Detailed Description
The call ticket data recording method provided by the application is described in detail below with reference to the accompanying drawings.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone.
The terms "first" and "second" and the like in the description and in the drawings are used for distinguishing between different objects or between different processes of the same object and not for describing a particular order of objects.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the description of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more.
In order to facilitate understanding of the technical solution of the embodiments of the present application, the following description will first simply describe the embodiments of the present application.
1. A home network.
The home network refers to a network to which the mobile terminal side device belongs, that is, a network to which the terminal side device signs up and registers, and is a local network for the terminal side device to communicate. The home network consists of the mobile infrastructure provided by the operator.
2. The network is visited.
The visiting network refers to a network visited by the mobile terminal side equipment when roaming. For example, if the terminal side device roams away from the home network to other networks, the other networks are referred to as visited networks. The visited network is made up of network infrastructure provided by other operators.
3. A call session control function (inquiry call session control function, I-CSCF) network element is queried.
The I-CSCF network element is located in the home network and is one of the core network elements of the internet protocol (internet protocol, IP) multimedia subsystem (IP multimedia subsystem, IMS) network for allocation and querying of S-CSCSF network elements.
4. A proxy call session control function (proxy call session control function, P-CSCF) network element.
The P-CSCF network element is a unified entry point of the visited network, and all call requests initiated from terminal side equipment in the IMS network and terminated from terminal side equipment in the IMS network pass through the P-CSCF network element, and the P-CSCF network element is used for forwarding messages of the terminal side equipment and returning the messages received from the outside to the terminal side equipment.
5. Session initiation protocol (session initiation protocol, SIP).
SIP is a multimedia communication protocol established by the internet engineering task force (INTERNET ENGINEERING TASK force, IETF). It is a text-based application layer control protocol for creating, modifying and releasing sessions of one or more participants. In addition, the SIP protocol is also an end-to-end multimedia session control protocol, and has the characteristics of flexibility, easy implementation, convenient expansion and the like.
6. SIP message header field.
SIP message theft is a generic header field describing the basic properties of SIP messages, used for request messages or response messages.
7. Trombone.
Trombone refers to the original 11 digits of the mobile phone.
8. Short numbers.
The short number refers to a 3-bit or 4-bit number given by an operator after joining services such as a group network or a family affinity network, and is only used for calling in the group network or the family affinity network, and the calling in the network is free without dialing other numbers.
The foregoing is a description of some concepts designed by the embodiments of the present invention, and is not described in detail below.
As background technology, the number-carrying and network-transferring is to replace one operator without changing the number of the mobile phone and enjoy the services provided by the operator. VoLTE VPN is a service for realizing functions such as short number mutual dialing by establishing a virtual private network, providing voice call for the internal members of group clients by using abbreviated dialing, special numbering plan and the like.
For ease of understanding, voLTE VPN routing calls are described below by way of example.
Taking an example that a user a in a networking group 1 established by a connected user who has opened a VoLTE VPN service calls a user B, where the short number "75231" of the user B may be the connected user (i.e., the user in the networking group 1) or the user who carries a number to transfer to the other network from the connected user, as shown in fig. 1, the user a initiates a call request and transmits the call request to an S-CSCF network element; after receiving the call request, the S-CSCF network element initiates a trigger request to the virtual private network platform, and after receiving the trigger request, the virtual private network platform converts the short number '75231' into a long number, and then sends the long number to a telephone number mapping and domain name system (e.164 number and DNS, ENS) network element through the S-CSCF network element for route inquiry and matching with the next hop route; then the ENS network element routes the call to a first boundary connection control function (interconnect border control function, IBCF) network element according to the matched next hop, then the first IBCF network element calls to a second IBCF network element, then calls to an IMS network, and finally calls to a user B through the IMS network.
In addition, the user B can dial the trombone of the user A, and then the virtual private network platform converts the trombone into the short number so as to call the user A through the virtual private network platform.
It should be noted that, when the user B is a connected user, the user a calls the user B and can normally call through the virtual private network platform; in the case that the user B is a user from the connected user to the other network through the number portability, the virtual private network platform still retains the user data and the like of the user from the number portability to the other network in the process of the number portability, so that the call can still be successful.
As can be seen from the above, in the related art, the virtual private network platform cannot identify the operator network to which the called terminal belongs, and cannot suppress the situation that the user of his network is called through the virtual private network platform, thereby generating a virtual private network call across operators. From the point of view of the bill, the situation easily causes inaccurate bill data record, and cannot truly reflect the communication condition of the user, thereby affecting the reasonability of charging of operators.
Therefore, the application adjusts the rule of triggering the virtual private network platform and increases the service judgment of the called terminal, thereby realizing the data judgment of the cross-network service of the virtual private network, ensuring that the call of the normal user is not affected, effectively reducing the call condition caused by the junk data and avoiding the call problem caused by the platform data problem. Besides, the application improves the network quality and user experience of the operators, ensures the correctness of the call ticket data and enhances the charge rationality of the operators.
Specifically, the embodiment of the application provides a call ticket data recording method, which has the following ideas: firstly, the application obtains the user information of the called terminal from the data management network element according to the number information of the called terminal carried in the call request by receiving the call request, thereby ensuring the accuracy of the user information; and screening telephone traffic data generated in the process that the calling terminal and the called terminal do not communicate through the virtual private network platform according to the number information and the user information, and recognizing and screening the target telephone traffic data of the calling terminal and the called terminal which do not communicate through the virtual private network platform by combining the number information and the user information, so that the telephone traffic data in a specific scene is more accurately recognized and recorded, the accuracy of the telephone traffic data is improved, a more reasonable basis is provided for subsequent charging and billing, and the rationality of the billing is further enhanced.
The embodiments of the present application will be described in detail below with reference to the drawings attached to the specification.
Referring to fig. 2, a communication system is provided for an embodiment of the present application, the communication system including: the core network side device 100, the terminal side device 200 and the virtual private network platform 300, wherein the core network side device 100 is respectively in communication connection with the terminal side device 200 and the virtual private network platform 300.
In the embodiment of the present application, the terminal-side apparatus 200 includes: calling and called terminals. The calling terminal is used for initiating a session call request, the calling terminal is provided with a virtual private network service, and an operator to which the calling terminal belongs is a target operator; the called terminal is used for receiving the call request initiated by the calling terminal. Alternatively, the called terminal may or may not open the vpn service, which is not limited by the present application.
By way of example, the terminal-side device 200 may be a cellular phone, a landline phone, a tablet computer, a notebook computer, a netbook, a Personal Digital Assistant (PDA), etc., to which the present application is not limited.
The core network side apparatus 100 includes: the system comprises an S-CSCF network element, a data management network element, an ENS network element, a first IBCF network element, a second IBCF network element and an IMS network.
The S-CSCF network element is positioned in the network to which the calling terminal belongs and is used for providing registration service, session control and routing function. In the embodiment of the application, the S-CSCF network element is used for determining whether the operator to which the called terminal belongs is a target operator or not and recording the target call ticket data of the calling terminal which does not call the called terminal through the virtual private network platform.
The data management network element is positioned in the network to which the calling terminal belongs and is used for storing and retrieving data, protecting and protecting the data and the like. In the embodiment of the application, the data management network element is used for storing and inquiring the user information.
Illustratively, the data management network element includes: a home subscriber server (home subscriber server, HSS) network element, a unified data management (unified DATA MANAGEMENT, UDM) network element.
The HSS network element is mainly used for managing and storing user information in the second generation mobile communication technology (2nd Generation,2G) or the third generation mobile communication technology (3rd Generation,3G) network.
The UDM network element is mainly used for managing and storing user information in the fifth generation mobile communication technology (5th Generation,5G) network.
The ENS network element is composed of two logical network elements, namely, a telephone number mapping (ENUM) and a Domain Name System (DNS) for mapping telephone numbers to Internet resources, e.g., the ENUM is used to convert telephone numbers into domain names and stored in a DNS server database for facilitating access to Internet resources via telephone numbers. In the embodiment of the application, the ENS network element is used for carrying out routing query based on the number information of the called terminal.
The first IBCF network element is a boundary connection control function network element in a network to which the calling terminal belongs and is used for processing SIP signaling, carrying out network settlement and carrying out interconnection and intercommunication with S-CSCF of other domains. In the embodiment of the application, the first IBCF network element is used for transmitting the call request to the second IBCF network element according to the result of the ENS network element route inquiry.
The second IBCF network element is a boundary connection control function network element in the network to which the called terminal belongs, and is used for being responsible for addressing the called party and mapping the uniform resource locator (uniform resource locator, URL) of the called party to the specific called terminal. In the embodiment of the application, the second IBCF network element is used for receiving the call request transmitted by the first IBCF network element and transmitting the call request to the called terminal.
The IMS network is a communication network based on the IP technology, realizes the unified access of wide and narrow bands and the unified access of fixed wireless, has three characteristics of integration, IP and multimedia, and is used for providing rich communication multimedia services. In the embodiment of the application, the IMS network can be used for receiving the call request initiated by the calling terminal and transmitting the call request to the called terminal.
In some embodiments, the IMS network may also translate the communication protocol carried in the call request in case the calling terminal and the called terminal use different protocols.
The virtual private network platform 300 is a platform for providing a virtual private network service. The virtual private network platform 300 implements secure encrypted communication when a remote user accesses a company's internal network resources by combining mobile communication technology with internet technology. The virtual private network platform 300 may be a VoLTE VPN platform, for example.
In some embodiments, the virtual private network platform 300 is further configured to convert the short number into a trombone, so that the S-CSCF network element receives a call request carrying the trombone and transmits the call request to the ENS network element, so that the ENS network element performs a routing query based on the trombone, and transmits the call request to the called terminal.
It can be understood that by converting the short number into the long number, a route query method is provided, so that the calling terminal can successfully call the called terminal, and the conditions of call failure and the like caused by input errors and the like can be reduced, so that the call completing rate of the call is improved; in addition, the virtual private network platform 300 converts the short number into the long number, so that the calling terminal can successfully call the called terminal without knowing the long number of the called terminal, the privacy protection is enhanced, and the risk of privacy disclosure of the called terminal is reduced.
It should be noted that, the system architecture described in the embodiments of the present application is for more clearly describing the technical solution of the embodiments of the present application, and does not constitute a limitation on the technical solution provided by the embodiments of the present application, and those skilled in the art can know that, along with the evolution of the system architecture, the technical solution provided by the embodiments of the present application is equally applicable to similar technical problems.
Referring to fig. 3, a call ticket data recording method is provided for an embodiment of the present application, and the method can be applied to the S-CSCF network element shown in fig. 2, and includes the following steps S101 to S104.
S101, receiving a call request of a calling terminal.
In some embodiments, the calling terminal is provisioned with a virtual private network service.
In some embodiments, the operator to which the calling terminal belongs is the target operator. Wherein the target operator is configured to receive and process the user request during the communication. Exemplary, target operators include, but are not limited to, the following: a corporate operator, a mobile operator, or a telecommunications operator, etc.
In some embodiments, the call request includes number information of the called terminal.
The call request refers to a request sent by a party initiating communication (i.e. a calling terminal) to a network, and is used for requesting to establish communication connection with a called terminal. In the embodiment of the application, the call request is initiated by the calling terminal by dialing the number information of the called terminal.
In some embodiments, the calling terminal initiates the call request by dialing the number information of the called terminal; then the calling terminal sends the call request to the P-CSCF network element for preliminary treatment; the P-CSCF network element forwards the call request to the corresponding I-CSCF network element according to the route information, and the I-CSCF network element inquires the data management network element to acquire the address of the S-CSCF network element registered by the calling terminal and determine the position of the S-CSCF network element; and finally, the I-CSCF network element sends the call request to the S-CSCF network element for subsequent processing and session control.
In some embodiments, the S-CSCF network element may filter out call requests of calling terminals of non-target operators in case the operator to which the calling terminal belongs is not limited to the target operator.
In particular, the S-CSCF network element may implement filtering call requests of calling terminals of non-target operators by adding service triggering rules (SERVICE INITIAL FILTER CRITERIA, SIFC) and protocols or rules (IFCs) of the control interface.
Wherein SIFC is a triggering rule for deciding when to start to collude a specific service, and in the embodiment of the present application, it is used to determine whether to trigger a virtual private network platform in the process that the calling terminal calls the called terminal; IFCs are conditions or rules that trigger SIFC, SIFC being triggered when certain IFC conditions are met.
In some embodiments, the IFCs include service trigger points (SPTs) that may determine and filter the number information of the calling terminal, the bit length of the number information, and the SIP message header field.
After receiving a call request of a calling terminal, the SPT of the S-CSCF network element may determine the bit length of the number information of the calling terminal and the SIP message header field, and filter the call request initiated by the calling terminal of the non-target operator, so that the called terminal is not called through the virtual private network platform.
In some embodiments, the S-CSCF network element may further determine whether the operator to which the calling terminal belongs is a target operator by determining whether the preamble of the calling terminal is a target preamble corresponding to the target operator, and filter out a call request initiated by the calling terminal of which the operator to which the calling terminal belongs is not the target operator, so that the called terminal is not called through the virtual private network platform.
In some embodiments, the SIP protocol includes INVITE signaling for inviting the called terminal to join the session.
For example, when the calling terminal wants to establish a session with the called terminal, the calling terminal will send an INVITE signaling to the called terminal, and the called terminal may choose to accept or reject the INVITE signaling, where the called terminal can join the session only if the called terminal accepts the INVITE signaling.
In summary, adding the service triggering rule to the S-CSCF network element may be implemented by adding the SPT to the S-CSCF network element, and it may be understood that, since the SPT may be flexibly adjusted according to the service requirement, so as to meet the service requirements in different scenarios, the security and stability of the system may be improved by adding the SPT.
S102, based on the number information, acquiring the user information of the called terminal from the data management network element.
The user information is used for representing information of an operator to which the called terminal belongs.
For example, assuming that the subscriber information of the called terminal a is information of the a operator, it indicates that the operator to which the called terminal a belongs is the a operator.
The subscriber information may include, for example, a preamble of the called terminal. Wherein the preamble is a code or number for representing or classifying the data element. In the embodiment of the application, the preamble is used for identifying the operator to which the terminal side equipment belongs.
In some embodiments, the data management network element may be an HSS network element or a UDM network element, for storing user information of an operator, etc.
In some embodiments, as shown in fig. 4, the above step S102 may be implemented as the following steps S1021 to S1022.
S1021, based on the number information, a first message is sent to the data management network element, wherein the first message is used for requesting the data management network element to inquire the user information.
The first message includes number information, which is used to instruct the data management network element to query the user information corresponding to the number information.
In some embodiments, after the S-CSCF network element receives the call request of the calling terminal, the SPT sends a first message to the data management network element in response to the call request, and after the data management network element receives the first message, determines user information corresponding to the number information from the data stored in the data management network element and sends the user information to the S-CSCF network element, for example, the following step S1022 is performed.
It should be noted that, there is a correspondence between the number information and the user information, and the number a, the number b, and the number c are exemplified as shown in table 1 below.
TABLE 1
S1022, receiving the second message sent by the data management network element.
Wherein the second message includes user information.
It can be understood that the application can rapidly locate the user information corresponding to the number information in the data management network element based on the number information and acquire the user information, thereby improving the response speed and efficiency of the communication service; in addition, the user information is directly obtained from the data management network element according to the number information, so that the accuracy of the user information can be ensured, and the reliability of the communication service is improved.
S103, determining whether the calling terminal can call the called terminal through the virtual private network platform according to the user information and the number information.
In some embodiments, in case the first condition is met, it is determined that the calling terminal is capable of calling the called terminal through the virtual private network platform. Wherein the first condition comprises: the operators to which the calling terminal and the called terminal belong are target operators; the calling terminal and the called terminal both open the virtual private network service.
It should be noted that, the S-CSCF network element and the virtual private network platform may determine and filter the call that does not satisfy the first condition, and under the condition that the calling terminal and the called terminal do not satisfy the first condition, the calling terminal is prevented from calling the called terminal through the virtual private network platform, so as to ensure that both the calling terminal and the called terminal that can make the call through the virtual private network platform satisfy the first condition.
In some embodiments, in the case that the calling terminal has a virtual private network service and the operator to which the calling terminal belongs is the target operator, if it is determined whether the calling terminal can call the called terminal through the virtual private network platform, it is only necessary to determine whether the operator to which the called terminal belongs is the target operator and whether the called terminal has a virtual private network service, so the step S103 may be implemented as steps S1031 to S1033 shown in fig. 5.
S1031, determining whether the operator to which the called terminal belongs is a target operator according to the user information.
In some embodiments, step S1031 may be embodied as: the S-CSCF network element determines whether the operator to which the called terminal belongs is a target operator according to whether the pre-insertion code of the called terminal is the target pre-insertion code corresponding to the target operator.
For example, assuming that the operator a is a target operator, after the pre-insert code of the operator a is 1234, the s-CSCF network element obtains the pre-insert code of the called terminal, it is determined whether the operator to which the called terminal belongs is the target operator by determining whether the pre-insert code of the called terminal is 1234.
It should be noted that, in the case that the pre-insertion code of the called terminal is the target pre-insertion code, determining the operator to which the called terminal belongs as the target operator; and in the case that the pre-inserted code of the called terminal is not the target pre-inserted code, determining that the operator to which the called terminal belongs is not the target operator.
It can be understood that the method for determining whether the operator to which the called terminal belongs is the target operator according to the preamble of the called terminal has higher accuracy and faster efficiency compared with other methods.
S1032, under the condition that the operator to which the called terminal belongs is a target operator, the number information is sent to the virtual private network platform, so that the virtual private network platform determines whether the called terminal opens the virtual private network service according to the number information.
In some embodiments, the vpn platform includes a vpn database, where the vpn database is configured to store number information of a terminal side device that opens a vpn service, a short number corresponding to the number information, subscription data corresponding to the number information, and so on. The subscription data refers to a certificate for enabling the terminal side equipment to open the virtual private network service.
As a possible implementation manner, in the case that the operator to which the called terminal belongs is the target operator, the S-CSCF network element sends the number information to the virtual private network platform, and the virtual private network platform queries whether subscription data corresponding to the number information exists in the virtual private network database according to the number information so as to determine whether the called terminal opens the virtual private network service.
For example, in the case that subscription data corresponding to the number information exists in the virtual private network database, the virtual private network platform determines that the called terminal opens the virtual private network service; under the condition that the subscription data corresponding to the number information does not exist in the virtual private network database, the virtual private network platform determines that the called terminal does not open the virtual private network service.
As another possible implementation manner, in the case that the operator to which the called terminal belongs is the target operator, the S-CSCF network element sends the number information to the virtual private network platform, and the virtual private network platform queries whether the short number corresponding to the number information exists in the virtual private network database according to the number information to determine whether the called terminal opens the virtual private network service.
For example, in the case that a short number corresponding to the number information exists in the virtual private network database, the virtual private network platform determines that the called terminal opens a virtual private network service; under the condition that the short number corresponding to the number information does not exist in the virtual private network database, the virtual private network platform determines that the called terminal does not open the virtual private network service.
S1033, under the condition that the called terminal does not open the virtual private network service, determining that the calling terminal cannot call the called terminal through the virtual private network platform.
It can be understood that, in the case where the called terminal does not open the virtual private network service, the called terminal does not satisfy the condition that both the calling terminal and the operator to which the called terminal belongs are target operators and both the calling terminal and the called terminal open the virtual private network service, and therefore, the calling terminal cannot call the called terminal through the virtual private network platform.
And S104, under the condition that the calling terminal does not call the called terminal through the virtual private network platform, recording target call ticket data, wherein the target call ticket data are telephone traffic data generated in the process that the calling terminal and the called terminal do not call through the virtual private network platform.
The target call ticket data is used for recording basic information of a calling terminal calling a called terminal, for example: the start time, duration, end time of call, calling terminal, called terminal, etc.
In some embodiments, when the calling terminal does not call the called terminal through the virtual private network platform, the virtual private network platform does not generate the target call ticket data corresponding to the call, so that the target call ticket data is not recorded; but even if the calling terminal calls the called terminal without passing through the virtual private network platform, the S-CSCF network element will still generate the target call ticket data corresponding to the call and record the target call ticket data.
In some embodiments, in the case that the calling terminal calls the called terminal through the virtual private network platform, both the virtual private network platform and the S-CSCF network element generate the target call ticket data corresponding to the call, and record the target call ticket data.
In some embodiments, the S-CSCF network element or the virtual private network platform generates the target call ticket data by detecting the call request and the response information, and when the S-CSCF network element or the virtual private network platform detects an event such as the establishment or the release of the call request, the S-CSCF network element or the virtual private network platform records the event; in addition, the S-CSCF network element or the virtual private network platform can also configure a corresponding data recording mechanism and a database to store the target call ticket data for subsequent analysis and processing.
It can be understood that the S-CSCF network element can improve the accuracy of the call ticket data by screening that the calling terminal cannot call the target call ticket data of the called terminal through the virtual private network platform and recording, thereby improving the rationality of charging of the operators.
In some embodiments, under the condition that the calling terminal does not call the called terminal through the virtual private network platform, the S-CSCF network element does not trigger the virtual private network platform, sends a call request to the ENS network element for route inquiry and matching with the next hop route, then the ENS sends the call request to the first IBCF network element, the first IBCF network element calls to the second IBCF network element, the second IBCF network element calls to the IMS network, and finally the called terminal is called through the IMS network.
In some embodiments, after determining that the calling terminal calls the called terminal through the virtual private network platform, after the S-CSCF network element triggers the virtual private network platform, if the number information included in the call request is a short number, the S-CSCF network element needs to send the call request to the virtual private network platform first so that the virtual private network platform converts the short number into a trombone, then the call request carrying the trombone is returned to the S-CSCF network element, the S-CSCF network element sends the call request to the ENS network element to perform route query and match with the next hop route, then the ENS sends the call request to the first IBCF network element, the first IBCF network element calls to the second IBCF network element, the second IBCF network element calls to the IMS network, and finally the IMS network calls to the called terminal.
In general, the technical scheme provided by the application can ensure that the virtual private network service is flexibly triggered, and can screen and filter the call request which does not meet the condition of triggering the virtual private network service and record the target call ticket data generated based on the call request, thereby effectively reducing the potential privacy leakage wind direction and improving the network security on one hand; on the other hand, the accuracy of the ticket can be improved, so that the reasonability of charging of operators is enhanced.
It can be seen that the foregoing description of the solution provided by the embodiments of the present application has been presented mainly from a method perspective. To achieve the above-mentioned functions, embodiments of the present application provide corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application can divide the functional modules of the network node according to the method example, for example, each functional module can be divided corresponding to each function, and two or more functions can be integrated in one processing module. The integrated modules may be implemented in hardware or in software functional modules. Optionally, the division of the modules in the embodiment of the present application is schematic, which is merely a logic function division, and other division manners may be implemented in practice.
Referring to fig. 6, a schematic structural diagram of a call ticket data recording apparatus according to an embodiment of the present application is provided. The modules in the device shown in fig. 6 have the functions of implementing the steps in fig. 3, and can achieve the corresponding technical effects. As shown in fig. 6, the call ticket data recording apparatus 600 may include: a receiving module 601, an acquiring module 602, a determining module 603 and a recording module 604.
The receiving module 601 is configured to receive a call request from a calling terminal, where the calling terminal is provided with a virtual private network service, the calling terminal is a target operator user, and the call request includes number information of a called terminal.
The obtaining module 602 is configured to obtain, from the data management network element, user information of the called terminal, where the user information is used to characterize information of an operator to which the called terminal belongs, based on the number information.
A determining module 603, configured to determine whether the calling terminal can call the called terminal through the virtual private network platform according to the user information and the number information.
And the recording module 604 is configured to record, when the calling terminal does not call the called terminal through the virtual private network platform, target call ticket data, where the target call ticket data is traffic data generated in a process that the calling terminal and the called terminal do not talk through the virtual private network platform.
In some embodiments, the obtaining module 602 is specifically configured to send, to the data management network element, a first message based on the number information, where the first message is used to request the data management network element to query the user information; and receiving a second message sent by the data management network element, wherein the second message comprises user information.
In some embodiments, the user information includes a preamble of the called terminal; the determining module 603 is specifically configured to determine, according to the user information, whether an operator to which the called terminal belongs is a target operator; under the condition that the operator to which the called terminal belongs is a target operator, sending the number information to the virtual private network platform, so that the virtual private network platform determines whether the called terminal opens the virtual private network service according to the number information; and under the condition that the called terminal does not open the virtual private network service, determining that the calling terminal cannot call the called terminal through the virtual private network platform.
In some embodiments, the determining module 603 is further configured to determine that the calling terminal cannot call the called terminal through the virtual private network platform if the operator to which the called terminal belongs is not the target operator.
In the case of implementing the functions of the integrated modules in the form of hardware, the embodiment of the present invention provides another possible structural schematic diagram of the call ticket data recording apparatus referred to in the above embodiment. As shown in fig. 7, the call ticket data recording apparatus 700 includes: a processor 702, a communication interface 703, and a bus 704. Optionally, the call ticket data recording apparatus may further include a memory 701.
The processor 702 may be any means for implementing or executing the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. The processor 702 may be a central processor, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor 702 may also be a combination of computing functions, e.g., including one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
A communication interface 703 for connecting with other devices via a communication network. The communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc.
The memory 701 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-only memory, EEPROM), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
As a possible implementation, the memory 701 may exist separately from the processor 702, and the memory 701 may be connected to the processor 702 through the bus 704 for storing instructions or program codes. The processor 702 can implement the call ticket data recording method provided by the embodiment of the present invention when it calls and executes instructions or program codes stored in the memory 701.
In another possible implementation, the memory 701 may also be integrated with the processor 702.
Bus 704, which may be an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The bus 704 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 7, but not only one bus or one type of bus.
It will be apparent to those skilled in the art from this description that the above-described embodiments are merely exemplified by the above-described division of functional modules for convenience and brevity, and in practical applications, the above-described functional allocation may be performed by different functional modules, i.e., the internal structure of the call ticket data recording apparatus is divided into different functional modules, so as to perform all or part of the above-described functions.
The embodiment of the application also provides a computer readable storage medium. All or part of the flow in the above method embodiments may be implemented by computer instructions to instruct related hardware, and the program may be stored in the above computer readable storage medium, and the program may include the flow in the above method embodiments when executed. The computer readable storage medium may be any of the foregoing embodiments or memory. The computer-readable storage medium may be an external storage device of the bill data recording apparatus, for example, a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, or a flash memory card (FLASH CARD) provided in the bill data recording apparatus. Further, the computer-readable storage medium may include both the internal storage unit and the external storage device of the bill data recording apparatus. The computer-readable storage medium is used for storing the computer program and other programs and data required by the bill data recording apparatus. The above-described computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present application also provide a computer program product comprising a computer program which, when run on a computer, causes the computer to perform any of the call ticket recording methods provided in the embodiments above.
The present application is not limited to the above embodiments, and any changes or substitutions within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.