CN110611731A - Method and device for resisting malicious call - Google Patents

Method and device for resisting malicious call Download PDF

Info

Publication number
CN110611731A
CN110611731A CN201810613560.2A CN201810613560A CN110611731A CN 110611731 A CN110611731 A CN 110611731A CN 201810613560 A CN201810613560 A CN 201810613560A CN 110611731 A CN110611731 A CN 110611731A
Authority
CN
China
Prior art keywords
malicious
call
calling party
resource pool
current call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810613560.2A
Other languages
Chinese (zh)
Inventor
朱艳云
杜刚
张晨
杜雪涛
胡入祯
戴晶
邵妍
李元锋
刘海波
于雷
张艋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Design Institute Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201810613560.2A priority Critical patent/CN110611731A/en
Publication of CN110611731A publication Critical patent/CN110611731A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/006Call diverting means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a method and a device for resisting malicious calls. The method comprises the following steps: judging whether a calling party of a current call is a malicious number; when the calling party is a malicious number, transferring the current call to a number in a number resource pool; and processing the current call through the number in the number resource pool. The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.

Description

Method and device for resisting malicious call
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a method and a device for resisting malicious calls.
Background
Along with great convenience brought to people by the calls, more and more malicious calls such as harassing calls, advertising promotion and the like appear. The existing solution is usually to set a black list on the terminal, after the user finds that a certain number is maliciously called, the number is set as the black list, and when the number in the black list calls again, the terminal will automatically reject the call. However, with the increasingly organized and industrialized malicious calls, at present, lawless persons adopt a multi-number calling mode to continuously and uninterruptedly call malicious calls to users, so that the malicious calls of the users are prevented.
Therefore, how to protect the user from continuous disturbance of malicious calls becomes an urgent problem to be solved.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a method and a device for defending against malicious calls.
In one aspect, an embodiment of the present invention provides a method for defending against malicious calls, where the method includes:
judging whether a calling party of a current call is a malicious number;
when the calling party is a malicious number, transferring the current call to a number in a number resource pool;
and processing the current call through the number in the number resource pool.
In another aspect, an embodiment of the present invention provides an apparatus for defending against malicious calls, where the apparatus includes:
the first judging unit is used for judging whether the calling party of the current call is a malicious number;
a forwarding unit, configured to forward a current call to a number in a number resource pool when the calling party is a malicious number;
and the first processing unit processes the current call through the number in the number resource pool.
In another aspect, an embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the method for defending against malicious calls.
In another aspect, embodiments of the present invention also provide a non-transitory computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method for defending against malicious calls as described above.
The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for defending against malicious calls according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for countering a malicious number according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for defending against malicious calls according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a system for defending against malicious calls according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart illustrating a method for defending against malicious calls according to an embodiment of the present invention.
As shown in fig. 1, the method for defending against malicious calls provided by the embodiment of the present invention specifically includes the following steps:
s11, judging whether the calling party of the current call is a malicious number;
the embodiment of the invention judges the current call of the user, for example, comprehensively judges according to the calling behavior, the called behavior and the calling credit to determine whether the current call is a malicious call initiated by a malicious number.
S12, when the calling is a malicious number, transferring the current call to a number in a number resource pool;
the embodiment of the invention provides a number resource pool, which provides a plurality of forwarding numbers so as to select the forwarding numbers from the number resource pool for call forwarding after judging malicious calls, thereby avoiding the disturbance of the malicious calls to users and providing real-time protection for the users.
And S13, processing the current call through the number in the number resource pool.
The embodiment of the invention transfers the malicious call and processes the malicious call through the number in the number resource pool which is responsible for transferring. The specific processing mode comprises the modes of not answering the malicious call through the transfer number until the call is finished, refusing, calling back after refusing and the like, wherein the mode of calling back the malicious number through the transfer number after refusing or finishing the call can confirm the calling misjudged as the malicious number so as to properly process the call, in addition, certain interference can be caused to the real malicious number, the malicious call behavior is prevented from continuing, and the counter-control to the malicious number is realized.
According to the method for resisting the malicious call provided by the embodiment of the invention, after the calling party of the current call is judged to be the malicious number, the current malicious call is transferred to the number in the number resource pool, and the malicious call is processed through the transfer number. The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.
On the basis of the foregoing embodiment, S12 specifically includes:
when a plurality of malicious numbers continuously call the current called party, the calls initiated by the malicious numbers are transferred to the numbers in the number resource pool, wherein the number of the numbers is the same as the number of the malicious numbers initiating the calls.
Specifically, when a lawbreaker uses a plurality of numbers to make continuous and uninterrupted malicious calls to the same user, the embodiment of the invention provides the same number of forwarding numbers for the user, and respectively answers the calls sent by each malicious number.
In the specific implementation process, the forwarding mode may forward the malicious call to the number of the number resource pool through an IMS (IP Multimedia system) or a softswitch system. The embodiment of the invention can protect the user from continuous attack of malicious numbers.
The number resource pool provides a plurality of transfer numbers for the user, the user needs to obtain the authority of using the number resource pool for using the number in the number resource pool, for example, in the specific implementation process, the user needs to apply for a service for resisting malicious calls first, and the time period for using the service needs to be clear, and the authority of using the number in the number resource pool can be obtained only after applying for using the malicious call resisting service. The number resource pool provided by the embodiment of the invention can be shared by all users applying for services in a time division multiplexing mode, so that the number of required transfer numbers can be reduced, and the occupation of resources is reduced.
Specifically, the numbers in the number resource pool include an online number and an offline number.
The embodiment of the invention adopts a mode of combining an online number and an offline number to form a number resource pool, wherein the online number refers to the number always in an online activation state, the offline number is activated online when the number is used, and the number is released to be offline. The method for combining the online number and the offline number provided by the embodiment of the invention can ensure convenience, reduce occupied resources and improve the utilization rate of the number resource pool.
On the basis of the foregoing embodiment, the S12 specifically further includes:
when a plurality of malicious numbers continuously call the current called number, preferentially transferring the call of the malicious numbers to online numbers in a number resource pool;
when the number of the online numbers in the number resource pool is insufficient, activating the corresponding number of the offline numbers, and transferring the malicious calls which are not transferred to the online numbers to the activated numbers;
and after the malicious call is processed through the activated number, releasing the activated number as an offline number again.
In the embodiment of the invention, when the number is selected from the number resource pool, the online number is preferentially selected, when the online number resource is insufficient, the offline number is selected, the online number is activated firstly, then the corresponding malicious call is answered, and the offline number is converted into the offline state again after the malicious call is processed, so that the occupied resource can be released, and the number resource pool can be reasonably utilized.
On the basis of the foregoing embodiment, S13 specifically includes:
and not answering the call of the malicious number, or directly rejecting the call of the malicious number, or after rejecting the call of the malicious number, replying a short message to the malicious number or calling back the malicious number through the number in the number resource pool.
The embodiment of the invention finishes the malicious calling through the number in the number resource pool after the number in the number resource pool answers the malicious calling, and provides a processing mode for countering the malicious number, which specifically comprises the following steps: the short message is not answered until the calling party stops calling, directly refuses or replies a short message to the calling party after directly refusing.
Specifically, after the malicious call is finished, under the condition that the user perception is not influenced, the malicious number is dialed back through the number in the number resource pool, if the calling party is a normal number which is judged to be the malicious number by mistake, the dialing back mode conforms to a normal flow, and the interference to a normal user can not be caused; if the misjudgment is not carried out, certain interference can be caused to the malicious number, the malicious number is prevented from continuing to carry out malicious calling, and the purpose of carrying out certain countermeasures on the malicious number is achieved.
On the basis of the above embodiment, after S13, the method further includes:
and playing the voice message to the malicious number which is answered within the specified callback times.
Specifically, if the malicious number answers the call-back, the voice is recorded to the malicious number automatic playing system, and the number which requests to answer the call-back carries out voice mailbox message leaving to the user.
The method for countering a malicious number by using a callback proposed by the present invention is described in detail by using specific examples.
For example, a calling party a calls a subscriber B, and after judging that a is a malicious number, a forwarding number C is allocated by the number resource pool to answer the call of a.
Fig. 2 is a schematic flow chart illustrating a procedure for countering a malicious number according to an embodiment of the present invention.
Referring to fig. 2, the step of countering the malicious number includes:
1) after the call of the malicious calling A is transferred to the number C, the selectable treatment mode through the number C comprises the following steps: not answering until the calling A stops calling, directly refuses to answer or replies the short message after directly refusing to answer;
2) then taking C as a calling party to dial a malicious number A, and setting a maximum dialing frequency threshold to be N (N can be set to be 2 by default);
3) judging whether the dialing frequency does not exceed the maximum dialing frequency N;
if not, judging whether the A answers the call: if the A does not answer the call, returning to the step 2; if A answers the call, continuing to step 4; if the dialing frequency exceeds N, entering step 5;
4) after A receives the call, C automatically plays the system record to request A to leave a message in the voice mailbox to the user B;
5) and ending the malicious number reverse-making process, releasing the number C, and returning the number C to the number resource pool.
On the basis of the foregoing embodiment, S11 specifically includes:
if the calling party of the current call is smaller than a first threshold value in the first specified time as the calling party, judging that the calling party of the current call is a malicious number, wherein the calling party of the current call is the ratio of the calling party to the busy hour;
if the called time length ratio of the called party of the current call in a second specified time length is larger than a second threshold value, judging that the calling party of the current call is a malicious number, wherein the called time length ratio is the ratio of the busy hour time length of the called party to the second specified time length;
and if the marking state of the calling party of the current call in the shared number marking library is a harassing call and the marking times are greater than a third threshold value, judging that the calling party of the current call is a malicious number, wherein the shared number marking library comprises numbers marked as harassing calls and the marking times of each number.
The method for judging whether the current calling is the malicious number combines the analysis and judgment of multiple dimensions of the calling behavior, the called behavior and the calling credit.
The caller behavior analysis, the callee behavior analysis, and the caller reputation analysis are explained in detail below, respectively.
And (3) calling behavior analysis: and calculating the calling time ratio of the current calling party as the calling party within a certain time, wherein if the calling time ratio of the current calling party as the calling party is very low, the probability of the calling party being a malicious call is higher.
Specifically, a signaling call ticket in which a current calling party is used as a calling party within a certain time is obtained, and the calling party call duration ratio is calculated according to the calling party call duration and the busy hour duration recorded in the signaling call ticket: and if the calling call duration ratio is smaller than a first threshold, judging that the current calling is a malicious number.
The calling call duration is the total duration of the call connection of the calling party recorded by the same calling signaling ticket; the busy hour duration is the total duration recorded in the same calling signaling ticket (i.e. from the starting time of signaling establishment to the ending time of signaling).
And (3) called behavior analysis: analyzing the time length ratio of the called party in the last period of time under the condition that the current called party is the called party, and if the time length ratio of the called party in the last period of time is higher, the probability that the called party is in a malicious calling state is higher.
Specifically, a called signaling ticket of a current called party in a certain test period (for example, 3 minutes) is obtained, and the ratio of the called duration to the called duration is calculated according to the called busy duration recorded in the signaling ticket: and if the ratio of the called duration to the total duration is greater than a second threshold, judging that the current called party is in a malicious calling state and the current calling party is a malicious number.
The busy time duration is the total duration recorded in the called signaling ticket of the same called party (i.e. from the starting time of signaling establishment to the ending time of signaling), and the total duration is a specified time period (e.g. 3 minutes).
And (3) caller reputation analysis: the method mainly analyzes the marking state of the number as the calling in the shared number library to judge whether the calling is a malicious number, and if the calling is marked as a harassing call and the marking frequency is higher, the probability that the calling is a malicious number is higher.
Specifically, the shared number tagging library provided by the embodiment of the present invention records numbers of nuisance calls, nuisance types (such as sound, advertisement promotion, etc.), and tagging times of each number. If the current caller is marked as a harassing call (such as ringing one sound) and the marking times exceed a preset value, the current caller is judged to be a malicious number.
After judging that the calling party of the current call is a malicious number, the embodiment of the invention stores the judged malicious number into the shared number mark library and marks the type and the frequency of harassment.
The judging mode combining the calling and called behaviors and the number historical credit provided by the embodiment of the invention greatly improves the accuracy of judging the malicious call.
On the basis of the foregoing embodiment, before S11, the method further includes:
judging whether the calling party of the current call is in a white list or a black list of the called party of the current call;
if the calling party of the current call is in the white list of the called party, directly establishing the call;
and if the calling party of the current call is in the blacklist of the called party, refusing to establish the call.
Specifically, the embodiment of the invention provides a grey-black calling classification mode according to the trust degree, which does not influence the normal conversation of a user and simultaneously reduces the analysis range of malicious calls. The user can set the trusted caller as a white list, set the caller determined to be untrusted as a black list, default the rest callers as a gray list, and judge the malicious number by the step of S11 provided by the embodiment of the invention when the number of the gray list is incoming, wherein the processing of the number in the black and white list comprises the following steps:
when a calling party A calls a user B, firstly, judging whether the A is in a calling white list set by the B, and if the A is in the white list, directly calling the B;
if not, judging whether A is in the call blacklist set by B, if so, stopping the call.
The method for processing the call based on the black, white and grey list provided by the embodiment of the invention can reduce the judgment range of malicious calls under the condition of not influencing the normal conversation of the user.
The embodiment of the invention also provides a device for resisting the malicious call.
Fig. 3 is a schematic structural diagram illustrating an apparatus for defending against malicious calls according to an embodiment of the present invention.
As shown in fig. 3, the apparatus for defending against malicious calls provided by the embodiment of the present invention includes a first determining unit 11, a transferring unit 12, and a processing unit 13, where:
the first judging unit 11 is configured to judge whether a calling party of a current call is a malicious number;
the forwarding unit 12 is configured to forward the current call to a number in a number resource pool when the calling party is a malicious number;
the first processing unit 13 processes the current call through the number in the number resource pool.
According to the device for resisting the malicious call, after the calling party of the current call is judged to be the malicious number, the current malicious call is transferred to the number in the number resource pool, and the malicious call is processed through the transfer number. The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.
On the basis of the foregoing embodiment, the forwarding unit 12 is configured to, when a plurality of malicious numbers uninterruptedly call a current called party, forward calls initiated by the malicious numbers to numbers in the number resource pool, where the numbers are the same as the number of the malicious numbers initiating the calls.
Specifically, the numbers in the number resource pool include an online number and an offline number;
specifically, the transfer unit 12 includes:
the first transfer subunit is used for preferentially transferring the call of the malicious number to the online number in the number resource pool when a plurality of malicious numbers uninterruptedly call the current called number;
the activation subunit is used for activating the offline numbers with corresponding number when the number of the online numbers in the number resource pool is insufficient;
the second transfer subunit is used for transferring the malicious call which is not transferred to the online number to the activated number;
and the release subunit is used for releasing the activated number as the offline number again after the malicious call is processed through the activated number.
On the basis of the above embodiment, the first processing unit 13 is configured to not answer the call of the malicious number, or directly reject the call of the malicious number, or reply a short message to the malicious number or call back to the malicious number through a number in the number resource pool after rejecting the call of the malicious number.
On the basis of the above embodiment, the first processing unit 13 is further configured to play a voice message to a malicious number that is answered within a specified number of callback times after the callback module dials back to the malicious number.
On the basis of the above embodiment, the first judgment unit 11 includes:
if the calling party of the current call is smaller than a first threshold value within a first specified time as the calling party of the call, judging that the calling party of the current call is a malicious number, wherein the calling party of the current call is the ratio of the calling party of the call to the busy hour of the call;
if the called time length ratio of the called party of the current call in a second specified time length is larger than a second threshold value, judging that the calling party of the current call is a malicious number, wherein the called time length ratio is the ratio of the busy hour time length of the called party to the second specified time length;
and if the marking state of the calling party of the current call in the shared number marking library is a harassing call and the marking times are greater than a third threshold value, judging that the calling party of the current call is a malicious number, wherein the shared number marking library comprises numbers marked as harassing calls and the marking times of each number.
On the basis of the above embodiment, the apparatus further includes:
the second judging unit is used for judging whether the calling party of the current call is in a white list or a black list of the called party of the current call;
the second processing unit is used for directly establishing a call if the calling party is judged to be in the white list of the called party; and if the call is judged to be in the blacklist of the called party, refusing to establish the call.
The embodiment of the invention also provides a system for resisting the malicious call.
Fig. 4 is a schematic structural diagram illustrating a system for defending against malicious calls according to an embodiment of the present invention.
Referring to fig. 4, a system for resisting malicious calls provided in the embodiments of the present invention includes a call analysis module, a user real-time protection module, and a malicious number reverse module, where the call analysis module is connected to the user real-time protection module, and the user real-time protection module is connected to the call analysis module and the malicious number reverse module, respectively, where:
the call analysis module is used for analyzing and judging whether each calling party is a malicious number or not and transmitting the judged malicious number to the user real-time protection module;
the user real-time protection module is used for selecting a number from the number resource pool as a transfer number of a called party after the calling analysis module judges that the calling party is a malicious call, answering the call of the malicious calling party and transmitting the malicious calling party and the transfer number to the malicious number reverse module;
and the malicious number reverse module is used for ending the current malicious call and interfering the malicious number.
Specifically, the call analysis module is further connected to the mobile terminal, the shared number tagging system, and the signaling detection system, and is respectively configured to obtain a black list and a white list of the user from the mobile terminal; acquiring number marking conditions from a shared number marking system to judge malicious numbers; and acquiring the call data from the signaling monitoring system to judge the malicious number.
Specifically, the user real-time protection module is further connected to the IMS or the soft switch system, and is configured to transfer the malicious call to a number in the number resource pool through the IMS or the soft switch system.
Each functional module in the system for resisting malicious calls provided in the embodiment of the present invention, which is used for executing the above-described method embodiment, corresponds to a functional module in the device for resisting malicious calls provided in the embodiment of the present invention, which is used for executing a corresponding method embodiment, and details of this implementation are not repeated.
The functional modules in the embodiments of the present invention may be implemented by a hardware processor (hardware processor), and the embodiments of the present invention are not described again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
An embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method shown in fig. 1 is implemented.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 5, the electronic device provided by the embodiment of the present invention includes a memory 21, a processor 22, a bus 23, and a computer program stored on the memory 21 and executable on the processor 22. The memory 21 and the processor 22 complete communication with each other through the bus 23.
The processor 22 is used to call the program instructions in the memory 21 to implement the method of fig. 1 when executing the program.
For example, the processor implements the following method when executing the program:
judging whether a calling party of a current call is a malicious number;
when the calling party is a malicious number, transferring the current call to a number in a number resource pool;
and processing the current call through the number in the number resource pool.
According to the electronic equipment provided by the embodiment of the invention, after the calling party of the current call is judged to be the malicious number, the current malicious call is transferred to the number in the number resource pool, and the malicious call is processed through the transfer number. The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.
Embodiments of the present invention also provide a non-transitory computer readable storage medium, on which a computer program is stored, and the program, when executed by a processor, implements the steps of fig. 1.
For example, the processor implements the following method when executing the program:
judging whether a calling party of a current call is a malicious number;
when the calling party is a malicious number, transferring the current call to a number in a number resource pool;
and processing the current call through the number in the number resource pool.
The non-transitory computer readable storage medium provided by the embodiment of the present invention, after determining that the calling party of the current call is a malicious number, transfers the current malicious call to a number in a number resource pool, and processes the malicious call through a transfer number. The embodiment of the invention can avoid the user from being disturbed by the malicious call by transferring the malicious call, and provide real-time protection for the user.
An embodiment of the present invention discloses a computer program product, the computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions, which when executed by a computer, enable the computer to perform the methods provided by the above-mentioned method embodiments, for example, including:
judging whether a calling party of a current call is a malicious number;
when the calling party is a malicious number, transferring the current call to a number in a number resource pool;
and processing the current call through the number in the number resource pool.
Those skilled in the art will appreciate that although some embodiments described herein include some features included in other embodiments instead of others, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of defending against malicious calls, the method comprising:
judging whether a calling party of a current call is a malicious number;
when the calling party is a malicious number, transferring the current call to a number in a number resource pool;
and processing the current call through the number in the number resource pool.
2. The method of claim 1, wherein forwarding the current call to a number in a number resource pool comprises:
when a plurality of malicious numbers continuously call the current called party, the calls initiated by the malicious numbers are transferred to the numbers in the number resource pool, wherein the number of the numbers is the same as the number of the malicious numbers initiating the calls.
3. The method of claim 2, wherein the numbers in the number resource pool comprise an online number and an offline number;
the forwarding the current call to a number in the number resource pool further comprises:
when a plurality of malicious numbers continuously call the current called number, preferentially transferring the call of the malicious numbers to online numbers in a number resource pool;
when the number of the online numbers in the number resource pool is insufficient, activating the corresponding number of the offline numbers, and transferring the malicious calls which are not transferred to the online numbers to the activated numbers;
and after the malicious call is processed through the activated number, releasing the activated number as an offline number again.
4. The method of claim 1, wherein processing the current call through the number in the number resource pool comprises:
and not answering the call of the malicious number, or directly rejecting the call of the malicious number, or after rejecting the call of the malicious number, replying a short message to the malicious number or calling back the malicious number through the number in the number resource pool.
5. The method of claim 4, wherein after the callback to the malicious number by a number in a number resource pool, the method further comprises:
and playing the voice message to the malicious number which is answered within the specified callback times.
6. The method of claim 1, wherein the determining whether the caller of the current call is a malicious number comprises:
if the calling party of the current call is smaller than a first threshold value within a first specified time as the calling party of the call, judging that the calling party of the current call is a malicious number, wherein the calling party of the current call is the ratio of the calling party of the call to the busy hour of the call;
if the called time length ratio of the called party of the current call in a second specified time length is larger than a second threshold value, judging that the calling party of the current call is a malicious number, wherein the called time length ratio is the ratio of the busy hour time length of the called party to the second specified time length;
and if the marking state of the calling party of the current call in the shared number marking library is a harassing call and the marking times are greater than a third threshold value, judging that the calling party of the current call is a malicious number, wherein the shared number marking library comprises numbers marked as harassing calls and the marking times of each number.
7. The method of claim 1, wherein prior to determining whether the caller of the current call is a malicious number, the method further comprises:
judging whether the calling party of the current call is in a white list or a black list of the called party of the current call;
if the calling party of the current call is in the white list of the called party, directly establishing the call;
and if the calling party of the current call is in the blacklist of the called party, refusing to establish the call.
8. An apparatus for defending against malicious calls, the apparatus comprising:
the first judging unit is used for judging whether the calling party of the current call is a malicious number;
a forwarding unit, configured to forward a current call to a number in a number resource pool when the calling party is a malicious number;
and the first processing unit processes the current call through the number in the number resource pool.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program performs the steps of defending against malicious calls as claimed in any of claims 1 to 7.
10. A non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor performs the steps of defending against malicious calls as recited in any of claims 1 to 7.
CN201810613560.2A 2018-06-14 2018-06-14 Method and device for resisting malicious call Pending CN110611731A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810613560.2A CN110611731A (en) 2018-06-14 2018-06-14 Method and device for resisting malicious call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810613560.2A CN110611731A (en) 2018-06-14 2018-06-14 Method and device for resisting malicious call

Publications (1)

Publication Number Publication Date
CN110611731A true CN110611731A (en) 2019-12-24

Family

ID=68887677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810613560.2A Pending CN110611731A (en) 2018-06-14 2018-06-14 Method and device for resisting malicious call

Country Status (1)

Country Link
CN (1) CN110611731A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347311A (en) * 2021-05-28 2021-09-03 五八有限公司 Abnormal number call processing method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232536A (en) * 2007-01-22 2008-07-30 中兴通讯股份有限公司 Malicious call identification method
CN101299779A (en) * 2008-06-10 2008-11-05 深圳华为通信技术有限公司 Method for preventing telephone harassment, system and communication terminal
CN103369491A (en) * 2012-03-30 2013-10-23 北京千橡网景科技发展有限公司 Harassment prevention communication method and communication device
CN105721659A (en) * 2016-01-29 2016-06-29 广东小天才科技有限公司 Incoming call processing method and device
CN105812537A (en) * 2016-05-11 2016-07-27 浙江鹏信信息科技股份有限公司 System and method for processing malicious calls
CN106657542A (en) * 2016-12-09 2017-05-10 北京奇虎科技有限公司 Call treatment method, device and mobile terminal
CN107566666A (en) * 2017-08-17 2018-01-09 北京珠穆朗玛移动通信有限公司 Callback method of missed call, mobile terminal and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232536A (en) * 2007-01-22 2008-07-30 中兴通讯股份有限公司 Malicious call identification method
CN101299779A (en) * 2008-06-10 2008-11-05 深圳华为通信技术有限公司 Method for preventing telephone harassment, system and communication terminal
CN103369491A (en) * 2012-03-30 2013-10-23 北京千橡网景科技发展有限公司 Harassment prevention communication method and communication device
CN105721659A (en) * 2016-01-29 2016-06-29 广东小天才科技有限公司 Incoming call processing method and device
CN105812537A (en) * 2016-05-11 2016-07-27 浙江鹏信信息科技股份有限公司 System and method for processing malicious calls
CN106657542A (en) * 2016-12-09 2017-05-10 北京奇虎科技有限公司 Call treatment method, device and mobile terminal
CN107566666A (en) * 2017-08-17 2018-01-09 北京珠穆朗玛移动通信有限公司 Callback method of missed call, mobile terminal and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347311A (en) * 2021-05-28 2021-09-03 五八有限公司 Abnormal number call processing method and device and electronic equipment
CN113347311B (en) * 2021-05-28 2022-12-30 五八有限公司 Abnormal number call processing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
JP5351787B2 (en) Communication processing system and program
EP3050287B1 (en) Identifying and filtering incoming telephone calls to enhance privacy
EP2262212B1 (en) Caller recognition by voice messaging system
CN109698885B (en) Call request processing method and device, network side server and computer storage medium
US8942357B2 (en) Stopping robocalls
US20100278325A1 (en) Annoying Telephone-Call Prediction and Prevention
CN105187606A (en) Method for preventing crank calls based on identity authentication
US11647113B2 (en) System and method for limiting incoming spam calls
CN109451183B (en) Method for preventing unwelcome telephone
US8447017B2 (en) Method and apparatus for connecting a caller previously diverted to voicemail
CN106657547A (en) Method and system for preventing crank calls
US20160065735A1 (en) Method for establishing a callback telecommunication connection
US10003694B2 (en) Threshold activated teleconferencing
CN101888601A (en) Coloring ring back tone service system and method for shielding coloring ring back tone service
CN110611731A (en) Method and device for resisting malicious call
CN101951565A (en) Method and device for determining voice call state of terminal
CN108449517A (en) Call method and device based on the more card business of No.1
US20040202305A1 (en) Supervised call redirection
CN105306661A (en) Incoming call processing method and device and electronic device
CN112714219A (en) Number switching method and device
CN114979992B (en) Call state determining method and device
CN117714598A (en) Method, system, equipment and medium for identifying call result in telephone voice scene
JPH1168952A (en) System and method for responding call without reporting call originating number
CN106161816A (en) The dispositions method of a kind of unified messaging service, UMS and system
RU2453066C2 (en) Method for personal call of telephone network user (versions)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224

RJ01 Rejection of invention patent application after publication