CN104735272B - The hold-up interception method and system of a kind of harassing call - Google Patents

The hold-up interception method and system of a kind of harassing call Download PDF

Info

Publication number
CN104735272B
CN104735272B CN201310722846.1A CN201310722846A CN104735272B CN 104735272 B CN104735272 B CN 104735272B CN 201310722846 A CN201310722846 A CN 201310722846A CN 104735272 B CN104735272 B CN 104735272B
Authority
CN
China
Prior art keywords
harassing
clawback
doubtful
wrecking
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310722846.1A
Other languages
Chinese (zh)
Other versions
CN104735272A (en
Inventor
任中岗
夏玉溪
周松
王捷
柳剑峰
郭光健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Guizhou Co Ltd
Original Assignee
China Mobile Group Guizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Guizhou Co Ltd filed Critical China Mobile Group Guizhou Co Ltd
Priority to CN201310722846.1A priority Critical patent/CN104735272B/en
Publication of CN104735272A publication Critical patent/CN104735272A/en
Application granted granted Critical
Publication of CN104735272B publication Critical patent/CN104735272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a kind of hold-up interception method of harassing call, methods described includes:When obtaining CDR file, analyze the Subscriber Number in the CDR file, determine the Subscriber Number not in the white list pre-set, and determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server;The limitation instruction includes the harassing and wrecking number.The embodiment of the present invention also discloses a kind of intercepting system of harassing call simultaneously.Using the technical scheme of the embodiment of the present invention, the intercepting efficiency of harassing call is improved, the experience of user, and the effective secondary operation for preventing the networking telephone is improved, avoids the loss brought due to the secondary operation of the networking telephone to user.

Description

The hold-up interception method and system of a kind of harassing call
Technical field
The present invention relates to the communication technology, and in particular to the hold-up interception method and system of a kind of harassing call.
Background technology
At this stage, the hold-up interception method for harassing call is typically all to be sealed by screening system, manual confirmation, artificial intercept Lock and the process manually lifted a blockade, are artificially to participate in more simple poorly efficient scheme.It is a kind of automatic there is presently no proposing The effective solution for identifying, automatically confirming that and intercepting automatically.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of hold-up interception method of harassing call and is System, can realize automatic identification, automatically confirms that and intercept function automatically.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of hold-up interception method of harassing call, methods described includes:
CDR file is obtained, the Subscriber Number in the CDR file is analyzed, determines that the Subscriber Number is not set in advance In the white list put, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;
Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;
Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server; The limitation instruction includes the harassing and wrecking number.
In such scheme, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are big In the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value.
It is described that the doubtful number is determined as harassing and wrecking number according to clawback result in such scheme, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by communication process carry out record generation voice document with it is default Voice document matching in sound bank, doubtful number corresponding to the voice document that the match is successful is defined as to harass number;
When the clawback result is has ring-back tone but when being not switched on, periodically carries out clawback to the doubtful number, When clawback number reaches four predetermined threshold values, determine the doubtful number for harassing and wrecking number.
In such scheme, methods described also includes:
The instruction response results that application server returns are received, when the instruction response results run succeeded for instruction, The harassing and wrecking number is sent to business support system, prompting letter is sent from the business support system to the harassing and wrecking number Breath.
In such scheme, the business limitation that the limitation instruction also includes the harassing and wrecking number recovers the time limit.
In such scheme, the acquisition ticket, including:The application service is logged according to default application server address Device, CDR file is obtained from the application server.
The embodiment of the present invention additionally provides a kind of intercepting system of harassing call, and the system includes:Bill record collection unit, Ticket analytic unit, reverse testing unit and instruction Transmit-Receive Unit;Wherein,
The bill record collection unit, for gathering CDR file;
The ticket analytic unit, for reading the CDR file in the bill record collection unit, analyze the ticket text Subscriber Number in part, the Subscriber Number is determined not in the white list pre-set, and determine that the Subscriber Number meets During preparatory condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reversely testing unit;
The reversely testing unit, for doubtful number to be carried out into reverse clawback, is determined described doubtful according to clawback result Number is harassing and wrecking number;
The instruction Transmit-Receive Unit, for sending limitation instruction to application server, by the application server to described Harass number and carry out business limitation;The limitation instruction includes the harassing and wrecking number.
In such scheme, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are big In the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value.
In such scheme, the reversely testing unit, for being that clawback is obstructed or clawback is directly disconnected when the clawback result During line, determine the doubtful number for harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on, periodically Clawback is carried out to the doubtful number, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number Code.
In such scheme, the system also includes Speech comparison unit;
The reversely testing unit, is additionally operable to, when the clawback result is normal ON, to record communication process The voice document of sound generation is sent to the Speech comparison unit;
The Speech comparison file, for by the voice document and default sound bank that testing unit is sent described reversely Voice document matching, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
In such scheme, the system also includes information notification unit;
The instruction Transmit-Receive Unit, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit, the instruction response results for being received when the instruction Transmit-Receive Unit perform for instruction During success, the harassing and wrecking number is sent to business support system, sent from the business support system to the harassing and wrecking number Prompt message.
In such scheme, the bill record collection unit, for logging in the application according to default application server address Server, CDR file is obtained from the application server.
Technical scheme provided in an embodiment of the present invention, harassing and wrecking number is confirmed by system preliminary screening, secondary system, and it is right Harassing and wrecking number is intercepted, and is realized the automatic identification to harassing call, is automatically confirmed that and intercept automatically, is avoided artificial true The process recognize, manually intercepted, saves human cost, improves the intercepting efficiency of harassing call, improves the experience of user, and The effective secondary operation for preventing the networking telephone, avoids the loss brought due to the secondary operation of the networking telephone to user.
Brief description of the drawings
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention;
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention.
Embodiment
Fig. 1 is the network architecture schematic diagram of the application scenarios of the embodiment of the present invention, as shown in figure 1, under normal circumstances, commonly Terminal user 11 accesses to IMS network by access device 12;And the network architecture of harassing call is produced, generally in access side net Proxy server 13 is set up in network, the proxy server 13 is by being connected directly to IP multimedia systems(IMS, IP Multimedia Subsystem)Network passes through integrated access equipment(IAD, Integrated Access Device)/ use Family interchanger(PBX, Private Branch Exchange)IMS network is connected to Deng access device 12, downwards as personal meter Calculation machine(PC, Personal Computer)The server of network telephone terminal 14 or cell phone network telephone terminal 15;In the generation Manage and a number resource pond is equipped with server 13, when having endpoint registration to the proxy server 13 and having traffic demand, The proxy server 13 is that call is randomly assigned a vacant number resource to user every time.Network telephone service supplier passes through Corresponding charging policy is set, charging is carried out for per call, to seek exorbitant profit, claims the phenomenon in the embodiment of the present invention For the secondary operation of IMS network phone.There is following feature by the networking telephone of secondary operation:Caller call frequency is especially high, The incoming call frequency is especially low, the caller air time is especially long, the incoming call time is especially short, reverse clawback is abnormal etc.. Therefore, as long as can recognize that the Subscriber Number for meeting features described above, the user that the Subscriber Number is harassing call can be determined Number, further send instructions down and close the call function of the Subscriber Number to business platform, realize shielding harassing call Function.
Below in conjunction with the accompanying drawings and specific embodiment the present invention is further detailed explanation.
Fig. 2 is the schematic flow sheet of the hold-up interception method of the harassing call of the embodiment of the present invention, as shown in Fig. 2 including following Step:
Step 201:Obtain CDR file.
Here, the present embodiment can according to the address registration of the application server pre-set application server, CDR file is downloaded from the application server;Specifically, FTP can be passed through(FTP, File Transfer Protocol)Downloading mode obtains CDR file from application server.
Preferably, the acquisition CDR file can pre-set time interval, such as 5 seconds, be obtained by the time interval Ticket, and the ticket of acquisition is stored in assigned catalogue.
Wherein, the CDR file includes Subscriber Number, air time, the duration of call, caller and the information such as called.
Step 202:The Subscriber Number in the CDR file is analyzed, determines that the Subscriber Number is white not what is pre-set In list, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number.
Specifically, the ticket of acquisition can be read in real time, judge what whether the Subscriber Number in the ticket was set in pre-selection In white list, the Subscriber Number in the white list is defined as the Subscriber Number of validated user;When the result judged is is, directly Connect next ticket of analysis;When the result judged as it is no when, judge whether the Subscriber Number meets preparatory condition, when judgement As a result for when being, it is doubtful number to determine the Subscriber Number.
Here, according to the feature of the networking telephone of secondary operation, including:Caller call frequency is especially high, incoming call frequency Secondary especially low, caller air time especially length, incoming call time, especially short etc. feature set preparatory condition.The preparatory condition Including:In preset period of time, the caller talk times of the Subscriber Number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value.
Wherein, the logical relation between the preparatory condition can flexible configuration according to the actual requirements.
For example, according to Subscriber Number in T(T>0)Caused ticket is counted in it.It is if some within the period The caller number of Subscriber Number more than N, and(Or)Call total duration in the period more than K, and called number with The ratio of caller number is less than M, then it is doubtful number to judge the Subscriber Number.
Fig. 3 is the schematic flow sheet of the determination algorithm of doubtful number in the embodiment of the present invention, as shown in figure 3, including following Step:
Step 301:Take successively(T, t+T)、(T+P, t+P+T)...(T+nP, t+nP+T)The ticket of period.
In the present embodiment, T represents to obtain the ticket per in T time section;The time interval that P represents to obtain ticket every time is P; N represents to obtain the number of ticket.
Step 302:Respectively to institute's number calling time in every T time section in addition to the Subscriber Number in default list Number, call duration are counted;
Step 303:Judge whether caller number is more than N;Or whether caller number is more than N and/or caller total duration and is It is no to be more than K, when the result judged is is, continue executing with step 304;Otherwise, flow is terminated.
Step 304:Judge whether the ratio of called number and caller number is more than M when the result judged is is, perform Step 305;Otherwise, flow is terminated.
Step 305:It is doubtful number to mark the Subscriber Number.
In the present embodiment, the deterministic process of the caller number and caller total duration and between logical relation can be according to reality Border situation flexible configuration.
Step 203:Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result Code.
Here, it is described that the doubtful number is determined as harassing and wrecking number according to clawback result, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number; Here, the clawback is obstructed or clawback directly broken string can be presented without ring-back tone or directly disconnected without color bell sound or clawback The scenes such as line;
When the clawback result is has ring-back tone but when being not switched on, periodically carries out clawback to the doubtful number, When clawback number reaches four predetermined threshold values, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by communication process carry out record generation voice document with it is default Voice document matching in sound bank, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
Here, the abnormal speech file having confirmed that is stored with the sound bank, the voice for generation that communication process is recorded File is matched with the voice document in the sound bank, and institute's voice file and institute's predicate are determined by matching conversational nature information The match is successful for voice document in sound storehouse, and matching process described here is prior art, and here is omitted.
Step 204:Limitation instruction is sent to application server, industry is entered to the harassing and wrecking number by the application server Business limitation;The limitation instruction includes the harassing and wrecking number.
In the present embodiment, the harassing and wrecking number got is sent to application server by limiting instruction, by the application Server carries out business limitation to the harassing and wrecking number or adds blacklist processing;The business limitation can be call business Limitation etc.;Wherein, when the limitation instruction also includes the business limitation of the harassing and wrecking number and recovers time limit or blacklist and release Limit, so as to realize that system automatically terminates the block to the harassing and wrecking number, manual type releasing is avoided passing through, improves work Make efficiency.
Here, after sending limitation instruction to application server, the instruction response results that application server returns is received, work as institute Instruction response results are stated when being run succeeded for instruction, the harassing and wrecking number are sent to business support system, by the business branch Support system sends prompt message to the harassing and wrecking number, to remind the business of the user of the harassing and wrecking number number to be limited System, makes Consumer's Experience more hommization;
When the instruction response results perform failure for instruction, corresponding daily record is recorded.
Wherein, if certain doubtful number is repeatedly judged to harassing number, the business for harassing number limits initial Time judges the time for last time.
Fig. 4 is the composition structural representation of the intercepting system of the harassing call of the embodiment of the present invention, as shown in figure 4, described System includes:Bill record collection unit 41, ticket analytic unit 42, reverse testing unit 43 and instruction Transmit-Receive Unit 45;Wherein,
The bill record collection unit 41, for gathering CDR file;
The ticket analytic unit 42, for reading the CDR file in the bill record collection unit 41, analyze the words Subscriber Number in monofile, the Subscriber Number is determined not in the white list pre-set, and determine the Subscriber Number When meeting preparatory condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reverse testing Unit 43;
The reversely testing unit 43, for doubtful number to be carried out into reverse clawback, described doubt is determined according to clawback result It is harassing and wrecking number like number;
The instruction Transmit-Receive Unit 45, for sending limitation instruction to application server, by the application server to institute State harassing and wrecking number and carry out business limitation;The limitation instruction includes the harassing and wrecking number.
Wherein, the preparatory condition includes:In preset period of time, the caller talk times of the Subscriber Number are more than first Predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and during the caller call of the Subscriber Number It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value;Or
When caller of the caller talk times of the Subscriber Number more than the first predetermined threshold value or the Subscriber Number is conversed It is long to be more than the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is pre- less than the 3rd If threshold value.
Preferably, the reversely testing unit 43, for being that clawback is obstructed or clawback directly breaks when the clawback result When, determine the doubtful number for harassing and wrecking number;It is periodically right when the clawback result to have ring-back tone but when being not switched on The doubtful number carries out clawback, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number.
Preferably, the system also includes Speech comparison unit 44;
The reversely testing unit 43, is additionally operable to, when the clawback result is normal ON, to carry out communication process The voice document of recording generation is sent to the Speech comparison unit 44;
The Speech comparison file 44, for the voice document for sending the reverse testing unit 43 and default voice Voice document matching in storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
Preferably, the system also includes information notification unit 46;
The instruction Transmit-Receive Unit 45, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit 46, the instruction response results for being received when the instruction Transmit-Receive Unit 45 are instruction When running succeeded, the harassing and wrecking number is sent to business support system, from the business support system to the harassing and wrecking number Send prompt message.
Preferably, the bill record collection unit 41, taken for logging in the application according to default application server address Business device, ticket is obtained from the application server.
Specifically, bill record collection unit 41 can log in the application server according to default application server address, from Ticket is obtained in the application server;Ticket analytic unit 42 reads the ticket in the bill record collection unit 41, judges institute The Subscriber Number in ticket is stated whether in the white list that pre-selection is set, the Subscriber Number in the white list is defined as legal use The Subscriber Number at family;When the result judged is is, next ticket of Direct Analysis;When the result judged as it is no when, judge institute State whether Subscriber Number meets preparatory condition, when the result judged is is, it is doubtful number to determine the Subscriber Number, by institute Doubtful number is stated to send to the reversely testing unit 43;
Doubtful number is carried out reverse clawback by the reversely testing unit 43, when the clawback result is that clawback is obstructed or return When dialling directly broken string, determine the doubtful number for harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on, Clawback periodically is carried out to the doubtful number, when clawback number reaches four predetermined threshold values, determines the doubtful number To harass number, the harassing and wrecking number is sent to instruction Transmit-Receive Unit 45;
When the clawback result is normal ON, the voice document that recording generation is carried out to communication process is delivered to described Speech comparison unit 44, the voice document and default language that the Speech comparison file 44 sends the reverse testing unit 43 Voice document matching in sound storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number, will described in Harassing and wrecking number is sent to instruction Transmit-Receive Unit 45;
The harassing and wrecking number is sent to application server by instruction Transmit-Receive Unit 45 by limiting instruction, is taken by the application Device be engaged in the harassing and wrecking number progress business limitation;When the response results that the application server return instruction runs succeeded, The harassing and wrecking number is sent to information notification unit 46, sent the harassing and wrecking number to industry by described information notification unit 46 Business support system, prompt message is sent from the business support system to the harassing and wrecking number.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage Medium(Including but not limited to magnetic disk storage and optical memory etc.)The form of the computer program product of upper implementation.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (8)

1. a kind of hold-up interception method of harassing call, it is characterised in that methods described includes:
CDR file is obtained, analyzes the Subscriber Number in the CDR file, determines that the Subscriber Number is not being pre-set In white list, and when determining that the Subscriber Number meets preparatory condition, the Subscriber Number is defined as doubtful number;
Doubtful number is subjected to reverse clawback, determines the doubtful number for harassing and wrecking number according to clawback result;
Limitation instruction is sent to application server, business limitation is carried out to the harassing and wrecking number by the application server;It is described Limitation instruction includes the harassing and wrecking number;The business limitation that the limitation instruction also includes the harassing and wrecking number recovers the time limit;
Wherein, it is described that the doubtful number is determined as harassing and wrecking number according to clawback result, including:
When the clawback result is that clawback is obstructed or clawback directly breaks, determine the doubtful number for harassing and wrecking number;
When the clawback result is normal ON, by the voice document that recording generation is carried out to communication process and default voice Voice document matching in storehouse, doubtful number corresponding to the voice document that the match is successful is defined as to harass number;
When the clawback result is has ring-back tone but when being not switched on, periodically carry out clawback to the doubtful number, when returning Number is dialled when reaching four predetermined threshold values, determines the doubtful number for harassing and wrecking number.
2. according to the method for claim 1, it is characterised in that the preparatory condition includes:In preset period of time, the use The caller talk times of family number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and the caller duration of call of the Subscriber Number is big In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold Value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value or the caller duration of call of the Subscriber Number is big In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold Value.
3. according to the method for claim 1, it is characterised in that methods described also includes:
The instruction response results that application server returns are received, when the instruction response results run succeeded for instruction, by institute State harassing and wrecking number to send to business support system, prompt message is sent from the business support system to the harassing and wrecking number.
4. according to the method for claim 1, it is characterised in that the acquisition ticket, including:According to default application service Application server described in device address registration, CDR file is obtained from the application server.
5. a kind of intercepting system of harassing call, it is characterised in that the system includes:Bill record collection unit, ticket analysis are single First, reverse testing unit and instruction Transmit-Receive Unit;Wherein,
The bill record collection unit, for gathering CDR file;
The ticket analytic unit, for reading the CDR file in the bill record collection unit, analyze in the CDR file Subscriber Number, determine the Subscriber Number not in the white list pre-set, and it is default to determine that the Subscriber Number meets During condition, the Subscriber Number is defined as doubtful number, the doubtful number is sent to the reversely testing unit;
The reversely testing unit, for doubtful number to be carried out into reverse clawback, the doubtful number is determined according to clawback result To harass number;
The instruction Transmit-Receive Unit, for sending limitation instruction to application server, by the application server to the harassing and wrecking Number carries out business limitation;The limitation instruction includes the harassing and wrecking number;The limitation instruction also includes the harassing and wrecking number Business limitation recover the time limit;
Wherein, the reversely testing unit, it is additionally operable to when the clawback result is that clawback is obstructed or clawback directly breaks, it is determined that The doubtful number is harassing and wrecking number;When the clawback result to have ring-back tone but when being not switched on, periodically doubted to described Clawback is carried out like number, when clawback number reaches four predetermined threshold values, determines the doubtful number for harassing and wrecking number;
The system also includes Speech comparison unit;
The reversely testing unit, is additionally operable to that, when the clawback result is normal ON, recording life will be carried out to communication process Into voice document send to the Speech comparison unit;
The Speech comparison file, for the voice document for sending the reverse testing unit and the language in default sound bank Sound file is matched, and doubtful number corresponding to the voice document that the match is successful is defined as to harass number.
6. system according to claim 5, it is characterised in that the preparatory condition includes:In preset period of time, the use The caller talk times of family number are more than the first predetermined threshold value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value, and the caller duration of call of the Subscriber Number is big In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold Value;Or
The caller talk times of the Subscriber Number are more than the first predetermined threshold value or the caller duration of call of the Subscriber Number is big In the second predetermined threshold value, and the ratio of the incoming call number of the Subscriber Number and caller talk times is less than the 3rd default threshold Value.
7. system according to claim 5, it is characterised in that the system also includes information notification unit;
The instruction Transmit-Receive Unit, it is additionally operable to receive the instruction response results that application server returns;
Described information notification unit, the instruction response results for being received when the instruction Transmit-Receive Unit run succeeded for instruction When, the harassing and wrecking number is sent to business support system, prompting is sent from the business support system to the harassing and wrecking number Information.
8. system according to claim 5, it is characterised in that the bill record collection unit, for according to default application Server address logs in the application server, and CDR file is obtained from the application server.
CN201310722846.1A 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call Active CN104735272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310722846.1A CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310722846.1A CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Publications (2)

Publication Number Publication Date
CN104735272A CN104735272A (en) 2015-06-24
CN104735272B true CN104735272B (en) 2018-03-23

Family

ID=53458694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310722846.1A Active CN104735272B (en) 2013-12-24 2013-12-24 The hold-up interception method and system of a kind of harassing call

Country Status (1)

Country Link
CN (1) CN104735272B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017147804A1 (en) * 2016-03-02 2017-09-08 吴伟东 Cellphone application communication blocking method and system
CN109698885B (en) * 2017-10-20 2021-03-16 ***通信集团公司 Call request processing method and device, network side server and computer storage medium
CN109995707B (en) * 2017-12-29 2021-11-02 ***通信集团陕西有限公司 Method and device for preventing harassment and DDOS (distributed denial of service) attack of high-definition voice
CN109996237A (en) * 2018-01-02 2019-07-09 中兴通讯股份有限公司 The method and device of harassing call is found in a kind of VoLTE network
CN108366173A (en) * 2018-01-05 2018-08-03 腾讯科技(深圳)有限公司 A kind of phone recognition methods, relevant device and system
CN109195168A (en) * 2018-11-06 2019-01-11 中国联合网络通信集团有限公司 A kind of voice intercepting processing method and system
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN110445944B (en) * 2019-08-19 2020-11-24 携程旅游信息技术(上海)有限公司 Method and system for preventing telephone disturbance of call center
CN115580680A (en) * 2021-06-21 2023-01-06 ***通信集团重庆有限公司 Call restriction method, device, system, electronic equipment and storage medium
CN114710590A (en) * 2022-03-28 2022-07-05 恒安嘉新(北京)科技股份公司 Crank call detection method, device, equipment and medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132438A (en) * 2007-03-20 2008-02-27 ***通信集团江苏有限公司 Method for screen selecting and catching vicious disturbing calls

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011119953A (en) * 2009-12-03 2011-06-16 Hitachi Ltd Speech recording system using function of call control and speech recording
CN202231767U (en) * 2011-01-26 2012-05-23 北京炎强通信技术有限公司 Harassing call identifying system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132438A (en) * 2007-03-20 2008-02-27 ***通信集团江苏有限公司 Method for screen selecting and catching vicious disturbing calls

Also Published As

Publication number Publication date
CN104735272A (en) 2015-06-24

Similar Documents

Publication Publication Date Title
CN104735272B (en) The hold-up interception method and system of a kind of harassing call
CN103095889B (en) Junk call intercepting system based on talk mode identification and operating method thereof
CN103701999B (en) The monitoring method of call center's voice call and system
JP4921043B2 (en) Method and apparatus for interrupting exchange connection of unwanted telephone calls
US10423958B2 (en) Method, apparatus and system for voice verification
CN109698885B (en) Call request processing method and device, network side server and computer storage medium
CN104936182B (en) A kind of method and system of intelligence management and control fraudulent call
CN106789851A (en) Auth method, system, service server and authentication server
CN104159229B (en) Incoming call processing method and device
CN102892117A (en) Method and system for monitoring crank call
CN105871789A (en) Control method of intelligent package delivery box, server and system
CN109413362A (en) A kind of call voice access video-meeting method and device
CN106936997B (en) A kind of rubbish voice recognition methods and system based on social networks map
CN111654582A (en) Intelligent outbound method and device
CN104023323B (en) The method and device that client binding terminal is called
US10701205B2 (en) Communications network
CN109995707A (en) A kind of high definition voice is anti-harassment and DDOS attack method and device
CN104580649B (en) A kind of method and system for auditing automatic speech service content
CN108737665A (en) A kind of implementation method and device that incoming call is anti-harassment
CN107104979A (en) A kind of voice clawback verifies the method and system of business
CN107872588A (en) Call processing method, relevant apparatus and system
CN104202463A (en) Call filter method and intelligent terminal
CN112004228B (en) Real person authentication method and system
CN111064850A (en) System and method for realizing prevention, control and reminding of crank calls based on communication network
CN103595885B (en) Domestic affection phone system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant