TW201246900A - Method and system capable of verifying network-dialing caller ID and detecting malicious network call - Google Patents

Method and system capable of verifying network-dialing caller ID and detecting malicious network call Download PDF

Info

Publication number
TW201246900A
TW201246900A TW100116257A TW100116257A TW201246900A TW 201246900 A TW201246900 A TW 201246900A TW 100116257 A TW100116257 A TW 100116257A TW 100116257 A TW100116257 A TW 100116257A TW 201246900 A TW201246900 A TW 201246900A
Authority
TW
Taiwan
Prior art keywords
network
sip
calling
telephone number
malicious
Prior art date
Application number
TW100116257A
Other languages
Chinese (zh)
Inventor
Chung-Yu Lin
Original Assignee
Chung-Yu Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung-Yu Lin filed Critical Chung-Yu Lin
Priority to TW100116257A priority Critical patent/TW201246900A/en
Publication of TW201246900A publication Critical patent/TW201246900A/en

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a method and system capable of verifying network-dialing caller IDs and detecting malicious network calls, which comprises a network-dialing caller ID verification and malicious network call detection system, a registration interface, a retrieving interface, a searching software, a search database and an indication software in which the search database contains registered and stored phone number and network-dialing account setting data of each network-dialing user. After the searching software executed the comparison between the caller ID within the network-dialing signal and account setting data within the network-dialing signal of a network-dialing equipment and the phone number and network-dialing account setting data stored in the search database, if at least one of them doesn't match, the indication software can send an indication signal to the receiver. After the receiver receives the corresponding indication showing "No Pass", this can be used as the basis for differentiating reality from fraud incoming call, so as to determine whether current incoming call is fraudulent and thereby prevent the occurrence of telephone fraudulent crime.

Description

201246900 六、發明說明: 【發明所屬之技術領域】 本發明是關於一種「可對網路發作 |α王叫電話號 碼驗證與惡意網路發信偵測之方法及龙 人升杀統」,其對 昨編電話的主叫電話號碼具有主動踏、 • 土動騄逄之功能,並 經由標示軟體在接通當次通信之受作去 _ 又Ίβ者受信設備的 主叫電話號碼欄位中標示『無法通過網路發信主叫 電話號碼驗證』之對應標示,而提供受信者在接^ 當次通信前可目視得知來預做防範之準備, 1 口J丹 將該網路發信信號內含「主叫電話號碼」及「帳號 設定資料」儲存至「無法通過網路發信主叫電話號 碼驗證之網路發信資料庫」,藉以主動偵測惡意網路 發信。 【先前技術】 使用電話進行詐騙金錢的犯罪模式,約自2〇〇〇 年開始在台灣出現及流行,近三年來更已擴及中國 _ 地區’電話詐騙之金額及受害者人數均不斷升高, -為防止民眾再受害,電信主管機關國家通訊傳播委 員會(NCC )乃要求電信公司及國際網路業者應設置 國際來話識別及阻斷機制,藉以對特定主叫電話號 瑪號碼進行攔阻與過濾,但在電話詐騙歹徒技術不 斷翻新下’竟然也能篡改主叫電話號碼號碼,使得 4 201246900 電話詐騙集圑仍能輕易迴避現有國際來話識別及阻 斷機制’持續以屬於法院、地撿署等政府機關的電 話號碼為主叫電話號碼號碼的詐騙電話聯繫被害 人,藉以取信被害人進而誘使被害人再度上當受 騙。由於詐騙電話的主要來源是網路發信,其與各 國電信業者所探用的七號信令電信系統(Signaling201246900 VI. Description of the Invention: [Technical Field of the Invention] The present invention relates to a method for "network attack|α-called phone number verification and malicious network transmission detection" The calling telephone number of the telephone number of the previous day has the function of active stepping, earth moving, and is marked in the calling telephone number field of the receiving device of the communication device by the marking software. The corresponding indication of "Cannot send the caller's phone number verification through the network", and the recipient can be visually aware of the preparation for precaution before the current communication, 1 J Dan sends the network signal The "Calling Phone Number" and "Account Settings Data" are stored in the "Network Sending Data Base that cannot be verified by the calling party's phone number on the Internet" to actively detect malicious network sending messages. [Prior Art] The criminal model of using the phone to swindle money has appeared and popularized in Taiwan since the beginning of the next two years. In the past three years, it has expanded to China _ region. The amount of telephone fraud and the number of victims are rising. - In order to prevent people from being victimized again, the National Communications and Communications Commission (NCC), the telecommunications authority, requires telecommunications companies and international network operators to set up an international call recognition and blocking mechanism to block the specific calling number. Filtering, but after the phone fraud gangster technology is constantly being refurbished, 'can even tamper with the calling number, so that the 4 201246900 phone fraud collection can still easily avoid the existing international call recognition and blocking mechanism' continues to belong to the court, the cellar The telephone number of the government agency and other government agencies contacted the victim with a fraudulent telephone number called the telephone number number, in order to obtain the victim and then induce the victim to be deceived again. Since the main source of fraudulent telephone calls is the Internet, it is the Signaling Telecommunications System (Signaling) that is used by national telecom operators.

System Number 7 ’簡稱SS7)皆相互聯通,且各國 電信業者之國際話務傳輸因為降低國際話務傳輸成 本的需求逐渐網路化,而與網路發信之話務混雜在 一起,因此,國家通訊傳播委員會(NCC)要求各電 信業者必須建立「國際詐騙電話防堵技術」,藉由在 國際交換機上攔阻主叫電話號碼中呈現國內電話號 碼之發信與特殊設定進行攔阻之電話號瑪,以達成 阻止電腦主機發信設在他國(例如中國)但電話詐 騙受倌卻在本_ (例如台灣),並篡改主叫電話號碼 透過網路發信進杆+加gg七_ & ^ 丨。延仃I犯罪行為,然而其效果至今仍 不彰顯’其因如下: .'、、效的過濾」:由於「國際詐騙電話防堵括 術j疋對可疑發作具料ϋ jU* 是對發信端之主叫電話號碼進的 過濾攔阻,但由於網路、 鬥相·赞1H的發jg端二王叫電話载 碼可隨意變更,導劫_ 導致作騙集團僅藉由變更主叫電韵 5 201246900 號碼就可以輕易避開現有的「國際詐騙電話防堵技 術」。 2. 「過度的攔阻」:由於「國際詐騙電話防堵技 術」’對可疑發信皆是以逕行攔阻為對應機制,但國 際話務中有些正常發信可能因「未帶主叫電話號碼 號碼」或「主叫電話號碼號碼之顯示不全」(例如未 帶國碼等…)’將會使得系統誤判其為詐騙電話,而 遭到不當之攔阻並造成發信受阻。 3. 「業者的反彈」:由於「國際詐騙電話防堵技 術」,對可疑發信皆是以逕行攔阻為對應機制,不僅 「過度攔阻」會增加電信業者之客訴,造成商譽的 損失與客服人力成本的增加,「被攔阻的話務」更會 減少電信業者之營收,以致電信業者心生反彈而有 不願配合或消極配合之現象,其對電信業者根本、 具有積極推展之誘因。 4·「民眾的困擾」:全面性的攔阻是最有效的詐 騙防治方法,但由於過度攔阻產生的通信不 、 % ,將 同時造成發信與受信民眾的困擾,使得電信業者 合政府防治詐騙電話的美意,容易衍生成為另 怨之來源。 再者’因電話詐H歹徒已普遏具有篡改主叫電 6 201246900 話號碼號碼的能力,致使受信者已無法從主 號碼中去辨識發信者電話號碼之真偽,因此 一種使電信業者樂於推動且對受信者又具有 話標示與惡意發信偵測功能之方法,實有實 騙防治之立即需求。 另於美國專利申請案號US 1 1/699330 ( 號:US2008/018 1379 ),所揭露之技術,係以 置憑證驗證機制來進行使用者名稱之驗證, 者除需要重新建構電信設備以外之憑證驗 外’用戶端设備也需對新建之憑證驗證機制 應配置,於通信時原電信設備也需與憑證驗 再另行建構憑證驗證通道,反而對其經濟效 統相容與通信效能等產生多重限制,相當$ 即推廣運用。 因此,如何發明一種建構在電信業者既 架構與設備上’且用戶端設備也無需進行 變’使得在通信時原電信設備也無需與驗證 另行建構額外之驗證通道,可兼顧經濟效益 相容與通信效能之解決方案,便顯得更為迫 要。 【發明内容】 叫電話 ,創造 詐騙電 務上詐 公開編 另外建 電信業 證系統 進行對 證系統 益、系 利於立 有電信 任何改 系統再 、系統 切與需 201246900 本發明之王要目的是在提供一種「可對網路發 相王叫電話號碼驗證與惡意網路發信偵測之方法及 其系統」’其步驟包括: a.導引每一網路發信使用者經由電信網路或網 際網路進入「網路發信主叫電話號碼驗證與惡意網 路發信電腦偵測系統」之登錄介面,並輸入其「電 話號碼」及「網路發信帳號設定資料」於該登錄介 面中; b ·登錄介面收到「電話號碼」及「網路發信帳號 設定資料」,會立即通過「電話號碼使用權驗證程序_ 後,再將該「電話號碼」及「網路發信帳號設定資 料」一起儲存於「網路發信主叫電話號碼驗證與惡 意網路發信電腦偵刺系統」例服器X搜尋f料庫內; c.每-網路發信設備所送出的發信經由電信網 路會透過「網路發信主叫電話號碼驗證與惡意網路 發信價測系統」之擷取介面’而將該網路發信設備 之「網路發信信號内含主叫電話號碼」及「網路發 信信號內含帳號設定資料」自該網路發信信號榻 取,並傳入「網路發倌主叫電話號碼驗證與惡意網 路發信偵測系統」之搜尋軟體後’該搜尋軟體會將 該網路發信設備之「網路發信信號內含主叫電話號 201246900 碼」及「網路發户 傳送至 驶馅信號內含帳號設定 搜尋資料庫進并u 科 竹厍進仃比對;及 電話號若碼:網:「:信設備之「網路發信信號內… 肩路發信信號內含帳號設定資料 與搜尋資料庫內所儲存的「電話號碼」及「網路發 信帳號設定資料」比對後至少有其中—項不符合, Ρί工由‘不軟體在接通當次通信之受信者受信設備 的王叫電話號碼欄位中進行『無法通過網路發信主 :電話號瑪驗證』之對應標示,以供受信者在接聽 田次通4前可預做防範之準備,並將該網路發信設 備之網路發信信號內含主叫電話號碼」及「網路 發信彳s號內含帳號設定資料」儲存至「無法通過網 路發信主叫電話號碼驗證之網路發信資料庫」内, 以提供日後藉由統計分析,來進行主動價測惡意網 路發k端的動態;反之,若比對符合,即經由標示 軟體在接通當次通信之受信者受信設備主叫電話號 碼中標示『通過網路發信主叫電話號碼驗證』之對 應標示’可使受信者經目視後而能放心接聽當次的 來話。 藉由目視該『無法通過網路發信主叫電話號碼 驗證』之對應標示,受信者可對當次的來話進行辨 9 者被p外h 4騙電話』詐騙之 L、〜種「可對網路發 意網路發信偵測之方法及 過度搁P且造成民眾與電信 ;罔路發信t「網路發信信 網路發信信號內含帳號 發t主叫電話號碼驗證與 之搜尋資料庫」進行比 該網路發信仍會被接通, 過網路發信主叫電話號碼 「過度攔阻」造成民眾之 e斥’也不會對電信業者營 消除電信業者不願配合或 達到有效制止電話詐騙之 在提供一種「可對網路發 意網路發信偵測之方法及 因需額外投資建置電信設; 產生抗拒,以及用戶端設 系統進行對應配置而發生 201246900 識真偽之判斷,減少受信 可能。 本發明之另一目的是 信主叫電話號碼驗證與惡 其系統」,其完全避免因為 業者之困擾與抗拒,並將 號內含主叫電話號碼」及 設定資料」傳送至「網路 惡意網路發信偵測系統」 對後’若比對不符合時, 但會進行對應之『無法通 驗0登』標示’故不會因為 不便與增加電信業者之客 收產生減少之結果,更能 消極配合之現象,以早日 犯罪。 本發明之又一目的乃 h主叫電話號碼驗證與惡 其系統」,為避免電信業者 備以外之憑證驗證系統而 備也因需與新增憑證驗證 10 201246900 相容障礙,甚至佶;# 通仏&程因必需與新增憑證驗證 系統另建憑證驗證通道造成效能下降等缺失,本發 明網路發h王叫電話號碼驗證與惡意網路發信偵 屈之方法及其系統」可完全建構在電信業者既有電 信架構與系統上,用戶端設備也無需進行任何改 變’通信時原電信設備更無需配合與「網路發信主 叫電話號瑪登與惡意網冑發信#测之方法及其系 統」未另外建構額外之憑證驗證通道,故具有兼顧 經濟效益、系統相容與通信效能等諸多優點。 【實施方式】 請參閲第一圖及第二圖所示,係本發明「可對 網路發信主叫電話號碼驗證與惡意網路發信偵測之 方法及其系統」的方法,其步驟包括: a•導引每一網路發信使用者S經由電信網路N 或網際網路I進入「網路發信主叫電話號碼驗證與惡 意網路發信電腦偵測系統」1 〇之登錄介面2〇,並輸 入其「電話號碼」21及「網路發信帳號設定資料」 22於該登錄介面20中; b.登錄介面20收到「電話號碼」21及「網路發 信帳號設定資料」22,會立即通過「電話號碼使用 權驗證程序」23後,再將該「電話號碼」21及「網 201246900 發L帳號⑨定資料」22 —起儲存於「網路發 叫電話號碼驗證與惡意網路發信電腦偵測系統 之搜尋資料庫50內; c.網路發信設備S1所送出每一網路的發信 ^由電信網路N或網際網路I進入「網路發信 電話號碼驗證與惡意網路發信電腦偵測系統 後該網路發信主叫電話號碼驗證與惡意網 H腦價测系統J 1 〇內之擷取介面30會自動由 路發彳g信號中擷取其「網路發信信號內含主叫 號•碼J S2及「網路發信信號內含帳號設定資料」 並傳送至「網路發信主叫電話號碼驗證與惡意 發仏電腦偵測系統」10之搜尋軟體40後,該搜 11 4Q t $該「網路發信信號內含主叫電話號碼 及「網路發信信號内含帳號設定資料」S3,傳 搜尋資料庫50進行比對;及 .d.若與搜尋資料庫50内所儲存的「電話號 2 1及「網路發信帳號設定資料」22比對後至少 tb -a- —項不符合’即經由標示軟體60在接通當次 之受诏者受信設備R1的主叫電話號碼欄位R2 不『無法通過網路發信主叫電話號碼驗證』之 ’以供受信者在接聽當次通信前可預做防 信主 」10 信號 主叫 」10 路發 該網 電話 S3, 網路 尋軟 」S2 送至 碼J 有其 通信 中標 對應 範之 12 201246900 準備,並將該「絪收丄上 網路發彳§設備」s 1之「網路發信信 號內含主叫雷钱# 电#號碼」S2及「網路發信信號內含帳 號没疋資料」S3冑存至「無法通過網路發信主叫電 話號碼驗證之網路發信資料庫」5…以提供日後 藉由統計分新步:;佳t 祈來進仃’王動偵測惡意網路發信端的 動態。 其中,該步驟d更包括一步驟(Γ:若步驟d中 網路發抬没備」S 1之「網路發信信號內含主叫電 話號碼」S2 &「網路發信信號内含帳號設定資料」 S3與搜尋資料帛50內所儲存的「電話號碼」21及 「網路發信帳號設定資料」22 t匕對符合,即經由標 不軟體60在接通當次通信之受信者受信設備的 主叫電話號碼欄位R2中標示『通過網路發信主叫電 。舌號碼驗』之對應標示,可使受信纟〖經目視後 而能放心接聽當次的來話。 「網路發信設備」S1之「網路發信信號内含主叫電 話號碼」S2 &「網路發信信號內含帳號設定資料」 “與搜尋資料庫內所儲存的「電話號碼」21及「; 路發信帳號設定資料」22比對符合,但「網路發卷 信號內含主叫電話號碼」S2與搜# f㈣Μ内^ 13 201246900 存的「電話號碼J 2 1比對不符合,則搜尋軟體40會 取彳寸搜尋資料庫50內所儲存對應的「電話號碼」2 1, 並於標不軟體60在接通當次通信之受信者受信設備 R1 &王叫電話號碼欄位R2中進行『無法通過網路 發七王叫電話號碼驗證』之對應標示時,同時顯示 二搜尋資料庫50取得的對應「電話號碼」21,以供 §者R在接聽當次通信前進一步得知發信端之真 實電話號碼。 ^述各步驟中之「電話號碼」2 1係為固網市話 =話號碼’或是行動電話之電話號碼;而「網路 帳號0又疋資料」22係由網路發信使用者$自行 另步驟a中該登錄介面2〇可更設為書 , 而由網路發# 寫其「 / 本人至電信業者處來臨櫃填 22 P舌號碼」2 1及「網路發信帳號設定資料」 ^ ’並經由電信堂:去、, 權驗證程序員完成「電話號碼使用 將該「二’再由電信業者之人員代為輸入, 電㈣舌號瑪I 21 r / 22 ^ iE = 及網路發信帳號設定資料」 網路發/存於「網路發信主叫電話號碼驗證與惡意 發化電腦偵測系統Jl0之搜尋資料座_ 201246900 話號碼驗證與惡意網路發信電腦偵測系統」ι〇之登 錄介面2G的方式’亦可選擇既有電信業者所提供之 直撥語音專線,或其既右 乂兵'既有所設之固網或行動加值網 站等方式來完成輸入。 又上述步騾中,該電信網路N係包括固 旧電p舌使用之公共交換電話網路pSTN ( pubHc Switched Telephone Network),以及行動電話使用之 〇SM 系統(Global System for Mobile C〇_unications )、TDMA 系統(Time Multiple Access )、CDMA 系統(c〇de Divisi〇nSystem Number 7 (referred to as SS7) is connected to each other, and the international traffic transmission of national telecom operators is gradually networked because of the need to reduce the cost of international traffic transmission, and is mixed with the traffic of the network, therefore, the national communication The Communications Commission (NCC) requires all telecommunications operators to establish an "international fraud phone anti-blocking technology" to block the telephone number and special settings of the domestic telephone number in the calling telephone number on the international switch. Achieved to prevent the computer host from sending a message in another country (such as China) but the phone fraud is in the _ (for example, Taiwan), and tampering with the calling phone number to send a letter through the network + add gg seven _ & ^ 丨. Delayed I crimes, but the effect is still not obvious. 'The reason is as follows: .', and the effect of filtering": Because "international fraud phone anti-blocking surgery j疋 on suspicious episodes ϋ jU* is to send a letter The end of the caller's phone number into the filter block, but because of the network, Dou Xiang · 1H's hair jg end two Wang called the phone code can be freely changed, the robbery _ caused the fraud group only by changing the caller's rhyme 5 201246900 number can easily avoid the existing "International Fraud Phone Anti-blocking Technology". 2. "Excessive Blocking": Because "International Fraud Phone Anti-blocking Technology" is a corresponding mechanism for suspicious sending, but some normal calls in international traffic may be due to "no calling number Or "the display of the calling party number is not complete" (for example, without the country code, etc.)" will cause the system to misjudge it as a fraudulent call, and is improperly blocked and caused the letter to be blocked. 3. "The rebound of the industry": Due to the "interventional fraud prevention technology", suspicious letters are blocked by the corresponding mechanism. Not only "excessive blocking" will increase the complaints of the telecom operators, resulting in the loss of goodwill. The increase in customer service costs, "blocked traffic" will reduce the revenue of telecom operators, and the telecom operators will rebound and have a reluctance to cooperate or passively cooperate. This is a fundamental and positive incentive for telecom operators. . 4. "People's troubles": Comprehensive blocking is the most effective method of fraud prevention, but the lack of communication due to excessive blocking will cause both the sending and receiving of the troubles, and the telecom operators will cooperate with the government to prevent fraud. The good intentions are easily derived into a source of additional grievances. Furthermore, because of the scam, the swindler has the ability to tamper with the caller’s number 6 201246900, which has made it impossible for the trustee to identify the authenticity of the sender’s phone number from the main number, thus making the telecom operators happy to push Moreover, the method of authenticating and maliciously detecting the function of the trusted person has an immediate need for deception. In addition, U.S. Patent Application No. US 1 1/699,330 (No.: US 2008/018 1379) discloses a technique for verifying a user name by using a voucher verification mechanism, in addition to re-establishing a voucher other than a telecommunication device. The external inspection 'customer equipment also needs to be configured with the new credential verification mechanism. In the communication, the original telecommunication equipment also needs to establish a voucher verification channel with the voucher, instead it will have multiple economic compatibility and communication efficiency. Restrictions, quite $ is promoted. Therefore, how to invent a construction on the architecture and equipment of the telecom operators and the user equipment does not need to be changed, so that the original telecommunications equipment does not need to be constructed with additional verification channels when verifying, and the economic benefit compatibility and communication can be achieved. The solution to performance is even more urgent. [Summary of the invention] Calling the phone, creating a fraudulent e-mail fraudulent publicly created another telecommunications industry license system to carry out the certificate system benefits, is conducive to the establishment of telecommunications, any system change, system cut and need 201246900 The purpose of the king of the invention is to Providing a "method and system for detecting the number of calls to the network and detecting the malicious network from being sent to the network" includes the steps of: a. directing each network to send the user via the telecommunication network or The Internet accesses the login interface of "Network Calling Calling Number Authentication and Malicious Networking Computer Detection System", and enters its "telephone number" and "network sending account setting data" in the login interface. b; The login interface receives the "telephone number" and "network mailing account setting data", and immediately passes the "phone number usage right verification program _, then the "phone number" and "network mailing account" "Setting data" is stored together in the "Network Calling Calling Number Authentication and Malicious Network Messaging Computer Detecting System" server X search f library; c. per-network sending device The telecommunications network will use the "networking caller's phone number verification and malicious network sending price measurement system" to access the network through the telecommunication network. The calling party number and the "network sending signal containing account setting data" are taken from the network signaling signal, and the "network caller's calling number verification and malicious network sending detection" are transmitted. After the system's search software, the search software will send the network signaling device's "network call signal containing the calling number 201246900 code" and "network sender to the filling signal containing the account setting search. The database is entered into and compared with the company. The phone number is: Net: ": The letter of the device is in the network signal. The shoulder signal is included in the account setting data and the search database. After storing the "telephone number" and "network mailing account setting data", at least one of the items does not match, and the "software is not connected to the telephone number of the trusted device of the trustee of the current communication." In the middle of the position, "Unable to send the message through the Internet: Power Correspondence mark of the semaphore verification, for the recipient to prepare for precaution before answering the tiantongtong 4, and the network signaling signal of the network sending device includes the calling telephone number and " The network sending letter 彳 s contains the account setting data" is stored in the "network sending database that cannot be verified by the calling number of the calling party" to provide an active price measurement by statistical analysis in the future. The malicious network sends the k-side dynamics; on the other hand, if the comparison is consistent, the corresponding software is marked by the marking software in the calling party's trusted telephone number of the trusted communication device to indicate the "communication of the calling party's telephone number through the network". The sign 'allows the trustee to listen to the incoming message after watching it. By visually observing the corresponding indication of "cannot send the calling party's telephone number verification through the Internet", the trustee can identify the incoming call of the current party. The method of network network detection and detection and excessive delay of P and the people and telecommunications; The search database will still be connected to the network, and the caller’s phone number "over-blocking" will cause the public to refrain from the e-commerce industry. Or to achieve effective suppression of telephone fraud, providing a "method of detecting the network to detect the network and requiring additional investment to build a telecommunications equipment; generating resistance, and the user-side system to configure the corresponding occurrence of 201246900 The judgment of authenticity reduces the possibility of receiving trust. Another object of the present invention is to call the telephone number verification and the system of the calling party, which completely avoids the trouble and resistance of the operator, and includes the calling telephone number in the number and setting Capital "Transfer to the "Internet malicious network transmission detection system". If the comparison is not met, but the corresponding "Unable to pass the 0 check" flag will be used, so it will not be inconvenient and increase the passengers of the telecom operators. As a result of the reduction, the phenomenon of more negative cooperation can be used to commit crimes at an early date. Another object of the present invention is to call the telephone number verification and the system of the calling party. In order to avoid the voucher verification system other than the telecommunication industry, the device is also compatible with the new voucher verification 10 201246900, and even 佶;仏&Cheng must be associated with the lack of performance degradation of the new voucher verification system, and the method and system for calling the phone number verification and malicious network call detection of the present invention can be completely Built on the existing telecom architecture and system of the telecom operators, the customer premises equipment does not need to make any changes. 'The original telecommunications equipment does not need to cooperate with the network to send the caller number Marden and the malicious network to send the letter. The method and its system have no additional credential verification channels, so it has many advantages such as economic efficiency, system compatibility and communication efficiency. [Embodiment] Please refer to the first figure and the second figure, which is a method for "a method and system for detecting a calling party's telephone number and detecting a malicious network" for the network. The steps include: a• Directing each network sending user S to enter the “network sending calling party number verification and malicious network sending computer detecting system” via telecommunication network N or Internet I 1 The login interface is 2〇, and the "telephone number" 21 and the "network transmission account setting data" 22 are entered in the login interface 20; b. the login interface 20 receives the "telephone number" 21 and "network transmission" The account setting data "22" will immediately pass the "telephone number usage right verification program" 23, and then store the "telephone number" 21 and the "net 201246900 L account 9 data" 22 in the "network call number". The number verification and the malicious network sending computer detection system search database 50; c. The network sending device S1 sends out the sending of each network ^ by the telecommunication network N or the Internet I enters the network Road sending phone number verification and malicious network sending computer detection system The network sending caller's phone number verification and the malicious network H brain price measurement system J 1 's access interface 30 will automatically capture the "network call signal containing the calling number" from the road signal • Code J S2 and “Network Sending Signal Contains Account Setting Data” and transmitted to the “Searching Software 40 of the Network Calling Calling Number Authentication and Malicious Computer Detection System” 10, the search 11 4Q t $ The "network transmission signal contains the calling telephone number and the "network transmission signal including account setting data" S3, and the search database 50 is compared; and .d. if it is within the search database 50 The stored "telephone number 2 1 and "network mailing account setting data" 22 match at least tb -a - item does not match 'that is, via the indicator software 60, the next recipient's trusted device R1 is connected. The caller's phone number field R2 is not "cannot be sent through the network to call the caller's phone number verification" 'for the trustee to pre-empt the voice master before answering the current communication." 10 signal caller" 10 way to send the network Phone S3, network search for soft" S2 to code J has its communication winning bid corresponding to Fan 12 201246900 Prepare, and put the "receipt on the Internet 彳 § device" s 1 "network transmission signal contains the caller Lei Qian # electric # number" S2 and "network transmission signal contains no account information "S3" is saved to "Internet mailing database that cannot be verified by calling the phone number of the calling network" 5... to provide a new step by statistic in the future: The dynamics of the network sender. The step d further includes a step (Γ: if the network is not ready in step d), the network signaling signal includes the calling telephone number S1 & "the network signaling signal is included The account setting data "S3" matches the "telephone number" 21 and the "network sending account setting data" stored in the search data 帛50, that is, the trusted person who connects the current communication via the standard software 60 The corresponding caller's telephone number field R2 in the trusted device indicates the corresponding sign of "Calling the caller's call through the network. The tongue number is checked", so that the recipient can be assured of the incoming call after the visual inspection. "Send the telephone number of the network transmission signal" S2 & "Network transmission signal contains account setting information" "The telephone number stored in the search database" 21 "Landing account setting data" 22 matches, but "network phone signal contains calling phone number" S2 and search # f (4) ^ ^ 13 201246900 "Phone number J 2 1 comparison does not match, The search software 40 will take the corresponding "electricity" stored in the search database 50. The number "2" and the corresponding identifier of "Unable to send the seven king call number verification through the network" in the recipient's trusted device R1 & Wang called the telephone number field R2 in the next communication. At the same time, the corresponding "telephone number" 21 obtained by the second search database 50 is displayed at the same time, so that the §R can further know the real telephone number of the sender before receiving the communication. ^ "The telephone number" in each step 2 1 is the fixed network local phone = phone number ' or the phone number of the mobile phone; and the "network account 0 and the data" 22 is sent by the network user $ self-step a login interface 2 Can be set as a book, and the Internet sends # write "/ / I am at the telecom operator's office to fill the 22 P tongue number" 2 1 and "network mail account setting information" ^ 'and via the telecom church: go, , the right verification programmer completes the "telephone number use, the "two" and then the telecommunications operator's personnel input, electricity (four) tongue number Ma I 21 r / 22 ^ iE = and network mail account setting information" network / Saved in "network call calling phone number verification and malicious development" Computer detection system Jl0 search data base _ 201246900 voice number verification and malicious network transmission computer detection system " 〇 〇 login interface 2G way ' can also choose the direct dial voice line provided by the existing telecommunications industry, or In the above steps, the telecommunication network N includes the public switched telephone network pSTN (used by the old-fashioned electric tongue). pubHc Switched Telephone Network), and the system used by mobile phones (Global System for Mobile C〇_unications), TDMA system (Time Multiple Access), CDMA system (c〇de Divisi〇n

Multiple Access)、PDC 系統(pers〇nal Dighal Cellular)與IP電信等各種電信網路,且該各種電信 網路又與網際網路I相互鏈結,使得經由網際網路I 進行之發信皆能經由電信網路N,來達成網路發信使 用者S與受信者R之間的雙向傳輸。 因此,詐騙電話之犯罪者雖然可以輕易偽冒「電 話號碼」2 1 ’但無法得知每一網路發信使用者s之 「網路發信帳號設定資料」22,故其經由網際網路 發信I所撥打之發信,會直接被連結至電信網路N 經擷取介面3〇而傳送至「網路發信主叫電話號碼驗 證與惡意網路發信電腦偵測系統」10之「搜尋資料 15 201246900 庫」50內來進行比對,若無法通過比對驗證即會在 接通·該次受信者受信設備R1之主叫電話號碼欄位 R2中同時被標示出『無法通過網路發信主叫電話號 碼驗邊』之對應標示,故受信者R只要經由目視受 信者受信設備R1之主叫電話號碼欄位R2中該『無 法通過網路發信主叫電話號碼驗證』之對應標示, 便可輕易判斷得知該次來電是否為『詐騙電話』,不 必再麻煩地透過官方所設之165反詐騙專線或110 報案電話來加以求證’因此能快速有效阻止『詐騙 電p舌』之犯罪行為。同時,因每次的該通『無法通 過網路發4主叫電話號碼驗證』仍能被接通,故電 信業者除依然仍可收取該通電話的話務費用外,也 不會因過度攔阻」產生客訴,更不會因實施本發 明而減少其營收’如此不僅可收到防止電話詐騙犯 罪之成效’更能去除電信業者不願配合或消極配合 之態度。 續如第二圖所示’係本發明「可對網路發信主 叫電話號碼驗證與惡意網路發信偵溯之方法及其系 統」的系統,其包括: 肩路發仏主叫電話號碼驗證與惡意網路發 信電腦偵測系統」10,其伺脂 共 服器11係鏈結於網際網 201246900 路I ( Internet)上,且其輪出與輸入各種網路之資 料均符合網際網路I之各種通信協定,該伺服器11 內設置有登錄介面20、擷取介面3〇、搜尋軟體4〇、 搜尋資料庫50、標示軟體60及無法通過網路發信主 叫電話號碼驗證之網路發信資料庫5 1 ; —登錄介面20,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」之伺服器 Η內,可供網路發信使用者S輸入其「電話號碼」 2 1及「網路發信帳號設定資料」22 ; —擷取介面30,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」之伺服器 11內,可將網路發信設備S1之「網路發信信號內含 主叫電話號碼」S2及「網路發信信號內含帳號設定 資料」S3自該網路發信信號中擷取,傳送至搜尋軟 體40 ; 一搜尋軟體40,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」1〇之伺服器 11內’具有將來自擷取介面30中的「網路發信信號 内含主叫電話號瑪」S2及「網路發信信號內含帳號 設定資料」S3,與儲存於搜尋資料庫5〇內的「電話 號碼」2 1及「網路發信帳號設定資料」22進行相互 17 201246900 比對驗證之功能; -搜尋資料庫50,係設置於「網路發信主叫電 話號碼驗證與惡意網路發信電腦偵測系統」i 〇之網 站伺服器11内,並登錄儲存有每一網路發信使用者 s之「電話號碼」21及「網路發信帳號設定資料」 22 ; 一標示軟體60,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」1〇之伺服器 11內,可將搜尋軟體4〇執行「電話號碼」21及「網 路發信帳號設定資料」22之驗證結果,以對應之標 示信號發送給受信者R,並將無法通過網路發信主叫 電話號碼驗證之「網路發信信號内含主叫電話號碼」 S2及「網路發信信號內含帳號設定資料」S3儲存至 「無法通過網路發信主叫電話號碼驗證之網路發信 資料庫」51 ;及 一無法通過網路發信主叫電話號碼驗證之網路 發信資料庫5 1,係設於「網路發信主叫電話號碼驗 證與惡意網路發信電腦偵測系統」1 〇之伺服器11 內,可儲存無法通過網路發信主叫電話號碼驗證之 「網路發信信號内含主叫電話號碼」S2及「網路發 信信號內含帳號設定資料」S3,以提供日後藉由統 201246900 計分析,來造行主動偵測惡意網路發信端的_,態。 其中,該標示軟體60亦可更設於每一受信者r 之受信者受信設備R1内,並經由網際網路下 話機製造廠直接內建來獲得,且該標示軟體6〇所發 送出之對應標示信號,可選擇以文字、符號、語音 或影像等不同方式來輸出,使視障、耳聾等身障受 信者皆能接收到該標示信號。 如第三圖所示,係本發明之系統的另一實施 例’其中’該搜尋資料庫50更包括設置連結於網際 網路I ( Internet )上的每—「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」70伺服器内 之搜尋資料庫71,且該搜尋資料庫71内部均登錄儲 存有每—網路發信使用者S之「電話號碼」2 1及「網 路發信帳號設定資料」22者。 如第四圖所示’係本發明應用於SIp(Sessi〇nMultiple Access), PDC system (personal Dighal Cellular) and IP telecom and other telecommunication networks, and the various telecommunication networks are linked to the Internet I, so that the transmission via the Internet I can The two-way transmission between the network sender user S and the trustee R is achieved via the telecommunication network N. Therefore, the offender who scams the phone can easily spoof the "telephone number" 2 1 ' but cannot know the "network sending account setting data" 22 of each network sending user, so it is via the Internet. The letter sent by the sender I will be directly connected to the telecommunications network N via the retrieval interface and transmitted to the "network caller's telephone number verification and malicious network transmission computer detection system"10 "Search data 15 201246900 library" 50 is used for comparison. If the comparison verification is not possible, it will be marked at the same time. The caller number field R2 of the trustee receiving device R1 is also marked "Unable to pass the network." The corresponding sign of the telephone number of the calling party is called the telephone number. Therefore, the trustee R only needs to verify the calling party's telephone number through the network by calling the telephone number field R2 of the trusted device R1. Corresponding to the label, you can easily determine whether the call is a "scam phone", and you don't have to bother to verify it through the official 165 anti-fraud line or 110 report phone. Therefore, you can quickly and effectively prevent the fraud. Crime "of. At the same time, because each time the pass "cannot be verified by the network 4 caller number verification" can still be connected, the carrier can still receive the call charge of the call, and will not be blocked due to excessive blocking. Producing customer complaints, and not reducing the revenue of the invention by implementing the invention 'so that not only can the effectiveness of preventing telephone fraud crimes' be removed, it can also remove the attitude of the telecommunications industry who are unwilling to cooperate or passively cooperate. Continued as shown in the second figure, the system of the present invention "method and system for sending a call originating telephone number verification and malicious network transmission detection" to the network, comprising: a shoulder call The number verification and malicious network sending computer detection system 10, its servo-shared device 11 is linked to the Internet 201246900 I (Internet), and its data for the rotation and input of various networks are in line with the Internet. Various communication protocols of the network I, the server 11 is provided with a login interface 20, a capture interface 3, a search software 4, a search database 50, a logo software 60, and a caller's phone number cannot be verified through the network. The network sending database 5 1 ; - the login interface 20 is set in the server of the "network calling call number verification and malicious network sending computer detection system", and can be sent to the network. The user S enters his "telephone number" 2 1 and "network mailing account setting data" 22; - the capturing interface 30 is set in the "network calling caller number verification and malicious network sending computer" In the server 11 of the detection system, the network signaling device S1 can be The "network call signal containing the calling telephone number" S2 and the "network sending signal containing account setting data" S3 are retrieved from the network sending signal and transmitted to the search software 40; a search software 40 It is located in the server 11 of the "Network Calling Calling Number Authentication and Malicious Networking Computer Detection System". It has the "network signaling signal from the retrieval interface 30". The calling party number "S2" and the "network sending signal containing account setting data" S3 are performed with the "telephone number" 2 1 and the "network sending account setting data" 22 stored in the search database 5 Mutual 17 201246900 comparison verification function; - Search database 50, set in the "network call calling number verification and malicious network sending computer detection system" i 〇 web server 11 and login The "telephone number" 21 and the "network sending account setting data" of each network sending user are stored. 22; a software 60 is provided in the "network calling call number verification and malicious network". Road Sending Computer Detection System" in the server 11 The search software 4 will perform the verification result of the "telephone number" 21 and the "network transmission account setting data" 22, and send it to the trustee R with the corresponding indication signal, and will not be able to verify the calling party number through the network. "The network signaling signal contains the calling telephone number" S2 and "Internet mailing signal including account setting data" S3 is stored in the "network sending database that cannot be verified by the calling telephone number of the network." 51; and a network mailing database 5 1 that cannot be authenticated by the calling party's telephone number on the Internet is set up in "Network Calling Telephone Number Authentication and Malicious Networking Computer Detection System" 1 In the server 11, you can store the "network call signal containing the calling number" S2 and the "network sending signal with account setting data" S3 that cannot be verified by the network calling caller number. In order to provide an analysis of the future of the malicious network sender by means of the analysis of 201246900. The marking software 60 can also be disposed in the trusted device R1 of each trustee r, and is directly built by the telephone manufacturer under the Internet, and the corresponding software 6 is sent out. The marking signal can be output in different ways such as text, symbol, voice or image, so that the visually impaired, deaf and other disabled recipients can receive the marking signal. As shown in the third figure, another embodiment of the system of the present invention, wherein the search database 50 further includes a network call originating telephone number that is set to be connected to the Internet I (Internet). Verifying the search database 71 in the server with the malicious network sending computer detection system 70, and the search database 71 internally stores the "telephone number" 2 1 of each network sender user S and "Network mail account setting data" 22. As shown in the fourth figure, the invention is applied to SIp (Sessi〇n

In山atl0n Prot〇c〇1)網路電信通信協定之發信實施 例,其中,笛6 t IP P 用0仃 From』欄位中的”0922222222” 為本發月中擷取介面30要擷取之「網路發信信號內 含王叫電話號碼」S2的位置,同時也是標示軟體6〇 '行^卞又信者受信設備之主叫電話號碼攔位」 的位置’該第3行『Via』欄位中的iii.222.333.442 201246900 是SUM司服器的位址,該第4f?『Via』“ n1·222.333.441 * SIP終端設備的位址以8 行『Contact』欄位"222是si"帳號等 本發明中榻取介面3〇所要榻取「網路發信信號內含 帳號設定資料」S3的位置。雖然惡意發信端可以輕 易窥改該『From』欄位’但無法任意變更該『% 櫚位中SIP終端設備的位址’與該『c_a“』攔位 中SIP的帳號;故經由擷取介面3〇之第6行『 欄位取得「網路發信信號內含主叫電話號碼」:,』 及自第3行『Via』欄位或第4行『ν。』攔位與第8 行『Contact』欄位等所取得「網路發信信號内含帳 號設定資料」S3,會傳送至搜尋軟體4〇進行比對取 得對應之標示信號,再由標示軟體6〇將該對應之標 示信號標示於第6行之『Fr〇m』攔位,便可於當次 通信之受物者受信設備R1之主叫電話號碼欄位& 來顯示該對應之標示信號;當無法通過網路發信主 叫電話號碼驗證時,便會將取自第6行『Fr〇m』欄 位之「網路發信信號內含主叫電話號碼」S2與取自 第3行『Via』攔位或第4行『via』攔位與第8行 『Contact』攔位之「網路發信信號內含帳號設定資 料」S3 —併儲存至「無法通過網路發信主叫電話號 碼驗證之網路發信資料庫」5丨內。 20 201246900 综上所陳,對於電話詐騙犯罪者經由網路發 信’任意變更設定其「網路 網路發信秸號内含主叫電話In mountain atl0n Prot〇c〇1) The transmission protocol of the network telecommunications protocol, in which the flute 6 t IP P uses the "0922222222" in the 0仃From" field for the mid-month access interface 30 Take the location of the "network call signal containing the king called phone number" S2, and also the location of the software 6 〇 '行 卞 卞 卞 受 受 受 受 受 受 ' ' ' 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该The iii.222.333.442 201246900 in the field is the address of the SUM server, the 4th? "Via" "n1·222.333.441 * The address of the SIP terminal device is 8 lines "Contact" field " 222 is a position such as a si" account number, etc. in the present invention, in which the "network setting signal includes account setting data" S3 is taken. Although the malicious sender can easily peek the "From" field, but can't arbitrarily change the "IP address of the SIP terminal device in the % palm position" and the SIP account in the "c_a" interface; In line 6 of the interface 3, the field "Get the calling number of the network sending signal":, and from the "Via" field in line 3 or the line "ν". 』Block and the "Contact" field in the 8th line "Contact" field, etc., "Send the account setting data in the network transmission signal" S3, will be transmitted to the search software 4 〇 to obtain the corresponding indication signal, and then by the marking software 6标示 The corresponding indication signal is marked on the “Fr〇m” block in the sixth line, and the corresponding identification signal can be displayed in the calling telephone number field & of the recipient of the communication device R1 of the current communication. When the caller's phone number cannot be verified via the Internet, the "network call signal containing the calling number" S2 from the "Fr〇m" field in the sixth line will be taken from the third "Via" block or line 4 "via" block and line 8 "Contact" block "Network send signal contains account setting data" S3 - and save to "Unable to send the sender through the network Call the network number verification database for phone number verification within 5丨. 20 201246900 In summary, for the phone fraud fraudsters to send a message via the Internet, arbitrarily change the setting of the "network network sender straw number including the calling phone number

乙網路發信’ i以去除詐騙集圑持續以篡改主叫端 王叫電話號碼號碼之網路發信,破解電信業者現有 僅驗證特定主叫端電話號碼之「國際詐騙電話防堵 技術」的漏洞。且此一透過「網路發信信號內含帳 號设定資料」檢驗「網路發信信號內含主叫電話號 锡」之系統’是建構在電信業者既有電信架構與系 統上,電信端無需進行大規模之建置與投資,用戶 端設備無需進行任何改變’通信時原電信設備也無 需與此「網路發信主叫電話號碼產生系統」另行建 構任何額外憑證驗證通道,確具有產業高度利用性 並符合發明專利之要件’爰依法提出申請。 【圖式簡單說明】 第一圖:係本發明之步驟流程圖。 第二圖:係本發明中的系統方塊示意圖之一。 第三圖··係本發明中的系統方塊示意圖之二。 第四圖:係本發明應用於SIP網路電信通信協定之 21 201246900 發信信號的實施例。 【主要元件符號說明】 1 0、70-網路發信主叫電話號碼驗證與惡意網路發信 電腦偵測系統 11-伺服器 20-登錄介面 21-電話號碼 22-網路發信帳號設定資料 _ 23-電話號碼使用權驗證程序 30-擷取介面 40-搜尋軟體 50、71-搜尋資料庫 5 1 -無法通過網路發信主叫電話號碼驗證之網路發信 資料庫 60-標示軟體 I-網際網路 R-受信者 N-電信網路B network sends 'i to remove fraudulent collections and continues to tamper with the network of the calling party's calling phone number, cracking the "international fraud phone anti-blocking technology" that the telecom operators currently only verify the specific calling party's phone number. Vulnerabilities. And this is to verify that the "network signaling signal containing the calling telephone number tin" system is constructed on the existing telecommunications architecture and system of the telecommunications industry through the "network transmission signal containing account setting data". No need for large-scale construction and investment, the client equipment does not need to make any changes. 'The original telecom equipment does not need to construct any additional credential verification channel with this "network call originating telephone number generation system". Highly usable and in line with the requirements of the invention patent '爰 apply in accordance with the law. BRIEF DESCRIPTION OF THE DRAWINGS The first figure is a flow chart of the steps of the present invention. Second figure: One of the block diagrams of the system in the present invention. The third figure is the second schematic diagram of the system block in the present invention. Fourth Figure: An embodiment of the present invention applied to the SIP Network Telecommunications Protocol 21 201246900 signaling signal. [Main component symbol description] 1 0, 70-network call calling phone number verification and malicious network sending computer detection system 11 - server 20 - login interface 21 - phone number 22 - network sending account setting _ _ 23 - Phone number usage right verification program 30 - Capture interface 40 - Search software 50, 71 - Search database 5 1 - Network transmission database 60 - can not be verified by the network caller phone number verification Software I-Internet R-Recipient N-Telecom Network

Ri-受信者受信設備 R2 -電話號碼攔位 S-網路發信使用者 S1-網路發信設備 52- 網路發信信號內含主叫電話號碼 53- 網路發信信號內含帳號設定資料 22Ri-trustee trusted device R2 - phone number block S-network sender user S1-network sender device 52- network call signal contains caller number 53- network call signal contains account Setting information 22

Claims (1)

201246900 七、申請專利範圍: 1 _ 一種「可對網路發信主叫電話號碼驗證與惡意網路發 信偵测之方法」,其步驟包括: a. 導引每一網路發信使用者經由電信網路或網 際網路進入「網路發信主叫電話號碼驗證與惡意網路 發信電腦偵測系統」之登錄介面,並輸入其「電話號 碼」及「網路發信帳號設定資料」於該登錄介面中; b. 登錄介面收到「電話號碼」及「網路發信帳號 設定資料」,會在通過「電話號碼使用權驗證程序」 後,將該「電話號碼」及「網路發信帳號設定資料」 一起儲存於「網路發信主叫電話號碼驗證與惡意網路 發心電腦偵測系統」之搜尋資料庫內; 〇 …一 ·阳"丨狀山·^ —網踏的發信信 號’經由電信網路或網際網路進入「網路發信主;; =驗:與惡意網路發信電腦偵測系統」後,該「網 系統Β、Ά令號碼驗證與惡意網路發信電腦偵測 系統」ζ擴取介面,舍白 、 取其「嘲路網路的發信信號中擴 取具,、罔路發信信號内含主叫 信信號内含帳號設定資Μ二舌號碼」及「網路發 η電卩舌诜碼驗證與惡意 王 尋軟體後,該搜晷齡二:電腦偵测系統」之搜 叫電話號碼及網路「網路發信信號内含主 傳送至,尋資料庫進行比對,·及 疋貨料」, d •若該網路發户切_ 、 電話號碼」及發信信號内含主叫 搜尋資料庫内所儲。信谠内含帳號設定資料」與 所儲存的「電話號碼」及「網路發信帳 23 201246900 號設定資料」比對後至少有其中—項不符合,即經由 標示軟體在接通當次通信之受信者受信設備的主叫 電話號碼欄位中進行『無法通過網路發信主叫電話號 碼驗邊』之對應標示,並將該網路發信設備之「網路 發信信號内含主叫電話號碼」及「網路發信信號內含 帳號設定資料」儲存至「無法通過網路發信主叫電話 號碼驗證之網路發信資料庫」內,以提供日後藉由統 計分析來進行,主動偵測惡意網路發信端的動態。 2·如申請專利範圍第1項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵测之方法」,其中,該 步驟d更包括一步驟d,:若步驟d中該網路發信設備 乙「網路發信信號內含主叫電話號碼」及「網路發信 ^號內含帳號設定資料」與搜尋資料庫內所儲存的 「電話號碼」及「網路發信帳號設定資料」比對符合, 即經由標示軟體在接通當次通信之受信者受信設備 的王叫電話號碼欄位中進行『通過網路發信主叫號碼 驗證』之對應標示。 I" 3 .如申請專利範圍帛i項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵測之方法」,其中,該 步驟d更包括—步驟d,,:若纟冑d中網路發信設備 乙「網路發信信號內含帳號設定資料」與搜尋資料庫 内所儲存的「網路發信帳號設定資料」比對符合,但 網路發信設備之「網路發信信號内含主叫電話號碼 與搜尋資料庫内所儲存的「電話號碼」比對不符合: 則搜尋軟體會取得搜尋資料庫內所儲存對應的「電P話 號碼」’並於標示軟體在接通當次通信之受信者受^ 24 201246900 設備的主叫電話號碼欄位中進行『無法通過網路發信 主叫號碼驗證』之對應標示時,同時顯示該搜尋資料 庫取得的對應Γ電話號碼」。 4. 如申請專利範圍第1項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵測之方法」,其中,該 . 步驟a、b、eAd中之「電話號碼」係為固網市話之 . 電話號碼’行動電話之電話號碼’或是網路發信之電 話號碼。 5. 如申請專利範圍第1項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵測之方法」,其中,該 步驟a、b、c及d中之「網路發信帳號設定資料」與 網路發信彳§號內含帳號设疋資料」係包括網路發信 設備位址、網路發信帳號、網路發信伺服器位址、網 路發信通信埠等能讓網路發信設備成功收發信之網 際網路設定資料。 6. 如申請專利範圍第1項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵測之方法」,其巾,言衾 步騾a及b中之登錄介面可更設為書面方式,由網路 發信使用者本人至電信業者處來臨櫃填寫其「電話號 碼J及「網路發彳§帳號設定資料」後,並經由電業 • 者之人員完成「電話號碼使用權驗證程序」後,再由 電信業者之人員代為輸入’將該「電話號碼」及「網 路發信帳號設定資料」一起儲存於「網路發信主叫電 話號碼驗5登與惡意網路發信電腦僧測系統」之搜尋資 料庫。 25 201246900 !請專利範圍第1項所述之「可對網路發信主叫電 曰舌號碼驗證與惡意網路發信偵測之方法」,其中,該 ^驟b中之「電話號碼使用權驗證程序」係透過該 亡^碼」所對應電彳§設備之電信信號接收或電信信號 發送機制進行驗證。 . 8.如^請專利範圍第1項所述之「可對網路發信主叫電 - 話號碼驗證與惡意網路發信偵測之方法」,其中,該 步驟c及d中之網路發信係為語音、影像、文字或符 號之通信信號傳遞。 9.如申請專利範圍第丨項所述之「可對網路發信主叫電 話號碼驗證與惡意網路發信偵測之方法」,其中,該 步驟a及c中,該電信網路係包括固網電話使用之公 共交換電話網路 PSTN (Public Switched Telephone Network),以及行動電話使用之gSM系統(G1〇bal System for Mobile Communications )、TDMA 系統 (Time Division Multiple Access)、CDMA 系統(Code Division Multiple Access )、PDC 系統(Personal Digital Cellular)與IP電信等各種電信網路,且該各 種電信網路又均與網際網路作相互鏈結。 1 0. —種「可對網路發信主叫電話號碼驗證與惡意網路 '發信偵測之系統」,係包括: 一「網路發信主叫電話號碼驗證與惡意網路發 信偵測系統」’其伺服器11係鏈結於網際網路I (Internet)上,且其輸出與輸入各種網路之資料均 符合網際網路Ϊ之各種通信協定,該伺服器內設置 有登錄介面、擷取介面、搜尋軟體、搜尋資料庫、 26 201246900 標示軟體及無法通過網路發信主叫電話 網路發信資料庫; 驗證之 一登錄介面,係設於「網路發信主叫 ” 驗證與惡意網路發信偵測系統」之伺服器內9舌號碼 網路發信使用者輸入其「電話號碼」及「,可供 . 帳號設定資料」; 網路發信 . _ —榻取介面,係設於「網路發信主叫電話號碼 驗》登與惡意網路發信偵測系統」之伺服器 "、 網路發信設備之「網路發信信號內含主叫電\可將 及「網路發信信號內含帳號設定資料 e號碼- 信信號中榻取,傳送至搜尋軟體;」自該網路發 —搜尋軟體,係設於「網路發信主叫 驗證與惡意網路發信偵測系統」之伺服器內P,具ϋ 將來自擷取介面中的「網路發信信號內含主叫 號碼」及「網路發信信號內含帳號設定資; 料庫內的「電話號瑪」&「網路發信帳 唬设疋資料」進行相互比對驗證之功能; -搜尋資料庫’係設置於「網路發信主叫電$ 號碼驗證與惡意網路發信偵测系統」之網站伺服器 內’並登錄儲存有每—網路發信使用者之「電話號 碼」及「網路發信帳號設定資料」; -標示軟體,係設於「網路發信主叫電話號碼 驗證與惡意網路發信僧測系統」之祠服器內,可將 搜尋軟體執行「電話號碼」及「網路發信帳號設定 資料」乙驗證結I,以對應之標示信號發送給受信 者’並將無法通過網路發信主叫電話號瑪驗證之「網 路發信信號內含主叫電話號碼」及「網路發信信號 27 201246900 內含帳號設定資料」儲存至「無法通過網路發信主 叫電話號碼驗證之網路發信資料庫」;及 一「無法通過網路發信主叫電話號碼驗證之網 路發信資料庫」’係設於「網路發信主叫電話號碼驗 邊與惡意網路發信偵測系統」之伺服器內,可儲存 無法通過網路發信主叫電話號碼驗證之「網路發信 信號内含主叫電話號碼」及「網路發信信號内含帳 號設定資料」,以提供日後藉由統計分析,來進行主 動偵測惡意網路發信端的動態。 11. 如申請專利範圍第丨0項所述之「可對網路發信主叫 電話號碼驗證與惡意網路發信偵測之系統」,其中, 該標示軟體可更設於每一受信者之話機内,並經由 網際網路下載或由話機製造廠直接內建來獲得。 12. 如申請專利範圍第項所述之「可對網路發信主叫 電話號碼驗證與惡意網路發信偵測之系統」,其中, 該「無法通過網路發信主叫電話號碼驗證之網路發 信資料庫」可更設於該「網路發信主叫電話號碼驗 邊與惡意網路發信偵測系統」之伺服器外部,但可 連結於網際網路上的其他電腦系統的伺服器内。 13·—種「將 SIP(Session Initiation Protocol)通訊協定 使用於可對網路發信主叫電話號碼驗證與惡意網路 發信偵測之系統」,係包括: —「SIP網路發信主叫電話號碼驗證與惡意網 路發信電腦偵測系統」,其伺服器係鏈結於網際網路 (Internet)上,且其輸出與輸入各種網路之資料均 符合網際網路之各種通信協定,該伺服器内設置有 28 201246900 登錄介面、擷取介面、搜尋軟體、搜尋資 示軟體及無法通過網路發信主叫電話號碼 路發信資料庫; —登錄介面,係設於「SIP網路發信 號碼驗證與惡意網路發信電腦偵測系統」 内’可供網路發信使用者輸入其「電話號碼 網路發信帳號設定資料」; 一擷取介面,係設於「SIP網路發信 號碼驗證與惡意網路發信電腦偵測系統」 內’可將網路發信設備之「Sip網路發信 主叫電話號碼」及「SIP網路發信信號內 疋資料」自該網路發信信號中擷取,傳送 體; —搜尋軟體’係設於「SIP網路發信 號碼驗證與惡意網路發信電腦偵測系統」 內’具有將來自擷取介面中的「SIP網路 =含王叫電話號碼」及「SIP網路發信信 號设定資料」’與儲存於搜尋資料庫內的「賃 及「SIP網路發信帳號設定資料」進行相 證之功能; —搜尋資料庫,係設置於「SIP網路 電話號碼驗證與惡意網路發信電腦偵測系 ,伺服器內,並登錄儲存有每—網路發信 電話號碼」及「SIP網路發信帳號設定1 〇 —標示軟體’係設於「SIP網路發信 號碼驗邊與惡意網路發信電腦偵測系統」 内’可將搜尋軟體執行「電話號碼」及「 料庫、標 驗證之網 主叫電話 之伺服器 」及「 SIP 主叫電話 之伺服器 信號内含 含帳號設 至搜尋軟 主叫電話 之伺服器 發信信號 號内含帳 【話號碼」 互比對驗 發信主叫 統」之網 使用者之 Ϊ料」; 主叫電話 之伺服器 網路發信 29 201246900 帳號設定資料」之驗證結果,以對應之標示信號發 送給受信者,並將無法通過網路發信主叫電話號碼 驗證之「SIP網路發信信號内含主叫電話號碼」及 「SI.P網路發信信號內含帳號設定資料」儲存至「無 法通過SIP網路發信主叫電話號碼驗證之網路發信 資料庫」;及 p —無法通過SIP網路發信主叫電話號碼驗證之 網路發信資料庫,係設於「SIP網路發信主叫電話 號碼驗證與惡意網路發信電腦偵測系統」之伺服器 內,可儲存無法通過網路發信主叫電話號碼驗證之 「SIP網路發信信號內含主叫電話號碼」及「SIP網 路發信信號内含帳號設定資料」。 14·如申請專利範圍第13項所述之「將sip通訊協定使 用於可對網路發信主叫電話號碼驗證與惡意網路發 信偵測之系統」’其中’該「SIP網路發信帳號設定 資料」與「SIP網路發信信號内含帳號設定資料」 係包括SIP終端設備位址、SIP帳號、SIp伺服器位 址、Sip通信埠等能讓SIP設備成功收發信之網際網 賂設定資料。 1 5 .如申請專利範圍第i 3項所述之「將sip通訊協定使 用於可對網路發信主叫電話號碼驗證與惡意網路發 心偵测之系統」,其中,該「擷取介面」係自SIP網 路電信通信協定發信信號中之『Via』欄位與 『Contact』攔位取得rSIp網路發信信號内含帳號 設定資料」。 16.如申請專利範圍第n項所述之「將通訊協定使 201246900 話號碼驗證與惡意網路發 「擷取介面」係自SIP網 中之『From』攔位取得「SIP 話號碼」。 用於可對網路發信主叫電 信ϊ貞測之系統」,其中,今 路電信通信協定發信信號 網路發信化號内含主叫電 1 7 ·如申請專利範圍第1 3 j苜挤、击、「必 項所述二「將SIP通訊協定使 用於可對網路發信丰DL]雷# Μ 、 1王Η電話號碼驗證與惡意網路發 信偵11之系統」,其中,該「標示軟體」係對sip網 路電信通信m定發信信號中之F From』桶位進行「SIP 王叫電話號碼」之對應標示。 1 8 ·如申请專利範圍第i 3項所述之「將sip通訊協定使 用於可對網路發信主叫電話號碼驗證與惡意網路發 信偵测之系統」,其中,該「無法通過SIp網路發信 主叫電話號碼驗證之網路發信資料庫」可更設於^ Slp網路發秸主叫電話號碼驗證與惡意網路發信 电腦偵測系統」之伺服器外部,但可連結於網際網 路上的其他電腦系統的伺服器內。 31201246900 VII. Patent application scope: 1 _ A method for sending a telephone number verification and malicious network transmission detection to the network. The steps include: a. Directing each network to send users Enter the login interface of "Network Calling Telephone Number Authentication and Malicious Network Messaging Computer Detection System" via telecommunication network or internet, and input its "telephone number" and "network sending account setting data" In the login interface; b. After receiving the "telephone number" and "networking account setting data", the login interface will pass the "telephone number" and "net" "Lettering account setting information" is stored in the search database of "Network Calling Calling Number Authentication and Malicious Networking Computer Detection System"; 〇...一·阳"丨状山·^ The e-mail signal of the e-telephone enters the "network sender host through the telecommunication network or the Internet;; = verification: and the malicious network to send the computer detection system", the "network system", the order number verification With malicious network The computer detection system ζ expands the interface, and whites it, and takes the extension signal of the sneak signal network. The semaphore signaling signal contains the calling signal and the account number is set. After the "Internet η 卩 卩 诜 验证 验证 验证 验证 验证 验证 验证 验证 : : : : : : 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑, search the database for comparison, · and 疋 goods", d • If the network account _, phone number and the signal sent in the caller's search database. The letterhead contains the account setting information". After comparing with the stored "telephone number" and "network mailing account 23 201246900 setting data", at least one of the items does not match, that is, the current communication is connected via the marking software. In the caller's phone number field of the trusted device, the corresponding indication of "Unable to send the caller's phone number through the network" is performed, and the "network signaling signal" of the network sending device is included. The "calling number" and "network setting signal including account setting data" are stored in the "network sending database that cannot be verified by the calling party's telephone number on the Internet" for later analysis by statistical analysis. Actively detect the dynamics of the malicious network sender. 2. As described in the first paragraph of the patent application, the method for detecting the originating telephone number of the network and detecting the malicious network is detected, wherein the step d further comprises a step d: if the step In the network, the network sending device B "network calling signal contains the calling number" and "network setting ^ contains the account setting data" and the "phone number" and "stored in the search database" The network sending account setting data "matches the matching, that is, the corresponding signing of the "Calling the calling party number through the network" in the phone number field of the king trusted device of the trusted communication connected to the current communication. . I" 3. As described in the scope of patent application 帛i, "method for detecting the originating telephone number of the network and detecting the malicious network transmission", wherein the step d further includes - step d, : If the network sending device B in the network transmission device B "network setting signal contains account setting data" and the "network sending account setting data" stored in the search database is matched, but the network sends a letter The device's "network call signal contains the calling number and the "phone number" stored in the search database does not match: the search software will obtain the corresponding "electric P number" stored in the search database. 'When the token software is connected to the recipient's telephone number field of the 24 201246900 device, the corresponding identifier is displayed in the caller's number field of the device. The corresponding phone number obtained by the library." 4. As described in the first paragraph of the patent application, the method for detecting the originating telephone number of the network and detecting the malicious network is detected. Among them, the steps in the steps a, b and eAd The number is the fixed-line dialect. The telephone number 'the telephone number of the mobile phone' or the telephone number of the network. 5. As described in the first paragraph of the patent application, "method for detecting the originating telephone number of the network and detecting the malicious network," in the steps a, b, c and d The network sending account setting data and the network sending letter § § contains the account setting information" includes the network sending device address, the network sending account, the network sending server address, the network Sending communication, etc. The Internet setting data that enables the network sending device to successfully send and receive messages. 6. As described in the first paragraph of the patent application, the method for detecting the calling party's telephone number and detecting the malware transmission on the Internet, the login interface in the steps, a and b It can be set up in writing. The network will send the user to the telecom operator to fill in the "phone number J and "network account § account setting information" and complete it through the staff of the electricity industry." After the telephone number usage right verification procedure is completed, the telecommunications operator will enter the 'telephone number' and the "network mailing account setting data" together in the "network call calling telephone number check 5" A search database for malicious network messaging computer detection systems. 25 201246900 ! Please refer to the method of “Calling the call forwarding number verification and malicious network transmission detection for the network” mentioned in the first paragraph of the patent scope, in which “the telephone number is used in the procedure b” The right verification program is verified by the telecommunication signal receiving or telecommunication signal transmission mechanism of the device corresponding to the device. 8. For example, please refer to the method of "Calling the caller's telephone number verification and malicious network transmission detection" in the first paragraph of the patent scope, wherein the network in steps c and d The road transmission is a communication signal for voice, video, text or symbol. 9. The method for verifying the calling party's telephone number and detecting the malicious network in the network as described in the scope of the patent application, wherein in the steps a and c, the telecommunications network is Including the public switched telephone network PSTN (Public Switched Telephone Network) used by fixed line telephones, and the gSM system (G1〇bal System for Mobile Communications) used in mobile phones, TDMA system (Time Division Multiple Access), CDMA system (Code Division) Multiple telecom networks such as Multiple Access), PDC (Personal Digital Cellular) and IP telecom, and the various telecommunication networks are also linked to the Internet. 1 0. — “A system for sending a call originating telephone number verification and malicious network 'delivery detection” to the network, including: “Network sending caller number verification and malicious network sending” The detection system "the server 11 is linked to the Internet I (Internet), and its output and input data of various networks conform to various communication protocols of the Internet, and the server is provided with a login. Interface, capture interface, search software, search database, 26 201246900 logo software and can not send a call originating telephone network to send data through the network; verify one of the login interface, set up in the "network caller "Verification and Malicious Networking Detection System" in the server's 9-key number network to send users to enter their "telephone number" and ", available. Account setting information"; Internet messaging. _ - couch The interface is set up in the "networking caller's phone number test" and the malicious network call detection system "server", the network signaling device "network signaling signal contains the caller Electricity\ can be used and the "network signaling signal contains an account number Set the data e-number - the signal is sent to the search software; "from the network - search software, set up in the "network caller verification and malicious network call detection system" server Inside P, there will be "network calling signal containing calling number" and "network sending signal containing account setting money from the retrieval interface; "phone number" & "net in the database The website sends a message to set up the data to perform the function of mutual comparison verification. - The search database is set on the website server of the "network caller calling number verification and malicious network sending detection system" Inside and log in to store the "telephone number" and "network mailing account setting data" for each network sender; - the logo software is set to "network caller phone number verification and malicious network" In the server of the Road Sending Test System, the search software can execute the "telephone number" and the "network mailing account setting data" B verification result I, and send it to the trustee with the corresponding indication signal' and will not be able to Send a voice over the Internet to call the phone number The road sending signal contains the calling number and the "network sending signal 27 201246900 contains the account setting data" is stored in the "network sending database that cannot be verified by the calling telephone number of the network"; and A "network transmission database that cannot be authenticated by the calling party's telephone number on the Internet" is installed in the server of "networking caller's telephone number verification and malicious network transmission detection system" It can store the "Calling Signals Containing Calling Numbers" and "Network Setting Signals Containing Account Setting Data" that cannot be verified by the calling number of the calling party on the Internet, so as to provide statistical analysis in the future. To actively detect the dynamics of the malicious network sender. 11. As described in item 丨0 of the patent application, the system for sending a call originating telephone number verification and malicious network transmission detection to the network, wherein the logo software can be set to each trustee. The phone is downloaded via the Internet or directly built into the phone manufacturer. 12. As stated in the scope of the patent application, the system for detecting the originating telephone number of the network and detecting the malicious network is detected, wherein the "cannot be authenticated by the calling telephone number of the network." The Network Email Database can be set up outside the server of the "Network Calling Calling Number Authentication and Malicious Networking Detection System", but can be connected to other computer systems on the Internet. Inside the server. 13·—A system that uses the SIP (Session Initiation Protocol) protocol for sending call originating telephone number verification and malicious network transmission detection to the network, including: — “SIP network sender Calling the phone number verification and malicious network sending computer detection system, its server is linked to the Internet, and its output and input data of various networks are in line with various communication protocols of the Internet. The server is provided with 28 201246900 login interface, retrieval interface, search software, search software, and the ability to send a call number to the mobile phone number through the network; - login interface, set in "SIP network "Signal code verification and malicious network sending computer detection system" can be used by the network to send users to enter their "phone number network sending account setting data"; a sampling interface is set in the "SIP network" "Signal code verification and malicious network transmission computer detection system" can be used to send the "Sip network call originating telephone number" and "SIP network signaling signal information" from the network sending device. The network sending signal is captured, the transmitting body; the search software is set in the "SIP network signal code verification and malicious network sending computer detection system", which has "SIP" from the retrieval interface. The network = "including the phone number of the king" and the "SIP network signaling signal setting data" are used to verify the functions of the "rental and "SIP network sending account setting data" stored in the search database; The search database is set up in "SIP network phone number verification and malicious network sending computer detection system, server, and login to store every network sending phone number" and "SIP network sending account number" Setting 1 〇—Marking Software' is set in the “SIP Network Signal Code Checking and Malicious Network Sending Computer Detection System”. The search software can execute the “telephone number” and the “repository and standard verification network”. The server of the calling telephone and the server signal of the SIP calling telephone contain the server with the account number set to the search soft calling telephone. The signal signal number includes the account number (voice number). Network user """"""""""""""""""""""""""""""" The network sending signal contains the calling number and the "SI.P network sending signal contains the account setting data" and stores it to the "network sending database that cannot be verified by the calling network number of the SIP network." "; and p - the network mailing database that cannot be used to authenticate the calling party's telephone number over the SIP network. It is set up in the "SIP network calling caller number verification and malicious network sending computer detection system" In the server, the "SIP network signaling signal including the calling telephone number" and the "SIP network signaling signal including the account setting data" that cannot be verified by the network calling telephone number can be stored. 14·As stated in the 13th article of the patent application scope, “the sip communication protocol is used in a system that can send a call originating telephone number verification and malicious network transmission detection to the network”. The letter account setting data and the "SIP network signaling signal including the account setting data" include the SIP terminal device address, the SIP account number, the SIp server address, the Sip communication port, etc., which enables the SIP device to successfully send and receive the Internet. Set the data. 1 5 . As described in the i-third of the patent application scope, "the sip communication protocol is used in a system that can authenticate the calling party's telephone number and malicious network detection", wherein the "snap" "Interface" is obtained from the "Via" field and the "Contact" block in the SIP network telecommunication protocol transmission signal to obtain the account setting data in the rSIp network transmission signal. 16. As stated in item n of the scope of application for patents, the communication protocol enables 201246900 voice number verification and malicious network to send the "snap interface" from the "From" block in the SIP network to obtain the "SIP phone number". It is used in a system that can send a voice call to the network to call the telecoms.", in which the telecommunications communication protocol signaling network of the current road telecommunications communication protocol contains the calling party 1 7 · If the patent application scope is 1 3 j苜 、 、 击 击 「 「 「 「 「 「 「 「 「 「 「 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 将 SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP SIP The "marking software" is a corresponding indication of the "SIP King calling phone number" in the F From" bucket position in the sip network telecommunications communication. 1 8 · As stated in the i-third of the patent application scope, "the sip communication protocol is used in a system that can authenticate the calling party's telephone number and malicious network transmission detection", wherein the "cannot pass" The SIp network sends the caller's phone number verification network to send the database. It can be set outside the server of the SLP network to send the caller's phone number verification and the malicious network to send the computer detection system. Can be connected to the server of other computer systems on the Internet. 31
TW100116257A 2011-05-09 2011-05-09 Method and system capable of verifying network-dialing caller ID and detecting malicious network call TW201246900A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100116257A TW201246900A (en) 2011-05-09 2011-05-09 Method and system capable of verifying network-dialing caller ID and detecting malicious network call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100116257A TW201246900A (en) 2011-05-09 2011-05-09 Method and system capable of verifying network-dialing caller ID and detecting malicious network call

Publications (1)

Publication Number Publication Date
TW201246900A true TW201246900A (en) 2012-11-16

Family

ID=48094659

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100116257A TW201246900A (en) 2011-05-09 2011-05-09 Method and system capable of verifying network-dialing caller ID and detecting malicious network call

Country Status (1)

Country Link
TW (1) TW201246900A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144262A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Screening method and device for illegal telephone traffic of telephone network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144262A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Screening method and device for illegal telephone traffic of telephone network
CN104144262B (en) * 2013-05-10 2016-12-28 中国电信股份有限公司 Telephone network illegal telephone traffic screening method and device

Similar Documents

Publication Publication Date Title
US7969968B2 (en) Lawful interception in wireline broadband networks
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
US20120287823A1 (en) Verification method and system for screening internet caller id spoofs and malicious phone calls
US20090046839A1 (en) Verifying authenticity of called party in telephony networks
CA2831527C (en) Computer-implemented system and method for validating call connections
CN104822139B (en) A method of communicating number isolation and secret protection are realized based on intermediate number
CN106571998A (en) Parking contact method and system capable of protecting privacy and convenient to contact
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
CN104010068A (en) Text message processing method and device for mobile terminal
KR101306074B1 (en) Method and system to prevent phishing
CN106921633A (en) Calling number Verification System and method
US10244107B1 (en) Systems and methods for causing display of a reputation indicator associated with a called party
KR101033973B1 (en) System and method for preventing voice phishing with white list
CN100514988C (en) Caller identity information service system and method
US10778732B2 (en) Method of detecting a spoofing of identity belonging to a domain
KR101520246B1 (en) Caller authentication system for preventing a financial fishing and method of the same
TW201336289A (en) System and method of smartphone for preventing fraud
TW201246900A (en) Method and system capable of verifying network-dialing caller ID and detecting malicious network call
US7552058B1 (en) Manual triggering of automated reporting of do-not-call list violation
CN111447236B (en) Block chain-based communication authentication method and device, terminal equipment and storage medium
KR20160076494A (en) Method for Preventing Voice Phishing by using Qualified Caller Information
KR101478835B1 (en) The system to prevent voice phishing and its method
TW201528768A (en) Method capable of verifying calling phone number of network message sender and detecting malicious network message and system thereof (2)
CN108270567A (en) Informed source verification method, device and system and message method and device
KR20130052297A (en) Method and apparatus for processing call connection with subscriber number to prevent voice fishing