CN1529486A - Method for avoiding malicious calling - Google Patents

Method for avoiding malicious calling Download PDF

Info

Publication number
CN1529486A
CN1529486A CNA200310101969XA CN200310101969A CN1529486A CN 1529486 A CN1529486 A CN 1529486A CN A200310101969X A CNA200310101969X A CN A200310101969XA CN 200310101969 A CN200310101969 A CN 200310101969A CN 1529486 A CN1529486 A CN 1529486A
Authority
CN
China
Prior art keywords
user
malicious call
call
switch
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200310101969XA
Other languages
Chinese (zh)
Inventor
陈海彬
吕严
肖金平
葛军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA200310101969XA priority Critical patent/CN1529486A/en
Publication of CN1529486A publication Critical patent/CN1529486A/en
Pending legal-status Critical Current

Links

Abstract

The method includes following steps: (1) user activates service of 'stopping malicious call'; (2) user adds phone number list of malicious call; (3) validating phone number of incoming call: if phone number of incoming call is a malicious call, the incoming call is ended, otherwise normal call flow is initiated. The invention possesses features of simple workflow, realizable by using digital stored-program control exchange and software, without need of additional hardware resources, extending service area of stored-program control exchange.

Description

A kind of method of avoiding malicious call
Technical field
The present invention relates to the digital SPC exchange in the telecommunications network, the calling-control method in a kind of stored-program control exchange.
Background technology
Present digital SPC exchange can provide the supplementary service of malicious call according to user applies, if any the people user is carried out malicious call, and the called subscriber can use the number of malicious call service inquiry to the calling subscriber; Switch also provides the business of caller identification, by caller identification, views calling number.But technical scheme of the prior art all is the method and system device of knowing malicious call and notifying the user automatically, malicious call is not shielded.Though these methods all can obtain calling subscriber's number or know it is malicious call, can't stop the continuation harassing and wrecking of malicious call.Be regardless of malicious call ring up sound constantly, can make the people feel very worried,, may lose useful incoming call again if pull out telephone wire.
Summary of the invention
Purpose of the present invention is exactly can not propose a kind of method of avoiding malicious call according to the problem of calling number screening malicious call in order to overcome existing digital SPC exchange.
A kind of method of avoiding malicious call comprises following three big steps:
(1) user activates " prevention malicious call " business;
(2) user adds the malicious call list of numbers;
(3) incoming call calling number checking: when calling number belongs to the malicious call list of numbers, finish this time to call out, otherwise initiate the normal call flow process.
Described step (2) specifically comprises the following steps:
(1) the malicious call calling number that on phone, will add to switch input of user according to specific form;
(2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch with this number record in data-base malevolence call number tabulation;
(4) the prompting user operates successfully back end.
Described step (3) specifically comprises the following steps:
(1) caller makes a call;
(2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end;
(3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step;
(4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number;
(5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise
(6) initiate the normal call flow process.
A kind of method that the present invention proposes according to calling number prevention malicious call, simple and practical flow utilizes the existing capability of digital SPC exchange to make up realization fully, can realize by switch software, and implementation is simple, and method of operation is easy, feasible.The method of using the present invention to propose does not need to increase hardware resource, has expanded the scope of business of switch, has reached the effect that stops malicious call to continue harassing and wrecking, for the user provides more choices.
Description of drawings
Fig. 1 is the flow chart that the user adds the malicious call list of numbers.
Fig. 2 is a main flow chart of avoiding the malicious call method.
Fig. 3 is the flow chart that the user deletes the number in the malicious call list of numbers.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
Fig. 1 is the flow chart that the user adds the malicious call list of numbers.According to the proposed method, the user must at first activate the business of " prevention malicious call " before adding the malicious call list of numbers.The user can initiatively apply for registration of this business or activate this business to the specific instruction code of switch input on telephone set to telecommunication department.Such as, the user can be to the instruction code (this instruction code is that switch preestablishes and notify the user) of digital SPC exchange input " * #23856#* " on phone, and switch activates " prevention malicious call " business after receiving this instruction code automatically.As shown in Figure 1, the process of user's interpolation malicious call list of numbers after this business of activation comprises the following steps: the malicious call calling number that (1) user will add to the switch input according to specific form on phone; (2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure; (3) switch with this number record in data-base malevolence call number tabulation; (4) the prompting user operates successfully back end.The user can by the caller identification business or by using the malicious call business to obtain the malicious call number, the user adds according to the specific form of switch regulation then.Come in the malicious call list of numbers, to add malicious call number " 1234567 " as user's input " * * ##1234567##** ", switch can be pointed out the user by the mode of prompt tone, as play busy tone prompting user operation failure to the user, give the success of user's playback prompting operation.
Fig. 2 is a main flow chart of avoiding the malicious call method, just carries out the flow chart of incoming call calling number checking when stoping malicious call.As shown in Figure 2, the process of carrying out incoming call calling number checking comprises the following steps: that (1) caller makes a call; (2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end; (3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step; (4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number; (5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise (6) initiate the normal call flow process.For stiffening effect, in (5) step, finish before this calling, switch can also be play the prompt tone of " malicious call user " earlier to this calling subscriber, point out as recording: " you have been the malicious call user by user definition that called out ".
Fig. 3 is the flow chart that the user deletes the number in the malicious call list of numbers.In the present invention, the user can also delete number wherein freely except freely adding the number in the malicious call list of numbers.As shown in Figure 3, user's flow process of deleting the number in the malicious call list of numbers comprises the following steps: the malicious call calling number that (1) user will delete to the switch input according to specific form on phone; (2) switch judges whether this user has opened prevention malicious call business, if then continue, otherwise finish behind the prompting user operation failure; (3) switch is with the deletion from the tabulation of data-base malevolence call number of this number; (4) the prompting user operates successfully back end.Same, the user deletes number according to the specific form of switch regulation.Come deletion malicious call number " 1234567 " in the malicious call list of numbers as user's input " ##**1234567**## ", switch can be pointed out the user by the mode of prompt tone, as play busy tone prompting user operation failure to the user, give the success of user's playback prompting operation.

Claims (10)

1, a kind of method of avoiding malicious call is characterized in that, comprises the following steps:
(1) user activates " prevention malicious call " business;
(2) user adds the malicious call list of numbers;
(3) incoming call calling number checking: when calling number belongs to the malicious call list of numbers, finish this time to call out, otherwise initiate the normal call flow process.
2, a kind of method of avoiding malicious call according to claim 1 is characterized in that, described step (2) comprises the following steps:
(1) the malicious call calling number that on phone, will add to switch input of user according to specific form;
(2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch with this number record in data-base malevolence call number tabulation;
(4) the prompting user operates successfully back end.
3, a kind of method of avoiding malicious call according to claim 1 is characterized in that, described step (3) specifically comprises the following steps:
(1) caller makes a call;
(2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end;
(3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step;
(4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number;
(5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise
(6) initiate the normal call flow process.
4, a kind of method of avoiding malicious call according to claim 1, it is characterized in that the user activates " prevention malicious call " professional method for initiatively applying for registration of this business or activate this business to the specific instruction code of switch input on telephone set to telecommunication department in the described step (1).
5, a kind of method of avoiding malicious call according to claim 1 is characterized in that, the user can be by the caller identification business or by using the malicious call business to obtain the malicious call number in the described step (2).
6, a kind of method of avoiding malicious call according to claim 1 is characterized in that the user can also delete the number in the malicious call list of numbers, specifically comprises:
(1) the malicious call calling number that on phone, will delete to switch input of user according to specific form;
(2) switch judges whether this user has opened prevention malicious call business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch is with the deletion from the tabulation of data-base malevolence call number of this number;
(4) the prompting user operates successfully back end.
7, a kind of method of avoiding malicious call according to claim 3, it is characterized in that, in described step (5), if this calling number is in called subscriber's malicious call list of numbers, then play the prompt tone of " malicious call user " earlier to the calling subscriber, finish this calling then.
8, a kind of method of avoiding malicious call according to claim 2 is characterized in that, switch points out the user to operate success or operation failure by the mode of playing alert tones.
9, a kind of method of avoiding malicious call according to claim 6 is characterized in that, switch points out the user to operate success or operation failure by the mode of playing alert tones.
10, according to Claim 8 or 9 described a kind of methods of avoiding malicious call, it is characterized in that, play busy tone prompting user operation failure, give the success of user's playback prompting operation to the user.
CNA200310101969XA 2003-10-20 2003-10-20 Method for avoiding malicious calling Pending CN1529486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200310101969XA CN1529486A (en) 2003-10-20 2003-10-20 Method for avoiding malicious calling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200310101969XA CN1529486A (en) 2003-10-20 2003-10-20 Method for avoiding malicious calling

Publications (1)

Publication Number Publication Date
CN1529486A true CN1529486A (en) 2004-09-15

Family

ID=34304240

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200310101969XA Pending CN1529486A (en) 2003-10-20 2003-10-20 Method for avoiding malicious calling

Country Status (1)

Country Link
CN (1) CN1529486A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008089626A1 (en) * 2007-01-22 2008-07-31 Zte Corporation A method for identifying a malicious call
CN103414817A (en) * 2013-07-04 2013-11-27 国家电网公司 Prevention and treatment method of illegal telephone user
CN104767893A (en) * 2015-02-13 2015-07-08 广州市讯飞樽鸿信息技术有限公司 Crank call interception method and system
WO2016070638A1 (en) * 2014-11-05 2016-05-12 中兴通讯股份有限公司 Method for preventing nuisance calls, and switch
CN110113719A (en) * 2018-02-01 2019-08-09 普天信息技术有限公司 A kind of call limitation method and equipment based on broadband cluster system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008089626A1 (en) * 2007-01-22 2008-07-31 Zte Corporation A method for identifying a malicious call
CN103414817A (en) * 2013-07-04 2013-11-27 国家电网公司 Prevention and treatment method of illegal telephone user
WO2016070638A1 (en) * 2014-11-05 2016-05-12 中兴通讯股份有限公司 Method for preventing nuisance calls, and switch
CN105635071A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Method and switch for preventing harassing call
CN104767893A (en) * 2015-02-13 2015-07-08 广州市讯飞樽鸿信息技术有限公司 Crank call interception method and system
CN110113719A (en) * 2018-02-01 2019-08-09 普天信息技术有限公司 A kind of call limitation method and equipment based on broadband cluster system

Similar Documents

Publication Publication Date Title
US20090086953A1 (en) Active call filtering, screening and dispatching
CN102572904B (en) System and method for implementing automatic dial test business
US8180040B2 (en) Corporation switchboard platform and call processing method
CN107241519A (en) A kind of audio call centered video householder method and system
CN1893483B (en) Method for providing virtual telephone exchange service by intelligent network
CN1529486A (en) Method for avoiding malicious calling
CN102014217A (en) Treatment method of selecting multiple telecom functions in connected state
CN1992753A (en) Method and apparatus for recording conversation in communication network
US7187762B2 (en) Conferencing additional callers into an established voice browsing session
US20030091161A1 (en) Dictation memo in telecommunication network
CN1893679A (en) Method for cotrolling playback of calling partner or called partner in talking course
CN100407739C (en) Method for implementing No-disturbing service based on VOIP gateway
CN1218602C (en) Method for implementing operational control of ringing back tone
CN1154378C (en) Process for treating middle or high traffic load in intelligent mobile network
CN101179797B (en) System, terminal and method of implementing boot sleep mode of mobile phone
CN1956558B (en) System and method for providing opera browser to integration of call center service of intelligent network
CN100450253C (en) Method and gateway device for preventing user from using callback service
CN1466362A (en) Method for realizing group user card number service in fixed intelligent network
CN1486065A (en) Method for implementing Alarm-call Service based on VOIP gateway
CN1486049A (en) Method for implementing call pickup service based on VOIP gateway
CN1523860A (en) An interactive method for managing information in voice monitoring system
CN1553681A (en) Apparatus and method for realizing shielded called exchange equipment prompt sound
CN1486066A (en) Method for implementing Call Tasfer On Busy Service based on VOIP gateway
CN1281026C (en) Circuit switching method for saving group selector resource
CN1541014A (en) Method for providing one phone number for two phone sets in wireless local call phone system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication