WO2008089626A1 - Procédé d'identification d'un appel malveillant - Google Patents

Procédé d'identification d'un appel malveillant Download PDF

Info

Publication number
WO2008089626A1
WO2008089626A1 PCT/CN2007/003614 CN2007003614W WO2008089626A1 WO 2008089626 A1 WO2008089626 A1 WO 2008089626A1 CN 2007003614 W CN2007003614 W CN 2007003614W WO 2008089626 A1 WO2008089626 A1 WO 2008089626A1
Authority
WO
WIPO (PCT)
Prior art keywords
malicious call
call
user terminal
malicious
information
Prior art date
Application number
PCT/CN2007/003614
Other languages
English (en)
French (fr)
Inventor
Min Shen
Zhenwu Hao
Wenjie Ling
Hao Shi
Zhisong Wang
Chengnian Shen
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Publication of WO2008089626A1 publication Critical patent/WO2008089626A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer

Definitions

  • the present invention relates to the field of communications, and more particularly to a malicious call identification method.
  • Malicious Call Identification MCID
  • the application mode that can be implemented in the prior art is: User A registers a malicious call automatic identification service in the communication system in advance, when other When the user calls this user, the communication system automatically records the information of the primary, called number, and call time of the current call.
  • the information recorded by the communication system in the above manner can be provided to the user A in various ways, for example: the user directly queries the operator's business hall, the user dials the operator's customer service center for inquiry, and the like.
  • the malicious call identification service can be completed by the user's intelligent terminal and the application server (Application Server, AS for short) set by the operator in the network.
  • Figure 1 is a typical service implementation architecture in a next-generation network, where the application server (AS)
  • the service message between the user terminal A and the user terminal B (identified by the dotted line) ) will flow through their respective application servers (depending on the type of user service, may go through different application servers), the application server can achieve rich services through various processing of business messages.
  • the user terminal A and the user terminal B exchange and negotiate the media parameters supported by the two parties by using the service message, and establish a media stream connection (using a solid line identifier) between the two, and the media stream is used for transmitting data such as a voice packet.
  • the present invention provides a malicious call identification method to meet the needs of operators and users for malicious call identification services.
  • the malicious call identification method according to the present invention includes the following steps: S102: The second user terminal initiates a call invitation request to the first user terminal and establishes a connection with the first user terminal, where the first user terminal registers the malicious call identification service in advance.
  • the call invitation request passes the malicious call identification application server, and the malicious call identification application server temporarily stores the information of the call invitation request;
  • S104 the first user terminal determines that the call is a malicious call, and during the call or after the call ends Sending the malicious call information record indication to the malicious call identification application server;
  • S106 the malicious call identification application server checks the malicious call identification service registration status of the first user terminal and performs feedback, wherein the first user terminal has malicious call identification service authority And if the malicious call identification application has the relevant information of the call, the related information of the call or the related information of the call is sent to the designated device for recording, and is sent to the first user terminal.
  • the malicious call identification application server sends a failure response message to the first user terminal if a user terminal does not have the malicious call identification service authority or the related information of the call is not present on the malicious call identification application server; and S108, After the first user terminal and the second user terminal terminate the call for a predetermined period of time, the malicious call identification application server releases the temporarily stored related information.
  • the malicious call information record indication is sent to the malicious call identification application server by using at least one of the following initial session protocol (SIP) messages having different dialog identifiers with the call: an information message or an invite message.
  • SIP initial session protocol
  • the destination address indicated by the malicious call information record is set to the X number.
  • the X number is the number or address information of the malicious call identification application.
  • the X number may also include specific index information for the malicious call identification application server to distinguish different calls or to quickly locate malicious call information that needs to be recorded.
  • the malicious call information record indication is sent to the malicious call identification application server by the following at least one SIP message having the same dialog identifier as the call: an information message, a repeat invitation message, an update message or a notification message.
  • the malicious call information record indication includes: a Y parameter, which is used to instruct the malicious call identification application server to record related information of the call.
  • the Y parameter shall include: a special identification identifier for the malicious call identification application server to intercept malicious call information.
  • the Y parameter may also include specific index information for the malicious call identification application server to distinguish different calls or to quickly locate malicious call information that needs to be recorded.
  • the X number or the Y parameter is obtained by at least one of the following: the user inputs the X number and/or the Y parameter into the user terminal before sending the malicious call information record indication through the user terminal; the user, the operator, or the terminal manufacturer pre- ⁇ 1
  • the X number and/or the Y parameter are set on the user terminal; when the user registers the malicious call identification service, the operator downloads the X number and/or the Y parameter to the user terminal through the network; when the user terminal registers in the network, Downloaded by the operator via the network
  • the X number and/or Y parameters are sent to the user terminal; and when the user is called, the malicious call identification application server on the service message path transmits the X number and/or Y parameters to the user terminal using the relevant service message.
  • the invention can realize the malicious call identification service in the NGN, and meet the requirements of the operator and the user for the malicious call identification service.
  • FIG. 1 is a typical service implementation architecture diagram in a next generation network
  • FIG. 2 is a flowchart of a malicious call identification method according to an embodiment of the present invention
  • FIG. 3 is an implementation of the present invention.
  • FIG. 4 is a flow chart of a malicious call identification service using the method shown in FIG. 2 according to another embodiment of the present invention.
  • the malicious call identification method includes the following steps: S202: A second user terminal initiates a call invitation request to a first user terminal, and establishes a connection with the first user terminal, where the first user terminal registers a malicious call in advance. Identifying the service, the call invitation request passes the malicious call identification application server, and the malicious call identification application server temporarily stores the information of the call invitation request; S204, the first user terminal determines that the call is a malicious call, and during the call or the call After the end, the malicious call information record indication is sent to the malicious call identification application server; S206, the malicious call identification application server checks the malicious call identification service registration status of the first user terminal and performs feedback, wherein, at the first user terminal In the case of the malicious call identification service authority, the related information of the call is recorded or the related information of the call is sent to the designated device for recording, and the success response message is sent to the first user terminal, and the first user terminal does not have the Malicious call identification service authority or malicious call identification In the case that there is no relevant information of the call on
  • the malicious call identification application server releases the relevant information of the temporary storage.
  • the malicious call information record indication is sent to the malicious call identification application server by using at least one of the following initial session protocol (SIP) messages having different dialog identifiers with the call: an information message or an invite message.
  • SIP session protocol
  • the destination address indicated by the malicious call information record is set to the X number.
  • the X number is the number or address information of the malicious call identification application server.
  • the X number may also include specific I information for the malicious call identification application server to distinguish different calls or to quickly locate malicious call information to be recorded.
  • the malicious call information record indication is sent to the malicious call identification application server by the following at least one SIP message having the same dialog identifier as the call: an information message, a repeat invitation message, an update message or a notification message.
  • the malicious call information record indication includes: a Y parameter, which is used to instruct the malicious call identification application server to record related information of the call.
  • the Y parameter shall include: a special identification identifier for the malicious call identification application server to intercept malicious call information.
  • the Y parameter may also include specific index information for the malicious call identification application server to distinguish between different calls or to quickly locate malicious call information to be recorded.
  • the X number or the Y parameter is obtained by at least one of the following: the user inputs the X number and/or the ⁇ parameter into the user terminal before transmitting the indication of the malicious call information by the user terminal; the user, the operator, or the terminal manufacturer pre-sets the X
  • the number and/or parameter are set on the user terminal; when the user registers the malicious call identification service, the operator downloads the X number and/or the parameter to the user terminal through the network; when the user terminal registers in the network, The operator downloads the X number and/or the parameter to the user terminal through the network; and when the user is called, the malicious call identification application on the service message path utilizes the relevant service message to use the relevant service message to set the X number and/or the parameter Passed to the user terminal.
  • FIG. 3 a malicious call identification service utilizing the method illustrated in FIG. 2 in accordance with an embodiment of the present invention is illustrated.
  • a flowchart of a malicious call identification service according to an embodiment of the present invention (for the sake of simplicity, the proxy-call session control function, the service-call ⁇ control function is omitted in this figure, for two users)
  • Network devices such as other application servers for services) include the following steps:
  • the user initiates a call ⁇ ⁇ invitation request to the user, since the user A has previously board malicious call identification service, the user initiates an invitation request Beta Malicious Call Identification via Application Server (MCID AS) 0
  • the MCID AS temporarily stores information about the call, including the calling number, the called number, and the current time.
  • the MCID AS forwards the invitation request to the user A.
  • the user A determines that the call is a malicious call, and uses the user terminal to send an indication to the MCID AS to record malicious call information;
  • the indication message may use a message (MESSAGE) message or an invitation (INVITE) message defined in the SIP, and the message
  • the conversation between the users A and B has different conversation identifiers, and the message destination is set to the X number.
  • the message may carry the Y parameter or may not be carried; the indication message may also use the information (MESSAGE) message defined in the SIP or the repetition.
  • Invite (relNVITE) message or update (UPDATE) message or notification (INFO) message
  • this message has the same conversation identifier as the call between users A, B, and the message carries the Y parameter to indicate that the MCID AS records the current call.
  • Related Information S312: After receiving the indication message, the MCID AS checks the service registration status of the user A. If user A has the right to maliciously identify the service, and the MCID AS has the information such as the primary and called numbers of the current call, the MCID AS records the related information locally, or sends the related information to the specific device set by the operator for recording. . S314, the MCID AS returns a successful response to User A.
  • the X number used in the indication message that the user A sends the recorded malicious call information may be the number or address information of the MCID AS, and is used to identify the destination of the indication message; the X number may also include specific index information. , for MCID AS to distinguish between different calls, and / or to quickly locate malicious call information to be recorded.
  • the purpose of the Y parameter used by the user A to send the indication message for recording the malicious call information may be: including a special identification flag for the MCID AS to intercept the message, and/or including specific index information for different MCID AS differences. Call and/or quickly locate malicious call information to be recorded.
  • step S312 if the MCID AS verifies that the user A has not advertised the malicious call identification service, or the MCID AS has no record of the related call, the MCID AS returns a failure response to the user A in step S314.
  • the malicious call identification service (for the sake of simplicity, the proxy-call session control function, the service-call session control function, and other application services for two users are omitted in this figure. ) Includes the following steps:
  • the MCID AS temporarily stores information about the call, including the calling number, the called number, and the current time.
  • the MCID AS forwards the invitation request to the user A.
  • user A determines that the call is a malicious call, and uses the user terminal to send an indication to the MCID AS to record malicious call information;
  • the indication message may use a message (MESSAGE) message or an invitation (INVITE) message defined in the SIP, and the message is
  • the conversation between the users A and B has different conversation identifiers, and the message destination is set to the X number.
  • the message may carry the Y parameter or may not carry.
  • the MCID AS After receiving the indication message, the MCID AS checks the service registration status of the user A. If user A has the authority to maliciously identify the service, and the MCID AS still temporarily stores the information such as the primary and called numbers of the current call, the MCID AS records the relevant information locally, or sends the related information to the specific set by the operator. The device records.
  • the MCID AS releases the temporarily stored information related to the call.
  • the X number used by the user A to send the indication message for recording the malicious call information may be the number or address information of the MCID AS, which is used to identify the destination of the indication message; the X number may also include a specific Index information, for MCID AS to distinguish between different calls, and/or to quickly locate malicious call information to be recorded.
  • user A sends an indication message used to record malicious call information.
  • the purpose of the Y parameter may be: Containing specific index information for the MCID AS to distinguish between different calls and/or quick location to record malicious call information.
  • the MCID AS checks that the user A does not register the malicious call identification service, or the MCID AS does not have a record of the related call, the MCID AS returns a failure response to the user A in step S416.
  • the X number and/or Y parameter used by the user A to send the indication message for recording the malicious call information can be obtained separately or together by the following methods: a) the user is transmitting the recorded malicious call information.
  • the X number/Y parameter is temporarily input to the user terminal before the indication; b) the X number/Y parameter is set in advance on the user terminal by the user, the operator or the terminal manufacturer; c) When the user registers the malicious call identification service, the operator downloads the X number/Y parameter to the user terminal through the network; d) when the user terminal registers in the network, the operator downloads the X number/Y parameter through the network to On the user terminal; e) When the user is called, the MC number AS on the service message path uses the relevant service message to deliver the X number/Y parameter to the user terminal.
  • the malicious call identification method includes the following steps: Step 1: User B calls User A to establish a call; If User A registers a malicious call identification service in advance, the service message between the two users will be The MCID AS temporarily saves the calling number, called number, and calling time of the call through the server for the malicious call identification service (hereinafter referred to as MCID AS) serving the user A in the network. Step 2: User A sends an indication to the MCID AS to record malicious call information during the call or during the period of the call. Step 3: After receiving the indication message, the MCID AS detects the service registration status of user A.
  • Step 1 User B calls User A to establish a call; If User A registers a malicious call identification service in advance, the service message between the two users will be The MCID AS temporarily saves the calling number, called number, and calling time of the call through the server for the malicious call identification service (hereinafter referred to as MCID AS) serving the user A in the network.
  • Step 2 User A sends an indication to the
  • Step 4 After the call ends for a period of time, the MCID AS releases the information such as the calling number of the call temporarily saved in step 1. The MCID AS temporarily saves the relevant information of the call until the user ends the call for a period of time; the length of the time can be set by the operator according to the need.
  • the user A sends an indication for recording the malicious call information by using the following method:
  • the user A sends a message (MESSAGE) message or an invitation (INVITE) message defined in the initial session ten (SIP), which is associated with the user A, B.
  • the inter-call has different dialog identifiers, and the message is set to the number of the MCID AS (hereinafter referred to as the X number).
  • the message may carry other indication parameters (hereinafter referred to as the Y parameter, which is used to instruct the MCID AS to record the call.
  • the Y parameter which is used to instruct the MCID AS to record the call.
  • Related information may not carry any indication parameters (if not carried, MCID AS defaults this message to the malicious call information record indication). If the call is not over yet, the user A sends an indication to record the malicious call.
  • User A sends a message defined in SIP (MESSAGE) message or a repeat invitation (relNVITE) message or update ( UPDATE) message or notification (INFO) message, which has the same conversation identifier as the conversation between users A and B.
  • the message carries the Y parameter to instruct the MCID AS to record information about the current call; this message will be along the user.
  • the service message path used by the call between A and B is intercepted by the MCID AS located on this path (MCID AS - according to the Y parameter, it should be handled by itself, and not forwarded to the next on the service message path. a device).
  • the X number and/or Y parameter used by the user A to send the indication message for recording the malicious call information may be obtained separately or together.
  • the malicious call identification service in the NGN can be implemented, thereby satisfying the requirements of the operator and the user for the malicious call identification service.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Description

恶意呼叫 ·只别方法 技术领域 本发明涉及通信领域, 更具体地涉及一种恶意呼叫识别方法。 背景技术 恶意呼叫识别 ( Malicious Call Identification, 简称 MCID )是通信系统 中的一种补充业务, 现有技术中能够实现的应用方式为: 用户 A事先在通信系统中登记恶意呼叫自动识别业务, 当其它用户呼 叫此用户时, 通信系统自动记录本次呼叫的主、被叫号码、呼叫时间等信息。 在以上方式中由通信系统记录的信息, 可以通过多种方式提供给用户 A, 例如: 用户直接到运营商营业厅查询, 用户拨打运营商的客服中心查询, 等等。 本发明不涉及具体的提供方式。 在以 IP多媒体子系统 ( IMS ) 为核心的下一代网络 ( NGN ) 中, 恶意 呼叫识别业务可由用户的智能终端与网络中的由运营商设置的应用服务器 ( Application Server, 简称 AS ) 配合完成。 图 1是下一代网络中的一种典型业务实现架构,其中,应用服务器(AS )
(可能存在多个, 分别用于不同的业务)通过接口与用户归属网络的月 务- 呼叫会话控制功能( S-CSCF )相连, 用户终端 A与用户终端 B之间的业务 消息 (用虚线标识)会流经各自的应用服务器(根据用户业务的种类, 可能 经过不同的应用服务器),应用服务器可通过对业务消息的各种处理以实现丰 富的业务。用户终端 A与用户终端 B利用业务消息交换并协商双方所支持的 媒体参数, 在两者之间建立媒体流连接 (用实线标识;),媒体流用于传送通话 话音包等数据。 在现有高级网络电信因特网融合业务与协议組织 (TISPAN ) 的 NGN 恶意呼叫识别业务技术规范中, 目前仅支持应用方式一,使用应用服务器(专 用于恶意呼叫识别业务或同时用于包括恶意呼叫识别业务在内的多项业务) 在通话接续过程中对登记了恶意呼叫识别业务的用户的来电信息自动进行记 录。 以上方式存在以下缺陷: 应用服务器需将用户 A 的所有呼叫都进行记 录, 一方面会占用应用月良务器较大的存储空间, 另一方面后续还需要用户 A 从大量的呼叫信息中筛选出真正的恶意呼叫, 较为不便。 本发明提出了更便利的 NGN中恶意呼叫识别业务的实现方法。 发明内容 鉴于以上一个或多个问题, 本发明提出了一种恶意呼叫识别方法, 以满 足运营商与用户对恶意呼叫识别业务的需求。 根据本发明的恶意呼叫识别方法包括以下步骤: S102, 第二用户终端向 第一用户终端发起通话邀请请求并与第一用户终端建立连接, 其中, 第一用 户终端预先登记了恶意呼叫识别业务, 通话邀请请求经过恶意呼叫识别应用 月 I务器, 恶意呼叫识别应用服务器暂存有通话邀请请求的信息; S104, 第一 用户终端判断该次通话为恶意呼叫, 并在通话过程中或通话结束后将恶意呼 叫信息记录指示发送至恶意呼叫识别应用服务器; S106, 恶意呼叫识别应用 服务器核查第一用户终端的恶意呼叫识别业务登记情况并进行反馈, 其中, 在第一用户终端具有恶意呼叫识别业务权限且所述恶意呼叫识别应用 l 务器 上存在该次呼叫的相关信息的情况下, 记录该次呼叫的相关信息或将该次呼 叫的相关信息发送至指定设备进行记录, 并向第一用户终端发送成功响应消 息, 在第一用户终端不具有恶意呼叫识别业务权限或恶意呼叫识别应用月艮务 器上不存在该次呼叫的相关信息的情况下, 恶意呼叫识别应用服务器向第一 用户终端发送失败响应消息; 以及 S108 , 在第一用户终端与第二用户终端终 止通话一段预定时间后, 恶意呼叫识别应用月良务器释放暂存的相关信息。 其中,恶意呼叫信息记录指示通过与通话具有不同对话标识的以下至少 一种初始会话协议 ( SIP )消息发送至恶意呼叫识别应用服务器: 信息消息或 邀请消息。 恶意呼叫信息记录指示的目的地址设置为 X号码。 X号码为恶意 呼叫识别应用^ ^务器的号码或地址信息。 X号码中还可以包括特定索引信息, 用于供恶意呼叫识别应用月艮务器区别不同的呼叫或快速定位需 i己录的恶意呼 叫信息。 或者,恶意呼叫信息记录指示通过与通话具有相同对话标识的以下至少 一种 SIP消息发送至恶意呼叫识别应用服务器: 信息消息、 重复邀请消息、 更新消息或通知消息。 恶意呼叫信息记录指示包括: Y参数, 用于指示恶意 呼叫识别应用服务器记录该次呼叫的相关信息。 Y参数应包括: 特殊识别标 识, 用于供恶意呼叫识别应用服务器拦截恶意呼叫信息。 Y参数还可以包括 特定索引信息, 用于供恶意呼叫识别应用服务器区别不同的呼叫或快速定位 需 i己录的恶意呼叫信息。 其中, 通过以下至少一种方式获取 X号码或 Y参数: 用户在通过用户 终端发送恶意呼叫信息记录指示之前将 X号码和 /或 Y参数输入用户终端; 用户、 运营商、 或终端厂商预先^ 1 X号码和 /或 Y参数设置在用户终端上; 在用户登记恶意呼叫识别业务时, 由运营商通过网络下载 X号码和 /或 Y参 数到用户终端上; 在用户终端在网络中进行注册时, 由运营商通过网络下载
X号码和 /或 Y参数到用户终端上; 以及在用户被呼叫时, 由业务消息路径上 的恶意呼叫识别应用服务器利用相关业务消息将 X号码和 /或 Y参数传递给 用户终端。 通过本发明, 可以实现 NGN中的恶意呼叫识别业务, 满足运营商与用 户对恶意呼叫识别业务的需求。 附图说明 此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是下一代网络中的一种典型业务实现架构图; 图 2是才艮据本发明实施例的恶意呼叫识别方法的流程图; 图 3是 ^居本发明的一个实施例的利用图 2所示的方法的恶意呼叫识别 业务的流程图; 以及 图 4是 >据本发明另一实施例的利用图 2所示的方法的恶意呼叫识别业 务的流程图。 具体实施方式 下面参考附图, 详细说明本发明的具体实施方式。 参考图 2, 说明根据本发明实施例的恶意呼叫识别方法。 如图 2所示, 该恶意呼叫识别方法包括以下步骤: S202, 第二用户终端向第一用户终端发 起通话邀请请求并与第一用户终端建立连接, 其中, 第一用户终端预先登记 了恶意呼叫识别业务, 通话邀请请求经过恶意呼叫识别应用 良务器, 恶意呼 叫识别应用服务器暂存有通话邀请请求的信息; S204, 第一用户终端判断该 次通话为恶意呼叫, 并在通话过程中或通话结束后将恶意呼叫信息记录指示 发送至恶意呼叫识别应用 艮务器; S206, 恶意呼叫识别应用 艮务器核查第一 用户终端的恶意呼叫识别业务登记情况并进行反馈, 其中, 在第一用户终端 具有恶意呼叫识别业务权限的情况下, 记录该次呼叫的相关信息或将该次呼 叫的相关信息发送至指定设备进行记录, 并向第一用户终端发送成功响应消 息, 在第一用户终端不具有恶意呼叫识别业务权限或恶意呼叫识别应用服务 器上不存在该次呼叫的相关信息的情况下, 恶意呼叫识别应用月良务器向第一 用户终端发送失败响应消息; 以及 S208, 在第一用户终端与第二用户终端终 止通话一段预定时间后, 恶意呼叫识别应用服务器释放暂存的相关信息。 其中,恶意呼叫信息记录指示通过与通话具有不同对话标识的以下至少 一种初始会话协议( SIP )消息发送至恶意呼叫识别应用服务器: 信息消息或 邀请消息。 恶意呼叫信息记录指示的目的地址设置为 X号码。 X号码为恶意 呼叫识别应用服务器的号码或地址信息。 X号码中还可以包括特定索 I信息, 用于供恶意呼叫识别应用服务器区别不同的呼叫或快速定位需记录的恶意呼 叫信息。 或者,恶意呼叫信息记录指示通过与通话具有相同对话标识的以下至少 一种 SIP消息发送至恶意呼叫识别应用服务器: 信息消息、 重复邀请消息、 更新消息或通知消息。 恶意呼叫信息记录指示包括: Y参数, 用于指示恶意 呼叫识别应用服务器记录该次呼叫的相关信息。 Y参数应包括: 特殊识别标 识, 用于供恶意呼叫识别应用服务器拦截恶意呼叫信息。 Y参数还可以包括 特定索引信息, 用于供恶意呼叫识别应用服务器区别不同的呼叫或快速定位 需记录的恶意呼叫信息。 其中, 通过以下至少一种方式获取 X号码或 Y参数: 用户在通过用户 终端发送恶意呼叫信息的指示之前将 X号码和 /或 Υ参数输入用户终端; 用 户、 运营商、 或终端厂商预先将 X号码和 /或 Υ参数设置在用户终端上; 在 用户登记恶意呼叫识别业务时, 由运营商通过网络下载 X号码和 /或 Υ参数 到用户终端上; 在用户终端在网络中进行注册时, 由运营商通过网络下载 X 号码和 /或 Υ 参数到用户终端上; 以及在用户被呼叫时, 由业务消息路径上 的恶意呼叫识别应用月良务器利用相关业务消息将 X号码和 /或 Υ参数传递给 用户终端。 参考图 3 , 说明根据本发明实施例的利用图 2所示的方法的恶意呼叫识 別业务。 如图 3所示, 才艮据本发明实施例的恶意呼叫识别业务的流程图 (为 简化起见, 此图中省略了代理-呼叫会话控制功能、 服务-呼叫 ^"控制功能、 为两个用户服务的其它应用服务器等网络设备 ) 包括以下步骤:
S302 , 用户 Β向用户 Α发起通话邀请请求, 由于用户 A事先登己了恶 意呼叫识别业务, 用户 Β 发起的邀请请求经过恶意呼叫识别应用服务器 ( MCID AS )0
S304, MCID AS暂存本次呼叫的相关信息, 包括主叫号码、 被叫号码、 当前时间等。
S306, MCID AS将邀请请求转发给用户 A。
S308 , 用户 A与用户 B通过一系列交互过程 (采用现有技术;), 建立起 通话。
S310, 用户 A判断此次通话为恶意呼叫, 利用用户终端向 MCID AS发 送记录恶意呼叫信息的指示; 此指示消息可采用 SIP 中定义的信息 ( MESSAGE ) 消息或邀请 ( INVITE ) 消息, 此消息与用户 A、 B之间的通 话具有不同的对话标识, 消息目的地设置为 X号码, 消息中可携带 Y参数, 也可不携带; 此指示消息也可采用 SIP 中定义的信息 (MESSAGE ) 消息或 重复邀请(relNVITE ) 消息或更新 ( UPDATE ) 消息或通知 ( INFO ) 消息, 此消息与用户 A、 B之间的通话具有相同的对话标识, 消息中携带 Y参数用 于指示 MCID AS记录本次呼叫的相关信息。 S312 , MCID AS收到指示消息后, 核查用户 A的业务登记情况。 若用 户 A具有恶意呼叫识别业务的权限, 且 MCID AS具有本次通话的主、 被叫 号码等信息, 则 MCID AS在本地记录相关信息, 或将相关信息发送至运营 商设置的特定设备进行记录。 S314, MCID AS向用户 A返回成功响应。
S316, 一段时间后, 用户 A与用户 B终止通话。
S318 , 在通话终止一段时间后, MCID AS释放所暂存的与本次呼叫相 关的信息。 其中, 在步骤 S310中, 用户 A发送记录恶意呼叫信息的指示消息中使 用的 X号码可以是 MCID AS的号码或地址信息, 用于标识指示消息的目的 地; X号码中还可以包含特定索引信息, 供 MCID AS区别不同的呼叫, 和 / 或快速定位需记录的恶意呼叫信息。 在步驟 S310中, 用户 A发送记录恶意呼叫信息的指示消息中使用的 Y 参数的用途可以是: 含有特殊识别标志以供 MCID AS拦截此消息, 和 /或包 含特定索引信息供 MCID AS区别不同的呼叫和 /或快速定位需记录的恶意呼 叫信息。 另外, 在步骤 S312中, 若 MCID AS经核查发现用户 A未登 i己恶意呼 叫识别业务,或者 MCID AS没有相关呼叫的记录,则 MCID AS在步驟 S314 中向用户 A返回失败响应。 参考图 4, 说明根据本发明另一实施例的恶意呼叫识别业务。 如图 4所 示, 该恶意呼叫识别业务(为简化起见, 此图中省略了代理-呼叫会话控制功 能、服务-呼叫会话控制功能、为两个用户服务的其它应用月良务器等网络设备 ) 包括以下步碟:
S402 , 用户 B向用户 A发起通话邀请请求; 由于用户 A事先登记了恶 意呼叫识别业务, 用户 B发起的邀请请求经过 MCID AS。
S404, MCID AS暂存本次呼叫的相关信息, 包括主叫号码、 被叫号码、 当前时间等。
S406, MCID AS将邀请请求转发给用户 A。 S408 , 用户 A与用户 B通过一系列交互过程(采用现有技术), 建立起 通话。
S410, 一段时间后, 用户 A与用户 B终止通话。
S412, 用户 A判断此次通话为恶意呼叫, 利用用户终端向 MCID AS发 送记录恶意呼叫信息的指示; 此指示消息可采用 SIP 中定义的信息 ( MESSAGE ) 消息或邀请 ( INVITE ) 消息, 此消息与用户 A、 B之间的通 话具有不同的对话标识, 消息目的地设置为 X号码, 消息中可携带 Y参数, 也可不携带。
S414, MCID AS收到指示消息后, 核查用户 A的业务登记情况。 若用 户 A具有恶意呼叫识别业务的权限, 且 MCID AS仍暂存了本次通话的主、 被叫号码等信息, 则 MCID AS在本地记录相关信息, 或将相关信息发送至 运营商设置的特定设备进行记录。
S416, MCID AS向用户 A返回成功响应。
S418 , 在通话终止一段时间后, MCID AS释放所暂存的与本次呼叫相 关的信息。 其中, 在步骤 S412中, 用户 A发送记录恶意呼叫信息的指示消息中所 使用的 X号码, 可以是 MCID AS的号码或地址信息, 用于标识指示消息的 目的地; X号码中还可以包含特定索引信息, 供 MCID AS区别不同的呼叫, 和 /或快速定位需记录的恶意呼叫信息。 在步骤 S412中, 用户 A发送记录恶意呼叫信息的指示消息中所使用的
Y参数的用途可以是: 包含特定索引信息供 MCID AS区别不同的呼叫和 /或 快速定位需记录的恶意呼叫信息。 在步骤 S414中, 若 MCID AS经核查发现用户 A未登记恶意呼叫识别 业务, 或者 MCID AS没有相关呼叫的记录, 则 MCID AS在步骤 S416中向 用户 A返回失败响应。 另外, 在步驟 S310和步骤 S412中, 用户 A发送记录恶意呼叫信息的 指示消息中所使用的 X号码与 /或 Y参数,可通过以下方法分别或一起获得: a )用户在发送记录恶意呼叫信息的指示前将 X号码 / Y参数临时输入用户终 端; b ) 由用户、 运营商或终端厂商提前在用户终端上设置 X号码 / Y参数; c )在用户登记恶意呼叫识别业务时, 由运营商通过网络下载 X号码 / Y参数 至用户终端上; d ) 在用户终端在网络中注册时, 由运营商通过网络下载 X 号码 / Y参数至用户终端上; e )在用户被呼叫时, 由业务消息路径上的 MCID AS利用相关业务消息将 X号码 / Y参数传递给用户终端。 综上所述, 据本发明的恶意呼叫识别方法包括以下步骤: 步骤一: 用 户 B呼叫用户 A, 建立通话; 若用户 A事先登记了恶意呼叫识别业务, 则两 个用户之间的业务消息会经过网络中为用户 A服务的用于恶意呼叫识别业务 的应用 务器(以下简称 MCID AS ), MCID AS暂时保存此次呼叫的主叫号 码、 被叫号码、 呼叫时间等信息。 步骤二: 用户 A在通话过程中, 或者在通 话结束一段时间内, 利用用户终端向 MCID AS发送记录恶意呼叫信息的指 示。 步骤三: MCID AS收到指示消息后, 检测用户 A的业务登记情况。 若 用户 A具有恶意呼叫识别业务的权限, 且 MCID AS具有本次通话的主、 被 叫号码等信息, 则 MCID AS在本地记录相关信息, 或将相关信息发送至运 营商设置的 4 定设备, 同时向用户 A返回成功响应; 否则, MCID AS向用 户 A返回失败响应。 步骤四: MCID AS在通话结束一段时间后, 释放在步 骤一中暂时保存的此次呼叫的主叫号码等信息。 其中, MCID AS暂时保存此次呼叫的相关信息, 直至用户通话结束一 段时间后再予以释放; 这段时间的长度可由运营商根据需要设置。 用户 A发送记录恶意呼叫信息的指示可采用以下方法: 用.户 A发送初 始会话十办议( SIP )中定义的信息( MESSAGE )消息或邀请 ( INVITE )消息, 此消息与用户 A、 B 之间的通话具有不同的对话标识, 消息 的地设置为 MCID AS的号码 (以下简称为 X号码), 消息中可携带其它指示参数 (以下 简称为 Y参数, 用于指示 MCID AS记录本次呼叫的相关信息), 也可不携带 任何指示参数 (若不携带, MCID AS默认此消息为恶意呼叫信息记录指示)。 其中, 若通话尚未结束, 用户 A发送记录恶意呼叫的指示除采用上述 方法外, 还可采用以下方法: 用户 A发送 SIP中定义的信息 ( MESSAGE ) 消息或重复邀清 ( relNVITE ) 消息或更新 ( UPDATE ) 消息或通知 (INFO ) 消息, 此消息与用户 A、 B之间的通话具有相同的对话标识, 消息中携带 Y 参数用于指示 MCID AS记录本次呼叫的相关信息; 此消息将沿用户 A、 B 之间的通话所使用的业务消息路径传递, 被位于此路径上的 MCID AS截获 ( MCID AS -据 Y参数判断应由自己处理此消息, 而不再转发给业务消息 路径上的下一个设备)。 其中, 用户 A发送记录恶意呼叫信息的指示消息中所使用的 X号码与 / 或 Y参数, 可以分别获得也可以一起获得。 通过本发明, 可实现 NGN中的恶意呼叫识别业务, 从而可以满足运营 商与用户对恶意呼叫识别业务的需求。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步驟可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软 件结合。 应该明白, 这些具体实施中的变化对于本领域的技术人员来说是显 而易见的, 不脱离本发明的精神保护范围。 以上所述仅为本发明的优选实施例而已 , 并不用于限制本发明,对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 4青神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种恶意呼叫识别方法, 其特征在于, 所述方法包括以下步骤:
S 102 ,第二用户终端向第一用户终端发起通话邀请请求并与所述第 一用户终端建立连接, 其中, 所述第一用户终端预先登 i己了恶意呼叫识 别业务, 所述通话邀请请求经过恶意呼叫识别应用服务器, 所述恶意呼 叫识别应用月良务器暂存有所述通话邀请请求的信息;
S104 , 所述第一用户终端判断该次通话为恶意呼叫, 并在通话过程 中或通话结束后将恶意呼叫信息记录指示发送至所述恶意呼叫识别应用 服务器;
S 106 ,所述恶意呼叫识别应用 良务器核查所述第一用户终端的恶意 呼叫识別业务登记情况并进行反馈; 以及
S108 ,在所述第一用户终端与所述第二用户终端终止通话一段预定 时间后, 所述恶意呼叫识别应用 务器释放暂存的相关信息。
2. 根据权利要求 1所述的恶意呼叫识别方法, 其特征在于:
在所述第一用户终端具有恶意呼叫识别业务权限且所述恶意呼叫 识别应用月艮务器上存在该次呼叫的相关信息的情况下, 记录该次呼叫的 相关信息或将该次呼叫的相关信息发送至指定设备进行记录, 并向所述 第一用户终端发送成功响应消息; 以及
在所述第一用户终端不具有恶意呼叫 只别业务权限或所述恶意呼 叫识别应用服务器上不存在该次呼叫的相关信息的情况下, 所迷恶意呼 叫识别应用服务器向所述第一用户终端发送失败响应消息。
3. 根据权利要求 1或 2所述的恶意呼叫识别方法, 其特征在于, 所述恶意 呼叫信息记录指示通过与所述通话具有不同对话标识的以下至少一种初 始会话协议消息发送至所述恶意呼叫识别应用服务器: 信息消息或邀请 消息。
4. 根据权利要求 3所述的恶意呼叫识别方法, 其特征在于, 所述恶意呼叫 信息记录指示的目的地址设置为 X号码,所述 X号码为所述恶意呼叫识 别应用 务器的号码或地址信息。 根据权利要求 4所述的恶意呼叫识别方法, 其特征在于, 所述 X号码还 包括: 特定索引信息, 用于供所述恶意呼叫识别应用服务器区别不同的 呼叫或快速定位需记录的恶意呼叫信息。 根据权利要求 2所述的恶意呼叫识别方法, 其特征在于, 通过与所述通 话具有相同对话标识的以下至少一种 SIP消息发送至所述恶意呼叫识别 应用月艮务器: 信息消息、 重复邀请消息、 更新消息或通知消息。 根据权利要求 6所述的恶意呼叫识别方法, 其特征在于, 所述恶意呼叫 信息包括: Y参数, 用于指示所述恶意呼叫识別应用 艮务器记录该次呼 叫的相关信息。 根据权利要求 7所述的恶意呼叫识别方法, 其特征在于, 所述 Y参数包 括: 特殊识别标识, 用于供所述恶意呼叫识别应用服务器拦截所述恶意 呼叫信息。 根据权利要求 8所述的恶意呼叫识别方法, 其特征在于 , 所述 Y参数还 包括: 特定索引信息, 用于供所述恶意呼叫识别应用服务器区别不同的 呼叫或快速定位需记录的恶意呼叫信息。 根据权利要求 3至 9中任一项所述的恶意呼叫识别方法, 其特征在于 , 通过以下至少一种方式获取所述 X号码或所述 Y参数:
用户在通过所述用户终端发送所述恶意呼叫信息记录指示之前将 所述 X号码和 /或所述 Y参数输入所述用户终端;
所述用户、 运营商、 或终端厂商预先^夺所述 X号码和 /或所述 Y参 数设置在所述用户终端上;
在用户登记所述恶意呼叫识别业务时, 由运营商通过网络下载所述 X号码和 /或所述 Y参数到所述用户终端上;
在所迷用户终端在网络中进行注册时, 由运营商通过网络下载所述
X号码和 /或所述 Y参数到所述用户终端上; 以及
在所述用户被呼叫时, 由业务消息路径上的恶意呼叫识別应用服务 器利用相关业务消息将所述 X号码和 /或所述 Y参数传递给所述用户终 端。
PCT/CN2007/003614 2007-01-22 2007-12-14 Procédé d'identification d'un appel malveillant WO2008089626A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710000365.4 2007-01-22
CNA2007100003654A CN101232536A (zh) 2007-01-22 2007-01-22 恶意呼叫识别方法

Publications (1)

Publication Number Publication Date
WO2008089626A1 true WO2008089626A1 (fr) 2008-07-31

Family

ID=39644094

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/003614 WO2008089626A1 (fr) 2007-01-22 2007-12-14 Procédé d'identification d'un appel malveillant

Country Status (2)

Country Link
CN (1) CN101232536A (zh)
WO (1) WO2008089626A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130276106A1 (en) * 2009-03-04 2013-10-17 Christopher Barton System, method, and computer program product for verifying an identification of program information as unwanted
US8719939B2 (en) 2009-12-31 2014-05-06 Mcafee, Inc. Malware detection via reputation system
US9781256B2 (en) * 2012-10-31 2017-10-03 Intellisist Inc. Computer-implemented system and method for determining a status of a call connection
CN107566597A (zh) * 2016-06-30 2018-01-09 百度在线网络技术(北京)有限公司 一种用于标记骚扰号码的方法与装置
USRE47558E1 (en) 2008-06-24 2019-08-06 Mcafee, Llc System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
RU2724630C1 (ru) * 2019-06-13 2020-06-25 Сергей Олегович Крюков Способ фильтрации нежелательных входящих звонков на сотовые телефоны
EP4373031A1 (en) * 2022-11-21 2024-05-22 AO Kaspersky Lab System and method for recognizing undersirable calls

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101695095B (zh) * 2009-10-22 2014-10-22 中兴通讯股份有限公司 下一代网络中追踪恶意呼叫的方法和系统
CN105407476A (zh) * 2014-08-25 2016-03-16 中兴通讯股份有限公司 一种通话中控制拆线的方法及终端
CN107509002A (zh) * 2017-09-05 2017-12-22 王小安 一种手机通讯骚扰解决方法
CN110611731A (zh) * 2018-06-14 2019-12-24 中国移动通信集团设计院有限公司 抵御恶意呼叫的方法和装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS573491A (en) * 1980-06-06 1982-01-08 Nec Corp Incoming call restricting system
CN1529486A (zh) * 2003-10-20 2004-09-15 中兴通讯股份有限公司 一种避免恶意呼叫的方法
KR20060079869A (ko) * 2005-01-03 2006-07-07 주식회사 케이티프리텔 음성 통화 시 악의호 추적 방법 및 그 장치

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS573491A (en) * 1980-06-06 1982-01-08 Nec Corp Incoming call restricting system
CN1529486A (zh) * 2003-10-20 2004-09-15 中兴通讯股份有限公司 一种避免恶意呼叫的方法
KR20060079869A (ko) * 2005-01-03 2006-07-07 주식회사 케이티프리텔 음성 통화 시 악의호 추적 방법 및 그 장치

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE47558E1 (en) 2008-06-24 2019-08-06 Mcafee, Llc System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
US20130276106A1 (en) * 2009-03-04 2013-10-17 Christopher Barton System, method, and computer program product for verifying an identification of program information as unwanted
US8627461B2 (en) * 2009-03-04 2014-01-07 Mcafee, Inc. System, method, and computer program product for verifying an identification of program information as unwanted
US8719939B2 (en) 2009-12-31 2014-05-06 Mcafee, Inc. Malware detection via reputation system
US9781256B2 (en) * 2012-10-31 2017-10-03 Intellisist Inc. Computer-implemented system and method for determining a status of a call connection
US20180048761A1 (en) * 2012-10-31 2018-02-15 Intellisist, Inc. Computer-Implemented System And Method For Determining Call Status
US9912806B1 (en) 2012-10-31 2018-03-06 Intellisist, Inc. Computer-implemented system and method for determining call status
US10511710B2 (en) 2012-10-31 2019-12-17 Intellisist, Inc. Computer-implemented system and method for call status determination
CN107566597A (zh) * 2016-06-30 2018-01-09 百度在线网络技术(北京)有限公司 一种用于标记骚扰号码的方法与装置
RU2724630C1 (ru) * 2019-06-13 2020-06-25 Сергей Олегович Крюков Способ фильтрации нежелательных входящих звонков на сотовые телефоны
EP4373031A1 (en) * 2022-11-21 2024-05-22 AO Kaspersky Lab System and method for recognizing undersirable calls

Also Published As

Publication number Publication date
CN101232536A (zh) 2008-07-30

Similar Documents

Publication Publication Date Title
WO2008089626A1 (fr) Procédé d'identification d'un appel malveillant
US8161080B2 (en) XML based transaction detail records
US8218456B2 (en) Lawful call interception support
WO2008025211A1 (fr) Système de réseau de communication, procédé assurant une fonction de prestation de services, et dispositif de prestation de services
US8953583B2 (en) Method and system for selective call forwarding based on media attributes in telecommunication network
WO2008119272A1 (fr) Procédé, terminal et système de mise en oeuvre d'une liaison vidéo dans un réseau de communication vocale
WO2013044649A1 (zh) 电信网络向互联网提供会话服务的方法及系统
EP2563001A1 (en) Method, system and apparatus for implementing secure call forwarding
US20100099389A1 (en) Methods, Presence Server, User Equipment (UE), and Presence Message for User Identity Update
WO2007054001A1 (fr) Système réalisant un service de portabilité de numéro et méthode pour celui-ci
US20140226657A1 (en) Method of exchanging information relating to rich communication services
WO2008064575A1 (fr) Procédé, système et appareil permettant la mise en place de service de partage vidéo
US20150312281A1 (en) Method and system for selection in multi-device scenario
WO2007098706A1 (fr) Procédé permettant de transmettre des données de service et terminal de paquets utilisé dans ce procédé
WO2009024076A1 (fr) Procédé pour configurer un service et entité pour stocker une configuration de service
US9615230B2 (en) Method to manage multiple caller identities in a telecommunication system
WO2011032426A1 (zh) 紧急呼叫跨越业务的实现方法、装置和系统
WO2010069176A1 (zh) 实现pc客户端绑定硬终端时召开会议的方法、登录服务器、会议服务器及pc客户端
WO2011153785A1 (zh) 前转呼叫的方法、装置和系统
WO2011050744A1 (zh) 在通话期间播放多媒体铃音的方法、服务器及终端设备
WO2007090320A1 (fr) Système d'identité d'utilisateur et procédé d'enregistrement et de configuration d'un service et d'un chemin
WO2008025265A1 (fr) Procédé et dispositif pour obtenir un message de route, procédé et système pour localiser un terminal utilisateur
WO2011107001A1 (zh) 呼叫的处理方法和装置
CN1913432B (zh) 卡号业务使用sip鉴权的方法和系统
WO2007098654A1 (fr) Procédé de fourniture de service de déclenchement au décrochage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07845947

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07845947

Country of ref document: EP

Kind code of ref document: A1