WO2011160328A1 - 一种通信监控方法及装置 - Google Patents

一种通信监控方法及装置 Download PDF

Info

Publication number
WO2011160328A1
WO2011160328A1 PCT/CN2010/075840 CN2010075840W WO2011160328A1 WO 2011160328 A1 WO2011160328 A1 WO 2011160328A1 CN 2010075840 W CN2010075840 W CN 2010075840W WO 2011160328 A1 WO2011160328 A1 WO 2011160328A1
Authority
WO
WIPO (PCT)
Prior art keywords
blacklist
short message
calling
call
suspicious
Prior art date
Application number
PCT/CN2010/075840
Other languages
English (en)
French (fr)
Inventor
李丽莉
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011160328A1 publication Critical patent/WO2011160328A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Definitions

  • the invention relates to a communication monitoring technology, in particular to a communication monitoring method and device. Background technique
  • a normal mobile phone user may also have a large number of telephone calls during a certain period of time. It is easy to judge the normal telephone number as a harassing telephone number by using the number of calls of the telephone, resulting in a normal telephone call. The number is blacklisted and its normal call is blocked, affecting the user's normal call. Summary of the invention
  • the main object of the present invention is to provide a communication monitoring method and apparatus, which can prevent a normal telephone number from being mistaken for harassing a telephone number, ensure a normal call of the user, and improve user satisfaction.
  • the invention provides a communication monitoring method, which comprises: Reading the call information CDR in the call information management platform, and determining the suspicious number in the calling number in the read call information CDR according to the set call monitoring rule;
  • the short message CDR of the short message center is read, the blacklist number in the suspicious number in the read short message CDR is determined according to the set short message monitoring rule, and the call or logout is restricted to the determined blacklist number.
  • the method before determining the suspicious number in the calling number of the read call information bill according to the set call monitoring rule, the method further includes: reading the calling number in the call information bill, The calling number is compared with the blacklist number in the blacklist. If the calling number matches the blacklist number in the blacklist, the calling number is a blacklist number and is not processed; otherwise The calling number is not a blacklist number.
  • the determining, according to the set call monitoring rule, the suspicious number in the calling number of the read call information CDR includes: in the call information CDR, selecting a time period set by the call monitoring rule, Within a predetermined period of time, querying the calling number of the call information CDR to perform the number or frequency of the calling party, and comparing with the number or frequency set by the call monitoring rule, reaching the set number of times or frequency, determining the The calling number is a suspicious number; and/or, the length of the ringing when the calling number is called, equal to or less than the set ringing duration, determining that the calling number is a suspicious number; and/or, querying the calling party
  • the calling rule of the number is consistent with the calling rule set by the call monitoring rule, and the calling number is determined to be a suspicious number.
  • the determining, by the set short message monitoring rule, the blacklist number in the suspicious number in the read short message bill includes: in the short message bill, selecting a time period set by the short message monitoring rule, During the time period, according to the received suspicious number, the number of short messages sent by the suspicious number is queried, and the minimum number of short messages sent by the short message monitoring rule is determined, and the suspect number is a blacklist number; and/or Querying the number of short messages received by the suspicious number, determining that the minimum number of received short messages set by the short message monitoring rule is reached, the suspect number is a blacklist number; and/or, sending the short message bar to the suspect number The number is compared with the number of received short messages, If the ratio reaches the threshold set by the short message monitoring rule, the suspicious number is a blacklist number; and/or, according to the illegal keyword set by the short message monitoring rule, the suspicious number is sent to send the content of the short message, if the illegal keyword appears The number of violations reaches the maximum number of violation
  • the present invention further provides a communication monitoring device, which is connected to a billing system BOSS, a short message center, and a call information management platform; the device further includes: an interface module, an analysis module, and a blacklist processing module;
  • An interface module configured to read a call information CDR in the call information management platform, and send the CDR to the analysis module; and read the blacklist number in the blacklist to send to the BOSS;
  • the analyzing module is configured to determine, according to the call monitoring rule, the suspicious number in the calling number of the read call information CDR, and determine the blacklist number in the suspicious number in the obtained short information CDR according to the short message monitoring rule, and the determined black
  • the list number is sent to the blacklist processing module;
  • the blacklist processing module is configured to add the received blacklist number to the blacklist.
  • the device further includes: a configuration module, configured to configure a call monitoring rule and a short message monitoring rule, and stored in a database; a database, configured to save a call monitoring rule, and save a short message monitoring rule; correspondingly, an analysis module, Read the call monitoring rules in the database and read the SMS monitoring rules in the database.
  • the blacklist processing module is specifically configured to add a blacklist number to a blacklist in the database; correspondingly, the database is configured to save a blacklist number in the blacklist; The machine module is also used to read the blacklist number in the blacklist in the database and send it to the BOSS.
  • the analysis module includes a call analysis unit, and the call analysis unit is specifically configured to: in the call information CDR, select a time period set by the call monitoring rule, and query the call information within the set time period.
  • the calling rule of the number is consistent with the calling rule set by the call monitoring rule, and the calling number is determined to be a suspicious number.
  • the call analysis unit is further configured to: read the calling number in the call information CDR, and send a message to the blacklist processing module to query whether the calling number is a blacklist number, and determine that the primary number is a blacklist number.
  • the blacklist processing module is configured to compare the received calling number with the blacklist number in the database blacklist list, and when the blacklist number in the blacklist list matches, return the calling party to the call analyzing unit. The number is the blacklist number information; if it does not match, the call analysis unit returns the information that the calling number is not the blacklist number.
  • the analyzing module includes a short message analyzing unit, and the short message analyzing unit is specifically configured to: in the short message bill, select a time period set by the short message monitoring rule, and according to the received suspicious number, in the time period, Query the number of short messages sent by the suspicious number in the short message CDR, and determine the minimum number of short messages sent by the short message monitoring rule, then the suspect number is the blacklist number; and/or, query the short message CDR If the number of short messages received by the suspicious number is determined, the minimum number of received short messages set by the short message monitoring rule is determined, and the suspicious number is a blacklist number; and/or, the suspicious number in the short message bill is sent short. The number of information is compared with the number of received short messages.
  • the suspect number is a blacklist number; and/or the question of the illegal keyword set according to the short message monitoring rule is suspicious.
  • the number of the short message is sent, and if the number of violation keywords appears, the number of violation keywords set by the SMS monitoring rule is the highest. Value, the number of suspicious number blacklist.
  • the interface module is further configured to read a short message list of the short message center and send the short message list to the short message analysis unit; or the short message analysis unit is further configured to directly read the short message list of the short message center.
  • the configuration module is further used to maintain a blacklist in the database.
  • analyzing the call information CDR by the call monitoring rule confirming the suspicious number in the calling number; analyzing the short message CDR through the short message monitoring rule, and confirming the blacklist number in the suspicious number It can prevent the normal phone number from being mistaken for harassing the phone number and ensure the normal call of the user, thereby improving the user's satisfaction with the communication network and communication products.
  • FIG. 1 is a schematic flowchart of an implementation process of a communication monitoring method according to the present invention
  • FIG. 2 is a schematic structural diagram of a communication monitoring apparatus according to the present invention. detailed description
  • the basic idea of the present invention is: determining a suspicious number in a calling number in a call information bill according to a call monitoring rule, and determining a blacklist number in the suspicious number in the short information bill according to the short message monitoring rule, and restricting the call to the blacklist number Or cancel. As shown in Figure 1, the following steps are included:
  • Step 101 Read a call information CDR and a short message CDR;
  • the interface information module reads the call information CDR in the call information management platform, and sends the read call information CDR to the call analysis unit;
  • the call information CDR includes: a calling number, a called number, a calling time, a ringing duration, and the like;
  • the call information management platform includes a signaling monitoring system call detail record (CDR), a short message calling service platform, and the like;
  • the interface module reads the short message CDR in the short message center, and sends the read short message CDR to the short message analysis unit; or the short message analysis unit directly reads the short message CDR from the short information center;
  • the CDR includes a short message sending number, a short message receiving number, a sending time, a user type, a message content, and the like, and the user type includes a VIP (VIP) user, a general user, and the like;
  • Step 102 Analyze the read call information CDR and the short message CDR according to the set call monitoring rule and the short message monitoring rule, and determine the blacklist number;
  • the call analysis unit receives the call information CDR, and according to the record in the call information CDR, reads the caller's number in the call information CDR, that is, the calling number, and queries whether the calling number is a blacklist number.
  • the information is sent to the blacklist processing module, and the blacklist processing module receives the query information, and compares the calling number with the blacklist number in the blacklist list stored in the database, if the calling number is the same as the blacklist number in the blacklist. If yes, the call analysis unit returns the information that the calling number is the blacklist number, and the call analysis unit does not process the blacklist number; otherwise, the call analysis unit returns the information that the calling number is not the blacklist number.
  • the call analysis unit reads the call monitoring rule in the database, determines the calling number as a suspicious number according to the call monitoring rule, and sends the call number to the short message analyzing unit; the call monitoring rule is set by the user through the configuration module, and is saved in the database. It mainly includes: the number of calls or the calling frequency when the number is used as the calling party in a certain period of time; or the ringing duration of each calling party when the number is used as the calling party in a certain period of time; or when the number is used as the calling party within a certain period of time Regular calls are made, for example, the called number of the call has continuity, and the time, the number of calls or the calling frequency, and the ringing duration can be set by the user according to the actual situation;
  • the call analyzing unit selects a time period set by the call monitoring rule in the call information CDR, and queries the caller in the call information CDR during the time period.
  • the number or frequency of the number of the calling party is compared with the calling number or frequency set by the call monitoring rule. If the number or frequency is equal to or greater than the set number of times or frequency, the calling number is a suspicious number.
  • the calling party The number is normal; and/or, the length of the ringing time when the calling number is used for calling, and if the calling time is equal to or less than the set ringing time, the calling number is a suspicious number; otherwise, the calling number is normal; And/or, querying whether the call of the calling number conforms to the set call rule, for example, whether the number called by the calling party has continuity, and if the calling call rule is met, the calling number is a suspicious number; otherwise, The calling number is normal.
  • the short message analysis unit receives the suspicious number sent by the call analysis unit, reads the short message monitoring rule in the database, and determines the suspicious number as the blacklist number according to the short message monitoring rule; the short message monitoring rule is set by the user through the configuration module, and is saved in the database.
  • the main method includes: a minimum value of the number of short messages sent by the number in a certain period of time; or a minimum value of the number of short messages received by the number; or a ratio of the number of short messages sent by the number to the number of received short messages Threshold value; or setting the violation keyword, the maximum number of times the number of violation keywords appears in the content of the short message; wherein, the time, the minimum value of the number of short messages sent, the minimum value of the number of received short messages, The value of the ratio and the maximum number of violation keywords can be set by the user according to the actual measurement situation;
  • the determining the suspicious number is the blacklist number: the short message analyzing unit selects the time set by the short message monitoring rule in the short message bill, and queries the short message bar in the short message bill in the short message bill. If the number of sending short messages set by the short message monitoring rule reaches the maximum 'J, the value, the suspect number is the blacklist number, otherwise, the suspicious number is normal; and/or, the suspicious number is received to receive the short message. The number of the number of received short messages set by the short message monitoring rule is the blacklist number, otherwise the suspicious number is normal; and/or, the number of short messages sent by the suspicious number is checked and The number of received short messages is compared with the two.
  • the suspect number is a blacklist number; otherwise, the suspect number is normal; and/or, according to the short message monitoring
  • the violation keyword set by the rule queries the suspicious number to send the content of the short message, and if the number of occurrences of the violation keyword reaches the setting of the SMS monitoring rule If the number of violation keyword numbers is the maximum, the suspicious number is a blacklist number; otherwise, the suspicious number is normal.
  • Step 103 Save the determined blacklist number, and limit the determined blacklist number to call or log out.
  • the blacklist number is sent to the blacklist processing module by the short message analysis unit, and the blacklist processing module saves the blacklist number in the blacklist of the database, and the interface module periodically reads The blacklist number in the database blacklist is taken and sent to the camping system (BOSS).
  • BOSS performs call restriction on the blacklist number or cancels the blacklist number.
  • the timing can be set by the user as needed.
  • the user can maintain a blacklist in the database by using a configuration module, where the maintenance includes: adding or deleting a blacklist number in the blacklist.
  • the present invention further provides a communication monitoring device, as shown in FIG. 2, connected to a camping system BOSS, a short message center, and a call information management platform; the device includes: an interface module 201, an analysis module 202, and a black List processing module 203;
  • the interface module 201 is configured to obtain a call information CDR from the call information management platform and send it to the analysis module 202.
  • the short message CDR is obtained from the short message center and sent to the analysis module 202.
  • the blacklist in the blacklist is periodically read. Number, sent to BOSS;
  • the duration of the timing may be set according to requirements;
  • the call information management platform includes a CDR of a signaling monitoring system, a short message service platform, and the like;
  • the call information bill refers to a call record, including a calling number and a called number.
  • the short message CDR includes: a short message sending number, a short message receiving number, a sending time, a user type, a message content, and the like;
  • the user type includes a VIP user, a general user, and the like;
  • the analysis module 202 is configured to analyze the call information CDR according to the call monitoring rule, determine the suspicious number, analyze the short message CDR according to the short message monitoring rule, determine the suspicious number as the blacklist number, and send the blacklist number to the blacklist processing module 203.
  • the call monitoring rule is the number of calls or the calling frequency when the number is used as the calling party within a certain period of time; or the ringing duration of each calling party when the number is used as the calling party in a certain period of time; or a certain period of time
  • a regular call is made, for example, the called number of the called party has continuity, wherein the time, the number of calls or the calling frequency, and the ringing duration can be set by the user according to the actual situation; the suspicious number can be To:
  • the number of calls or call frequency is greater than the preset number or frequency, or The calling number whose ringing duration is greater than the preset ringing duration, and so on.
  • the short message monitoring rule is a minimum value of the number of short messages sent by the number within a certain period of time; or, the minimum number of the number of short messages received by the number; or the number of short messages sent by the number and the number of received short messages
  • the threshold of the ratio or setting the violation keyword, the maximum number of times the number of violation keywords appears in the content of the short message; wherein, the time, the minimum value of the number of short messages sent, and the minimum number of received short messages
  • the maximum value of the ratio and the maximum number of violation keywords can be set by the user according to the actual measurement situation.
  • the blacklist number can be: According to the short message monitoring rule, the number of short messages sent is less than the minimum value, and the short message is received. The number of bars is less than the minimum value, the ratio of the number of sent short messages to the number of received short messages reaches a threshold value, and the number of occurrences of violation keywords in the short message content is greater than the maximum number of suspicious numbers.
  • the blacklist processing module 203 is configured to add a blacklist number to the blacklist.
  • the device further includes:
  • the configuration module 205 is configured to configure a call monitoring rule and configure a short message monitoring rule, and save the data in the database 204.
  • the database 204 is configured to save the configured call monitoring rule and the short message monitoring rule.
  • the analyzing module 202 is configured to read the call monitoring rule and the short message monitoring rule in the database 204.
  • the blacklist processing module 203 is configured to add the blacklist number to the blacklist in the database 204.
  • a database 204 configured to save a blacklist number in the blacklist list
  • the interface module 201 is configured to read the blacklist number in the blacklist of the database 204.
  • the analysis module 202 specifically includes a call analysis unit 2021 and a short message analysis unit 2022;
  • the call analysis unit 2021 is specifically configured to: receive the call information CDR sent by the interface module 201, and read the number of the calling party in the call information CDR, that is, the calling number, and send the blacklist processing module 203 to check whether the calling number is queried. Is the information of the blacklist number; wherein, the query information The calling number is included; the reply message of the blacklist processing module 203 is received, and the calling number is determined to be a blacklist number, and no processing is performed;
  • the blacklist processing module 203 is configured to receive the query information, compare the calling number with the blacklist in the database 204, and if the calling number matches the blacklist number in the blacklist, the call analyzing unit 2021 The information that the calling number is a blacklist number is returned. If the calling number does not match the blacklist number in the blacklist, the call analyzing unit 2021 returns the information that the calling number is not the blacklist number.
  • the call analysis unit 2021 is specifically configured to: read a call monitoring rule in the database 204, and select a time period set by the call monitoring rule in the call information CDR, and query the calling information in the call information bill, the calling party The number or frequency of the number of the calling party is compared with the calling number or frequency set by the call monitoring rule. If the number or frequency is equal to or greater than the set number of times or frequency, the calling number is a suspicious number. Otherwise, the calling party The number is normal;
  • the calling number is a suspicious number; otherwise, the calling number is normal;
  • the short message analyzing unit 2022 is specifically configured to: read the short message monitoring rule set in the database 204, and select a time period set by the short message monitoring rule in the short message bill, and query the short message bill in the time period, and suspicious If the number of short messages sent by the number is reached, if the minimum number of short messages sent by the short message monitoring rule is reached, the suspect number is a blacklist number; otherwise, the suspect number is normal;
  • the suspicious number is a blacklist number; otherwise, the suspicious number is normal; And/or, querying the number of the short message sent by the suspicious number and the number of receiving the short message, comparing the two, if the ratio reaches the threshold set by the short message monitoring rule, the suspicious number is a blacklist number, otherwise , the suspicious number is normal;
  • the suspicious number is normal.
  • the short message analyzing unit 2022 is further configured to read the short message CDR of the short information center.
  • the configuration module 205 is further configured to: maintain a blacklist list in the database 204.
  • the maintenance includes: adding or deleting a blacklist number in the blacklist.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种通信监控方法,读取呼叫信息管理平台中的呼叫信息话单,根据设定的呼叫监控规则确定呼叫信息话单中主叫号码中的可疑号码,读取短信息中心的短信息话单,根据设定的短信监控规则确定短信息话单中可疑号码中的黑名单号码,将确定的黑名单号码限制呼叫或注销。本发明还公开了一种通信监控装置,采用本发明所述的装置及方法,避免正常的电话号码被误认为骚扰电话号码,保证用户正常通话,提高用户满意度。

Description

一种通信监控方法及装置 技术领域
本发明涉及通信的监控技术, 特别是指一种通信监控方法及装置。 背景技术
随着电信业务的发展, 很多人利用电话进行商业促销或诈骗, 利用电 话频繁的拨打正常用户号码, 有时可接通, 有时只是很短的振铃, 然后立 即挂断, 对正常用户造成骚扰。
目前, 对骚扰电话的监控系统大多釆用的都是对呼叫电话的主叫号码 进行分析, 通过在某段时间内主叫号码主叫的次数是否满足设定值来判断 是否是骚扰电话号码, 若是骚扰电话号码, 系统会将该骚扰电话号码加入 黑名单、 或者将该骚扰电话号码注销掉, 使得该号码在一段时间内或永久 不能再拨打或接听电话。
一般情况下, 正常的手机用户在某段时间内也会出现电话呼叫次数较 多的情况, 单纯用电话的主叫次数来判断, 容易将正常的电话号码认定为 骚扰电话号码, 导致正常的电话号码被加入黑名单, 其正常的呼叫被禁止, 影响了用户的正常通话。 发明内容
有鉴于此, 本发明的主要目的在于提供一种通信监控方法及装置, 能 避免正常电话号码被误认为骚扰电话号码, 保证用户正常通话, 提高用户 满意度。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种通信监控方法, 包括: 读取呼叫信息管理平台中的呼叫信息话单, 根据设定的呼叫监控规则 确定所读取呼叫信息话单中主叫号码中的可疑号码;
读取短信息中心的短信息话单, 根据设定的短信监控规则确定所读取 短信息话单中可疑号码中的黑名单号码, 对确定的黑名单号码限制呼叫或 注销。
上述方案中, 所述根据设定的呼叫监控规则确定所读取呼叫信息话单 中主叫号码中的可疑号码之前, 该方法进一步包括: 读取呼叫信息话单中 的主叫号码, 将所读取的主叫号码与黑名单列表中的黑名单号码比较, 若 所述主叫号码与黑名单列表中的黑名单号码相符, 则所述主叫号码为黑名 单号码, 不做处理; 否则, 所述主叫号码不是黑名单号码。
上述方案中, 所述根据设定的呼叫监控规则确定所读取呼叫信息话单 中主叫号码中的可疑号码包括: 在呼叫信息话单中, 选取呼叫监控规则设 定的时间段, 在设定的时间段内, 查询所述呼叫信息话单中主叫号码进行 主叫的次数或频率, 并与呼叫监控规则设定的次数或频率比较, 达到设定 的次数或频率, 则确定所述主叫号码为可疑号码; 和 /或, 查询主叫号码主 叫时的振铃时长, 等于或小于设定的振铃时长, 确定所述主叫号码为可疑 号码; 和 /或, 查询主叫号码的呼叫规律, 与呼叫监控规则设定的呼叫规律 相符, 确定所述主叫号码为可疑号码。
上述方案中, 所述根据设定的短信监控规则确定所读取短信息话单中 可疑号码中的黑名单号码包括: 在短信息话单中, 选取短信监控规则设定 的时间段, 在所述时间段内, 根据接收的可疑号码, 查询可疑号码发送短 信息的条数, 确定达到短信监控规则设定的发送短信息条数最小值, 则所 述可疑号码为黑名单号码; 和 /或, 查询可疑号码接收短信息的条数, 确定 达到短信监控规则设定的接收短信息条数最小值, 则所述可疑号码为黑名 单号码; 和 /或, 将所述可疑号码发送短信息条数与接收短信息条数相比, 若比值达到短信监控规则设定的阔值, 则所述可疑号码为黑名单号码; 和 / 或, 根据短信监控规则设定的违规关键词查询可疑号码发送短信息的内容, 若违规关键词出现的次数达到短信监控规则设定的违规关键词次数最大 值, 则所述可疑号码为黑名单号码。
本发明还提供了一种通信监控装置, 与营帐系统 BOSS、 短信息中心、 呼叫信息管理平台相连; 该装置还包括: 接口机模块、 分析模块、 黑名单 处理模块; 其中,
接口机模块, 用于读取呼叫信息管理平台中的呼叫信息话单, 并发送 给分析模块; 读取黑名单列表中的黑名单号码发送给 BOSS;
分析模块, 用于根据呼叫监控规则确定所读取呼叫信息话单中主叫号 码中的可疑号码, 根据短信监控规则确定获取的短信息话单中可疑号码中 的黑名单号码, 将确定的黑名单号码发送给黑名单处理模块;
黑名单处理模块, 用于将收到的黑名单号码添加到黑名单列表中。 上述方案中, 该装置进一步包括: 配置模块, 用于配置呼叫监控规则 和短信监控规则, 并保存在数据库中; 数据库, 用于保存呼叫监控规则, 保存短信监控规则; 相应的, 分析模块, 用于读取数据库中的呼叫监控规 则, 读取数据库中的短信监控规则。
上述方案中, 所述黑名单处理模块, 具体用于将黑名单号码添加到数 据库中的黑名单列表中; 相应的, 所述数据库, 用于保存黑名单列表中的 黑名单号码; 所述接口机模块, 还用于读取数据库中黑名单列表中的黑名 单号码发送给 BOSS。
上述方案中, 所述分析模块包括呼叫分析单元; 呼叫分析单元具体用 于, 在呼叫信息话单中, 选取呼叫监控规则设定的时间段, 在设定的时间 段内, 查询所述呼叫信息话单中主叫号码进行主叫的次数或频率, 并与呼 叫监控规则设定的次数或频率比较, 达到设定的次数或频率, 则确定所述 主叫号码为可疑号码; 和 /或, 查询主叫号码主叫时的振铃时长, 等于或小 于设定的振铃时长, 确定所述主叫号码为可疑号码; 和 /或, 查询主叫号码 的呼叫规律, 与呼叫监控规则设定的呼叫规律相符, 确定所述主叫号码为 可疑号码。
上述方案中, 呼叫分析单元进一步用于, 读取呼叫信息话单中的主叫 号码, 向黑名单处理模块发送查询主叫号码是否是黑名单号码的信息, 确 定主号码是黑名单号码则不做处理; 相应的, 黑名单处理模块, 用于将接 收的主叫号码同数据库黑名单列表中的黑名单号码比较, 与黑名单列表中 的黑名单号码相符时, 向呼叫分析单元返回主叫号码为黑名单号码的信息; 不相符时, 向呼叫分析单元返回主叫号码不是黑名单号码的信息。
上述方案中, 所述分析模块包括短信分析单元; 短信分析单元具体用 于, 在短信息话单中, 选取短信监控规则设定的时间段, 在所述时间段内, 根据接收的可疑号码, 查询短信息话单中可疑号码发送短信息的条数, 确 定达到短信监控规则设定的发送短信息条数最小值, 则所述可疑号码为黑 名单号码; 和 /或, 查询短信息话单中可疑号码接收短信息的条数, 确定达 到短信监控规则设定的接收短信息条数最小值, 则所述可疑号码为黑名单 号码; 和 /或, 将短信息话单中可疑号码发送短信息条数与接收短信息条数 相比, 若比值达到短信监控规则设定的阔值, 则所述可疑号码为黑名单号 码; 和 /或, 根据短信监控规则设定的违规关键词查询可疑号码发送短信息 的内容, 若违规关键词出现的次数达到短信监控规则设定的违规关键词次 数最大值, 则所述可疑号码为黑名单号码。
上述方案中, 所述接口机模块, 还用于读取短信息中心的短信息名单, 并发送给短信分析单元; 或者, 短信分析单元, 还用于直接读取短信息中 心的短信息名单。
上述方案中, 所述配置模块, 进一步用于维护数据库中的黑名单列表。 釆用本发明所述的通信监控方法及装置, 通过呼叫监控规则分析呼叫 信息话单, 确认主叫号码中的可疑号码; 通过短信监控规则分析短信息话 单, 确认可疑号码中的黑名单号码, 能避免正常的电话号码被误认为骚扰 电话号码, 保证用户的正常通话, 从而提高用户对通信网络及通信产品的 满意度。 附图说明
图 1为本发明通信监控方法的实现流程示意图;
图 2为本发明通信监控装置的组成结构示意图。 具体实施方式
本发明的基本思想是: 根据呼叫监控规则确定呼叫信息话单中主叫号 码中的可疑号码, 再根据短信监控规则确定短信息话单中可疑号码中的黑 名单号码, 对黑名单号码限制呼叫或注销。 如图 1所示, 包括如下步骤:
步骤 101、 读取呼叫信息话单、 短信息话单;
这里, 由接口机模块读取呼叫信息管理平台中的呼叫信息话单, 并将 读取的呼叫信息话单发送给呼叫分析单元;
其中, 所述呼叫信息话单包括: 主叫号码、 被叫号码、 呼叫时间、 振 铃时长等;所述呼叫信息管理平台包括信令监测系统呼叫详细记录(CDR )、 短信呼业务平台等; 接口机模块读取短信息中心中的短信息话单, 将读取 的短信息话单发送给短信分析单元; 或者, 短信分析单元直接从短信息中 心读取短信息话单; 所述短信息话单包括短信息发送号码、 短信息接收号 码、 发送时间、 用户类型、 消息内容等, 所述用户类型包括贵宾(VIP )用 户、 普通用户等; 步骤 102、根据设定的呼叫监控规则、短信监控规则分析读取的呼叫信 息话单、 短信息话单, 确定黑名单号码;
这里, 由呼叫分析单元接收呼叫信息话单, 根据呼叫信息话单中的记 录, 读取呼叫信息话单中进行主叫的号码, 即主叫号码, 将查询主叫号码 是否为黑名单号码的信息发送给黑名单处理模块, 黑名单处理模块接收查 询信息, 将其中的主叫号码同数据库中保存的黑名单列表中的黑名单号码 比较, 若主叫号码同黑名单列表中的黑名单号码相符, 则向呼叫分析单元 回复主叫号码是黑名单号码的信息, 呼叫分析单元对黑名单号码不做处理; 否则, 向呼叫分析单元回复主叫号码不是黑名单号码的信息。
呼叫分析单元读取数据库中的呼叫监控规则, 根据呼叫监控规则确定 主叫号码为可疑号码, 并发送给短信分析单元; 所述呼叫监控规则由用户 通过配置模块设定, 并保存在数据库中, 主要包括: 在某段时间内号码作 为主叫时, 呼叫次数或呼叫频率; 或者某段时间内号码作为主叫时, 每次 主叫的振铃时长; 或者某段时间内号码作为主叫时, 进行规律性呼叫, 例 如所呼叫的被叫号码具有连续性, 其中时间、 呼叫次数或呼叫频率、 振铃 时长可以由用户根据实际情况自行设定;
这里, 所述确定主叫号码为可疑号码具体过程为: 呼叫分析单元在呼 叫信息话单中, 选取呼叫监控规则设定的时间段, 查询这一时间段内, 呼 叫信息话单中, 主叫号码进行主叫的次数或频率, 与呼叫监控规则设定的 主叫次数或频率比较, 若等于或大于设定的次数或频率, 则所述主叫号码 为可疑号码, 否则, 所述主叫号码正常; 和 /或, 查询主叫号码进行主叫时 的振铃时长, 若等于或小于设定的振铃时长, 则所述主叫号码为可疑号码, 否则, 所述主叫号码正常; 和 /或, 查询主叫号码的呼叫是否符合设定的呼 叫规律, 例如主叫所呼叫的号码是否具有连续性, 若符合设定的呼叫规律, 则所述主叫号码为可疑号码, 否则, 所述主叫号码正常。 短信分析单元接收呼叫分析单元发送的可疑号码, 读取数据库中的短 信监控规则, 根据短信监控规则确定可疑号码为黑名单号码; 所述短信监 控规则由用户通过配置模块设定, 并保存在数据库中, 主要包括: 某段时 间内号码发送短信息的条数的最小值; 或者, 号码接收短信息的条数的最 小值; 或者号码发送短信息的条数与接收短信息的条数的比值的阈值; 或 者设置违规关键词, 号码发送短信息的内容中出现违规关键词的次数的最 大值; 其中, 所述时间、 发送短信息条数的最小值、 接收短信息条数的最 小值、 比值的阔值、 违规关键词次数最大值可由用户根据实际测量情况自 行设定;
所述确定可疑号码为黑名单号码为: 短信分析单元在短信息话单中, 选取短信监控规则设定的时间, 查询这一时间段内, 短信息话单中, 可疑 号码发送短信息的条数, 若达到短信监控规则设定的发送短信息条数最 'J、 值, 则所述可疑号码为黑名单号码, 否则, 所述可疑号码正常; 和 /或, 查 询可疑号码接收短信息的条数, 达到短信监控规则设定的接收短信息条数 最小值, 则所述可疑号码为黑名单号码, 否则, 所述可疑号码正常; 和 /或, 查询可疑号码发送短信息的条数以及接收短信息的条数, 将两者相比, 若 比值达到短信监控规则设定的阔值, 则所述可疑号码为黑名单号码, 否则, 所述可疑号码正常; 和 /或, 根据短信监控规则设定的违规关键词查询可疑 号码发送短信息的内容, 若违规关键词出现的次数达到短信监控规则设定 的违规关键词次数最大值, 则所述可疑号码为黑名单号码, 否则, 所述可 疑号码正常。
步骤 103、保存确定的黑名单号码, 将确定的黑名单号码限制呼叫或注 销。
这里, 由短信分析单元将黑名单号码发送给黑名单处理模块, 黑名单 处理模块将黑名单号码保存在数据库的黑名单列表中, 接口机模块定时读 取数据库黑名单列表中的黑名单号码, 并发送给营帐系统(BOSS ), BOSS 对黑名单号码进行呼叫限制或注销黑名单号码; 所述定时时间可由用户根 据需要设置。
进一步的, 用户可通过配置模块维护数据库中的黑名单列表, 所述维 护包括: 增加或删除黑名单列表中的黑名单号码。
基于以上方法, 本发明还提供了一种通信监控装置, 如图 2所示, 与 营帐系统 BOSS、 短信息中心、 呼叫信息管理平台相连; 该装置包括: 接口 机模块 201、 分析模块 202、 黑名单处理模块 203;
接口机模块 201 ,用于从呼叫信息管理平台获取呼叫信息话单并发送给 分析模块 202; 从短信息中心获取短信息话单并发送给分析模块 202; 定时 读取黑名单列表中的黑名单号码, 发送给 BOSS;
其中, 所述定时的时长可根据需要自行设置; 所述呼叫信息管理平台 包括信令监测系统 CDR、 短信呼业务平台等; 所述呼叫信息话单指通话记 录, 包括主叫号码、 被叫号码、 呼叫时间、 振铃时长等; 所述短信息话单 包括: 短信息发送号码、 短信息接收号码、 发送时间、 用户类型、 消息内 容等; 所述用户类型包括 VIP用户、 普通用户等;
BOSS, 用于对接收到的黑名单号码进行呼叫限制或注销;
分析模块 202, 用于根据呼叫监控规则分析呼叫信息话单, 确定可疑号 码; 根据短信监控规则, 分析短信息话单, 确定可疑号码为黑名单号码, 将黑名单号码发送给黑名单处理模块 203; 其中, 所述呼叫监控规则为在某 段时间内号码作为主叫时, 呼叫次数或呼叫频率; 或者某段时间内号码作 为主叫时, 每次主叫的振铃时长; 或者某段时间内号码作为主叫时, 进行 规律性呼叫, 例如所呼叫的被叫号码具有连续性, 其中时间、 呼叫次数或 呼叫频率、 振铃时长可以由用户根据实际情况自行设定; 所述可疑号码可 以为: 根据呼叫监控规则, 呼叫次数或呼叫频率大于预设次数或频率, 或 振铃时长大于预设振铃时长等等的主叫号码。 所述短信监控规则为某段时 间内号码发送短信息的条数的最小值; 或者, 号码接收短信息的条数的最 小值; 或者号码发送短信息的条数与接收短信息的条数的比值的阈值; 或 者设置违规关键词, 号码发送短信息的内容中出现违规关键词的次数的最 大值; 其中, 所述时间、 发送短信息条数的最小值、 接收短信息条数的最 小值、 比值的阔值、 违规关键词次数最大值可由用户根据实际测量情况自 行设定; 相应的, 所述黑名单号码可以为: 根据短信监控规则, 发送短信 息条数小于最小值、 接收短信息条数小于最小值、 发送短信息的条数与接 收短信息的条数的比值达到阔值、 短信息内容中出现违规关键词的次数大 于最大值等的可疑号码。
黑名单处理模块 203 , 用于将黑名单号码添加到黑名单列表。
该装置进一步包括:
配置模块 205 , 用于配置呼叫监控规则和配置短信监控规则, 并保存在 数据库 204中;
数据库 204用于, 保存配置的呼叫监控规则以及短信监控规则; 分析模块 202,用于读取数据库 204中的呼叫监控规则及短信监控规则。 黑名单处理模块 203 ,用于将黑名单号码添加到数据库 204中的黑名单 列表;
数据库 204, 用于保存黑名单列表中的黑名单号码;
相应的,接口机模块 201 , 用于读取数据库 204黑名单列表中的黑名单 号码。
分析模块 202具体包括呼叫分析单元 2021、 短信分析单元 2022;
呼叫分析单元 2021具体用于, 接收接口机模块 201发送的呼叫信息话 单, 读取呼叫信息话单中进行主叫的号码, 即主叫号码, 向黑名单处理模 块 203发送查询主叫号码是否是黑名单号码的信息; 其中, 所述查询信息 中包含主叫号码; 接收黑名单处理模块 203 的回复信息, 确定主叫号码为 黑名单号码, 不做任何处理;
相应的, 黑名单处理模块 203 , 用于接收查询信息, 将主叫号码同数据 库 204 中的黑名单列表比较, 若主叫号码与黑名单列表中的黑名单号码相 符, 则向呼叫分析单元 2021回复主叫号码是黑名单号码的信息, 若主叫号 码与黑名单列表中的黑名单号码不符, 则向呼叫分析单元 2021回复主叫号 码不是黑名单号码的信息。
呼叫分析单元 2021具体用于, 读取数据库 204中的呼叫监控规则, 在 呼叫信息话单中, 选取呼叫监控规则设定的时间段, 查询这一时间段内, 呼叫信息话单中, 主叫号码进行主叫的次数或频率, 与呼叫监控规则设定 的主叫次数或频率比较, 若等于或大于设定的次数或频率, 则所述主叫号 码为可疑号码, 否则, 所述主叫号码正常;
和 /或, 查询主叫号码进行主叫时的振铃时长, 若等于或小于设定的振 铃时长, 则所述主叫号码为可疑号码, 否则, 所述主叫号码正常;
和 /或, 查询主叫号码的呼叫是否符合设定的呼叫规律, 例如主叫所呼 叫的号码是否具有连续性, 若符合设定的呼叫规律, 则所述主叫号码为可 疑号码, 否则, 所述主叫号码正常。
短信分析单元 2022具体用于,读取数据库 204中设置的短信监控规则, 在短信息话单中, 选取短信监控规则设定的时间段, 查询这一时间段内, 短信息话单中, 可疑号码发送短信息的条数, 若达到短信监控规则设定的 发送短信息条数最小值, 则所述可疑号码为黑名单号码, 否则, 所述可疑 号码正常;
和 /或, 查询可疑号码接收短信息的条数, 达到短信监控规则设定的接 收短信息条数最小值, 则所述可疑号码为黑名单号码, 否则, 所述可疑号 码正常; 和 /或, 查询可疑号码发送短信息的条数以及接收短信息的条数, 将两 者相比, 若比值达到短信监控规则设定的阔值, 则所述可疑号码为黑名单 号码, 否则, 所述可疑号码正常;
和 /或, 根据短信监控规则设定的违规关键词查询可疑号码发送短信息 的内容, 若违规关键词出现的次数达到短信监控规则设定的最大值, 则所 述可疑号码为黑名单号码, 否则, 所述可疑号码正常。
进一步的, 短信分析单元 2022进一步用于, 读取短信息中心的短信息 话单。
进一步的, 配置模块 205进一步用于, 维护数据库 204中的黑名单列 表; 其中, 所述维护包括: 增加或删除黑名单列表中的黑名单号码。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进 等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种通信监控方法, 其特征在于, 该方法包括:
读取呼叫信息管理平台中的呼叫信息话单, 根据设定的呼叫监控规则 确定所读取呼叫信息话单中主叫号码中的可疑号码;
读取短信息中心的短信息话单, 根据设定的短信监控规则确定所读取 短信息话单中可疑号码中的黑名单号码, 对确定的黑名单号码限制呼叫或 注销。
2、 根据权利要求 1所述的方法, 其特征在于, 所述根据设定的呼叫监 控规则确定所读取呼叫信息话单中主叫号码中的可疑号码之前, 该方法进 一步包括: 读取呼叫信息话单中的主叫号码, 将所读取的主叫号码与黑名 单列表中的黑名单号码比较, 若所述主叫号码与黑名单列表中的黑名单号 码相符, 则所述主叫号码为黑名单号码, 不做处理; 否则, 所述主叫号码 不是黑名单号码。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述根据设定的呼 叫监控规则确定所读取呼叫信息话单中主叫号码中的可疑号码包括: 在呼 叫信息话单中, 选取呼叫监控规则设定的时间段, 在设定的时间段内, 查 询所述呼叫信息话单中主叫号码进行主叫的次数或频率, 并与呼叫监控规 则设定的次数或频率比较, 达到设定的次数或频率, 则确定所述主叫号码 为可疑号码; 和 /或, 查询主叫号码主叫时的振铃时长, 等于或小于设定的 振铃时长, 确定所述主叫号码为可疑号码; 和 /或, 查询主叫号码的呼叫规 律, 与呼叫监控规则设定的呼叫规律相符, 确定所述主叫号码为可疑号码。
4、 根据权利要求 3所述的方法, 其特征在于, 所述根据设定的短信监 控规则确定所读取短信息话单中可疑号码中的黑名单号码包括: 在短信息 话单中, 选取短信监控规则设定的时间段, 在所述时间段内, 根据接收的 可疑号码, 查询可疑号码发送短信息的条数, 确定达到短信监控规则设定 的发送短信息条数最小值, 则所述可疑号码为黑名单号码; 和 /或, 查询可 疑号码接收短信息的条数, 确定达到短信监控规则设定的接收短信息条数 最小值, 则所述可疑号码为黑名单号码; 和 /或, 将所述可疑号码发送短信 息条数与接收短信息条数相比, 若比值达到短信监控规则设定的阈值, 则 所述可疑号码为黑名单号码; 和 /或, 根据短信监控规则设定的违规关键词 查询可疑号码发送短信息的内容, 若违规关键词出现的次数达到短信监控 规则设定的违规关键词次数最大值, 则所述可疑号码为黑名单号码。
5、 一种通信监控装置, 与营帐系统 BOSS、 短信息中心、 呼叫信息管 理平台相连; 其特征在于, 该装置还包括: 接口机模块、 分析模块、 黑名 单处理模块; 其中,
接口机模块, 用于读取呼叫信息管理平台中的呼叫信息话单, 并发送 给分析模块; 读取黑名单列表中的黑名单号码发送给 BOSS;
分析模块, 用于根据呼叫监控规则确定所读取呼叫信息话单中主叫号 码中的可疑号码, 根据短信监控规则确定获取的短信息话单中可疑号码中 的黑名单号码, 将确定的黑名单号码发送给黑名单处理模块;
黑名单处理模块, 用于将收到的黑名单号码添加到黑名单列表中。
6、 根据权利要求 5所述的装置, 其特征在于, 该装置进一步包括: 配置模块, 用于配置呼叫监控规则和短信监控规则, 并保存在数据库 中;
数据库, 用于保存呼叫监控规则, 保存短信监控规则;
相应的, 分析模块, 用于读取数据库中的呼叫监控规则, 读取数据库 中的短信监控规则。
7、 根据权利要求 6所述的装置, 其特征在于,
所述黑名单处理模块, 具体用于将黑名单号码添加到数据库中的黑名 单列表中; 相应的, 所述数据库, 用于保存黑名单列表中的黑名单号码; 所述接口机模块, 还用于读取数据库中黑名单列表中的黑名单号码发 送给 BOSS。
8、 根据权利要求 7所述的装置, 其特征在于, 所述分析模块包括呼叫 分析单元;
呼叫分析单元具体用于, 在呼叫信息话单中, 选取呼叫监控规则设定 的时间段, 在设定的时间段内, 查询所述呼叫信息话单中主叫号码进行主 叫的次数或频率, 并与呼叫监控规则设定的次数或频率比较, 达到设定的 次数或频率, 则确定所述主叫号码为可疑号码; 和 /或, 查询主叫号码主叫 时的振铃时长, 等于或小于设定的振铃时长, 确定所述主叫号码为可疑号 码; 和 /或, 查询主叫号码的呼叫规律, 与呼叫监控规则设定的呼叫规律相 符, 确定所述主叫号码为可疑号码。
9、 根据权利要求 8所述的装置, 其特征在于, 呼叫分析单元进一步用 于, 读取呼叫信息话单中的主叫号码, 向黑名单处理模块发送查询主叫号 码是否是黑名单号码的信息, 确定主号码是黑名单号码则不做处理;
相应的, 黑名单处理模块, 用于将接收的主叫号码同数据库黑名单列 表中的黑名单号码比较, 与黑名单列表中的黑名单号码相符时, 向呼叫分 析单元返回主叫号码为黑名单号码的信息; 不相符时, 向呼叫分析单元返 回主叫号码不是黑名单号码的信息。
10、 根据权利要求 7所述的装置, 其特征在于, 所述分析模块包括短 信分析单元;
短信分析单元具体用于, 在短信息话单中, 选取短信监控规则设定的 时间段, 在所述时间段内, 根据接收的可疑号码, 查询短信息话单中可疑 号码发送短信息的条数, 确定达到短信监控规则设定的发送短信息条数最 小值, 则所述可疑号码为黑名单号码; 和 /或, 查询短信息话单中可疑号码 接收短信息的条数, 确定达到短信监控规则设定的接收短信息条数最小值, 则所述可疑号码为黑名单号码; 和 /或, 将短信息话单中可疑号码发送短信 息条数与接收短信息条数相比, 若比值达到短信监控规则设定的阈值, 则 所述可疑号码为黑名单号码; 和 /或, 根据短信监控规则设定的违规关键词 查询可疑号码发送短信息的内容, 若违规关键词出现的次数达到短信监控 规则设定的违规关键词次数最大值, 则所述可疑号码为黑名单号码。
11、 根据权利要求 10所述的装置, 其特征在于, 所述接口机模块, 还 用于读取短信息中心的短信息名单, 并发送给短信分析单元; 或者, 短信 分析单元, 还用于直接读取短信息中心的短信息名单。
12、 根据权利要求 7 所述的装置, 其特征在于, 所述配置模块, 进一 步用于维护数据库中的黑名单列表。
PCT/CN2010/075840 2010-06-21 2010-08-10 一种通信监控方法及装置 WO2011160328A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010205900.1 2010-06-21
CN201010205900A CN101873618A (zh) 2010-06-21 2010-06-21 一种通信监控方法及装置

Publications (1)

Publication Number Publication Date
WO2011160328A1 true WO2011160328A1 (zh) 2011-12-29

Family

ID=42998227

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/075840 WO2011160328A1 (zh) 2010-06-21 2010-08-10 一种通信监控方法及装置

Country Status (2)

Country Link
CN (1) CN101873618A (zh)
WO (1) WO2011160328A1 (zh)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811202A (zh) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 利用云计算防止骚扰电话的方法和系统
CN102937950B (zh) * 2011-08-15 2016-02-03 国家电网公司 电话号码检索方法与系统
CN102761872A (zh) * 2012-08-01 2012-10-31 成都四方信息技术有限公司 一种垃圾短信拦截方法
CN104080148A (zh) * 2013-03-29 2014-10-01 华为终端有限公司 实现快速网络连接的方法和装置
CN104702800B (zh) * 2013-12-04 2017-11-03 中国移动通信集团公司 一种骚扰号码的识别方法、装置和系统
CN106162619A (zh) * 2015-04-24 2016-11-23 中国移动通信集团公司 一种呼叫中心外呼的监控预警方法及装置
CN106255113A (zh) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 骚扰电话的识别方法及装置
CN106375583B (zh) * 2016-09-13 2020-11-13 惠州Tcl移动通信有限公司 一种移动终端的智能来电屏蔽方法及其装置
CN108024020A (zh) * 2016-11-03 2018-05-11 广东亿迅科技有限公司 一种基于呼叫中心系统的黑名单管理系统及其实现方法
CN108259688A (zh) * 2016-12-28 2018-07-06 广东世纪网通信设备股份有限公司 VoIP平台电话诈骗行为检测方法、装置以及检测系统
CN110445944B (zh) * 2019-08-19 2020-11-24 携程旅游信息技术(上海)有限公司 呼叫中心防止电话骚扰的方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068240A (zh) * 2007-05-30 2007-11-07 中国移动通信集团福建有限公司 短信恶意群发控制器
CN101203052A (zh) * 2007-12-24 2008-06-18 华为技术有限公司 一种防范恶意业务请求的方法和设备
CN101217820A (zh) * 2008-01-15 2008-07-09 中兴通讯股份有限公司 一种骚扰号码的识别系统及识别方法
CN101426203A (zh) * 2007-11-02 2009-05-06 华为技术有限公司 一种识别恶意骚扰电话的方法和设备
CN101472007A (zh) * 2007-12-28 2009-07-01 中国移动通信集团公司 一种确定骚扰电话的方法和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068240A (zh) * 2007-05-30 2007-11-07 中国移动通信集团福建有限公司 短信恶意群发控制器
CN101426203A (zh) * 2007-11-02 2009-05-06 华为技术有限公司 一种识别恶意骚扰电话的方法和设备
CN101203052A (zh) * 2007-12-24 2008-06-18 华为技术有限公司 一种防范恶意业务请求的方法和设备
CN101472007A (zh) * 2007-12-28 2009-07-01 中国移动通信集团公司 一种确定骚扰电话的方法和系统
CN101217820A (zh) * 2008-01-15 2008-07-09 中兴通讯股份有限公司 一种骚扰号码的识别系统及识别方法

Also Published As

Publication number Publication date
CN101873618A (zh) 2010-10-27

Similar Documents

Publication Publication Date Title
WO2011160328A1 (zh) 一种通信监控方法及装置
WO2016197675A1 (zh) 骚扰电话的识别方法及装置
CN101459718B (zh) 一种基于移动通信网的垃圾语音过滤方法及其系统
CN101426203B (zh) 一种识别恶意骚扰电话的方法和设备
CN102209326B (zh) 基于智能手机无线电接口层的恶意行为检测方法及系统
WO2011143847A1 (zh) 一种短消息监控系统和方法
KR101059558B1 (ko) 보이스 피싱 필터링 시스템
EP2728918B1 (en) Method for detecting interception behaviour and terminal device
CN101753725A (zh) 黑名单处理系统、方法及装置
CN105744064A (zh) 自动通信求助方法、自动通信求助装置和终端
CN101674557B (zh) 一种检测未接来电是否有效的方法及装置
CN107707723A (zh) 骚扰电话的拦截方法
KR101306074B1 (ko) 피싱방지방법 및 피싱방지시스템
US10154145B1 (en) Virtual telephony assistant
CN104184871B (zh) 一种提示骚扰电话号码的方法和装置
WO2015188500A1 (zh) 一种短信监控方法及装置
CN110621019A (zh) 一种防止流量欺诈的方法及装置
CN110312221B (zh) 呼叫转移设置方法、归属位置寄存器及区块链网络系统
CN1949889B (zh) 一种实现呼叫业务的方法和装置
CN107371141B (zh) 一种垃圾信息监控方法、装置及通信系统
KR20150047378A (ko) 보이스 피싱 방지 장치
CN103037337A (zh) 一种拦截发出短信的方法和装置
CN101621776A (zh) 跨网开机提醒业务的实现方法
KR101571100B1 (ko) 패턴 분석을 통한 불법 발신호 탐지 장치 및 불법 발신호 탐지 방법
CN107483700A (zh) 一种不良号码的识别方法与装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10853468

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10853468

Country of ref document: EP

Kind code of ref document: A1