CN1529486A - Method for avoiding malicious calling - Google Patents
Method for avoiding malicious calling Download PDFInfo
- Publication number
- CN1529486A CN1529486A CNA200310101969XA CN200310101969A CN1529486A CN 1529486 A CN1529486 A CN 1529486A CN A200310101969X A CNA200310101969X A CN A200310101969XA CN 200310101969 A CN200310101969 A CN 200310101969A CN 1529486 A CN1529486 A CN 1529486A
- Authority
- CN
- China
- Prior art keywords
- user
- malicious call
- call
- switch
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The method includes following steps: (1) user activates service of 'stopping malicious call'; (2) user adds phone number list of malicious call; (3) validating phone number of incoming call: if phone number of incoming call is a malicious call, the incoming call is ended, otherwise normal call flow is initiated. The invention possesses features of simple workflow, realizable by using digital stored-program control exchange and software, without need of additional hardware resources, extending service area of stored-program control exchange.
Description
Technical field
The present invention relates to the digital SPC exchange in the telecommunications network, the calling-control method in a kind of stored-program control exchange.
Background technology
Present digital SPC exchange can provide the supplementary service of malicious call according to user applies, if any the people user is carried out malicious call, and the called subscriber can use the number of malicious call service inquiry to the calling subscriber; Switch also provides the business of caller identification, by caller identification, views calling number.But technical scheme of the prior art all is the method and system device of knowing malicious call and notifying the user automatically, malicious call is not shielded.Though these methods all can obtain calling subscriber's number or know it is malicious call, can't stop the continuation harassing and wrecking of malicious call.Be regardless of malicious call ring up sound constantly, can make the people feel very worried,, may lose useful incoming call again if pull out telephone wire.
Summary of the invention
Purpose of the present invention is exactly can not propose a kind of method of avoiding malicious call according to the problem of calling number screening malicious call in order to overcome existing digital SPC exchange.
A kind of method of avoiding malicious call comprises following three big steps:
(1) user activates " prevention malicious call " business;
(2) user adds the malicious call list of numbers;
(3) incoming call calling number checking: when calling number belongs to the malicious call list of numbers, finish this time to call out, otherwise initiate the normal call flow process.
Described step (2) specifically comprises the following steps:
(1) the malicious call calling number that on phone, will add to switch input of user according to specific form;
(2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch with this number record in data-base malevolence call number tabulation;
(4) the prompting user operates successfully back end.
Described step (3) specifically comprises the following steps:
(1) caller makes a call;
(2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end;
(3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step;
(4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number;
(5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise
(6) initiate the normal call flow process.
A kind of method that the present invention proposes according to calling number prevention malicious call, simple and practical flow utilizes the existing capability of digital SPC exchange to make up realization fully, can realize by switch software, and implementation is simple, and method of operation is easy, feasible.The method of using the present invention to propose does not need to increase hardware resource, has expanded the scope of business of switch, has reached the effect that stops malicious call to continue harassing and wrecking, for the user provides more choices.
Description of drawings
Fig. 1 is the flow chart that the user adds the malicious call list of numbers.
Fig. 2 is a main flow chart of avoiding the malicious call method.
Fig. 3 is the flow chart that the user deletes the number in the malicious call list of numbers.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
Fig. 1 is the flow chart that the user adds the malicious call list of numbers.According to the proposed method, the user must at first activate the business of " prevention malicious call " before adding the malicious call list of numbers.The user can initiatively apply for registration of this business or activate this business to the specific instruction code of switch input on telephone set to telecommunication department.Such as, the user can be to the instruction code (this instruction code is that switch preestablishes and notify the user) of digital SPC exchange input " * #23856#* " on phone, and switch activates " prevention malicious call " business after receiving this instruction code automatically.As shown in Figure 1, the process of user's interpolation malicious call list of numbers after this business of activation comprises the following steps: the malicious call calling number that (1) user will add to the switch input according to specific form on phone; (2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure; (3) switch with this number record in data-base malevolence call number tabulation; (4) the prompting user operates successfully back end.The user can by the caller identification business or by using the malicious call business to obtain the malicious call number, the user adds according to the specific form of switch regulation then.Come in the malicious call list of numbers, to add malicious call number " 1234567 " as user's input " * * ##1234567##** ", switch can be pointed out the user by the mode of prompt tone, as play busy tone prompting user operation failure to the user, give the success of user's playback prompting operation.
Fig. 2 is a main flow chart of avoiding the malicious call method, just carries out the flow chart of incoming call calling number checking when stoping malicious call.As shown in Figure 2, the process of carrying out incoming call calling number checking comprises the following steps: that (1) caller makes a call; (2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end; (3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step; (4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number; (5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise (6) initiate the normal call flow process.For stiffening effect, in (5) step, finish before this calling, switch can also be play the prompt tone of " malicious call user " earlier to this calling subscriber, point out as recording: " you have been the malicious call user by user definition that called out ".
Fig. 3 is the flow chart that the user deletes the number in the malicious call list of numbers.In the present invention, the user can also delete number wherein freely except freely adding the number in the malicious call list of numbers.As shown in Figure 3, user's flow process of deleting the number in the malicious call list of numbers comprises the following steps: the malicious call calling number that (1) user will delete to the switch input according to specific form on phone; (2) switch judges whether this user has opened prevention malicious call business, if then continue, otherwise finish behind the prompting user operation failure; (3) switch is with the deletion from the tabulation of data-base malevolence call number of this number; (4) the prompting user operates successfully back end.Same, the user deletes number according to the specific form of switch regulation.Come deletion malicious call number " 1234567 " in the malicious call list of numbers as user's input " ##**1234567**## ", switch can be pointed out the user by the mode of prompt tone, as play busy tone prompting user operation failure to the user, give the success of user's playback prompting operation.
Claims (10)
1, a kind of method of avoiding malicious call is characterized in that, comprises the following steps:
(1) user activates " prevention malicious call " business;
(2) user adds the malicious call list of numbers;
(3) incoming call calling number checking: when calling number belongs to the malicious call list of numbers, finish this time to call out, otherwise initiate the normal call flow process.
2, a kind of method of avoiding malicious call according to claim 1 is characterized in that, described step (2) comprises the following steps:
(1) the malicious call calling number that on phone, will add to switch input of user according to specific form;
(2) switch judges whether this user has opened this business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch with this number record in data-base malevolence call number tabulation;
(4) the prompting user operates successfully back end.
3, a kind of method of avoiding malicious call according to claim 1 is characterized in that, described step (3) specifically comprises the following steps:
(1) caller makes a call;
(2) switch joins to judge whether the called subscriber is idle, if then continue, otherwise end;
(3) switch judges whether " prevention malicious call " business of called subscriber is effective, if then continue, otherwise carries out for (6) step;
(4) switch judges this calls out whether calling number is arranged, and if not forward direction request calling number obtain carrying out next step after the calling number;
(5) if calling number arranged then judge that further this calling number is whether in called subscriber's malicious call list of numbers; If then finish this calling; Otherwise
(6) initiate the normal call flow process.
4, a kind of method of avoiding malicious call according to claim 1, it is characterized in that the user activates " prevention malicious call " professional method for initiatively applying for registration of this business or activate this business to the specific instruction code of switch input on telephone set to telecommunication department in the described step (1).
5, a kind of method of avoiding malicious call according to claim 1 is characterized in that, the user can be by the caller identification business or by using the malicious call business to obtain the malicious call number in the described step (2).
6, a kind of method of avoiding malicious call according to claim 1 is characterized in that the user can also delete the number in the malicious call list of numbers, specifically comprises:
(1) the malicious call calling number that on phone, will delete to switch input of user according to specific form;
(2) switch judges whether this user has opened prevention malicious call business, if then continue, otherwise finish behind the prompting user operation failure;
(3) switch is with the deletion from the tabulation of data-base malevolence call number of this number;
(4) the prompting user operates successfully back end.
7, a kind of method of avoiding malicious call according to claim 3, it is characterized in that, in described step (5), if this calling number is in called subscriber's malicious call list of numbers, then play the prompt tone of " malicious call user " earlier to the calling subscriber, finish this calling then.
8, a kind of method of avoiding malicious call according to claim 2 is characterized in that, switch points out the user to operate success or operation failure by the mode of playing alert tones.
9, a kind of method of avoiding malicious call according to claim 6 is characterized in that, switch points out the user to operate success or operation failure by the mode of playing alert tones.
10, according to Claim 8 or 9 described a kind of methods of avoiding malicious call, it is characterized in that, play busy tone prompting user operation failure, give the success of user's playback prompting operation to the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200310101969XA CN1529486A (en) | 2003-10-20 | 2003-10-20 | Method for avoiding malicious calling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200310101969XA CN1529486A (en) | 2003-10-20 | 2003-10-20 | Method for avoiding malicious calling |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1529486A true CN1529486A (en) | 2004-09-15 |
Family
ID=34304240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200310101969XA Pending CN1529486A (en) | 2003-10-20 | 2003-10-20 | Method for avoiding malicious calling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1529486A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008089626A1 (en) * | 2007-01-22 | 2008-07-31 | Zte Corporation | A method for identifying a malicious call |
CN103414817A (en) * | 2013-07-04 | 2013-11-27 | 国家电网公司 | Prevention and treatment method of illegal telephone user |
CN104767893A (en) * | 2015-02-13 | 2015-07-08 | 广州市讯飞樽鸿信息技术有限公司 | Crank call interception method and system |
WO2016070638A1 (en) * | 2014-11-05 | 2016-05-12 | 中兴通讯股份有限公司 | Method for preventing nuisance calls, and switch |
CN110113719A (en) * | 2018-02-01 | 2019-08-09 | 普天信息技术有限公司 | A kind of call limitation method and equipment based on broadband cluster system |
-
2003
- 2003-10-20 CN CNA200310101969XA patent/CN1529486A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008089626A1 (en) * | 2007-01-22 | 2008-07-31 | Zte Corporation | A method for identifying a malicious call |
CN103414817A (en) * | 2013-07-04 | 2013-11-27 | 国家电网公司 | Prevention and treatment method of illegal telephone user |
WO2016070638A1 (en) * | 2014-11-05 | 2016-05-12 | 中兴通讯股份有限公司 | Method for preventing nuisance calls, and switch |
CN105635071A (en) * | 2014-11-05 | 2016-06-01 | 中兴通讯股份有限公司 | Method and switch for preventing harassing call |
CN104767893A (en) * | 2015-02-13 | 2015-07-08 | 广州市讯飞樽鸿信息技术有限公司 | Crank call interception method and system |
CN110113719A (en) * | 2018-02-01 | 2019-08-09 | 普天信息技术有限公司 | A kind of call limitation method and equipment based on broadband cluster system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102572904B (en) | System and method for implementing automatic dial test business | |
US8180040B2 (en) | Corporation switchboard platform and call processing method | |
CN107241519A (en) | A kind of audio call centered video householder method and system | |
CN1893483B (en) | Method for providing virtual telephone exchange service by intelligent network | |
CN1529486A (en) | Method for avoiding malicious calling | |
CN102014217A (en) | Treatment method of selecting multiple telecom functions in connected state | |
CN1992753A (en) | Method and apparatus for recording conversation in communication network | |
US7187762B2 (en) | Conferencing additional callers into an established voice browsing session | |
US20030091161A1 (en) | Dictation memo in telecommunication network | |
CN1208940C (en) | Realizing method of fixed net short message and its system | |
CN1893679A (en) | Method for cotrolling playback of calling partner or called partner in talking course | |
CN100407739C (en) | Method for implementing No-disturbing service based on VOIP gateway | |
CN1218602C (en) | Method for implementing operational control of ringing back tone | |
CN1154378C (en) | Process for treating middle or high traffic load in intelligent mobile network | |
CN1956558B (en) | System and method for providing opera browser to integration of call center service of intelligent network | |
CN100450253C (en) | Method and gateway device for preventing user from using callback service | |
CN1466362A (en) | Method for realizing group user card number service in fixed intelligent network | |
CN1466361A (en) | Method for realizing fixed telephone priority service | |
CN1486065A (en) | Method for implementing Alarm-call Service based on VOIP gateway | |
US20030091175A1 (en) | Method and system for application initiated teleconferencing | |
CN1486049A (en) | Method for implementing call pickup service based on VOIP gateway | |
CN1523860A (en) | An interactive method for managing information in voice monitoring system | |
CN101179797A (en) | System, terminal and method of implementing boot sleep mode of mobile phone | |
CN1486066A (en) | Method for implementing Call Tasfer On Busy Service based on VOIP gateway | |
CN1281026C (en) | Circuit switching method for saving group selector resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |