CN104821938B - A kind of service quality control system based on the networking telephone - Google Patents

A kind of service quality control system based on the networking telephone Download PDF

Info

Publication number
CN104821938B
CN104821938B CN201510141988.8A CN201510141988A CN104821938B CN 104821938 B CN104821938 B CN 104821938B CN 201510141988 A CN201510141988 A CN 201510141988A CN 104821938 B CN104821938 B CN 104821938B
Authority
CN
China
Prior art keywords
calling
authentication information
call
improper
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510141988.8A
Other languages
Chinese (zh)
Other versions
CN104821938A (en
Inventor
孙晓红
胡巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hardlink Science & Technology Co Ltd
Original Assignee
Beijing Hardlink Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hardlink Science & Technology Co Ltd filed Critical Beijing Hardlink Science & Technology Co Ltd
Priority to CN201510141988.8A priority Critical patent/CN104821938B/en
Publication of CN104821938A publication Critical patent/CN104821938A/en
Application granted granted Critical
Publication of CN104821938B publication Critical patent/CN104821938B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a kind of service quality control systems based on the networking telephone, module is reset including calling monitor module, improper call data memory and authentication information, the authentication information of calling monitor module monitoring calling subscribe and the call request of access called subscriber, and the improper call data combined at least one calling judge index and/or improper call data memory judge whether active calls are normal call;Calling monitor module resets module and send to call after judging active calls to called gatekeeper and/or authentication information judges signal, and calling monitor module judges that signal judges whether to record in active calls data and storage to improper call data memory according to calling;Called gatekeeper judges signal execution refusal according to calling or receives the action of call request;Authentication information resetting module receives calling and judges signal and judge that signal determines whether the authentication information of update calling subscribe according to calling.

Description

A kind of service quality control system based on the networking telephone
Technical field
The present invention relates to network telephony art more particularly to a kind of service quality control systems based on the networking telephone.
Background technology
The networking telephone is also known as VoIP (Voice over Internet Protocol) phone, its main feature is that can pass through IP data networks directly carry out speech communication, macroscopically say that its terminal device can include soft phone and hardware phone.Software Phone be exactly computer either intelligent terminal downloading software user by running this software on computer or intelligent terminal, Realize function of network phone, hardware phone is divided into two kinds of analog phone and IP phone, the former leads to by simulating pstn telephone network Voice gateways are crossed, are communicated with network phone system, the latter can directly be carried out by IP data networks and network phone system Communication.
As the continuous promotion of Internet telephony is constantly universal with applying, the networking telephone will be more and more enterprises And ordinary consumer is received, networking telephone complete problem also can be highlighted increasingly, be necessity and again of the networking telephone safely One of component part wanted.How to protect the privacy of the voice messaging of the networking telephone, become the networking telephone advance needs gram The problem of clothes.Such as hack voip network telephone system, pretend to be validated user, as the tool for implementing swindle.It is illegal Molecule illegally accesses legal network phone system, pretends to be telecommunication bureau, public security organ, procuratorate, law court etc. by the networking telephone Staff, with " protection victim's family's fund and property safety " be by the carry out networking telephone swindle or steal relatives, The authentication information of friend networks phone enhances the trust of the injured party by the phone of crack display relatives, friend, and then right It implements swindle, and since networking telephone concealment is difficult to track by force, many citizen deeply hurt.
In addition, some the phone perturbation techniques occurred currently on the market can also occur, such as mesh in network phone system A kind of preceding software for occurring advantage for only needing network using the networking telephone in the market and producing a kind of entitled " exhale dead you ", in fact Border chases after paging system automatically for the networking telephone, is by the use of the cheap networking telephone of communication fee as call platform, using international first Into network telephone communication technology, setting can be facilitated to chase after any phone exhaled, the fixed-line telephone or cell-phone number in any region Code.The phone features dialed by " exhale dead you " software be several seconds one, continuous a couple of days does not stop, and rings a sound and just breaks, and Caller identification is special number.
Malice harassing and wrecking software can be arranged to a hour to called subscriber continual hundreds of phones of incoming call, and one As harassing call intercepting system be all that it is identified and intercepted after phone incoming call user mobile phone, although can be right to a certain extent Harassing call is intercepted, and still " exhale dead you " software is called automatically with the frequency in several seconds, makes other normal telephones not The normal incoming call of energy, user can not normally make a phone call the normal communication for having seriously affected user.
Publication No. is that the Chinese patent of CN101917235A discloses a kind of method and system for realizing voip user's certification, Ip voice terminal sends broadcasting packet, by VoIP account signal assembles in broadcasting packet, DHCP service to DHCP relay equipment Device receives the broadcasting packet and judges whether the binding relationship of VoIP account informations and subscriber line information is consistent, if one It causes, then certification passes through.So as to fulfill safety, quick certification subscriber identity information, the position of user can be further positioned.But The problem of patent document is not involved with VoIP communication securities, and the research about communication security be directed to greatly it is traditional Fixed-line telephone or mobile phone, it is relatively fewer in the communication security of network telephony art and Service Quality quantifier elimination at present.
Invention content
For the deficiency of the prior art, the present invention provides a kind of service quality control system based on the networking telephone, including Calling monitor module, improper call data memory and authentication information resetting module, wherein the calling monitor module monitors The authentication information of calling subscribe and the call request of access called subscriber, and combine at least one calling judge index and/or non- Improper call data in normal call data storage judge whether active calls are normal call;The calling monitoring mould Block sends calling and judges signal, and institute after judging active calls to called gatekeeper and/or authentication information resetting module It states calling monitor module and judges that signal judges whether to record active calls data and store to arrive improper call data according to calling In memory;The called gatekeeper judges signal execution refusal according to the calling or receives the action of the call request;Institute The authentication information resetting module reception calling is stated to judge signal and judge that signal determines whether to update caller according to the calling The authentication information of user.
According to a kind of preferred embodiment, the service quality control system further includes network data shared cell, institute It states calling monitor module and further judges whether active calls are normal call by the network data shared cell;The net Network data sharing unit storage network in improper call data and in network data base data update storage it is non-just Normal call data.
According to a kind of preferred embodiment, the service quality control system further includes user prompt module, described to exhale Monitoring modular detection calling subscribe outbound calling is made whether to be improper call data and is exhaled to user prompt module transmission It cries and judges signal, the user prompt module judges that signal judges whether to send out to calling subscribe/called subscriber based on calling and works as Preceding outbound calling is the prompt message of improper calling.
According to a kind of preferred embodiment, the service quality control system further comprises blacklist detection module, The blacklist detection module is used to detecting the telephone number that called subscriber communicates in blacklist, and by the blacklist phone of detection In number storage to improper call data memory.
According to a kind of preferred embodiment, authentication information resetting module update calling subscribe authentication information it Preceding to establish the secure connection of re-encrypted with calling subscribe to form secure connection channel, the secure connection channel is used to send New authentication information is to calling subscribe.
According to a kind of preferred embodiment, the calling monitor module specifically detect authorized user authentication information whether There are abnormal operation, the abnormal operation includes at least to the improper modification of authentication information, replaces and crack operation.
According to a kind of preferred embodiment, authentication information resetting module by the period or it is aperiodic in a manner of update institute State the authentication information of calling subscribe and regular/irregular cipher mode for changing authentication information.
According to a kind of preferred embodiment, the improper call data of the improper call data memory are including non- The IP address of normal call calls at least one of position, country code, local area code, type of call;The authentication information For at least one of the IP address of user, user name, password and DNS positions.
According to a kind of preferred embodiment, the calling judge index includes type of call, call duration, calling frequency Rate, the duration of call and at least one of calling phone of specific time period in one day.
A kind of network phone system, including calling monitor module, improper call data memory, authentication information resetting mould Block and interchanger, wherein the interchanger includes the first interchanger and second switch, the first interchanger has been internally integrated caller Gateway and caller gatekeeper, second switch have been internally integrated called gateway and called gatekeeper, the calling monitor module monitoring master Cry user authentication information and access called subscriber call request, and combine it is at least one calling judge index and/or it is non-just Improper call data in normal call data memory judge whether active calls are normal call;The calling monitor module It sends calling to the called gatekeeper and/or authentication information resetting module after judging active calls and judges signal, and The calling monitor module judges that signal judges whether to record active calls data and store to arrive improper calls according to calling According in memory;Gatekeeper's reception calling is called to judge signal and judge that signal execution is refused or received the calling and asks according to calling It asks.
The beneficial effects of the present invention are:
(1) one aspect of the present invention ensures the data safety of calling subscribe, is on the one hand called in harassing and wrecking or fraudulent call incoming call It is identified and intercepted before user equipment, avoids harassing call incoming call called subscriber equipment, ensures called subscriber equipment Normal communication.
(2) present invention protects the safety of authorized user, criminal is avoided to usurp the authentication information of user, to award The name of power user makes a phone call carry out fraud to other users, promotes authorized user's account safety.
(3) present invention further realizes that the phone breathed out to authorized user is detected, and confirms whether it is improper exhale Be phone, and user prompted, avoid user it is unknown or have no defence in the case of have dust thrown into the eyes so that generating telephone expenses Etc. economic losses.
Description of the drawings
Fig. 1 is the structure diagram of the embodiment of the present invention;
Fig. 2 is the structure diagram of another embodiment of the invention;
Fig. 3 is the structure diagram of another embodiment of the present invention;With
Fig. 4 is the specific steps schematic diagram of the embodiment of the present invention.
Reference numerals list
10:Service quality control system 20:VoIP system 30:Calling subscribe
40:Called subscriber 101:Calling monitor module
102:Authentication information resets module 104:Network data shared cell
103:Improper call data memory 105:User prompt module
106:Blacklist detection module 201:First interchanger 202:Calling gateway
203:Caller gatekeeper 204:Called gateway 205:Called gatekeeper
206:Second switch
Specific embodiment
It is described in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, the present invention provides a kind of service quality control system based on the networking telephone.Service quality control system System 10 includes calling monitor module 101, improper call data memory 103 and authentication information resetting module 102.It is improper to exhale Data storage 103 is made to be connected to the output control terminal of calling monitor module 101.Calling monitor module 101 is in improper calling Searched in data storage 103 active calls data whether with some improper data in improper call data memory Match.102 one end of authentication information resetting module is connected to user equipment in a wired or wireless manner, if user equipment is set for movement It is standby then for wireless connection, the selectable wire/wireless connection if user equipment is fixed-line telephone, authentication information resetting module The other end is connected to calling monitor module 101.User can select connection mode according to actual needs.
Calling monitor module 101 sends the signal of authentication information resetting to authentication information resetting module 102, while can be to non- Normal call data storage 103 carries out relevant monitoring operation.Wherein, calling monitor module 101 is used to monitor calling subscribe 30 authentication information and/or the call request for accessing called subscriber 40, and combine at least one calling judge index and/or it is non-just Improper call data in normal call data memory 103 judge whether active calls are normal call.Call judge index Including type of call, call duration, calling frequency, the duration of call and in one day specific time period calling phone at least one It is a.
Call duration is the connection stand-by period for accessing called subscriber 40, can base if call duration is 1 second or several seconds Originally it is judged as improper calling;Calling frequency be specially access called subscriber equipment frequency, i.e., one minute even several seconds to Called subscriber 40 dials a phone.The duration of call is the air time after the connection of called subscriber 40, passes through malice and harasses software Called subscriber 40 be may be configured as once receiving calls dropped calls at once or called subscriber 40 is recognized for improper calling electricity It hangs up the telephone immediately after words, then the duration of call is shorter, generally within ten seconds.The calling phone tool of specific time period in one day Body is that most of harassing call is that user is harassed at night, and the period is short, calling frequency is high with calling for this phone The characteristics of.Calling monitor module 101 can determine whether confirmation/potential improper calling by the data information of active calls, Improper calling includes but not limited to harassing call, fraud phone, fee suction phone, sale call, advertisement telephone.
On the one hand calling monitor module 101 monitors the authentication information of calling subscribe 30, on the other hand monitor current calling Data.Specifically, calling monitor module 101 is called the call data that active calls are obtained at gatekeeper 205 from caller gatekeeper 203/. An improper call data part in improper call data memory 103 is that the improper of initial setting up is exhaled when system starts It is data.The improper call data that the improper call data part has been announced on internet, another part are to use During the networking telephone is used, improper call data and storage that calling monitoring system monitoring arrives arrive improper calling at family In data storage 103.Specifically, calling monitor module 101 compares call data and calling judge index, such as call At least one feature of data is coincide with calling judge index, then judges active calls for improper calling.Alternatively, calling monitoring Module 101 by the improper call data stored in the active calls data of monitoring and improper call data memory 103 into Row matching, is such as stored with the call data consistent with active calls data in improper call data memory 103, then judges Active calls are improper calling, otherwise to be judged as normal call.
Active calls judge being called gatekeeper 205 backward calling monitor module 101 and/or authentication information resets module 102, which send calling, judges signal.Calling judges that signal be specially active calls is normal call or active calls are improper exhale The signal cried.Called gatekeeper 205 judges signal execution refusal according to calling or receives the action of call request.VoIP system 20 is led To include the parts such as the first interchanger 201, second switch 206, gateway and gatekeeper, the first interchanger and second switch are IP Interchanger, i.e. IP PBX.User, first by the first interchanger 201, passes through trunk interface and user when using the networking telephone The calling gateway 202 of network residing for equipment connects.After the acquisition called number of calling gateway 202 inquiry is sent out to caller gatekeeper 203 Information, caller gatekeeper 203 inquire the IP address of called gatekeeper 205 by called number, and request letter is sent to called gatekeeper 205 Number, gatekeeper 205 is called according to current network resource conditions to determine whether establishing connection.Calling prison in the embodiment of the present invention If surveying module 101 judges active calls for normal call, send active calls to called gatekeeper 205 and sentence for the calling of normal call Break signal then in the case where having other network conditions, is called gatekeeper 205 and receives current call request, allow caller gatekeeper Connection is established between 203 and called gatekeeper 205.If being judged as improper calling, calling monitor module 101 is to called gatekeeper 205 The judgement signal that active calls are improper calling is sent, making refusal calling after the called reception of the gatekeeper 205 judgement signal please The action asked.So as to realize refusal and the interception of improper calling in the call request stage, improper calling telephony access is avoided In user equipment, the normal communication of user is influenced.Meanwhile calling monitor module 101 is exhaled to the authentication information resetting transmission of module 102 It cries and judges signal.
Calling monitor module 101 according to calling judge signal judge whether record active calls data and store arrive it is improper In call data memory 103.Specifically, if calling monitor module 101 detects that active calls for improper calling, record The details of active calls data are simultaneously stored into improper call data memory 103.Wherein, active calls data is detailed Thin information includes at least one of the IP address of improper calling, calling position, country code, local area code, type of call. Type of call is long-distance call, overseas call, roaming phone and short distance phone etc..In practical application, improper call data tool The information that body includes it is actually detected according to calling monitor module 101 and record information subject to.
Authentication information resetting module 102 receives calling and judges signal and judge that signal determines whether to update caller according to calling The authentication information of user 30.Wherein, authentication information is at least one in the IP address of user, user name, password and DNS positions It is a.Specifically, if authentication information resetting module 102, which receives, represents that the calling of normal call judges signal, it is selectable to Calling subscribe 30 sends authentication information.If authentication information resetting module 102, which receives, represents that the calling of improper calling judges letter Number, then authentication information resetting module 102 prepares to send new authentication information to calling subscribe 30.In order to further ensure that certification is believed Breath illegally will not be retained and be obtained, authentication information reset module 102 update calling subscribe 30 authentication information before with master The secure connection that user 30 establishes re-encrypted is to form secure connection channel.Secure connection channel is used to send new certification Information is to calling subscribe 30.Specifically, authentication information resets module 102 sends handshake, calling subscribe to calling subscribe 30 30 confirm the handshake and establish the connection that module 102 is reset with authentication information, are believed based on the certification of secure connection channel transfer Breath can further enhance the safety of authentication information.
Calling monitor module 101 further monitors the authentication information of user with the presence or absence of abnormal operation, and abnormal operation is at least Including to authentication information improper modification, replace and crack operation.The resetting of authentication information is not only in calling monitor module 101 detect active calls be improper calling when, further can calling monitor module 101 detect user certification letter When breath is abnormal action.If calling monitor module 101 detects that the authentication information of user receives illegal modifications, replaces, cracks Or situations such as intercepting, calling monitor module 101 then assert the user account, and there are security risks, and module is reset to authentication information 102 send the instruction of authentication information resetting, and authentication information receives the authentication information of update user after reset indication.
Further, authentication information resetting module 102 by the period or it is aperiodic in a manner of update the certification of calling subscribe 30 Information and regular/irregular cipher mode for changing authentication information.If authentication information is always maintained at constant, hacker or illegal Molecule is then easier to attack it and change even to usurp.If authentication information reset module 102 with it is certain when Between gap periods or it is acyclic update user authentication information, then substantially increase hacker and usurp legitimate authentication information Difficulty.Authentication information resetting module 102 can randomly choose different encrypted authentication information mode or regular/indefinite simultaneously Change cipher mode to phase.The cipher mode for sending authentication information every time is all different, and such hacker is cracking legitimate authentication letter It needs to take more time during breath.By shortening send authentication information time interval, hack go out authentication information it It is preceding to send new authentication information, it can further reduce the probability that authentication information is acquired.
Fig. 2 is the structure diagram of another embodiment of the present invention.It is as shown in Fig. 2, real shown in embodiment illustrated in fig. 1 and Fig. 2 It applies example difference lies in, embodiment illustrated in fig. 2 and to further comprise network data shared cell 104, user prompt module 105, black List detection module 106.
Calling monitor module 101 further judges whether active calls are normally to exhale by network data shared cell 104 It cries.104 one end of network data shared cell is connect with calling monitor module 101, and the other end is wirelessly connected to internet.Wherein net Network data sharing unit 104 is for storing the improper call data in network data base and will be newer non-in network data base In the storage to network data shared cell 104 of normal call data.Netizen or public security organ are after harassing and wrecking or fraudulent call is confirmed It can be announced and be exposed, other people can also be searched by network, can be had dust thrown into the eyes in this way to avoid more people.Therefore In order to improve harassing and wrecking and cheat phone detection efficiency, can shorten and judge the time, matched from network data be identified or Potential harassing and wrecking and fraud phone.Specifically, network data store is used to store improper call data in network, these Improper call data carry out on automatic network the data information announced or exposed, and network data store can in real time, calmly The situation of change of improper calling in phase or aperiodically monitoring network, when detecting that new swindle or harassing call come forth When, it is added into network data shared cell 104, realizes the improper calls stored in network data shared cell 104 According to timely update.
105 one end of user prompt module is connect with calling monitor module 101, and the other end is with user equipment with wirelessly or non-wirelessly Mode connect.User prompt module 105 is for user in the situation that the unknown number dialed is harassing and wrecking or fraudulent call Under, it is reminded, user is avoided to have dust thrown into the eyes.Calling monitor module 101 detect calling subscribe 30 outbound calling whether be Improper call data and prompt the user with module 105 send calling judge signal.User prompt module 105 is based on calling and judges Signal judges whether to send out the prompt message that current outbound calling is improper calling to calling subscribe 30.Specifically, calling prison Module 101 is surveyed to the phone that calling subscribe 30 breathes out in improper call data memory 103 and network data shared cell 104 In searched and matched or further searched and matched in blacklist detection module 106.With reference to the number of three It is believed that breath judge the calling that currently carries out whether be it is improper call and generate one judge signal.If it is judged as improper Calling then sends out the prompting that current outbound calling is potential harassing and wrecking/fraudulent call, user to be reminded to watch out for calling subscribe 30.
Further, user prompt module 105 also sends out prompt message to called subscriber 40.Specifically, when calling monitoring Data of the module 101 in improper call data memory 103 and network data shared cell 104 can not judge that this is exhaled Cry whether normal call, but the calling Part call feature it is similar to the part index number of judge index in the case of, Yong Huti Show that module 105 sends prompt message to called subscriber 40, may be potential improper with the current Inbound Calls of destination user prompter Calling.
Under normal circumstances, it after user is connected to harassing and wrecking/fraudulent call, can generally be added into blacklist, to prevent it Interception software in further harassing and wrecking or mobile phone can intercept it in blacklist automatically.Service quality control system 10 Further comprise blacklist detection module 106, blacklist detection module 106 is used to detect the electricity in called subscriber's communication blacklist Number is talked about, and will be in the blacklist telephone number storage to improper call data memory 103 of detection.It is beneficial to call in this way The range of next calling detection is included into the improper calling for omitting detection by monitoring modular 101, further improves improper calling Improper call data in data storage 103.
Fig. 3 is the structure diagram of another embodiment of the present invention.As shown in figure 3, this implementation and the area of embodiment illustrated in fig. 1 It is not, interchanger has been internally integrated gateway and/or gatekeeper.The interchanger be IP interchangers, i.e. IP PBX.Interchanger includes the One interchanger 201 and second switch 206.First interchanger 201 has been internally integrated calling gateway 202 and caller gatekeeper 203.The Two interchangers 206 have been internally integrated called gateway 204 and called gatekeeper 205.Advantage of this embodiment is that by interchanger Gateway and gatekeeper are internally integrated then without external gateway and gatekeeper's equipment, reduce the complexity of network phone system, while into One step improves the security reliability of the networking telephone.The other parts working method of embodiment illustrated in fig. 3 and embodiment illustrated in fig. 1 It is identical.
Gateway (Gateway) is also known as protocol converter, for the different network interconnection of two upper-layer protocols.Calling gateway/ Called gateway can be a microprocessor, including master controller, memory module, I/O interfaces and GPRS module.Master controller For controlling I/O interfaces, there is peripheral expansion, realize high speed processing, such as can be embedded-type ARM operating system.Storage Module is for storing own IP address or call intent information such as IP address, including volatile memory elements (such as RAM) and non- Any one or combination in volatile memory elements (such as hard disk, ROM, tape).I/O interfaces connect for including Ethernet The interfaces such as mouth, USB interface, adsl interface and WLAN interface.GPRS module is connected by serial ports with master controller, is realized and is interconnected The connection of net.
Gatekeeper (Gatekeeper) can be a microcontroller for carrying out call treatment and management, gatekeeper to gateway etc. Device such as can be singlechip chip or general purpose microprocessor.It mainly includes log-on message chained list module, active calls information chain Table module, call signaling routing module and charging module.
Log-on message chained list module is used to store the details of registration terminal, such as call signaling transport Layer address, RAS ends Port address, terminal type etc..Active calls information chained list module is used to store the details of active calls and call, including master Cry and be called ID, calling ID, call type and calling beginning and ending time etc..Log-on message chained list module and active calls information chained list Module includes read-only memory (such as ROM), random access memory (such as SRAM and DRAM), erasable programmable read-only memory and quick flashing Any one or combination in memory.Call signaling routing module is used to handle call setup, call clearing, Message Processing Deng action, including cpu chip, Digital Signal Processing (DSP) chip or combination.Charging module is for counting call every time Take, specifically include timer and calculator, in the timer/counter and digital signal processing chip in singlechip chip Hardware multiplier.Each duration of call is calculated, while calculator is deposited according in active calls information chained list module by timer The expense conversed every time that the expenses standard and the duration of call of the different call types of storage calculate.
Fig. 4 is the specific steps schematic diagram of the embodiment of the present invention.Referring to Fig. 4, to the specific implementation step explanation of the present invention It is as follows:
S01:When called gatekeeper receives call request, an inquiry signal, calling prison are sent to calling monitor module Survey module to it is each will the call request of incoming call called subscriber be detected.
S02:After calling monitor module receives inquiry signal, active calls data information, active calls data letter are extracted Breath includes at least IP address, dns address, call duration, call time and calling frequency.Calling monitor module combines improper exhale The improper call data in data storage is made to judge active calls.
S03:Calling monitor module judges active calls further combined with preset calling judge index.
S04:Calling monitor module judges active calls herein in connection with the data in network data shared cell.
S05:When whether by least one of S02, S03, S04 step, to judge active calls be improper calling, exhale Monitoring modular is made to send calling to authentication information resetting module and/or called gatekeeper and judges signal.
S06:Called gatekeeper, which receives, to be performed refusal after calling judges signal or receives the action of call request.
S07:The module that authentication information resets detects the authentication information of user with the presence or absence of abnormal in a manner of period/aperiodic Action, and regular/irregular cipher mode for changing authentication information.
S08:If authentication information resetting module detects authentication information, there are abnormal operation and/or calling monitor modules 101 The judgement signal that active calls are improper calling is sent to authentication information resetting module, then authentication information resetting module and caller User establishes secure connection and forms secure connection channel.
S09:Authentication information resets module after secure connection is established with calling subscribe, and new certification is sent to calling subscribe Information.
It should be noted that above-mentioned specific embodiment is exemplary, those skilled in the art can disclose in the present invention Various solutions are found out under the inspiration of content, and these solutions also belong to disclosure of the invention range and fall into this hair Within bright protection domain.It will be understood by those skilled in the art that description of the invention and its attached drawing are illustrative and are not Form limitations on claims.Protection scope of the present invention is limited by claim and its equivalent.

Claims (8)

1. a kind of service quality control system based on the networking telephone, which is characterized in that including calling monitor module (101), non- Normal call data storage (103) and authentication information resetting module (102), wherein
The authentication information of calling monitor module (101) the monitoring calling subscribe and the call request of access called subscriber (40), And the improper call data combined at least one calling judge index and/or improper call data memory (103) are sentenced Whether disconnected active calls are normal call;
Active calls judge being called gatekeeper (205) backward the calling monitor module (101) and authentication information resets mould Block (102) sends calling and judges signal, and the calling monitor module (101) judges that signal judges whether to record according to calling Active calls data are simultaneously stored into improper call data memory (103);
The called gatekeeper (205) judges signal execution refusal according to the calling or receives the action of the call request;
The authentication information resetting module (102) receives the calling and judges signal and judge that signal determines to be according to the calling The authentication information of no update calling subscribe (30);Wherein, authentication information resetting module (102) the recognizing in update calling subscribe The secure connection of re-encrypted is established to form secure connection channel, the secure connection channel with calling subscribe before card information For sending new authentication information to calling subscribe, the calling monitor module (101) specifically detects the certification letter of authorized user With the presence or absence of abnormal operation, the abnormal operation includes at least improper modification to authentication information, replaces and crack operation breath;
The resetting of authentication information be the calling monitor module (101) detect active calls be improper calling when and/or The calling monitor module (101) detects to carry out when the authentication information of user is abnormal action.
2. service quality control system as described in claim 1, which is characterized in that the service quality control system (10) is also Including network data shared cell (104), the calling monitor module (101) further passes through the network data shared cell (104) judge whether active calls are normal call;Wherein
Improper call data and the data in network data base in network data shared cell (104) the storage network The improper call data updated storage.
3. service quality control system as claimed in claim 2, which is characterized in that
The service quality control system (10) further includes user prompt module (105), calling monitor module (101) detection Whether calling subscribe's outbound calling is improper call data and sends calling judgement letter to the user prompt module (105) Number, the user prompt module (105) judges that signal judges whether to send out to calling subscribe/called subscriber based on calling and currently exhales Go out the prompt message that phone is improper calling.
4. service quality control system as claimed in claim 3, which is characterized in that the service quality control system (10) into One step include blacklist detection module (106), the blacklist detection module (106) for detect called subscriber communicate blacklist In telephone number, and will detection the storage of blacklist telephone number in improper call data memory (103).
5. the service quality control system as described in one of preceding claims 1 to 4, which is characterized in that the authentication information weight Put module (102) by the period or it is aperiodic in a manner of update the authentication information of the calling subscribe and regular/irregular change The cipher mode of authentication information.
6. the service quality control system as described in one of preceding claims 1 to 4, which is characterized in that
The improper call data of the improper call data memory (103) include the IP address of improper calling, calling At least one of position, country code, local area code, type of call;
At least one of IP address, user name, password and the DNS positions of the authentication information for user.
7. the service quality control system as described in one of preceding claims 1 to 4, which is characterized in that
The calling judge index includes type of call, call duration, calling frequency, the duration of call and specific time period in one day Call at least one of phone.
8. a kind of network phone system, which is characterized in that including calling monitor module (101), improper call data memory (103), authentication information resetting module (102) and interchanger, wherein
The interchanger includes the first interchanger (201) and second switch (206), and the first interchanger (201) has been internally integrated Calling gateway (202) and caller gatekeeper (203), second switch (206) have been internally integrated called gateway (204) and called gatekeeper (205),
The authentication information of calling monitor module (101) the monitoring calling subscribe and the call request of access called subscriber (40), And the improper call data combined at least one calling judge index and/or improper call data memory (103) are sentenced Whether disconnected active calls are normal call;
The calling monitor module (101) carries out active calls to judge that the backward called gatekeeper and authentication information reset module (102) it sends calling and judges signal, and the calling monitor module (101) judges that signal judges whether that record is worked as according to calling Preceding call data are simultaneously stored into improper call data memory (103);
Gatekeeper (205) reception calling is called to judge signal and judge that signal execution is refused or received the calling and asks according to calling It asks;Wherein,
The authentication information resetting module (102) is established before the authentication information of update calling subscribe with calling subscribe to be added again Close secure connection to form secure connection channel, for sending new authentication information to caller use by the secure connection channel Family, the authentication information that the calling monitor module (101) specifically detects authorized user whether there is abnormal operation, and the exception is dynamic Make to include at least the improper modification to authentication information, replace and crack operation;
The resetting of authentication information be the calling monitor module (101) detect active calls be improper calling when and/or The calling monitor module (101) detects to carry out when the authentication information of user is abnormal action.
CN201510141988.8A 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone Expired - Fee Related CN104821938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510141988.8A CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510141988.8A CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Publications (2)

Publication Number Publication Date
CN104821938A CN104821938A (en) 2015-08-05
CN104821938B true CN104821938B (en) 2018-06-15

Family

ID=53732101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510141988.8A Expired - Fee Related CN104821938B (en) 2015-03-27 2015-03-27 A kind of service quality control system based on the networking telephone

Country Status (1)

Country Link
CN (1) CN104821938B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743470A (en) * 2019-02-28 2019-05-10 上海市共进通信技术有限公司 The method for realizing non-proxy IP refusal incoming call function based on Session Initiation Protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1350391A (en) * 2000-10-19 2002-05-22 国伟 Barassment preventing telephone technology
WO2006103142A1 (en) * 2005-03-30 2006-10-05 Siemens Enterprise Communications Gmbh & Co.Kg Method for protection against undesirable telemarketing advertisements for communication networks
CN101453522A (en) * 2008-12-19 2009-06-10 ***通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103533192A (en) * 2013-10-22 2014-01-22 上海市共进通信技术有限公司 Method of realizing telephone no-disturbing function for VoIP home gateway based on SIP

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030023736A1 (en) * 2001-07-12 2003-01-30 Kurt Abkemeier Method and system for filtering messages
CN102196099B (en) * 2010-03-10 2014-02-19 成都市华为赛门铁克科技有限公司 Voice call detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1350391A (en) * 2000-10-19 2002-05-22 国伟 Barassment preventing telephone technology
WO2006103142A1 (en) * 2005-03-30 2006-10-05 Siemens Enterprise Communications Gmbh & Co.Kg Method for protection against undesirable telemarketing advertisements for communication networks
CN101453522A (en) * 2008-12-19 2009-06-10 ***通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103533192A (en) * 2013-10-22 2014-01-22 上海市共进通信技术有限公司 Method of realizing telephone no-disturbing function for VoIP home gateway based on SIP

Also Published As

Publication number Publication date
CN104821938A (en) 2015-08-05

Similar Documents

Publication Publication Date Title
US9345052B2 (en) Method and system for allowing incoming emergency communications on a disabled device
US8090944B2 (en) Method and apparatus for authenticating users of an emergency communication network
CN103179504B (en) User validation determination methods and device, user access the method and system of mailbox
US20110211682A1 (en) Telephony fraud prevention
US20070036139A1 (en) System and method for authenticating internetwork resource requests
US9467559B2 (en) Special emergency call treatment based on the caller
KR101059558B1 (en) System for filtering voice-phishing
JP2007533277A (en) How to establish an emergency connection within a local wireless network
WO2006060113A2 (en) Method and apparatus for providing push-to-talk based execution of an emergency plan
CN106303100B (en) A kind of method and system of number protection
JP2010518735A (en) Method and system for establishing a telephone connection
Mustafa et al. End-to-end detection of caller ID spoofing attacks
CN109698885A (en) A kind of processing method of call request, device, network side server and computer storage medium
CN106453799A (en) False communication identifying method and system
CN104821938B (en) A kind of service quality control system based on the networking telephone
CN105007360A (en) Mobile phone address book system fused with VoIP phone function
CN108235310A (en) Method, server and the system of identification camouflage telephone number
CN103703750B (en) For the System and method for for the identifier that source is shown on recipient's device
KR20160052519A (en) Device for blocking illegal internet international originating call and method for blocking illegal internet international originating call
KR20120001284A (en) Preventing system and method for illegal call
KR101571100B1 (en) Device and method for detecting illegal originating call by using pattern analysis
KR101379779B1 (en) Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method
JP2004038912A (en) User authentication system
TWI664847B (en) Sip gateway, call origination method thereof and call termination method thereof
JP2012060413A (en) Communication scheme including origination side authentication and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Sun Xiaohong

Inventor after: Hu Wei

Inventor before: Hu Wei

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180615

Termination date: 20200327