WO2020134291A1 - 来电处理方法、装置、电话防骚扰系统及可读存储介质 - Google Patents

来电处理方法、装置、电话防骚扰系统及可读存储介质 Download PDF

Info

Publication number
WO2020134291A1
WO2020134291A1 PCT/CN2019/109101 CN2019109101W WO2020134291A1 WO 2020134291 A1 WO2020134291 A1 WO 2020134291A1 CN 2019109101 W CN2019109101 W CN 2019109101W WO 2020134291 A1 WO2020134291 A1 WO 2020134291A1
Authority
WO
WIPO (PCT)
Prior art keywords
incoming call
call
communication system
content
preset
Prior art date
Application number
PCT/CN2019/109101
Other languages
English (en)
French (fr)
Inventor
章璐
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020134291A1 publication Critical patent/WO2020134291A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • H04M1/6505Recording arrangements for recording a message from the calling party storing speech in digital form
    • H04M1/651Recording arrangements for recording a message from the calling party storing speech in digital form with speech synthesis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communication technology, and in particular, to an incoming call processing method, device, telephone anti-harassment system, and readable storage medium.
  • the main purpose of the present invention is to provide an incoming call processing method, device, telephone anti-harassment system and readable storage medium, aiming to solve the problem of low anti-harassment phone capability in the prior art.
  • the present invention proposes a call processing method, and the call processing method includes the following steps:
  • the present invention also provides an incoming call processing device, the incoming call processing device includes:
  • An anti-harassment processing module configured to detect whether an incoming call number corresponding to the incoming call is a preset trusted number when receiving an incoming call sent by the communication system;
  • An answering module used to answer the incoming call if the incoming call number is not the preset trusted number, and obtain the incoming call content corresponding to the incoming call;
  • the semantic recognition module is used to judge whether the incoming call content meets the preset incoming call release conditions
  • the call forwarding module is configured to send a call rejection message to the communication system if the call content does not meet the call release conditions for the communication system to perform a call rejection operation.
  • the present invention also provides a telephone anti-harassment system, which includes the call processing device as described above.
  • the present invention also provides a computer-readable storage medium storing an incoming call processing program on the computer-readable storage medium, the incoming call processing program is executed by the processor to achieve the incoming call as described above Processing method steps.
  • the communication system forwards the incoming call to the telephone anti-harassment system, and detects when the incoming call sent by the communication system is received Whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, answer the incoming call, obtain the incoming call content corresponding to the incoming call, and determine whether the incoming call content meets the preset incoming call discharge If the call content does not meet the call release condition, the call rejection message is sent to the communication system, and the communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls.
  • FIG. 1 is a schematic structural diagram of a telephone anti-harassment system of a hardware operating environment involved in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of the first embodiment of the incoming call processing method of the present invention
  • FIG. 3 is a schematic diagram of a system structure of an optional telephone system involved in the embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a second embodiment of the incoming call processing method of the present invention.
  • FIG. 6 is a schematic diagram of an optional incoming call processing flow involved in the solution of the embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of a third embodiment of the incoming call processing method of the present invention.
  • FIG. 8 is an interactive schematic diagram of an optional update of the user's trusted number list using a web page mode involved in the solution of the embodiment of the present invention
  • FIG. 9 is a schematic flowchart of an optional update of a user's trust number list using SIP protocol settings according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of an optional interaction using a web page method to obtain voice interactive content according to an embodiment of the present invention
  • FIG. 11 is a schematic flowchart of an alternative method for obtaining voice interactive content using the SIP protocol according to the embodiment of the present invention.
  • FIG. 12 is a schematic diagram of functional modules of an embodiment of an incoming call processing device of the present invention.
  • the solution of the embodiment of the present invention is mainly: when the calling party initiates a call through the calling user terminal and the communication system receives the incoming call, the communication system forwards the incoming call to the telephone anti-harassment system, and upon receiving the call sent by the communication system During an incoming call, it is detected whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, the incoming call is answered, the incoming call content corresponding to the incoming call is obtained, and whether the incoming call content meets the pre-call Set the call release conditions. If the call content does not meet the call release conditions, send a call rejection message to the communication system. The communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls .
  • the technical solution of the embodiment of the present invention solves the problem of low anti-harassment phone capability.
  • the embodiment of the invention provides a telephone anti-harassment system.
  • FIG. 1 is a schematic structural diagram of a telephone anti-harassment system of a hardware operating environment according to an embodiment of the present invention.
  • module means for the benefit of the present invention, and has no specific meaning in itself. Therefore, “module”, “component” or “unit” can be used in a mixed manner.
  • the telephone anti-harassment system may include: a processor 1001, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the user interface 1003 may be one or more suitable interfaces such as a display, an input unit such as a keyboard, etc.
  • the user interface 1003 may also be a standard Wired interface, wireless interface, etc.
  • the network interface 1004 may be a standard wired interface, a wireless interface (such as a WI-FI interface), or other interfaces of one or more suitable network devices.
  • the memory 1005 may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), etc., such as a disk memory. In an embodiment, the memory 1005 may also be a storage device independent of the processor 1001.
  • FIG. 1 does not constitute a limitation on the telephone anti-harassment system, and may include more or less components than the illustration, or a combination of certain components, or different Parts layout.
  • the memory 1005 as a computer storage medium may include an operating system, a network communication module, and an incoming call processing program.
  • the telephone anti-harassment system calls the call processing program stored in the memory 1005 through the processor 1001, and performs the following operations:
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the incoming call is forwarded to the communication system for the communication system to initiate a paging operation.
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the caller number is added to the preset trusted number list to update the trusted number list.
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the caller number is a preset trusted number
  • the caller is forwarded to the communication system for the communication system to initiate a paging operation.
  • the processor 1001 may call the call processing program stored in the memory 1005, and also perform the following operations:
  • the communication system forwards the incoming call to the telephone anti-harassment system, and when receiving the incoming call sent by the communication system, Detect whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, answer the incoming call, obtain the incoming call content corresponding to the incoming call, and determine whether the incoming call content matches the preset incoming call Release conditions. If the call content does not meet the call release conditions, the call rejection message is sent to the communication system, and the communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls.
  • FIG. 2 is a schematic flowchart of a first embodiment of an incoming call processing method of the present invention.
  • the incoming call processing method includes the following steps:
  • Step S10 when receiving an incoming call sent by the communication system, detecting whether the incoming call number corresponding to the incoming call is a preset trusted number; if not, performing step S20; if yes, performing step S50;
  • Step S20 Answer the incoming call and obtain the incoming call content corresponding to the incoming call;
  • step S30 it is determined whether the incoming call content meets the preset incoming call release conditions; if not, step S40 is executed; if yes, step S50 is executed;
  • Step S40 Send a call rejection message to the communication system for the communication system to perform a call rejection operation
  • Step S50 Forward the incoming call to the communication system for the communication system to initiate a paging operation.
  • the call processing method of the present invention is proposed.
  • the call processing method is applicable to the telephone anti-harassment system in the above embodiment.
  • the harassment system analyzes the content of the call and determines that the called party is concerned (the called party can enter the content of concern and answer to the telephone anti-harassment system), and then transfers the incoming call to the called party, otherwise, the incoming call is rejected, Thereby improving the ability to prevent harassment calls.
  • the communication system, the telephone anti-harassment system, the calling user terminal, and the called user terminal constitute a telephone system, where the communication system is responsible for forwarding the incoming call of the calling party to the telephone anti-harassment system of the called user; receiving The communication message sent by the telephone anti-harassment system is forwarded to the calling or called party; standard communication protocols can be used between the communication system and the telephone anti-harassment system, for example, SIP (Session Initiation Protocol), BICC ((bearerIndependent Call Control Protocol, ISUP (ISDN User Part), etc.
  • SIP Session Initiation Protocol
  • BICC (bearerIndependent Call Control Protocol
  • ISUP ISDN User Part
  • Telephone anti-harassment system Including anti-harassment processing module, personal trust telephone number processing module, WEB service module, phone transfer module, interception information notification module, semantic recognition module, answering module, etc., among which, anti-harassment processing module is the main control module of anti-harassment system , Responsible for sorting and control of anti-harassment system, including collaboration between various modules; Personal trust number processing module is responsible for storing and comparing the user's trust number list to provide results for anti-harassment processing module; WEB service module is responsible for providing external WEB services, Provides a WEB interface for each module in the anti-harassment system; the telephone transfer module is responsible for receiving the call request sent by the communication system and notifying the anti-harassment processing module for processing; and receiving the instructions of the anti-harassment processing module to transfer or reject the call; intercept The information notification module is responsible for providing users with an interception notification service, which can send the intercepted calling number information and content to the user; the semantic recognition module is
  • the user may set at least one preset trusted number in the telephone anti-harassment system in advance, and the telephone anti-harassment system stores the preset trusted number corresponding to each user.
  • the telephone anti-harassment system stores the preset trusted number corresponding to each user.
  • a list of trusted numbers corresponding to preset trusted numbers set by each user is preset, and each list of trusted numbers contains at least one preset trusted number set by the corresponding user.
  • the communication system forwards the incoming call to the telephone anti-harassment system.
  • the telephone anti-harassment system receives the incoming call sent by the communication system, it detects whether the incoming call number corresponding to the incoming call is a preset trusted number, that is, detects whether the incoming call number is set corresponding to the called party (called user) of the incoming call Default trusted number.
  • the step S10 includes:
  • Step a Query a preset list of trusted numbers, and search whether there is a phone number in the list of trusted numbers that matches the caller number;
  • Step b if it is, determine that the caller number is a preset trusted number
  • Step c if not, it is determined that the caller number is not a preset trusted number.
  • the telephone anti-harassment system When the telephone anti-harassment system receives the incoming call sent by the communication system, the telephone anti-harassment system queries the preset trusted number list corresponding to the called party, and searches whether the telephone number in the trusted number list matches the incoming number. If there is a match between the phone number and the caller number in the trusted number list, the caller number is determined to be the preset trusted number; otherwise, if there is no match between the phone number and the caller number, the caller number is determined not to be the preset Trust the number.
  • the telephone anti-harassment system forwards the incoming call to the communication system, and the communication system initiates a paging operation to route the call to the called user terminal.
  • the step S20 includes:
  • Step d Answer the incoming call, perform voice/button interaction with the calling party, and obtain voice/button information of the calling party;
  • Step e Analyze and recognize the voice/button information to obtain the corresponding call content.
  • the telephone anti-harassment system answers the caller’s call, performs voice interaction with the caller, initiates recording and call content extraction, and obtains the caller’s Voice information, and perform voice recognition processing on the voice information to obtain corresponding call content.
  • the telephone anti-harassment system when the caller number is not a preset trusted number, the telephone anti-harassment system answers the caller’s call, the caller interacts with the telephone anti-harassment system by pressing keys, and the telephone anti-harassment system obtains the calling party The key information of the party, and analyze and process the key information to obtain the call content corresponding to the key information.
  • the user also sets in advance the call release conditions corresponding to his non-preset trusted number incoming call in the telephone anti-harassment system. For example, the user sets the user's corresponding semantic content in the telephone anti-harassment system, such as the content the user cares about, answers to frequently asked questions, etc., as a call release condition corresponding to a call with a non-preset trusted number.
  • the telephone anti-harassment system After answering the incoming call of the calling party and obtaining the incoming call content corresponding to the incoming call, the telephone anti-harassment system judges whether the incoming call content meets the preset incoming call release conditions corresponding to the called party.
  • the step S30 includes:
  • Step f Determine whether the incoming call content matches the preset user semantic content
  • Step g if it is, it is determined that the content of the incoming call meets the conditions for releasing the incoming call;
  • step h if not, it is determined that the content of the incoming call does not meet the conditions for releasing the incoming call.
  • the telephone anti-harassment system After acquiring the incoming call content corresponding to the incoming call, the telephone anti-harassment system compares the incoming call content with the preset user semantic content corresponding to the called party, and determines whether the incoming call content matches the preset user semantic content corresponding to the called party. If the content of the incoming call matches the preset user semantic content corresponding to the called party, it is determined that the content of the incoming call meets the conditions for releasing the incoming call. Conversely, if the incoming call content does not match the preset user semantic content corresponding to the called party, it is determined that the incoming call content does not meet the incoming call release conditions.
  • the user can also update the user's semantic content through the telephone anti-harassment system, that is, update the user's call release conditions.
  • the operation flow for the user to set and update the semantic content of the user through the telephone anti-harassment system is as follows:
  • Step A1 The called party accesses the WEB service module in the telephone anti-harassment system through the HTTP protocol, and requests to obtain user semantic content setting information;
  • Step A2 The WEB service module interacts with the semantic recognition module to obtain user semantic content setting information, and returns it to the called user terminal;
  • Step A3 The called user terminal sends a setting request to the WEB service module in the telephone anti-harassment system;
  • Step A4 The WEB service module interacts with the semantic recognition module, updates the semantic content, and returns the setting result to the called user terminal.
  • the telephone anti-harassment system forwards the incoming call to the communication system, and the communication system initiates a paging operation to route the call to the called user terminal.
  • the telephone anti-harassment system When it is determined that the content of the incoming call does not meet the call release condition, the telephone anti-harassment system sends a corresponding incoming call rejection message to the communication system.
  • the communication system receives the call rejection message sent by the telephone anti-harassment system, the communication system performs the call rejection operation to end the call.
  • the communication system sends a corresponding call rejection message to the calling user terminal, prompting the calling party that the content of the incoming call is not concerned by the called party.
  • the telephone anti-harassment system directly filters the incoming calls without user participation, reducing the interference of the called user; moreover, it also achieves a win-win situation for the calling party, the called party, and the operator.
  • the calling party As far as the calling party is concerned, they can find the person they really need (called party) through the conversation; for the called party, they can avoid unnecessary telephone harassment, and they can also find useful information from the push information;
  • the telephone anti-harassment system can improve the connection rate of incoming calls and increase the ARPU (Average Revenue Per User) value.
  • the communication system forwards the incoming call to the telephone anti-harassment system, and when receiving the incoming call sent by the communication system, Detect whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, answer the incoming call, obtain the incoming call content corresponding to the incoming call, and determine whether the incoming call content meets the preset incoming call Release conditions. If the call content does not meet the call release conditions, the call rejection message is sent to the communication system, and the communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls.
  • a second example of the incoming call processing method of the present invention is proposed based on the first example.
  • the method further includes:
  • Step S60 Send the call interception information corresponding to the call to the called party terminal for the called party terminal to display the call interception information, where the call interception information includes the caller number and the caller content.
  • the telephone anti-harassment system when the telephone anti-harassment system answers the incoming call and the acquired incoming call content does not meet the call release conditions, the telephone anti-harassment system sends a corresponding incoming call rejection message to the communication system, and the communication The system ends the call.
  • the telephone anti-harassment system sends the call interception information corresponding to the incoming call to the called party terminal, that is, the called user terminal.
  • the call interception information includes caller number, call time, call content and other information.
  • the called party terminal displays the call interception information when it receives the call interception information sent by the telephone anti-harassment system. After viewing the call interception information, the called party can learn about the harassing calls that are automatically intercepted.
  • Step B1 The telephone anti-harassment system receives the incoming call, and the telephone transfer module sends a message to the anti-harassment processing module;
  • Step B2 The anti-harassment processing module calls the personal trusted phone number processing module to check whether the caller number is a trusted number. If it is a trusted number, go to step B3; if it is a non-trusted number, go to step B5;
  • Step B3 The anti-harassment processing module calls the phone transfer module to notify it to forward the call to the communication system;
  • Step B4 The communication system initiates a paging operation and routes the call to the called user terminal;
  • Step B5 The caller number is a non-trusted number, and the anti-harassment processing module calls the answering module to start recording and call content extraction;
  • Step B6 The answering module calls the semantic recognition module to identify and answer the call content
  • Step B7 The semantic recognition module judges that the call meets the pre-set release conditions of the called user, notifies the anti-harassment processing module, and proceeds to step B3 for processing;
  • Step B8 The semantic recognition module judges that the call does not meet the pre-set release conditions of the called user, and notifies the anti-harassment processing module, and the anti-harassment processing module calls the phone transfer module to notify it to reject the call;
  • Step B9 The phone transfer module sends a call rejection message to the communication system
  • Step B10 The communication system sends a call rejection message to the calling user terminal
  • Step B11 The anti-harassment processing module calls the interception information notification module to send the call interception information to the called user terminal.
  • the SIP protocol is used to implement anti-harassment calls.
  • the communication system is implemented by IMS (IP Multimedia Subsystem), for example, as shown in FIG. 6,
  • IMS IP Multimedia Subsystem
  • Step C1 The calling user initiates the call, and the SBC registered by the calling user terminal sends an INVITE request, which carries the media capabilities of the calling user terminal and is described by SDP (Session Description Protocol).
  • SDP Session Description Protocol
  • Step C2 The calling side SBC forwards the INVITE request to the calling side S-CSCF;
  • Step C3 The calling S-CSCF interacts with ENUM/DNS to obtain the I-CSCF of the network where the called user is located;
  • Step C4 The calling S-CSCF forwards the INVITE request to the I-CSCF in the called network;
  • Step C5 The I-CSCF in the called network queries the HSS to obtain the S-CSCF where the called party is registered;
  • Step C6 The I-CSCF in the called network forwards the INVITE request to the S-CSCF where the called party is registered;
  • Step C7 The S-CSCF registered by the called user triggers the call to VoLTE AS (telephone anti-harassment system) according to the called user's subscription information;
  • VoLTE AS telephone anti-harassment system
  • Step C8 VoLTE AS (telephone anti-harassment system) judges that this call requires content identification according to the processing logic, and returns a 200 OK response, which carries the media information of VoLTE AS;
  • Steps C9-C12 the IMS network forwards the 200 OK response to the calling user terminal;
  • Steps C13-C17 the calling user terminal returns an ACK request to route to VoLTE AS through the IMS network to complete the call establishment, and the VoLTE AS interacts with the calling user terminal to perform content identification;
  • Step C18 After content recognition, VoLTE AS determines that the call can be forwarded to the called user terminal, initiates a media switch, sends a re-INVITE request without carrying SDP, and obtains the media capabilities of the calling user terminal;
  • Steps C19-C22 the re-INVITE request reaches the calling user terminal through the IMS network;
  • Steps C23-C27 the calling user terminal returns a 200 OK response carrying the ability of the calling user terminal, and is routed to the called VoLTE AS through the IMS network;
  • Step C28 The called VoLTE AS uses the media capabilities of the calling user terminal to initiate a call request to the called user terminal;
  • Steps C29-C30 the call request reaches the called user terminal through the IMS network;
  • Steps C34-C36 the called VoLTE AS sends an ACK to indicate that the session is established, and requests to reach the called user terminal through the IMS network;
  • Steps C37-C41 The called VoLTE AS sends the media negotiation result of the called user terminal to the calling user terminal via an ACK request; thus, the incoming call after the anti-harassment phone filtering is established between the calling user and the called user .
  • the telephone anti-harassment system when the content of the incoming call does not meet the preset call release conditions, the telephone anti-harassment system sends the call interception information corresponding to the incoming call to the called party terminal, and the called party terminal receives the telephone anti-harassment system
  • the incoming call interception information is sent, the incoming call interception information is displayed. After viewing the call interception information, the called party can be informed of the automatically intercepted harassing calls, therefore, the user experience is further improved.
  • a third example of the incoming call processing method of the present invention is proposed based on the first example or the second example.
  • the method further includes:
  • step S70 when receiving the call number trust setting request, the caller number is added to the preset trusted number list to update the trusted number list.
  • the user in order to accurately prevent harassment of the phone, the user can update the list of trusted numbers through the phone anti-harassment system. Specifically, when the user needs to set the caller number as the preset trusted number, the user performs the corresponding caller number trust setting operation, and sends the caller number trust setting request to the telephone anti-harassment system through its user terminal. When the telephone anti-harassment system receives the caller number trust setting request, the caller number is added to the preset trusted number list corresponding to the user to update the trusted number list.
  • Method one Use the web page method to set and update the user's trusted number list.
  • the specific operation flow is as follows:
  • Step D1 The called party accesses the WEB service module in the telephone anti-harassment system through the HTTP protocol after the call, and requests to update the caller number to be a trusted number;
  • Step D2 The WEB service module interacts with the personal trusted phone number processing module, updates the list of trusted numbers, and returns the setting result to the called user terminal.
  • Method 2 Use the SIP protocol setting to update the user's trusted number list.
  • the specific operation flow is as follows:
  • Step E1 The called party decides whether to add the incoming number (calling number) to the trusted number list at the end of the call. If yes, the called user terminal carries the incoming call number (calling number) in the BYE request sent to the communication system , For example, carried in the newly defined X-Asserted-Identity header;
  • Step E2 The communication system forwards the BYE request to the telephone anti-harassment system
  • Step E3 According to the received request, the telephone anti-harassment system is actively sent by the called side, and the caller number (caller number) is extracted from the specific SIP header (for example, the newly defined X-Asserted-Identity header). Join the trusted number list of the called party, and send a BYE request to the communication system to release the calling-side session, in which the trusted number header is deleted;
  • the caller number (caller number) is extracted from the specific SIP header (for example, the newly defined X-Asserted-Identity header).
  • Join the trusted number list of the called party and send a BYE request to the communication system to release the calling-side session, in which the trusted number header is deleted;
  • Step E4 The communication system forwards the BYE request to the calling user terminal;
  • Step E5 The calling user terminal returns a 200 OK response to the communication system, indicating acceptance of the BYE request;
  • Step E6 The communication system forwards the 200 OK response to the telephone anti-harassment system
  • Step E7 The telephone anti-harassment system forwards the 200 OK response to the communication system
  • Step E8 The communication system forwards the 200 OK response to the called user terminal, and the entire session is normally removed.
  • the called party user can also view or listen to the voice interaction content of the calling party user through the telephone anti-harassment system.
  • Method 1 Use the web page to obtain voice interaction content.
  • the specific operation flow is as follows:
  • Step F1 The called user accesses the WEB service module in the telephone anti-harassment system through the HTTP protocol and requests to obtain the user's voice interaction information;
  • Step F2 The web service module interacts with the answering module to obtain a list of user recording files and returns it to the called user terminal.
  • Method 2 Use SIP protocol to obtain voice interaction content.
  • the specific operation flow is as follows:
  • Step G1 The called user terminal sends an INVITE request to the communication system through the SIP protocol, where the called number fills in the specific access code information of the answering module;
  • Step G2 The communication system forwards INVITE to the answering module in the telephone anti-harassment system;
  • Step G3 The answering module is verified to be a query request initiated by the called user, and returns a 200 OK response to the communication system;
  • Step G4 The communication system forwards the 200 OK response to the called user terminal;
  • Step G5 The called user terminal sends an ACK confirmation to the communication system
  • Step G6 The communication system forwards the ACK to the telephone anti-harassment system to establish a session.
  • the called user terminal can interact with the answering module through the IVR (Interactive Voice Response), to obtain the user's recording information.
  • IVR Interactive Voice Response
  • the incoming call number when receiving the incoming number trust setting request, is added to the preset trusted number list corresponding to the user to update its trusted number list, and to prevent harassment based on the updated trusted number list Telephone, further improve the reliability of anti-harassment calls.
  • FIG. 12 is a schematic diagram of functional modules of an embodiment of the incoming call processing device of the present invention.
  • the call processing device includes:
  • the anti-harassment processing module 10 is configured to detect whether an incoming call number corresponding to the incoming call is a preset trusted number when receiving an incoming call sent by the communication system;
  • Answering module 20 for answering the incoming call if the incoming call number is not the preset trusted number, to obtain the incoming call content corresponding to the incoming call;
  • the semantic recognition module 30 is used to determine whether the incoming call content meets the preset incoming call release conditions
  • the call forwarding module 40 is configured to send an incoming call rejection message to the communication system if the incoming call content does not meet the incoming call release condition for the communication system to perform an incoming call rejection operation.
  • the anti-harassment processing module 10 is used to:
  • the answering module 20 is used to:
  • the phone transfer module 40 is also used to:
  • the incoming call is forwarded to the communication system for the communication system to initiate a paging operation.
  • the call processing device further includes:
  • the personal trust phone number processing module is used to add the caller number to the preset trust number list when receiving the call number trust setting request to update the trust number list.
  • the semantic recognition module 30 is used to:
  • the phone transfer module 40 is also used to:
  • the caller number is a preset trusted number
  • the caller is forwarded to the communication system for the communication system to initiate a paging operation.
  • the call processing device further includes:
  • the interception information notification module is configured to send the call interception information corresponding to the call to the called party terminal, so that the called party terminal displays the call interception information, and the call interception information includes the caller number and the caller content.
  • the communication system forwards the incoming call to the telephone anti-harassment system, and when receiving the incoming call sent by the communication system, Detect whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, answer the incoming call, obtain the incoming call content corresponding to the incoming call, and determine whether the incoming call content matches the preset incoming call Release conditions. If the call content does not meet the call release conditions, the call rejection message is sent to the communication system, and the communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls.
  • the present invention also provides a computer-readable storage medium that stores an incoming call processing program, and the incoming call processing program can be executed by one or more processors for:
  • the incoming call is forwarded to the communication system for the communication system to initiate a paging operation.
  • the caller number is added to the preset trusted number list to update the trusted number list.
  • the caller number is a preset trusted number
  • the caller is forwarded to the communication system for the communication system to initiate a paging operation.
  • the communication system forwards the incoming call to the telephone anti-harassment system, and when receiving the incoming call sent by the communication system, Detect whether the incoming call number corresponding to the incoming call is the preset trusted number, if the incoming call number is not the preset trusted number, answer the incoming call, obtain the incoming call content corresponding to the incoming call, and determine whether the incoming call content matches the preset incoming call Release conditions. If the call content does not meet the call release conditions, the call rejection message is sent to the communication system, and the communication system performs the call rejection operation, thereby effectively preventing harassing calls and improving the ability to prevent harassing calls.
  • the methods in the above embodiments can be implemented by means of software plus a necessary general hardware platform, and of course, can also be implemented by hardware, but in many cases the former is better Implementation.
  • the technical solution of the present invention can be embodied in the form of a software product in essence or part that contributes to the existing technology, and the computer software product is stored in a storage medium (such as ROM/RAM) as described above , Magnetic disks, optical disks), including several instructions to enable a terminal device (which may be a mobile phone, computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.

Abstract

本发明公开了一种来电处理方法,包括:在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;判断所述来电内容是否符合预设的来电放通条件;若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。本发明还公开了一种计算机可读存储介质。本发明提高了防骚扰电话的能力。

Description

来电处理方法、装置、电话防骚扰系统及可读存储介质
本申请要求享有2018年12月24日提交的名称为“来电处理方法、装置、电话防骚扰系统及可读存储介质”的中国专利申请CN201811588391.8的优先权,其全部内容通过引用并入本文中。
技术领域
本发明涉及通信技术领域,尤其涉及一种来电处理方法、装置、电话防骚扰系统及可读存储介质。
背景技术
随着手机等通信终端的普及,日常中,用户时常会接到各种广告推销、骚扰电话,因而影响了用户的正常工作和生活,给用户带来不佳体验。目前,有许多手机厂商推出了号码标签的服务,当接到骚扰电话、广告推销类的来电时,在手机屏幕上会显示来电类型,如“骚扰电话”、“广告推销”等,从而方便用户拒接来电。但这种方式仍存在着一定的局限性,例如,在用户拒接来电之后,拨号方可能会更换号码继续拨打,并不能有效地阻止骚扰来电。因此,防骚扰电话的能力还有待提升。
发明内容
本发明的主要目的是提供一种来电处理方法、装置、电话防骚扰系统及可读存储介质,旨在解决现有技术中防骚扰电话能力不高的问题。
为实现上述目的,本发明提出来电处理方法,所述来电处理方法包括以下步骤:
在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
判断所述来电内容是否符合预设的来电放通条件;
若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统, 以供所述通信系统执行来电拒接操作。
此外,为实现上述目的,本发明还提出一种来电处理装置,所述来电处理装置包括:
防骚扰处理模块,用于在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
答录模块,用于若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
语义识别模块,用于判断所述来电内容是否符合预设的来电放通条件;
电话转接模块,用于若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
此外,为实现上述目的,本发明还提供一种电话防骚扰系统,所述电话防骚扰系统包括如上文所述的来电处理装置。
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有来电处理程序,所述来电处理程序被处理器执行时实现如上文所述的来电处理方法的步骤。
本发明技术方案中,当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。
附图说明
图1是本发明实施例方案涉及的硬件运行环境的电话防骚扰系统结构示意图;
图2是本发明的来电处理方法第一实施例的流程示意图;
图3是本发明实施例方案涉及的一个可选的电话系统的系统结构示意图;
图4是本发明实施例方案涉及的一个可选的对用户语义内容进行设置更新的交互示意图;
图5是本发明的来电处理方法第二实施例的流程示意图;
图6是本发明实施例方案涉及的一个可选的来电处理流程示意图;
图7是本发明的来电处理方法第三实施例的流程示意图;
图8是本发明实施例方案涉及的一个可选的使用网页方式设置更新用户的信任号码列表的交互示意图;
图9是本发明实施例方案涉及的一个可选的使用在SIP协议设置更新用户的信任号码列表的流程示意图;
图10是本发明实施例方案涉及的一个可选的使用网页方式获取语音交互内容的交互示意图;
图11是本发明实施例方案涉及的一个可选的使用SIP协议获取语音交互内容的流程示意图;
图12是本发明的来电处理装置实施例的功能模块示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例的解决方案主要是:当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。通过本发明实施例的技术方案,解决了防骚扰电话能力不高的问题。
本发明实施例提出一种电话防骚扰系统。
参照图1,图1为本发明实施例方案涉及的硬件运行环境的电话防骚扰系统结构示意图。
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。
如图1所示,该电话防骚扰系统可以包括:处理器1001、通信总线1002、用户接口1003、网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。在一实施方式中,所述用户接口1003可以是显示屏(Display)、输入单元比如键盘(Keyboard)等一个或多个适用的接口,在其他实施方式中,所述用户接口1003也可以是标准的有线接口、无线接口等。所述网络接口1004可以是标准的有线接口、无线接口(如WI-FI接口)等一个或多个适用的网络设备的接口。所述存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory)等,例如磁盘存储器。在一实施方式中,所述存储器1005也可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图1中示出的电话防骚扰系统结构并不构成对电话防骚扰系统的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块以及来电处理程序。
本发明中,电话防骚扰系统通过处理器1001调用存储器1005中存储的来电处理程序,并执行以下操作:
在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
判断所述来电内容是否符合预设的来电放通条件;
若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
查询预设的信任号码列表,搜索所述信任号码列表中是否存在电话号码与所述来电号码匹配;
若是,则确定所述来电号码为预设可信任号码;
若否,则确定所述来电号码不为预设可信任号码。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
答录所述来电,与主叫方进行语音/按键交互,获取所述主叫方的语音/按键信息;
对所述语音/按键信息进行分析识别处理,获取对应的所述来电内容。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
若所述来电内容符合所述来电放通条件,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
在接收到来电号码信任设置请求时,将所述来电号码增添至预设的信任号码列表中,以对所述信任号码列表进行更新。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
判断所述来电内容是否与预设的用户语义内容匹配;
若是,则判定所述来电内容符合来电放通条件;
若否,则判定所述来电内容不符合来电放通条件。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行以下操作:
若所述来电号码为预设可信任号码,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
在一实施方式中,处理器1001可以调用存储器1005中存储的来电处理程序,还执行 以下操作:
将所述来电对应的来电拦截信息发送至被叫方终端,以供所述被叫方终端显示所述来电拦截信息,所述来电拦截信息包括来电号码和来电内容。
本实施例通过上述方案,当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。
基于上述硬件结构,提出本发明来电处理方法实施例。
参照图2,图2为本发明来电处理方法第一实施例的流程示意图。
在第一实施例中,所述来电处理方法包括以下步骤:
步骤S10,在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;若否,则执行步骤S20;若是,则执行步骤S50;
步骤S20,答录所述来电,获取所述来电对应的来电内容;
步骤S30,判断所述来电内容是否符合预设的来电放通条件;若否,则执行步骤S40;若是,则执行步骤S50;
步骤S40,发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作;
步骤S50,将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
为了有效地阻止广告推销、骚扰电话等来电,提出本发明来电处理方法,该来电处理方法适用于上述实施例中的电话防骚扰系统,通过电话防骚扰系统与主叫方进行通话,由电话防骚扰系统对通话内容进行分析,确定是被叫方关心的内容(被叫方可以对电话防骚扰系统输入关心内容和应答内容),再转接来电呼叫给被叫方,否则,拒绝来电呼叫,从而提高防骚扰电话的能力。
如图3所示,通信系统、电话防骚扰系统、主叫用户终端、被叫用户终端组成电话系统,其中,通信系统负责将主叫的来电呼叫转发到被叫用户的电话防骚扰系统;接收电话防骚扰系统发出的通信消息,转发给主叫或被叫;通信系统与电话防骚扰系统之间 可以采用标准的通信协议,例如,SIP(Session Initiation Protocol,会话初始协议)、BICC((bearerIndependent Call Control protocol,呼叫控制协议)、ISUP(ISDN User Part,用户部分)等。主叫用户终端负责为主叫用户提供通信能力,被叫用户终端负责为被叫用户提供通信能力。电话防骚扰系统包括防骚扰处理模块、个人信任电话号码处理模块、WEB服务模块、电话转接模块、拦截信息通知模块、语义识别模块、答录模块等,其中,防骚扰处理模块是防骚扰系统的主控模块,负责防骚扰系统的整理控制,包括各模块之间的协作;个人信任号码处理模块负责存储、比对用户的信任号码列表,为防骚扰处理模块提供结果;WEB服务模块负责对外提供WEB服务,为防骚扰系统中各模块提供WEB接口;电话转接模块负责接收通信系统发送的呼叫请求,通知防骚扰处理模块进行处理;以及接收防骚扰处理模块的指示,对呼叫进行转接或拒绝;拦截信息通知模块负责向用户提供拦截通知服务,可以将拦截的主叫号码信息和内容情况发送给用户;语义识别模块负责与主叫用户进行交互,对交互内容进行识别并进行回复,确认主叫用户的通信意图,将结果反馈给防骚扰处理模块;答录模块负责对防骚扰系统与主叫用户的通话内容进行提取和交互内容录音。
本实施例中,用户可以预先在电话防骚扰系统中设置自己的至少一个预设可信任号码,电话防骚扰系统保存各个用户对应的预设可信任号码。例如,预设各个用户设置的预设可信任号码对应的信任号码列表,每个信任号码列表中包含对应用户设置的至少一个预设可信任号码。
当主叫方(主叫用户)通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统。当电话防骚扰系统接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,也即检测该来电号码是否为来电的被叫方(被叫用户)对应设置的预设可信任号码。
所述步骤S10包括:
步骤a,查询预设的信任号码列表,搜索所述信任号码列表中是否存在电话号码与所述来电号码匹配;
步骤b,若是,则确定所述来电号码为预设可信任号码;
步骤c,若否,则确定所述来电号码不为预设可信任号码。
当电话防骚扰系统接收到通信系统发送的来电时,电话防骚扰系统查询被叫方对应的预设的信任号码列表,搜索该信任号码列表中是否存在电话号码与来电号码匹配。若该信任号码列表中存在电话号码与来电号码匹配,则确定来电号码为预设可信任号码; 反之,该信任号码列表中不存在电话号码与来电号码匹配,则确定来电号码不为预设可信任号码。
当来电号码为预设可信任号码时,电话防骚扰系统将该来电转发至通信系统,通信系统发起寻呼操作,将呼叫路由到被叫用户终端。
当来电号码不为预设可信任号码时,电话防骚扰系统答录主叫方的来电,获取该来电对应的来电内容。所述步骤S20包括:
步骤d,答录所述来电,与主叫方进行语音/按键交互,获取所述主叫方的语音/按键信息;
步骤e,对所述语音/按键信息进行分析识别处理,获取对应的所述来电内容。
在一实施方式中,当来电号码不为预设可信任号码时,电话防骚扰系统答录主叫方的来电,与主叫方进行语音交互,启动录音和通话内容提取,获取主叫方的语音信息,并对语音信息进行语音识别处理,获取对应的来电内容。
在另一实施方式中,当来电号码不为预设可信任号码时,电话防骚扰系统答录主叫方的来电,主叫方与电话防骚扰系统进行按键交互,电话防骚扰系统获取主叫方的按键信息,并对按键信息进行分析处理,获取按键信息对应的来电内容。
本实施例中,用户还预先在电话防骚扰系统中设置自己的非预设可信任号码来电对应的来电放通条件。例如,用户在电话防骚扰系统中设置自己对应的用户语义内容,如用户关心的内容,常见问题答复等,作为非预设可信任号码来电对应的来电放通条件。
在答录主叫方的来电,获取到该来电对应的来电内容后,电话防骚扰系统判断该来电内容是否符合被叫方对应预设的来电放通条件。
所述步骤S30包括:
步骤f,判断所述来电内容是否与预设的用户语义内容匹配;
步骤g,若是,则判定所述来电内容符合来电放通条件;
步骤h,若否,则判定所述来电内容不符合来电放通条件。
在获取到该来电对应的来电内容后,电话防骚扰系统将来电内容与被叫方对应预设的用户语义内容进行比对,判断来电内容是否与被叫方对应预设的用户语义内容匹配。若来电内容与被叫方对应预设的用户语义内容匹配,则判定来电内容符合来电放通条件。反之,若来电内容与被叫方对应预设的用户语义内容不匹配,则判定来电内容不符合来电放通条件。
用户还可以通过电话防骚扰系统对其用户语义内容进行更新,也即对用户的来电放通条件进行更新。例如,如图4所示,用户通过电话防骚扰系统对其用户语义内容进行设置和更新的操作流程如下:
步骤A1:被叫方通过HTTP协议访问电话防骚扰系统中的WEB服务模块,请求获取用户语义内容设置信息;
步骤A2:WEB服务模块与语义识别模块交互,获得用户语义内容设置信息,并返回给被叫用户终端;
步骤A3:被叫用户终端向电话防骚扰系统中的WEB服务模块发送设置请求;
步骤A4:WEB服务模块与语义识别模块交互,将语义内容进行更新,并返回设置结果给被叫用户终端。
当判定来电内容符合来电放通条件时,电话防骚扰系统将该来电转发至通信系统,通信系统发起寻呼操作,将呼叫路由到被叫用户终端。
当判定来电内容不符合来电放通条件时,电话防骚扰系统发送相应的来电拒接消息至通信系统。当通信系统接收到电话防骚扰系统发送的来电拒接消息时,通信系统执行来电拒接操作,结束此次来电。通信系统发送相应的拒绝呼叫消息至主叫用户终端,提示主叫方来电内容被叫方当前不关心。
本发明中,由电话防骚扰系统直接对来电进行过滤,不需要用户参与,减少了被叫用户的干扰;而且,还实现了主叫方、被叫方、运营商三方的多赢,对于主叫方而言,可以通过对话找到真正需要的通话对象(被叫方);对于被叫方而言,可以避免不必要的电话骚扰,同时也能从推送信息中找到有用信息;对于运营商而言,电话防骚扰系统能提高来电的接通率,增加ARPU(Average Revenue Per User)值。
本实施例提供的方案,当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。
在一实施方式中,基于第一实施例提出本发明来电处理方法第二实施例,在本实施 例中,如图5所示,所述步骤S40之后,还包括:
步骤S60,将所述来电对应的来电拦截信息发送至被叫方终端,以供所述被叫方终端显示所述来电拦截信息,所述来电拦截信息包括来电号码和来电内容。
为了进一步提高用户体验,本实施例中,当电话防骚扰系统答录来电,获取到的来电内容不符合来电放通条件时,电话防骚扰系统发送相应的来电拒接消息至通信系统,由通信系统结束来电。与此,电话防骚扰系统将来电对应的来电拦截信息发送至被叫方终端,也即被叫用户终端。其中,来电拦截信息包括来电号码、来电时间、来电内容等信息。
被叫方终端在接收到电话防骚扰系统发送的来电拦截信息时,显示该来电拦截信息。被叫方在查看到该来电拦截信息后,即可获知自动拦截的骚扰电话。
下面,对本发明的来电处理流程进行具体地详细说明:
步骤B1:电话防骚扰系统收到来电呼叫,由电话转接模块发送消息给防骚扰处理模块;
步骤B2:防骚扰处理模块调用个人信任电话号码处理模块,检查来电号码是否是可信任号码,如果是可信任号码,则转到步骤B3,如果是非可信任号码,则转到步骤B5;
步骤B3:防骚扰处理模块调用电话转接模块,通知其将呼叫转发给通信系统;
步骤B4:通信系统发起寻呼操作,将呼叫路由到被叫用户终端;
步骤B5:来电号码是非可信任号码,防骚扰处理模块调用答录模块,启动录音和通话内容提取;
步骤B6:答录模块调用语义识别模块对通话内容进行识别和应答;
步骤B7:语义识别模块判断本次通话满足被叫用户预先设定的放通条件,通知防骚扰处理模块,转到步骤B3处理;
步骤B8:语义识别模块判断本次通话不满足被叫用户预先设定的放通条件,通知防骚扰处理模块,防骚扰处理模块调用电话转接模块,通知其拒绝本次呼叫;
步骤B9:电话转接模块发送来电拒接消息给通信系统;
步骤B10:通信系统发送来电拒接消息给主叫用户终端;
步骤B11:防骚扰处理模块调用拦截信息通知模块,向被叫用户终端发送来电拦截 信息。
以电话防骚扰系统在VoLTE网络中实现来电处理为例,使用SIP协议实现防骚扰呼叫,其中,通信系统由IMS(IP Multimedia Subsystem,IP多媒体子系统)实现,例如,如图6所示,具体操作流程如下:
步骤C1:主叫用户发起呼叫,由主叫用户终端主叫注册的SBC发送INVITE请求,其中携带主叫用户终端的媒体能力,通过SDP(Session Description Protocol,会话描述协议)进行描述;
步骤C2:主叫侧SBC转发INVITE请求给主叫侧S-CSCF;
步骤C3:主叫侧S-CSCF与ENUM/DNS交互获得被叫用户所在网络的I-CSCF;
步骤C4:主叫侧S-CSCF转发INVITE请求给被叫网络中的I-CSCF;
步骤C5:被叫网络中的I-CSCF查询HSS获得被叫注册所在S-CSCF;
步骤C6:被叫网络中的I-CSCF转发INVITE请求给被叫注册所在S-CSCF;
步骤C7:被叫用户注册的S-CSCF根据被叫用户签约信息,将呼叫触发到VoLTE AS(电话防骚扰系统);
步骤C8:VoLTE AS(电话防骚扰系统)根据处理逻辑,判断本次呼叫需要进行内容识别,返回200 OK应答响应,其中,携带VoLTE AS的媒体信息;
步骤C9-C12:IMS网络将200 OK应答响应转发给主叫用户终端;
步骤C13-C17:主叫用户终端返回ACK请求经过IMS网络路由到VoLTE AS,完成呼叫建立,由VoLTE AS与主叫用户终端交互进行内容识别;
步骤C18:VoLTE AS经过内容识别,判断该呼叫可以转发给被叫用户终端,发起媒体切换,发送re-INVITE请求不携带SDP,获取主叫用户终端的媒体能力;
步骤C19-C22:re-INVITE请求经过IMS网络达到主叫用户终端;
步骤C23-C27:主叫用户终端返回200 OK响应携带主叫用户终端的能力,经过IMS网络路由到被叫VoLTE AS;
步骤C28:被叫VoLTE AS使用主叫用户终端媒体能力,向被叫用户终端发起呼叫请求;
步骤C29-C30:呼叫请求经过IMS网络到达被叫用户终端;
步骤C34-C36:被叫VoLTE AS发送ACK表示会话建立,请求经过IMS网络达到被 叫用户终端;
步骤C37-C41:被叫VoLTE AS将被叫用户终端的媒体协商结果通过ACK请求发送给主叫用户终端;至此,经过防骚扰电话过滤后的来电呼叫在主叫用户和被叫用户之间建立。
本实施例提供的方案,在来电内容不符合预设的来电放通条件时,电话防骚扰系统将来电对应的来电拦截信息发送至被叫方终端,被叫方终端在接收到电话防骚扰系统发送的来电拦截信息时,显示该来电拦截信息。被叫方在查看到该来电拦截信息后,即可获知自动拦截的骚扰来电,因此,进一步提高了用户体验。
在一实施方式中,基于第一实施例或第二实施例提出本发明来电处理方法第三实施例,在本实施例中,如图7所示,所述步骤S30之后,还包括:
步骤S70,在接收到来电号码信任设置请求时,将所述来电号码增添至预设的信任号码列表中,以对所述信任号码列表进行更新。
在本实施例中,为了能精准地防骚扰电话,用户可以通过电话防骚扰系统对其信任号码列表进行更新。具体地,当用户需要将来电号码设置为预设可信任号码时,用户执行相应的来电号码信任设置操作,通过其用户终端发送来电号码信任设置请求至电话防骚扰系统。当电话防骚扰系统接收到该来电号码信任设置请求时,将来电号码增添至用户对应预设的信任号码列表中,以对其信任号码列表进行更新。
下面分别对信任号码列表进行更新的两种方式进行介绍:
1)方式一、使用网页方式设置更新用户的信任号码列表,在该方式中,例如,如图8所示,具体操作流程如下:
步骤D1:被叫方在通话后通过HTTP协议访问电话防骚扰系统中的WEB服务模块,请求更新来电号码为可信任号码;
步骤D2:WEB服务模块与个人信任电话号码处理模块交互,更新可信任号码列表,并返回设置结果给被叫用户终端。
2)方式二、使用在SIP协议设置更新用户的信任号码列表,在该方式中,例如,如图9所示,具体操作流程如下:
步骤E1:被叫方在通话结束时决定是否将来电号码(主叫号码)加入信任号码列表,如果选择是,被叫用户终端在发送给通信系统的BYE请求中携带来电号码(主叫号码), 例如,在新定义的X-Asserted-Identity头部中携带;
步骤E2:通信系统向电话防骚扰系统转发BYE请求;
步骤E3:电话防骚扰系统根据收到的请求是被叫侧主动发出的,从特定的SIP头部(例如,新定义的X-Asserted-Identity头部)中提取来电号码(主叫号码),加入到被叫方的信任号码列表中,并向通信系统发送BYE请求释放主叫侧会话,其中,将可信任号码头部删除;
步骤E4:通信系统向主叫用户终端转发BYE请求;
步骤E5:主叫用户终端向通信系统返回200 OK响应,表示接受BYE请求;
步骤E6:通信系统向电话防骚扰系统转发200 OK响应;
步骤E7:电话防骚扰系统转发200 OK响应给通信系统;
步骤E8:通信系统转发200 OK响应给被叫用户终端,整个会话正常拆除。
被叫方用户还可通过电话防骚扰系统查看或收听主叫方用户的语音交互内容。下面分别对获取语音交互内容的两种方式进行介绍:
1)方式一、使用网页方式获取语音交互内容,在该方式中,例如,如图10所示,具体操作流程如下:
步骤F1:被叫用户通过HTTP协议访问电话防骚扰系统中的WEB服务模块,请求获取用户语音交互信息;
步骤F2:WEB服务模块与答录模块交互,获得用户录音文件列表,并返回给被叫用户终端。
2)方式二、使用SIP协议获取语音交互内容,在该方式中,例如,如图11所示,具体操作流程如下:
步骤G1:被叫用户终端通过SIP协议发送INVITE请求给通信系统,其中,被叫号码填写答录模块的特定接入码信息;
步骤G2:通信系统转发INVITE给电话防骚扰系统中的答录模块;
步骤G3:答录模块经过验证是被叫用户发起的查询请求,返回200 OK应答响应给通信系统;
步骤G4:通信系统转发200 OK应答响应给被叫用户终端;
步骤G5:被叫用户终端发送ACK确认给通信系统;
步骤G6:通信系统转发ACK给电话防骚扰系统,建立会话。被叫用户终端可以通过IVR((Interactive Voice Response,即互动式语音应答)与与答录模块交互,获得用户录音信息。
本实施例提供的方案,在接收到来电号码信任设置请求时,将来电号码增添至用户对应预设的信任号码列表中,以对其信任号码列表进行更新,基于更新的信任号码列表来防骚扰电话,进一步提高了防骚扰电话的可靠性。
本发明进一步提供一种来电处理装置,如图12所示,图12为本发明来电处理装置实施例的功能模块示意图。
在本实施例中,该来电处理装置包括:
防骚扰处理模块10,用于在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
答录模块20,用于若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
语义识别模块30,用于判断所述来电内容是否符合预设的来电放通条件;
电话转接模块40,用于若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
所述防骚扰处理模块10用于:
查询预设的信任号码列表,搜索所述信任号码列表中是否存在电话号码与所述来电号码匹配;
若是,则确定所述来电号码为预设可信任号码;
若否,则确定所述来电号码不为预设可信任号码。
所述答录模块20用于:
答录所述来电,与主叫方进行语音/按键交互,获取所述主叫方的语音/按键信息;
对所述语音/按键信息进行分析识别处理,获取对应的所述来电内容。
所述电话转接模块40还用于:
若所述来电内容符合所述来电放通条件,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
所述来电处理装置还包括:
个人信任电话号码处理模块,用于在接收到来电号码信任设置请求时,将所述来电号码增添至预设的信任号码列表中,以对所述信任号码列表进行更新。
所述语义识别模块30用于:
判断所述来电内容是否与预设的用户语义内容匹配;
若是,则判定所述来电内容符合来电放通条件;
若否,则判定所述来电内容不符合来电放通条件。
所述电话转接模块40还用于:
若所述来电号码为预设可信任号码,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
所述来电处理装置还包括:
拦截信息通知模块,用于将所述来电对应的来电拦截信息发送至被叫方终端,以供所述被叫方终端显示所述来电拦截信息,所述来电拦截信息包括来电号码和来电内容。
本发明来电处理装置具体实施方式与上述来电处理方法各实施例基本相同,在此不再赘述。
本实施例通过上述方案,当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。
本发明还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有来电处理程序,所述来电处理程序可被一个或者一个以上的处理器执行以用于:
在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
判断所述来电内容是否符合预设的来电放通条件;
若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
查询预设的信任号码列表,搜索所述信任号码列表中是否存在电话号码与所述来电号码匹配;
若是,则确定所述来电号码为预设可信任号码;
若否,则确定所述来电号码不为预设可信任号码。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
答录所述来电,与主叫方进行语音/按键交互,获取所述主叫方的语音/按键信息;
对所述语音/按键信息进行分析识别处理,获取对应的所述来电内容。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
若所述来电内容符合所述来电放通条件,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
在接收到来电号码信任设置请求时,将所述来电号码增添至预设的信任号码列表中,以对所述信任号码列表进行更新。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
判断所述来电内容是否与预设的用户语义内容匹配;
若是,则判定所述来电内容符合来电放通条件;
若否,则判定所述来电内容不符合来电放通条件。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
若所述来电号码为预设可信任号码,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
在一实施方式中,所述来电处理程序被处理器执行时还实现如下操作:
将所述来电对应的来电拦截信息发送至被叫方终端,以供所述被叫方终端显示所述来电拦截信息,所述来电拦截信息包括来电号码和来电内容。
本发明计算机可读存储介质具体实施方式与上述来电处理方法各实施例基本相同,在此不再赘述。
本实施例通过上述方案,当主叫方通过主叫用户终端发起呼叫,通信系统接收到该来电呼叫时,通信系统将该来电转发至电话防骚扰系统,在接收到通信系统发送的来电时,检测该来电对应的来电号码是否为预设可信任号码,若来电号码不为预设可信任号码,则答录该来电,获取该来电对应的来电内容,并判断来电内容是否符合预设的来电放通条件,若来电内容不符合来电放通条件,则发送来电拒接消息至通信系统,通信系统执行来电拒接操作,从而实现有效地阻止骚扰电话,提高了防骚扰电话的能力。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (11)

  1. 一种来电处理方法,其中,所述来电处理方法包括:
    在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
    若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
    判断所述来电内容是否符合预设的来电放通条件;
    若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
  2. 如权利要求1所述的来电处理方法,其中,所述检测所述来电对应的来电号码是否为预设可信任号码的步骤包括:
    查询预设的信任号码列表,搜索所述信任号码列表中是否存在电话号码与所述来电号码匹配;
    若是,则确定所述来电号码为预设可信任号码;
    若否,则确定所述来电号码不为预设可信任号码。
  3. 如权利要求1所述的来电处理方法,其中,所述答录所述来电,获取所述来电对应的来电内容的步骤包括:
    答录所述来电,与主叫方进行语音/按键交互,获取所述主叫方的语音/按键信息;
    对所述语音/按键信息进行分析识别处理,获取对应的所述来电内容。
  4. 如权利要求1所述的来电处理方法,其中,所述判断所述来电内容是否符合预设的来电放通条件的步骤之后,还包括:
    若所述来电内容符合所述来电放通条件,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
  5. 如权利要求4所述的来电处理方法,其中,所述若所述来电内容符合所述来电放 通条件,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作的步骤之后,还包括:
    在接收到来电号码信任设置请求时,将所述来电号码增添至预设的信任号码列表中,以对所述信任号码列表进行更新。
  6. 如权利要求1所述的来电处理方法,其中,所述判断所述来电内容是否符合预设的来电放通条件的步骤包括:
    判断所述来电内容是否与预设的用户语义内容匹配;
    若是,则判定所述来电内容符合来电放通条件;
    若否,则判定所述来电内容不符合来电放通条件。
  7. 如权利要求1所述的来电处理方法,其中,所述在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码的步骤之后,还包括:
    若所述来电号码为预设可信任号码,则将所述来电转发至所述通信系统,以供所述通信系统发起寻呼操作。
  8. 如权利要求1-7任一项所述的来电处理方法,其中,所述若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作的步骤之后,还包括:
    将所述来电对应的来电拦截信息发送至被叫方终端,以供所述被叫方终端显示所述来电拦截信息,所述来电拦截信息包括来电号码和来电内容。
  9. 一种来电处理装置,其特征在于,所述来电处理装置包括:
    防骚扰处理模块,用于在接收到通信系统发送的来电时,检测所述来电对应的来电号码是否为预设可信任号码;
    答录模块,用于若所述来电号码不为预设可信任号码,则答录所述来电,获取所述来电对应的来电内容;
    语义识别模块,用于判断所述来电内容是否符合预设的来电放通条件;
    电话转接模块,用于若所述来电内容不符合所述来电放通条件,则发送来电拒接消息至所述通信系统,以供所述通信系统执行来电拒接操作。
  10. 一种电话防骚扰系统,其特征在于,所述电话防骚扰系统包括如权利要求9所述的来电处理装置。
  11. 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储有来电处理程序,所述来电处理程序被处理器执行时实现如权利要求1-8中任一项所述的来电处理方法的步骤。
PCT/CN2019/109101 2018-12-24 2019-09-29 来电处理方法、装置、电话防骚扰系统及可读存储介质 WO2020134291A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811588391.8A CN111355837A (zh) 2018-12-24 2018-12-24 来电处理方法、装置、电话防骚扰系统及可读存储介质
CN201811588391.8 2018-12-24

Publications (1)

Publication Number Publication Date
WO2020134291A1 true WO2020134291A1 (zh) 2020-07-02

Family

ID=71128576

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/109101 WO2020134291A1 (zh) 2018-12-24 2019-09-29 来电处理方法、装置、电话防骚扰系统及可读存储介质

Country Status (2)

Country Link
CN (1) CN111355837A (zh)
WO (1) WO2020134291A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979348A (zh) * 2021-02-22 2022-08-30 上海博泰悦臻网络技术服务有限公司 智能挂电话方法、系统、介质及装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246008A (zh) * 2020-01-10 2020-06-05 三星电子(中国)研发中心 一种电话助理的实现方法、系统及装置
CN112235456B (zh) * 2020-10-12 2021-09-03 中国联合网络通信集团有限公司 来电拒接处理方法、系统、计算机设备和存储介质
CN114765647B (zh) * 2021-01-15 2023-09-29 中国联合网络通信集团有限公司 来电免打扰处理方法、系统、计算机设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120220265A1 (en) * 2011-02-25 2012-08-30 Chi Mei Communication Systems, Inc. Electronic device and method for validating contact identification
CN105187667A (zh) * 2015-10-09 2015-12-23 小米科技有限责任公司 来电处理方法及装置
CN106506784A (zh) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 一种拦截骚扰电话的方法及装置
CN108574940A (zh) * 2017-03-07 2018-09-25 腾讯科技(深圳)有限公司 一种来电呼叫的处理方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737665A (zh) * 2017-04-24 2018-11-02 中兴通讯股份有限公司 一种来电防骚扰的实现方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120220265A1 (en) * 2011-02-25 2012-08-30 Chi Mei Communication Systems, Inc. Electronic device and method for validating contact identification
CN106506784A (zh) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 一种拦截骚扰电话的方法及装置
CN105187667A (zh) * 2015-10-09 2015-12-23 小米科技有限责任公司 来电处理方法及装置
CN108574940A (zh) * 2017-03-07 2018-09-25 腾讯科技(深圳)有限公司 一种来电呼叫的处理方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979348A (zh) * 2021-02-22 2022-08-30 上海博泰悦臻网络技术服务有限公司 智能挂电话方法、系统、介质及装置
CN114979348B (zh) * 2021-02-22 2024-01-12 上海博泰悦臻网络技术服务有限公司 智能挂电话方法、系统、介质及装置

Also Published As

Publication number Publication date
CN111355837A (zh) 2020-06-30

Similar Documents

Publication Publication Date Title
US10484436B2 (en) User device selection
WO2020134291A1 (zh) 来电处理方法、装置、电话防骚扰系统及可读存储介质
US10498893B2 (en) Guard timer to optimize E911 call handling
US11095664B2 (en) Detection of spoofed call information
JP4555228B2 (ja) マルチメディアサービス能力を自動的に検出する方法及び通信システム
US8379818B2 (en) Method and apparatus for conveying a calling party identifier
US20190037075A1 (en) Optimized call handling during e911 calls
US20100014508A1 (en) Method And System For Emergency Call
US11223955B2 (en) Mitigation of spoof communications within a telecommunications network
US20130194976A1 (en) Communication system, packet network, supplementary service controller, and method for providing supplementary services
US8675834B2 (en) System and apparatus for managing calls
US20120115483A1 (en) Method for Transferring a Communication Session in a Telecommunications Network From a First Connection to a Second Connection
US10154145B1 (en) Virtual telephony assistant
EP3172880A1 (en) Method of and communications handling equipment for controlling communication session establishment in a multimedia communications network.
US20080043957A1 (en) System and method for allowing a communication device to have multiple, hierarchically prioritized numbers
US20150264182A1 (en) Voice over long term evolution - called party status
US9584559B2 (en) Session establishment using one multimedia telephony (MMTEL) application server
WO2010017697A1 (zh) 一种实现呼叫管理的方法、系统及业务控制点
US11909782B2 (en) Systems and methods for using machine learning techniques for network-implemented spam call detection
JP2014519254A (ja) 発呼元の識別子を被呼側デバイス上に表示するためのシステム及び方法
WO2016048203A1 (en) Provide text transcribed from an unknown calling party's spoken identification
US20110314112A1 (en) Handling of Communication Session Invitations
Liu Generic service provisioning and invocation in IMS
JP2015506613A (ja) 通信システムにおける未確立通信リンク

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19903626

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19903626

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/11/2022)