CN113691680A - BICC call blocking method, system, device, equipment and medium - Google Patents

BICC call blocking method, system, device, equipment and medium Download PDF

Info

Publication number
CN113691680A
CN113691680A CN202110941723.1A CN202110941723A CN113691680A CN 113691680 A CN113691680 A CN 113691680A CN 202110941723 A CN202110941723 A CN 202110941723A CN 113691680 A CN113691680 A CN 113691680A
Authority
CN
China
Prior art keywords
bicc
blocking
message
call
operator gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110941723.1A
Other languages
Chinese (zh)
Other versions
CN113691680B (en
Inventor
马洪彬
袁林
傅强
阿曼太
窦晶
邸学锋
智斌
姜双双
贾立军
米胜山
范晓波
张赫男
刘道林
梁彧
周忠义
蔡琳
杨满智
王杰
田野
金红
陈晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hengan Jiaxin Safety Technology Co ltd
Original Assignee
Beijing Hengan Jiaxin Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hengan Jiaxin Safety Technology Co ltd filed Critical Beijing Hengan Jiaxin Safety Technology Co ltd
Priority to CN202110941723.1A priority Critical patent/CN113691680B/en
Publication of CN113691680A publication Critical patent/CN113691680A/en
Application granted granted Critical
Publication of CN113691680B publication Critical patent/CN113691680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The technical scheme of the embodiment of the invention discloses a BICC call blocking method, a system, a device, equipment and a medium. The method is executed by BICC call blocking equipment in a BICC call blocking system, and comprises the following steps: acquiring a blocking command determined by a BICC acquisition and analysis system according to a BICC call; determining call parameters in the blocking command, and encapsulating the call parameters to generate a BICC blocking message; and generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway to block the BICC call through the operator gateway. The method can carry out reinjection blocking on the BICC conversation under the conditions of not influencing the current network communication service and not changing the current network mobile communication networking mode, thereby carrying out high-efficiency non-perception interception on fraud calls or harassing calls and the like.

Description

BICC call blocking method, system, device, equipment and medium
Technical Field
The embodiment of the invention relates to the technical field of mobile communication, in particular to a BICC call blocking method, a system, a device, equipment and a medium.
Background
Aiming at the conditions of frequent occurrence of events such as fraud calls, harassing calls and the like in the telecommunication network in recent years, various large operators are engaged in carrying out harassing call treatment work, and the real-time detection of communication call signaling in the telecommunication network is required to be capable of timely intercepting and disposing the determined fraud calls and harassing calls.
The conventional Call detection and interception system of Bearer Independent Call Control protocol (BICC) signaling adopts a mode of connecting end offices (MSC) and gateway offices in series, and the access mode can quickly detect Call signaling and intercept fraud calls and harassing calls. However, the access mode changes the networking mode of the mobile communication of the current network, and requires that the detection and interception system must completely process all services of the current network, and the processing capability requirement is high; once a problem occurs in the detection and interception system, the service of the current network is seriously influenced.
Disclosure of Invention
The embodiment of the invention provides a BICC call blocking method, a BICC call blocking system, a BICC call blocking device and a BICC call blocking medium, which can carry out reinjection blocking on BICC calls under the conditions of not influencing the communication service of the current network and not changing the networking mode of the mobile communication of the current network, thereby carrying out high-efficiency and non-perception blocking on harmful calls.
In a first aspect, an embodiment of the present invention provides a BICC call blocking method, which is performed by a BICC call blocking device in a BICC call blocking system, where the BICC call blocking system includes a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link; the method comprises the following steps:
acquiring a blocking command determined by a BICC acquisition and analysis system according to a BICC call;
determining call parameters in the blocking command, encapsulating the call parameters and generating a BICC blocking message;
and generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
In a second aspect, an embodiment of the present invention further provides a BICC call blocking system, where the BICC call blocking system includes: the system comprises a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway office and an end office; wherein:
the BICC acquisition and analysis system is used for acquiring a BICC call between an operator gateway office and an end office in a parallel connection mode, determining a blocking command according to the BICC call, and transmitting the blocking command to the BICC call blocking equipment;
the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link;
the BICC call blocking device is used for generating a BICC blocking message according to the obtained blocking command by adopting the BICC call blocking method of any embodiment of the invention, and sending the BICC blocking message to an operator gateway;
and the operator gateway is used for sending a BICC call release message to an end office associated with the BICC call according to the BICC blocking message so as to block the BICC call.
In a third aspect, an embodiment of the present invention further provides a BICC call blocking apparatus, which is executed by a BICC call blocking device in a BICC call blocking system, where the BICC call blocking system includes a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link; the device includes:
the blocking command acquisition module is used for acquiring a blocking command determined by the BICC acquisition and analysis system according to the BICC call;
a BICC blocking message generating module, configured to determine a call parameter in the blocking command, encapsulate the call parameter, and generate a BICC blocking message;
and the BICC blocking message sending module is used for generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
In a fourth aspect, an embodiment of the present invention further provides a BICC call blocking apparatus, where the apparatus includes:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors may implement a BICC call blocking method according to any embodiment of the present invention.
In a fifth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a BICC call blocking method according to any embodiment of the present invention.
According to the technical scheme of the embodiment of the invention, the blocking command determined by the BICC acquisition and analysis system according to the BICC call is obtained; determining call parameters in the blocking command, and encapsulating the call parameters to generate a BICC blocking message; generating link messages according to the BICC blocking messages, determining matched communication links according to the link messages, and sending the BICC blocking messages to an operator gateway to block BICC calls through the operator gateway, so that the problem of reinjection blocking of harmful calls is solved, and the reinjection blocking of BICC calls is realized under the condition that the communication service of the existing network is not influenced and the networking mode of mobile communication of the existing network is not changed, so that the effect of efficiently and imperceptibly blocking fraud calls or harassing calls and the like can be achieved.
Drawings
Fig. 1a is a flowchart of a BICC call blocking method according to an embodiment of the present invention;
fig. 1b is a schematic structural diagram of a BICC call blocking system according to an embodiment of the present invention;
fig. 1c is a flowchart of a BICC call blocking device sending a BICC blocking message according to an embodiment of the present invention;
fig. 2a is a flowchart of a BICC call blocking method according to a second embodiment of the present invention;
fig. 2b is a flowchart of BICC intercepting function of a BICC call blocking device according to a second embodiment of the present invention;
fig. 2c is a flowchart of routing performed by a BICC call blocking device according to the second embodiment of the present invention;
fig. 3a is a schematic structural diagram of a BICC call blocking system according to a third embodiment of the present invention;
fig. 3b is a schematic diagram of interaction between an operator and an end office associated with a BICC call according to a third embodiment of the present invention;
fig. 3c is a schematic diagram of an interaction between another operator and an end office associated with a BICC call according to a third embodiment of the present invention;
fig. 3d is a schematic diagram of an interaction between another operator and an end office associated with a BICC call according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a BICC call blocking apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a BICC call blocking apparatus according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1a is a flowchart of a BICC call blocking method according to an embodiment of the present invention, where the embodiment is applicable to a case where a harmful phone is quickly blocked in a BICC call, and the method may be executed by a BICC call blocking apparatus, the apparatus may be implemented by software and/or hardware, and the apparatus may be integrated in a BICC call blocking device.
Specifically, the method can be executed by a BICC call blocking device in a BICC call blocking system, wherein the BICC call blocking system comprises a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway office and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link.
As shown in fig. 1a, the method specifically includes:
and step 110, obtaining a blocking command determined by the BICC acquisition and analysis system according to the BICC call.
The BICC collection and analysis system can collect and analyze the BICC call to determine the harmful call. For example, the BICC collection and analysis system may analyze the service number in the BICC call according to a blacklist or a preset analysis policy, and determine whether the BICC call is a harmful call such as a fraud call or a harassing call. When the BICC collection and analysis system determines that the BICC call is a call of a harmful phone, a BICC blocking command may be generated and transmitted to the BICC call blocking apparatus.
In the embodiment of the invention, the BICC acquisition and analysis system can acquire the BICC call between the operator gateway office and the end office in a parallel access mode and analyze the BICC call. The parallel access mode does not change the networking mode of the mobile communication network of the current network, so that the service of the current network is not influenced. When the BICC acquisition and analysis system or the BICC call blocking equipment fails, the normal communication of the current network service is not influenced. And for the BICC acquisition and analysis system and the BICC call blocking equipment, the BICC call blocking process of the embodiment of the invention only needs to be processed, and the existing network service does not need to be processed. The technical scheme of the embodiment of the invention has low requirement on the capability of the BICC acquisition and analysis system and the BICC call blocking equipment.
Specifically, fig. 1b is a schematic structural diagram of a BICC call blocking system according to an embodiment of the present invention. As shown in fig. 1b, the BICC call blocking device may be interconnected with the operator gateway office equipment via a communication link, such as an IP link. The BICC call blocking device can adopt a user-defined interface to be interconnected with the BICC acquisition and analysis system and receive a BICC blocking command issued by the BICC acquisition and analysis system. The BICC collection and analysis system collects and analyzes BICC signaling links (BICC calls) between an operator gateway office and all end offices.
Step 120, determining the call parameter in the blocking command, and encapsulating the call parameter to generate a BICC blocking message.
Fig. 1c is a flowchart of sending a BICC barring message by a BICC call barring apparatus according to an embodiment of the present invention. As shown in fig. 1c, the BICC call blocking apparatus may determine whether the call parameter in the BICC blocking command is legal. For example, the call parameter may be determined by a parameter format or a parameter type. If the call parameters are illegal, the BICC call blocking device may send a parameter illegal alarm. If the parameters are legal, the BICC call blocking device may generate the BICC blocking message by encapsulation according to key call parameters in the blocking command, such as parameters of a destination point Code, a source point Code, a Circuit Identification Code (CIC), a Signaling Link Selection Code (SLS), and the like. Specifically, the package may be performed according to a preset format of the BICC blocking message.
In the embodiment of the present invention, the BICC blocking message may be a variety of different messages. In an optional implementation manner of the embodiment of the present invention, determining a call parameter in a blocking command, and encapsulating the call parameter to generate a BICC blocking message includes: determining call parameters in the blocking command, encapsulating the call parameters, and generating one or more BICC blocking messages in a BICC release request message (REL), a BICC release completion message (RLC) and a BICC recovery request message (RSC).
Among them, REL, RLC and RSC may be messages generated by the BICC call blocking device simulating the calling end office in a BICC call. REL, RLC and RSC may all be used as BICC blocking messages. The REL may be a disconnect message after the BICC call blocking device emulates the calling end office hang-up. The RLC may be a link signal release message after the BICC call blocking device simulates the disconnection of the calling end office. The RSC may be a link restoration message (restoring the link to idle) after the BICC call blocking device emulates a calling end office link failure.
In the technical solution of the embodiment of the present invention, one or more items of REL, RLC, and RSC may be generated to perform BICC call blocking. The BICC call blocking in various forms can be carried out through the REL, the RLC and the RSC, the condition that an operator gateway processes certain blocking information as invalid information but does not effectively block the BICC call is avoided, and the success rate of the BICC call blocking can be improved.
Step 130, generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to the operator gateway to block the BICC call through the operator gateway.
As shown in fig. 1c, the BICC call blocking device may encapsulate the link message according to the call parameter carried in the BICC blocking message. For example, the Adaptation layer protocol (MTP3 User Adaptation, M3UA) header of the third level User may be encapsulated according to routing related parameters such as destination point code, source point code, and CIC. The BICC call blocking device can perform routing selection and send the BICC blocking message to an operator gateway. For example, the BICC call blocking device may determine the corresponding route according to the destination point code. The BICC call blocking device may issue a link alarm if a route is not available. When the route is unavailable, the BICC blocking message fails to be sent, and a new route can be determined or established through the link alarm prompt. If the route is available, the BICC call blocking device can select an available link and send a BICC blocking message to the operator gateway. For example, the BICC call blocking device may select a suitable Stream Control Transmission Protocol (SCTP) link to form a standard BICC Protocol stack message, and send the standard BICC Protocol stack message to the IP link and then to the operator gateway. The operator gateway can process the BICC blocking message to block the BICC call.
In an optional implementation manner of the embodiment of the present invention, sending the BICC blocking message to an operator gateway includes: taking the BICC release request message, the BICC release completion message or the BICC restoration request message as a first BICC blocking message, and sending the first BICC blocking message to an operator gateway; after sending the BICC blocking message to the operator gateway, the method further includes: acquiring a BICC call blocking result fed back by an operator gateway aiming at a current BICC blocking message; if the BICC call blocking result is that the blocking fails, sending a second BICC blocking message to an operator gateway; wherein the second BICC blocking message is a different BICC blocking message than the first BICC blocking message.
Wherein, REL, RLC and RSC can be used as BICC blocking message to be sent to the operator gateway. The operator gateway can start different task processing flows according to different BICC blocking messages to carry out BICC call blocking. In practical applications, there may be cases where BICC call blocking fails for a variety of reasons. For example, the carrier gateway may misunderstand that the BICC blocking message may be illegal spam due to the cleaning of its own information, so that the cleaning is performed without BICC call blocking. Alternatively, the operator gateway may fail to task process the BICC blocking message, resulting in failure to block the BICC call.
In order to reduce the probability of BICC call blocking failure, the embodiment of the invention provides a plurality of optional BICC blocking messages, and when the blocking failure is carried out according to the first BICC blocking message, a second BICC blocking message can be sent to an operator gateway; when the blocking according to the second BICC blocking message fails, a third BICC blocking message may be sent to the operator gateway, and so on until the BICC call blocking succeeds. Wherein the second BICC blocking message is a different BICC blocking message from the first BICC blocking message; the third BICC blocking message is a different BICC blocking message than the second BICC blocking message and the first BICC blocking message. The blocking message is a BICC signaling message, the operator gateway office processes the signaling in millisecond level, and the BICC call can be blocked before the called user rings, so that the effect that the user cannot sense is achieved.
For example, the first BICC blocking message may be a BICC release request message, the second BICC blocking message may be a BICC release completion message, and the third BICC blocking message may be a BICC recovery request message. Alternatively, the first BICC blocking message, the second BICC blocking message, and the third BICC blocking message may be exchanged with each other, which is not specifically limited in this embodiment of the present invention.
According to the technical scheme of the embodiment, the blocking command determined by the BICC acquisition and analysis system according to the BICC call is obtained; determining call parameters in the blocking command, and encapsulating the call parameters to generate a BICC blocking message; generating link messages according to the BICC blocking messages, determining matched communication links according to the link messages, and sending the BICC blocking messages to an operator gateway to block BICC calls through the operator gateway, so that the blocking problem of harmful calls is solved, and the reinjection blocking of BICC calls is realized under the condition that the communication service of the existing network is not influenced and the networking mode of mobile communication of the existing network is not changed, thereby achieving the effect of carrying out efficient and non-perception blocking on fraud calls or harassing calls and the like.
Example two
Fig. 2a is a flowchart of a BICC call blocking method according to a second embodiment of the present invention. The present embodiment is a further refinement of the above technical solutions, and the technical solutions in the present embodiment may be combined with various alternatives in one or more of the above embodiments.
Specifically, in an optional implementation manner of the embodiment of the present invention, generating a link message according to the BICC blocking message, and determining a matched communication link according to the link message includes: according to call parameters in the BICC blocking message, encapsulating a link head message and generating a link message; determining a traffic pattern of the communication route when it is determined from the link message that there is an available communication route; if the service mode is the main standby mode, determining the main communication link as a matched communication link; and if the traffic mode is the load sharing mode, determining the current link selected by polling as the matched communication link.
As shown in fig. 2a, the BICC call blocking method includes:
and step 210, obtaining a blocking command determined by the BICC acquisition and analysis system according to the BICC call.
Step 220, determining the call parameters in the blocking command, encapsulating the call parameters, and generating one or more BICC blocking messages in a BICC release request message, a BICC release completion message and a BICC recovery request message.
And step 230, monitoring the flow statistic value of the BICC blocking message in real time within a preset time period. If the flow statistic exceeds a preset flow threshold value matched with a preset time period, executing step 280; otherwise, step 240 is performed.
Wherein, the BICC call blocking device can be provided with a BICC interception function. The BICC interception function may intercept BICC call blocking. Fig. 2b is a flowchart of BICC intercepting function of a BICC call blocking device according to a second embodiment of the present invention. As shown in fig. 2b, when the BICC call blocking apparatus is activated, the BICC interception function switch may be turned off by default. The manager or the maintainer can start the BICC interception function by manual means. Or the BICC interception function can be triggered to be started through a condition. The manager or maintainer can configure the flow detection strategy in advance, and set a reasonable flow threshold according to the actual situation. The preset flow threshold may be different in different time periods. The specific preset flow threshold setting strategy may be determined by analyzing the frequency of the harmful telephone appearing in different time periods in practice, which is not specifically limited in the embodiment of the present invention.
For example, as shown in fig. 2b, if the flow statistics exceeds the corresponding preset flow threshold within a preset time period, it may be considered that the sending amount of the BICC blocking message is too large, and there may be repeated sending of the message, and the BICC blocking message may be intercepted. If the flow statistic does not exceed the corresponding preset flow threshold within the preset time, the sending amount of the BICC blocking message can be considered to be normal, and the BICC blocking message can be normally processed, such as subsequent link selection. The technical scheme of the embodiment of the invention can effectively intercept the BICC blocking message, and can avoid the BICC call blocking error condition caused by the abnormal increase of the BICC blocking message due to the fault of the BICC call blocking equipment or the abnormal issuing of a large number of blocking commands by the BICC acquisition and analysis system. By the abnormal command detection mode, the BICC call blocking equipment can be ensured not to influence the services of harmless users of the current network.
Step 240, according to the call parameter in the BICC blocking message, encapsulating the link header message and generating the link message.
Fig. 2c is a flowchart of routing performed by a BICC call blocking device according to the second embodiment of the present invention. As shown in fig. 2c, the BICC call blocking apparatus may extract call parameters, such as signaling point codes, CIC and other key routing information, in the BICC blocking message. The BICC call blocking device may encapsulate the M3UA message header (link header message) according to the critical routing information. The message header of M3UA may include parameters such as destination point code, source point code, CIC, SLS, etc. The BICC call blocking device may add an M3UA message header according to a preset format of the link message, and generate the link message.
Step 250, when determining that the available communication route exists according to the link message, determining the service mode of the communication route; if the service mode is the main standby mode, determining the main communication link as a matched communication link; and if the traffic mode is the load sharing mode, determining the current link selected by polling as the matched communication link.
As shown in fig. 2c, the BICC call blocking device may determine whether a route exists according to the destination point code, and if the route does not exist, may generate a destination route nonexistence alarm; if a route exists, the BICC call blocking device may determine whether the destination route is available. If not, the BICC call blocking device can generate a route unavailable alarm; if the route is available, the BICC call blocking device can judge the service mode of the link. If the mode is the main/standby mode, the BICC call blocking device can select a main link and send a BICC blocking message to the selected IP link so as to send the BICC blocking message to an operator gateway; if the current alternate selection link is the load sharing mode, the BICC call blocking device can select the current alternate selection link and send the BICC blocking message to the selected IP link so as to send the BICC blocking message to the operator gateway.
The embodiment of the invention can determine the matched communication link according to the service mode of the communication route, and meet the normal communication requirement of the equipment. When the route does not exist or is unavailable, the establishment of the route and the link can be prompted through alarm information. The specific way of establishing the route and the link is not specifically limited in the embodiments of the present invention.
Step 260, using the BICC release request message, the BICC release completion message or the BICC restoration request message as the first BICC blocking message, and sending the first BICC blocking message to the operator gateway.
Step 270, obtaining a BICC call blocking result fed back by the operator gateway aiming at the current BICC blocking message; and if the BICC call blocking result is that the blocking fails, sending a second BICC blocking message to an operator gateway to block the BICC call through the operator gateway. And (6) ending.
Wherein the second BICC blocking message is a different BICC blocking message than the first BICC blocking message.
And step 280, intercepting the BICC blocking message.
According to the technical scheme of the embodiment, the blocking command determined by the BICC acquisition and analysis system according to the BICC call is obtained; determining call parameters in the blocking command, encapsulating the call parameters, and generating one or more BICC blocking messages in a BICC release request message, a BICC release completion message and a BICC recovery request message; monitoring the flow statistic value of the BICC blocking message in real time within a preset time period; if the flow statistic exceeds a preset flow threshold value matched with a preset time period, intercepting the BICC blocking message; otherwise, according to call parameters in the BICC blocking message, encapsulating the link head message and generating a link message; determining a traffic pattern of the communication route when it is determined from the link message that there is an available communication route; if the service mode is the main standby mode, determining the main communication link as a matched communication link; if the service mode is a load sharing mode, determining the current link selected by polling as a matched communication link; taking the BICC release request message, the BICC release completion message or the BICC restoration request message as a first BICC blocking message, and sending the first BICC blocking message to an operator gateway; acquiring a BICC call blocking result fed back by an operator gateway aiming at a current BICC blocking message; if the BICC call blocking result is that the blocking fails, the second BICC blocking message is sent to the operator gateway to block the BICC call through the operator gateway, so that the blocking problem of harmful calls is solved, the BICC call is reinjected and blocked under the condition that the communication service of the existing network is not influenced and the networking mode of mobile communication of the existing network is not changed, and therefore the effect of efficiently and imperceptibly blocking fraud calls or harassing calls and the like can be achieved.
EXAMPLE III
Fig. 3a is a schematic structural diagram of a BICC call blocking system according to a third embodiment of the present invention. As shown in fig. 3a, the BICC call blocking system 300 includes: BICC collection and analysis system 310, BICC call blocking device 320, operator gateway 330 and end office 340; wherein:
the BICC collecting and analyzing system 310 is configured to collect a BICC call between the operator gateway 330 and the end office 340 in a parallel manner, determine a blocking command according to the BICC call, and transmit the blocking command to the BICC call blocking device 320.
BICC call blocking device 320 is interconnected with BICC collection and analysis system 310 via an interface and with operator gateway 330 via a communication link. The BICC call blocking device 320 may be interconnected with the operator gateway 330 through an IP network, and establish an IP signaling connection with the operator gateway 330 using docking data negotiated with the operator, thereby maintaining an IP connection state. Specifically, the BICC call blocking device 320 may access the operator network through the information such as the IP address, the port number, the signaling point code, and the like allocated by the operator, and communicate with the operator gateway 330 to establish an IP link.
The BICC call blocking device 320 is configured to generate a BICC blocking message according to the obtained blocking command by using the BICC call blocking method provided in any embodiment of the present invention, and send the BICC blocking message to the operator gateway 330.
The operator gateway 330 is configured to send a BICC call release message to the end office 340 associated with the BICC call according to the BICC blocking message, so as to block the BICC call. The operator gateway 330 can forward the BICC release request to the BICC call associated end office 340 according to the received blocking command, so that the blocking of the harmful phone call can reach millisecond level, the blocking operation is completed before the ringing of the called phone call, the imperceptibility of the user is reached, and the effective blocking of the harmful phone call is realized.
In an optional implementation manner of the embodiment of the present invention, the operator gateway is specifically configured to:
according to the BICC release request message, forwarding the BICC release request message to a called end office associated with the BICC call, and sending a BICC release completion message to a calling end office associated with the BICC call; receiving a BICC release completion message after the called end office completes the release; receiving a BICC release request message fed back after the calling end office receives the BICC release completion message, and sending the BICC release completion message to the calling end office according to the BICC release request message; or,
according to the BICC release completion message, sending a BICC release request message to the called end office and sending a BICC release request message to the calling end office; receiving a BICC release completion message after the called end office completes the release; receiving BICC release completion information fed back by the calling end office after receiving the BICC release request information; or,
according to the BICC recovery request message, sending a BICC release request message to the called end office, and sending a BICC release completion message to the calling end office; receiving a BICC release completion message after the called end office completes the release; and receiving a BICC release request message fed back after the calling end office receives the BICC release completion message, and sending the BICC release completion message to the calling end office according to the BICC release request message.
Fig. 3b is a schematic diagram of interaction between an operator and an end office associated with a BICC call according to a third embodiment of the present invention. As shown in fig. 3b, the BICC acquisition and analysis system captures an Initial Address Message (IAM) Message sent by an MSC-a office (end office a), performs blacklist or blocking policy analysis on a calling number, and sends a blocking command to the BICC call blocking device if it is found that a call of the calling number needs to be blocked. The BICC call blocking device receives the blocking command, encapsulates the BICC REL request message according to key parameters such as Destination Point Code (dpc), origin Point Code (opc), CIC and the like, and simulates a calling end office to send to an operator gateway office. The operator gateway receives the REL request of the calling end office MSC-A, forwards the BICC REL request message to the called end office MSC-B (end office B), and sends a release completion (RLC) to the MSC-A. MSC-B receives BICC REL request, releases this BICC call, and sends BICC release completion (RLC) to operator gateway to realize call blocking of calling user. MSC-A receives BICC RLC, then sends BICC release Request (REL) to operator gateway, and if operator gateway finds that the call has been released, then sends BICC release completion confirmation (RLC) to MSC-A, MSC-A releases resources; so far, the whole signaling flow of the call blocking of the BICC based on the REL is completely finished.
Fig. 3c is a schematic diagram of an interaction between another operator and an end office associated with a BICC call according to a third embodiment of the present invention. As shown in fig. 3c, the BICC acquisition and analysis system captures the IAM message sent by the MSC-a office, analyzes the blacklist or the policy of the calling number, and sends a blocking command to the BICC call blocking device if it is found that the call of the calling number needs to be blocked. The BICC call blocking device receives the blocking command, encapsulates the BICC RLC request message according to key parameters such as a destination point code, a source point code and a CIC, and the simulation calling office sends the BICC RLC request message to an operator gateway office. The operator gateway receives the releasing completion Request (RLC) of the calling office MSC-A, forwards the BICC releasing request message (REL) to the called office MSC-B, and sends the REL to the calling office MSC-A. And when the called office MSC-B receives the BICC REL, the BICC call is released, and the BICC RLC is sent to the operator gateway office to realize the call blocking of the calling subscriber. When the calling office MSC-A receives the BICC REL, sending a BICC release completion confirmation (RLC) to the operator gateway office, and the MSC-A releases resources; so far, the whole signaling flow of BICC blocking based on RLC is completely completed.
Fig. 3d is a schematic diagram of an interaction between another operator and an end office associated with a BICC call according to a third embodiment of the present invention. As shown in fig. 3d, the BICC acquisition and analysis system captures the IAM message sent by the MSC-a office, analyzes the blacklist or the policy of the calling number, and sends a blocking command to the BICC call blocking device if it is found that the call of the calling number needs to be blocked. The BICC call blocking equipment receives the blocking command, encapsulates the BICC RSC request message according to key parameters such as a destination point code, a source point code, a CIC and the like, and simulates a calling office to send the BICC RSC request message to an operator gateway office. The operator gateway receives the RSC request of the calling office MSC-A, triggers a BICC release request message (REL) to the called office MSC-B, and sends a recovery completion (RLC) to the calling office MSC-A. And when the called office MSC-B receives the BICC REL, the BICC call is released, and the BICC release completion (RLC) is sent to the gateway office side, so that the call blocking of the calling subscriber is realized. When the calling office MSC-A receives the completion of the BICC release, the calling office sends BICC REL to the gateway office, and when the gateway office finds that the call is released, the gateway office sends a BICC release completion confirmation (RLC) to the MSC-A, and the MSC-A releases resources; and the whole BICC blocking signaling flow based on RSC is completely finished.
According to the technical scheme of the embodiment of the invention, the BICC blocking information of the REL, the RLC and the RSC is processed by the operator gateway to carry out different signaling flows, so that the BICC call can be effectively blocked, the probability of success of the BICC call blocking is improved, and the condition that the BICC call blocking fails when the operator gateway processes certain BICC blocking information as garbage information can be avoided.
In the technical scheme of the embodiment, a BICC call blocking system comprising a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway office and an end office is arranged; through the mutual cooperation of all the devices in the BICC call blocking system, the problem of effectively blocking harmful calls is solved, and the reinjection blocking of the BICC calls is realized under the conditions that the existing network communication service is not influenced and the existing network mobile communication networking mode is not changed, so that the effects of efficiently and imperceptibly blocking fraud calls or harassing calls and the like can be realized.
Example four
Fig. 4 is a schematic structural diagram of a BICC call blocking apparatus according to a fourth embodiment of the present invention. With reference to fig. 4, the apparatus is executed by a BICC call blocking device in a BICC call blocking system, wherein the BICC call blocking system includes a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link; the device includes: a blocking command acquisition module 410, a BICC blocking message generation module 420 and a BICC blocking message transmission module 430. Wherein:
a blocking command obtaining module 410, configured to obtain a blocking command determined by the BICC acquisition and analysis system according to the BICC call;
a BICC blocking message generating module 420, configured to determine a call parameter in the blocking command, and encapsulate the call parameter to generate a BICC blocking message;
and a BICC blocking message sending module 430, configured to generate a link message according to the BICC blocking message, determine a matched communication link according to the link message, and send the BICC blocking message to the operator gateway, so as to block the BICC call through the operator gateway.
Optionally, the BICC blocking message generating module 420 includes:
and the BICC blocking message generating unit is used for determining the call parameters in the blocking command, packaging the call parameters and generating one or more BICC blocking messages in a BICC release request message, a BICC release completion message and a BICC recovery request message.
Optionally, the apparatus further includes:
the traffic statistic monitoring module is used for monitoring the traffic statistic of the BICC blocking message in real time within a preset time period before generating a link message according to the BICC blocking message, determining a matched communication link according to the link message and sending the BICC blocking message to an operator gateway;
and the BICC blocking message intercepting module is used for intercepting the BICC blocking message if the flow statistic exceeds a preset flow threshold value matched with a preset time period.
Optionally, the BICC blocking message sending module 430 includes:
a first BICC blocking message sending unit, configured to use a BICC release request message, a BICC release completion message, or a BICC restoration request message as a first BICC blocking message, and send the first BICC blocking message to an operator gateway;
optionally, the apparatus further includes:
a BICC call blocking result obtaining module, configured to obtain a BICC call blocking result fed back by an operator gateway for a current BICC blocking message after sending the BICC blocking message to the operator gateway;
a second BICC blocking message sending module, configured to send a second BICC blocking message to an operator gateway if the BICC call blocking result is a blocking failure; wherein the second BICC blocking message is a different BICC blocking message than the first BICC blocking message.
Optionally, the BICC blocking message sending module 430 includes:
a link message generating unit, configured to encapsulate the link header message according to the call parameter in the BICC blocking message, and generate a link message;
a traffic pattern determination unit for determining a traffic pattern of the communication route when it is determined from the link message that there is an available communication route;
a first communication link determining unit, configured to determine, if the service mode is the active/standby mode, the active communication link as a matched communication link;
and the second communication link determining unit is used for determining the current link selected by polling as the matched communication link if the service mode is the load sharing mode.
The BICC call blocking device provided by the embodiment of the invention can execute the BICC call blocking method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a BICC call blocking apparatus according to a fifth embodiment of the present invention, and as shown in fig. 5, the apparatus includes:
one or more processors 510, one processor 510 being illustrated in FIG. 5;
a memory 520;
the apparatus may further include: an input device 530 and an output device 540.
The processor 510, the memory 520, the input device 530 and the output device 540 of the apparatus may be connected by a bus or other means, and fig. 5 illustrates the connection by a bus as an example.
The memory 520, which is a non-transitory computer-readable storage medium, may be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to a BICC call blocking method in an embodiment of the present invention (for example, the blocking command acquiring module 410, the BICC blocking message generating module 420, and the BICC blocking message sending module 430 shown in fig. 4). The processor 510 executes various functional applications and data processing of the computer device by running software programs, instructions and modules stored in the memory 520, namely, implementing a BICC call blocking method of the above method embodiment, that is:
acquiring a blocking command determined by a BICC acquisition and analysis system according to a BICC call;
determining call parameters in the blocking command, encapsulating the call parameters and generating a BICC blocking message;
and generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
The memory 520 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 520 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 520 may optionally include memory located remotely from processor 510, which may be connected to a terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the computer apparatus. The output device 540 may include a display device such as a display screen.
EXAMPLE six
A sixth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a BICC call blocking method according to an embodiment of the present invention:
acquiring a blocking command determined by a BICC acquisition and analysis system according to a BICC call;
determining call parameters in the blocking command, encapsulating the call parameters and generating a BICC blocking message;
and generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A BICC call blocking method is characterized in that the method is executed by BICC call blocking equipment in a BICC call blocking system, wherein the BICC call blocking system comprises a BICC acquisition and analysis system, BICC call blocking equipment, an operator gateway and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link; the method comprises the following steps:
acquiring a blocking command determined by a BICC acquisition and analysis system according to a BICC call;
determining call parameters in the blocking command, encapsulating the call parameters and generating a BICC blocking message;
and generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
2. The method of claim 1, wherein determining the call parameter in the blocking command and encapsulating the call parameter to generate a BICC blocking message comprises:
and determining call parameters in the blocking command, encapsulating the call parameters, and generating one or more BICC blocking messages in a BICC release request message, a BICC release completion message and a BICC recovery request message.
3. The method of claim 1, wherein before generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway, further comprising:
monitoring the flow statistic value of the BICC blocking message in real time within a preset time period;
and if the flow statistic exceeds a preset flow threshold value matched with the preset time period, intercepting the BICC blocking message.
4. The method of claim 2, wherein sending the BICC blocking message to an operator gateway comprises:
taking a BICC release request message, a BICC release completion message or a BICC restoration request message as a first BICC blocking message, and sending the first BICC blocking message to an operator gateway;
after sending the BICC blocking message to an operator gateway, the method further includes:
acquiring a BICC call blocking result fed back by the operator gateway aiming at the current BICC blocking message;
if the BICC call blocking result is blocking failure, sending a second BICC blocking message to an operator gateway; wherein the second BICC blocking message is a BICC blocking message different from the first BICC blocking message.
5. The method of claim 1, wherein generating a link message based on the BICC blocking message and determining a matching communication link based on the link message comprises:
according to the call parameters in the BICC blocking message, encapsulating a link head message and generating a link message;
determining a traffic pattern of a communication route when it is determined from the link message that there is an available communication route;
if the service mode is the main standby mode, determining the main communication link as a matched communication link;
and if the service mode is the load sharing mode, determining the current link selected by polling as the matched communication link.
6. A BICC call blocking system, wherein the BICC call blocking system comprises: the system comprises a BICC acquisition and analysis system, a BICC call blocking device, an operator gateway office and an end office; wherein:
the BICC acquisition and analysis system is used for acquiring a BICC call between an operator gateway office and an end office in a parallel connection mode, determining a blocking command according to the BICC call, and transmitting the blocking command to the BICC call blocking equipment;
the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link;
the BICC call blocking device is used for generating a BICC blocking message according to the obtained blocking command by adopting the BICC call blocking method of any one of claims 1 to 5, and sending the BICC blocking message to an operator gateway;
and the operator gateway is used for sending a BICC call release message to an end office associated with the BICC call according to the BICC blocking message so as to block the BICC call.
7. The BICC call barring system according to claim 6, wherein said operator gateway is specifically configured to:
according to the BICC release request message, forwarding the BICC release request message to a called end office associated with the BICC call, and sending a BICC release completion message to a calling end office associated with the BICC call; receiving a BICC release completion message after the called end office completes the release; receiving a BICC release request message fed back by the calling end office after receiving the BICC release completion message, and sending the BICC release completion message to the calling end office according to the BICC release request message; or,
according to the BICC release completion message, sending a BICC release request message to the called end office and sending a BICC release request message to the calling end office; receiving a BICC release completion message after the called end office completes the release; receiving BICC release completion information fed back by the calling end office after receiving the BICC release request information; or,
according to the BICC recovery request message, sending a BICC release request message to the called end office, and sending a BICC release completion message to the calling end office; receiving a BICC release completion message after the called end office completes the release; and receiving a BICC release request message fed back after the calling end office receives the BICC release completion message, and sending the BICC release completion message to the calling end office according to the BICC release request message.
8. A BICC call blocking device is characterized in that the device is executed by BICC call blocking equipment in a BICC call blocking system, wherein the BICC call blocking system comprises a BICC acquisition and analysis system, BICC call blocking equipment, an operator gateway and an end office; the BICC acquisition and analysis system acquires the BICC call between the operator gateway office and the end office in a parallel mode; the BICC call blocking equipment is interconnected with the BICC acquisition and analysis system through an interface and is interconnected with an operator gateway office through a communication link; the device comprises:
the blocking command acquisition module is used for acquiring a blocking command determined by the BICC acquisition and analysis system according to the BICC call;
a BICC blocking message generating module, configured to determine a call parameter in the blocking command, encapsulate the call parameter, and generate a BICC blocking message;
and the BICC blocking message sending module is used for generating a link message according to the BICC blocking message, determining a matched communication link according to the link message, and sending the BICC blocking message to an operator gateway so as to block the BICC call through the operator gateway.
9. A BICC call blocking apparatus, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-5.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 5.
CN202110941723.1A 2021-08-17 2021-08-17 BICC call blocking method, system, device, equipment and medium Active CN113691680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110941723.1A CN113691680B (en) 2021-08-17 2021-08-17 BICC call blocking method, system, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110941723.1A CN113691680B (en) 2021-08-17 2021-08-17 BICC call blocking method, system, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN113691680A true CN113691680A (en) 2021-11-23
CN113691680B CN113691680B (en) 2024-01-30

Family

ID=78580170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110941723.1A Active CN113691680B (en) 2021-08-17 2021-08-17 BICC call blocking method, system, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN113691680B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030214963A1 (en) * 2002-05-20 2003-11-20 Moody Brian Mark System and method for correlation and real-time display of mapped PSTN trunk identifiers and gateway control protocol endpoints
CN1885991A (en) * 2005-06-20 2006-12-27 华为技术有限公司 Call handling method
WO2008083555A1 (en) * 2007-01-10 2008-07-17 Huawei Technologies Co., Ltd. Method, device and system for the initiator and the receiver dismantling the call
CN101296387A (en) * 2008-06-02 2008-10-29 中国网络通信集团公司 Method and system for implementing speech called service and calling service
CN102377881A (en) * 2010-08-17 2012-03-14 上海禹为通信技术有限公司 Method and system for traffic control of communication network
CN103179568A (en) * 2011-12-20 2013-06-26 中兴通讯股份有限公司 Method and device for limiting false calling fraud phone call
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN106850552A (en) * 2016-12-21 2017-06-13 恒安嘉新(北京)科技有限公司 A kind of method that harmful Call Intercept is realized based on signaling re-injection
CN108632773A (en) * 2017-03-22 2018-10-09 中国移动通信集团广东有限公司 A kind of call intercepting method, intelligent net system and Call Intercept system
CN109428976A (en) * 2017-08-31 2019-03-05 中国移动通信集团公司 A kind of method, gateway exchange and platform intercepting malicious call
CN113037699A (en) * 2019-12-25 2021-06-25 中国电信股份有限公司 Communication interception method, apparatus and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030214963A1 (en) * 2002-05-20 2003-11-20 Moody Brian Mark System and method for correlation and real-time display of mapped PSTN trunk identifiers and gateway control protocol endpoints
CN1885991A (en) * 2005-06-20 2006-12-27 华为技术有限公司 Call handling method
WO2008083555A1 (en) * 2007-01-10 2008-07-17 Huawei Technologies Co., Ltd. Method, device and system for the initiator and the receiver dismantling the call
CN101296387A (en) * 2008-06-02 2008-10-29 中国网络通信集团公司 Method and system for implementing speech called service and calling service
CN102377881A (en) * 2010-08-17 2012-03-14 上海禹为通信技术有限公司 Method and system for traffic control of communication network
CN103179568A (en) * 2011-12-20 2013-06-26 中兴通讯股份有限公司 Method and device for limiting false calling fraud phone call
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN106850552A (en) * 2016-12-21 2017-06-13 恒安嘉新(北京)科技有限公司 A kind of method that harmful Call Intercept is realized based on signaling re-injection
CN108632773A (en) * 2017-03-22 2018-10-09 中国移动通信集团广东有限公司 A kind of call intercepting method, intelligent net system and Call Intercept system
CN109428976A (en) * 2017-08-31 2019-03-05 中国移动通信集团公司 A kind of method, gateway exchange and platform intercepting malicious call
CN113037699A (en) * 2019-12-25 2021-06-25 中国电信股份有限公司 Communication interception method, apparatus and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YE OUYANG: ""A study of throughput for Nb, Mc and Nc interface in UMTS core network"", 《2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE》 *
包琅允: ""通信信息诈骗防范解决方案探讨"", 《电信技术》, pages 1 - 4 *

Also Published As

Publication number Publication date
CN113691680B (en) 2024-01-30

Similar Documents

Publication Publication Date Title
CN104243727A (en) System and method for performing big data analysis confirmation and interception on phone scams
CN108712329A (en) A kind of gateway and log recording retrieval device based on Elasticsearch
CN102209326A (en) Malicious behavior detection method and system based on smartphone radio interface layer
CN112543198B (en) Honeypot monitoring method, honeypot core network element, equipment and storage medium
CN102438243A (en) Method for analyzing telephone frequency and identifying harassing calls
CN113691680B (en) BICC call blocking method, system, device, equipment and medium
CN106792712B (en) Automatic monitoring framework system for SIP (Session initiation protocol) of VoLTE (Voice over Long term evolution) equipment
CN102858028A (en) Method and terminal for releasing controlled party in multiparty call
KR100965482B1 (en) System for blocking ars and one ring spam telephone and method therefor
CN113543138B (en) Abnormal telephone interception system, method and storage medium
CN101188641A (en) A communication method and system based on call leakage detection
CN107547444B (en) Traffic statistical method and switching equipment
KR100546510B1 (en) Apparatus and Method for Monitoring Important System Messages in CDMA System
CN109639911A (en) A kind of method, apparatus, equipment and storage medium triggering value-added service
CN111263011A (en) Anti-fraud method based on ISUP signaling collection
KR100372343B1 (en) Discard Message Management Method In No.7 Signaling Network
CN114666752B (en) Short message management and control system and method of IMS domain
KR100496263B1 (en) A billing method for data service of mobile telecommunication network, and the system therefor
CN115695862A (en) Signaling auditing method and system on video exchange boundary
CN115277221B (en) Transmission method and isolation equipment based on transparent data landing and protocol isolation
CN103888922B (en) A kind of method and device of dismantling call and management of end-user account safety
Sherr et al. Can they hear me now? A security analysis of law enforcement wiretaps
CN106599168B (en) Method and device for analyzing source of network data
KR20030046212A (en) Voice Over Internet Protocol gateway, method of processing system error for the same
KR100633289B1 (en) Method of TRANSMITTING SMS MESSAGE THROUGH WIRELESS DATA COMMUNICATION NETWORK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant