KR100946983B1 - Method and apparatus for processing spam - Google Patents
Method and apparatus for processing spam Download PDFInfo
- Publication number
- KR100946983B1 KR100946983B1 KR1020080021493A KR20080021493A KR100946983B1 KR 100946983 B1 KR100946983 B1 KR 100946983B1 KR 1020080021493 A KR1020080021493 A KR 1020080021493A KR 20080021493 A KR20080021493 A KR 20080021493A KR 100946983 B1 KR100946983 B1 KR 100946983B1
- Authority
- KR
- South Korea
- Prior art keywords
- spam
- report
- reporter
- evaluation index
- index
- Prior art date
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to spam processing, and more specifically, a spam processing for converting the reported spam level of a reportee's spam based on the spam confidence of the spam reporter into a score so that the receiver can serve the sender's spam level as a score. A method and system are disclosed. To this end, the present invention comprises the steps of receiving a spam call report containing a specific telephone number to be reported from the spam reporter communication terminal; Calculating a spam evaluation index for the corresponding reported telephone number based on the spam report reliability of the spam reporter; When the call request from the communication terminal corresponding to the reported telephone number, and the spam evaluation index to the destination communication terminal comprising the step of displaying the spam processing method and system for performing the same.
Spam, spammer, spam information sharing, spam phone number, communication terminal, personal identifier information, spam report credibility
Description
The present invention relates to spam processing, and more specifically, to a degree of spam of a reported respondent based on a spam reporter's spam confidence level, a spam processing that enables a recipient to service a sender's spam level as a score. It relates to a method and a system.
In general, spam refers to advertising calls, letters, or messages that are sent to an unspecified number of people, which are received by communication terminals (e.g., mobile phones, Internet phones, PSTN wireline phones, etc.) as the spread of communication terminals increases. The number of spam messages or spam calls is increasing.
Spammers attempt to send spam messages or calls to a number of unspecified communication terminals using phone numbers that simulate normal or mobile phone numbers. Then, the user of the terminating communication terminal checks the spam message, listens to the advertisement message recorded by the incoming call, or makes an unwanted call with the caller having the purpose of advertising.
Among recent spams, when a user receives a spam call that arrives at a communication terminal, there is a method of disconnecting a phone number when the user contacts the disconnected phone number, and then sends an advertising message or connects to an unwanted paid service such as ponting. .
The conventional spam processing method blocks the spam from the registered phone number by allowing the user to register as a spam phone number in the spam list of the communication terminal in order to solve the user's complaint caused by the spam. It also blocks spam by registering spam phone numbers on carrier servers. Since this conventional method does not share any information among users, each user responds to spam after each user experiences spam, so it is only a follow-up measure and is not effective at all in preventing spam. In addition, operators of systems such as telecommunications companies and government agencies take a short time to collect information about spam from a large number of users, so spammers can fully achieve their goals. Spammers change the phone number and attempt spam activity with a new phone number when a large number of subscribers recognize the spammer's phone number as a spam phone number or if they are sanctioned by a system operator.
If you reduce the time to recognize a specific spammer as a spammer, the frequency with which spammers change their phone numbers or the renters of the phone numbers becomes very high, which adds inconvenience to the spammers and the government or telecommunications company. Can be identified more easily, thus reducing spammer activity.
However, the conventional spam processing technique cannot reduce spammer recognition time.
Another conventional spam processing method is to analyze message content transmitted using message filtering and to block the spam by recognizing typical words or sentences (eg, "loans", etc.) that appear in spam.
However, this method is not applicable to voice calls, and when spammers intricately change the content of the message, filtering is impossible, and there is a concern that even the message of the legitimate caller may be blocked.
Another conventional spam processing method is a mobile phone simple reporting system (for example, 1336 telephone) operated by a government agency (Korea Information Security Agency). In this method, when a user checks an incoming spam call, the user reports a spam to the '1336' phone number.
However, reporting spam through the 1336 number is complicated, requiring more than two minutes. In addition, the accused is subject to strong penalties or legal sanctions, such as "suspension of use," so that accurate notification of the reporter and the transmission of evidence are necessary to prevent the accused in good faith from mischievous or malicious or mistaken reports. The reporting process is complicated. Therefore, most users do not report spam due to complicated procedures.
Another conventional spam processing method is a method in which a system operator of a telecommunication company or a government agency runs a spam trap by operating a number for spam detection. Spam traps are effective for spammers sending out indiscriminate phone numbers, but have a problem with spammers who have secured phone number data from real users.
Another conventional spam processing method is that a system operator of a telecommunication company or a government agency obtains spam information through various channels and blocks the transmission of a specific number, but the concept of simple and systematic sharing of spam information between users is not established. Not in condition.
Another conventional spam processing method is a method in which a user searches for a phone number suspected of spam using the Internet. When a user searches for a phone number suspected of spam, such as one-ring spam, on a specific site on the Internet, the specific site informs the user of the number of times the phone number has been retrieved. This method aims to share basic spam information among users by using the concept that the more the number of searches from users, the more likely it is to be spam. However, since this method needs to search for a phone number suspected of spam after accessing the Internet site, it is inconvenient to use and there is no means for sanctioning spammers without systematically spreading the shared spam information to others. . First of all, when there is an incoming call suspected to be spam, there is a problem in that the spam information identified by the Internet site cannot be easily delivered to the called user, thereby preventing the user from being spammer.
The present invention has been made in view of the above problems, and the spam processing method for converting the degree of spam of the reported respondents to the score based on the spam confidence of the spam reporter so that the called party can service the sender's spam as a score. And to provide a system.
Another object of the present invention is to provide a spam processing method and system that can minimize spam damage of users through the sharing of spam information.
It is still another object of the present invention to provide a spam processing method and system for serving a spam level of a sender according to a spam report of a user to a called party's communication terminal.
It is still another object of the present invention to provide a spam processing method and system for minimizing a time for a called party to recognize a sender as a spammer.
It is still another object of the present invention to provide a spam processing method and system for providing reliable caller information so that an incoming call can be effectively sorted by an incoming call from an unknown telephone number.
Spam processing method according to an aspect of the present invention for achieving the above object comprises the steps of receiving a spam call report containing a specific telephone number to report from the spam reporter communication terminal; Calculating a spam evaluation index for the reported telephone number based on the spam report reliability of the spam reporter; And sending the spam evaluation index to the called communication terminal for displaying when the communication terminal corresponding to the called telephone number is requested.
According to another aspect of the present invention, there is provided a spam processing method comprising: receiving a spam call report including a specific telephone number to be reported from a spam reporter communication terminal; Calculating a spam evaluation index for personal identifier information corresponding to the called telephone number based on the spam report reliability of the spam reporter; And transmitting the spam evaluation index to the destination communication terminal and displaying the spam evaluation index when the communication terminal corresponding to the personal identifier information is requested.
According to another aspect of the present invention, a spam processing system includes a communication terminal of a spam reporter for transmitting a spam call report including a specific phone number to be reported; Calculates a spam evaluation index for the corresponding reported telephone number based on the spam reporter's spam report reliability, and transmits the spam evaluation index to a terminating communication terminal when a communication terminal corresponding to the reported telephone number is sent; And a spam control server for displaying.
According to another aspect of the present invention, a spam processing system includes a communication interface unit for providing a communication interface with a communication terminal; A control unit for calculating a spam evaluation index for the received telephone number based on the reliability of the spam reporter and transmitting the spam evaluation index to the called communication terminal according to a request from the communication terminal corresponding to the reported telephone number; ; And a database unit for storing the spam evaluation index according to the reported telephone number.
By the above-mentioned problem solving means, the present invention displays the spam evaluation index of the sender on a specific destination communication terminal, there is an effect that the receiver can easily check whether or not spam. Accordingly, the called party can quickly deal with the incoming call or incoming message.
In addition, by calculating the spam evaluation index by differentially applying the deduction index in accordance with the reliability of the spam reporter, there is an effect that can provide reliable spam information to the user of the receiving communication terminal.
In addition, by allowing the spam reporter to immediately check the report result, it is possible to induce the reporter's participation, to identify and block the unspecified number of spam by sharing the spam phone number experienced by the user of the communication terminal.
In addition, since the report is simple and shows the result immediately, the user's sense of belonging, moral satisfaction and interest in participating in the illegal spammer's punishment is encouraged, and sincerity, the more faithful the reporter, the stronger the authority to report spam, making them feel superior to other users. By reinforcing the element of interest, the number of users involved in spam reporting increases, allowing system operators of government agencies and telecommunications companies to identify spammers quickly and systematically. As a result, the frequency of spammers changing their phone numbers or hiring phone number lenders becomes very high, which adds inconvenience to spammers, and enables system operators of government agencies or telecommunication companies to identify spammers more quickly and easily.
In addition, there is an effect that can protect the user's right to answer calls from spammers.
Hereinafter, with reference to the accompanying drawings, preferred embodiments of the present invention will be described in detail, focusing on the parts necessary to understand the operation and action according to the present invention.
In the following description specific details of the spam processing method and system of the present invention are presented to provide a more comprehensive understanding of the present invention. It is to be understood that the present invention may be readily implemented without these specific details and also by modification thereof. It will be apparent to those of ordinary skill in the art.
On the other hand, the spam processing method and system of the present invention corresponds to the reported telephone number by calculating the spam evaluation index for the personal identifier information corresponding to the reported telephone number or the reported telephone number in consideration of the spam reporter's spam report reliability. When the communication terminal sends a request, the spam evaluation index is transmitted to the destination communication terminal to be displayed.
Herein, the personal identifier information means any one of USIM ID, social security number, and business registration number information. In addition, the spam evaluation index is a score that expresses the spam level of the user, and is a score that increases or decreases based on a reference score (such as an initial score).
Detailed description of the present invention describes the operation and operation of calculating the spam evaluation index only for the spam report phone number to help understanding. In addition, the description will be given based on the example applied to the mobile communication network, but it can be applied not only to the mobile communication network but also to both the Internet telephone network and the public switched telephone network, and also applicable to the environment in which the mobile communication network, the Internet telephone network, and the public switched telephone network are interworked. .
1 is a block diagram of a spam processing system of the present invention.
The spam processing system of the present invention is a mobile communication terminal (101,102), a base station (BTS: Base Station Transceiver Subsystem, hereinafter referred to as "BTS") (111,112), the base station controller (BSC: Base Station Controller, hereinafter referred to as "BSC" (113, 114), mobile switching center (MSC: Mobile Switching Center, hereinafter referred to as "MSC") (121,122), Home Location Register (HLR: Home Location Register, hereinafter referred to as "HLR") (130), Short Message Service Center (SMSC) (hereinafter referred to as "SMSC") (141), Multimedia Message Service Center (MMSC) (hereinafter referred to as "MMSC") (142), mobile communication Core
The mobile communication network consists of a mobile communication core network and a wireless access network. The mobile
The
The
The base station controller (BSC) 113, 114 manages the plurality of
The
The
If the message sent by the sender is not delivered due to the power-off of the called terminal, the message is stored in the
The
In addition, the
While the above has described an embodiment in which the mobile communication terminal is called and the mobile communication terminal is received, the mobile communication terminal, the Internet telephone, and the landline telephone are sent from any one of the mobile terminals, the Internet telephone, and the telephone with only slight modifications known to those skilled in the art. The method of the present invention can be applied to all cases of reception at either terminal of a landline telephone.
When the
The
2 is an internal configuration diagram of a spam control server in FIG. 1.
The
The
The
The
The
The
The spam evaluation
The spam
For example, if the initial spam score is 100, the spam score is deducted based on the reliability of the spam reporter of the reporter who reported the spam. have. At this time, if the spam evaluation index falls below '50', a communication system operator for blocking spam may be reviewed.
3 is a flowchart illustrating a spam call processing process of the present invention. For convenience of explanation, a flowchart of spam control between terminals in a mobile communication network is shown.
First, the calling terminal 101 requests a call call connection to the incoming mobile communication terminal 102 (S301). The originating
When the
Then, the
For example, the response message is transmitted including not only the spam level of the sender or the calling
In another embodiment, if a spam processing service is provided as a basic service, the originating
The originating
The
The
After that, the called
4 is a flowchart illustrating a spam message processing process of the present invention. For convenience of explanation, a flowchart of spam control between terminals in a mobile communication network is shown.
First, when the calling
Then, the sending
Thereafter, the SMSC /
Spam level indicates spam and the degree of spam and can be expressed through spam evaluation index. The
For example, the response message includes not only the spam level of the sender or the calling terminal but also whether the sender or the calling
After step 405 (S405), the
Thereafter, the originating
In step 406 (S406), if the spam level calculated from the spam report of multiple users with respect to the sender or the calling
The message routing request message (eg, ROUTREQ) contains spam level information of the sender or originating
The
The location request response message may include spam level information received in response to the spam level query from the
Thereafter, the SMSC /
The
The incoming
In one example, the spam rating index is transmitted or displayed to the called terminal only when the spam rating index is greater than or equal to a predetermined value.
The spam report of the called party according to the present invention can be variously. After the recipient makes a call, after recognizing the missed call, he / she can report spam after recognizing the received short message or multimedia message, and can also report spam during the call, and sender information such as the caller's calling number You can also report spam after checking.
5 is a flowchart illustrating a spam registration process according to the present invention.
First, when the called party manipulates the called terminal 102 to report spam for the received message or the incoming call, the called terminal 102 transmits a spam report message to the called MSC 122 (S501).
When the spam report message is received, the
The
The
The
The
As described above, the process of spam reporting after checking the calling party information such as the caller's number after the call or before the call and the process of registering the spam report by spam reporting after checking the missed call is similar to the process of spam reporting during the call. However, in order to report spam during a call, the method of reporting and disconnecting a call is different. Therefore, a detailed description of the process of reporting spam during a call is omitted.
6 is an exemplary view showing a terminal screen when reporting spam according to the present invention. In this case, after the user of the receiving terminal makes a call, recognizes the missed call, recognizes the received short message or multimedia message, and recognizes that it is a spam call. This section describes the screen data for reporting spam by pressing the Select or Preset button.
As shown in FIG. 6 (a), the user searches the recent call record and moves the cursor to report "010 ?? XXX ?? XXXX" in the call log as spam.
Thereafter, when the user operates a corresponding button for activating the menu function, a popup menu window for spam report is displayed as shown in FIG.
The user selects after moving the cursor to "2. Spam Confirmation" in the pop-up menu. Then, "010 ?? XXX ?? XXXX" in the recent call log is reported as spam.
Also, as shown in FIG. 6 (c), the cursor is moved to report a message received from “010 ?? XXX ?? XXXX” among the messages received by the user as spam.
Thereafter, when the user manipulates the corresponding button for activating the menu function, a popup menu window for spam report is displayed as shown in FIG.
The user selects after moving the cursor to "4. Report Spam" in the pop-up menu. Then, the message received from "010 ?? XXX ?? XXXX" is reported as spam.
When the report is spam, the items reported in the call log or the received message list are displayed to be distinguished from other items. In this case, the spam-reported item may be easily canceled by the user by a method such as menu selection.
7A is a flowchart illustrating a spam information sharing method according to the present invention.
The spam information sharing method of the present invention includes a step in which the
In step S701, when the
The spam report reported by the user can be implemented in the spam processing system by dividing it into a spam suspect report or a spam confidence report, and can be implemented by dividing it into two or more reports.
For example, a spam report and a spam report can be selected by the user according to the certainty of the spam. If the spam report is certain, the spam report is less certain than a spam report. Use if
Like Wonling Spam, when a user does not specifically check for spam, but reports a suspected spam, spam reports are used. For example, upon notification of spam, the
Spam certainty report is used when the user confirms spam, and the user reports it with a simple button operation.
The spam certainty report is a high level spam report and has a high weight in calculating the spam evaluation index of the
For example, when dividing a spam report into two or more reports, the report type may include any one of spam report, spam report, and fraud report. Here, fraud reporting refers to reporting fraud by a caller, including a so-called fraud called voice pishing. Telephone fraud can be seen as a kind of spam, but when the damage occurs, the fraudulent act is a huge fraud, so you can prepare a separate fraud report during spam reporting.
If such a spam report is recognized as a mistake after the spam report, so that the spam report can be released, the user will report lightly if there is doubt about the mistake report.
If you report spam, you can immediately block the sender or replyer to the individual who reported. If there are various spam reports, the spam blocks should not be blocked by individual users. If the spam is reported as spam, the spam blocks should be blocked by individual users.
Computing and determining the spam evaluation index of the sender or the replyer by the spam processing system based on the reliability of the spam report of the user (S702), for example, the
FIG. 7B is a flowchart illustrating a spam evaluation index calculation process in FIG. 7A.
First, the
Subsequently, the
As a result of the determination, if the reporter spam report reliability is the good reporter reliability, the respondent's spam evaluation index is deducted by 1 to 3 points according to the report authority value, which is the degree of the good reporter reliability (S713). The number of good reporters who reported legitimate spam increases the value of the right to report, and deducts the respondent's spam evaluation index by 1 to 3 points by the value of the right to report. That is, if the reporter's reporting authority value is 1.3, the respondent's spam evaluation index is deducted by 1.3 points. At this time, it is preferable to subtract the spam evaluation index according to the respondent's personal identifier information.
However, if it is determined that the reporter spam report reliability is not the superior reporter reliability, the
As a result of the determination, if the reporter spam report reliability is a mistake / false reporter reliability, the
However, if it is determined that the reporter spam report reliability is not a mistake / false reporter reliability, the
In other words, in the present invention, the spam evaluation index is simply calculated by varying the scores based on the spam report reliability based on the data easily reported by the users and the spam report reliability value of the spam report users. Although the example using the reported drop score system has been described above, the spam evaluation index can be calculated in the same manner even when the reported rise score system is used.
For convenience of explanation, it is assumed that when the spam evaluation index is "100", the spam report index is never received and the spam score is higher as the spam score is lowered using the report drop score.
As another example of the method for calculating the spam evaluation index of the present invention, when a spam report is divided into two reports, such as a spam report and a fraud report, a fraud index is calculated separately from the spam evaluation index and stored in the
The spam rating may be displayed in proportion to the spam evaluation index, stored in the
For example, if the spam score is less than 80, it is labeled as "suspicious", and if it is less than "70", it is labeled as "risk", and if it is reduced to less than 50, it is marked as "spam" and spammer is determined. When the operator of the
In this way, as the sender's spam score is lowered (or the spam score is higher depending on the setting), the spam level is displayed on the called terminal together with the spam score in order of "suspect", "risk", and "spam confidence". .
In an embodiment of the present invention, the caller's telephone number opening date may be displayed to the called party.
In one example, the opening date and the spam evaluation index may be displayed to the called party together. In another example, the opening date is reflected in the calculation of the spam evaluation index in addition to the spam report (that is, the more recent the opening date is, the spam reporting index is at least lower. Way, etc.).
According to an embodiment of the present invention, the rate of change of the sender spam evaluation index may be displayed to the called party together with the spam evaluation index.
The hourly rate of change of the spam evaluation index may be in the form of "M point down / day" for the last 1 day or "M point down / 6 hour" for the last 6 hours.
In another example, in addition to the spam report, the rate of change of the spam evaluation index is reflected in the spam evaluation index calculation. If you receive a lot of spam in a short period of time, you can weight the spam scores by looking at the likelihood of spam. For example, if you receive a lot of spam reports in the last 6 hours, and the spam rating index drop falls below the preset "N-drop / 6-hour" in the last 6 hours, an additional preset value (Example 2 points) You can deduct more.
In another example, the spam score is calculated non-linearly based on the spam report. If you are deducting one point on your first report, the more points you receive, the more you will deduct the deduction index.
For example, the spam evaluation index may be calculated by using only spam reports. In addition, spam scores may be calculated by integrating prior art methods such as message filtering in addition to spam reports. In another example, the spam evaluation index may be calculated only by the spam report, and the spam level may be determined by combining the spam evaluation index with the prior art such as message filtering.
In one embodiment of the present invention, the spam evaluation index of one subscriber (individual, company, organization) is recorded in the subscriber's history and can be applied to maintain the same even if the telephone number is changed.
It is possible to share spam information among subscribers of various carriers through sharing spam information between carriers or through mediation by government agencies, and one subscriber's spam evaluation index can be applied even if the telephone number or carrier is changed. .
In addition, in one embodiment of the present invention, when one subscriber (individual, company, organization) owns several phone numbers, it is possible to manage the spam evaluation index and spam level in one subscriber.
When an individual subscriber owns / operates several phone numbers, the spam evaluation index is integrated and managed by individual by using an individual identifier (ID) such as a social security number or a universal subscriber identity module (USIM). When a subscriber owns / operates several phone numbers, the company uses a company identifier (business registration number, etc.) to manage the spam evaluation index. When a subscriber (individual, company, organization) uses two or more telephone numbers, the spam evaluation index of each terminal may be integrated and used as the spam evaluation index of the subscriber.
The called user may display both the subscriber's spam evaluation index and the subscriber's outgoing phone number / terminal's spam evaluation index, and display only the subscriber's spam evaluation index or the subscriber's outgoing phone number / terminal's spam evaluation index.
The integrated calculation of the subscriber spam evaluation index can be variously calculated. In the manner that the spam evaluation index is lowered as more spam reports are received, for example, the subscriber spam rating index may be a spam rating index calculated by adding spam reports received by some or all terminals owned by the subscriber. Some or all of the terminals may be a spam evaluation index calculated by summing up spam reports reported for a predetermined period of time, or the lowest spam rating index among subscriber-owned terminals. In addition, the subscriber spam evaluation index can be calculated and displayed to other users in various ways.
In one embodiment of the present invention, when the sender sends to a terminal owned by another subscriber using USIM or the like, one or more of the sender spam evaluation index, the spam evaluation index of the calling terminal, and the owner of the calling terminal is displayed. can do.
In the prior art, it blocks only what is determined as spam and does not provide information to the called user until it is determined as spam, and there is no information about spam between users.
Simplifying spam reporting as an aspect of the present invention is convenient at the time of spam reporting, but can be reported accidentally or mischievously or malicious, and there is a high possibility that damage and normal users are abused and misused. There is also an ad call that the called party agrees with, and the called person can forget it or send a spam report in a moment.
Even outgoing calls that receive a lot of spam reports are often ambiguous to be judged as spam and suspended. There are also many telemarketing calls that the recipient has agreed to or that is legitimate.
In addition, since it may be spam for one person but desired advertisements for others, it is difficult to determine that spam is low in spam scores over a preset number of spam reports. For this reason, in the present invention, the spam evaluation index is calculated based on the spam report of a plurality of users.
In addition, if the spam evaluation index falls below a predetermined score, the operator of the telecommunications system operator or the government agency initiates the investigation and reads the reported evidence.
Evidence includes spam report calls and text / multimedia messages. If the spammer reads the document, he or she will follow the procedures included in the law or the terms and conditions, such as blocking spam, connecting the call only to the phone number agreed to by the called party, and stopping the use.
In particular, suspension is fatal to the caller, so there must be a legal basis, the procedure is complicated, and the operator of the telecommunications system must judge it comprehensively.
In addition, even if an individual called user spam reports, it takes time to accumulate spam reports from a plurality of users and time required for the telecommunication company to verify the report as spam and block or stop use of the sender spam.
If spammers do spam activity for a certain period of time unless the spam information is provided to the called user until it is determined as spam, the present invention provides the called party with the spam level information even before the sender / responder spam is determined. to provide.
In particular, by displaying the spam score, the spammer's spam activity changes rapidly to the called party. The spam rating can be set in the order of “reliance ??> suspicion ??> risk ??> certainty”. However, it is difficult to subdivide each class so that the recipient realizes spammer activity. By displaying to the called party, the called party can feel the spammer's activity, and can quickly check his or her spam report result and feel the belonging and interest in participating in the spammer's punishment. It also helps the called party choose whether to answer the call.
The spam rating index display of the present invention is useful because it helps the called party to make a spam judgment on their own. It also helps the recipient to report spam. It also displays indices related to phone fraud, such as voice phishing, and can be shared among users, helping to prevent damage and arrest criminals.
Providing the spam evaluation index information to indicate the spam level of the sender or the reply to the called party when the incoming call (S703), the spam rating index, the spam of the sender or responder calculated by the system that collects and processes the spam report of the user when the incoming Spam level information such as a rating is displayed on the called party's terminal to wait for user selection.
The spam level may be displayed for all senders, or the spam level may be displayed when the spam level of the sender (eg "suspect") reaches a predetermined level. When the called party receives an incoming call from a caller who is not in the phone book, he or she decides whether or not to check the message by considering the spam evaluation index displayed on the called terminal.
In one embodiment of the present invention, when the sender voluntarily gives the called party an "advertisement" display (<Lending Advertisement>, <Advertisement Advertisement>) as the caller information display, it gives an advantage in calculating the spam evaluation index. For example, if the spam report is 1 point deduction, send the "advertisement" mark sender 0.1 point deduction per case. Alternatively, if the spam reporter of the "advertisement" indicator is reported, the user can be blocked only by the user without degrading the spam evaluation index.
This encourages telemarketers or advertisers to voluntarily display caller information as <advertisement> to enhance the caller's choice of call. Application for displaying "advertisement" display as the caller information display can be applied in the caller information display service menu in the terminal, for example in the terminal can be applied in the menu "check, set up and objection of spam" of the person. As another example, it may be associated with a caller text / nickname providing service (lettering service).
In one embodiment of the present invention, the system assigns a trust mark to the telephone numbers of public offices, government agencies, trust companies, and trusted financial institutions, so that caller information such as trust marks (e.g., <clean number>) is associated with a phone number and spam level. To be provided to the called party together. The public office, government agency, trust company, and trust financial institution to which the caller belongs should register the internal phone number with the telecommunication company or the government agency to prevent the malicious caller from impersonating the specific agency.
Here, the selection of a trust company and a trust financial institution may be selected by a telecommunication company or a related government agency.
As described above, the present invention has the benefit of reducing the time for the called user to recognize a specific spammer as a spammer, and protecting the user's right to answer a call from the spammer since the called party receives the spam level of the sender or the responder. .
In addition, since spam reporting is convenient and the effect of spam reporting of users is immediately displayed, more users are participating in spam reporting, so that system operators of government agencies or telecommunication companies can identify spammers quickly and systematically.
8A is an exemplary diagram for explaining a message displayed on a called terminal and a calling terminal according to a spam report according to the present invention.
8a (a) shows a message that is received from a spam report and is sent to a spam responder's originating terminal after the spam evaluation index calculation, whereby the spam reporter has a spam score of 75 to 74. You will notice that it fell to a point.
8A (b) shows a message that is received from a spam report, is sent to the recipient terminal of the spam reporter after the spam evaluation index calculation, and thereby the spam reporter recognizes that the spam report has been properly received and at the same time, You can check the spam score.
Therefore, the present invention can be immediately seen through the terminal, the result reported by the spam reporter, as can be seen through Figure 8a, the spam reporter can recognize their own spam report and can also check their current spam evaluation index. . In addition, the spam respondent may file a complaint against the spam report on the screen of FIG. 8A (a). Detailed description thereof will be described later.
8b is an exemplary view showing a screen of a terminal at the time of incoming call according to the present invention.
8B (a) shows that when a call is received, the called terminal displays the spam level, that is, the spam rating (eg, suspicious) according to the spam evaluation index (for example, 85 points) and the spam evaluation index along with the outgoing telephone number. do. For convenience of explanation, when the sender owns one phone number, an example of displaying the sender's spam evaluation index and spam level is shown.
Even in an embodiment in which the sender owns several phone numbers, one or more may be displayed to the called party by distinguishing the sender's spam evaluation index from the sender's originating phone number / terminal.
FIG. 8B (b) shows that the called terminal receiving the message by the message originating request displays the spam rating index (for example, 72 points) and the spam rating (for example, risk) corresponding to the spam rating index along with the calling telephone number. do.
8b (c) shows that when a call is received, the called terminal is sent along with the outgoing phone number when the caller originates from a clean number, and a spam evaluation index (for example, 100 points), a spam rating (for example, safety), and a trust number. (Clean number) is displayed. Here, the sender's organization can be displayed along with the clean number.
FIG. 8B (d) shows that when a call incoming that indicates that the caller is a loan advertisement occurs, the called terminal is a spam rating index (for example, 78 points), a spam rating (for example, risk) and a loan advertisement together with the outgoing telephone number. Display.
In one embodiment of the present invention, a call with a low spam rating index suspected or ascertained as spam (when the spam rating index is lower and a higher spam level) is displayed differently from a high spam rating index so as to be recognized at a glance.
For example, phone ringtones or vibrations ring with different color vibrations / ringtones than regular telephones, alerting the recipient to possible spam. Alternatively, incoming calls with a high probability of spam may not cause vibrations / rings to ring or make the strengths of the vibrations / rings less than general incomings. As another example, a call with a high possibility of spam is delayed for a certain time and sent to the called party to make a lot of callers wait.
As another example, a call with a high spam rating may have a challenge response if set by the server or called party. A caller must respond to a challenge question (eg, press 51) to make a call.
9 is a flowchart illustrating a method for checking and processing the validity of a spam report according to the present invention.
First, as an example of the feasibility test for spam report, the step of receiving a spam reporter (S901) enables spam reporting only when a call or a message that is the subject of spam report is received, thereby preventing a malicious person from reporting malicious or mischief to some extent. do.
The malicious person may be a spammer who reports a false spam to a normal user for the purpose of disturbing the spam processing system of the present invention that suppresses the spammer's activity, or a spam reporter who falsely and mischief to harass a specific person.
Inspection in step 901 (S901) may be performed at the server side, such as
Checking and processing the spam reporter spam level or mistake / false report (S902), the spam reporter's spam level or whether the spam level of the spam reporter is close to spammers, or if the mistake / false report If there is more than one, either ignore the spam report or adjust the score of the spam report to reflect the spam score.
For example, if the spam report of the public is 1 point deduction in calculating the spam evaluation index, the spam report of the reporter who made the mistake / false report twice is reduced by 0.8 points depending on the value of the report authority. In the present invention, the more spam reports to induce the user's participation, the service fee can be reduced or profits, such as points, if you make a mistake / false report a profit or a certain disadvantage.
The step of checking whether the caller is registered in the recipient's phone book / address book (S903) checks and processes the call from the user registered in the phone book / address book so that the recipient does not report spam.
In one example, if there is a caller in a recent phonebook / address book within a predetermined time limit from the present recipient in the past, the caller may not report the sender to spam, thereby preventing mischief and malicious spam reporting.
Spam report whether or not within a preset time / number of times (S904), the time between the call / message receiving time and the spam reporting time or the number of call / message communication between, and the spam report within a predetermined time / number of times Determine and process. Spam reporting should be possible only within a predetermined time or number of times after receiving a call / message.
In the step S905 of checking whether the spam report limit is exceeded, in order to prevent a malicious person or a spam processing system disturber from disturbing a large number of spam reports, the spam report limit is set for a predetermined time and the reporter's current spam report exceeds the limit. Check whether you have done so.
Spam reporter before the incoming call check step (S906), the spammer or malicious to send out the first like the one-line spam, hang up, and then prevent the well-known user to spam after inducing the well-known user to send to the spammer or malicious In order to do this, it is checked whether the caller has previously sent the caller who is the target of the call.
In the present invention, the inspection may be performed by performing at least one of the above-described inspection steps.
10 is a flowchart illustrating a method of processing an objection of a user who has received a spam report according to an embodiment of the present invention. The process of FIG. 10 is to prevent a user from reporting a spam by malicious, mischievous, and mistaken objection through the objection processing of a spam reporter, and to clearly distinguish spammers.
First, an objection is made using the spam reporter terminal (S1001).
The system then receives an objection (S1002). Accordingly, the operator of the system of the telecommunication company selects an objection to be processed according to a predetermined priority among the objections received, and checks related evidence to evaluate spam (S1003). The evidence here is the content of the call or message reported.
Then, according to the spam evaluation result in step 1003 (S1003), the system adjusts the spam level of the respondent in step 1004 (S1004), and if it is determined as a mistake / false report, the reporting authority is reduced by reducing the value of the right to report the mistake / false reporter. do.
If it is determined in step 1003 (S1003) that the spam, the system may change the spam level of the respondent to the determination of spam.
After that, the system notifies the objector of the evaluation result (S1005), and if it is determined to be a mistake / false report, notifies the evaluation result to the mistake / false reporter (S1006).
11A through 11E are diagrams of database configuration of a spam control server according to an embodiment of the present invention. 11A to 11E illustrate a database table in which the sender and the replyer assume the same situation for convenience of description, and a table displaying both the sender and the replyer can be added by adding some fields.
11A is an example of a spam report table, which is a basic record table of spam reports received by the
The spam reporter's forwarding number is the spam reporter's phone number that reported the sender, and the spam report type indicates the spam report type when two or more spam reports are classified.
The spam report time may be a spam report time, and preferably represents a time of a call or a message received as a spam report. Although not shown in the example table, the table may include a link to the call content or the received message content. The link is used by the operator of the telecommunications system to confirm whether the respondent is spam.
11B is an example of the spam evaluation index table, which is a basic table of the spam evaluation index calculated by the
The user identifier indicates the subscriber's identifier (resident registration number, business registration number), and has a field for displaying the current calculated spam score and the current spam score change rate (change of spam score per day). There is also a reporting time field.
The first record and the second record indicate a situation in which, when a user owns two terminals, the spam reports of the two terminals are added up to calculate the spam evaluation index of the user.
In the first record, a user's terminal reported spam suspects, and the user's spam evaluation index dropped to 88 points, and in the second record, the user's other terminal reported spam confidence and the user's spam evaluation index dropped to 86 points. .
11C is an example of a spam evaluation index and a history table of spam reports. The table shows that the users identified by the user identifiers have been reported spam in the order of spam notification serial numbers, and shows the history of changes in the phone number of the responding terminal and the user spam evaluation index.
It also shows the phone number of the reporter who spammed the user and the spam score of the reporter.
11D is an example of a spam report management table. The table shows that users classified by user identifiers reported spam in the order of spam report serial number, and shows the reporting authority, the phone number of the responding terminal, and the spam score of the respondent. The right to report is reflected in the spam evaluation index of the respondent when the reporter's spam report is reported. If a mistake / false report is made, the right to report is reduced. It shows an example of deducting 0.1 points by mistake when making a mistake / false report, and the record that the authority to report is lowered is a spam report confirmed as a mistake / false report by the respondent's objection. In one example, the right to report may be raised again if there is no mistake / false report for a predetermined time.
11E is an example of a user phone book and a caller information display table. The user's phone book and caller information display information may be stored only in the user's terminal and may be received and used from the terminal if necessary, or stored in the server.
In addition, a separate server that functions to store and transmit a caller's phone number and a phrase or nickname set by the caller may be linked to the
The table registers and stores the phone book / address book of each terminal owned by the user identified by the user identifier.
An individual caller phrase / nickname in the table means a phrase (such as "I miss you") that you want to appear as a caller phrase / nickname when you call from that particular phone number, and a caller phrase / nickname appears on your phone number It means the phrase to be displayed when calling on (for example, "hello. ***."). The display of individual ads in the table refers to the text that will appear as a caller ad when calling to that specific phone number (for example, <card ad>), and the display of advertising to appear when calling on a phone number that is not set individually. (Eg <loan ad>).
By displaying the caller advertisement, the caller's right to call can be guaranteed and the sender can benefit from the calculation of the spam evaluation index. If a clean number is assigned, data other than "N" is recorded in the clean number display.
12 is a block diagram of a spam processing system according to another embodiment of the present invention. In FIG. 12, an operation procedure of an Internet telephone call and an Internet telephone incoming call will be described.
First of all, the case of using SIP (Session Initiation Protocol), which is a representative protocol of VoIP (Voice over Internet Protocol), is shown as an example, and of course, other protocols such as H.323 can be easily changed.
SIP is an application layer protocol that describes the procedures for identifying and locating terminals and for creating, modifying and terminating multimedia communication sessions between terminals in a packet communication network including the Internet.
Creates, modifies, and terminates sessions such as Internet telephony, Internet multimedia conferencing, and instant messenger among VoIP terminals capable of voice communication, such as PC, Internet phone, and mobile phone, regardless of network transmission protocol and media. .
SIP network is composed of UA (User Agent) and server. The UA is divided into a user agent client (UAC), which is a logical entity serving as a client making a call setup request, and a user agent server (UAS), which is a logical entity serving as a server that receives a call request and sends a response thereto.
Since UA collectively refers to SIP-enabled terminals such as Internet phones and mobile phones, Internet phones (
SIP Proxy Servers (1211, 1212), SIP Registrar Server (1213), SIP Location Server (1214), SIP Redirect Server (1215) Etc.
The
If the UAS exists in the same domain, the session request is sent directly to the UAS. If the UAS exists in another domain, the session request is sent to the proxy server of the domain. In the figure,
The
The
When the
The
In one embodiment, most of the method of the present invention is implemented in the
In another embodiment, the
If the
When the
Spam level indicates spam and the degree of spam and can be expressed through spam evaluation index.
The
The
In another embodiment, the
Calls made by the originating terminal that are not confirmed as spammers and that the terminating terminal does not register itself as spam are connected to the terminating terminal via the originating
The sender information display function such as a clean number and advertisement display may be implemented in the
While the above has described an embodiment in which an Internet telephone is called and an Internet telephone is called, the mobile telephone terminal, the Internet telephone, and the wired telephone are sent from any one of mobile terminals, Internet telephones, and wired telephones with only minor modifications known to those skilled in the art. The method of the present invention may be applied to all cases received by any one of the terminals.
When the
The
The
In addition, the
As an example of a message processing method, a message by a calling terminal that is determined to be a spammer or that the called terminal has registered itself as spam is blocked.
A message by a calling terminal that is not confirmed as a spammer and that the called terminal has not registered itself as spam is transmitted to the called terminal.
At this time, according to the present invention, the spam evaluation index of the calling terminal is transmitted to the called terminal and displayed.
The incoming
Although the embodiment in which the
FIG. 13 is a flowchart illustrating a process of processing spam when a mobile communication network and a public switched telephone network (PSTN) interwork with a internet connection according to another embodiment of the present invention.
First, when the
When the
In operation 1304, the response message may be transmitted to the
In one embodiment, the response message is transmitted including not only the spam level of the sender or the calling terminal, but also whether the sender or the calling terminal is registered in the called party's own spam list. In this case, even if the spam level of the calling party or the calling terminal is low, if the called party is registered in the spam list of the called party, it is regarded as a spam call.
In another embodiment, if the spam processing service is provided as a basic service, the originating proxy server A 1311 may query the spam level with the
After operation 1304 (S1304), the
If the spam level calculated from the spam report of multiple users for the sender or the calling terminal is determined to be spam, or if the system operator confirms it as spam or is registered on the called party's own spam list, the call blocking is determined in step 1305 (S1305). The call
Thereafter, the outgoing
In step 1305 (S1305), if the spam level calculated from the spam report of the multiple users for the sender or the calling terminal is not confirmed as spam, and if the additional service is not registered in the spam list when providing the recipient's own spam list. In operation S1308, it is determined that the call connection should be made.
The call routing request message contains spam level information of the calling party or calling terminal. The incoming
The
The location request response message may include spam level information received through the response message for the spam level query from the
Incoming
The
14 is a flowchart illustrating a process of processing spam during message transmission by interworking with a mobile communication network and a public switched telephone network (PSTN) centering on an internet telephone network according to an embodiment of the present invention. For convenience of explanation, a flowchart of spam control between terminals in an Internet telephone network is shown.
When the
The outgoing
When the
The
In operation 1405, the response message may be transmitted to the originating
In one embodiment, the response message is transmitted including not only the spam level of the sender or the calling terminal, but also whether the sender or the calling terminal is registered in the called party's own spam list. In this case, even if the spam level of the calling party or the calling terminal is low, if the called party is registered in the spam list of the called party, it is regarded as a spam call. In another embodiment, if the spam processing service is provided as a basic service, the
After step 1405 (S1405), the
If the spam level calculated from the spam report of multiple users for the sender or the calling terminal is determined to be spam, or if the system operator confirms it as spam or is registered in the called party's own spam list, it is determined in step 1406 that the message transmission is blocked. Information to be sent to the outgoing
Thereafter, the originating
In step 1406 (S1406), if the spam level calculated from the spam report of multiple users for the sender or the calling terminal is not confirmed as spam, it is not registered in the spam list when providing the recipient's own spam list as an additional service. If so, it is determined that the message should be transmitted, and a message routing request is made (S1408).
The message routing request message contains spam level information of the sender or the calling terminal. The destination
The
The location request response message may include spam level information received through the response message for the spam level query from the
The incoming
The
Meanwhile, in the detailed description of the present invention, specific embodiments have been described, but various modifications are possible without departing from the scope of the present invention. Therefore, the scope of the present invention should not be limited to the described embodiments, but should be defined not only by the scope of the following claims, but also by those equivalent to the scope of the claims.
1 is a block diagram of a spam processing system of the present invention.
2 is an internal configuration diagram of a spam control server in FIG. 1;
3 is a flow chart showing a spam call processing process of the present invention.
4 is a flowchart showing a spam message processing process of the present invention.
5 is a flowchart illustrating a spam registration process according to the present invention.
6 is an exemplary view showing a terminal screen when reporting spam according to the present invention.
Figure 7a is a flow diagram illustrating a spam information sharing method according to the present invention.
FIG. 7B is a flowchart illustrating a spam evaluation index calculation process in FIG. 7A; FIG.
8A is an exemplary diagram for explaining a message displayed on a called terminal and a calling terminal according to a spam report according to the present invention;
Figure 8b is an exemplary view showing a screen of the terminal at the time of call in accordance with the present invention.
9 is a flow chart showing a method for checking and processing the validity of spam reports in accordance with the present invention.
10 is a flowchart illustrating a method for processing an objection of a user who has received a spam report according to an embodiment of the present invention.
11a to 11e is a database configuration diagram of a spam control server according to an embodiment of the present invention.
12 is a block diagram of a spam processing system according to another embodiment of the present invention.
FIG. 13 is a flowchart illustrating a process of processing spam when a mobile communication network and a PSTN network interwork with each other in connection with an internet network according to another embodiment of the present invention. FIG.
14 is a flowchart illustrating a process of processing spam during message transmission by interworking a mobile communication network and a PSTN network centering on an Internet telephone network according to an embodiment of the present invention.
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080021493A KR100946983B1 (en) | 2008-03-07 | 2008-03-07 | Method and apparatus for processing spam |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080021493A KR100946983B1 (en) | 2008-03-07 | 2008-03-07 | Method and apparatus for processing spam |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20090096113A KR20090096113A (en) | 2009-09-10 |
KR100946983B1 true KR100946983B1 (en) | 2010-03-10 |
Family
ID=41296361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020080021493A KR100946983B1 (en) | 2008-03-07 | 2008-03-07 | Method and apparatus for processing spam |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR100946983B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170027123A (en) | 2015-09-01 | 2017-03-09 | 에스케이텔레콤 주식회사 | Methods, computer programs and recording medium for calling information presentation by application linkage |
KR102169410B1 (en) | 2019-04-18 | 2020-10-28 | 권봉선 | Caller information providing mobile application system |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101395831B1 (en) * | 2013-06-21 | 2014-05-16 | 에스케이플래닛 주식회사 | System and method for missing child report service, and apparatus applied to the same |
KR101695968B1 (en) | 2015-04-08 | 2017-01-13 | 네이버 주식회사 | Method for evaluating importance of received messages and dispalying list of received messages in a mobile terminal |
WO2016176472A1 (en) * | 2015-04-28 | 2016-11-03 | Trans Union Llc | System and method for automated communications session routing in a communications handling system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060124366A (en) * | 2005-05-31 | 2006-12-05 | 에스케이커뮤니케이션즈 주식회사 | Spam mail filtering method, server and system for the same |
WO2007047087A2 (en) * | 2005-10-19 | 2007-04-26 | Microsoft Corporation | Determining the reputation of a sender of communications |
KR20070065267A (en) * | 2004-05-25 | 2007-06-22 | 포스티니, 인크. | Electronic message source reputation information system |
KR20070090660A (en) * | 2006-03-03 | 2007-09-06 | 엔에이치엔(주) | Method and system for managing spam list using spam index |
-
2008
- 2008-03-07 KR KR1020080021493A patent/KR100946983B1/en not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070065267A (en) * | 2004-05-25 | 2007-06-22 | 포스티니, 인크. | Electronic message source reputation information system |
KR20060124366A (en) * | 2005-05-31 | 2006-12-05 | 에스케이커뮤니케이션즈 주식회사 | Spam mail filtering method, server and system for the same |
WO2007047087A2 (en) * | 2005-10-19 | 2007-04-26 | Microsoft Corporation | Determining the reputation of a sender of communications |
KR20070090660A (en) * | 2006-03-03 | 2007-09-06 | 엔에이치엔(주) | Method and system for managing spam list using spam index |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170027123A (en) | 2015-09-01 | 2017-03-09 | 에스케이텔레콤 주식회사 | Methods, computer programs and recording medium for calling information presentation by application linkage |
KR102169410B1 (en) | 2019-04-18 | 2020-10-28 | 권봉선 | Caller information providing mobile application system |
Also Published As
Publication number | Publication date |
---|---|
KR20090096113A (en) | 2009-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11316973B2 (en) | Methods and systems for inbound and outbound call control | |
CN1794762B (en) | Spam checking for internetwork messages | |
US7895154B2 (en) | Communication reputation | |
US20140105373A1 (en) | Methods and systems for inbound call control | |
WO2016065908A1 (en) | Method, device and system for detecting fraudulent user | |
CN103763690A (en) | Method and device for sending short messages to mobile terminal from detection fake base station | |
CN102611746B (en) | Method and system for sharing contact person information | |
US10230837B2 (en) | Methods and systems for inbound and outbound call control | |
JP2013005205A (en) | Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system | |
US11706336B2 (en) | Managing spoofed calls to mobile devices | |
CN102802133A (en) | Junk information identification method, device and system | |
KR100946983B1 (en) | Method and apparatus for processing spam | |
Sahin et al. | Over-the-top bypass: Study of a recent telephony fraud | |
KR101306074B1 (en) | Method and system to prevent phishing | |
KR20090096111A (en) | Method and apparatus for processing spam | |
US10778732B2 (en) | Method of detecting a spoofing of identity belonging to a domain | |
CN111726796A (en) | System and method for traffic control based on IMS | |
KR100767968B1 (en) | Spam Call Blocking Service System And Method | |
KR20070100993A (en) | Apparatus and method for trapping spam calls and spam messages | |
KR101593954B1 (en) | Spam filtering system for preventing filtering of a legal sms and spam filtering method thereof | |
KR101478835B1 (en) | The system to prevent voice phishing and its method | |
KR101397098B1 (en) | Method and apparatus for collection of abnormal call | |
KR101936421B1 (en) | Method for providing sender easy-blocking service using do-not-call registered device only | |
KR20170081491A (en) | Method and communication system for providing dynamic messaging security in asymmetric multi mobile data network | |
Li et al. | Mobile Social Service User Identification Framework Based on Action-Characteristic Data Retention |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
J201 | Request for trial against refusal decision | ||
B701 | Decision to grant | ||
GRNT | Written decision to grant | ||
LAPS | Lapse due to unpaid annual fee |