[go: up one dir, main page]

CN108737622A - Monitoring method of conversing and device - Google Patents

Monitoring method of conversing and device Download PDF

Info

Publication number
CN108737622A
CN108737622A CN201710244291.2A CN201710244291A CN108737622A CN 108737622 A CN108737622 A CN 108737622A CN 201710244291 A CN201710244291 A CN 201710244291A CN 108737622 A CN108737622 A CN 108737622A
Authority
CN
China
Prior art keywords
call
calling
called
threshold value
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710244291.2A
Other languages
Chinese (zh)
Inventor
杨镕旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710244291.2A priority Critical patent/CN108737622A/en
Publication of CN108737622A publication Critical patent/CN108737622A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of call monitoring method and devices, wherein this method includes:When calling number is initiated to converse to called number, judge that the called number whether there is in the default blacklist of harassing call;When the determination result is yes, call request of the calling number to the called number is intercepted.Through the invention, the technical problem that blocking disturbance call is not comprehensive enough in the related technology is solved.

Description

Monitoring method of conversing and device
Technical field
The present invention relates to the communications fields, in particular to a kind of call monitoring method and device.
Background technology
With the development of the communication technology, the meanss of communication such as a mobile phone part indispensable in having become for people's lives, such as Modern technology development has given the users of the meanss of communication such as vast mobile phone to bring great convenience;But often science and technology is one double Sword sword, but also the more a kind of propagation of criminal, malice swindler and swindling channel, harassing call goes out therewith for convenient communication It is existing, behavioral implications and annoying operator and users.
The specific manifestation of harassing call behavior is:Illegal user utilizes special installation or artificial malice to ordinary user, extensively Make a phone call with casting net formula, once ring starts, soon hang up, wait for ordinary user call back with travel fraud tactics or Malice collects telephone expenses;Or malicious dissemination invalid information etc..
In order to the impetus for inhibiting harassing call to grow in intensity, the behaviors such as swindle, malicious dissemination are prevented, in the related technology Harassing call monitoring system give birth to therefrom.It utilizes the feature of harassing call, length, release when such as calling the high frequency, ring Number is big, percent of call completed is low, caller accounting height etc., constructs monitoring strategies;Ticket is extracted, according to exhaling for calling subscribe and called subscriber Behavior is cried, is matched with monitoring strategies, harassing call or offending user is filtered out, the rear subscriber number for confirming harassing and wrecking source, forbids The number calling, and blacklist is added in the number;In subsequent monitoring processing procedure, first determine whether calling number whether In blacklist, if there are the numbers in blacklist, directly forbid the number calling.However, it has been found that related Monitoring method in technology is unable to control the harassing call of common calling number only using calling number as monitoring, interception object Clawback behavior cannot efficiently control validated user and call back to disabled user, thus be likely to cause ordinary user Harassing call is actively got through, to increase risk probability of the user by swindle (" being actively deceived ").
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Invention content
An embodiment of the present invention provides a kind of call monitoring method and devices, at least to solve to intercept harassing and wrecking in the related technology The not comprehensive enough technical problem of phone.
According to one embodiment of present invention, a kind of call monitoring method is provided, including:In calling number to called number When code initiates call, judge that the called number whether there is in the default blacklist of harassing call;It is yes in judging result When, intercept call request of the calling number to the called number.
Optionally, before in judging the called number with the presence or absence of the default blacklist in harassing call, the side Method further includes:Judge that the calling number whether there is in the default blacklist;When the determination result is yes, described in interception Call of the calling number to the called number.
Optionally, the method further includes:When the called number does not exist in the default blacklist, institute is counted State the call characteristic information of calling number;Judge whether the call characteristic information matches with the corresponding informance of monitoring strategies;? In the case of matched, the calling number is added to the default blacklist.
Optionally, the call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, caller Accounting, called rate of taking out stitches.
Optionally, the monitoring strategies include at least one of:The type of number, tactful cycle duration, calling frequency threshold Value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
According to another embodiment of the invention, a kind of call monitoring device is provided, including:First judgment module is used In when calling number is initiated to converse to called number, judging that the called number whether there is black name is preset in harassing call Dan Zhong;First blocking module, for when the determination result is yes, intercepting the calling number and being asked to the calling of the called number It asks.
Optionally, described device further includes:Second judgment module, it is described called for judging in first judgment module Before number whether there is in the default blacklist of harassing call, judge that the calling number whether there is in described default black In list;Second blocking module, for when the determination result is yes, intercepting the calling number and leading to the called number Words.
Optionally, described device further includes:Statistical module, for not existing in the default black name in the called number When in list, the call characteristic information of the calling number is counted;Third judgment module, for judge the call characteristic information with Whether the corresponding informance of monitoring strategies matches;Add module, in the event of a match, the calling number being added to institute State default blacklist.
Optionally, the call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, caller Accounting, called rate of taking out stitches.
Optionally, the monitoring strategies include at least one of:The type of number, tactful cycle duration, calling frequency threshold Value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is set as storage and uses In the program code for executing following steps:
When calling number is initiated to converse to called number, judge that the called number whether there is in the pre- of harassing call If in blacklist;
When the determination result is yes, call request of the calling number to the called number is intercepted.
Through the invention, calling number to called number initiate converse when, judge the called number whether there is in In the default blacklist of harassing call;When the determination result is yes, calling of the calling number to the called number is intercepted Request.The monitoring to called subscriber is introduced during monitoring, the attribute of called number is analyzed, and is prevented ordinary user and is returned It dials, get through harassing and wrecking source Mobile Station International ISDN Number, with blocking disturbance call in all directions, it is not comprehensive enough to solve blocking disturbance call in the related technology The technical issues of, harassing call interception rate is improved, the monitoring to further improve system prevents ability.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and is constituted part of this application, this hair Bright illustrative embodiments and their description are not constituted improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the mobile terminal of call monitoring method of the embodiment of the present invention;
Fig. 2 is the flow chart of call monitoring method according to the ... of the embodiment of the present invention;
Fig. 3 is the structure diagram of call monitoring device according to the ... of the embodiment of the present invention;
Fig. 4 is the flow chart of harassing call monitoring method according to the ... of the embodiment of the present invention;
Fig. 5 is the configuration diagram of harassing call monitoring system according to the ... of the embodiment of the present invention.
Specific implementation mode
Come that the present invention will be described in detail below with reference to attached drawing and in conjunction with the embodiments.It should be noted that not conflicting In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.
Embodiment 1
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune It calculates and is executed in device.For running on mobile terminals, Fig. 1 is a kind of movement of call monitoring method of the embodiment of the present invention The hardware block diagram of terminal.As shown in Figure 1, mobile terminal 10 may include one or more (only showing one in figure) processing Device 102 (processor 102 can include but is not limited to the processing unit of Micro-processor MCV or programmable logic device FPGA etc.), Memory 104 for storing data and the transmitting device 106 for communication function.Those of ordinary skill in the art can be with Understand, structure shown in FIG. 1 is only to illustrate, and does not cause to limit to the structure of above-mentioned electronic device.For example, mobile terminal 10 It may also include than shown in Fig. 1 more either less components or with the configuration different from shown in Fig. 1.
Memory 104 can be used for storing the software program and module of application software, such as the call in the embodiment of the present invention Corresponding program instruction/the module of monitoring method, processor 102 by operation be stored in software program in memory 104 and Module realizes above-mentioned method to perform various functions application and data processing.Memory 104 may include high speed with Machine memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or other it is non-easily The property lost solid-state memory.In some instances, memory 104 can further comprise remotely located relative to processor 102 deposit Reservoir, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network is including but not limited to mutual Networking, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 106 is used to receive via a network or transmission data.Above-mentioned network specific example may include The wireless network that the communication providers of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation Device (Network Interface Controller, NIC), can be connected with other network equipments by base station so as to it is mutual Networking is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, use In wirelessly being communicated with internet.
A kind of call monitoring method running on above-mentioned mobile terminal is provided in the present embodiment, and Fig. 2 is according to this hair The flow chart of the call monitoring method of bright embodiment, as shown in Fig. 2, the flow includes the following steps:
Step S202 judges that called number whether there is in harassing and wrecking electricity when calling number is initiated to converse to called number In the default blacklist of words;Default blacklist saves multiple harassing calls having determined;
Step S204 intercepts call request of the calling number to called number when the determination result is yes.
Through the above steps, when calling number is initiated to converse to called number, judge that the called number whether there is In the default blacklist of harassing call;When the determination result is yes, the calling number is intercepted to exhale the called number Cry request.The monitoring to called subscriber is introduced during monitoring, the attribute of called number is analyzed, and prevents ordinary user Clawback gets through harassing and wrecking source Mobile Station International ISDN Number, and with blocking disturbance call in all directions, it is not complete enough to solve blocking disturbance call in the related technology The technical issues of face, improves harassing call interception rate, and the monitoring to further improve system prevents ability.
Optionally, the executive agent of above-mentioned steps can be base station, terminal, access network elements, core network element etc., but not It is limited to this.
Optionally, the default blacklist in the present embodiment includes harassing call set or risk Telephone Assembly, can be with It is to be obtained from network side, can also includes what user was arranged in end side.
Optionally, before in judging called number with the presence or absence of the default blacklist in harassing call, alternatively, judging (called number is not present in the default black of harassing call after called number whether there is in the default blacklist of harassing call When in list), the method for the present embodiment further includes:
S11 judges that calling number whether there is in default blacklist;
S12 intercepts call of the calling number to called number when the determination result is yes.
In the optional embodiment according to the present embodiment, judging that it is black that called number does not exist in presetting for harassing call When in list, alternatively, in judging the called number or calling number with the presence or absence of the default blacklist in harassing call it Before, further include:
S21 counts the call characteristic information of calling number;
S22, judges whether call characteristic information matches with the corresponding informance of monitoring strategies;
Calling number is added to default blacklist by S23 in the event of a match.
Optionally, call characteristic information includes at least one of:The calling frequency, percent of call completed, release number, caller account for Than, called rate of taking out stitches.
Optionally, the corresponding informance of monitoring strategies can be, but not limited to for:The type of number, tactful cycle duration, calling frequency Subthreshold, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
Specifically, the type of number, analysis agent module is used to filter the type of number monitored needed for this monitoring strategies;
Tactful duration, analysis agent module to the calling frequency, the duration of call, the information such as ring duration carry out counting statistics and The period of analysis;
Call frequency threshold value, the maximum number of calls that calling number allows in tactful duration;
Ratio is connected in percent of call completed threshold value, the minimum caller allowed in tactful duration;
Frequency threshold value is discharged, number is hung up in the maximum caller allowed in tactful duration;
Ring duration, the maximum caller ring duration allowed in tactful duration;
Caller accounting threshold value, the maximum caller accounting value in all calls allowed in tactful duration;
Called rate threshold value of taking out stitches, the phone that the caller allowed in tactful duration is hung up after putting through account for all caller calls Maximum accounting value.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical scheme of the present invention is substantially in other words to existing The part that technology contributes can be expressed in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of call monitoring device is additionally provided in the present embodiment, and the device is real for realizing above-described embodiment and preferably Mode is applied, repeating no more for explanation had been carried out.As used below, the soft of predetermined function may be implemented in term " module " The combination of part and/or hardware.Although device described in following embodiment is preferably realized with software, hardware, or The realization of the combination of software and hardware is also that may and be contemplated.
Fig. 3 is the structure diagram of call monitoring device according to the ... of the embodiment of the present invention, as shown in figure 3, the device includes:
First judgment module 30, for when calling number is initiated to converse to called number, judging whether called number is deposited It is in the default blacklist of harassing call;
First blocking module 32, for when the determination result is yes, intercepting call request of the calling number to called number.
Optionally, device further includes:Second judgment module, for judging that called number whether there is in the first judgment module Before in the default blacklist of harassing call, judge that calling number whether there is in default blacklist;Second blocking module, For when the determination result is yes, intercepting call of the calling number to called number.
Optionally, device further includes:Statistical module, for not existed in the default blacklist in the called number When, count the call characteristic information of calling number;Third judgment module, pair for judging call characteristic information and monitoring strategies Answer whether information matches;Add module, in the event of a match, calling number being added to default blacklist.
In the present embodiment, call characteristic information includes at least one of:Call the frequency, percent of call completed, release number, master It is accounting, called rate of taking out stitches.
In the present embodiment, monitoring strategies include at least one of:The type of number, tactful cycle duration, the calling frequency Threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold value, called rate threshold value of taking out stitches.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Following manner realization is crossed, but not limited to this:Above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with arbitrary The form of combination is located in different processors.
Embodiment 3
The present embodiment is according to an alternative embodiment of the invention, for combining specific example to carry out specifically the application It is bright:
The scheme of the present embodiment can further increase the accuracy rate of harassing call interception, prevent trouble before it happens, to current Harassing call monitoring method is supplemented, is perfect, and using the harassing and wrecking source information monitored out, comprehensive prison is done to harassing and wrecking source Mobile Station International ISDN Number Control, forbids ordinary user's clawback, gets through harassing and wrecking source Mobile Station International ISDN Number.
A kind of harassing call monitoring method analyzed based on called subscriber condition is present embodiments provided, in monitoring process In, before calling signature analysis, search called subscriber condition information, according to memory module feedback called subscriber whether be Black list user, come distinguish this call whether harassing call clawback, forbid the called subscriber in blacklist to be called through, rather than The called subscriber of blacklist then continues to do calling number monitoring processing.That is, the present invention is exactly to be supervised to existing harassing call Prosecutor method carries out supplement and perfect, prevents ordinary user clawback, gets through harassing and wrecking source Mobile Station International ISDN Number, with prevent ordinary user " actively by Deceive ", to achieve the purpose that improve harassing call monitoring system monitoring capacity.
The system of the harassing call monitoring method of the present embodiment comprises the following modules:
Interface module is monitored, for the calling CDR file that (1) parsing signaling side or business support system provide, in generation Portion monitors request message, is transmitted to analysis agent module;(2) suspicious user and blacklist are intercepted into user and generate destination file, Report to signaling side or business support system;(3) by the list of signaling side or business support system add solution it is black request be converted in Portion's request message, and it is transmitted to list management module, while adding the black result of solution to signaling side or business support system feedback list.
List management module is sent for (1) processing monitoring interface module, analysis agent module, human-computer interaction module List add the black request message of solution, in the memory that synchronous list information is distributed to itself, and update the data library;(2) user is provided Status inquiry interface provides the user state information query result of analysis agent module and human-computer interaction module, including caller is used Blacklist status information, the home subscriber group information at family, blacklist status information, the home subscriber group information of called subscriber;(3) Automatically expired blacklist is lifted a ban, i.e. the blacklist term of validity expires, and deletes the black list information in memory, and update the data library.
Policy management module stores monitoring strategies for (1), that is, stores the harassing call monitoring that human-computer interaction module issues Strategy, strategy include mainly the type of number, tactful duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring Duration, caller accounting threshold value, called rate threshold value etc. of taking out stitches, configurable a plurality of strategy are combined monitoring;(2) policy update number Strategy extraction interface is provided according to library, while to analysis agent module.
Analysis agent module, for the monitoring request of (1) processing monitoring interface module, i.e., to the calling and called in call information Carry out User Status analysis, based on to the calling frequency, the duration of call, the information such as ring duration counting statistics, be monitored plan Slightly analyze;(2) monitored results, suspicious record report monitoring interface module, and provide monitored results storage to log management module Request interface;(3) it provides offending user to list management module and blackens request interface.
Log management module stores for (1) monitoring business daily record, updates the data library;(2) monitoring business log query.
Human-computer interaction module is configured for (1) system information;(2) monitoring strategies configure;(3) list information and daily record letter Breath display.
The harassing call monitoring method of the present embodiment includes the following steps:
Step A. human-computer interaction modules configure one or more than one monitoring strategies, and policy content includes:
The type of number, analysis agent module are used to filter the type of number monitored needed for this monitoring strategies;
Tactful duration, analysis agent module to the calling frequency, the duration of call, the information such as ring duration carry out counting statistics and The period of analysis;
Call frequency threshold value, the maximum number of calls that calling number allows in tactful duration;
Ratio is connected in percent of call completed threshold value, the minimum caller allowed in tactful duration;
Frequency threshold value is discharged, number is hung up in the maximum caller allowed in tactful duration;
Ring duration, the maximum caller ring duration allowed in tactful duration;
Caller accounting threshold value, the maximum caller accounting value in all calls allowed in tactful duration;
Called rate threshold value of taking out stitches, the phone that the caller allowed in tactful duration is hung up after putting through account for all caller calls Maximum accounting value.
Configuration is completed, distributing policy configuration information to policy management module.
The calling CDR file that step B. monitoring interface modules receive signaling side or business support system provides, parsing text Part, the monitoring request message for being converted into internal system, and request message is sent to analysis agent module.
After step C. analysis agent modules receive the monitoring request message that monitoring interface module is sent, following behaviour is carried out Make:
Calling number in step C1. extraction request messages and called number, and obtain the main quilt to list management module It calls out the numbers the user state information of code or the status information of owning user group.
Step C2. judges whether calling number is blacklist, if it is blacklist, is blocked then judging that calling subscribe blackens It cuts, and reports monitoring interface module;Monitored results are sent to log management module, terminate this monitoring.Otherwise, step is carried out C3。
Step C3. judges whether called number is blacklist, if it is blacklist, then judging that calling subscribe's clawback is harassed Call block, and report monitoring interface module;Monitored results are sent to log management module, terminate this monitoring.Otherwise, it carries out Step C4.
Step C4. counts calling and called behavior, such as calls the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
Step C5. extracts a strategy from high to low from policy management module according to priority, is matched with statistical data; If matching strategy, continue C5 operations, until having extracted all policies;Otherwise, continue C5 operations, until All policies are extracted.
Step C6. judges whether there is strategy matching, if there is strategy is matched, then being to use in violation of rules and regulations by the calling subscribe Family blackens interception, will blacken user and is stored in list management module, and reports monitoring interface module;If be matched without strategy, It is considered that calling subscribe is normal users, lets pass, and report monitoring interface module.Monitored results are sent to log management mould Block, as a result this monitoring.
Step D. monitoring interface modules receive the monitored results of analysis agent module, and destination file is written;Later, continue into The operation of row step B, it is known that the parsing of this CDR file terminates.Destination file is reported into signaling side or business support system.
Scheme through this embodiment, the behavior of active clawback harassing call according to part ordinary user's curious psychology, On the basis of original condition adjudgement to calling subscribe during harassing call monitoring, increase to called subscriber and called subscriber's group Whether the judgement of state can be blacklist according to called subscriber to distinguish making a phone call for ordinary user be that harassing call returns It dials or normal telephone calls can intercept harassing and wrecking electricity in all directions in this way to determine the whether called interception of this call Words, while improving harassing call interception rate, and are deceived, make harassing call monitoring system in which can prevent ordinary user's " active " Monitoring prevent ability and further promoted.
The basic thought of the present embodiment is:Monitoring system is monitored by the ticket of signaling side or business support system and is asked When, calling subscribe and the status information of called subscriber and its user group are inquired first, judge whether user is black list user, such as Fruit is, then intercepting;If it is not, so continuing the monitoring based on monitoring strategies progress calling subscribe, and violate monitoring strategies Offending user black list user will be used as to be stored in monitoring system, using as monitoring process next time while intercepted In caller and called users condition adjudgement use.
Below with reference to the accompanying drawings and exemplary embodiment is combined, next the present invention will be described in detail.
Before monitoring system is monitored, first have to as the one or more than one monitoring strategies of system configuration.Monitor plan Slightly include:The type of number, tactful duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring duration, caller account for Than threshold value, called rate threshold value etc. of taking out stitches.
Fig. 4 is the flow chart of harassing call monitoring method according to the ... of the embodiment of the present invention, including:
The monitoring request ticket information that S101, one signaling side of parsing or business support system are sent, and conversion cost Monitoring system internal control request message, message content include:Calling number, ring duration, on-state, is led to called number Talk about the time, whether caller actively release etc..Execute flow S102.
S102, with calling number and called number, obtained from list management module calling subscribe and called subscriber and its The status information of user group, the information content include:Whether calling subscribe is black list user, whether called subscriber is that blacklist is used Family etc..Execute flow S103.
S103 judges whether calling subscribe is black list user, if it is black list user, then executing flow S111; If not black list user, then executing flow S104.
S104 judges whether called subscriber is black list user, if it is black list user, then executing flow S105; If not black list user, then executing flow S106.
S105 judges that calling subscribe acts for harassing call clawback, should block because called subscriber is black list user It cuts;Monitored results are landed into destination file, return to signaling side or business support system, and are shown on human-computer interaction module Monitored results.Terminate this monitoring flow.
S106 counts calling and called behavioural characteristic, that is, carries out the calling frequency, percent of call completed, release number, caller account for Than the statistics of, called parameters such as rate of taking out stitches.Execute flow S107.
S107 once extracts one with sequence from high to low according to the priority of monitoring strategies from policy management module Monitoring strategies.Execute flow S108.
S108 judges whether to extract successfully existing monitoring strategies, if extraction executes flow less than monitoring strategies S112;If monitoring strategies can be extracted, flow S109 is executed.
Calling and called behavioral statistics information and strategy configuration are carried out number by S109 in the monitor duration of strategy configuration Type, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, ring duration, caller accounting threshold value, called rate threshold of taking out stitches Value etc. carries out parameters adjusting.Judge whether this calling subscribe violates monitoring strategies, if violating monitoring strategies, holds Row flow S110;If not violating monitoring strategies, flow S107 is continued to execute.
S110 is stored in list because calling subscribe violates monitoring strategies using calling number as black list user In management module, when monitoring process next time, the basis for estimation as calling subscribe and called subscriber condition.Execute flow S111。
S111 judges that calling subscribe for offending user, should intercept;Monitored results are landed into destination file, return to letter Enable side or business support system, and the display monitoring result on human-computer interaction module.Terminate this monitoring flow.
S112 judges that calling subscribe for ordinary user, can let pass;Monitored results are landed into destination file, are returned to Signaling side or business support system, and the display monitoring result on human-computer interaction module.Terminate this monitoring flow.
Fig. 5 is the configuration diagram of harassing call monitoring system according to the ... of the embodiment of the present invention.The system includes:
Interface module 201 is monitored, is responsible for:(1) parsing asks ticket by the monitoring that signaling side or business support system come, And ticket information is converted into monitoring system inside story;(2) monitored results are landed into destination file, be reported to signaling side or Business support system;(3) what processing signaling side or business support system came adds the black request data stream of solution.
Human-computer interaction module 202 (interface) is responsible for:(1) configuration monitoring policy information, and issue, be synchronized to tactical management Module;(2) display monitoring result information and list information.
Analysis agent module 203 is responsible for:(1) calling and called User Status is obtained from list management module, and analyzes state Information intercepts response to decide to continue with monitoring or be returned to monitoring interface module;(2) monitoring strategies are obtained from policy management module, It according to the calling and called behavioral trait of statistics, is matched with strategy, determines to return the response that intercepts or let pass to monitoring interface module; (3) policy violation user is stored to list management module;(4) monitored results information is issued into log management module.
List management module 204 is responsible for:(1) User Status query interface is provided to analysis agent module;(2) processing prison Control interface module the comes plus black request of solution;(3) list data goes out storage.
Policy management module 205 is responsible for:(1) the tactful configuration data of human-computer interaction module is obtained, and to human-computer interaction mould Block provides monitoring strategies query interface;(2) strategy extraction interface is provided to analysis agent module;(3) policy data goes out storage.
Log management module 206 is responsible for:(1) the monitored results data that storage analysis agent module comes;(2) to man-machine Interactive module provides monitored results query interface;(3) monitored results data go out storage.
Database 207 is responsible for:Store monitored results data, monitoring strategies configuration data, blacklist data and system Information data etc..
The present embodiment realizes following technique effect:The monitoring to called subscriber is introduced during monitoring, i.e., to master On the basis of making User Status analyze, increase the analysis to called subscriber condition, prevents ordinary user's clawback, gets through harassing and wrecking source number Code, with blocking disturbance call in all directions, improves harassing call interception rate, and the monitoring to further improve system prevents Ability.
Embodiment 4
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can To be arranged to store the program code for executing following steps:
S1 judges that called number whether there is in the pre- of harassing call when calling number is initiated to converse to called number If in blacklist;
S2 intercepts call request of the calling number to called number when the determination result is yes.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or The various media that can store program code such as CD.
Optionally, in the present embodiment, processor is executed according to stored program code in storage medium in caller number When code initiates to converse to called number, judge that called number whether there is in the default blacklist of harassing call;
Optionally, in the present embodiment, processor executes according to stored program code in storage medium and is judging to tie Fruit is to intercept call request of the calling number to called number when being.
Optionally, the specific example in the present embodiment can refer to described in above-described embodiment and optional embodiment Example, details are not described herein for the present embodiment.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored It is performed by computing device in the storage device, and in some cases, it can be with different from shown in sequence execution herein The step of going out or describing, either they are fabricated to each integrated circuit modules or by them multiple modules or Step is fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and softwares to combine.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of call monitoring method, which is characterized in that including:
When calling number is initiated to converse to called number, judge that the called number whether there is in the default black of harassing call In list;
When the determination result is yes, call request of the calling number to the called number is intercepted.
2. according to the method described in claim 1, it is characterized in that, judging the called number with the presence or absence of in harassing call Default blacklist in before, the method further includes:
Judge that the calling number whether there is in the default blacklist;
When the determination result is yes, call of the calling number to the called number is intercepted.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
When the called number does not exist in the default blacklist, the call characteristic information of the calling number is counted;
Judge whether the call characteristic information matches with the corresponding informance of monitoring strategies;
In the event of a match, the calling number is added to the default blacklist.
4. according to the method described in claim 3, it is characterized in that, the call characteristic information includes at least one of:It exhales It is the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
5. according to the method described in claim 3, it is characterized in that, the monitoring strategies include at least one of:Number class Type, tactful cycle duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold Value, called rate threshold value of taking out stitches.
6. a kind of call monitoring device, which is characterized in that including:
First judgment module, for when calling number is initiated to converse to called number, judging that the called number whether there is In the default blacklist of harassing call;
First blocking module, for when the determination result is yes, intercepting the calling number and being asked to the calling of the called number It asks.
7. device according to claim 6, which is characterized in that described device further includes:
Second judgment module, for judging that the called number whether there is in the pre- of harassing call in first judgment module If before in blacklist, judging that the calling number whether there is in the default blacklist;
Second blocking module, for when the determination result is yes, intercepting call of the calling number to the called number.
8. device according to claim 6, which is characterized in that described device further includes:
Statistical module, for when the called number does not exist in the default blacklist, counting the calling number Call characteristic information;
Third judgment module, for judging whether the call characteristic information matches with the corresponding informance of monitoring strategies;
Add module, in the event of a match, the calling number being added to the default blacklist.
9. device according to claim 8, which is characterized in that the call characteristic information includes at least one of:It exhales It is the frequency, percent of call completed, release number, caller accounting, called rate of taking out stitches.
10. device according to claim 8, which is characterized in that the monitoring strategies include at least one of:Number class Type, tactful cycle duration, calling frequency threshold value, percent of call completed threshold value, release frequency threshold value, caller ring duration, caller accounting threshold Value, called rate threshold value of taking out stitches.
CN201710244291.2A 2017-04-14 2017-04-14 Monitoring method of conversing and device Pending CN108737622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710244291.2A CN108737622A (en) 2017-04-14 2017-04-14 Monitoring method of conversing and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710244291.2A CN108737622A (en) 2017-04-14 2017-04-14 Monitoring method of conversing and device

Publications (1)

Publication Number Publication Date
CN108737622A true CN108737622A (en) 2018-11-02

Family

ID=63925010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710244291.2A Pending CN108737622A (en) 2017-04-14 2017-04-14 Monitoring method of conversing and device

Country Status (1)

Country Link
CN (1) CN108737622A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN110011905A (en) * 2019-04-11 2019-07-12 腾讯科技(深圳)有限公司 A kind of communication message processing method, device and equipment
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN110839101A (en) * 2019-11-07 2020-02-25 北京集奥聚合科技有限公司 Calling strategy method based on blacklist
CN111836264A (en) * 2020-01-07 2020-10-27 东云技术有限公司 System and method for intercepting crank calls and spam messages
CN113810547A (en) * 2020-06-16 2021-12-17 中国移动通信集团重庆有限公司 Method, device and computing device for voice call security protection
CN117354418A (en) * 2023-09-28 2024-01-05 中移互联网有限公司 Call behavior monitoring method, device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859749A (en) * 2005-12-21 2006-11-08 华为技术有限公司 Method for establishing telephone user call and mobile phone short message transmitting
CN101370205A (en) * 2008-09-25 2009-02-18 中兴通讯股份有限公司 Method for preventing incoming call interference
WO2012155669A1 (en) * 2011-09-29 2012-11-22 中兴通讯股份有限公司 Call prompt method and system
CN103701989A (en) * 2013-12-18 2014-04-02 北京奇虎科技有限公司 Mobile terminal calling protection method, client, server and system
CN106255113A (en) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 The recognition methods of harassing call and device
CN106412209A (en) * 2016-12-02 2017-02-15 北京奇虎科技有限公司 Incoming call callback processing method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859749A (en) * 2005-12-21 2006-11-08 华为技术有限公司 Method for establishing telephone user call and mobile phone short message transmitting
CN101370205A (en) * 2008-09-25 2009-02-18 中兴通讯股份有限公司 Method for preventing incoming call interference
WO2012155669A1 (en) * 2011-09-29 2012-11-22 中兴通讯股份有限公司 Call prompt method and system
CN103037340A (en) * 2011-09-29 2013-04-10 中兴通讯股份有限公司 Calling prompting method and system
CN103701989A (en) * 2013-12-18 2014-04-02 北京奇虎科技有限公司 Mobile terminal calling protection method, client, server and system
CN106255113A (en) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 The recognition methods of harassing call and device
CN106412209A (en) * 2016-12-02 2017-02-15 北京奇虎科技有限公司 Incoming call callback processing method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639913A (en) * 2019-01-03 2019-04-16 中国联合网络通信集团有限公司 A kind of automatic speech harassing and wrecking number processing method, apparatus and system
CN110011905A (en) * 2019-04-11 2019-07-12 腾讯科技(深圳)有限公司 A kind of communication message processing method, device and equipment
CN110011905B (en) * 2019-04-11 2021-09-14 腾讯科技(深圳)有限公司 Communication information processing method, device and equipment
CN110445944A (en) * 2019-08-19 2019-11-12 携程旅游信息技术(上海)有限公司 Call center prevents the method and system made nuisance calls
CN110839101A (en) * 2019-11-07 2020-02-25 北京集奥聚合科技有限公司 Calling strategy method based on blacklist
CN111836264A (en) * 2020-01-07 2020-10-27 东云技术有限公司 System and method for intercepting crank calls and spam messages
CN111836264B (en) * 2020-01-07 2023-11-14 东云技术有限公司 Harassment call and spam message interception system and method
CN113810547A (en) * 2020-06-16 2021-12-17 中国移动通信集团重庆有限公司 Method, device and computing device for voice call security protection
CN113810547B (en) * 2020-06-16 2023-12-15 中国移动通信集团重庆有限公司 Method, device and computing equipment for voice call security protection
CN117354418A (en) * 2023-09-28 2024-01-05 中移互联网有限公司 Call behavior monitoring method, device and storage medium

Similar Documents

Publication Publication Date Title
CN108737622A (en) Monitoring method of conversing and device
WO2016197675A1 (en) Method and apparatus for identifying crank call
DE69529524T2 (en) TRAFFIC MEDIATION IN AN IMPROVED INTEGRATED NETWORK
EP3437313B1 (en) Method and system for detection of interconnect bypass using test calls to real subscribers
CN101472007A (en) Method and system for determining disturbance telephone
CN101217820A (en) An identification system and identification method on disturbance telephone numbers
CN104093153A (en) Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
US7116772B2 (en) Communication network
CN101426257A (en) Unwell information governing system and method based on mobile communication network
WO2011160328A1 (en) Method and device for monitoring communications
CN107231494A (en) A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment
CN101720092A (en) Intelligent network signaling monitoring-based harassing call monitoring method and intelligent network signaling monitoring-based harassing call monitoring system
CN102104847B (en) Short message monitoring method based on flow and call-initiating areas
CN107368326A (en) Course control method and device
CN114205462A (en) Fraud telephone identification method, device, system and computer storage medium
CN106028300B (en) A kind of system for realizing minor's telephone receiving control business
CN104869262B (en) The hold-up interception method and device of terminal blacklist
CN110072251B (en) Method and device for analyzing user communication behavior and managing user
CN109474760A (en) The method of blocking disturbance call or short message, carrier server and storage medium
CN101771757A (en) Method for detecting and intercepting nuisance calls
CN110445944A (en) Call center prevents the method and system made nuisance calls
Kim et al. DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation
CN101827328A (en) Device and method for monitoring short-message
CN104581729B (en) Junk information processing method and device
CN109429170B (en) Call processing method, monitoring platform entity and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102