CN104283851A - Illegal automatic call shielding method and system and voice authentication equipment - Google Patents
Illegal automatic call shielding method and system and voice authentication equipment Download PDFInfo
- Publication number
- CN104283851A CN104283851A CN201310282345.6A CN201310282345A CN104283851A CN 104283851 A CN104283851 A CN 104283851A CN 201310282345 A CN201310282345 A CN 201310282345A CN 104283851 A CN104283851 A CN 104283851A
- Authority
- CN
- China
- Prior art keywords
- authentication
- call
- calling
- voice
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000003068 static effect Effects 0.000 claims description 31
- 230000008569 process Effects 0.000 claims description 13
- 238000012216 screening Methods 0.000 claims description 11
- 238000001914 filtration Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 7
- 230000003993 interaction Effects 0.000 claims description 6
- 230000002452 interceptive effect Effects 0.000 claims description 6
- 238000010295 mobile communication Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an illegal automatic call shielding method and system and voice authentication equipment and relates to the field of mobile communication safety. According to the illegal automatic call shielding method and system and the voice authentication equipment, the voice authentication equipment is additionally arranged on the local end network side, after a called user applies for voice incoming call authentication services, calls of the called user are routed to the voice authentication equipment through calling side network equipment, in coming call authentication of a calling party is conducted by the voice authentication equipment, the illegal automatic calls with authentication failed are intercepted, only the normal manual calls with the authentication passed are allowed to start calling a terminal of the called user. Thus, a large amount of illegal automatic incoming calls can be shielded, the problems of illegal infringements of automatic call software such as call death is solved, and meanwhile the incoming calls of normal calling users are not influenced.
Description
Technical Field
The invention relates to the field of mobile communication safety, in particular to a shielding method and a shielding system for illegal automatic calls and a voice authentication device.
Background
VOIP network telephone is a voice service based on IP data packet, which makes user transmit voice, fax, video and data services through internet free or with low charge.
At present, some automatic calling software such as 'call death', also called network telephone automatic calling system, uses network telephone with low communication cost as calling platform, adopts advanced network telephone communication technology, can conveniently call any fixed telephone and mobile phone number in any area.
Some illegal persons use automatic calling software such as 'call death' to carry out a large number of illegal calls for specific users and carry out illegal actions such as extirpation, extirpation and lasso, so that the called users are not capable of applying except shutdown and number changing, and the normal conversation of the users is seriously influenced. Therefore, there is a need for a solution that can automatically identify and mask illegal automatic calls.
Disclosure of Invention
The embodiment of the invention aims to solve the technical problem that: the problem that some automatic calling software is illegally utilized, a large number of illegal calls are carried out aiming at a specific user, and normal conversation of the user is influenced is solved.
According to an aspect of an embodiment of the present invention, a method for shielding an illegal automatic call is provided, including: the voice authentication equipment receives a call aiming at a called user; the voice authentication equipment authenticates the calling user of the call; if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
The illegal automatic call shielding method further comprises the following steps: when receiving a call for a called user, the network equipment at the calling side judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the network equipment at the calling side routes the call for the called user to the voice authentication equipment so as to authenticate the calling user of the call.
Wherein, the authentication of the calling user of the call by the voice authentication device comprises:
the voice authentication equipment carries out white list static authentication on the calling user of the call;
or,
the voice authentication equipment carries out dynamic authentication on the calling user of the call;
or,
the voice authentication equipment performs white list static authentication on the calling user of the call, and performs dynamic authentication on the calling user of the call if the static authentication fails;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
According to still another aspect of the embodiments of the present invention, there is provided a voice authentication apparatus, including: the receiving module is used for receiving a call aiming at a called user; the authentication module is used for authenticating the calling party of the call; the processing module is used for allowing the calling user to call the called user if the authentication is passed and the call is a normal manual call; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
In one aspect, an authentication module comprises: the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
In yet another case, the authentication module includes: the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
In yet another case, the authentication module includes: a calling user filtering unit and a calling authentication interaction unit; the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call; the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed; wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
According to another aspect of the embodiments of the present invention, there is provided an illegal automatic call screening system, including: the voice authentication device and the calling side network device are used for routing a call for a called user to the voice authentication device.
The calling side network device is specifically configured to determine whether the called user applies for the voice call authentication service when receiving a call for the called user, and route the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
The invention adds voice authentication equipment on the local side network, after the called party applies for the voice incoming call authentication service, the calling side network equipment routes the call aiming at the called party to the voice authentication equipment, the voice authentication equipment authenticates the incoming call of the calling party, intercepts the illegal automatic call which is not authenticated, and allows the terminal of the called party to be called only by the normal manual call which is authenticated, thus shielding a large amount of illegal automatic incoming calls, solving the illegal infringement problem of automatic calling software such as 'call death' and the like, and not influencing the incoming call of the normal calling party.
In addition, the invention provides three authentication schemes, wherein the white list static authentication scheme is set by the called user, and the calling user can realize authentication without additional operation; the dynamic authentication scheme requires a calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced; the authentication scheme combining the static authentication and the dynamic authentication of the white list can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the setting of the white list, so that the input operation of the calling users is reduced, and can also consider the normal calling requirements of other calling users through the dynamic authentication, so that normal users outside the white list can call the called party.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flow chart illustrating an embodiment of a method for shielding an illegal automatic call according to the present invention.
Fig. 2 is a flowchart illustrating a method for shielding an illegal automatic call according to another embodiment of the present invention.
Fig. 3 is an information interaction diagram of another embodiment of the illegal automatic call screening method of the present invention.
Fig. 4 is a schematic structural diagram of an embodiment of the illegal automatic call screening system according to the present invention.
Fig. 5 is a schematic structural diagram of an embodiment of the voice authentication device of the present invention.
Fig. 6 is a schematic diagram of the operation flow of the voice authentication device and its constituent modules and units in the third authentication mode of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problem that some automatic calling software is illegally utilized and a large number of illegal calls are carried out aiming at a specific user to influence the normal conversation of the user, the invention provides an illegal automatic calling shielding scheme, which is characterized in that a voice authentication device is additionally arranged on a local side network side, a called party applies for a voice incoming call authentication service, a calling side network device routes a call aiming at the called user to the voice authentication device, the voice authentication device carries out incoming call authentication of the calling party, the illegal automatic call which is not authenticated is intercepted, only the normal manual call which is authenticated is allowed to start to call a terminal of the called user, and thus, a large number of illegal automatic incoming calls can be shielded, the illegal infringement problem of the automatic calling software such as 'call death' and the like is solved, and the incoming call of the normal calling user is not influenced. The shielding scheme is specifically described below.
Fig. 1 is a flow chart illustrating an embodiment of a method for shielding an illegal automatic call according to the present invention.
As shown in fig. 1, the illegal automatic call screening method of the present embodiment includes:
s101, the voice authentication equipment receives a call aiming at a called user.
Specifically, the calling side network device determines whether the called user applies for the voice incoming call authentication service, and if the determination result is that the called user applies for the voice incoming call authentication service, the call for the called user is routed to the voice authentication device.
S102, the voice authentication equipment authenticates the calling user of the call.
S103, if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user.
S104, if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
Aiming at the step S102, the invention provides the following three authentication schemes:
white list static authentication scheme: the voice authentication equipment carries out white list static authentication on the calling party of the call, and the authentication method comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
The white list static authentication scheme sets a white list by a called user, and the calling user can realize authentication without additional operation.
(II) dynamic authentication scheme: the voice authentication equipment carries out dynamic authentication on the calling party of the call, and comprises the following steps: the method comprises the steps of carrying out voice authentication prompt on a calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation (such as an answer of simple addition) or an answer of a called setting question (such as requiring to input the birthday of a called party), receiving authentication information input by the calling party, judging whether the input of the calling party is correct or not, if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
The dynamic authentication scheme requires the calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced.
And (III) the authentication scheme combining the white list static authentication and the dynamic authentication comprises the following steps: the voice authentication equipment firstly carries out white list static authentication on the calling user of the call, and then carries out dynamic authentication on the calling user of the call if the static authentication is not passed.
The combined authentication scheme can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the white list setting, so that the input operation of the calling users is reduced, and can also give consideration to the normal calling requirements of other calling users through dynamic authentication, so that normal users outside the white list can call a called user.
The third authentication scheme is taken as an example to describe the illegal automatic call screening method of the present invention.
Fig. 2 is a flowchart illustrating a method for shielding an illegal automatic call according to another embodiment of the present invention.
As shown in fig. 2, the illegal automatic call screening method of the present embodiment includes:
s201, when the calling side network device receives the call aiming at the called user, the calling side network device judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the calling aiming at the called user is routed to the voice authentication device so as to authenticate the calling user of the calling.
S202, the voice authentication equipment receives a call aiming at a called user.
S203, the voice authentication equipment performs white list static authentication on the calling user of the call: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and executing S205; if not, the authentication is not passed and S204 is performed.
S204, the voice authentication equipment performs dynamic authentication on the calling user of the call: performing voice authentication prompt on a calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, judging whether the input of the calling party is correct or not, if the input is correct, passing the authentication, and executing S205; if the input is wrong, the authentication is not passed, and S206 is performed.
And S205, the call is a normal manual call, and the calling user is allowed to call the called user.
S206, the call is illegal automatic call, and the call is intercepted.
In order to make the solution of the present invention clearer, the method for shielding illegal automatic call of the present invention is described below with reference to fig. 3.
Fig. 3 is an information interaction diagram of another embodiment of the illegal automatic call screening method of the present invention.
As shown in fig. 3, the illegal automatic call screening method of the present embodiment includes:
s301, a calling party initiates a call aiming at a called party to a calling side network device.
S302, the network device at the calling side initiates the network authentication at the called side to the called HLR (home location register).
S303, the HLR determines whether the called user applies for the voice incoming authentication service.
S304, the HLR returns the authentication result of the called party to the network equipment of the calling side.
S305, the calling side network device receives the called authentication result, if the called user applies for the voice call-in authentication service, the call aiming at the called user is routed to the voice authentication device, so as to authenticate the calling user of the call.
S306, the voice authentication device judges whether the calling number is in the white list set by the called user, if so, the authentication is passed, the calling user is allowed to call the called user, and the step S310 is executed.
S307, if the answer is not in the white list, the voice authentication device carries out voice authentication prompt on the calling user, and the calling user is required to input a random authentication code or an answer of mathematical operation or an answer of a called set question.
S308, the voice authentication equipment receives the authentication information input by the calling user.
S309, the voice authentication equipment judges whether the input of the calling user is correct, if so, the authentication is passed, the calling user is allowed to call the called user, and the step S310 is executed; if the input is wrong, the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
And S310, calling the called user normally.
Fig. 4 is a schematic structural diagram of an embodiment of the illegal automatic call screening system according to the present invention.
As shown in fig. 4, the illegal automatic call screening system of the present embodiment includes: a calling side network device 40 and a voice authentication device 50.
The calling side network device 40 is used to route the call for the called user to the voice authentication device. Specifically, when receiving a call for a called user, the calling side network device 40 determines whether the called user applies for a voice call authentication service, and routes the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
As shown in fig. 5, the voice authentication apparatus 50 includes:
a receiving module 501, configured to receive a call, which is routed by a network device at a calling side and is addressed to a called user;
an authentication module 502, configured to authenticate a calling party of the call;
the processing module 503 is configured to, if the authentication is passed, determine that the call is a normal manual call, and allow the calling party to call the called party; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
In one case, the authentication module 502 includes: the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
In yet another case, the authentication module 502 includes: the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
In yet another case, the authentication module 502 includes: a calling user filtering unit and a calling authentication interaction unit; the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call; the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed; wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
The processing module 503 includes a voice call unit and an interception unit. The voice call unit is used for allowing the calling party to call the called party and performing a normal call process when the authentication of the authentication module 502 is passed. The interception unit is configured to intercept the call when the authentication of the authentication module 502 fails.
Fig. 6 is a schematic diagram of the voice authentication device 50 and its constituent modules and units in a third authentication mode.
As shown in fig. 6, the receiving module 501 receives a call for a called user, which is routed by a network device at a calling side, and the authenticating module 502 authenticates the calling user of the call: firstly, the calling subscriber filtering unit judges whether the calling number is in the white list, if so, the authentication is passed, and the voice calling unit in the processing module 503 performs a normal calling process; if not in the white list, the calling authentication interaction unit requests the user to input authentication information and judges whether the authentication information input by the user is correct, if so, the authentication is passed, and the voice call unit in the processing module 503 performs a normal call process; if the input is incorrect, the authentication is not passed and the call is intercepted by an interception element in the processing block 503.
The invention adds voice authentication equipment on the local side network, after the called party applies for the voice incoming call authentication service, the calling side network equipment routes the call aiming at the called party to the voice authentication equipment, the voice authentication equipment authenticates the incoming call of the calling party, intercepts the illegal automatic call which is not authenticated, and allows the terminal of the called party to be called only by the normal manual call which is authenticated, thus shielding a large amount of illegal automatic incoming calls, solving the illegal infringement problem of automatic calling software such as 'call death' and the like, and not influencing the incoming call of the normal calling party.
In addition, the invention provides three authentication schemes, wherein the white list static authentication scheme is set by the called user, and the calling user can realize authentication without additional operation; the dynamic authentication scheme requires a calling user to input a random authentication code or an answer of mathematical operation or an answer of a called setting question for authentication, so that the setting work of the called user can be reduced; the authentication scheme combining the static authentication and the dynamic authentication of the white list can ensure that calling users who are frequently contacted with a called party do not need to input authentication information every time through the setting of the white list, so that the input operation of the calling users is reduced, and can also consider the normal calling requirements of other calling users through the dynamic authentication, so that normal users outside the white list can call the called party.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (9)
1. A shielding method for illegal automatic call includes:
the voice authentication equipment receives a call aiming at a called user;
the voice authentication equipment authenticates the calling user of the call;
if the authentication is passed, the call is a normal manual call, and the calling user is allowed to call the called user;
if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
2. The method of claim 1, further comprising:
when receiving a call for a called user, the network equipment at the calling side judges whether the called user applies for the voice call-in authentication service, if the judgment result is that the called user applies for the voice call-in authentication service, the network equipment at the calling side routes the call for the called user to the voice authentication equipment so as to authenticate the calling user of the call.
3. The method of claim 1, wherein authenticating the calling party of the call by the voice authentication device comprises:
the voice authentication equipment carries out white list static authentication on the calling user of the call;
or,
the voice authentication equipment carries out dynamic authentication on the calling user of the call;
or,
the voice authentication equipment performs white list static authentication on the calling user of the call, and performs dynamic authentication on the calling user of the call if the static authentication fails;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
4. A voice authentication device comprising:
the receiving module is used for receiving a call aiming at a called user;
the authentication module is used for authenticating the calling party of the call;
the processing module is used for allowing the calling user to call the called user if the authentication is passed and the call is a normal manual call; if the authentication is not passed, the call is an illegal automatic call, and the call is intercepted.
5. The voice authentication device of claim 4, wherein the authentication module comprises:
the calling subscriber filtering unit is used for carrying out white list static authentication on the calling subscriber of the call, and comprises the following steps: and judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed.
6. The voice authentication device of claim 4, wherein the authentication module comprises:
the calling authentication interactive unit is used for carrying out dynamic authentication on a calling user of the call, and comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
7. The voice authentication device of claim 4, wherein the authentication module comprises: a calling user filtering unit and a calling authentication interaction unit;
the calling user filtering unit firstly carries out white list static authentication on the calling user of the call, and if the static authentication is not passed, the calling authentication interactive unit carries out dynamic authentication on the calling user of the call;
the white list static authentication process comprises the following steps: judging whether the calling number is in a white list set by the called user, if so, the authentication is passed, and if not, the authentication is not passed;
wherein, the dynamic authentication process comprises: and carrying out voice authentication prompt on the calling party, requiring the calling party to input a random authentication code or an answer of mathematical operation or an answer of a called setting question, receiving authentication information input by the calling party, and judging whether the input of the calling party is correct or not, wherein if the input is correct, the authentication is passed, and if the input is wrong, the authentication is not passed.
8. A screening system for illegal automatic calls, comprising: the voice authentication device and the calling side network device of any one of claims 4-7, the calling side network device to route a call for a called user to the voice authentication device.
9. The system of claim 8,
the calling side network device is specifically configured to determine whether the called user applies for the voice call authentication service when receiving a call for the called user, and route the call for the called user to the voice authentication device if the determination result is that the called user applies for the voice call authentication service, so as to authenticate the calling user of the call.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310282345.6A CN104283851A (en) | 2013-07-08 | 2013-07-08 | Illegal automatic call shielding method and system and voice authentication equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310282345.6A CN104283851A (en) | 2013-07-08 | 2013-07-08 | Illegal automatic call shielding method and system and voice authentication equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104283851A true CN104283851A (en) | 2015-01-14 |
Family
ID=52258336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310282345.6A Pending CN104283851A (en) | 2013-07-08 | 2013-07-08 | Illegal automatic call shielding method and system and voice authentication equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104283851A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812537A (en) * | 2016-05-11 | 2016-07-27 | 浙江鹏信信息科技股份有限公司 | System and method for processing malicious calls |
CN106506769A (en) * | 2016-10-08 | 2017-03-15 | 浙江鹏信信息科技股份有限公司 | A kind of utilization real time algorithm realizes the method and system that malicious call is filtered |
CN108696832A (en) * | 2017-04-06 | 2018-10-23 | 中国移动通信有限公司研究院 | Call handling method, device and equipment, computer readable storage medium |
CN108924335A (en) * | 2017-03-23 | 2018-11-30 | 中科创达软件股份有限公司 | A kind of calling-control method, system and mobile terminal |
CN109429227A (en) * | 2017-06-20 | 2019-03-05 | 中国移动通信有限公司研究院 | A kind of signal processing method, device, equipment and computer readable storage medium |
CN112837448A (en) * | 2020-12-31 | 2021-05-25 | 成都四海万联智能电子设备有限公司 | Vehicle sharing system of multifunctional Bluetooth key |
CN115529580A (en) * | 2021-06-08 | 2022-12-27 | 中国移动通信集团重庆有限公司 | Directional voice calling method, device, system, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708073A (en) * | 2004-06-07 | 2005-12-14 | 华为技术有限公司 | Incoming calling receiving method |
US20060120345A1 (en) * | 2004-12-06 | 2006-06-08 | Jongmo Sung | Caller identification method, and billing system and method using the same in internet telephony |
CN1913686A (en) * | 2006-08-23 | 2007-02-14 | 中国移动通信集团公司 | Calling method of mobile terminal |
CN101925027A (en) * | 2010-02-09 | 2010-12-22 | 熊文俊 | Called user subscription information-based telephone disturbance-free method |
-
2013
- 2013-07-08 CN CN201310282345.6A patent/CN104283851A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708073A (en) * | 2004-06-07 | 2005-12-14 | 华为技术有限公司 | Incoming calling receiving method |
US20060120345A1 (en) * | 2004-12-06 | 2006-06-08 | Jongmo Sung | Caller identification method, and billing system and method using the same in internet telephony |
CN1913686A (en) * | 2006-08-23 | 2007-02-14 | 中国移动通信集团公司 | Calling method of mobile terminal |
CN101925027A (en) * | 2010-02-09 | 2010-12-22 | 熊文俊 | Called user subscription information-based telephone disturbance-free method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812537A (en) * | 2016-05-11 | 2016-07-27 | 浙江鹏信信息科技股份有限公司 | System and method for processing malicious calls |
CN106506769A (en) * | 2016-10-08 | 2017-03-15 | 浙江鹏信信息科技股份有限公司 | A kind of utilization real time algorithm realizes the method and system that malicious call is filtered |
CN106506769B (en) * | 2016-10-08 | 2019-01-04 | 浙江鹏信信息科技股份有限公司 | A kind of method and system for realizing malicious call filtering using real time algorithm |
CN108924335A (en) * | 2017-03-23 | 2018-11-30 | 中科创达软件股份有限公司 | A kind of calling-control method, system and mobile terminal |
CN108696832A (en) * | 2017-04-06 | 2018-10-23 | 中国移动通信有限公司研究院 | Call handling method, device and equipment, computer readable storage medium |
CN109429227A (en) * | 2017-06-20 | 2019-03-05 | 中国移动通信有限公司研究院 | A kind of signal processing method, device, equipment and computer readable storage medium |
CN109429227B (en) * | 2017-06-20 | 2022-03-08 | 中国移动通信有限公司研究院 | Signal processing method, device, equipment and computer readable storage medium |
CN112837448A (en) * | 2020-12-31 | 2021-05-25 | 成都四海万联智能电子设备有限公司 | Vehicle sharing system of multifunctional Bluetooth key |
CN115529580A (en) * | 2021-06-08 | 2022-12-27 | 中国移动通信集团重庆有限公司 | Directional voice calling method, device, system, equipment and storage medium |
CN115529580B (en) * | 2021-06-08 | 2024-05-03 | 中国移动通信集团重庆有限公司 | Directional voice call method, device, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104283851A (en) | Illegal automatic call shielding method and system and voice authentication equipment | |
US8135119B1 (en) | Techniques for protecting telephone users from caller ID spoofing attacks | |
EP3162104B1 (en) | A method to authenticate calls in a telecommunication system | |
CN106302927A (en) | The voice call platform that two-way number is hidden | |
WO2010019604A2 (en) | Systems and methods of initiating a call | |
CN105187606A (en) | Method for preventing crank calls based on identity authentication | |
CN105307158B (en) | A kind of auth method of the phone number of communication terminal | |
CN113067859B (en) | Communication method and device based on cloud mobile phone | |
US9942391B2 (en) | Conference access method and apparatus | |
EP2963957B1 (en) | Method and device for calling by binding client to terminal | |
CN114070939A (en) | Network voice call method, system, storage medium and server | |
CN111327752B (en) | Call processing method, device, communication system and storage medium | |
RU2439702C2 (en) | Method to execute transaction between two servers with pre-check of validity by means of two mobile telephones | |
US9326113B2 (en) | Network device, called terminal, and method for processing third-party call | |
CN108881113B (en) | Network connection control method and device | |
US10972605B2 (en) | Signature based communication authentication | |
CN113489707B (en) | Call processing method, device, equipment and storage medium | |
KR101194998B1 (en) | Service providing system and method for preventing phishing between mobile terminals | |
CN104967605A (en) | Privacy protection method and privacy protection device | |
CN105472186A (en) | Communication method and system established in number transmission manner | |
CN107770772B (en) | A kind of method and apparatus that unaware certification online is realized by APP | |
CN104301567B (en) | Network communication method and system | |
CN108834149B (en) | Processing method, processing equipment and system | |
KR20090126798A (en) | Login authentication method using origination to communication terminal | |
CN107995587B (en) | Authentication method, authentication platform, authentication system and service provider platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150114 |