201246900 六、發明說明: 【發明所屬之技術領域】 本發明是關於一種「可對網路發作 |α王叫電話號 碼驗證與惡意網路發信偵測之方法及龙 人升杀統」,其對 昨編電話的主叫電話號碼具有主動踏、 • 土動騄逄之功能,並 經由標示軟體在接通當次通信之受作去 _ 又Ίβ者受信設備的 主叫電話號碼欄位中標示『無法通過網路發信主叫 電話號碼驗證』之對應標示,而提供受信者在接^ 當次通信前可目視得知來預做防範之準備, 1 口J丹 將該網路發信信號內含「主叫電話號碼」及「帳號 設定資料」儲存至「無法通過網路發信主叫電話號 碼驗證之網路發信資料庫」,藉以主動偵測惡意網路 發信。 【先前技術】 使用電話進行詐騙金錢的犯罪模式,約自2〇〇〇 年開始在台灣出現及流行,近三年來更已擴及中國 _ 地區’電話詐騙之金額及受害者人數均不斷升高, -為防止民眾再受害,電信主管機關國家通訊傳播委 員會(NCC )乃要求電信公司及國際網路業者應設置 國際來話識別及阻斷機制,藉以對特定主叫電話號 瑪號碼進行攔阻與過濾,但在電話詐騙歹徒技術不 斷翻新下’竟然也能篡改主叫電話號碼號碼,使得 4 201246900 電話詐騙集圑仍能輕易迴避現有國際來話識別及阻 斷機制’持續以屬於法院、地撿署等政府機關的電 話號碼為主叫電話號碼號碼的詐騙電話聯繫被害 人,藉以取信被害人進而誘使被害人再度上當受 騙。由於詐騙電話的主要來源是網路發信,其與各 國電信業者所探用的七號信令電信系統(Signaling201246900 VI. Description of the Invention: [Technical Field of the Invention] The present invention relates to a method for "network attack|α-called phone number verification and malicious network transmission detection" The calling telephone number of the telephone number of the previous day has the function of active stepping, earth moving, and is marked in the calling telephone number field of the receiving device of the communication device by the marking software. The corresponding indication of "Cannot send the caller's phone number verification through the network", and the recipient can be visually aware of the preparation for precaution before the current communication, 1 J Dan sends the network signal The "Calling Phone Number" and "Account Settings Data" are stored in the "Network Sending Data Base that cannot be verified by the calling party's phone number on the Internet" to actively detect malicious network sending messages. [Prior Art] The criminal model of using the phone to swindle money has appeared and popularized in Taiwan since the beginning of the next two years. In the past three years, it has expanded to China _ region. The amount of telephone fraud and the number of victims are rising. - In order to prevent people from being victimized again, the National Communications and Communications Commission (NCC), the telecommunications authority, requires telecommunications companies and international network operators to set up an international call recognition and blocking mechanism to block the specific calling number. Filtering, but after the phone fraud gangster technology is constantly being refurbished, 'can even tamper with the calling number, so that the 4 201246900 phone fraud collection can still easily avoid the existing international call recognition and blocking mechanism' continues to belong to the court, the cellar The telephone number of the government agency and other government agencies contacted the victim with a fraudulent telephone number called the telephone number number, in order to obtain the victim and then induce the victim to be deceived again. Since the main source of fraudulent telephone calls is the Internet, it is the Signaling Telecommunications System (Signaling) that is used by national telecom operators.
System Number 7 ’簡稱SS7)皆相互聯通,且各國 電信業者之國際話務傳輸因為降低國際話務傳輸成 本的需求逐渐網路化,而與網路發信之話務混雜在 一起,因此,國家通訊傳播委員會(NCC)要求各電 信業者必須建立「國際詐騙電話防堵技術」,藉由在 國際交換機上攔阻主叫電話號碼中呈現國內電話號 碼之發信與特殊設定進行攔阻之電話號瑪,以達成 阻止電腦主機發信設在他國(例如中國)但電話詐 騙受倌卻在本_ (例如台灣),並篡改主叫電話號碼 透過網路發信進杆+加gg七_ & ^ 丨。延仃I犯罪行為,然而其效果至今仍 不彰顯’其因如下: .'、、效的過濾」:由於「國際詐騙電話防堵括 術j疋對可疑發作具料ϋ jU* 是對發信端之主叫電話號碼進的 過濾攔阻,但由於網路、 鬥相·赞1H的發jg端二王叫電話载 碼可隨意變更,導劫_ 導致作騙集團僅藉由變更主叫電韵 5 201246900 號碼就可以輕易避開現有的「國際詐騙電話防堵技 術」。 2. 「過度的攔阻」:由於「國際詐騙電話防堵技 術」’對可疑發信皆是以逕行攔阻為對應機制,但國 際話務中有些正常發信可能因「未帶主叫電話號碼 號碼」或「主叫電話號碼號碼之顯示不全」(例如未 帶國碼等…)’將會使得系統誤判其為詐騙電話,而 遭到不當之攔阻並造成發信受阻。 3. 「業者的反彈」:由於「國際詐騙電話防堵技 術」,對可疑發信皆是以逕行攔阻為對應機制,不僅 「過度攔阻」會增加電信業者之客訴,造成商譽的 損失與客服人力成本的增加,「被攔阻的話務」更會 減少電信業者之營收,以致電信業者心生反彈而有 不願配合或消極配合之現象,其對電信業者根本、 具有積極推展之誘因。 4·「民眾的困擾」:全面性的攔阻是最有效的詐 騙防治方法,但由於過度攔阻產生的通信不 、 % ,將 同時造成發信與受信民眾的困擾,使得電信業者 合政府防治詐騙電話的美意,容易衍生成為另 怨之來源。 再者’因電話詐H歹徒已普遏具有篡改主叫電 6 201246900 話號碼號碼的能力,致使受信者已無法從主 號碼中去辨識發信者電話號碼之真偽,因此 一種使電信業者樂於推動且對受信者又具有 話標示與惡意發信偵測功能之方法,實有實 騙防治之立即需求。 另於美國專利申請案號US 1 1/699330 ( 號:US2008/018 1379 ),所揭露之技術,係以 置憑證驗證機制來進行使用者名稱之驗證, 者除需要重新建構電信設備以外之憑證驗 外’用戶端设備也需對新建之憑證驗證機制 應配置,於通信時原電信設備也需與憑證驗 再另行建構憑證驗證通道,反而對其經濟效 統相容與通信效能等產生多重限制,相當$ 即推廣運用。 因此,如何發明一種建構在電信業者既 架構與設備上’且用戶端設備也無需進行 變’使得在通信時原電信設備也無需與驗證 另行建構額外之驗證通道,可兼顧經濟效益 相容與通信效能之解決方案,便顯得更為迫 要。 【發明内容】 叫電話 ,創造 詐騙電 務上詐 公開編 另外建 電信業 證系統 進行對 證系統 益、系 利於立 有電信 任何改 系統再 、系統 切與需 201246900 本發明之王要目的是在提供一種「可對網路發 相王叫電話號碼驗證與惡意網路發信偵測之方法及 其系統」’其步驟包括: a.導引每一網路發信使用者經由電信網路或網 際網路進入「網路發信主叫電話號碼驗證與惡意網 路發信電腦偵測系統」之登錄介面,並輸入其「電 話號碼」及「網路發信帳號設定資料」於該登錄介 面中; b ·登錄介面收到「電話號碼」及「網路發信帳號 設定資料」,會立即通過「電話號碼使用權驗證程序_ 後,再將該「電話號碼」及「網路發信帳號設定資 料」一起儲存於「網路發信主叫電話號碼驗證與惡 意網路發信電腦偵刺系統」例服器X搜尋f料庫內; c.每-網路發信設備所送出的發信經由電信網 路會透過「網路發信主叫電話號碼驗證與惡意網路 發信價測系統」之擷取介面’而將該網路發信設備 之「網路發信信號内含主叫電話號碼」及「網路發 信信號內含帳號設定資料」自該網路發信信號榻 取,並傳入「網路發倌主叫電話號碼驗證與惡意網 路發信偵測系統」之搜尋軟體後’該搜尋軟體會將 該網路發信設備之「網路發信信號內含主叫電話號 201246900 碼」及「網路發户 傳送至 驶馅信號內含帳號設定 搜尋資料庫進并u 科 竹厍進仃比對;及 電話號若碼:網:「:信設備之「網路發信信號內… 肩路發信信號內含帳號設定資料 與搜尋資料庫內所儲存的「電話號碼」及「網路發 信帳號設定資料」比對後至少有其中—項不符合, Ρί工由‘不軟體在接通當次通信之受信者受信設備 的王叫電話號碼欄位中進行『無法通過網路發信主 :電話號瑪驗證』之對應標示,以供受信者在接聽 田次通4前可預做防範之準備,並將該網路發信設 備之網路發信信號內含主叫電話號碼」及「網路 發信彳s號內含帳號設定資料」儲存至「無法通過網 路發信主叫電話號碼驗證之網路發信資料庫」内, 以提供日後藉由統計分析,來進行主動價測惡意網 路發k端的動態;反之,若比對符合,即經由標示 軟體在接通當次通信之受信者受信設備主叫電話號 碼中標示『通過網路發信主叫電話號碼驗證』之對 應標示’可使受信者經目視後而能放心接聽當次的 來話。 藉由目視該『無法通過網路發信主叫電話號碼 驗證』之對應標示,受信者可對當次的來話進行辨 9 者被p外h 4騙電話』詐騙之 L、〜種「可對網路發 意網路發信偵測之方法及 過度搁P且造成民眾與電信 ;罔路發信t「網路發信信 網路發信信號內含帳號 發t主叫電話號碼驗證與 之搜尋資料庫」進行比 該網路發信仍會被接通, 過網路發信主叫電話號碼 「過度攔阻」造成民眾之 e斥’也不會對電信業者營 消除電信業者不願配合或 達到有效制止電話詐騙之 在提供一種「可對網路發 意網路發信偵測之方法及 因需額外投資建置電信設; 產生抗拒,以及用戶端設 系統進行對應配置而發生 201246900 識真偽之判斷,減少受信 可能。 本發明之另一目的是 信主叫電話號碼驗證與惡 其系統」,其完全避免因為 業者之困擾與抗拒,並將 號內含主叫電話號碼」及 設定資料」傳送至「網路 惡意網路發信偵測系統」 對後’若比對不符合時, 但會進行對應之『無法通 驗0登』標示’故不會因為 不便與增加電信業者之客 收產生減少之結果,更能 消極配合之現象,以早日 犯罪。 本發明之又一目的乃 h主叫電話號碼驗證與惡 其系統」,為避免電信業者 備以外之憑證驗證系統而 備也因需與新增憑證驗證 10 201246900 相容障礙,甚至佶;# 通仏&程因必需與新增憑證驗證 系統另建憑證驗證通道造成效能下降等缺失,本發 明網路發h王叫電話號碼驗證與惡意網路發信偵 屈之方法及其系統」可完全建構在電信業者既有電 信架構與系統上,用戶端設備也無需進行任何改 變’通信時原電信設備更無需配合與「網路發信主 叫電話號瑪登與惡意網冑發信#测之方法及其系 統」未另外建構額外之憑證驗證通道,故具有兼顧 經濟效益、系統相容與通信效能等諸多優點。 【實施方式】 請參閲第一圖及第二圖所示,係本發明「可對 網路發信主叫電話號碼驗證與惡意網路發信偵測之 方法及其系統」的方法,其步驟包括: a•導引每一網路發信使用者S經由電信網路N 或網際網路I進入「網路發信主叫電話號碼驗證與惡 意網路發信電腦偵測系統」1 〇之登錄介面2〇,並輸 入其「電話號碼」21及「網路發信帳號設定資料」 22於該登錄介面20中; b.登錄介面20收到「電話號碼」21及「網路發 信帳號設定資料」22,會立即通過「電話號碼使用 權驗證程序」23後,再將該「電話號碼」21及「網 201246900 發L帳號⑨定資料」22 —起儲存於「網路發 叫電話號碼驗證與惡意網路發信電腦偵測系統 之搜尋資料庫50內; c.網路發信設備S1所送出每一網路的發信 ^由電信網路N或網際網路I進入「網路發信 電話號碼驗證與惡意網路發信電腦偵測系統 後該網路發信主叫電話號碼驗證與惡意網 H腦價测系統J 1 〇內之擷取介面30會自動由 路發彳g信號中擷取其「網路發信信號內含主叫 號•碼J S2及「網路發信信號內含帳號設定資料」 並傳送至「網路發信主叫電話號碼驗證與惡意 發仏電腦偵測系統」10之搜尋軟體40後,該搜 11 4Q t $該「網路發信信號內含主叫電話號碼 及「網路發信信號内含帳號設定資料」S3,傳 搜尋資料庫50進行比對;及 .d.若與搜尋資料庫50内所儲存的「電話號 2 1及「網路發信帳號設定資料」22比對後至少 tb -a- —項不符合’即經由標示軟體60在接通當次 之受诏者受信設備R1的主叫電話號碼欄位R2 不『無法通過網路發信主叫電話號碼驗證』之 ’以供受信者在接聽當次通信前可預做防 信主 」10 信號 主叫 」10 路發 該網 電話 S3, 網路 尋軟 」S2 送至 碼J 有其 通信 中標 對應 範之 12 201246900 準備,並將該「絪收丄上 網路發彳§設備」s 1之「網路發信信 號內含主叫雷钱# 电#號碼」S2及「網路發信信號內含帳 號没疋資料」S3冑存至「無法通過網路發信主叫電 話號碼驗證之網路發信資料庫」5…以提供日後 藉由統計分新步:;佳t 祈來進仃’王動偵測惡意網路發信端的 動態。 其中,該步驟d更包括一步驟(Γ:若步驟d中 網路發抬没備」S 1之「網路發信信號內含主叫電 話號碼」S2 &「網路發信信號内含帳號設定資料」 S3與搜尋資料帛50內所儲存的「電話號碼」21及 「網路發信帳號設定資料」22 t匕對符合,即經由標 不軟體60在接通當次通信之受信者受信設備的 主叫電話號碼欄位R2中標示『通過網路發信主叫電 。舌號碼驗』之對應標示,可使受信纟〖經目視後 而能放心接聽當次的來話。 「網路發信設備」S1之「網路發信信號内含主叫電 話號碼」S2 &「網路發信信號內含帳號設定資料」 “與搜尋資料庫內所儲存的「電話號碼」21及「; 路發信帳號設定資料」22比對符合,但「網路發卷 信號內含主叫電話號碼」S2與搜# f㈣Μ内^ 13 201246900 存的「電話號碼J 2 1比對不符合,則搜尋軟體40會 取彳寸搜尋資料庫50內所儲存對應的「電話號碼」2 1, 並於標不軟體60在接通當次通信之受信者受信設備 R1 &王叫電話號碼欄位R2中進行『無法通過網路 發七王叫電話號碼驗證』之對應標示時,同時顯示 二搜尋資料庫50取得的對應「電話號碼」21,以供 §者R在接聽當次通信前進一步得知發信端之真 實電話號碼。 ^述各步驟中之「電話號碼」2 1係為固網市話 =話號碼’或是行動電話之電話號碼;而「網路 帳號0又疋資料」22係由網路發信使用者$自行 另步驟a中該登錄介面2〇可更設為書 , 而由網路發# 寫其「 / 本人至電信業者處來臨櫃填 22 P舌號碼」2 1及「網路發信帳號設定資料」 ^ ’並經由電信堂:去、, 權驗證程序員完成「電話號碼使用 將該「二’再由電信業者之人員代為輸入, 電㈣舌號瑪I 21 r / 22 ^ iE = 及網路發信帳號設定資料」 網路發/存於「網路發信主叫電話號碼驗證與惡意 發化電腦偵測系統Jl0之搜尋資料座_ 201246900 話號碼驗證與惡意網路發信電腦偵測系統」ι〇之登 錄介面2G的方式’亦可選擇既有電信業者所提供之 直撥語音專線,或其既右 乂兵'既有所設之固網或行動加值網 站等方式來完成輸入。 又上述步騾中,該電信網路N係包括固 旧電p舌使用之公共交換電話網路pSTN ( pubHc Switched Telephone Network),以及行動電話使用之 〇SM 系統(Global System for Mobile C〇_unications )、TDMA 系統(Time Multiple Access )、CDMA 系統(c〇de Divisi〇nSystem Number 7 (referred to as SS7) is connected to each other, and the international traffic transmission of national telecom operators is gradually networked because of the need to reduce the cost of international traffic transmission, and is mixed with the traffic of the network, therefore, the national communication The Communications Commission (NCC) requires all telecommunications operators to establish an "international fraud phone anti-blocking technology" to block the telephone number and special settings of the domestic telephone number in the calling telephone number on the international switch. Achieved to prevent the computer host from sending a message in another country (such as China) but the phone fraud is in the _ (for example, Taiwan), and tampering with the calling phone number to send a letter through the network + add gg seven _ & ^ 丨. Delayed I crimes, but the effect is still not obvious. 'The reason is as follows: .', and the effect of filtering": Because "international fraud phone anti-blocking surgery j疋 on suspicious episodes ϋ jU* is to send a letter The end of the caller's phone number into the filter block, but because of the network, Dou Xiang · 1H's hair jg end two Wang called the phone code can be freely changed, the robbery _ caused the fraud group only by changing the caller's rhyme 5 201246900 number can easily avoid the existing "International Fraud Phone Anti-blocking Technology". 2. "Excessive Blocking": Because "International Fraud Phone Anti-blocking Technology" is a corresponding mechanism for suspicious sending, but some normal calls in international traffic may be due to "no calling number Or "the display of the calling party number is not complete" (for example, without the country code, etc.)" will cause the system to misjudge it as a fraudulent call, and is improperly blocked and caused the letter to be blocked. 3. "The rebound of the industry": Due to the "interventional fraud prevention technology", suspicious letters are blocked by the corresponding mechanism. Not only "excessive blocking" will increase the complaints of the telecom operators, resulting in the loss of goodwill. The increase in customer service costs, "blocked traffic" will reduce the revenue of telecom operators, and the telecom operators will rebound and have a reluctance to cooperate or passively cooperate. This is a fundamental and positive incentive for telecom operators. . 4. "People's troubles": Comprehensive blocking is the most effective method of fraud prevention, but the lack of communication due to excessive blocking will cause both the sending and receiving of the troubles, and the telecom operators will cooperate with the government to prevent fraud. The good intentions are easily derived into a source of additional grievances. Furthermore, because of the scam, the swindler has the ability to tamper with the caller’s number 6 201246900, which has made it impossible for the trustee to identify the authenticity of the sender’s phone number from the main number, thus making the telecom operators happy to push Moreover, the method of authenticating and maliciously detecting the function of the trusted person has an immediate need for deception. In addition, U.S. Patent Application No. US 1 1/699,330 (No.: US 2008/018 1379) discloses a technique for verifying a user name by using a voucher verification mechanism, in addition to re-establishing a voucher other than a telecommunication device. The external inspection 'customer equipment also needs to be configured with the new credential verification mechanism. In the communication, the original telecommunication equipment also needs to establish a voucher verification channel with the voucher, instead it will have multiple economic compatibility and communication efficiency. Restrictions, quite $ is promoted. Therefore, how to invent a construction on the architecture and equipment of the telecom operators and the user equipment does not need to be changed, so that the original telecommunications equipment does not need to be constructed with additional verification channels when verifying, and the economic benefit compatibility and communication can be achieved. The solution to performance is even more urgent. [Summary of the invention] Calling the phone, creating a fraudulent e-mail fraudulent publicly created another telecommunications industry license system to carry out the certificate system benefits, is conducive to the establishment of telecommunications, any system change, system cut and need 201246900 The purpose of the king of the invention is to Providing a "method and system for detecting the number of calls to the network and detecting the malicious network from being sent to the network" includes the steps of: a. directing each network to send the user via the telecommunication network or The Internet accesses the login interface of "Network Calling Calling Number Authentication and Malicious Networking Computer Detection System", and enters its "telephone number" and "network sending account setting data" in the login interface. b; The login interface receives the "telephone number" and "network mailing account setting data", and immediately passes the "phone number usage right verification program _, then the "phone number" and "network mailing account" "Setting data" is stored together in the "Network Calling Calling Number Authentication and Malicious Network Messaging Computer Detecting System" server X search f library; c. per-network sending device The telecommunications network will use the "networking caller's phone number verification and malicious network sending price measurement system" to access the network through the telecommunication network. The calling party number and the "network sending signal containing account setting data" are taken from the network signaling signal, and the "network caller's calling number verification and malicious network sending detection" are transmitted. After the system's search software, the search software will send the network signaling device's "network call signal containing the calling number 201246900 code" and "network sender to the filling signal containing the account setting search. The database is entered into and compared with the company. The phone number is: Net: ": The letter of the device is in the network signal. The shoulder signal is included in the account setting data and the search database. After storing the "telephone number" and "network mailing account setting data", at least one of the items does not match, and the "software is not connected to the telephone number of the trusted device of the trustee of the current communication." In the middle of the position, "Unable to send the message through the Internet: Power Correspondence mark of the semaphore verification, for the recipient to prepare for precaution before answering the tiantongtong 4, and the network signaling signal of the network sending device includes the calling telephone number and " The network sending letter 彳 s contains the account setting data" is stored in the "network sending database that cannot be verified by the calling number of the calling party" to provide an active price measurement by statistical analysis in the future. The malicious network sends the k-side dynamics; on the other hand, if the comparison is consistent, the corresponding software is marked by the marking software in the calling party's trusted telephone number of the trusted communication device to indicate the "communication of the calling party's telephone number through the network". The sign 'allows the trustee to listen to the incoming message after watching it. By visually observing the corresponding indication of "cannot send the calling party's telephone number verification through the Internet", the trustee can identify the incoming call of the current party. The method of network network detection and detection and excessive delay of P and the people and telecommunications; The search database will still be connected to the network, and the caller’s phone number "over-blocking" will cause the public to refrain from the e-commerce industry. Or to achieve effective suppression of telephone fraud, providing a "method of detecting the network to detect the network and requiring additional investment to build a telecommunications equipment; generating resistance, and the user-side system to configure the corresponding occurrence of 201246900 The judgment of authenticity reduces the possibility of receiving trust. Another object of the present invention is to call the telephone number verification and the system of the calling party, which completely avoids the trouble and resistance of the operator, and includes the calling telephone number in the number and setting Capital "Transfer to the "Internet malicious network transmission detection system". If the comparison is not met, but the corresponding "Unable to pass the 0 check" flag will be used, so it will not be inconvenient and increase the passengers of the telecom operators. As a result of the reduction, the phenomenon of more negative cooperation can be used to commit crimes at an early date. Another object of the present invention is to call the telephone number verification and the system of the calling party. In order to avoid the voucher verification system other than the telecommunication industry, the device is also compatible with the new voucher verification 10 201246900, and even 佶;仏&Cheng must be associated with the lack of performance degradation of the new voucher verification system, and the method and system for calling the phone number verification and malicious network call detection of the present invention can be completely Built on the existing telecom architecture and system of the telecom operators, the customer premises equipment does not need to make any changes. 'The original telecommunications equipment does not need to cooperate with the network to send the caller number Marden and the malicious network to send the letter. The method and its system have no additional credential verification channels, so it has many advantages such as economic efficiency, system compatibility and communication efficiency. [Embodiment] Please refer to the first figure and the second figure, which is a method for "a method and system for detecting a calling party's telephone number and detecting a malicious network" for the network. The steps include: a• Directing each network sending user S to enter the “network sending calling party number verification and malicious network sending computer detecting system” via telecommunication network N or Internet I 1 The login interface is 2〇, and the "telephone number" 21 and the "network transmission account setting data" 22 are entered in the login interface 20; b. the login interface 20 receives the "telephone number" 21 and "network transmission" The account setting data "22" will immediately pass the "telephone number usage right verification program" 23, and then store the "telephone number" 21 and the "net 201246900 L account 9 data" 22 in the "network call number". The number verification and the malicious network sending computer detection system search database 50; c. The network sending device S1 sends out the sending of each network ^ by the telecommunication network N or the Internet I enters the network Road sending phone number verification and malicious network sending computer detection system The network sending caller's phone number verification and the malicious network H brain price measurement system J 1 's access interface 30 will automatically capture the "network call signal containing the calling number" from the road signal • Code J S2 and “Network Sending Signal Contains Account Setting Data” and transmitted to the “Searching Software 40 of the Network Calling Calling Number Authentication and Malicious Computer Detection System” 10, the search 11 4Q t $ The "network transmission signal contains the calling telephone number and the "network transmission signal including account setting data" S3, and the search database 50 is compared; and .d. if it is within the search database 50 The stored "telephone number 2 1 and "network mailing account setting data" 22 match at least tb -a - item does not match 'that is, via the indicator software 60, the next recipient's trusted device R1 is connected. The caller's phone number field R2 is not "cannot be sent through the network to call the caller's phone number verification" 'for the trustee to pre-empt the voice master before answering the current communication." 10 signal caller" 10 way to send the network Phone S3, network search for soft" S2 to code J has its communication winning bid corresponding to Fan 12 201246900 Prepare, and put the "receipt on the Internet 彳 § device" s 1 "network transmission signal contains the caller Lei Qian # electric # number" S2 and "network transmission signal contains no account information "S3" is saved to "Internet mailing database that cannot be verified by calling the phone number of the calling network" 5... to provide a new step by statistic in the future: The dynamics of the network sender. The step d further includes a step (Γ: if the network is not ready in step d), the network signaling signal includes the calling telephone number S1 & "the network signaling signal is included The account setting data "S3" matches the "telephone number" 21 and the "network sending account setting data" stored in the search data 帛50, that is, the trusted person who connects the current communication via the standard software 60 The corresponding caller's telephone number field R2 in the trusted device indicates the corresponding sign of "Calling the caller's call through the network. The tongue number is checked", so that the recipient can be assured of the incoming call after the visual inspection. "Send the telephone number of the network transmission signal" S2 & "Network transmission signal contains account setting information" "The telephone number stored in the search database" 21 "Landing account setting data" 22 matches, but "network phone signal contains calling phone number" S2 and search # f (4) ^ ^ 13 201246900 "Phone number J 2 1 comparison does not match, The search software 40 will take the corresponding "electricity" stored in the search database 50. The number "2" and the corresponding identifier of "Unable to send the seven king call number verification through the network" in the recipient's trusted device R1 & Wang called the telephone number field R2 in the next communication. At the same time, the corresponding "telephone number" 21 obtained by the second search database 50 is displayed at the same time, so that the §R can further know the real telephone number of the sender before receiving the communication. ^ "The telephone number" in each step 2 1 is the fixed network local phone = phone number ' or the phone number of the mobile phone; and the "network account 0 and the data" 22 is sent by the network user $ self-step a login interface 2 Can be set as a book, and the Internet sends # write "/ / I am at the telecom operator's office to fill the 22 P tongue number" 2 1 and "network mail account setting information" ^ 'and via the telecom church: go, , the right verification programmer completes the "telephone number use, the "two" and then the telecommunications operator's personnel input, electricity (four) tongue number Ma I 21 r / 22 ^ iE = and network mail account setting information" network / Saved in "network call calling phone number verification and malicious development" Computer detection system Jl0 search data base _ 201246900 voice number verification and malicious network transmission computer detection system " 〇 〇 login interface 2G way ' can also choose the direct dial voice line provided by the existing telecommunications industry, or In the above steps, the telecommunication network N includes the public switched telephone network pSTN (used by the old-fashioned electric tongue). pubHc Switched Telephone Network), and the system used by mobile phones (Global System for Mobile C〇_unications), TDMA system (Time Multiple Access), CDMA system (c〇de Divisi〇n
Multiple Access)、PDC 系統(pers〇nal Dighal Cellular)與IP電信等各種電信網路,且該各種電信 網路又與網際網路I相互鏈結,使得經由網際網路I 進行之發信皆能經由電信網路N,來達成網路發信使 用者S與受信者R之間的雙向傳輸。 因此,詐騙電話之犯罪者雖然可以輕易偽冒「電 話號碼」2 1 ’但無法得知每一網路發信使用者s之 「網路發信帳號設定資料」22,故其經由網際網路 發信I所撥打之發信,會直接被連結至電信網路N 經擷取介面3〇而傳送至「網路發信主叫電話號碼驗 證與惡意網路發信電腦偵測系統」10之「搜尋資料 15 201246900 庫」50內來進行比對,若無法通過比對驗證即會在 接通·該次受信者受信設備R1之主叫電話號碼欄位 R2中同時被標示出『無法通過網路發信主叫電話號 碼驗邊』之對應標示,故受信者R只要經由目視受 信者受信設備R1之主叫電話號碼欄位R2中該『無 法通過網路發信主叫電話號碼驗證』之對應標示, 便可輕易判斷得知該次來電是否為『詐騙電話』,不 必再麻煩地透過官方所設之165反詐騙專線或110 報案電話來加以求證’因此能快速有效阻止『詐騙 電p舌』之犯罪行為。同時,因每次的該通『無法通 過網路發4主叫電話號碼驗證』仍能被接通,故電 信業者除依然仍可收取該通電話的話務費用外,也 不會因過度攔阻」產生客訴,更不會因實施本發 明而減少其營收’如此不僅可收到防止電話詐騙犯 罪之成效’更能去除電信業者不願配合或消極配合 之態度。 續如第二圖所示’係本發明「可對網路發信主 叫電話號碼驗證與惡意網路發信偵溯之方法及其系 統」的系統,其包括: 肩路發仏主叫電話號碼驗證與惡意網路發 信電腦偵測系統」10,其伺脂 共 服器11係鏈結於網際網 201246900 路I ( Internet)上,且其輪出與輸入各種網路之資 料均符合網際網路I之各種通信協定,該伺服器11 內設置有登錄介面20、擷取介面3〇、搜尋軟體4〇、 搜尋資料庫50、標示軟體60及無法通過網路發信主 叫電話號碼驗證之網路發信資料庫5 1 ; —登錄介面20,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」之伺服器 Η內,可供網路發信使用者S輸入其「電話號碼」 2 1及「網路發信帳號設定資料」22 ; —擷取介面30,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」之伺服器 11內,可將網路發信設備S1之「網路發信信號內含 主叫電話號碼」S2及「網路發信信號內含帳號設定 資料」S3自該網路發信信號中擷取,傳送至搜尋軟 體40 ; 一搜尋軟體40,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」1〇之伺服器 11內’具有將來自擷取介面30中的「網路發信信號 内含主叫電話號瑪」S2及「網路發信信號內含帳號 設定資料」S3,與儲存於搜尋資料庫5〇內的「電話 號碼」2 1及「網路發信帳號設定資料」22進行相互 17 201246900 比對驗證之功能; -搜尋資料庫50,係設置於「網路發信主叫電 話號碼驗證與惡意網路發信電腦偵測系統」i 〇之網 站伺服器11内,並登錄儲存有每一網路發信使用者 s之「電話號碼」21及「網路發信帳號設定資料」 22 ; 一標示軟體60,係設於「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」1〇之伺服器 11內,可將搜尋軟體4〇執行「電話號碼」21及「網 路發信帳號設定資料」22之驗證結果,以對應之標 示信號發送給受信者R,並將無法通過網路發信主叫 電話號碼驗證之「網路發信信號内含主叫電話號碼」 S2及「網路發信信號內含帳號設定資料」S3儲存至 「無法通過網路發信主叫電話號碼驗證之網路發信 資料庫」51 ;及 一無法通過網路發信主叫電話號碼驗證之網路 發信資料庫5 1,係設於「網路發信主叫電話號碼驗 證與惡意網路發信電腦偵測系統」1 〇之伺服器11 內,可儲存無法通過網路發信主叫電話號碼驗證之 「網路發信信號内含主叫電話號碼」S2及「網路發 信信號內含帳號設定資料」S3,以提供日後藉由統 201246900 計分析,來造行主動偵測惡意網路發信端的_,態。 其中,該標示軟體60亦可更設於每一受信者r 之受信者受信設備R1内,並經由網際網路下 話機製造廠直接內建來獲得,且該標示軟體6〇所發 送出之對應標示信號,可選擇以文字、符號、語音 或影像等不同方式來輸出,使視障、耳聾等身障受 信者皆能接收到該標示信號。 如第三圖所示,係本發明之系統的另一實施 例’其中’該搜尋資料庫50更包括設置連結於網際 網路I ( Internet )上的每—「網路發信主叫電話號 碼驗證與惡意網路發信電腦偵測系統」70伺服器内 之搜尋資料庫71,且該搜尋資料庫71内部均登錄儲 存有每—網路發信使用者S之「電話號碼」2 1及「網 路發信帳號設定資料」22者。 如第四圖所示’係本發明應用於SIp(Sessi〇nMultiple Access), PDC system (personal Dighal Cellular) and IP telecom and other telecommunication networks, and the various telecommunication networks are linked to the Internet I, so that the transmission via the Internet I can The two-way transmission between the network sender user S and the trustee R is achieved via the telecommunication network N. Therefore, the offender who scams the phone can easily spoof the "telephone number" 2 1 ' but cannot know the "network sending account setting data" 22 of each network sending user, so it is via the Internet. The letter sent by the sender I will be directly connected to the telecommunications network N via the retrieval interface and transmitted to the "network caller's telephone number verification and malicious network transmission computer detection system"10 "Search data 15 201246900 library" 50 is used for comparison. If the comparison verification is not possible, it will be marked at the same time. The caller number field R2 of the trustee receiving device R1 is also marked "Unable to pass the network." The corresponding sign of the telephone number of the calling party is called the telephone number. Therefore, the trustee R only needs to verify the calling party's telephone number through the network by calling the telephone number field R2 of the trusted device R1. Corresponding to the label, you can easily determine whether the call is a "scam phone", and you don't have to bother to verify it through the official 165 anti-fraud line or 110 report phone. Therefore, you can quickly and effectively prevent the fraud. Crime "of. At the same time, because each time the pass "cannot be verified by the network 4 caller number verification" can still be connected, the carrier can still receive the call charge of the call, and will not be blocked due to excessive blocking. Producing customer complaints, and not reducing the revenue of the invention by implementing the invention 'so that not only can the effectiveness of preventing telephone fraud crimes' be removed, it can also remove the attitude of the telecommunications industry who are unwilling to cooperate or passively cooperate. Continued as shown in the second figure, the system of the present invention "method and system for sending a call originating telephone number verification and malicious network transmission detection" to the network, comprising: a shoulder call The number verification and malicious network sending computer detection system 10, its servo-shared device 11 is linked to the Internet 201246900 I (Internet), and its data for the rotation and input of various networks are in line with the Internet. Various communication protocols of the network I, the server 11 is provided with a login interface 20, a capture interface 3, a search software 4, a search database 50, a logo software 60, and a caller's phone number cannot be verified through the network. The network sending database 5 1 ; - the login interface 20 is set in the server of the "network calling call number verification and malicious network sending computer detection system", and can be sent to the network. The user S enters his "telephone number" 2 1 and "network mailing account setting data" 22; - the capturing interface 30 is set in the "network calling caller number verification and malicious network sending computer" In the server 11 of the detection system, the network signaling device S1 can be The "network call signal containing the calling telephone number" S2 and the "network sending signal containing account setting data" S3 are retrieved from the network sending signal and transmitted to the search software 40; a search software 40 It is located in the server 11 of the "Network Calling Calling Number Authentication and Malicious Networking Computer Detection System". It has the "network signaling signal from the retrieval interface 30". The calling party number "S2" and the "network sending signal containing account setting data" S3 are performed with the "telephone number" 2 1 and the "network sending account setting data" 22 stored in the search database 5 Mutual 17 201246900 comparison verification function; - Search database 50, set in the "network call calling number verification and malicious network sending computer detection system" i 〇 web server 11 and login The "telephone number" 21 and the "network sending account setting data" of each network sending user are stored. 22; a software 60 is provided in the "network calling call number verification and malicious network". Road Sending Computer Detection System" in the server 11 The search software 4 will perform the verification result of the "telephone number" 21 and the "network transmission account setting data" 22, and send it to the trustee R with the corresponding indication signal, and will not be able to verify the calling party number through the network. "The network signaling signal contains the calling telephone number" S2 and "Internet mailing signal including account setting data" S3 is stored in the "network sending database that cannot be verified by the calling telephone number of the network." 51; and a network mailing database 5 1 that cannot be authenticated by the calling party's telephone number on the Internet is set up in "Network Calling Telephone Number Authentication and Malicious Networking Computer Detection System" 1 In the server 11, you can store the "network call signal containing the calling number" S2 and the "network sending signal with account setting data" S3 that cannot be verified by the network calling caller number. In order to provide an analysis of the future of the malicious network sender by means of the analysis of 201246900. The marking software 60 can also be disposed in the trusted device R1 of each trustee r, and is directly built by the telephone manufacturer under the Internet, and the corresponding software 6 is sent out. The marking signal can be output in different ways such as text, symbol, voice or image, so that the visually impaired, deaf and other disabled recipients can receive the marking signal. As shown in the third figure, another embodiment of the system of the present invention, wherein the search database 50 further includes a network call originating telephone number that is set to be connected to the Internet I (Internet). Verifying the search database 71 in the server with the malicious network sending computer detection system 70, and the search database 71 internally stores the "telephone number" 2 1 of each network sender user S and "Network mail account setting data" 22. As shown in the fourth figure, the invention is applied to SIp (Sessi〇n
In山atl0n Prot〇c〇1)網路電信通信協定之發信實施 例,其中,笛6 t IP P 用0仃 From』欄位中的”0922222222” 為本發月中擷取介面30要擷取之「網路發信信號內 含王叫電話號碼」S2的位置,同時也是標示軟體6〇 '行^卞又信者受信設備之主叫電話號碼攔位」 的位置’該第3行『Via』欄位中的iii.222.333.442 201246900 是SUM司服器的位址,該第4f?『Via』“ n1·222.333.441 * SIP終端設備的位址以8 行『Contact』欄位"222是si"帳號等 本發明中榻取介面3〇所要榻取「網路發信信號內含 帳號設定資料」S3的位置。雖然惡意發信端可以輕 易窥改該『From』欄位’但無法任意變更該『% 櫚位中SIP終端設備的位址’與該『c_a“』攔位 中SIP的帳號;故經由擷取介面3〇之第6行『 欄位取得「網路發信信號內含主叫電話號碼」:,』 及自第3行『Via』欄位或第4行『ν。』攔位與第8 行『Contact』欄位等所取得「網路發信信號内含帳 號設定資料」S3,會傳送至搜尋軟體4〇進行比對取 得對應之標示信號,再由標示軟體6〇將該對應之標 示信號標示於第6行之『Fr〇m』攔位,便可於當次 通信之受物者受信設備R1之主叫電話號碼欄位& 來顯示該對應之標示信號;當無法通過網路發信主 叫電話號碼驗證時,便會將取自第6行『Fr〇m』欄 位之「網路發信信號內含主叫電話號碼」S2與取自 第3行『Via』攔位或第4行『via』攔位與第8行 『Contact』攔位之「網路發信信號內含帳號設定資 料」S3 —併儲存至「無法通過網路發信主叫電話號 碼驗證之網路發信資料庫」5丨內。 20 201246900 综上所陳,對於電話詐騙犯罪者經由網路發 信’任意變更設定其「網路 網路發信秸號内含主叫電話In mountain atl0n Prot〇c〇1) The transmission protocol of the network telecommunications protocol, in which the flute 6 t IP P uses the "0922222222" in the 0仃From" field for the mid-month access interface 30 Take the location of the "network call signal containing the king called phone number" S2, and also the location of the software 6 〇 '行 卞 卞 卞 受 受 受 受 受 受 ' ' ' 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该 该The iii.222.333.442 201246900 in the field is the address of the SUM server, the 4th? "Via" "n1·222.333.441 * The address of the SIP terminal device is 8 lines "Contact" field " 222 is a position such as a si" account number, etc. in the present invention, in which the "network setting signal includes account setting data" S3 is taken. Although the malicious sender can easily peek the "From" field, but can't arbitrarily change the "IP address of the SIP terminal device in the % palm position" and the SIP account in the "c_a" interface; In line 6 of the interface 3, the field "Get the calling number of the network sending signal":, and from the "Via" field in line 3 or the line "ν". 』Block and the "Contact" field in the 8th line "Contact" field, etc., "Send the account setting data in the network transmission signal" S3, will be transmitted to the search software 4 〇 to obtain the corresponding indication signal, and then by the marking software 6标示 The corresponding indication signal is marked on the “Fr〇m” block in the sixth line, and the corresponding identification signal can be displayed in the calling telephone number field & of the recipient of the communication device R1 of the current communication. When the caller's phone number cannot be verified via the Internet, the "network call signal containing the calling number" S2 from the "Fr〇m" field in the sixth line will be taken from the third "Via" block or line 4 "via" block and line 8 "Contact" block "Network send signal contains account setting data" S3 - and save to "Unable to send the sender through the network Call the network number verification database for phone number verification within 5丨. 20 201246900 In summary, for the phone fraud fraudsters to send a message via the Internet, arbitrarily change the setting of the "network network sender straw number including the calling phone number
乙網路發信’ i以去除詐騙集圑持續以篡改主叫端 王叫電話號碼號碼之網路發信,破解電信業者現有 僅驗證特定主叫端電話號碼之「國際詐騙電話防堵 技術」的漏洞。且此一透過「網路發信信號內含帳 號设定資料」檢驗「網路發信信號內含主叫電話號 锡」之系統’是建構在電信業者既有電信架構與系 統上,電信端無需進行大規模之建置與投資,用戶 端設備無需進行任何改變’通信時原電信設備也無 需與此「網路發信主叫電話號碼產生系統」另行建 構任何額外憑證驗證通道,確具有產業高度利用性 並符合發明專利之要件’爰依法提出申請。 【圖式簡單說明】 第一圖:係本發明之步驟流程圖。 第二圖:係本發明中的系統方塊示意圖之一。 第三圖··係本發明中的系統方塊示意圖之二。 第四圖:係本發明應用於SIP網路電信通信協定之 21 201246900 發信信號的實施例。 【主要元件符號說明】 1 0、70-網路發信主叫電話號碼驗證與惡意網路發信 電腦偵測系統 11-伺服器 20-登錄介面 21-電話號碼 22-網路發信帳號設定資料 _ 23-電話號碼使用權驗證程序 30-擷取介面 40-搜尋軟體 50、71-搜尋資料庫 5 1 -無法通過網路發信主叫電話號碼驗證之網路發信 資料庫 60-標示軟體 I-網際網路 R-受信者 N-電信網路B network sends 'i to remove fraudulent collections and continues to tamper with the network of the calling party's calling phone number, cracking the "international fraud phone anti-blocking technology" that the telecom operators currently only verify the specific calling party's phone number. Vulnerabilities. And this is to verify that the "network signaling signal containing the calling telephone number tin" system is constructed on the existing telecommunications architecture and system of the telecommunications industry through the "network transmission signal containing account setting data". No need for large-scale construction and investment, the client equipment does not need to make any changes. 'The original telecom equipment does not need to construct any additional credential verification channel with this "network call originating telephone number generation system". Highly usable and in line with the requirements of the invention patent '爰 apply in accordance with the law. BRIEF DESCRIPTION OF THE DRAWINGS The first figure is a flow chart of the steps of the present invention. Second figure: One of the block diagrams of the system in the present invention. The third figure is the second schematic diagram of the system block in the present invention. Fourth Figure: An embodiment of the present invention applied to the SIP Network Telecommunications Protocol 21 201246900 signaling signal. [Main component symbol description] 1 0, 70-network call calling phone number verification and malicious network sending computer detection system 11 - server 20 - login interface 21 - phone number 22 - network sending account setting _ _ 23 - Phone number usage right verification program 30 - Capture interface 40 - Search software 50, 71 - Search database 5 1 - Network transmission database 60 - can not be verified by the network caller phone number verification Software I-Internet R-Recipient N-Telecom Network
Ri-受信者受信設備 R2 -電話號碼攔位 S-網路發信使用者 S1-網路發信設備 52- 網路發信信號內含主叫電話號碼 53- 網路發信信號內含帳號設定資料 22Ri-trustee trusted device R2 - phone number block S-network sender user S1-network sender device 52- network call signal contains caller number 53- network call signal contains account Setting information 22