a voice call request to the second terminal device as an example, the voice call request may sequentially pass through the first security check voice gateway, the first SIP server, the second SIP server, and the second security check voice gateway):
the first type of incoming call scenario, that is, the SIP server is a first SIP server that performs ingress security detection, and call path information reported by the first SIP server is a call path at an ingress, where the incoming call scenario may include:
if the initial entry device identifier is the identifier of the first security check voice gateway, the entry operator identifier is a preset operator identifier, and the next-hop device identifier is the voice internal network local exit identifier corresponding to the preset operator identifier, a path monitoring result indicating that the path is monitored is sent to the first SIP server.
If the initial entrance equipment identifier is the identifier of the first security check voice gateway, the entrance operator identifier is a preset operator identifier, and the next-hop equipment identifier is the voice internal network local exit identifier of the second SIP server, a path monitoring result indicating that the path is monitored is sent to the first SIP server.
If the initial entry device identifier is the identifier of the first security check voice gateway, the entry operator identifier is the preset operator identifier, and the next hop device identifier is the identifier of the first security check voice gateway or the identifier of the second security check voice gateway, a path monitoring result indicating that the path monitoring is not passed is sent to the first SIP server or the second SIP server.
The second type of outgoing call scenario, that is, the SIP server is a second SIP server that performs egress security detection, and call path information reported by the second SIP server is a call path at an egress, where the incoming call scenario may include: judging whether the initial inlet equipment identifier is the identifier of a first security check voice gateway or not; if not, sending a path monitoring result of the path monitoring to a second SIP server; if the initial entry device identifier is the identifier of the first security check voice gateway and the calling number is the intra-office number, sending a path monitoring result through path monitoring to a second SIP server; if the initial ingress device identifier is the identifier of the first security check voice gateway and the calling number is not the intra-office number, sending a path monitoring result indicating that the path monitoring is not passed to the second SIP server.
Because the first SIP server and the second SIP server both report the call path information to the security operation and maintenance platform, the security operation and maintenance platform can easily verify whether the call path information reported by the following SIP server is correct (for example, whether the next hop address is the address of the following SIP server) according to the call path information reported by the SIP server before.
Optionally, in the process of executing the voice call method by the secure operation platform, statistics may be performed on the calling number and/or the called number, call map information such as a history call record of the calling number and/or the called number is obtained, and a call path topology capable of backtracking is generated according to the history call record. After the call path topology is generated, call map information such as a history call record and the call path topology may also be output on a large screen (e.g., a call area map or the like) in real time. An administrator can observe the current full-network call list in the current voice call system in real time, can control the occurrence times of forbidden words in the monitored call through the current full-network call list, and can determine whether to block the voice call according to the occurrence times of the forbidden words, so that the technical effects of being visible, safe and controllable in call are achieved.
After step S150, step S160 is performed: and the safe operation and maintenance platform sends the path monitoring result to the SIP server.
The embodiment of step S160 described above is, for example: the security operation and maintenance platform sends a path monitoring result to the SIP server through a TCP protocol or a UDP protocol, and judges whether the path monitoring result passes or not; if the path monitoring result is passed, releasing the voice call request; if the path monitoring result is not passed, a call blocking response is returned to the terminal equipment corresponding to the voice call request.
Please refer to fig. 3, which is a flowchart illustrating a voice call method executed by the security check voice gateway according to an embodiment of the present application; the voice communication method can be applied to a safety check voice gateway which is respectively communicated with the terminal equipment, the Session Initiation Protocol (SIP) server and the safety operation and maintenance platform; the voice call method executed by the security check voice gateway may include:
step S210: the security check voice gateway receives a voice call request sent by the terminal equipment.
The embodiment of step S210 described above is, for example: the first terminal equipment sends a voice call request to the security check voice gateway through a TCP protocol or a UDP protocol, and the voice call request is used for establishing a call with the second terminal equipment; the security check voice gateway receives the VoIP voice call request sent by the terminal equipment through the TCP protocol or the UDP protocol.
After step S210, step S220 is performed: and when the security check voice gateway determines that the voice call request does not belong to the local call, generating a check authentication request according to the equipment information, the calling number and the called number in the voice call request.
Of course, if the security check voice gateway determines that the voice call request belongs to the local call, the voice call request can be directly released, and check authentication on the voice call request is not required.
After step S220, step S230 is performed: the security check voice gateway sends a check authentication request to the security operation and maintenance platform, so that the security operation and maintenance platform uses a preset call strategy to carry out security check authentication on equipment information, a calling number and a called number in the check authentication request, and a check authentication result is obtained and returned.
The implementation principle and implementation of this step S230 are similar to those of the steps S110 to S120, and thus, the implementation principle and implementation thereof will not be described here, and reference may be made to the descriptions of the steps S110 to S120 if it is unclear.
After step S230, step S240 is performed: and the security check voice gateway receives a check authentication result sent by the security operation and maintenance platform and processes the voice call request according to the check authentication result.
The embodiment of step S240 described above is, for example: the security verification voice gateway uses a programming language to determine whether the verification authentication result is passed, and a programming language such as: C. c++, java, BASIC, javaScript, LISP, shell, perl, ruby, python, PHP, etc. If the verification authentication result is passed, the security verification voice gateway sends a voice call request to the SIP server, namely the voice call request is directly released. If the verification authentication result is not passed, the security verification voice gateway sends a call blocking response to the terminal equipment.
Please refer to fig. 4, which is a flowchart illustrating a voice call method executed by the SIP server according to an embodiment of the present application; the voice call method can be applied to a Session Initiation Protocol (SIP) server, and the SIP server is respectively communicated with the security check voice gateway and the security operation and maintenance platform; the voice call method executed by the SIP server may include:
step S310: the SIP server receives a voice call request sent by the security check voice gateway.
The embodiment of step S310 described above is, for example: the SIP server receives the voice call request sent by the security check voice gateway through a transmission control protocol (Transmission Control Protocol, TCP) or a user datagram protocol (User Datagram Protocol, UDP).
After step S310, step S320 is performed: when the SIP server determines that the voice call request does not belong to the call in the network, the SIP server generates a path monitoring request according to call path information of the voice call request.
The embodiment of step S320 described above is, for example: if the SIP server determines that the voice call request belongs to the call in the network, the voice call request is directly released; only when the voice call request is determined not to belong to the call in the network, searching call path information corresponding to the voice call request in a database or a file system, generating a path monitoring request according to the call path information of the voice call request, and sending the path monitoring request to a safe operation and maintenance platform. Among the databases that may be used include, but are not limited to: a memory database, a relational database and a non-relational database; an in-memory database that may be used is for example: memcached and Redis, etc., relational databases that can be used are, for example: mysql, postgreSQL, oracle and SQLSever, etc., non-relational databases that may be used include: grakn database, neo4j graph database, hadoop subsystem HBase, mongoDB, couchDB, etc.
After step S320, step S330 is performed: the SIP server sends a path monitoring request to the security operation and maintenance platform so that the security operation and maintenance platform monitors call path information in the path monitoring request to obtain and return a path monitoring result.
The implementation principle and implementation of this step S330 are similar to those of the step S150, and thus, the implementation principle and implementation thereof will not be described again here, and reference may be made to the description of the step S150 if it is not clear.
After step S330, step S340 is performed: and the SIP server receives the path monitoring result sent by the security operation and maintenance platform and judges whether the path monitoring result passes or not.
After step S340, step S350 is performed: if the path monitoring result is passed, the SIP server releases the voice call request.
After step S340, step S360 is performed: if the path monitoring result is not passed, the SIP server sends a call blocking response to the terminal equipment through the security check voice gateway.
Please refer to fig. 5, which illustrates a schematic structural diagram of a voice call device provided in an embodiment of the present application. The voice call apparatus 400 may be applied to a secure operation and maintenance platform, which communicates with a secure check voice gateway; the voice telephony apparatus 400 may include:
the authentication request receiving module 410 is configured to receive a verification authentication request sent by the security check voice gateway, where the verification authentication request is sent by the security check voice gateway when it is determined that the received voice call request does not belong to a local call.
The authentication result obtaining module 420 is configured to perform security verification and authentication on the device information, the calling number and the called number in the verification and authentication request by using a preset call policy, so as to obtain a verification and authentication result.
And the authentication result sending module 430 is configured to send a verification authentication result to the security verification voice gateway.
Optionally, in the embodiment of the present application, the secure operation and maintenance platform also communicates with a session initiation protocol SIP server; the voice call device further comprises:
the path monitoring request receiving module is used for receiving a path monitoring request sent by the SIP server, wherein the path monitoring request is sent by the SIP server when the received voice call request is determined not to belong to the network for call.
The path monitoring result obtaining module is used for monitoring call path information in the path monitoring request to obtain a path monitoring result.
And the path monitoring result sending module is used for sending the path monitoring result to the SIP server.
It should be understood that, the apparatus corresponds to the above embodiment of the voice call method, and is capable of executing the steps involved in the above embodiment of the method, and specific functions of the apparatus may be referred to the above description, and detailed descriptions are omitted herein as appropriate to avoid redundancy. The device includes at least one software functional module that can be stored in memory in the form of software or firmware (firmware) or cured in an Operating System (OS) of the device.
An electronic device provided in an embodiment of the present application includes: a processor and a memory storing machine-readable instructions executable by the processor, which when executed by the processor perform the method as above.
Embodiments of the present application also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs a method as above.
The computer readable storage medium may be implemented by any type or combination of volatile or nonvolatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
In addition, the functional modules of the embodiments in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The foregoing description is merely an optional implementation of the embodiments of the present application, but the scope of the embodiments of the present application is not limited thereto, and any person skilled in the art may easily think about changes or substitutions within the technical scope of the embodiments of the present application, and the changes or substitutions should be covered in the scope of the embodiments of the present application.

Claims (7)

1. A voice call system, comprising: the system comprises terminal equipment, a security verification voice gateway, a Session Initiation Protocol (SIP) server and a security operation and maintenance platform; the security check voice gateway is respectively communicated with the terminal equipment and the security operation and maintenance platform; the SIP server is respectively communicated with the security check voice gateway and the security operation and maintenance platform;
The terminal equipment generates a voice call request according to the equipment information, the calling number and the called number, and sends the voice call request to the security check voice gateway;
the security verification voice gateway receives the voice call request sent by the terminal equipment, generates a verification authentication request according to equipment information, a calling number and a called number in the voice call request when the voice call request is determined not to belong to local call, and then sends the verification authentication request to the security operation and maintenance platform;
the security operation and maintenance platform receives the verification and authentication request sent by the security verification voice gateway, performs security verification and authentication on equipment information, a calling number and a called number in the verification and authentication request by using a preset call policy to obtain a verification and authentication result, and then sends the verification and authentication result to the security verification voice gateway;
the security verification voice gateway receives the verification authentication result sent by the security operation and maintenance platform and processes the voice call request according to the verification authentication result;
wherein, the voice call is to transmit voice data on the Internet by adopting an IP multimedia subsystem; the processing the voice call request according to the verification authentication result comprises the following steps: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending the voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment; the SIP server receives the voice call request sent by the security check voice gateway, generates a path monitoring request according to call path information of the voice call request when the voice call request is determined not to belong to the network for call, and then sends the path monitoring request to the security operation and maintenance platform; the safe operation and maintenance platform receives the path monitoring request sent by the SIP server, monitors call path information in the path monitoring request, obtains a path monitoring result, and then sends the path monitoring result to the SIP server; the SIP server receives the path monitoring result sent by the safe operation and maintenance platform and judges whether the path monitoring result passes or not; and if yes, releasing the voice call request, otherwise, sending a call blocking response to the terminal equipment through the security check voice gateway.
2. The voice communication method is characterized by being applied to a safety operation and maintenance platform, wherein the safety operation and maintenance platform is communicated with a safety verification voice gateway; the voice call method comprises the following steps:
receiving a verification authentication request sent by the security verification voice gateway, wherein the verification authentication request is sent when the security verification voice gateway determines that the received voice call request does not belong to a local call;
performing security verification and authentication on the equipment information, the calling number and the called number in the verification and authentication request by using a preset call policy to obtain a verification and authentication result;
the verification and authentication result is sent to the security verification voice gateway, so that the security verification voice gateway receives the verification and authentication result sent by the security operation and maintenance platform and processes the voice call request according to the verification and authentication result;
the voice call is to transmit voice data on the Internet by adopting an IP multimedia subsystem, and the safe operation and maintenance platform is also communicated with a Session Initiation Protocol (SIP) server; the processing the voice call request according to the verification authentication result comprises the following steps: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending the voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment; the SIP server receives the voice call request sent by the security check voice gateway, generates a path monitoring request according to call path information of the voice call request when the voice call request is determined not to belong to the network for call, and then sends the path monitoring request to the security operation and maintenance platform; the safe operation and maintenance platform receives the path monitoring request sent by the SIP server, monitors call path information in the path monitoring request, obtains a path monitoring result, and then sends the path monitoring result to the SIP server; the SIP server receives the path monitoring result sent by the safe operation and maintenance platform and judges whether the path monitoring result passes or not; and if yes, releasing the voice call request, otherwise, sending a call blocking response to the terminal equipment through the security check voice gateway.
3. The voice communication method is characterized by being applied to a safety verification voice gateway, wherein the safety verification voice gateway is respectively communicated with terminal equipment and a safety operation and maintenance platform; the voice call method comprises the following steps:
receiving a voice call request sent by the terminal equipment;
when the voice call request is determined not to belong to the local call, generating a verification authentication request according to the equipment information, the calling number and the called number in the voice call request;
sending the verification authentication request to the safety operation and maintenance platform, so that the safety operation and maintenance platform uses a preset communication strategy to carry out safety verification authentication on equipment information, a calling number and a called number in the verification authentication request, and obtaining and returning a verification authentication result;
receiving the verification and authentication result sent by the secure operation and maintenance platform, and processing the voice call request according to the verification and authentication result;
the voice communication is to transmit voice data on the Internet by adopting an IP multimedia subsystem, and the security check voice gateway is also communicated with a Session Initiation Protocol (SIP) server; the processing the voice call request according to the verification authentication result comprises the following steps: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending the voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment; the SIP server receives the voice call request sent by the security check voice gateway, generates a path monitoring request according to call path information of the voice call request when the voice call request is determined not to belong to the network for call, and then sends the path monitoring request to the security operation and maintenance platform; the safe operation and maintenance platform receives the path monitoring request sent by the SIP server, monitors call path information in the path monitoring request, obtains a path monitoring result, and then sends the path monitoring result to the SIP server; the SIP server receives the path monitoring result sent by the safe operation and maintenance platform and judges whether the path monitoring result passes or not; and if yes, releasing the voice call request, otherwise, sending a call blocking response to the terminal equipment through the security check voice gateway.
4. The voice communication method is characterized by being applied to a Session Initiation Protocol (SIP) server, wherein the SIP server is respectively communicated with a security check voice gateway and a security operation and maintenance platform; the voice call method comprises the following steps:
receiving a voice call request sent by the security check voice gateway, wherein the voice call request is sent to the SIP server after the security check voice gateway receives a check authentication result sent by the security operation and maintenance platform and determines that the check authentication result passes;
generating a path monitoring request according to the call path information of the voice call request when the voice call request is determined not to belong to the call in the network;
sending the path monitoring request to the safe operation and maintenance platform so that the safe operation and maintenance platform monitors call path information in the path monitoring request to obtain and return a path monitoring result;
receiving the path monitoring result sent by the safe operation and maintenance platform, and judging whether the path monitoring result passes or not;
if yes, releasing the voice call request, otherwise, sending a call blocking response to the terminal equipment through the security check voice gateway;
Wherein, the voice call is to transmit voice data on the Internet by adopting an IP multimedia subsystem; before the security check voice gateway receives the check authentication result sent by the security operation and maintenance platform, the method further comprises the following steps: the terminal equipment generates a voice call request according to the equipment information, the calling number and the called number, and sends the voice call request to the security check voice gateway; the security verification voice gateway receives the voice call request sent by the terminal equipment, generates a verification authentication request according to equipment information, a calling number and a called number in the voice call request when the voice call request is determined not to belong to local call, and then sends the verification authentication request to the security operation and maintenance platform; the security operation and maintenance platform receives the verification and authentication request sent by the security verification voice gateway, performs security verification and authentication on equipment information, a calling number and a called number in the verification and authentication request by using a preset call policy, obtains a verification and authentication result, and then sends the verification and authentication result to the security verification voice gateway.
5. The voice communication device is characterized by being applied to a safety operation and maintenance platform, wherein the safety operation and maintenance platform is communicated with a safety verification voice gateway, and the safety operation and maintenance platform is also communicated with a Session Initiation Protocol (SIP) server; the voice call device comprises:
The authentication request receiving module is used for receiving a verification authentication request sent by the security verification voice gateway, wherein the verification authentication request is sent by the security verification voice gateway when the received voice call request is determined not to belong to a local call;
the authentication result obtaining module is used for carrying out safety verification and authentication on the equipment information, the calling number and the called number in the verification and authentication request by using a preset call strategy to obtain a verification and authentication result;
the authentication result sending module is used for sending the verification authentication result to the security verification voice gateway so that the security verification voice gateway receives the verification authentication result sent by the security operation and maintenance platform and processes the voice call request according to the verification authentication result; the processing the voice call request according to the verification authentication result includes: the security check voice gateway judges whether the check authentication result is passed or not; if yes, sending the voice call request to the SIP server, otherwise, sending a call blocking response to the terminal equipment;
a path monitoring request receiving module, configured to receive a path monitoring request sent by the SIP server, where the path monitoring request is sent by the SIP server when the received voice call request is determined not to belong to the intra-network call after receiving the voice call request sent by the security check voice gateway;
The path monitoring result obtaining module is used for monitoring call path information in the path monitoring request after receiving the path monitoring request sent by the SIP server to obtain a path monitoring result;
a path monitoring result sending module, configured to send the path monitoring result to the SIP server, so that the SIP server receives the path monitoring result sent by the secure operation and maintenance platform, if the path monitoring result is passed, the SIP server releases the voice call request, otherwise, sends a call blocking response to the terminal device through the secure check voice gateway;
wherein, the voice call is to transmit voice data on the Internet by adopting an IP multimedia subsystem.
6. An electronic device, comprising: a processor and a memory storing machine-readable instructions executable by the processor to perform the method of any one of claims 2 to 4 when executed by the processor.
7. A computer-readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, performs the method according to any of claims 2 to 4.
CN202110931267.2A 2021-08-13 2021-08-13 Voice communication system, method and device, electronic equipment and storage medium Active CN113596057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110931267.2A CN113596057B (en) 2021-08-13 2021-08-13 Voice communication system, method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110931267.2A CN113596057B (en) 2021-08-13 2021-08-13 Voice communication system, method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113596057A CN113596057A (en) 2021-11-02
CN113596057B true CN113596057B (en) 2023-05-23

Family

ID=78257766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110931267.2A Active CN113596057B (en) 2021-08-13 2021-08-13 Voice communication system, method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113596057B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177368A (en) * 2019-07-16 2019-08-27 中国联合网络通信集团有限公司 A kind of call-establishing method and system, Video Communication Server
CN110971768A (en) * 2019-12-06 2020-04-07 深圳震有科技股份有限公司 SIP call processing method and system, computer equipment and medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7167551B2 (en) * 2001-12-12 2007-01-23 International Business Machines Corporation Intermediary device based callee identification
CN102447687A (en) * 2010-10-13 2012-05-09 中华电信股份有限公司 Packet interference check and test system
CN104917910A (en) * 2014-03-13 2015-09-16 中国移动通信集团公司 VoIP (Voice over Internet Protocol) call making, certifying and processing method, equipment and system
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177368A (en) * 2019-07-16 2019-08-27 中国联合网络通信集团有限公司 A kind of call-establishing method and system, Video Communication Server
CN110971768A (en) * 2019-12-06 2020-04-07 深圳震有科技股份有限公司 SIP call processing method and system, computer equipment and medium

Also Published As

Publication number Publication date
CN113596057A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
US9419988B2 (en) System and method for non-disruptive mitigation of messaging fraud
US11856132B2 (en) Validating automatic number identification data
US8522344B2 (en) Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
KR100822553B1 (en) Stateful and cross-protocol intrusion detection for voice over ip
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
US11190638B2 (en) Detection and prevention of unwanted calls in a telecommunications system
US10582043B1 (en) Method of identifying instances of international call interconnect bypass telecommunications fraud
FR2909823A1 (en) METHOD AND SYSTEM FOR MANAGING MULTIMEDIA SESSIONS, FOR CONTROLLING THE ESTABLISHMENT OF COMMUNICATION CHANNELS
Song et al. iVisher: Real‐Time Detection of Caller ID Spoofing
CN107872588B (en) Call processing method, related device and system
US20080253376A1 (en) Method and Arrangement for Verifying an Originating Address Transmitted in a Call Request for the Purpose of Establishing a Communications Link in an Ip Communications Network
CN112887105B (en) Conference security monitoring method and device, electronic equipment and storage medium
CN113596057B (en) Voice communication system, method and device, electronic equipment and storage medium
CN108270747B (en) Authentication method and device
Hosseinpour et al. Anomaly‐based DoS detection and prevention in SIP networks by modeling SIP normal traffic
US11856138B2 (en) Parallel path caller verification controller
US20150358336A1 (en) Method for detecting fraud in an ims network
KR101379779B1 (en) Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method
Wang et al. Spoofing against spoofing: Toward caller ID verification in heterogeneous telecommunication systems
WO2019190438A2 (en) Ott bypass fraud detection by using call detail record and voice quality analytics
Berger et al. Internet security meets the IP multimedia subsystem: an overview
Hosseinpour et al. Modeling SIP normal traffic to detect and prevent SIP-VoIP flooding attacks using fuzzy logic
RU2762389C2 (en) Method for recognizing a subscriber making unwanted calls and a method for handling an unwanted call
CN113676604B (en) Voice processing method, related equipment and storage medium
KR102571147B1 (en) Security apparatus and method for smartwork environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant