CN108271158A - Call processing method and system - Google Patents
Call processing method and system Download PDFInfo
- Publication number
- CN108271158A CN108271158A CN201611268523.XA CN201611268523A CN108271158A CN 108271158 A CN108271158 A CN 108271158A CN 201611268523 A CN201611268523 A CN 201611268523A CN 108271158 A CN108271158 A CN 108271158A
- Authority
- CN
- China
- Prior art keywords
- user
- call
- phone number
- calling
- calling user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 9
- 238000000034 method Methods 0.000 claims abstract description 35
- 230000002159 abnormal effect Effects 0.000 claims description 58
- 238000013475 authorization Methods 0.000 claims description 33
- 238000012545 processing Methods 0.000 claims description 9
- 230000003247 decreasing effect Effects 0.000 claims description 5
- 230000005856 abnormality Effects 0.000 claims 5
- 230000003542 behavioural effect Effects 0.000 abstract 2
- 230000006399 behavior Effects 0.000 description 28
- 230000008569 process Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 241000282836 Camelus dromedarius Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本发明涉及通讯领域,具体而言,涉及一种呼叫处理方法及系统。The present invention relates to the communication field, in particular, to a call processing method and system.
背景技术Background technique
随着通信业务的发展和普及,电信运营商掌握着越来越多的客户隐私信息。于此同时,公众对隐私数据的敏感度越来越高,对其隐私数据的保密要求与日俱增,隐私数据的泄露已不仅仅限于经济纠纷,它已经成为全社会共同讨论的社会问题。最近愈发猖狂的电信诈骗更是将电信运营商推向了风口浪尖。如何做好用户信息安全保护工作成为了电信运营商所面临的巨大挑战。With the development and popularization of communication services, telecom operators hold more and more private information of customers. At the same time, the public is becoming more and more sensitive to private data, and their confidentiality requirements are increasing day by day. The leakage of private data is not limited to economic disputes, but has become a social issue discussed by the whole society. Recently, the increasingly rampant telecom fraud has pushed telecom operators to the forefront. How to do a good job in user information security protection has become a huge challenge for telecom operators.
目前技术在电信用户的隐私保护中,偏重于事后处置,当某个用户的疑似骚扰或诈骗行为已经实行完毕,再通过确定该用户身份对其实施后续惩罚措施,或者通过众多用户将某个号码标记为骚扰电话,如手机APP中某些通话软件,来对用户起到提示作用,无法起到事前防止对用户的骚扰。At present, in the privacy protection of telecom users, the current technology focuses on post-event disposal. When a user’s suspected harassment or fraud has been carried out, follow-up punishment measures will be implemented by identifying the user’s identity, or a certain number will Marked as harassing calls, such as some calling software in mobile APP, to remind users, but cannot prevent harassment to users in advance.
发明内容Contents of the invention
本发明实施例提供了一种呼叫处理方法及系统,以至少解决现有技术中无法起到事前防止对用户的骚扰的问题。Embodiments of the present invention provide a call processing method and system to at least solve the problem in the prior art that the user cannot be prevented from being harassed in advance.
根据本发明实施例的一个方面,提供了一种呼叫处理方法,包括:获取呼叫的主叫用户的电话号码;获取主叫用户的电话号码的历史呼叫行为数据;根据历史呼叫行为数据判断主叫用户是否为非正常用户;在主叫用户为非正常用户的情况下,终止呼叫,在主叫用户为正常用户的情况下,继续呼叫。According to an aspect of an embodiment of the present invention, a call processing method is provided, including: obtaining the phone number of the calling user; obtaining the historical call behavior data of the calling user's phone number; judging the caller according to the historical call behavior data Whether the user is an abnormal user; if the calling user is an abnormal user, the call is terminated, and if the calling user is a normal user, the call is continued.
在一个示例实施例中,获取主叫用户的电话号码的历史呼叫行为数据包括:对主叫用户的电话号码进行鉴权,在鉴权不通过的情况下,终止呼叫;在鉴权通过的情况下,获取主叫用户的电话号码的历史呼叫行为数据。In an exemplary embodiment, obtaining the historical call behavior data of the calling user's phone number includes: authenticating the calling user's phone number, and terminating the call if the authentication fails; Next, obtain the historical call behavior data of the calling user's phone number.
在一个示例实施例中,对主叫用户的电话号码进行鉴权包括:判断主叫用户的电话号码是否属于白名单或者黑名单;如果主叫用户的电话号码在黑名单中或者未在白名单中,鉴权未通过;如果主叫用户的电话号码在白名单或者未在黑名单中,鉴权通过。In an exemplary embodiment, authenticating the calling user's phone number includes: judging whether the calling user's phone number belongs to a white list or a black list; if the calling user's phone number is in the black list or not in the white list , the authentication fails; if the phone number of the calling user is in the whitelist or not in the blacklist, the authentication passes.
在一个示例实施例中,主叫用户的电话号码的历史呼叫行为数据包括以下各项中的一项或多项:呼叫频率偏移值、主叫平均通话时长、被挂机占比。In an example embodiment, the historical call behavior data of the calling user's phone number includes one or more of the following items: call frequency offset value, caller's average call duration, and hang-up ratio.
在一个示例实施例中,根据历史呼叫行为数据判断主叫用户的电话号码是否为非正常用户包括:根据呼叫频率偏移值、主叫平均通话时长和被挂机占比获取呼叫频率偏移值、主叫平均通话时长和被挂机占比分别对应的特征值和权重值;对特征值和权重值进行加权求和以得到主叫用户的电话号码的非正常指数;将主叫用户的电话号码的非正常指数与被证实的非正常用户的非正常指数范围进行比较;当主叫用户的非正常指数在被证实的非正常用户的非正常指数范围内时,确定主叫用户为非正常用户。In an example embodiment, judging whether the calling user's phone number is an abnormal user according to the historical call behavior data includes: obtaining the call frequency offset value according to the call frequency offset value, the average call duration of the caller, and the proportion of hang-ups, The eigenvalues and weight values corresponding to the average call duration of the caller and the proportion of the hang-up respectively; the weighted summation of the eigenvalues and the weight values is used to obtain the abnormal index of the calling user's phone number; the calling user's phone number The abnormal index is compared with the abnormal index range of the confirmed abnormal user; when the abnormal index of the calling user is within the abnormal index range of the confirmed abnormal user, it is determined that the calling user is an abnormal user.
在一个示例实施例中,该方法还包括:接收用户在预定网站上填写的电话号码;获取所述用户对预定网站使用其电话号码的授权;生成用户的电话号码对应的临时号码,其中,临时号码用于在对用户呼叫时使用,以隐藏用户的电话号码。In an example embodiment, the method further includes: receiving the phone number filled in by the user on the predetermined website; obtaining authorization from the user to use the phone number on the predetermined website; generating a temporary number corresponding to the user's phone number, wherein the temporary Number is used when calling a user to hide the user's phone number.
在一个示例实施例中,该方法还包括:生成临时号码的生命值,其中,生命值用于指示临时号码的有效时间。In an example embodiment, the method further includes: generating a life value of the temporary number, wherein the life value is used to indicate a valid time of the temporary number.
在一个示例实施例中,该方法还包括:接收预定事件的触发,对生命值进行调整,其中,调整包括增加生命值或者减少生命值。In an exemplary embodiment, the method further includes: receiving a trigger of a predetermined event, and adjusting the life value, wherein the adjustment includes increasing the life value or decreasing the life value.
根据本发明实施例的另一个方面,还提供了一种呼叫处理系统,包括呼叫控制子系统,该呼叫控制子系统包括:第一获取单元,被配置为获取呼叫的主叫用户的电话号码;第二获取单元,被配置为获取主叫用户的电话号码的历史呼叫行为数据;判断单元,被配置为根据历史呼叫行为数据判断主叫用户是否为非正常用户;处理单元,被配置为在主叫用户为非正常用户的情况下,终止呼叫,在主叫用户为正常用户的情况下,继续呼叫。According to another aspect of the embodiments of the present invention, there is also provided a call processing system, including a call control subsystem, and the call control subsystem includes: a first obtaining unit configured to obtain the phone number of the calling party; The second acquiring unit is configured to acquire the historical call behavior data of the calling user's phone number; the judging unit is configured to judge whether the calling user is an abnormal user according to the historical calling behavior data; the processing unit is configured to When the calling user is an abnormal user, the call is terminated, and when the calling user is a normal user, the call is continued.
在一个示例实施例中,第二获取单元还被配置为:对主叫用户的电话号码进行鉴权;在鉴权不通过的情况下,终止呼叫;在鉴权通过的情况下,获取主叫用户的电话号码的历史呼叫行为数据。In an example embodiment, the second obtaining unit is further configured to: authenticate the phone number of the calling user; if the authentication fails, terminate the call; Historical call behavior data for a user's phone number.
在一个示例实施例中,第二获取单元还被配置为:判断主叫用户的电话号码是否属于白名单或者黑名单;如果主叫用户的电话号码在黑名单中或者未在白名单中,鉴权未通过;如果所述主叫用户的电话号码在白名单或者未在所述黑名单中,鉴权通过。In an example embodiment, the second obtaining unit is further configured to: determine whether the calling user's phone number belongs to the white list or black list; if the calling user's phone number is in the black list or not in the white list, identify If the calling user's phone number is in the white list or not in the black list, the authentication is passed.
在一个示例实施例中,主叫用户的电话号码的历史呼叫行为数据包括以下各项中的一项或多项:呼叫频率偏移值、主叫平均通话时长、被挂机占比。In an example embodiment, the historical call behavior data of the calling user's phone number includes one or more of the following items: call frequency offset value, caller's average call duration, and hang-up ratio.
在一个示例实施例中,判断单元还被配置为:根据呼叫频率偏移值、主叫平均通话时长和被挂机占比获取呼叫频率偏移值、主叫平均通话时长和/或被挂机占比分别对应的特征值和权重值;对特征值和权重值进行加权求和以得到所述主叫用户的电话号码的非正常指数;将主叫用户的电话号码的非正常指数与被证实的非正常用户的非正常指数范围进行比较;当主叫用户的非正常指数在被证实的非正常用户的非正常指数范围内时,确定主叫用户为非正常用户。In an example embodiment, the judging unit is further configured to: obtain the call frequency offset value, the average call duration of the calling party and/or the proportion of the called on-hook according to the calling frequency offset value, the average call duration of the caller and the proportion of the hung-up Corresponding feature value and weight value respectively; Carry out weighted summation to feature value and weight value to obtain the abnormal index of the phone number of the calling user; Combine the abnormal index of the phone number of the calling user with the confirmed abnormal The abnormal index range of the normal user is compared; when the abnormal index of the calling user is within the abnormal index range of the verified abnormal user, it is determined that the calling user is an abnormal user.
在一个示例实施例中,该装置还包括号码授权子系统,该号码授权子系统被配置为:接收用户在预定网站上填写的电话号码;获取用户对预定网站使用其电话号码的授权;生成用户的电话号码对应的临时号码,其中,临时号码用于在对用户呼叫时使用,以隐藏用户的电话号码。In an example embodiment, the device further includes a number authorization subsystem configured to: receive the phone number filled in by the user on the predetermined website; obtain the authorization of the user to use the phone number on the predetermined website; generate a user The temporary number corresponding to the phone number of , where the temporary number is used when calling the user to hide the user's phone number.
在一个示例实施例中,号码授权子系统还被配置为:生成临时号码的生命值,其中,生命值用于指示临时号码的有效时间。In an example embodiment, the number authorization subsystem is further configured to: generate a life value of the temporary number, wherein the life value is used to indicate the validity time of the temporary number.
在一个示例实施例中,号码授权子系统还被配置为:接收预定事件的触发,对所述生命值进行调整,其中,所述调整包括增加所述生命值或者减少所述生命值。In an exemplary embodiment, the number authorization subsystem is further configured to: receive a trigger of a predetermined event, and adjust the life value, wherein the adjustment includes increasing the life value or decreasing the life value.
在本发明实施例中,采用获取呼叫的主叫用户的电话号码;获取主叫用户的电话号码的历史呼叫行为数据;根据历史呼叫行为数据判断主叫用户的电话号码是否为非正常用户;在用户为非正常用户的情况下,终止呼叫,在用户为正常用户的情况下,继续呼叫。通过本发明实施例解决了无法起到事前防止对用户的骚扰的问题,能够及时阻断通话,防止电话骚扰。In the embodiment of the present invention, adopt the calling user's telephone number of acquisition call; Obtain the historical call behavior data of the calling user's telephone number; Judge whether the calling user's telephone number is an abnormal user according to the historical call behavior data; When the user is an abnormal user, the call is terminated, and when the user is a normal user, the call is continued. The embodiment of the present invention solves the problem that the harassment to the user cannot be prevented in advance, and the call can be blocked in time to prevent telephone harassment.
附图说明Description of drawings
通过阅读以下参照附图对非限制性实施例所作的详细描述,本发明的其它特征、目的和优点将会变得更明显,其中,相同或相似的附图标记表示相同或相似的特征。Other features, objects and advantages of the present invention will become more apparent by reading the following detailed description of non-limiting embodiments with reference to the accompanying drawings, wherein the same or similar reference numerals indicate the same or similar features.
图1是根据本发明实施例的一种呼叫处理方法的流程图;Fig. 1 is a flow chart of a call processing method according to an embodiment of the present invention;
图2是根据本发明可选实施例的呼叫处理系统的示意图;Figure 2 is a schematic diagram of a call processing system according to an alternative embodiment of the present invention;
图3是根据本发明实施例的呼叫控制话务流程示意图;FIG. 3 is a schematic diagram of a call control traffic flow according to an embodiment of the present invention;
图4是根据本发明实施例的呼叫控制子系统的操作流程图;Fig. 4 is the operation flowchart of the call control subsystem according to the embodiment of the present invention;
图5是根据本发明实施例的号码授权子系统的操作流程图;Fig. 5 is the operation flowchart of the number authorization subsystem according to the embodiment of the present invention;
图6是根据本发明实施例的用户对商户授信流程的流程示意图;FIG. 6 is a schematic flow diagram of a user-to-merchant credit process according to an embodiment of the present invention;
图7是根据本发明实施例的商户相关人员发起通话流程示意图;以及Fig. 7 is a schematic diagram of a call flow initiated by relevant personnel of a merchant according to an embodiment of the present invention; and
图8是根据本发明实施例的呼叫控制子系统的结构框图。Fig. 8 is a structural block diagram of a call control subsystem according to an embodiment of the present invention.
具体实施方式Detailed ways
下面将详细描述本发明的各个方面的特征和示例性实施例。在下面的详细描述中,提出了许多具体细节,以便提供对本发明的全面理解。但是,对于本领域技术人员来说很明显的是,本发明可以在不需要这些具体细节中的一些细节的情况下实施。下面对实施例的描述仅仅是为了通过示出本发明的示例来提供对本发明的更好的理解。本发明决不限于下面所提出的任何具体配置和算法,而是在不脱离本发明的精神的前提下覆盖了元素、部件和算法的任何修改、替换和改进。在附图和下面的描述中,没有示出公知的结构和技术,以便避免对本发明造成不必要的模糊。Features and exemplary embodiments of various aspects of the invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention. The present invention is by no means limited to any specific configurations and algorithms presented below, but covers any modification, substitution and improvement of elements, components and algorithms without departing from the spirit of the invention. In the drawings and the following description, well-known structures and techniques have not been shown in order to avoid unnecessarily obscuring the present invention.
在本发明一个实施例中提供了一种呼叫处理方法。图1是根据本发明实施例的呼叫处理方法的流程图,如图1所示,该流程包括如下步骤:步骤S102,获取呼叫的主叫用户的电话号码;步骤S104,获取主叫用户的电话号码的历史呼叫行为数据;步骤S106,根据历史呼叫行为数据判断主叫用户是否为非正常用户;步骤S108,在主叫用户为非正常用户的情况下,终止呼叫,在主叫用户为正常用户的情况下,继续呼叫。An embodiment of the present invention provides a call processing method. Fig. 1 is the flow chart of the call processing method according to the embodiment of the present invention, as shown in Fig. 1, this process comprises the following steps: step S102, obtain the telephone number of the calling party of calling; Step S104, obtain the telephone number of the calling party The historical call behavior data of the number; Step S106, judge whether the calling user is an abnormal user according to the historical calling behavior data; Step S108, when the calling user is an abnormal user, terminate the call; , continue calling.
通过上述步骤,根据主叫用户的历史行为进行了判断,从而更容易区分出非正常用户,如果是非正常用户则阻止其呼叫,从而解决了现有技术中无法起到事前防止对用户的骚扰的问题,能够及时阻断通话,更有效第防止电话骚扰。Through the above steps, the judgment is made according to the historical behavior of the calling user, so that it is easier to distinguish abnormal users, and if they are abnormal users, their calls are blocked, thus solving the problem that the prior art cannot prevent harassment to users in advance If there is a problem, it can block the call in time, and prevent phone harassment more effectively.
作为一个可选实施方式,为了更加安全,还可以对主叫号码增加一个鉴权的环节,即对主叫用户的电话号码进行鉴权,在鉴权不通过的情况下,终止呼叫;在鉴权通过的情况下,获取主叫用户的电话号码的历史呼叫行为数据。通过增加鉴权环节,可以更好的识别出非法的用户。As an optional implementation, in order to be more secure, an authentication link can also be added to the calling number, that is, the calling user's phone number is authenticated, and if the authentication fails, the call is terminated; If the authorization is passed, obtain the historical call behavior data of the calling user's phone number. By adding an authentication link, illegal users can be better identified.
鉴权的方式有很多种,例如,可以通过黑名单和白名单的方式进行。判断主叫用户的电话号码是否属于白名单或者黑名单;如果主叫用户的电话号码在黑名单中或者未在白名单中,鉴权未通过;如果主叫用户的电话号码在白名单或者未在黑名单中,鉴权通过。There are many ways of authentication, for example, blacklist and whitelist can be used. Determine whether the calling user's phone number belongs to the white list or black list; if the calling user's phone number is in the black list or not in the white list, the authentication fails; if the calling user's phone number is in the white list or not In the blacklist, the authentication passes.
作为一个可选实施方式,选择了比较能够说明主叫用户是否为非正常用户的三个指标:呼叫频率偏移值、主叫平均通话时长、被挂机占比。这三个指标中的每一个或者任意组合都可以用来判断用户是否为非正常用户。As an optional implementation, three indicators are selected to compare whether the calling user is an abnormal user: call frequency offset value, calling average call duration, and hang-up ratio. Each or any combination of these three indicators can be used to determine whether the user is an abnormal user.
下面以一个例子说明如何得到呼叫频率偏移值、被挂机占比等。The following uses an example to illustrate how to obtain the call frequency offset value, the proportion of hangups, etc.
作为一个可选实施方式,获取主叫用户的电话号码的呼叫频率偏移值包括:获取其他用户的平均呼叫频率,根据主叫电话号码的呼叫频率和平均呼叫频率得到呼叫频率偏移值;和/或,获取主叫用户的电话号码的被挂机占比包括:获取主叫号码的主叫通话次数、或者主叫号码的所有通话次数;获取主叫号码在主叫通话中被挂掉的次数;根据被挂掉的次数、主叫通话次数和所有通话次数获取被挂机占比。As an optional implementation manner, obtaining the calling frequency offset value of the calling user's phone number includes: acquiring the average calling frequency of other users, and obtaining the calling frequency offset value according to the calling frequency and the average calling frequency of the calling phone number; and /or, obtaining the hang-up ratio of the calling user's phone number includes: obtaining the number of calling calls of the calling number, or all calls of the calling number; obtaining the number of times the calling number was hung up during the calling call ; Obtain the proportion of hung up according to the number of times of being hung up, the number of calling calls and the number of all calls.
如果采用了多个指标,这可以使用加权和的方式来进行判断。If multiple indicators are used, this can be judged using a weighted sum.
例如,根据呼叫频率偏移值、主叫平均通话时长和/或被挂机占比获取呼叫频率偏移值、主叫平均通话时长和被挂机占比分别对应的特征值和权重值;对特征值和权重值进行加权求和以得到主叫用户的电话号码的非正常指数;将主叫用户的电话号码的非正常指数与被证实的非正常用户的非正常指数范围进行比较;当主叫用户的非正常指数在被证实的非正常用户的非正常指数范围内时,确定主叫用户为非正常用户。For example, according to the call frequency offset value, the caller's average call duration and/or the proportion of the called hangup, the corresponding feature value and weight value are obtained respectively; Carry out weighted summation with the weight value to obtain the abnormal index of the calling user's phone number; compare the abnormal index of the calling user's phone number with the abnormal index range of the confirmed abnormal user; when the calling user When the abnormal index of is within the abnormal index range of the verified abnormal user, it is determined that the calling user is an abnormal user.
作为一个可选实施方式,还可以从另一方面来保证用户的隐私。在该可选实施方式中,接收用户在预定网站上填写的电话号码;获取用户对预定网站使用其电话号码的授权;生成用户的电话号码对应的临时号码,其中,临时号码用于在对用户呼叫时使用,以隐藏用户的电话号码。通过该可选实施方式,可以设置虚拟号码,并记录与真实号码映射关系,达到隐私保护的目的。As an optional implementation manner, user privacy can also be guaranteed from another aspect. In this optional embodiment, the phone number filled in by the user on the predetermined website is received; the authorization of the user to use the phone number on the predetermined website is obtained; a temporary number corresponding to the user's phone number is generated, wherein the temporary number is used to Used when calling to hide the user's phone number. Through this optional implementation, a virtual number can be set, and the mapping relationship with the real number can be recorded, so as to achieve the purpose of privacy protection.
作为一个可选实施方式,还可以为该临时号码赋予生命值,该生命值用于指示临时号码的有效时间。更优的,该生命值还可以进行调整,例如,接收预定事件的触发,对生命值进行调整,其中,调整包括增加生命值或者减少生命值。As an optional implementation manner, a life value may also be assigned to the temporary number, and the life value is used to indicate the validity time of the temporary number. More preferably, the life value can also be adjusted, for example, the life value is adjusted upon receiving a trigger of a predetermined event, wherein the adjustment includes increasing or decreasing the life value.
下面结合一个可选实施例进行说明。在本可选实施例中,提供了一种呼叫处理系统和方法,从个人点对点通话呼叫业务及商户类电话流程两个方面保护用户隐私。其中,呼叫控制子系统针对个人用户点对点通信呼叫业务,通过多维特征值对用户号码进行实时鉴权,鉴权通过后,再判断是否白名单及是否正常用户,判断通过后予以放行;鉴权不通过表示疑似骚扰或诈骗电话,进行话务阻断,以达到防止电话骚扰目的;号码授权子系统针对网站商户类流程,将用户填写移动电话号码行为,转变为用户对此商户或网站的授信行为。将用户号码授权能力通过能力开放平台开放给外部商户,外部商户如需要联系用户时,通过该商户查询到用户临时通话号码,联系到用户,并且对临时号码进行生命值管控,从而达到防止电话号码泄露的目的。The following describes an optional embodiment. In this optional embodiment, a call processing system and method are provided to protect user privacy from two aspects of personal point-to-point call service and business call flow. Among them, the call control subsystem performs real-time authentication on the user number for the point-to-point communication call service of individual users through multi-dimensional characteristic values. Carry out traffic blocking by expressing suspected harassment or fraudulent calls to achieve the purpose of preventing phone harassment; the number authorization subsystem is aimed at the process of website merchants, and transforms the user's behavior of filling in the mobile phone number into the user's credit granting behavior for this merchant or website . Open the user number authorization capability to external merchants through the capability open platform. When external merchants need to contact users, they can query the user's temporary phone number through the merchant, contact the user, and control the life value of the temporary number, so as to prevent phone number purpose of disclosure.
图2是示出呼叫处理系统的示意图,主要对电话呼叫过程保护用户隐私。对于个人用户点对点通信呼叫业务,通过呼叫控制子系统防止电话骚扰;对于商户类电话流程,通过号码授权系统防止用户电话号码隐私泄露。FIG. 2 is a schematic diagram showing a call processing system, which mainly protects user privacy during a telephone call process. For the point-to-point communication call service of individual users, the call control subsystem is used to prevent phone harassment; for the business call process, the number authorization system is used to prevent the user's phone number from leaking.
呼叫控制子系统call control subsystem
由于电信领域业务支撑系统存放着更全面、更深度、更隐私的客户数据,因此针对此问题,本实施例在通信支撑系统中,建立呼叫控制子系统。如图3所示,当用户发起通话请求时,当用户发起主叫时,SSP(Service Switch Point,业务交换点)根据CSI(CAMELSubscription Information,CAMEL签约信息)向SCP(Service Control Point,业务控制点)触发智能流程,SCP向BOSS(Business Operation Supporting System,业务运营支撑系统)发起申请时长请求。BOSS在向SCP返回分片通话时长之前,增加呼叫判断环节,呼叫控制子系统与BOSS通过实时消息完成交互,BOSS向呼叫控制子系统发起呼叫判断请求,呼叫控制子系统对当前主叫号码进行鉴权,由呼叫控制子系统判断是否将此用户放通。呼叫控制子系统判断当前主叫用户状态是否正常,将鉴权结果返回给BOSS,BOSS再根据其返回结果来进行余额分配等后续呼叫流程。如判断此主叫用户为正常用户,则继续完成后续流程,如分片、振铃、计费等;如判断此主叫用户为非正常用户,则停止接续流程,被叫用户无感知,从而达到防骚扰的目的。Since the business support system in the telecommunications field stores more comprehensive, deeper, and more private customer data, this embodiment establishes a call control subsystem in the communication support system to address this problem. As shown in Figure 3, when the user initiates a call request, when the user initiates a call, SSP (Service Switch Point, service switching point) sends SCP (Service Control Point, service control point) according to CSI (CAMELSubscription Information, CAMEL subscription information) ) triggers the intelligent process, and the SCP initiates an application duration request to BOSS (Business Operation Supporting System, business operation support system). Before the BOSS returns the fragmented call duration to the SCP, the call judgment link is added. The call control subsystem and the BOSS complete the interaction through real-time messages. The BOSS initiates a call judgment request to the call control subsystem, and the call control subsystem authenticates the current calling number. The call control subsystem judges whether to let the user through. The call control subsystem judges whether the status of the current calling user is normal, and returns the authentication result to the BOSS, and the BOSS performs subsequent call procedures such as balance distribution according to the returned result. If it is judged that the calling user is a normal user, then continue to complete the follow-up process, such as fragmentation, ringing, billing, etc.; if it is judged that the calling user is an abnormal user, then stop the connection process, and the called user has no perception To achieve the purpose of anti-harassment.
其中,呼叫控制子系统通过多维特征值实时判断主叫用户状态是否正常,采用呼叫频率偏离值、主叫平均通话时长、被挂机占比三个特征值。Among them, the call control subsystem judges whether the status of the calling user is normal or not in real time through multi-dimensional feature values, using three feature values: the call frequency deviation value, the average call duration of the caller, and the proportion of hang-ups.
通过分析疑似骚扰或诈骗电话的话务分析统计结果,由于疑似骚扰电话需要发起多次通话,绝大多数疑似骚扰电话的呼叫频率较高,将用户主叫呼叫频率偏离值作为判断疑似骚扰电话的特征值之一;而且被叫用户对于此类电话的通话时间普遍较短及被叫用户往往主动挂掉电话,很多情况下是在接通后极短时间内挂断,将主叫平均通话时长和被挂机占比作为疑似诈骗或骚扰电话的特征值。By analyzing the statistical results of traffic analysis of suspected harassing or fraudulent calls, since the suspected harassing calls need to initiate multiple calls, most of the suspected harassing calls have a relatively high call frequency, and the deviation value of the user's calling frequency is used as the criterion for judging the suspected harassing calls One of the characteristic values; and the call time of the called user for this type of phone is generally short and the called user often hangs up the phone actively, in many cases it hangs up in a very short time after the call is connected, and the average call duration of the caller is and the proportion of hang-ups are used as the characteristic values of suspected fraudulent or harassing calls.
下面结合图4的呼叫控制子系统的操作流程图,详细说明呼叫控制鉴权流程。The call control authentication process will be described in detail below in conjunction with the operation flow chart of the call control subsystem shown in FIG. 4 .
步骤1,用户在通信网侧发起呼叫请求;Step 1, the user initiates a call request on the communication network side;
步骤2,请求信令通过呼叫控制子系统进行鉴权;Step 2, the request signaling is authenticated through the call control subsystem;
步骤3,判断主叫号码是否为白名单用户;Step 3, judging whether the calling number is a whitelist user;
步骤3-1,主叫号码为白名单用户,则建立通话,跳至步骤5;Step 3-1, if the calling number is a whitelist user, establish a call and skip to step 5;
步骤3-2,主叫号码非白名单用户,进行至步骤4;Step 3-2, the calling number is not a whitelist user, proceed to step 4;
步骤4,通过多维特征值判断号码是否为正常号码;Step 4, judge whether the number is a normal number through the multidimensional feature value;
本实施例结合业务支撑系统的用户数据,从呼叫频率偏离值、主叫平均通话时长、被挂机占比三个方面,构成三维特征值,利用这三维特征值实时判断主叫用户状态是否正常。In this embodiment, combined with the user data of the service support system, a three-dimensional characteristic value is formed from the three aspects of the call frequency deviation value, the average call duration of the caller, and the proportion of the hang-up, and the three-dimensional characteristic value is used to judge whether the calling user is in a normal state in real time.
其中,用户呼叫频率偏离值为:Among them, the user call frequency deviation value is:
其中num为此用户号码,t为本次呼叫时刻,Cf(num,t)为实时计算出此用户号码为主叫呼叫频率,呼叫频率可定义为单位时间呼叫次数,例如从初始时刻到t时刻记录该号码发起呼叫的次数,为统计抽样的n个用户在t时刻的平均呼叫频率,不同时间段Ca值可能变化较大,如春节期间平均通话频率会有所增加。呼叫时间和次数,可通过支撑系统现有数据获得。Among them, num is the user number, t is the time of this call, Cf(num,t) is the calling frequency calculated in real time for this user number, and the calling frequency can be defined as the number of calls per unit time, for example, from the initial time to t time Record the number of calls initiated by this number, It is the average call frequency of n users sampled statistically at time t, and the Ca value may vary greatly in different time periods, for example, the average call frequency will increase during the Spring Festival. The call time and times can be obtained through the existing data of the support system.
主叫平均通话时长表达式为:The expression of the caller's average call duration is:
其中Cavg(num,ti,tj)为电话num从ti时刻的呼叫到tj时刻呼叫平均主叫通话时长,CTO(num,t)表示某次在t时刻发起呼叫时,本次呼叫通话的时长。每次通话时长保存在通话云详单中,可统计后简单计算得到公式中使用数据。Among them, Cavg(num,t i ,t j ) is the average call duration of caller num from the call at time t i to the call at time t j of phone num, and CTO(num,t) indicates that when a call is initiated at time t, the call The duration of the call. The duration of each call is stored in the call cloud list, which can be simply calculated after statistics to obtain the data used in the formula.
被挂机占比值公式为:The formula for the proportion of being hung up is:
其中Ob(num,t)为电话num在t时间内的主叫通话次数,Gt(num,t)为电话num在t时间内总通话次数。被挂机通话标识及通话次数,保存在业务支撑系统通话云详单中。Among them, Ob(num, t) is the number of calling calls of phone num within t time, and Gt(num, t) is the total number of calls of phone num within t time. The call ID and number of calls that were hung up are saved in the call cloud list of the business support system.
根据三维特征值计算此主叫用户为疑似骚扰或诈骗电话指数为:According to the three-dimensional eigenvalues, the calling user is suspected of harassment or fraud call index as follows:
其中Eig(i)为不同特征值,Wei(i)为不同特征值所对应的权重值。对于已经证实为诈骗或骚扰电话的疑似骚扰或诈骗电话指数集合为U={u1,u2,…,um},对于任意的Among them, Eig(i) is different eigenvalues, and Wei(i) is the weight value corresponding to different eigenvalues. For the suspected harassing or fraudulent call index set that has been confirmed as fraudulent or harassing calls, U={u1,u2,...,um}, for any
S(n)∈[Min(Ui),Max(Uj)](1≤i≤m,1≤j≤m) (公式5)S(n)∈[Min(U i ),Max(U j )](1≤i≤m,1≤j≤m) (Formula 5)
即判断此电话为疑似骚扰或诈骗电话。That is, it is judged that the call is a suspected harassment or fraud call.
步骤4-1,判断用户号码非疑似骚扰或诈骗电话,进行至步骤5;Step 4-1, determine that the user number is not a suspected harassing or fraudulent call, and proceed to step 5;
步骤4-2,判断用户号码为疑似骚扰或诈骗电话,进行至步骤6;Step 4-2, determine that the user number is a suspected harassing or fraudulent call, and proceed to step 6;
步骤5,呼叫控制系统鉴权通过,进行后续建立通话流程,并更新鉴权系统中此号码相关数据;Step 5, the call control system passes the authentication, proceeds to establish a call process, and updates the relevant data of this number in the authentication system;
步骤6,呼叫控制系统鉴权不通过,终止主叫呼叫请求,记录行为日志。Step 6, the call control system fails the authentication, terminates the calling request, and records the behavior log.
号码授权子系统Number Authorization Subsystem
在一些场景下,手机号码作为能联系到用户的主要联系方式,被强制要求填写到某些商户或网站的订单或用户信息中(如淘宝订单中的用户电话号码作为收货通知的联系方式)。这就不可避免的将用户手机号码泄露给第三方商户,电信运营商无法对后续的用户隐私号码进行管控。针对此类问题,通过建立号码授权子系统,将用户填写电话号码行为,转变为用户对此商户或网站的授信行为。将用户号码授权能力通过能力开放平台开发给外部商户,外部商户如需要联系用户时,通过该商户查询到用户临时通话号码,联系到用户。在此流程中商户无法获取用户真实号码,即便骚扰或诈骗电话通过此种方式联系到用户,也可在号码授权子系统中查询日志找出该商户为号码泄露源头,从而达到防止电话号码泄露的目的。In some scenarios, the mobile phone number, as the main contact method to contact the user, is mandatory to fill in the order or user information of some merchants or websites (for example, the user's phone number in the Taobao order is used as the contact method for the delivery notification) . This inevitably leaks the user's mobile phone number to a third-party merchant, and the telecom operator cannot control the subsequent user's private number. In response to such problems, by establishing a number authorization subsystem, the user's behavior of filling in the phone number is transformed into the user's credit authorization behavior for this merchant or website. The user number authorization capability is developed to external merchants through the capability open platform. If an external merchant needs to contact a user, it can query the user's temporary phone number through the merchant and contact the user. In this process, the merchant cannot obtain the real number of the user. Even if the harassing or fraudulent calls contact the user in this way, the log can be checked in the number authorization subsystem to find out that the merchant is the source of the number leakage, so as to prevent the leakage of the phone number. Purpose.
图5是根据本发明实施例的号码授权子系统的操作流程图示。将参照图6和图7,结合用户对商户授信流程及商户相关人员发起通话流程进行详细说明。Fig. 5 is an illustration of the operation flow of the number authorization subsystem according to the embodiment of the present invention. Referring to Fig. 6 and Fig. 7, a detailed description will be given in conjunction with the user's credit granting process to the merchant and the process of initiating a call by relevant personnel of the merchant.
用户登录商户页面,在订单等环节需要对该商户通信授信;The user logs in to the merchant's page, and needs to grant credit to the merchant in order and other links;
商户系统调用运营商系统中号码授权子系统,完成该用户对该商户的通信授信,运营商号码授权子系统记录该授信;The merchant system calls the number authorization subsystem in the operator system to complete the user's communication credit to the merchant, and the operator number authorization subsystem records the credit;
用户通过商户系统调用号码授权子系统,例如用户登录淘宝在生成订单用户信息一步,需要用户对淘宝进行号码授权,则在此环节淘宝系统与运营商的号码授权子系统通过接口调用完成消息交互,完成授信。可以设想在订单页面,有一个按钮显示进行授权,点击后跳转到运营商系统授权页面,用户输入运营商的用户密码后进行授权验证(类似于跳转到支付宝支付的意思),然后页面回调淘宝订单页面,显示号码已授权。The user calls the number authorization subsystem through the merchant system. For example, when the user logs in to Taobao and generates order user information, the user needs to authorize the number of Taobao. In this link, the Taobao system and the number authorization subsystem of the operator complete the message interaction through interface calls. Complete credit. It can be imagined that on the order page, there is a button showing authorization, and after clicking it, it jumps to the operator system authorization page. After the user enters the operator's user password, authorization verification is performed (similar to the meaning of jumping to Alipay payment), and then the page is called back On the Taobao order page, it shows that the number has been authorized.
具体的,号码授权子系统包括授权中心、号码查询中心和号码生成调度容器;Specifically, the number authorization subsystem includes an authorization center, a number query center, and a number generation scheduling container;
商户系统通过服务调用方式,向运营商号码授权子系统中的号码查询中心发起查询请求;号码查询中心向授信中心发起授信查询,若授信中心返回授信成功,执行步骤下个步骤;若授信中心返回授信失败,向商户用户号码查询系统返回查询失败,结束;触发号码生成调度容器生成此次请求的用户临时号码,并同步给计费域及核心网域中,使计费及呼叫能够识别该号码,进行下个步骤;将此临时号码通过号码查询中心,返回给商户系统,通过此临时号码联系到该用户。The merchant system initiates a query request to the number query center in the operator's number authorization subsystem through the service call method; the number query center initiates a credit query to the credit center, and if the credit center returns credit successfully, proceed to the next step; if the credit center returns If the credit granting fails, the query failure is returned to the merchant user number query system, and the end; the number generation scheduling container is triggered to generate the temporary user number requested this time, and synchronized to the billing domain and the core network domain, so that billing and calling can identify the number , proceed to the next step; return the temporary number to the merchant system through the number inquiry center, and contact the user through the temporary number.
若授信成功,商户前台页面回调授信信息,继续完成订单;若授信失败,商户前台页面回调授信信息失败,商户无法获取用户通信信息。If the credit is granted successfully, the merchant’s front page will call back the credit information and continue to complete the order; if the credit fails, the merchant’s front page will fail to call back the credit information, and the merchant cannot obtain the user’s communication information.
在实际情况中,商户人员通过商户系统首次申请了该用户的临时号码后,在一些条件下需要再次联系用户,无需再次通过系统申请新临时号码,减少重复操作,降低系统负荷,提升使用感知。在号码生成调度容器中,对临时号码的生命周期进行管理,定义临时号码的生命值,由某些事件触发生命值变更,如随着时间生命值减少,或呼叫次数增加生命值降低。当生命值少于阈值时,临时号码失效。In actual situations, after the merchant personnel apply for the user's temporary number for the first time through the merchant system, they need to contact the user again under certain conditions. There is no need to apply for a new temporary number through the system again, which reduces repeated operations, reduces system load, and improves user experience. In the number generation scheduling container, the life cycle of the temporary number is managed, the life value of the temporary number is defined, and the change of the life value is triggered by certain events, such as the life value decreases with time, or the number of calls increases. When the life value is less than the threshold, the temporary number becomes invalid.
定义生命值的表达式为:The expression that defines the health value is:
其中CustId为商户在系统中编码,t表示临时号码生存时间,num为手机号码,Init函数表示初始生命值,函数Comp表示号码生成后x时间的第n个维度临时号码生命周期变化数值。Among them, CustId is the code of the merchant in the system, t represents the survival time of the temporary number, num is the mobile phone number, the Init function represents the initial life value, and the function Comp represents the life cycle change value of the nth dimension of the temporary number at x time after the number is generated.
当生命值少于阈值时,临时号码失效,无法发起通话请求,即:When the life value is less than the threshold, the temporary number becomes invalid and cannot initiate a call request, namely:
Pdi(CustId,t,num)<Threshold(CustId,num) (公式7)Pdi(CustId,t,num)<Threshold(CustId,num) (Formula 7)
通过上述实施例,从个人点对点通话呼叫业务及商户类电话流程两个方面保护用户隐私。其中,呼叫控制子系统针对个人用户点对点通信呼叫业务,通过多维特征值实时判断主叫用户状态是否正常,鉴权通过表示用户状态正常,予以放行,鉴权不同过表示疑似骚扰或诈骗电话,进行话务阻断。与现有技术相比可以事前预防,且被叫用户无感知,根本上实现了防止电话骚扰。号码授权子系统针对网站商户类流程,将用户填写移动电话号码行为,转变为用户对此商户或网站的授信行为。将用户号码授权能力通过能力开放平台开放给外部商户,外部商户如需要联系用户时,通过该商户查询到用户临时通话号码,联系到用户,并且对临时号码进行生命值管控,生命值少于阈值时,临时号码失效,无法发起通话请求,从而达到防止电话号码泄露的目的,且与现有用户熟知的呼叫流程相比变化甚微,无需牺牲用户体验、改变用户既有行为来起到保护隐私的效果。Through the above embodiments, user privacy is protected from two aspects: personal point-to-point call service and merchant call flow. Among them, the call control subsystem is aimed at the point-to-point communication call service of individual users, and judges in real time whether the status of the calling user is normal through the multi-dimensional characteristic value. If the authentication is passed, it means that the user is in a normal state, and the call is released. If the authentication is different, it means that the call is suspected of harassment or fraud. Traffic blocking. Compared with the existing technology, it can be prevented in advance, and the called user has no perception, and basically realizes the prevention of telephone harassment. The number authorization subsystem transforms the user's behavior of filling in the mobile phone number into the user's credit granting behavior for the merchant or website for the website merchant process. Open the user number authorization ability to external merchants through the capability open platform. If an external merchant needs to contact the user, it can query the user's temporary call number through the merchant, contact the user, and control the life value of the temporary number. The life value is less than the threshold When the temporary number becomes invalid, it is impossible to initiate a call request, thereby achieving the purpose of preventing the leakage of the phone number, and there is little change compared with the call flow familiar to existing users, without sacrificing user experience and changing the user's existing behavior to protect privacy Effect.
在本发明另一实施例中还提供了一种呼叫处理系统,该系统包括呼叫控制子系统。图8是根据本发明实施例的呼叫控制子系统的结构框图,如图8所示,包括:第一获取单元82,获取呼叫的主叫用户的电话号码;第二获取单元84,用于获取主叫用户的电话号码的历史呼叫行为数据;判断单元86,用于根据历史呼叫行为数据判断主叫用户的电话号码是否为非正常用户;处理单元88,用于在用户为非正常用户的情况下,终止呼叫,在用户为正常用户的情况下,继续呼叫。Another embodiment of the present invention also provides a call processing system, which includes a call control subsystem. Fig. 8 is a structural block diagram of a call control subsystem according to an embodiment of the present invention. As shown in Fig. 8, it includes: a first obtaining unit 82, which obtains the telephone number of the calling party of the call; a second obtaining unit 84, which is used to obtain The historical call behavior data of the phone number of the calling user; Judgment unit 86 is used to judge whether the phone number of the calling user is an abnormal user according to the historical call behavior data; Processing unit 88 is used for when the user is an abnormal user If the user is a normal user, the call is terminated and the call is continued.
上述单元也可以实现上述的可选的实施方式,在此不再赘述。在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。The above-mentioned units may also implement the above-mentioned optional implementation manners, which will not be repeated here. In the above-mentioned embodiments of the present invention, the descriptions of each embodiment have their own emphases, and for parts not described in detail in a certain embodiment, reference may be made to relevant descriptions of other embodiments.
本发明的另一实施例还提供了一种存储介质。该存储介质可以包括但是不限于:闪存盘、只读存储器(Read-Only Memory,ROM)、随机存取器(Random Access Memory,RAM)、磁盘或光盘。随着技术的发展出现的其他存储介也可以实现本实施例。Another embodiment of the present invention also provides a storage medium. The storage medium may include, but is not limited to: a flash disk, a read-only memory (Read-Only Memory, ROM), a random access device (Random Access Memory, RAM), a magnetic disk, or an optical disk. Other storage media appearing with the development of technology can also implement this embodiment.
本实施例中的存储介质保存有计算机程序或软件程序,该计算机程序或软件程序用于执行:获取呼叫的主叫用户的电话号码;获取主叫用户的电话号码的历史呼叫行为数据;根据历史呼叫行为数据判断主叫用户的电话号码是否为非正常用户;在主叫用户为非正常用户的情况下,终止呼叫,在主叫用户为正常用户的情况下,继续呼叫。作为一个可选的实施方式,该计算机程序或软件程序还可以用于执行上述实施例中的方法中的其它步骤和流程。The storage medium in this embodiment stores a computer program or a software program, and the computer program or software program is used to perform: obtaining the telephone number of the calling user; obtaining the historical call behavior data of the calling user's telephone number; The call behavior data judges whether the phone number of the calling user is an abnormal user; if the calling user is an abnormal user, the call is terminated, and if the calling user is a normal user, the call is continued. As an optional implementation manner, the computer program or software program may also be used to execute other steps and processes in the methods in the foregoing embodiments.
上述存储介质还可以保存上述计算机程序或软件程序执行过程中使用到的或者产生的数据。上述存储介质可以只起到保存的作用,而计算机程序或软件程序的执行可以由处理器来实现。上述的存储介质和处理器可以是基站设备中的,当然,随着技术的发展也可以至通信网络中的其他设备中的。可选地,在本实施例中,上述存储介质可以用于保存上述实施例所提供的方案所执行的程序代码。The above-mentioned storage medium may also store data used or generated during the execution of the above-mentioned computer program or software program. The above-mentioned storage medium may only play a role of storage, and the execution of the computer program or software program may be realized by a processor. The above-mentioned storage medium and processor may be in the base station equipment, and of course, with the development of technology, they may also be in other equipment in the communication network. Optionally, in this embodiment, the foregoing storage medium may be used to store program codes executed by the solutions provided in the foregoing embodiments.
以上所述的结构框图中所示的功能块可以实现为硬件、软件、固件或者它们的组合。当以硬件方式实现时,其可以例如是电子电路、专用集成电路(ASIC)、适当的固件、插件、功能卡等等。当以软件方式实现时,本发明的元素是被用于执行所需任务的程序或者代码段。程序或者代码段可以存储在机器可读介质中,或者通过载波中携带的数据信号在传输介质或者通信链路上传送。The functional blocks shown in the structural block diagrams described above may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an application specific integrated circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the invention are the programs or code segments employed to perform the required tasks. Programs or code segments can be stored in machine-readable media, or transmitted over transmission media or communication links by data signals carried in carrier waves.
本发明可以以其他的具体形式实现,而不脱离其精神和本质特征。例如,特定实施例中所描述的算法可以被修改,而系统体系结构并不脱离本发明的基本精神。因此,当前的实施例在所有方面都被看作是示例性的而非限定性的,本发明的范围由所附权利要求而非上述描述定义,并且,落入权利要求的含义和等同物的范围内的全部改变从而都被包括在本发明的范围之中。The present invention may be embodied in other specific forms without departing from its spirit and essential characteristics. For example, the algorithms described in certain embodiments may be modified without departing from the basic spirit of the invention in terms of system architecture. Therefore, the present embodiments are to be considered in all respects as illustrative rather than restrictive, the scope of the present invention is defined by the appended claims rather than the above description, and, within the meaning and equivalents of the claims, All changes in scope are thereby embraced within the scope of the invention.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611268523.XA CN108271158A (en) | 2016-12-31 | 2016-12-31 | Call processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611268523.XA CN108271158A (en) | 2016-12-31 | 2016-12-31 | Call processing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108271158A true CN108271158A (en) | 2018-07-10 |
Family
ID=62771235
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611268523.XA Pending CN108271158A (en) | 2016-12-31 | 2016-12-31 | Call processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108271158A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995925A (en) * | 2019-02-27 | 2019-07-09 | 努比亚技术有限公司 | A kind of harassing call recognition methods, terminal and computer readable storage medium |
CN110248322A (en) * | 2019-06-28 | 2019-09-17 | 国家计算机网络与信息安全管理中心 | A kind of swindling gang identifying system and recognition methods based on fraud text message |
WO2020135205A1 (en) * | 2018-12-25 | 2020-07-02 | 吴吉梅 | Method for preventing undesirable call |
CN111432078A (en) * | 2020-03-27 | 2020-07-17 | 中国—东盟信息港股份有限公司 | System for judging code number abnormity |
CN113656664A (en) * | 2021-09-01 | 2021-11-16 | 上海中通吉网络技术有限公司 | Express delivery call center abnormal incoming call detection method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159778A (en) * | 2007-09-10 | 2008-04-09 | 汤淼 | System for multimedia communication based on virtual number |
US20120220283A1 (en) * | 2009-10-31 | 2012-08-30 | Saied Tadayon | Method and System for Restoring and Status Communication of Multiple Mobile Device Functions |
CN103391348A (en) * | 2012-05-09 | 2013-11-13 | 北京千橡网景科技发展有限公司 | Crank call prevention method and device |
CN103986846A (en) * | 2014-05-16 | 2014-08-13 | 中国联合网络通信集团有限公司 | A method and system for protecting phone numbers of online shopping users |
CN104038648A (en) * | 2014-06-06 | 2014-09-10 | 陈伟 | Method and device for recognizing crank calls |
CN105721660A (en) * | 2016-02-03 | 2016-06-29 | 北京光年无限科技有限公司 | Harassment call identification method and system |
CN106255113A (en) * | 2015-06-10 | 2016-12-21 | 中兴通讯股份有限公司 | The recognition methods of harassing call and device |
-
2016
- 2016-12-31 CN CN201611268523.XA patent/CN108271158A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159778A (en) * | 2007-09-10 | 2008-04-09 | 汤淼 | System for multimedia communication based on virtual number |
US20120220283A1 (en) * | 2009-10-31 | 2012-08-30 | Saied Tadayon | Method and System for Restoring and Status Communication of Multiple Mobile Device Functions |
CN103391348A (en) * | 2012-05-09 | 2013-11-13 | 北京千橡网景科技发展有限公司 | Crank call prevention method and device |
CN103986846A (en) * | 2014-05-16 | 2014-08-13 | 中国联合网络通信集团有限公司 | A method and system for protecting phone numbers of online shopping users |
CN104038648A (en) * | 2014-06-06 | 2014-09-10 | 陈伟 | Method and device for recognizing crank calls |
CN106255113A (en) * | 2015-06-10 | 2016-12-21 | 中兴通讯股份有限公司 | The recognition methods of harassing call and device |
CN105721660A (en) * | 2016-02-03 | 2016-06-29 | 北京光年无限科技有限公司 | Harassment call identification method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020135205A1 (en) * | 2018-12-25 | 2020-07-02 | 吴吉梅 | Method for preventing undesirable call |
CN109995925A (en) * | 2019-02-27 | 2019-07-09 | 努比亚技术有限公司 | A kind of harassing call recognition methods, terminal and computer readable storage medium |
CN110248322A (en) * | 2019-06-28 | 2019-09-17 | 国家计算机网络与信息安全管理中心 | A kind of swindling gang identifying system and recognition methods based on fraud text message |
CN110248322B (en) * | 2019-06-28 | 2021-10-22 | 国家计算机网络与信息安全管理中心 | Fraud group partner identification system and identification method based on fraud short messages |
CN111432078A (en) * | 2020-03-27 | 2020-07-17 | 中国—东盟信息港股份有限公司 | System for judging code number abnormity |
CN111432078B (en) * | 2020-03-27 | 2021-09-10 | 中国—东盟信息港股份有限公司 | System for judging code number abnormity |
CN113656664A (en) * | 2021-09-01 | 2021-11-16 | 上海中通吉网络技术有限公司 | Express delivery call center abnormal incoming call detection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1102016C (en) | Preventing misure of copied subscriber identity in mobile communication system | |
CN108271158A (en) | Call processing method and system | |
CN104184705B (en) | Verification method, device, server, subscriber data center and system | |
CN1921390B (en) | User identification identifying method and system | |
CN101521886B (en) | Method and device for authenticating terminal and telecommunication smart card | |
US20120054847A1 (en) | End point context and trust level determination | |
CN101511083B (en) | Authentication method and terminal for telecom smart card | |
CN103813314A (en) | Soft SIM card enabling method and network access method, terminal, and network access device | |
CN101711029A (en) | Method and equipment for certifying access of terminal, and method for restoring equipment validity | |
CN103096316A (en) | Terminal, network side equipment system and method for authenticating user identification card | |
CN103686651A (en) | Emergency call based authentication method, device and system | |
CN105429943B (en) | Information processing method and terminal thereof | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN103124252B (en) | Client application access authentication treating method and apparatus | |
US7650139B2 (en) | Method for ensuring security of subscriber card | |
CN101854357B (en) | Method and system for monitoring network authentication | |
CN108235310A (en) | Method, server and the system of identification camouflage telephone number | |
US20140236824A1 (en) | Method to detect and control unwanted outgoing payment services usage in smart devices | |
CN1599492A (en) | Method for sharing mobile terminal by multi-user | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN110602699A (en) | Password resetting method and device and server | |
CN112351048B (en) | Interface access control method, device, equipment and storage medium | |
CN109995733B (en) | Capability service opening method, device, system, equipment and medium | |
CN112004228B (en) | Real person authentication method and system | |
CN102036246B (en) | Call historical count (abbreviated as count) updating method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180710 |
|
RJ01 | Rejection of invention patent application after publication |