CN104735272B - The hold-up interception method and system of a kind of harassing call - Google Patents
The hold-up interception method and system of a kind of harassing call Download PDFInfo
- Publication number
- CN104735272B CN104735272B CN201310722846.1A CN201310722846A CN104735272B CN 104735272 B CN104735272 B CN 104735272B CN 201310722846 A CN201310722846 A CN 201310722846A CN 104735272 B CN104735272 B CN 104735272B
- Authority
- CN
- China
- Prior art keywords
- harassing
- clawback
- doubtful
- wrecking
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a kind of hold-up interception method of harassing call, methods described includes:When obtaining CDR file, analyze the Subscriber Number in the CDR file, determine the Subscriber Number not in the white list pre-set, and determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server;The limitation instruction includes the harassing and wrecking number.The embodiment of the present invention also discloses a kind of intercepting system of harassing call simultaneously.Using the technical scheme of the embodiment of the present invention, the intercepting efficiency of harassing call is improved, the experience of user, and the effective secondary operation for preventing the networking telephone is improved, avoids the loss brought due to the secondary operation of the networking telephone to user.
Description
Technical field
The present invention relates to the communication technology, and in particular to the hold-up interception method and system of a kind of harassing call.
Background technology
At this stage, the hold-up interception method for harassing call is typically all to be sealed by screening system, manual confirmation, artificial intercept
Lock and the process manually lifted a blockade, are artificially to participate in more simple poorly efficient scheme.It is a kind of automatic there is presently no proposing
The effective solution for identifying, automatically confirming that and intercepting automatically.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of hold-up interception method of harassing call and is
System, can realize automatic identification, automatically confirms that and intercept function automatically.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of hold-up interception method of harassing call, methods described includes:
CDR file is obtained, the Subscriber Number in the CDR file is analyzed, determines that the Subscriber Number is not set in advance
In the white list put, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;
Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;
Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server;
The limitation instruction includes the harassing and wrecking number.
In such scheme, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are big
In the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value.
It is described that the doubtful number is determined as harassing and wrecking number according to clawback result in such scheme, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by communication process carry out record generation voice document with it is default
Voice document matching in sound bank, doubtful number corresponding to the voice document that the match is successful is defined as to harass number;
When the clawback result is has ring-back tone but when being not switched on, periodically carries out clawback to the doubtful number,
When clawback number reaches four predetermined threshold values, determine the doubtful number for harassing and wrecking number.
In such scheme, methods described also includes:
The instruction response results that application server returns are received, when the instruction response results run succeeded for instruction,
The harassing and wrecking number is sent to business support system, prompting letter is sent from the business support system to the harassing and wrecking number
Breath.
In such scheme, the business limitation that the limitation instruction also includes the harassing and wrecking number recovers the time limit.
In such scheme, the acquisition ticket, including:The application service is logged according to default application server address
Device, CDR file is obtained from the application server.
The embodiment of the present invention additionally provides a kind of intercepting system of harassing call, and the system includes:Bill record collection unit,
Ticket analytic unit, reverse testing unit and instruction Transmit-Receive Unit;Wherein,
The bill record collection unit, for gathering CDR file;
The ticket analytic unit, for reading the CDR file in the bill record collection unit, analyze the ticket text
Subscriber Number in part, the Subscriber Number is determined not in the white list pre-set, and determine that the Subscriber Number meets
During preparatory condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reversely testing unit;
The reversely testing unit, for doubtful number to be carried out into reverse clawback, is determined described doubtful according to clawback result
Number is harassing and wrecking number;
The instruction Transmit-Receive Unit, for sending limitation instruction to application server, by the application server to described
Harass number and carry out business limitation;The limitation instruction includes the harassing and wrecking number.
In such scheme, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are big
In the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value.
In such scheme, the reversely testing unit, for being that clawback is obstructed or clawback is directly disconnected when the clawback result
During line, determine the doubtful number for harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on, periodically
Clawback is carried out to the doubtful number, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number
Code.
In such scheme, the system also includes Speech comparison unit;
The reversely testing unit, is additionally operable to, when the clawback result is normal ON, to record communication process
The voice document of sound generation is sent to the Speech comparison unit;
The Speech comparison file, for by the voice document and default sound bank that testing unit is sent described reversely
Voice document matching, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
In such scheme, the system also includes information notification unit;
The instruction Transmit-Receive Unit, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit, the instruction response results for being received when the instruction Transmit-Receive Unit perform for instruction
During success, the harassing and wrecking number is sent to business support system, sent from the business support system to the harassing and wrecking number
Prompt message.
In such scheme, the bill record collection unit, for logging in the application according to default application server address
Server, CDR file is obtained from the application server.
Technical scheme provided in an embodiment of the present invention, harassing and wrecking number is confirmed by system preliminary screening, secondary system, and it is right
Harassing and wrecking number is intercepted, and is realized the automatic identification to harassing call, is automatically confirmed that and intercept automatically, is avoided artificial true
The process recognize, manually intercepted, saves human cost, improves the intercepting efficiency of harassing call, improves the experience of user, and
The effective secondary operation for preventing the networking telephone, avoids the loss brought due to the secondary operation of the networking telephone to user.
Brief description of the drawings
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention;
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention.
Embodiment
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention, as shown in figure 1, under normal circumstances, commonly
Terminal user 11 accesses to IMS network by access device 12;And the network architecture of harassing call is produced, generally in access side net
Proxy server 13 is set up in network, the proxy server 13 is by being connected directly to IP multimedia systems(IMS, IP
Multimedia Subsystem)Network passes through integrated access equipment(IAD, Integrated Access Device)/ use
Family interchanger(PBX, Private Branch Exchange)IMS network is connected to Deng access device 12, downwards as personal meter
Calculation machine(PC, Personal Computer)The server of network telephone terminal 14 or cell phone network telephone terminal 15;In the generation
Manage and a number resource pond is equipped with server 13, when having endpoint registration to the proxy server 13 and having traffic demand,
The proxy server 13 is that call is randomly assigned a vacant number resource to user every time.Network telephone service supplier passes through
Corresponding charging policy is set, charging is carried out for per call, to seek exorbitant profit, claims the phenomenon in the embodiment of the present invention
For the secondary operation of IMS network phone.There is following feature by the networking telephone of secondary operation:Caller call frequency is especially high,
The incoming call frequency is especially low, the caller air time is especially long, the incoming call time is especially short, reverse clawback is abnormal etc..
Therefore, as long as can recognize that the Subscriber Number for meeting features described above, the user that the Subscriber Number is harassing call can be determined
Number, further send instructions down and close the call function of the Subscriber Number to business platform, realize shielding harassing call
Function.
Below in conjunction with the accompanying drawings and specific embodiment the present invention is further detailed explanation.
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention, as shown in Fig. 2 including following
Step:
Step 201:Obtain CDR file.
Here, the present embodiment can according to the address registration of the application server pre-set application server,
CDR file is downloaded from the application server;Specifically, FTP can be passed through(FTP, File Transfer
Protocol)Downloading mode obtains CDR file from application server.
Preferably, the acquisition CDR file can pre-set time interval, such as 5 seconds, be obtained by the time interval
Ticket, and the ticket of acquisition is stored in assigned catalogue.
Wherein, the CDR file includes Subscriber Number, air time, the duration of call, caller and the information such as called.
Step 202:The Subscriber Number in the CDR file is analyzed, determines that the Subscriber Number is white not what is pre-set
In list, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number.
Specifically, the ticket of acquisition can be read in real time, judge what whether the Subscriber Number in the ticket was set in pre-selection
In white list, the Subscriber Number in the white list is defined as the Subscriber Number of validated user;When the result judged is is, directly
Connect next ticket of analysis;When the result judged as it is no when, judge whether the Subscriber Number meets preparatory condition, when judgement
As a result for when being, it is doubtful number to determine the Subscriber Number.
Here, according to the feature of the networking telephone of secondary operation, including:Caller call frequency is especially high, incoming call frequency
Secondary especially low, caller air time especially length, incoming call time, especially short etc. feature set preparatory condition.The preparatory condition
Including:In preset period of time, the caller talk times of the Subscriber Number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value.
Wherein, the logical relation between the preparatory condition can flexible configuration according to the actual requirements.
For example, according to Subscriber Number in T(T>0)Caused ticket is counted in it.It is if some within the period
The caller number of Subscriber Number more than N, and(Or)Call total duration in the period more than K, and called number with
The ratio of caller number is less than M, then it is doubtful number to judge the Subscriber Number.
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention, as shown in figure 3, including following
Step:
Step 301:Take successively(T, t+T)、(T+P, t+P+T)...(T+nP, t+nP+T)The ticket of period.
In the present embodiment, T represents to obtain the ticket per in T time section;The time interval that P represents to obtain ticket every time is P;
N represents to obtain the number of ticket.
Step 302:Respectively to institute's number calling time in every T time section in addition to the Subscriber Number in default list
Number, call duration are counted;
Step 303:Judge whether caller number is more than N;Or whether caller number is more than N and/or caller total duration and is
It is no to be more than K, when the result judged is is, continue executing with step 304;Otherwise, flow is terminated.
Step 304:Judge whether the ratio of called number and caller number is more than M when the result judged is is, perform
Step 305;Otherwise, flow is terminated.
Step 305:It is doubtful number to mark the Subscriber Number.
In the present embodiment, the deterministic process of the caller number and caller total duration and between logical relation can be according to reality
Border situation flexible configuration.
Step 203:Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result
Code.
Here, it is described that the doubtful number is determined as harassing and wrecking number according to clawback result, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number;
Here, the clawback is obstructed or clawback directly broken string can be presented without ring-back tone or directly disconnected without color bell sound or clawback
The scenes such as line;
When the clawback result is has ring-back tone but when being not switched on, periodically carries out clawback to the doubtful number,
When clawback number reaches four predetermined threshold values, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by communication process carry out record generation voice document with it is default
Voice document matching in sound bank, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
Here, the abnormal speech file having confirmed that is stored with the sound bank, the voice for generation that communication process is recorded
File is matched with the voice document in the sound bank, and institute's voice file and institute's predicate are determined by matching conversational nature information
The match is successful for voice document in sound storehouse, and matching process described here is prior art, and here is omitted.
Step 204:Limitation instruction is sent to application server, industry is entered to the harassing and wrecking number by the application server
Business limitation;The limitation instruction includes the harassing and wrecking number.
In the present embodiment, the harassing and wrecking number got is sent to application server by limiting instruction, by the application
Server carries out business limitation to the harassing and wrecking number or adds blacklist processing;The business limitation can be call business
Limitation etc.;Wherein, when the limitation instruction also includes the business limitation of the harassing and wrecking number and recovers time limit or blacklist and release
Limit, so as to realize that system automatically terminates the block to the harassing and wrecking number, manual type releasing is avoided passing through, improves work
Make efficiency.
Here, after sending limitation instruction to application server, the instruction response results that application server returns is received, work as institute
Instruction response results are stated when being run succeeded for instruction, the harassing and wrecking number are sent to business support system, by the business branch
Support system sends prompt message to the harassing and wrecking number, to remind the business of the user of the harassing and wrecking number number to be limited
System, makes Consumer's Experience more hommization;
When the instruction response results perform failure for instruction, corresponding daily record is recorded.
Wherein, if certain doubtful number is repeatedly judged to harassing number, the business for harassing number limits initial
Time judges the time for last time.
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention, as shown in figure 4, described
System includes:Bill record collection unit 41, ticket analytic unit 42, reverse testing unit 43 and instruction Transmit-Receive Unit 45;Wherein,
The bill record collection unit 41, for gathering CDR file;
The ticket analytic unit 42, for reading the CDR file in the bill record collection unit 41, analyze the words
Subscriber Number in monofile, the Subscriber Number is determined not in the white list pre-set, and determine the Subscriber Number
When meeting preparatory condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reverse testing
Unit 43;
The reversely testing unit 43, for doubtful number to be carried out into reverse clawback, described doubt is determined according to clawback result
It is harassing and wrecking number like number;
The instruction Transmit-Receive Unit 45, for sending limitation instruction to application server, by the application server to institute
State harassing and wrecking number and carry out business limitation;The limitation instruction includes the harassing and wrecking number.
Wherein, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are more than first
Predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed
It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd
If threshold value.
Preferably, the reversely testing unit 43, for being that clawback is obstructed or clawback directly breaks when the clawback result
When, determine the doubtful number for harassing and wrecking number;It is periodically right when the clawback result to have ring-back tone but when being not switched on
The doubtful number carries out clawback, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number.
Preferably, the system also includes Speech comparison unit 44;
The reversely testing unit 43, is additionally operable to, when the clawback result is normal ON, to carry out communication process
The voice document of recording generation is sent to the Speech comparison unit 44;
The Speech comparison file 44, for the voice document for sending the reverse testing unit 43 and default voice
Voice document matching in storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
Preferably, the system also includes information notification unit 46;
The instruction Transmit-Receive Unit 45, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit 46, the instruction response results for being received when the instruction Transmit-Receive Unit 45 are instruction
When running succeeded, the harassing and wrecking number is sent to business support system, from the business support system to the harassing and wrecking number
Send prompt message.
Preferably, the bill record collection unit 41, taken for logging in the application according to default application server address
Business device, ticket is obtained from the application server.
Specifically, bill record collection unit 41 can log in the application server according to default application server address, from
Ticket is obtained in the application server;Ticket analytic unit 42 reads the ticket in the bill record collection unit 41, judges institute
The Subscriber Number in ticket is stated whether in the white list that pre-selection is set, the Subscriber Number in the white list is defined as legal use
The Subscriber Number at family;When the result judged is is, next ticket of Direct Analysis;When the result judged as it is no when, judge institute
State whether Subscriber Number meets preparatory condition, when the result judged is is, it is doubtful number to determine the Subscriber Number, by institute
Doubtful number is stated to send to the reversely testing unit 43;
Doubtful number is carried out reverse clawback by the reversely testing unit 43, when the clawback result is that clawback is obstructed or return
When dialling directly broken string, determine the doubtful number for harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on,
Clawback periodically is carried out to the doubtful number, when clawback number reaches four predetermined threshold values, determines the doubtful number
To harass number, the harassing and wrecking number is sent to instruction Transmit-Receive Unit 45;
When the clawback result is normal ON, the voice document that recording generation is carried out to communication process is delivered to described
Speech comparison unit 44, the voice document and default language that the Speech comparison file 44 sends the reverse testing unit 43
Voice document matching in sound storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number, will described in
Harassing and wrecking number is sent to instruction Transmit-Receive Unit 45;
The harassing and wrecking number is sent to application server by instruction Transmit-Receive Unit 45 by limiting instruction, is taken by the application
Device be engaged in the harassing and wrecking number progress business limitation;When the response results that the application server return instruction runs succeeded,
The harassing and wrecking number is sent to information notification unit 46, sent the harassing and wrecking number to industry by described information notification unit 46
Business support system, prompt message is sent from the business support system to the harassing and wrecking number.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware
Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage
Medium(Including but not limited to magnetic disk storage and optical memory etc.)The form of the computer program product of upper implementation.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (8)
1. a kind of hold-up interception method of harassing call, it is characterised in that methods described includes:
CDR file is obtained, analyzes the Subscriber Number in the CDR file, determines that the Subscriber Number is not being pre-set
In white list, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;
Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;
Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server;It is described
Limitation instruction includes the harassing and wrecking number;The business limitation that the limitation instruction also includes the harassing and wrecking number recovers the time limit;
Wherein, it is described that the doubtful number is determined as harassing and wrecking number according to clawback result, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by the voice document that recording generation is carried out to communication process and default voice
Voice document matching in storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number;
When the clawback result is has ring-back tone but when being not switched on, periodically carry out clawback to the doubtful number, when returning
Number is dialled when reaching four predetermined threshold values, determines the doubtful number for harassing and wrecking number.
2. according to the method for claim 1, it is characterised in that the preparatory condition includes:In preset period of time, the use
The caller talk times of family number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and the caller duration of call of the Subscriber Number is big
In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold
Value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value or the caller duration of call of the Subscriber Number is big
In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold
Value.
3. according to the method for claim 1, it is characterised in that methods described also includes:
The instruction response results that application server returns are received, when the instruction response results run succeeded for instruction, by institute
State harassing and wrecking number to send to business support system, prompt message is sent from the business support system to the harassing and wrecking number.
4. according to the method for claim 1, it is characterised in that the acquisition ticket, including:According to default application service
Application server described in device address registration, CDR file is obtained from the application server.
5. a kind of intercepting system of harassing call, it is characterised in that the system includes:Bill record collection unit, ticket analysis are single
First, reverse testing unit and instruction Transmit-Receive Unit;Wherein,
The bill record collection unit, for gathering CDR file;
The ticket analytic unit, for reading the CDR file in the bill record collection unit, analyze in the CDR file
Subscriber Number, determine the Subscriber Number not in the white list pre-set, and it is default to determine that the Subscriber Number meets
During condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reversely testing unit;
The reversely testing unit, for doubtful number to be carried out into reverse clawback, the doubtful number is determined according to clawback result
To harass number;
The instruction Transmit-Receive Unit, for sending limitation instruction to application server, by the application server to the harassing and wrecking
Number carries out business limitation;The limitation instruction includes the harassing and wrecking number;The limitation instruction also includes the harassing and wrecking number
Business limitation recover the time limit;
Wherein, the reversely testing unit, it is additionally operable to when the clawback result is that clawback is obstructed or clawback directly breaks, it is determined that
The doubtful number is harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on, periodically doubted to described
Clawback is carried out like number, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number;
The system also includes Speech comparison unit;
The reversely testing unit, is additionally operable to that, when the clawback result is normal ON, recording life will be carried out to communication process
Into voice document send to the Speech comparison unit;
The Speech comparison file, for the voice document for sending the reverse testing unit and the language in default sound bank
Sound file is matched, and doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
6. system according to claim 5, it is characterised in that the preparatory condition includes:In preset period of time, the use
The caller talk times of family number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and the caller duration of call of the Subscriber Number is big
In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold
Value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value or the caller duration of call of the Subscriber Number is big
In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold
Value.
7. system according to claim 5, it is characterised in that the system also includes information notification unit;
The instruction Transmit-Receive Unit, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit, the instruction response results for being received when the instruction Transmit-Receive Unit run succeeded for instruction
When, the harassing and wrecking number is sent to business support system, prompting is sent from the business support system to the harassing and wrecking number
Information.
8. system according to claim 5, it is characterised in that the bill record collection unit, for according to default application
Server address logs in the application server, and CDR file is obtained from the application server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310722846.1A CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310722846.1A CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104735272A CN104735272A (en) | 2015-06-24 |
CN104735272B true CN104735272B (en) | 2018-03-23 |
Family
ID=53458694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310722846.1A Active CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104735272B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017147804A1 (en) * | 2016-03-02 | 2017-09-08 | 吴伟东 | Cellphone application communication blocking method and system |
CN109698885B (en) * | 2017-10-20 | 2021-03-16 | ***通信集团公司 | Call request processing method and device, network side server and computer storage medium |
CN109995707B (en) * | 2017-12-29 | 2021-11-02 | ***通信集团陕西有限公司 | Method and device for preventing harassment and DDOS (distributed denial of service) attack of high-definition voice |
CN109996237A (en) * | 2018-01-02 | 2019-07-09 | 中兴通讯股份有限公司 | The method and device of harassing call is found in a kind of VoLTE network |
CN108366173A (en) * | 2018-01-05 | 2018-08-03 | 腾讯科技(深圳)有限公司 | A kind of phone recognition methods, relevant device and system |
CN109195168A (en) * | 2018-11-06 | 2019-01-11 | 中国联合网络通信集团有限公司 | A kind of voice intercepting processing method and system |
CN109639913A (en) * | 2019-01-03 | 2019-04-16 | 中国联合网络通信集团有限公司 | A kind of automatic speech harassing and wrecking number processing method, apparatus and system |
CN110445944B (en) * | 2019-08-19 | 2020-11-24 | 携程旅游信息技术(上海)有限公司 | Method and system for preventing telephone disturbance of call center |
CN115580680A (en) * | 2021-06-21 | 2023-01-06 | ***通信集团重庆有限公司 | Call restriction method, device, system, electronic equipment and storage medium |
CN114710590A (en) * | 2022-03-28 | 2022-07-05 | 恒安嘉新(北京)科技股份公司 | Crank call detection method, device, equipment and medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132438A (en) * | 2007-03-20 | 2008-02-27 | ***通信集团江苏有限公司 | Method for screen selecting and catching vicious disturbing calls |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011119953A (en) * | 2009-12-03 | 2011-06-16 | Hitachi Ltd | Speech recording system using function of call control and speech recording |
CN202231767U (en) * | 2011-01-26 | 2012-05-23 | 北京炎强通信技术有限公司 | Harassing call identifying system |
-
2013
- 2013-12-24 CN CN201310722846.1A patent/CN104735272B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132438A (en) * | 2007-03-20 | 2008-02-27 | ***通信集团江苏有限公司 | Method for screen selecting and catching vicious disturbing calls |
Also Published As
Publication number | Publication date |
---|---|
CN104735272A (en) | 2015-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104735272B (en) | The hold-up interception method and system of a kind of harassing call | |
CN103095889B (en) | Junk call intercepting system based on talk mode identification and operating method thereof | |
CN103701999B (en) | The monitoring method of call center's voice call and system | |
JP4921043B2 (en) | Method and apparatus for interrupting exchange connection of unwanted telephone calls | |
US10423958B2 (en) | Method, apparatus and system for voice verification | |
CN109698885B (en) | Call request processing method and device, network side server and computer storage medium | |
CN104936182B (en) | A kind of method and system of intelligence management and control fraudulent call | |
CN106789851A (en) | Auth method, system, service server and authentication server | |
CN104159229B (en) | Incoming call processing method and device | |
CN102892117A (en) | Method and system for monitoring crank call | |
CN105871789A (en) | Control method of intelligent package delivery box, server and system | |
CN109413362A (en) | A kind of call voice access video-meeting method and device | |
CN106936997B (en) | A kind of rubbish voice recognition methods and system based on social networks map | |
CN111654582A (en) | Intelligent outbound method and device | |
CN104023323B (en) | The method and device that client binding terminal is called | |
US10701205B2 (en) | Communications network | |
CN109995707A (en) | A kind of high definition voice is anti-harassment and DDOS attack method and device | |
CN104580649B (en) | A kind of method and system for auditing automatic speech service content | |
CN108737665A (en) | A kind of implementation method and device that incoming call is anti-harassment | |
CN107104979A (en) | A kind of voice clawback verifies the method and system of business | |
CN107872588A (en) | Call processing method, relevant apparatus and system | |
CN104202463A (en) | Call filter method and intelligent terminal | |
CN112004228B (en) | Real person authentication method and system | |
CN111064850A (en) | System and method for realizing prevention, control and reminding of crank calls based on communication network | |
CN103595885B (en) | Domestic affection phone system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |