CN108737622A - Monitoring method of conversing and device - Google Patents
Monitoring method of conversing and device Download PDFInfo
- Publication number
- CN108737622A CN108737622A CN201710244291.2A CN201710244291A CN108737622A CN 108737622 A CN108737622 A CN 108737622A CN 201710244291 A CN201710244291 A CN 201710244291A CN 108737622 A CN108737622 A CN 108737622A
- Authority
- CN
- China
- Prior art keywords
- call
- calling
- called
- threshold value
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 115
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000000903 blocking effect Effects 0.000 claims abstract description 12
- 238000012806 monitoring device Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 12
- 230000015654 memory Effects 0.000 description 15
- 230000011664 signaling Effects 0.000 description 13
- 230000003993 interaction Effects 0.000 description 11
- 238000012545 processing Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 230000006399 behavior Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000003542 behavioural effect Effects 0.000 description 4
- 238000000605 extraction Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005266 casting Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a kind of call monitoring method and devices, wherein this method includes:When calling number is initiated to converse to called number, judge that the called number whether there is in the default blacklist of harassing call;When the determination result is yes, call request of the calling number to the called number is intercepted.Through the invention, the technical problem that blocking disturbance call is not comprehensive enough in the related technology is solved.
Description
Technical field
The present invention relates to the communications fields, in particular to a kind of call monitoring method and device.
Background technology
With the development of the communication technology, the meanss of communication such as a mobile phone part indispensable in having become for people's lives, such as
Modern technology development has given the users of the meanss of communication such as vast mobile phone to bring great convenience;But often science and technology is one double
Sword sword, but also the more a kind of propagation of criminal, malice swindler and swindling channel, harassing call goes out therewith for convenient communication
It is existing, behavioral implications and annoying operator and users.
The specific manifestation of harassing call behavior is:Illegal user utilizes special installation or artificial malice to ordinary user, extensively
Make a phone call with casting net formula, once ring starts, soon hang up, wait for ordinary user call back with travel fraud tactics or
Malice collects telephone expenses;Or malicious dissemination invalid information etc..
In order to the impetus for inhibiting harassing call to grow in intensity, the behaviors such as swindle, malicious dissemination are prevented, in the related technology
Harassing call monitoring system give birth to therefrom.It utilizes the feature of harassing call, length, release when such as calling the high frequency, ring
Number is big, percent of call completed is low, caller accounting height etc., constructs monitoring strategies;Ticket is extracted, according to exhaling for calling subscribe and called subscriber
Behavior is cried, is matched with monitoring strategies, harassing call or offending user is filtered out, the rear subscriber number for confirming harassing and wrecking source, forbids
The number calling, and blacklist is added in the number;In subsequent monitoring processing procedure, first determine whether calling number whether
In blacklist, if there are the numbers in blacklist, directly forbid the number calling.However, it has been found that related
Monitoring method in technology is unable to control the harassing call of common calling number only using calling number as monitoring, interception object
Clawback behavior cannot efficiently control validated user and call back to disabled user, thus be likely to cause ordinary user
Harassing call is actively got through, to increase risk probability of the user by swindle (" being actively deceived ").
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Invention content
An embodiment of the present invention provides a kind of call monitoring method and devices, at least to solve to intercept harassing and wrecking in the related technology
The not comprehensive enough technical problem of phone.
According to one embodiment of present invention, a kind of call monitoring method is provided, including:In calling number to called number
When code initiates call, judge that the called number whether there is in the default blacklist of harassing call;It is yes in judging result
When, intercept call request of the calling number to the called number.
Optionally, before in judging the called number with the presence or absence of the default blacklist in harassing call, the side
Method further includes:Judge that the calling number whether there is in the default blacklist;When the determination result is yes, described in interception
Call of the calling number to the called number.
Optionally, the method further includes:When the called number does not exist in the default blacklist, institute is counted
State the call characteristic information of calling number;Judge whether the call characteristic information matches with the corresponding informance of monitoring strategies;?
In the case of matched, the calling number is added to the default blacklist.
Optionally, the call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, caller
Accounting, called rate of taking out stitches.
Optionally, the monitoring strategies include at least one of:The type of number, tactful cycle duration, calling frequency threshold
Value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
According to another embodiment of the invention, a kind of call monitoring device is provided, including:First judgment module is used
In when calling number is initiated to converse to called number, judging that the called number whether there is black name is preset in harassing call
Dan Zhong;First blocking module, for when the determination result is yes, intercepting the calling number and being asked to the calling of the called number
It asks.
Optionally, described device further includes:Second judgment module, it is described called for judging in first judgment module
Before number whether there is in the default blacklist of harassing call, judge that the calling number whether there is in described default black
In list;Second blocking module, for when the determination result is yes, intercepting the calling number and leading to the called number
Words.
Optionally, described device further includes:Statistical module, for not existing in the default black name in the called number
When in list, the call characteristic information of the calling number is counted;Third judgment module, for judge the call characteristic information with
Whether the corresponding informance of monitoring strategies matches;Add module, in the event of a match, the calling number being added to institute
State default blacklist.
Optionally, the call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, caller
Accounting, called rate of taking out stitches.
Optionally, the monitoring strategies include at least one of:The type of number, tactful cycle duration, calling frequency threshold
Value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is set as storage and uses
In the program code for executing following steps:
When calling number is initiated to converse to called number, judge that the called number whether there is in the pre- of harassing call
If in blacklist;
When the determination result is yes, call request of the calling number to the called number is intercepted.
Through the invention, calling number to called number initiate converse when, judge the called number whether there is in
In the default blacklist of harassing call;When the determination result is yes, calling of the calling number to the called number is intercepted
Request.The monitoring to called subscriber is introduced during monitoring, the attribute of called number is analyzed, and is prevented ordinary user and is returned
It dials, get through harassing and wrecking source Mobile Station International ISDN Number, with blocking disturbance call in all directions, it is not comprehensive enough to solve blocking disturbance call in the related technology
The technical issues of, harassing call interception rate is improved, the monitoring to further improve system prevents ability.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and is constituted part of this application, this hair
Bright illustrative embodiments and their description are not constituted improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the mobile terminal of call monitoring method of the embodiment of the present invention;
Fig. 2 is the flow chart of call monitoring method according to the ... of the embodiment of the present invention;
Fig. 3 is the structure diagram of call monitoring device according to the ... of the embodiment of the present invention;
Fig. 4 is the flow chart of harassing call monitoring method according to the ... of the embodiment of the present invention;
Fig. 5 is the configuration diagram of harassing call monitoring system according to the ... of the embodiment of the present invention.
Specific implementation mode
Come that the present invention will be described in detail below with reference to attached drawing and in conjunction with the embodiments.It should be noted that not conflicting
In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.
Embodiment 1
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
It calculates and is executed in device.For running on mobile terminals, Fig. 1 is a kind of movement of call monitoring method of the embodiment of the present invention
The hardware block diagram of terminal.As shown in Figure 1, mobile terminal 10 may include one or more (only showing one in figure) processing
Device 102 (processor 102 can include but is not limited to the processing unit of Micro-processor MCV or programmable logic device FPGA etc.),
Memory 104 for storing data and the transmitting device 106 for communication function.Those of ordinary skill in the art can be with
Understand, structure shown in FIG. 1 is only to illustrate, and does not cause to limit to the structure of above-mentioned electronic device.For example, mobile terminal 10
It may also include than shown in Fig. 1 more either less components or with the configuration different from shown in Fig. 1.
Memory 104 can be used for storing the software program and module of application software, such as the call in the embodiment of the present invention
Corresponding program instruction/the module of monitoring method, processor 102 by operation be stored in software program in memory 104 and
Module realizes above-mentioned method to perform various functions application and data processing.Memory 104 may include high speed with
Machine memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or other it is non-easily
The property lost solid-state memory.In some instances, memory 104 can further comprise remotely located relative to processor 102 deposit
Reservoir, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network is including but not limited to mutual
Networking, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 106 is used to receive via a network or transmission data.Above-mentioned network specific example may include
The wireless network that the communication providers of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation
Device (Network Interface Controller, NIC), can be connected with other network equipments by base station so as to it is mutual
Networking is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, use
In wirelessly being communicated with internet.
A kind of call monitoring method running on above-mentioned mobile terminal is provided in the present embodiment, and Fig. 2 is according to this hair
The flow chart of the call monitoring method of bright embodiment, as shown in Fig. 2, the flow includes the following steps:
Step S202 judges that called number whether there is in harassing and wrecking electricity when calling number is initiated to converse to called number
In the default blacklist of words;Default blacklist saves multiple harassing calls having determined;
Step S204 intercepts call request of the calling number to called number when the determination result is yes.
Through the above steps, when calling number is initiated to converse to called number, judge that the called number whether there is
In the default blacklist of harassing call;When the determination result is yes, the calling number is intercepted to exhale the called number
Cry request.The monitoring to called subscriber is introduced during monitoring, the attribute of called number is analyzed, and prevents ordinary user
Clawback gets through harassing and wrecking source Mobile Station International ISDN Number, and with blocking disturbance call in all directions, it is not complete enough to solve blocking disturbance call in the related technology
The technical issues of face, improves harassing call interception rate, and the monitoring to further improve system prevents ability.
Optionally, the executive agent of above-mentioned steps can be base station, terminal, access network elements, core network element etc., but not
It is limited to this.
Optionally, the default blacklist in the present embodiment includes harassing call set or risk Telephone Assembly, can be with
It is to be obtained from network side, can also includes what user was arranged in end side.
Optionally, before in judging called number with the presence or absence of the default blacklist in harassing call, alternatively, judging
(called number is not present in the default black of harassing call after called number whether there is in the default blacklist of harassing call
When in list), the method for the present embodiment further includes:
S11 judges that calling number whether there is in default blacklist;
S12 intercepts call of the calling number to called number when the determination result is yes.
In the optional embodiment according to the present embodiment, judging that it is black that called number does not exist in presetting for harassing call
When in list, alternatively, in judging the called number or calling number with the presence or absence of the default blacklist in harassing call it
Before, further include:
S21 counts the call characteristic information of calling number;
S22, judges whether call characteristic information matches with the corresponding informance of monitoring strategies;
Calling number is added to default blacklist by S23 in the event of a match.
Optionally, call characteristic information includes at least one of:The calling frequency, percent of call completed, release number, caller account for
Than, called rate of taking out stitches.
Optionally, the corresponding informance of monitoring strategies can be, but not limited to for:The type of number, tactful cycle duration, calling frequency
Subthreshold, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
Specifically, the type of number, analysis agent module is used to filter the type of number monitored needed for this monitoring strategies;
Tactful duration, analysis agent module to the calling frequency, the duration of call, the information such as ring duration carry out counting statistics and
The period of analysis;
Call frequency threshold value, the maximum number of calls that calling number allows in tactful duration;
Ratio is connected in percent of call completed threshold value, the minimum caller allowed in tactful duration;
Frequency threshold value is discharged, number is hung up in the maximum caller allowed in tactful duration;
Ring duration, the maximum caller ring duration allowed in tactful duration;
Caller accounting threshold value, the maximum caller accounting value in all calls allowed in tactful duration;
Called rate threshold value of taking out stitches, the phone that the caller allowed in tactful duration is hung up after putting through account for all caller calls
Maximum accounting value.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, technical scheme of the present invention is substantially in other words to existing
The part that technology contributes can be expressed in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of call monitoring device is additionally provided in the present embodiment, and the device is real for realizing above-described embodiment and preferably
Mode is applied, repeating no more for explanation had been carried out.As used below, the soft of predetermined function may be implemented in term " module "
The combination of part and/or hardware.Although device described in following embodiment is preferably realized with software, hardware, or
The realization of the combination of software and hardware is also that may and be contemplated.
Fig. 3 is the structure diagram of call monitoring device according to the ... of the embodiment of the present invention, as shown in figure 3, the device includes:
First judgment module 30, for when calling number is initiated to converse to called number, judging whether called number is deposited
It is in the default blacklist of harassing call;
First blocking module 32, for when the determination result is yes, intercepting call request of the calling number to called number.
Optionally, device further includes:Second judgment module, for judging that called number whether there is in the first judgment module
Before in the default blacklist of harassing call, judge that calling number whether there is in default blacklist;Second blocking module,
For when the determination result is yes, intercepting call of the calling number to called number.
Optionally, device further includes:Statistical module, for not existed in the default blacklist in the called number
When, count the call characteristic information of calling number;Third judgment module, pair for judging call characteristic information and monitoring strategies
Answer whether information matches;Add module, in the event of a match, calling number being added to default blacklist.
In the present embodiment, call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, master
It is accounting, called rate of taking out stitches.
In the present embodiment, monitoring strategies include at least one of:The type of number, tactful cycle duration, the calling frequency
Threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Following manner realization is crossed, but not limited to this:Above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with arbitrary
The form of combination is located in different processors.
Embodiment 3
The present embodiment is according to an alternative embodiment of the invention, for combining specific example to carry out specifically the application
It is bright:
The scheme of the present embodiment can further increase the accuracy rate of harassing call interception, prevent trouble before it happens, to current
Harassing call monitoring method is supplemented, is perfect, and using the harassing and wrecking source information monitored out, comprehensive prison is done to harassing and wrecking source Mobile Station International ISDN Number
Control, forbids ordinary user's clawback, gets through harassing and wrecking source Mobile Station International ISDN Number.
A kind of harassing call monitoring method analyzed based on called subscriber condition is present embodiments provided, in monitoring process
In, before calling signature analysis, search called subscriber condition information, according to memory module feedback called subscriber whether be
Black list user, come distinguish this call whether harassing call clawback, forbid the called subscriber in blacklist to be called through, rather than
The called subscriber of blacklist then continues to do calling number monitoring processing.That is, the present invention is exactly to be supervised to existing harassing call
Prosecutor method carries out supplement and perfect, prevents ordinary user clawback, gets through harassing and wrecking source Mobile Station International ISDN Number, with prevent ordinary user " actively by
Deceive ", to achieve the purpose that improve harassing call monitoring system monitoring capacity.
The system of the harassing call monitoring method of the present embodiment comprises the following modules:
Interface module is monitored, for the calling CDR file that (1) parsing signaling side or business support system provide, in generation
Portion monitors request message, is transmitted to analysis agent module;(2) suspicious user and blacklist are intercepted into user and generate destination file,
Report to signaling side or business support system;(3) by the list of signaling side or business support system add solution it is black request be converted in
Portion's request message, and it is transmitted to list management module, while adding the black result of solution to signaling side or business support system feedback list.
List management module is sent for (1) processing monitoring interface module, analysis agent module, human-computer interaction module
List add the black request message of solution, in the memory that synchronous list information is distributed to itself, and update the data library;(2) user is provided
Status inquiry interface provides the user state information query result of analysis agent module and human-computer interaction module, including caller is used
Blacklist status information, the home subscriber group information at family, blacklist status information, the home subscriber group information of called subscriber;(3)
Automatically expired blacklist is lifted a ban, i.e. the blacklist term of validity expires, and deletes the black list information in memory, and update the data library.
Policy management module stores monitoring strategies for (1), that is, stores the harassing call monitoring that human-computer interaction module issues
Strategy, strategy include mainly the type of number, tactful duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring
Duration, caller accounting threshold value, called rate threshold value etc. of taking out stitches, configurable a plurality of strategy are combined monitoring;(2) policy update number
Strategy extraction interface is provided according to library, while to analysis agent module.
Analysis agent module, for the monitoring request of (1) processing monitoring interface module, i.e., to the calling and called in call information
Carry out User Status analysis, based on to the calling frequency, the duration of call, the information such as ring duration counting statistics, be monitored plan
Slightly analyze;(2) monitored results, suspicious record report monitoring interface module, and provide monitored results storage to log management module
Request interface;(3) it provides offending user to list management module and blackens request interface.
Log management module stores for (1) monitoring business daily record, updates the data library;(2) monitoring business log query.
Human-computer interaction module is configured for (1) system information;(2) monitoring strategies configure;(3) list information and daily record letter
Breath display.
The harassing call monitoring method of the present embodiment includes the following steps:
Step A. human-computer interaction modules configure one or more than one monitoring strategies, and policy content includes:
The type of number, analysis agent module are used to filter the type of number monitored needed for this monitoring strategies;
Tactful duration, analysis agent module to the calling frequency, the duration of call, the information such as ring duration carry out counting statistics and
The period of analysis;
Call frequency threshold value, the maximum number of calls that calling number allows in tactful duration;
Ratio is connected in percent of call completed threshold value, the minimum caller allowed in tactful duration;
Frequency threshold value is discharged, number is hung up in the maximum caller allowed in tactful duration;
Ring duration, the maximum caller ring duration allowed in tactful duration;
Caller accounting threshold value, the maximum caller accounting value in all calls allowed in tactful duration;
Called rate threshold value of taking out stitches, the phone that the caller allowed in tactful duration is hung up after putting through account for all caller calls
Maximum accounting value.
Configuration is completed, distributing policy configuration information to policy management module.
The calling CDR file that step B. monitoring interface modules receive signaling side or business support system provides, parsing text
Part, the monitoring request message for being converted into internal system, and request message is sent to analysis agent module.
After step C. analysis agent modules receive the monitoring request message that monitoring interface module is sent, following behaviour is carried out
Make:
Calling number in step C1. extraction request messages and called number, and obtain the main quilt to list management module
It calls out the numbers the user state information of code or the status information of owning user group.
Step C2. judges whether calling number is blacklist, if it is blacklist, is blocked then judging that calling subscribe blackens
It cuts, and reports monitoring interface module;Monitored results are sent to log management module, terminate this monitoring.Otherwise, step is carried out
C3。
Step C3. judges whether called number is blacklist, if it is blacklist, then judging that calling subscribe's clawback is harassed
Call block, and report monitoring interface module;Monitored results are sent to log management module, terminate this monitoring.Otherwise, it carries out
Step C4.
Step C4. counts calling and called behavior, such as calls the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
Step C5. extracts a strategy from high to low from policy management module according to priority, is matched with statistical data;
If matching strategy, continue C5 operations, until having extracted all policies;Otherwise, continue C5 operations, until
All policies are extracted.
Step C6. judges whether there is strategy matching, if there is strategy is matched, then being to use in violation of rules and regulations by the calling subscribe
Family blackens interception, will blacken user and is stored in list management module, and reports monitoring interface module;If be matched without strategy,
It is considered that calling subscribe is normal users, lets pass, and report monitoring interface module.Monitored results are sent to log management mould
Block, as a result this monitoring.
Step D. monitoring interface modules receive the monitored results of analysis agent module, and destination file is written;Later, continue into
The operation of row step B, it is known that the parsing of this CDR file terminates.Destination file is reported into signaling side or business support system.
Scheme through this embodiment, the behavior of active clawback harassing call according to part ordinary user's curious psychology,
On the basis of original condition adjudgement to calling subscribe during harassing call monitoring, increase to called subscriber and called subscriber's group
Whether the judgement of state can be blacklist according to called subscriber to distinguish making a phone call for ordinary user be that harassing call returns
It dials or normal telephone calls can intercept harassing and wrecking electricity in all directions in this way to determine the whether called interception of this call
Words, while improving harassing call interception rate, and are deceived, make harassing call monitoring system in which can prevent ordinary user's " active "
Monitoring prevent ability and further promoted.
The basic thought of the present embodiment is:Monitoring system is monitored by the ticket of signaling side or business support system and is asked
When, calling subscribe and the status information of called subscriber and its user group are inquired first, judge whether user is black list user, such as
Fruit is, then intercepting;If it is not, so continuing the monitoring based on monitoring strategies progress calling subscribe, and violate monitoring strategies
Offending user black list user will be used as to be stored in monitoring system, using as monitoring process next time while intercepted
In caller and called users condition adjudgement use.
Below with reference to the accompanying drawings and exemplary embodiment is combined, next the present invention will be described in detail.
Before monitoring system is monitored, first have to as the one or more than one monitoring strategies of system configuration.Monitor plan
Slightly include:The type of number, tactful duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring duration, caller account for
Than threshold value, called rate threshold value etc. of taking out stitches.
Fig. 4 is the flow chart of harassing call monitoring method according to the ... of the embodiment of the present invention, including:
The monitoring request ticket information that S101, one signaling side of parsing or business support system are sent, and conversion cost
Monitoring system internal control request message, message content include:Calling number, ring duration, on-state, is led to called number
Talk about the time, whether caller actively release etc..Execute flow S102.
S102, with calling number and called number, obtained from list management module calling subscribe and called subscriber and its
The status information of user group, the information content include:Whether calling subscribe is black list user, whether called subscriber is that blacklist is used
Family etc..Execute flow S103.
S103 judges whether calling subscribe is black list user, if it is black list user, then executing flow S111;
If not black list user, then executing flow S104.
S104 judges whether called subscriber is black list user, if it is black list user, then executing flow S105;
If not black list user, then executing flow S106.
S105 judges that calling subscribe acts for harassing call clawback, should block because called subscriber is black list user
It cuts;Monitored results are landed into destination file, return to signaling side or business support system, and are shown on human-computer interaction module
Monitored results.Terminate this monitoring flow.
S106 counts calling and called behavioural characteristic, that is, carries out the calling frequency, percent of call completed, release number, caller account for
Than the statistics of, called parameters such as rate of taking out stitches.Execute flow S107.
S107 once extracts one with sequence from high to low according to the priority of monitoring strategies from policy management module
Monitoring strategies.Execute flow S108.
S108 judges whether to extract successfully existing monitoring strategies, if extraction executes flow less than monitoring strategies
S112;If monitoring strategies can be extracted, flow S109 is executed.
Calling and called behavioral statistics information and strategy configuration are carried out number by S109 in the monitor duration of strategy configuration
Type, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring duration, caller accounting threshold value, called rate threshold of taking out stitches
Value etc. carries out parameters adjusting.Judge whether this calling subscribe violates monitoring strategies, if violating monitoring strategies, holds
Row flow S110;If not violating monitoring strategies, flow S107 is continued to execute.
S110 is stored in list because calling subscribe violates monitoring strategies using calling number as black list user
In management module, when monitoring process next time, the basis for estimation as calling subscribe and called subscriber condition.Execute flow
S111。
S111 judges that calling subscribe for offending user, should intercept;Monitored results are landed into destination file, return to letter
Enable side or business support system, and the display monitoring result on human-computer interaction module.Terminate this monitoring flow.
S112 judges that calling subscribe for ordinary user, can let pass;Monitored results are landed into destination file, are returned to
Signaling side or business support system, and the display monitoring result on human-computer interaction module.Terminate this monitoring flow.
Fig. 5 is the configuration diagram of harassing call monitoring system according to the ... of the embodiment of the present invention.The system includes:
Interface module 201 is monitored, is responsible for:(1) parsing asks ticket by the monitoring that signaling side or business support system come,
And ticket information is converted into monitoring system inside story;(2) monitored results are landed into destination file, be reported to signaling side or
Business support system;(3) what processing signaling side or business support system came adds the black request data stream of solution.
Human-computer interaction module 202 (interface) is responsible for:(1) configuration monitoring policy information, and issue, be synchronized to tactical management
Module;(2) display monitoring result information and list information.
Analysis agent module 203 is responsible for:(1) calling and called User Status is obtained from list management module, and analyzes state
Information intercepts response to decide to continue with monitoring or be returned to monitoring interface module;(2) monitoring strategies are obtained from policy management module,
It according to the calling and called behavioral trait of statistics, is matched with strategy, determines to return the response that intercepts or let pass to monitoring interface module;
(3) policy violation user is stored to list management module;(4) monitored results information is issued into log management module.
List management module 204 is responsible for:(1) User Status query interface is provided to analysis agent module;(2) processing prison
Control interface module the comes plus black request of solution;(3) list data goes out storage.
Policy management module 205 is responsible for:(1) the tactful configuration data of human-computer interaction module is obtained, and to human-computer interaction mould
Block provides monitoring strategies query interface;(2) strategy extraction interface is provided to analysis agent module;(3) policy data goes out storage.
Log management module 206 is responsible for:(1) the monitored results data that storage analysis agent module comes;(2) to man-machine
Interactive module provides monitored results query interface;(3) monitored results data go out storage.
Database 207 is responsible for:Store monitored results data, monitoring strategies configuration data, blacklist data and system
Information data etc..
The present embodiment realizes following technique effect:The monitoring to called subscriber is introduced during monitoring, i.e., to master
On the basis of making User Status analyze, increase the analysis to called subscriber condition, prevents ordinary user's clawback, gets through harassing and wrecking source number
Code, with blocking disturbance call in all directions, improves harassing call interception rate, and the monitoring to further improve system prevents
Ability.
Embodiment 4
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can
To be arranged to store the program code for executing following steps:
S1 judges that called number whether there is in the pre- of harassing call when calling number is initiated to converse to called number
If in blacklist;
S2 intercepts call request of the calling number to called number when the determination result is yes.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or
The various media that can store program code such as CD.
Optionally, in the present embodiment, processor is executed according to stored program code in storage medium in caller number
When code initiates to converse to called number, judge that called number whether there is in the default blacklist of harassing call;
Optionally, in the present embodiment, processor executes according to stored program code in storage medium and is judging to tie
Fruit is to intercept call request of the calling number to called number when being.
Optionally, the specific example in the present embodiment can refer to described in above-described embodiment and optional embodiment
Example, details are not described herein for the present embodiment.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general
Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
It is performed by computing device in the storage device, and in some cases, it can be with different from shown in sequence execution herein
The step of going out or describing, either they are fabricated to each integrated circuit modules or by them multiple modules or
Step is fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and softwares to combine.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of call monitoring method, which is characterized in that including:
When calling number is initiated to converse to called number, judge that the called number whether there is in the default black of harassing call
In list;
When the determination result is yes, call request of the calling number to the called number is intercepted.
2. according to the method described in claim 1, it is characterized in that, judging the called number with the presence or absence of in harassing call
Default blacklist in before, the method further includes:
Judge that the calling number whether there is in the default blacklist;
When the determination result is yes, call of the calling number to the called number is intercepted.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
When the called number does not exist in the default blacklist, the call characteristic information of the calling number is counted;
Judge whether the call characteristic information matches with the corresponding informance of monitoring strategies;
In the event of a match, the calling number is added to the default blacklist.
4. according to the method described in claim 3, it is characterized in that, the call characteristic information includes at least one of:It exhales
It is the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
5. according to the method described in claim 3, it is characterized in that, the monitoring strategies include at least one of:Number class
Type, tactful cycle duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold
Value, called rate threshold value of taking out stitches.
6. a kind of call monitoring device, which is characterized in that including:
First judgment module, for when calling number is initiated to converse to called number, judging that the called number whether there is
In the default blacklist of harassing call;
First blocking module, for when the determination result is yes, intercepting the calling number and being asked to the calling of the called number
It asks.
7. device according to claim 6, which is characterized in that described device further includes:
Second judgment module, for judging that the called number whether there is in the pre- of harassing call in first judgment module
If before in blacklist, judging that the calling number whether there is in the default blacklist;
Second blocking module, for when the determination result is yes, intercepting call of the calling number to the called number.
8. device according to claim 6, which is characterized in that described device further includes:
Statistical module, for when the called number does not exist in the default blacklist, counting the calling number
Call characteristic information;
Third judgment module, for judging whether the call characteristic information matches with the corresponding informance of monitoring strategies;
Add module, in the event of a match, the calling number being added to the default blacklist.
9. device according to claim 8, which is characterized in that the call characteristic information includes at least one of:It exhales
It is the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
10. device according to claim 8, which is characterized in that the monitoring strategies include at least one of:Number class
Type, tactful cycle duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold
Value, called rate threshold value of taking out stitches.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710244291.2A CN108737622A (en) | 2017-04-14 | 2017-04-14 | Monitoring method of conversing and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710244291.2A CN108737622A (en) | 2017-04-14 | 2017-04-14 | Monitoring method of conversing and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108737622A true CN108737622A (en) | 2018-11-02 |
Family
ID=63925010
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710244291.2A Pending CN108737622A (en) | 2017-04-14 | 2017-04-14 | Monitoring method of conversing and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108737622A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639913A (en) * | 2019-01-03 | 2019-04-16 | 中国联合网络通信集团有限公司 | A kind of automatic speech harassing and wrecking number processing method, apparatus and system |
CN110011905A (en) * | 2019-04-11 | 2019-07-12 | 腾讯科技(深圳)有限公司 | A kind of communication message processing method, device and equipment |
CN110445944A (en) * | 2019-08-19 | 2019-11-12 | 携程旅游信息技术(上海)有限公司 | Call center prevents the method and system made nuisance calls |
CN110839101A (en) * | 2019-11-07 | 2020-02-25 | 北京集奥聚合科技有限公司 | Calling strategy method based on blacklist |
CN111836264A (en) * | 2020-01-07 | 2020-10-27 | 东云技术有限公司 | System and method for intercepting crank calls and spam messages |
CN113810547A (en) * | 2020-06-16 | 2021-12-17 | 中国移动通信集团重庆有限公司 | Method, device and computing device for voice call security protection |
CN117354418A (en) * | 2023-09-28 | 2024-01-05 | 中移互联网有限公司 | Call behavior monitoring method, device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859749A (en) * | 2005-12-21 | 2006-11-08 | 华为技术有限公司 | Method for establishing telephone user call and mobile phone short message transmitting |
CN101370205A (en) * | 2008-09-25 | 2009-02-18 | 中兴通讯股份有限公司 | Method for preventing incoming call interference |
WO2012155669A1 (en) * | 2011-09-29 | 2012-11-22 | 中兴通讯股份有限公司 | Call prompt method and system |
CN103701989A (en) * | 2013-12-18 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal calling protection method, client, server and system |
CN106255113A (en) * | 2015-06-10 | 2016-12-21 | 中兴通讯股份有限公司 | The recognition methods of harassing call and device |
CN106412209A (en) * | 2016-12-02 | 2017-02-15 | 北京奇虎科技有限公司 | Incoming call callback processing method and device |
-
2017
- 2017-04-14 CN CN201710244291.2A patent/CN108737622A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859749A (en) * | 2005-12-21 | 2006-11-08 | 华为技术有限公司 | Method for establishing telephone user call and mobile phone short message transmitting |
CN101370205A (en) * | 2008-09-25 | 2009-02-18 | 中兴通讯股份有限公司 | Method for preventing incoming call interference |
WO2012155669A1 (en) * | 2011-09-29 | 2012-11-22 | 中兴通讯股份有限公司 | Call prompt method and system |
CN103037340A (en) * | 2011-09-29 | 2013-04-10 | 中兴通讯股份有限公司 | Calling prompting method and system |
CN103701989A (en) * | 2013-12-18 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal calling protection method, client, server and system |
CN106255113A (en) * | 2015-06-10 | 2016-12-21 | 中兴通讯股份有限公司 | The recognition methods of harassing call and device |
CN106412209A (en) * | 2016-12-02 | 2017-02-15 | 北京奇虎科技有限公司 | Incoming call callback processing method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639913A (en) * | 2019-01-03 | 2019-04-16 | 中国联合网络通信集团有限公司 | A kind of automatic speech harassing and wrecking number processing method, apparatus and system |
CN110011905A (en) * | 2019-04-11 | 2019-07-12 | 腾讯科技(深圳)有限公司 | A kind of communication message processing method, device and equipment |
CN110011905B (en) * | 2019-04-11 | 2021-09-14 | 腾讯科技(深圳)有限公司 | Communication information processing method, device and equipment |
CN110445944A (en) * | 2019-08-19 | 2019-11-12 | 携程旅游信息技术(上海)有限公司 | Call center prevents the method and system made nuisance calls |
CN110839101A (en) * | 2019-11-07 | 2020-02-25 | 北京集奥聚合科技有限公司 | Calling strategy method based on blacklist |
CN111836264A (en) * | 2020-01-07 | 2020-10-27 | 东云技术有限公司 | System and method for intercepting crank calls and spam messages |
CN111836264B (en) * | 2020-01-07 | 2023-11-14 | 东云技术有限公司 | Harassment call and spam message interception system and method |
CN113810547A (en) * | 2020-06-16 | 2021-12-17 | 中国移动通信集团重庆有限公司 | Method, device and computing device for voice call security protection |
CN113810547B (en) * | 2020-06-16 | 2023-12-15 | 中国移动通信集团重庆有限公司 | Method, device and computing equipment for voice call security protection |
CN117354418A (en) * | 2023-09-28 | 2024-01-05 | 中移互联网有限公司 | Call behavior monitoring method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737622A (en) | Monitoring method of conversing and device | |
WO2016197675A1 (en) | Method and apparatus for identifying crank call | |
DE69529524T2 (en) | TRAFFIC MEDIATION IN AN IMPROVED INTEGRATED NETWORK | |
EP3437313B1 (en) | Method and system for detection of interconnect bypass using test calls to real subscribers | |
CN101472007A (en) | Method and system for determining disturbance telephone | |
CN101217820A (en) | An identification system and identification method on disturbance telephone numbers | |
CN104093153A (en) | Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof | |
US7116772B2 (en) | Communication network | |
CN101426257A (en) | Unwell information governing system and method based on mobile communication network | |
WO2011160328A1 (en) | Method and device for monitoring communications | |
CN107231494A (en) | A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment | |
CN101720092A (en) | Intelligent network signaling monitoring-based harassing call monitoring method and intelligent network signaling monitoring-based harassing call monitoring system | |
CN102104847B (en) | Short message monitoring method based on flow and call-initiating areas | |
CN107368326A (en) | Course control method and device | |
CN114205462A (en) | Fraud telephone identification method, device, system and computer storage medium | |
CN106028300B (en) | A kind of system for realizing minor's telephone receiving control business | |
CN104869262B (en) | The hold-up interception method and device of terminal blacklist | |
CN110072251B (en) | Method and device for analyzing user communication behavior and managing user | |
CN109474760A (en) | The method of blocking disturbance call or short message, carrier server and storage medium | |
CN101771757A (en) | Method for detecting and intercepting nuisance calls | |
CN110445944A (en) | Call center prevents the method and system made nuisance calls | |
Kim et al. | DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation | |
CN101827328A (en) | Device and method for monitoring short-message | |
CN104581729B (en) | Junk information processing method and device | |
CN109429170B (en) | Call processing method, monitoring platform entity and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181102 |