[go: up one dir, main page]

CN104283851A - Illegal automatic call shielding method and system and voice authentication equipment - Google Patents

Illegal automatic call shielding method and system and voice authentication equipment Download PDF

Info

Publication number
CN104283851A
CN104283851A CN201310282345.6A CN201310282345A CN104283851A CN 104283851 A CN104283851 A CN 104283851A CN 201310282345 A CN201310282345 A CN 201310282345A CN 104283851 A CN104283851 A CN 104283851A
Authority
CN
China
Prior art keywords
authentication
call
calling
voice
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310282345.6A
Other languages
Chinese (zh)
Inventor
田海波
石彦彬
阳志明
李凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201310282345.6A priority Critical patent/CN104283851A/en
Publication of CN104283851A publication Critical patent/CN104283851A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an illegal automatic call shielding method and system and voice authentication equipment and relates to the field of mobile communication safety. According to the illegal automatic call shielding method and system and the voice authentication equipment, the voice authentication equipment is additionally arranged on the local end network side, after a called user applies for voice incoming call authentication services, calls of the called user are routed to the voice authentication equipment through calling side network equipment, in coming call authentication of a calling party is conducted by the voice authentication equipment, the illegal automatic calls with authentication failed are intercepted, only the normal manual calls with the authentication passed are allowed to start calling a terminal of the called user. Thus, a large amount of illegal automatic incoming calls can be shielded, the problems of illegal infringements of automatic call software such as call death is solved, and meanwhile the incoming calls of normal calling users are not influenced.

Description

Illegal automatic call shielding method and system and voice authentication equipment
Technical Field
The invention relates to the field of mobile communication safety, in particular to a shielding method and a shielding system for illegal automatic calls and a voice authentication device.
Background
VOIP network telephone is a voice service based on IP data packet, which makes user transmit voice, fax, video and data services through internet free or with low charge.
At present, some automatic calling software such as 'call death', also called network telephone automatic calling system, uses network telephone with low communication cost as calling platform, adopts advanced network telephone communication technology, can conveniently call any fixed telephone and mobile phone number in any area.
Some illegal persons use automatic calling software such as 'call death' to carry out a large number of illegal calls for specific users and carry out illegal actions such as extirpation, extirpation and lasso, so that the called users are not capable of applying except shutdown and number changing, and the normal conversation of the users is seriously influenced. Therefore, there is a need for a solution that can automatically identify and mask illegal automatic calls.
Disclosure of Invention
The embodiment of the invention aims to solve the technical problem that: the problem that some automatic calling software is illegally utilized, a large number of illegal calls are carried out aiming at a specific user, and normal conversation of the user is influenced is solved.
According to an aspect of an embodiment of the present invention, a method for shielding an illegal automatic call is provided, including: the voice authentication equipment receives a call aiming at a called user; the voice authentication equipment authenticates the calling user of the call; if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
The illegal automatic call shielding method further comprises the following steps: when receiving a call for a called user, the network equipment at the calling side judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the network equipment at the calling side routes the call for the called user to the voice authentication equipment so as to authenticate the calling user of the call.
Wherein, the authentication of the calling user of the call by the voice authentication device comprises:
the voice authentication equipment carries out white list static authentication on the calling user of the call;
or,
the voice authentication equipment carries out dynamic authentication on the calling user of the call;
or,
the voice authentication equipment performs white list static authentication on the calling user of the call, and performs dynamic authentication on the calling user of the call if the static authentication fails;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
According to still another aspect of the embodiments of the present invention, there is provided a voice authentication apparatus, including: the receiving module is used for receiving a call aiming at a called user; the authentication module is used for authenticating the calling party of the call; the processing module is used for allowing the calling user to call the called user if the authentication is passed and the call is a normal manual call; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
In one aspect, an authentication module comprises: the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
In yet another case, the authentication module includes: the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
In yet another case, the authentication module includes: a calling user filtering unit and a calling authentication interaction unit; the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call; the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed; wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
According to another aspect of the embodiments of the present invention, there is provided an illegal automatic call screening system, including: the voice authentication device and the calling side network device are used for routing a call for a called user to the voice authentication device.
The calling side network device is specifically configured to determine whether the called user applies for the voice call authentication service when receiving a call for the called user, and route the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
The invention adds voice authentication equipment on the local side network, after the called party applies for the voice incoming call authentication service, the calling side network equipment routes the call aiming at the called party to the voice authentication equipment, the voice authentication equipment authenticates the incoming call of the calling party, intercepts the illegal automatic call which is not authenticated, and allows the terminal of the called party to be called only by the normal manual call which is authenticated, thus shielding a large amount of illegal automatic incoming calls, solving the illegal infringement problem of automatic calling software such as 'call death' and the like, and not influencing the incoming call of the normal calling party.
In addition, the invention provides three authentication schemes, wherein the white list static authentication scheme is set by the called user, and the calling user can realize authentication without additional operation; the dynamic authentication scheme requires a calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced; the authentication scheme combining the static authentication and the dynamic authentication of the white list can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the setting of the white list, so that the input operation of the calling users is reduced, and can also consider the normal calling requirements of other calling users through the dynamic authentication, so that normal users outside the white list can call the called party.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flow chart illustrating an embodiment of a method for shielding an illegal automatic call according to the present invention.
Fig. 2 is a flowchart illustrating a method for shielding an illegal automatic call according to another embodiment of the present invention.
Fig. 3 is an information interaction diagram of another embodiment of the illegal automatic call screening method of the present invention.
Fig. 4 is a schematic structural diagram of an embodiment of the illegal automatic call screening system according to the present invention.
Fig. 5 is a schematic structural diagram of an embodiment of the voice authentication device of the present invention.
Fig. 6 is a schematic diagram of the operation flow of the voice authentication device and its constituent modules and units in the third authentication mode of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problem that some automatic calling software is illegally utilized and a large number of illegal calls are carried out aiming at a specific user to influence the normal conversation of the user, the invention provides an illegal automatic calling shielding scheme, which is characterized in that a voice authentication device is additionally arranged on a local side network side, a called party applies for a voice incoming call authentication service, a calling side network device routes a call aiming at the called user to the voice authentication device, the voice authentication device carries out incoming call authentication of the calling party, the illegal automatic call which is not authenticated is intercepted, only the normal manual call which is authenticated is allowed to start to call a terminal of the called user, and thus, a large number of illegal automatic incoming calls can be shielded, the illegal infringement problem of the automatic calling software such as 'call death' and the like is solved, and the incoming call of the normal calling user is not influenced. The shielding scheme is specifically described below.
Fig. 1 is a flow chart illustrating an embodiment of a method for shielding an illegal automatic call according to the present invention.
As shown in fig. 1, the illegal automatic call screening method of the present embodiment includes:
s101, the voice authentication equipment receives a call aiming at a called user.
Specifically, the calling side network device determines whether the called user applies for the voice incoming call authentication service, and if the determination result is that the called user applies for the voice incoming call authentication service, the call for the called user is routed to the voice authentication device.
S102, the voice authentication equipment authenticates the calling user of the call.
S103, if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user.
S104, if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
Aiming at the step S102, the invention provides the following three authentication schemes:
white list static authentication scheme: the voice authentication equipment carries out white list static authentication on the calling party of the call, and the authentication method comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
The white list static authentication scheme sets a white list by a called user, and the calling user can realize authentication without additional operation.
(II) dynamic authentication scheme: the voice authentication equipment carries out dynamic authentication on the calling party of the call, and comprises the following steps: the method comprises the steps of carrying out voice authentication prompt on a calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation (such as an answer of simple addition) or an answer of a called setting question (such as requiring to input the birthday of a called party), receiving authentication information input by the calling party, judging whether the input of the calling party is correct or not, if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
The dynamic authentication scheme requires the calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced.
And (III) the authentication scheme combining the white list static authentication and the dynamic authentication comprises the following steps: the voice authentication equipment firstly carries out white list static authentication on the calling user of the call, and then carries out dynamic authentication on the calling user of the call if the static authentication is not passed.
The combined authentication scheme can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the white list setting, so that the input operation of the calling users is reduced, and can also give consideration to the normal calling requirements of other calling users through dynamic authentication, so that normal users outside the white list can call a called user.
The third authentication scheme is taken as an example to describe the illegal automatic call screening method of the present invention.
Fig. 2 is a flowchart illustrating a method for shielding an illegal automatic call according to another embodiment of the present invention.
As shown in fig. 2, the illegal automatic call screening method of the present embodiment includes:
s201, when the calling side network device receives the call aiming at the called user, the calling side network device judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the calling aiming at the called user is routed to the voice authentication device so as to authenticate the calling user of the calling.
S202, the voice authentication equipment receives a call aiming at a called user.
S203, the voice authentication equipment performs white list static authentication on the calling user of the call: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and executing S205; if not, the authentication is not passed and S204 is performed.
S204, the voice authentication equipment performs dynamic authentication on the calling user of the call: performing voice authentication prompt on a calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, judging whether the input of the calling party is correct or not, if the input is correct, passing the authentication, and executing S205; if the input is wrong, the authentication is not passed, and S206 is performed.
And S205, the call is a normal manual call, and the calling user is allowed to call the called user.
S206, the call is illegal automatic call, and the call is intercepted.
In order to make the solution of the present invention clearer, the method for shielding illegal automatic call of the present invention is described below with reference to fig. 3.
Fig. 3 is an information interaction diagram of another embodiment of the illegal automatic call screening method of the present invention.
As shown in fig. 3, the illegal automatic call screening method of the present embodiment includes:
s301, a calling party initiates a call aiming at a called party to a calling side network device.
S302, the network device at the calling side initiates the network authentication at the called side to the called HLR (home location register).
S303, the HLR determines whether the called user applies for the voice incoming authentication service.
S304, the HLR returns the authentication result of the called party to the network equipment of the calling side.
S305, the calling side network device receives the called authentication result, if the called user applies for the voice call-in authentication service, the call aiming at the called user is routed to the voice authentication device, so as to authenticate the calling user of the call.
S306, the voice authentication device judges whether the calling number is in the white list set by the called user, if so, the authentication is passed, the calling user is allowed to call the called user, and the step S310 is executed.
S307, if the answer is not in the white list, the voice authentication device carries out voice authentication prompt on the calling user, and the calling user is required to input a random authentication code or an answer of mathematical operation or an answer of a called set question.
S308, the voice authentication equipment receives the authentication information input by the calling user.
S309, the voice authentication equipment judges whether the input of the calling user is correct, if so, the authentication is passed, the calling user is allowed to call the called user, and the step S310 is executed; if the input is wrong, the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
And S310, calling the called user normally.
Fig. 4 is a schematic structural diagram of an embodiment of the illegal automatic call screening system according to the present invention.
As shown in fig. 4, the illegal automatic call screening system of the present embodiment includes: a calling side network device 40 and a voice authentication device 50.
The calling side network device 40 is used to route the call for the called user to the voice authentication device. Specifically, when receiving a call for a called user, the calling side network device 40 determines whether the called user applies for a voice call authentication service, and routes the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
As shown in fig. 5, the voice authentication apparatus 50 includes:
a receiving module 501, configured to receive a call, which is routed by a network device at a calling side and is addressed to a called user;
an authentication module 502, configured to authenticate a calling party of the call;
the processing module 503 is configured to, if the authentication is passed, determine that the call is a normal manual call, and allow the calling party to call the called party; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
In one case, the authentication module 502 includes: the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
In yet another case, the authentication module 502 includes: the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
In yet another case, the authentication module 502 includes: a calling user filtering unit and a calling authentication interaction unit; the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call; the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed; wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
The processing module 503 includes a voice call unit and an interception unit. The voice call unit is used for allowing the calling party to call the called party and performing a normal call process when the authentication of the authentication module 502 is passed. The interception unit is configured to intercept the call when the authentication of the authentication module 502 fails.
Fig. 6 is a schematic diagram of the voice authentication device 50 and its constituent modules and units in a third authentication mode.
As shown in fig. 6, the receiving module 501 receives a call for a called user, which is routed by a network device at a calling side, and the authenticating module 502 authenticates the calling user of the call: firstly, the calling subscriber filtering unit judges whether the calling number is in the white list, if so, the authentication is passed, and the voice calling unit in the processing module 503 performs a normal calling process; if not in the white list, the calling authentication interaction unit requests the user to input authentication information and judges whether the authentication information input by the user is correct, if so, the authentication is passed, and the voice call unit in the processing module 503 performs a normal call process; if the input is incorrect, the authentication is not passed and the call is intercepted by an interception element in the processing block 503.
The invention adds voice authentication equipment on the local side network, after the called party applies for the voice incoming call authentication service, the calling side network equipment routes the call aiming at the called party to the voice authentication equipment, the voice authentication equipment authenticates the incoming call of the calling party, intercepts the illegal automatic call which is not authenticated, and allows the terminal of the called party to be called only by the normal manual call which is authenticated, thus shielding a large amount of illegal automatic incoming calls, solving the illegal infringement problem of automatic calling software such as 'call death' and the like, and not influencing the incoming call of the normal calling party.
In addition, the invention provides three authentication schemes, wherein the white list static authentication scheme is set by the called user, and the calling user can realize authentication without additional operation; the dynamic authentication scheme requires a calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced; the authentication scheme combining the static authentication and the dynamic authentication of the white list can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the setting of the white list, so that the input operation of the calling users is reduced, and can also consider the normal calling requirements of other calling users through the dynamic authentication, so that normal users outside the white list can call the called party.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (9)

1. A shielding method for illegal automatic call includes:
the voice authentication equipment receives a call aiming at a called user;
the voice authentication equipment authenticates the calling user of the call;
if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user;
if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
2. The method of claim 1, further comprising:
when receiving a call for a called user, the network equipment at the calling side judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the network equipment at the calling side routes the call for the called user to the voice authentication equipment so as to authenticate the calling user of the call.
3. The method of claim 1, wherein authenticating the calling party of the call by the voice authentication device comprises:
the voice authentication equipment carries out white list static authentication on the calling user of the call;
or,
the voice authentication equipment carries out dynamic authentication on the calling user of the call;
or,
the voice authentication equipment performs white list static authentication on the calling user of the call, and performs dynamic authentication on the calling user of the call if the static authentication fails;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
4. A voice authentication device comprising:
the receiving module is used for receiving a call aiming at a called user;
the authentication module is used for authenticating the calling party of the call;
the processing module is used for allowing the calling user to call the called user if the authentication is passed and the call is a normal manual call; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
5. The voice authentication device of claim 4, wherein the authentication module comprises:
the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
6. The voice authentication device of claim 4, wherein the authentication module comprises:
the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
7. The voice authentication device of claim 4, wherein the authentication module comprises: a calling user filtering unit and a calling authentication interaction unit;
the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
8. A screening system for illegal automatic calls, comprising: the voice authentication device and the calling side network device of any one of claims 4-7, the calling side network device to route a call for a called user to the voice authentication device.
9. The system of claim 8,
the calling side network device is specifically configured to determine whether the called user applies for the voice call authentication service when receiving a call for the called user, and route the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
CN201310282345.6A 2013-07-08 2013-07-08 Illegal automatic call shielding method and system and voice authentication equipment Pending CN104283851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310282345.6A CN104283851A (en) 2013-07-08 2013-07-08 Illegal automatic call shielding method and system and voice authentication equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310282345.6A CN104283851A (en) 2013-07-08 2013-07-08 Illegal automatic call shielding method and system and voice authentication equipment

Publications (1)

Publication Number Publication Date
CN104283851A true CN104283851A (en) 2015-01-14

Family

ID=52258336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310282345.6A Pending CN104283851A (en) 2013-07-08 2013-07-08 Illegal automatic call shielding method and system and voice authentication equipment

Country Status (1)

Country Link
CN (1) CN104283851A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812537A (en) * 2016-05-11 2016-07-27 浙江鹏信信息科技股份有限公司 System and method for processing malicious calls
CN106506769A (en) * 2016-10-08 2017-03-15 浙江鹏信信息科技股份有限公司 A kind of utilization real time algorithm realizes the method and system that malicious call is filtered
CN108696832A (en) * 2017-04-06 2018-10-23 中国移动通信有限公司研究院 Call handling method, device and equipment, computer readable storage medium
CN108924335A (en) * 2017-03-23 2018-11-30 中科创达软件股份有限公司 A kind of calling-control method, system and mobile terminal
CN109429227A (en) * 2017-06-20 2019-03-05 中国移动通信有限公司研究院 A kind of signal processing method, device, equipment and computer readable storage medium
CN112837448A (en) * 2020-12-31 2021-05-25 成都四海万联智能电子设备有限公司 Vehicle sharing system of multifunctional Bluetooth key
CN115529580A (en) * 2021-06-08 2022-12-27 中国移动通信集团重庆有限公司 Directional voice calling method, device, system, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708073A (en) * 2004-06-07 2005-12-14 华为技术有限公司 Incoming calling receiving method
US20060120345A1 (en) * 2004-12-06 2006-06-08 Jongmo Sung Caller identification method, and billing system and method using the same in internet telephony
CN1913686A (en) * 2006-08-23 2007-02-14 中国移动通信集团公司 Calling method of mobile terminal
CN101925027A (en) * 2010-02-09 2010-12-22 熊文俊 Called user subscription information-based telephone disturbance-free method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708073A (en) * 2004-06-07 2005-12-14 华为技术有限公司 Incoming calling receiving method
US20060120345A1 (en) * 2004-12-06 2006-06-08 Jongmo Sung Caller identification method, and billing system and method using the same in internet telephony
CN1913686A (en) * 2006-08-23 2007-02-14 中国移动通信集团公司 Calling method of mobile terminal
CN101925027A (en) * 2010-02-09 2010-12-22 熊文俊 Called user subscription information-based telephone disturbance-free method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812537A (en) * 2016-05-11 2016-07-27 浙江鹏信信息科技股份有限公司 System and method for processing malicious calls
CN106506769A (en) * 2016-10-08 2017-03-15 浙江鹏信信息科技股份有限公司 A kind of utilization real time algorithm realizes the method and system that malicious call is filtered
CN106506769B (en) * 2016-10-08 2019-01-04 浙江鹏信信息科技股份有限公司 A kind of method and system for realizing malicious call filtering using real time algorithm
CN108924335A (en) * 2017-03-23 2018-11-30 中科创达软件股份有限公司 A kind of calling-control method, system and mobile terminal
CN108696832A (en) * 2017-04-06 2018-10-23 中国移动通信有限公司研究院 Call handling method, device and equipment, computer readable storage medium
CN109429227A (en) * 2017-06-20 2019-03-05 中国移动通信有限公司研究院 A kind of signal processing method, device, equipment and computer readable storage medium
CN109429227B (en) * 2017-06-20 2022-03-08 中国移动通信有限公司研究院 Signal processing method, device, equipment and computer readable storage medium
CN112837448A (en) * 2020-12-31 2021-05-25 成都四海万联智能电子设备有限公司 Vehicle sharing system of multifunctional Bluetooth key
CN115529580A (en) * 2021-06-08 2022-12-27 中国移动通信集团重庆有限公司 Directional voice calling method, device, system, equipment and storage medium
CN115529580B (en) * 2021-06-08 2024-05-03 中国移动通信集团重庆有限公司 Directional voice call method, device, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104283851A (en) Illegal automatic call shielding method and system and voice authentication equipment
US8135119B1 (en) Techniques for protecting telephone users from caller ID spoofing attacks
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
CN106302927A (en) The voice call platform that two-way number is hidden
WO2010019604A2 (en) Systems and methods of initiating a call
CN105187606A (en) Method for preventing crank calls based on identity authentication
CN105307158B (en) A kind of auth method of the phone number of communication terminal
CN113067859B (en) Communication method and device based on cloud mobile phone
US9942391B2 (en) Conference access method and apparatus
EP2963957B1 (en) Method and device for calling by binding client to terminal
CN114070939A (en) Network voice call method, system, storage medium and server
CN111327752B (en) Call processing method, device, communication system and storage medium
RU2439702C2 (en) Method to execute transaction between two servers with pre-check of validity by means of two mobile telephones
US9326113B2 (en) Network device, called terminal, and method for processing third-party call
CN108881113B (en) Network connection control method and device
US10972605B2 (en) Signature based communication authentication
CN113489707B (en) Call processing method, device, equipment and storage medium
KR101194998B1 (en) Service providing system and method for preventing phishing between mobile terminals
CN104967605A (en) Privacy protection method and privacy protection device
CN105472186A (en) Communication method and system established in number transmission manner
CN107770772B (en) A kind of method and apparatus that unaware certification online is realized by APP
CN104301567B (en) Network communication method and system
CN108834149B (en) Processing method, processing equipment and system
KR20090126798A (en) Login authentication method using origination to communication terminal
CN107995587B (en) Authentication method, authentication platform, authentication system and service provider platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150114