WO2015070823A1 - 移动终端号码智能防护系统及方法 - Google Patents
移动终端号码智能防护系统及方法 Download PDFInfo
- Publication number
- WO2015070823A1 WO2015070823A1 PCT/CN2015/070778 CN2015070778W WO2015070823A1 WO 2015070823 A1 WO2015070823 A1 WO 2015070823A1 CN 2015070778 W CN2015070778 W CN 2015070778W WO 2015070823 A1 WO2015070823 A1 WO 2015070823A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- database
- tag information
- mobile terminal
- user
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/55—Aspects of automatic or semi-automatic exchanges related to network data storage and management
- H04M2203/553—Data upload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- the present invention relates to a mobile terminal number identification and protection technology, and more particularly to a system and method for intelligently identifying numbers and providing security protection based on a directory.
- the speed of social information dissemination is fast, and the privacy information such as the mobile phone number of the end user is leaked through various channels, and various harassing calls prevent the user from being prevented.
- the early anti-harassment software can query and inform the user of the attribution of the caller ID or the operator.
- This function is usually implemented based on the principle that when the caller number is a fixed telephone, the destination can be identified by its area code; when the caller number is the mobile number, due to a certain operation of a certain place of origin
- the number issued by the quotient has a fixed first few fields, and the corresponding home location and the operator are identified by comparing the first few fields of the incoming call number with the number fields matched by the operators of each home.
- knowing only the attribution or the operator does not make much sense to the user, and it cannot effectively prevent harassment.
- anti-harassment software for example, by setting a black and white list to intercept harassing calls, thereby reducing unnecessary interference to users.
- This type of anti-harassment software requires the user to set it in advance. The user first adds the number that he considers to be an harassing phone or a suspicious phone to the mobile terminal device he operates. When the mobile terminal device receives an incoming call, the system retrieves the caller number. And filtering the caller number according to the blacklist in the mobile terminal device.
- the system When the caller number is not listed in the blacklist, the system prompts the user to answer the call; when the caller number is the same as the number in the blacklist , the system will block it.
- the anti-harassment software on the market has also derived "blocking no-number calls" and setting whitelists, etc. The same type of function.
- these intelligent interceptions are often intercepted by means of shielding the pre-set caller number.
- the protection means is relatively simple, but also the telephone number that the user has received or the telephone number manually input by the user can be intercepted and protected.
- the scam is even more embarrassing, usually a change.
- the existing anti-harassment feature allows users to identify new numbers that they have never received before, and cannot be intercepted.
- the object of the present invention is to solve the above problems, and provide a system and a method for intelligently identifying and providing security protection for a mobile terminal number, which can identify the identity of a contact or a strange number, and promptly prompt for suspicious harassment and suspicious fraudulent calls.
- the end user can also use the number identification system normally while offline.
- the invention discloses a system for intelligently identifying and providing security protection for a mobile terminal number, comprising a monitoring module, a parsing module, a display module, a tag number module, and at least one of a database including a local number database and a cloud number database located at the network end, wherein The local number database stores some or all of the verified numbers and the corresponding tag information in the cloud number database.
- the monitoring module is configured to monitor the user in the mobile terminal. Entering the number or the number received by the user, and the obtained number is pre-processed and transmitted to the parsing module; the parsing module is configured to pass the acquired number to at least one of the local number database and the cloud number database.
- the display module is configured to display the tag information processed by the parsing module in a setting area of the mobile terminal; and the tag number module is configured to receive a user input Tag information associated with the number and said Referred to transmit information to the cloud number database.
- An embodiment of the mobile terminal number intelligent protection system further includes an intercepting module, configured to perform corresponding intercepting operations on numbers of different number security levels or different number types according to user settings.
- the marking module records an interception operation of the number by the intercepting module, and uploads the intercepting operation to the cloud number database; the cloud number database Saving the uploaded interception operation, associating the operation with a security level or a number type of the number, and for other numbers having the same security level or the same number type as the number, the cloud number database will be An associated interception operation is sent to the interception module such that the interception module processes all numbers of the same security level as the incoming call number in accordance with the interception operation.
- the invention discloses a method for intelligent protection of a mobile terminal number, wherein the method comprises: obtaining a number from a mobile terminal of a user, pre-processing the number; and passing the acquired number through at least a local number database and a cloud number database Performing an analysis, acquiring tag information corresponding to the number, integrating the obtained tag information, feeding the tag information to a user, and performing an operation performed by the user on the number according to the feedback tag information. And receiving the tag information associated with the number that is actively marked by the user, and uploading the input tag information to the cloud number database for saving.
- An embodiment of the method for intelligently protecting a mobile terminal number according to the present invention wherein the user performs a corresponding intercepting operation on the number according to different number security levels or different number types in the tag information.
- the intercepting operation of the pair of numbers includes: recording an interception operation on the number, and uploading the intercepting operation to the cloud number database, establishing a The association between the interception operation and the security level or number type of the number is such that the same interception operation is taken for other numbers of the same security level or the same number type as the number.
- the present invention establishes a cloud number database based on user active markup and third party identification, and combines the local and cloud number databases according to the monitored number. Step analysis can identify and prompt the specific identity of the strange number, so that the user can avoid being harassed by the garbage phone as much as possible without missing important calls.
- the invention intercepts the incoming call in a hierarchical manner, and provides a multi-layered intercepting scheme for the user, so that the user can carry out number protection more conveniently.
- FIG. 1 is a schematic block diagram showing an embodiment of a mobile terminal number intelligent protection system of the present invention
- FIG. 2 to FIG. 5 are schematic diagrams showing a framework for querying tag information according to a terminal contact database, a local number database, and a cloud number database in a specific embodiment of the mobile terminal number intelligent protection system of the present invention
- FIG. 8 are schematic diagrams showing the marking information displayed at different setting positions of the display device of the mobile terminal in the specific embodiment of the mobile terminal number intelligent protection system of the present invention.
- FIG. 9 is a schematic flowchart of the interception operation performed by the interception module according to the security level or number type corresponding to the number in an implementation manner of the mobile terminal number intelligent protection system of the present invention.
- FIG. 10 is a schematic diagram showing the framework of another embodiment of the mobile terminal number intelligent protection system of the present invention.
- FIG. 11 is a schematic flow chart showing an implementation manner of a method for intelligently protecting a mobile terminal number according to the present invention.
- FIG. 1 is a schematic diagram showing the principle of an embodiment of a mobile terminal number intelligent protection system of the present invention.
- the system includes: a database of numbers providing number and tag information, a monitoring module 210, a parsing module 220, a display module 230, an intercepting module 240, and a tagging module 250 at the mobile terminal.
- the number database may be composed of a database provided by the system and a terminal contact database 130.
- the database provided by the system may be the cloud number database 110 located at the network end, or the local number database 120 located at the mobile terminal, or may be composed of the cloud number database 110 and the local number database 120.
- the cloud number database 110 stores the number and the associated tag information, where the tag information may include basic information of the contact or the merchant associated with the number, such as the name, address, and social network account of the contact or the merchant. Or extension information of the contact or merchant associated with the number, such as commercial information such as promotional activities launched by the merchant, preferential advertisements, or number security level information, or number type, or other marked information contributed by the end user.
- the tag information may include basic information of the contact or the merchant associated with the number, such as the name, address, and social network account of the contact or the merchant.
- extension information of the contact or merchant associated with the number such as commercial information such as promotional activities launched by the merchant, preferential advertisements, or number security level information, or number type, or other marked information contributed by the end user.
- the local number database 120 stored in the mobile terminal is convenient for use in an environment without a network connection, which can detect the update according to a predetermined period, acquire the updated verification number in the cloud number database 110, and maintain synchronization with the cloud number database 110, effectively It ensures that the end user can still use normally without being connected to the Internet.
- the terminal contact database 130 is adapted to store the contact number and associated tag information that the user saves and records on the mobile terminal.
- the numbers are only saved in the mobile terminal, and are not uploaded to the cloud database for sharing with other users. Since the number recorded in the terminal contact database 130 and the associated tag information are all entered by the user and approved by the user, the security is the highest.
- the monitoring module 210 listens to the number entered by the terminal user in the mobile terminal, and the pre-processed number is pre-processed and sent to the parsing module 220.
- the obtained number can be uniformly formatted, such as removing its country number, area code, or The numbers are processed into the same data length and the like.
- the parsing module 220 integrates the tag information acquired in at least one of the database in the terminal contact database 130, the local number database 120, and the cloud number database 110.
- the parsing module 220 preferentially passes the obtained number to the terminal contact database 130 to query whether the contact is a known contact, and if it is a known contact, obtains a search matching result. If the matching result of the number does not exist in the terminal contact database 130, the parsing module 220 further passes the number to the local number database 120 and/or the cloud number database 110 for inquiry. In another embodiment, referring to FIG. 3, the parsing module 220 can also pass the number to the local number database 120 and/or the cloud number database 110 for query.
- the network bandwidth may be detected, and the query is performed according to the local number database 120 or according to the cloud number database 110 according to the detection result.
- a predetermined bandwidth threshold may be set.
- the network number database 110 is automatically connected to perform number matching, and vice versa, connected to the local number database 120 for matching.
- it may be set to preferentially invoke the local number database 120 for querying and analyzing the tag information.
- a networking prompt or automatic connection to the cloud number database 110 is further provided. Parse and combine the results of the two parsing to provide users with more comprehensive number information.
- the parsing module 220 may further search for extended information of the associated contact for the number of contacts already saved in the terminal contact database; for the unfamiliar number not in the terminal contact database 130, the parsing module 220 according to the local number database 120 and / The result of the query of the cloud number database 110 acquires the tag information of the strange number.
- the parsing module 220 looks up the extended information of the contact, including the contact name, company/position, notes, email, social Other related information such as network account.
- the parsing module 220 acquires tag information of the number, such as the number in the local number database 120 or the cloud number database 110.
- the number identified in the middle is associated with the basic information of the contact or merchant (such as contact name, business name, business address, common information such as the merchant or contact social network account), or extended information such as the contact or merchant associated with the number (eg Commercial information such as promotional activities, promotional advertisements, etc., or such as number security level prompts (such as suspected harassment, suspected fraud, verification, etc.), or for example, number type (such as real estate agency, business promotion, insurance, wealth delivery, etc.) ), or a combination of the above.
- the parsing module 220 can also obtain the number of end users in the cloud number database that count the number as a certain type of number (eg, "20 users mark this number as a real estate. intermediary").
- the parsing module 220 transmits the acquired tag information to the display module 230, and the display module 230 displays the tag information at the set position of the mobile terminal display device to prompt the user.
- the marker information may be displayed on the call interface, or may be displayed in the number input field, or may also be displayed in the call record field.
- the incoming call and the outgoing call can be divided into two types, the incoming call and the outgoing call, according to the source of the call.
- the user For outgoing calls, there are generally several situations in which the user is familiar with the number to be dialed and the associated merchant or contact, or the user only knows the merchant or contact associated with the number to be dialed, but does not verify the authenticity of the number. Or the user only calls back the call, and does not know the number to be dialed or its associated contact or merchant at all; for the incoming call, the user often cannot control the source, so different treatments can be taken for the incoming call and the outgoing call.
- the display module 230 displays the tag information acquired by the parsing module 220 in the dial pad or in the phone number input field, so that the user can associate the contact with the number before dialing. Or understand the name, type, security level, etc. of the merchant, and even decide on whether to make a call or avoid mis-dialing. Among them, only strange numbers can be identified and displayed according to user requirements, and all numbers can be identified and displayed.
- the marker information can be displayed first. Come, the dialing is performed after the user confirms the displayed tag information. In another embodiment, after the user performs the dialing action, the tag information that the outgoing number is recognized is displayed. The duration of the display can also be set such that the identified marker information is displayed according to the set length of time, or is set to be displayed until the end of the call.
- the display module 230 displays the marked information acquired by the parsing module 220 on the set position of the display screen, and the user selects whether to answer according to the displayed information, thereby effectively reducing The disturbance of harassing the phone. Specifically, you can set to display only strange numbers, or you can set to display all numbers.
- the display time of the caller ID information can also be set, for example, the mark information can be displayed after the call is connected, and the user is prompted to answer the call. The mark information can also be displayed after the call is hung up, indicating whether the user confirms the mark information accurately. .
- the user may also set an incoming call rule for the unfamiliar number of different security levels or number types according to the obtained tag information by using the intercepting module 240, and process different security levels or numbers according to the calling rules. Types of incoming call behavior to achieve more comprehensive and more humane anti-harassment.
- the cloud number database can divide the stored numbers into three security levels.
- the first security level is a unit that is registered according to the number, an enterprise, a merchant, and the like, and is defined by the terminal user as a common number/public number, and the security level is the highest.
- the second security level is suspicious harassment number, such as sales insurance, questionnaires, consultation promotion, etc., and its security level is medium.
- the third security level is a suspicious fraud number, for example, a number of clicks that hang up to induce the user to call back, with the lowest security level.
- the cloud number database may also set the stored number to a different number type. Specifically, the number type may be real estate agency, business promotion, no display number, express delivery, and the like.
- the security level or number type of the number and the corresponding operation also allow the user to customize the extension, for example, the specific merchant can set the star rating according to the user's preference, and may also include the specific information of the merchant, such as a specific store of the merchant.
- the user can perform different interception operations on the caller numbers of each security level or number type through the interception module 240.
- the intercepting module 240 receives the tag information acquired by the parsing module 220, and extracts a security level or a number type corresponding to the number; according to the security level or the type of the number, a corresponding intercepting operation is taken.
- a uniform interception operation can be set for that type or security level number. For example, for a common number or a public number, it can be answered normally; for example, if the user receives a call from 400-699-9999, which is identified as a Haier customer service phone in the cloud number database, the normal ringing prompts the user to answer the call. For suspicious harassment numbers, you can mute their calls; for suspicious scam numbers, you can hang up the call directly. For example, for a commonly used take-out or express delivery, it can be set as a normal answer; for the real estate agent, it can be normally answered by the intercepting module 240 during a set time period, and silenced or directly hung up at other times.
- the user may also perform active tagging by the tagging module 250, and upload and store the active tag and the associated intercepting operation in the cloud number database. in.
- the mark module 250 When the user does not agree with the displayed mark information, and the user actively marks the mark, or when the user actively marks the unmarked strange number, the mark module 250 The user's active tag is recorded and uploaded to the cloud number database. When the uploaded active tag passes the verification, the cloud number database 110 updates the number with the information of the active tag as the updated tag information.
- the tagging module 250 can also record and upload the associated operation of the caller number by the user. Specifically, for the incoming call number, the marking module 250 can record the security level or number type of the incoming call number, detect and record the user's operation on the incoming call number, and upload the number and the operation recorded by the user to the cloud to the cloud.
- the number database 110, the cloud number database 110 saves the recorded upload operation and associates the operation with the security level or number type of the number.
- the cloud number database 110 sends the association operation to the intercepting module 240 of the mobile terminal, so that the intercepting module 240 automatically follows the recorded
- the operation processes all numbers of the same security level as the incoming call number.
- the system further includes: a verification module 260.
- the verification module 260 is configured to process the tag information fed back by the client, and only the tag information that has been verified and confirmed its accuracy is stored in the cloud number database as the tag information of the number.
- the tag information is verified. For example, when a number is marked as the number of real estate agents exceeding a predetermined threshold, such as 300 people, the number is verified as a real estate agent. In another embodiment, for example, when a number is marked as a certain tag information exceeding a predetermined threshold within a predetermined time, the tag information is verified. For example, for a fraudulent phone, it is often frequent to call multiple users for fraud for a period of time, and if the tagged information for the phone number exceeds a predetermined threshold within one day, it is verified as a fraudulent call.
- different credit levels of different users are assigned different weights of the tag information, and the credibility of the tag information is calculated according to the weight.
- the credibility of the tag information reaches a predetermined threshold, then approved.
- the user may set different credit levels according to the result of the user's past marking.
- the tag information of a certain number is counted, the credit rating of the user who provides the corresponding tag information also participates in the calculation, and the calculated credibility and the reservation are compared.
- the threshold value is used to determine whether the verification is passed according to the comparison result. For example, when the reliability of the tag information exceeds a predetermined threshold, the verification is passed.
- the device information of the user can be uploaded as a unique identification code of the identity of the tag information provider.
- the system only accepts the tag information once. .
- the user can also upload the geographical location information of the user.
- the system automatically adds the geographical location information to the tag information, thereby achieving more accurate. Match.
- it can be further verified in conjunction with a database of a third party system.
- the number verified in the cloud number database 110 and its associated tag information or associated interception operations can be downloaded to the mobile terminal of the end user as a local number database for the mobile terminal, thereby enabling the user to be served in an offline state.
- the invention also provides a method for applying the above system to perform intelligent protection of mobile terminal communication.
- the method includes: Step S1: acquiring a number from a user's mobile terminal, pre-processing the number; Step S2, passing the acquired number through the local number database and the cloud number database At least one of the methods performs parsing, acquires tag information corresponding to the number, and integrates the obtained tag information; in step S3, the tag information is fed back to the user, and the user selects a pair according to the feedback tag information.
- the operation of the number is performed, and the tag information associated with the number that is actively marked by the user is received, and the input tag information is uploaded to the cloud number database for storage.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2016531704A JP6559668B2 (ja) | 2013-11-15 | 2015-01-15 | 移動端末番号インテリジェント保護システム及び方法 |
| EP15721527.8A EP3070969B1 (en) | 2013-11-15 | 2015-01-15 | Intelligent number protection method and system for mobile terminal |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310574602.3A CN104349324B (zh) | 2013-11-15 | 2013-11-15 | 移动终端号码智能防护系统及方法 |
| CN201310574602.3 | 2013-11-15 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2015070823A1 true WO2015070823A1 (zh) | 2015-05-21 |
Family
ID=52503944
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2015/070778 Ceased WO2015070823A1 (zh) | 2013-11-15 | 2015-01-15 | 移动终端号码智能防护系统及方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US9544431B2 (https=) |
| EP (1) | EP3070969B1 (https=) |
| JP (1) | JP6559668B2 (https=) |
| CN (1) | CN104349324B (https=) |
| WO (1) | WO2015070823A1 (https=) |
Families Citing this family (38)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104378480B (zh) * | 2013-11-15 | 2017-10-27 | 上海触乐信息科技有限公司 | 电话号码标记方法及系统 |
| US9509821B2 (en) * | 2014-09-01 | 2016-11-29 | Stanislav Zhekov | Method to mute automatically phone calls on mobile communication device |
| CN104702762A (zh) * | 2015-03-13 | 2015-06-10 | 小米科技有限责任公司 | 来电提醒方法和装置 |
| US9591131B2 (en) | 2015-04-20 | 2017-03-07 | Youmail, Inc. | System and method for identifying unwanted callers and rejecting or otherwise disposing of calls from same |
| CN106302936B (zh) * | 2015-05-18 | 2019-10-25 | 腾讯科技(深圳)有限公司 | 一种用户标识的标记方法、装置和系统 |
| CN106302938B (zh) * | 2015-05-22 | 2020-04-07 | 腾讯科技(深圳)有限公司 | 通信事件处理方法和装置 |
| CN104954531A (zh) * | 2015-06-11 | 2015-09-30 | 腾讯科技(深圳)有限公司 | 在无网络状态下的电话号码识别方法和装置 |
| CN105141789B (zh) | 2015-07-28 | 2018-04-06 | 小米科技有限责任公司 | 陌生号码标记方法和装置 |
| US9621737B2 (en) * | 2015-08-27 | 2017-04-11 | Google Inc. | Abuse detection for phone number lookups |
| CN105704337B (zh) * | 2016-01-19 | 2019-02-12 | 上海触乐信息科技有限公司 | 号码标记方法和系统 |
| CN107229638A (zh) * | 2016-03-24 | 2017-10-03 | 北京搜狗科技发展有限公司 | 一种文本信息处理方法及装置 |
| US20170302793A1 (en) * | 2016-04-13 | 2017-10-19 | Michael W. Starkweather | Blocking unwanted communications for a subscriber pool |
| US10904392B2 (en) | 2016-08-01 | 2021-01-26 | Youmail, Inc. | System and method for facilitating setup and joining of conference calls |
| WO2018023816A1 (zh) * | 2016-08-05 | 2018-02-08 | 王志强 | 电话号码标记技术的数据采集方法以及标记系统 |
| WO2018023814A1 (zh) * | 2016-08-05 | 2018-02-08 | 王志强 | 标记电话号码时的信息推送方法以及标记系统 |
| WO2018023815A1 (zh) * | 2016-08-05 | 2018-02-08 | 王志强 | 电话号码标记的方法以及标记系统 |
| CN107707776B (zh) * | 2016-08-08 | 2021-07-20 | 百度在线网络技术(北京)有限公司 | 用于拦截呼入电话的方法及装置 |
| CN106101156B (zh) * | 2016-08-23 | 2019-12-10 | 北京安云世纪科技有限公司 | 一种电话查询方法、移动终端 |
| US9686393B1 (en) | 2016-09-21 | 2017-06-20 | International Business Machines Corporation | System, method and computer program product for service call identification |
| CN106713616B (zh) * | 2016-11-24 | 2019-03-08 | 腾讯科技(深圳)有限公司 | 通讯事件处理方法及装置 |
| CN107623915A (zh) * | 2017-07-24 | 2018-01-23 | 北京珠穆朗玛移动通信有限公司 | 一种安全防护方法、移动终端及具有存储功能的装置 |
| CN107295491B (zh) * | 2017-07-28 | 2020-04-07 | 中国联合网络通信集团有限公司 | 呼叫转移时自动筛选主叫用户的方法及系统 |
| US10893039B2 (en) * | 2017-09-27 | 2021-01-12 | International Business Machines Corporation | Phone number protection system |
| CN107896287B (zh) * | 2017-09-30 | 2021-06-18 | 深圳壹账通智能科技有限公司 | 手机号码风险监测方法、移动终端及计算机可读存储介质 |
| CN108377357B (zh) * | 2018-02-13 | 2020-12-04 | 山东顺国电子科技有限公司 | 一种可视化平台通话方法及装置 |
| CN113114859A (zh) * | 2018-05-29 | 2021-07-13 | 维沃移动通信有限公司 | 一种号码拦截方法及服务器 |
| CN108848275A (zh) * | 2018-06-13 | 2018-11-20 | 佛山市澄澜点寸科技有限公司 | 一种信息处理方法及装置 |
| WO2020102992A1 (en) * | 2018-11-20 | 2020-05-28 | Motorola Solutions, Inc. | System and method for electronically obtaining and displaying contextual information for unknown or unfamiliar callers during incoming call transmissions |
| CN109714254A (zh) * | 2019-01-24 | 2019-05-03 | 深圳云号科技有限公司 | 一种号码鉴别方法及装置 |
| CN109688273B (zh) * | 2019-03-04 | 2021-07-09 | 上海卓易科技股份有限公司 | 一种提醒方法、装置、终端及存储介质 |
| US10659605B1 (en) | 2019-04-26 | 2020-05-19 | Mastercard International Incorporated | Automatically unsubscribing from automated calls based on call audio patterns |
| US10757252B1 (en) | 2019-06-25 | 2020-08-25 | Youmail, Inc. | Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks |
| CN112995999B (zh) * | 2019-12-02 | 2022-12-27 | 中国移动通信集团浙江有限公司 | 诈骗地点识别方法、装置及计算设备 |
| CN111143417A (zh) * | 2019-12-27 | 2020-05-12 | 广东浪潮大数据研究有限公司 | 数据处理方法、装置、系统及Nginx服务器和介质 |
| CN111372252B (zh) * | 2020-02-27 | 2023-01-10 | 闻泰通讯股份有限公司 | 安全联网的方法、装置、设备及存储介质 |
| CN113691681B (zh) * | 2021-08-20 | 2024-07-19 | 北京琥珀创想科技有限公司 | 垃圾电话数据处理方法及系统 |
| CN114258024B (zh) * | 2021-12-03 | 2023-10-31 | 中国联合网络通信集团有限公司 | 停机处理方法、装置、电子设备及存储介质 |
| CN114579010B (zh) * | 2021-12-31 | 2024-09-17 | 联想(北京)有限公司 | 信息处理方法、装置及电子设备和存储介质 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102663106A (zh) * | 2012-04-13 | 2012-09-12 | 北京搜狗科技发展有限公司 | 建立号码信息数据库的方法及系统 |
| CN102711112A (zh) * | 2012-06-18 | 2012-10-03 | 奇智软件(北京)有限公司 | 短信拦截方法及装置 |
| CN103078949A (zh) * | 2013-01-17 | 2013-05-01 | 北京奇虎科技有限公司 | 显示电话号码信息的方法及系统 |
Family Cites Families (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004208030A (ja) * | 2002-12-25 | 2004-07-22 | Casio Comput Co Ltd | 通信システム |
| US7650140B2 (en) * | 2005-10-28 | 2010-01-19 | Research In Motion Limited | System and method of maintaining communications policy settings in a wireless network |
| US8577009B2 (en) * | 2006-10-18 | 2013-11-05 | First Orion Corp. | Automatic complaint registration for violations of telephonic communication regulations |
| CN101409881A (zh) * | 2007-10-12 | 2009-04-15 | 深圳富泰宏精密工业有限公司 | 手机资料保密装置及方法 |
| JP2009111904A (ja) * | 2007-10-31 | 2009-05-21 | Ricoh Co Ltd | 画像処理装置およびアプリケーション実行方法 |
| GB2474203A (en) * | 2008-07-21 | 2011-04-06 | F Secure Oyj | Telephony fraud prevention |
| EP2392118A1 (en) * | 2009-01-29 | 2011-12-07 | Telefonaktiebolaget L M Ericsson (PUBL) | Methods, apparatuses and computer program products for adding profile data |
| US8369822B2 (en) * | 2009-05-28 | 2013-02-05 | At&T Intellectual Property I, Lp | Systems and methods for providing emergency callback procedures |
| US8639225B2 (en) * | 2010-05-25 | 2014-01-28 | Heine F. NZUMAFO | E-mail to phone number resolution for mobile to mobile, mobile to landline, and PC to mobile communications |
| US8554835B1 (en) * | 2010-06-11 | 2013-10-08 | Robert Gordon Williams | System and method for secure social networking |
| CN102572130B (zh) * | 2010-12-07 | 2014-10-01 | 中国电信股份有限公司 | 客户管理方法和系统 |
| US8503636B1 (en) * | 2011-04-29 | 2013-08-06 | Symantec Corporation | Systems and methods for blocking an outgoing request associated with an outgoing telephone number |
| CN102811202A (zh) * | 2011-06-01 | 2012-12-05 | 网秦无限(北京)科技有限公司 | 利用云计算防止骚扰电话的方法和系统 |
| CN103152493B (zh) * | 2011-12-06 | 2015-08-12 | 中兴通讯股份有限公司 | 一种云座席实现方法、系统及云座席服务端 |
| JP2013126124A (ja) * | 2011-12-15 | 2013-06-24 | Kddi Corp | 発信者情報表示システムおよび方法 |
| US20130203397A1 (en) * | 2012-02-02 | 2013-08-08 | Joel Vidal | Phone that prevents accidental dialing to a contact |
| JP6157881B2 (ja) * | 2012-03-06 | 2017-07-05 | トビラシステムズ株式会社 | 端末装置、着信管理システム及びプログラム |
| US8913994B2 (en) * | 2012-11-02 | 2014-12-16 | Lookout, Inc. | System and method for call blocking and SMS blocking |
| US10148821B2 (en) * | 2012-12-10 | 2018-12-04 | Dell Products, Lp | System and method for minimal touch cloud-based conference call service |
| US9326145B2 (en) * | 2012-12-16 | 2016-04-26 | Aruba Networks, Inc. | System and method for application usage controls through policy enforcement |
| US9160846B2 (en) * | 2013-01-04 | 2015-10-13 | Lead Technology Capital Management, Llc | Electronic system and method for screening incoming communications |
| CN103167500B (zh) * | 2013-02-01 | 2016-08-03 | 杭州东信北邮信息技术有限公司 | 一种实现移动电话来电统一处理的方法和系统 |
| US9002334B2 (en) * | 2013-03-13 | 2015-04-07 | Cequint, Inc. | Systems and methods for delivering multimedia information to mobile devices |
| AU2014262567B2 (en) * | 2013-05-08 | 2018-06-28 | Cellcontrol, Inc. | Driver identification and data collection systems for use with mobile communication devices in vehicles |
| US9386148B2 (en) * | 2013-09-23 | 2016-07-05 | Ooma, Inc. | Identifying and filtering incoming telephone calls to enhance privacy |
-
2013
- 2013-11-15 CN CN201310574602.3A patent/CN104349324B/zh not_active Expired - Fee Related
-
2015
- 2015-01-15 JP JP2016531704A patent/JP6559668B2/ja not_active Expired - Fee Related
- 2015-01-15 US US14/597,325 patent/US9544431B2/en not_active Expired - Fee Related
- 2015-01-15 EP EP15721527.8A patent/EP3070969B1/en active Active
- 2015-01-15 WO PCT/CN2015/070778 patent/WO2015070823A1/zh not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102663106A (zh) * | 2012-04-13 | 2012-09-12 | 北京搜狗科技发展有限公司 | 建立号码信息数据库的方法及系统 |
| CN102711112A (zh) * | 2012-06-18 | 2012-10-03 | 奇智软件(北京)有限公司 | 短信拦截方法及装置 |
| CN103078949A (zh) * | 2013-01-17 | 2013-05-01 | 北京奇虎科技有限公司 | 显示电话号码信息的方法及系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP6559668B2 (ja) | 2019-08-14 |
| JP2017501618A (ja) | 2017-01-12 |
| EP3070969B1 (en) | 2019-11-13 |
| US20150140977A1 (en) | 2015-05-21 |
| EP3070969A4 (en) | 2017-05-03 |
| CN104349324B (zh) | 2018-12-14 |
| EP3070969A1 (en) | 2016-09-21 |
| CN104349324A (zh) | 2015-02-11 |
| US9544431B2 (en) | 2017-01-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2015070823A1 (zh) | 移动终端号码智能防护系统及方法 | |
| CN106791220B (zh) | 防止电话诈骗的方法及系统 | |
| CN109429230B (zh) | 一种通信诈骗识别方法及系统 | |
| US7895154B2 (en) | Communication reputation | |
| CN104168560B (zh) | 显示陌生号码相关信息的方法、监测装置及云端服务器 | |
| US8788657B2 (en) | Communication monitoring system and method enabling designating a peer | |
| US20160234245A1 (en) | Social Engineering Simulation Workflow Appliance | |
| CN104219672B (zh) | 来电或短信识别方法和装置 | |
| US20110211682A1 (en) | Telephony fraud prevention | |
| CN104378480A (zh) | 电话号码标记方法及系统 | |
| WO2017193997A1 (zh) | 一种短信过滤方法和系统 | |
| CA2831527C (en) | Computer-implemented system and method for validating call connections | |
| CN104079475A (zh) | 一种消息处理方法和系统 | |
| CN109995929B (zh) | 操作和账号信息的处理方法及装置 | |
| CN105959290A (zh) | 攻击报文的检测方法及装置 | |
| KR20160011120A (ko) | 스마트폰 통화 중 실시간 보이스피싱 주의안내 어플리케이션 서비스 제공 시스템 및 그 방법 | |
| US20220353366A1 (en) | Computerized system and method for robocall steering | |
| KR102200253B1 (ko) | 문자 메시지 부정 사용 탐지 방법 및 시스템 | |
| KR101306074B1 (ko) | 피싱방지방법 및 피싱방지시스템 | |
| CN108198086A (zh) | 用于依据通信行为特征来识别骚扰源的方法和装置 | |
| CN106791227B (zh) | 一种基于通话数据来识别用户常用联系人的方法和系统 | |
| CN114374972A (zh) | 基于运营商数据池的异常来电提醒方法、系统及设备 | |
| CN105516988A (zh) | 一种电话过滤方法、装置、电子设备及服务器 | |
| CN109600751B (zh) | 一种基于网络侧用户数据的伪基站检测方法 | |
| CN106878993A (zh) | 一种信息处理方法、系统、服务器及终端 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15721527 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2016531704 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| REEP | Request for entry into the european phase |
Ref document number: 2015721527 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2015721527 Country of ref document: EP |