CN106850552A - A kind of method that harmful Call Intercept is realized based on signaling re-injection - Google Patents
A kind of method that harmful Call Intercept is realized based on signaling re-injection Download PDFInfo
- Publication number
- CN106850552A CN106850552A CN201611190962.3A CN201611190962A CN106850552A CN 106850552 A CN106850552 A CN 106850552A CN 201611190962 A CN201611190962 A CN 201611190962A CN 106850552 A CN106850552 A CN 106850552A
- Authority
- CN
- China
- Prior art keywords
- signaling
- call
- harmful
- calling
- end server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000011664 signaling Effects 0.000 title claims abstract description 68
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000002347 injection Methods 0.000 title abstract 4
- 239000007924 injection Substances 0.000 title abstract 4
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000000903 blocking effect Effects 0.000 abstract 1
- 230000003287 optical effect Effects 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- IROWCYIEJAOFOW-UHFFFAOYSA-N DL-Isoprenaline hydrochloride Chemical compound Cl.CC(C)NCC(O)C1=CC=C(O)C(O)=C1 IROWCYIEJAOFOW-UHFFFAOYSA-N 0.000 description 2
- 229940057594 isuprel Drugs 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention belongs to field of communication network security, a kind of method that harmful Call Intercept is realized based on signaling re-injection is disclosed, the method includes:Headend equipment gathers signaling and media information, obtains the caller information in signaling, is matched with the number in the information and date storehouse, if blacklist targeted customer, then headend equipment is intercepted using signaling re-injection mode to harmful calling;If gray list user sends into back-end server after then the signaling information of the calling is associated with media information, judge that the number is harmful caller through back-end server, then transmitting order to lower levels to headend equipment is intercepted, and headend equipment uses signaling re-injection mode, realizes the interception to being harmful to calling.The present invention can be to the calling of blacklist caller and by detecting that confirming as harmful calling realizes real-time blocking.
Description
Technical Field
The invention belongs to the technical field of communication network safety, and particularly relates to a method for realizing harmful call interception based on signaling reinjection.
Background
In recent years, fraud methods using telephones have been in an explosive trend, and have been widely defrauded and have huge money amounts, so that communication fraud has become a huge user pain point. In 2013, the national communication fraud scheme is more than 30 ten thousand, and the masses are cheated by 100 million yuan; in 2014, the national communication fraud scheme 40 has more than ten thousand, and 107 million yuan is lost by the masses; in 2015, 59 ten thousand telecom fraud cases were established by national public security institutions, the increase of the same ratio is 32.5%, and the economic loss is 222 million yuan. 35.5 thousands of nationwide concurrent telecom fraud cases from 1 month to 8 months of the year, similarly increasing by 36.4%, resulting in a loss of 114.2 million yuan. The report shows that in recent years, about 805 million yuan and 124 yuan are lost for net citizens due to personal information leakage, junk information, fraud information and the like, wherein about 4500 million net citizens suffer economic loss more than 1000 yuan in recent years. The lost back shadow shoots out a moving black product which is a complete chain and relates to a plurality of links, the moving black product cannot achieve the effective striking purpose only by the force of a certain party, and all parties need to be combined to exert force together.
In 2013 to the present, in nearly 10 years, the telecommunication fraud cases in China are rapidly increased at a speed of 20% -30% every year. From the telecom fraud case 104 with more than ten million elements being deceived and from the case 2392 with more than one million elements being deceived, all over the country. The 'old-age money' and 'life-saving money' of many people are deceived, and people are bought out of home and lost; some enterprises are cheated and bankruptcy is closed, and a group event is triggered.
In view of the above frequent occurrence of the electrical fraud cases, how to analyze the spam numbers from a plurality of phone numbers and circle out malicious numbers becomes a problem to be solved at present.
Disclosure of Invention
The invention aims to provide a method for realizing harmful call interception based on signaling reinjection so as to realize the interception of suspected harmful calls in communication.
The technical scheme adopted by the invention is as follows:
a method for implementing harmful call interception based on signaling reinjection, the method comprising:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, the front-end equipment directly intercepts the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the number is a harmful call or not, if the back-end server judges that the number is a harmful call, the back-end server sends a command to the front-end equipment for interception, and if the back-end server judges that the number is not a harmful call, the back-end server allows the back-end server to normally call.
Furthermore, the front-end equipment acquires the current network link in a bypass parallel connection mode, acquires the media plane information and decodes the acquired media information to complete the association of the signaling and the media, and the acquisition mode comprises mirroring and light splitting.
Further, the front-end equipment reports all call tickets to the back-end server, and the back-end server analyzes the call tickets based on external input characteristics, signaling characteristics and behavior characteristics of the calls, generates a grey list for the calls suspected to be harmful and sends the grey list to a grey list library of the front-end equipment.
Furthermore, the front-end equipment generates a signaling packet for releasing the call by adopting a signaling reinjection mode according to the matching result of the blacklist library and a command issued by the back-end server, and intercepts the harmful call, wherein the signaling reinjection comprises constructing related call information, and the information is sent to a network to realize the interception of the harmful call.
Furthermore, different reinjection signaling is adopted for control signaling in the network transmission protocol of SIP, BICC and ISUP.
Compared with the prior art, the method for realizing harmful call interception based on signaling reinjection can realize recognition of fraud calls by matching with blacklist telephone numbers and analyzing voice semantic features of grey list users. After the fraudulent call is identified, the call is intercepted in real time by using a method of signaling reinjection. The invention does not need to greatly reform the current network and does not influence the normal conversation in the current network.
Drawings
Fig. 1 is a schematic flowchart of a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention;
fig. 2 is a system architecture diagram of a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention.
Detailed Description
The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby. As certain terms are used throughout the description and claims to refer to particular components. As one skilled in the art will appreciate, manufacturers may refer to a component by different names. The present specification and claims do not intend to distinguish between components that differ in name but not function. The description which follows is a preferred embodiment of the present invention, but is made for the purpose of illustrating the general principles of the invention and not for the purpose of limiting the scope of the invention. The scope of the present invention is defined by the appended claims.
The invention is described in further detail below with reference to the figures and specific embodiments.
The invention aims to realize real-time effective interception of calls of blacklist numbers and calls confirmed to be harmful through detection.
As shown in fig. 1 and fig. 2, a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention includes the following steps:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, the front-end equipment directly intercepts the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the calling number is a harmful call or not, if the back-end server judges that the calling number is a harmful call, the back-end server sends a command to front-end equipment for interception, the call is prevented from continuing, and if the back-end server judges that the calling number is not a harmful call, the back-end server allows the calling number to be normally called.
Specifically, the invention mainly confirms through three steps of signaling collection and media collection, harmful call judgment and harmful call interception.
In the process of acquiring signaling and media, the signaling is acquired mainly by adopting a bypass parallel connection mode for the existing network link, and the acquisition mode is a mirror image or light splitting mode or a mode of combining the mirror image and the light splitting mode. The media mainly collects the media surface information, decodes the collected media information and restores the media information into an audio file. And completes the association of the signaling and the media by decoding the protocol. The bypass parallel connection mode has the advantages that the front-end equipment is in parallel connection with the equipment in the network, the normal operation of the network equipment cannot be influenced when the front-end equipment fails, and the network can be realized without great transformation of the existing network. The mirror mode is that a mirror link is constructed, so that the signal in the network equipment is transmitted to the front-end equipment in a mirror mode except for normal transmission. The optical splitting mode constructs an optical splitting link for the network device which carries out signal transmission through the optical network, so that the optical signal in the network device is split and transmitted to the front-end device except for normal transmission.
In the harmful call determination process, there are two main ways for the harmful call determination.
The first judgment mode is that the front-end equipment is provided with a blacklist library, decodes and analyzes the collected signaling information to obtain a calling number in the signaling, and matches the calling number with the blacklist library. And judging whether the number is owned by the blacklist library, and if the number is located in the blacklist library, judging the call as a harmful call.
The second way is that the calling number obtained by decoding and analyzing the signaling information is not in the black list library, the calling number is matched with the suspected harmful calling grey list library to judge whether the number is all in the grey list library, if the number is in the grey list library, the signaling information and the media information of the calling number are transmitted to a back-end server, the back-end server judges whether the call is a harmful call, and the back-end server judges that the call is a harmful call and intercepts the call.
Before the harmful call is judged, the front-end equipment reports all call tickets to the back-end server, the back-end server performs single or comprehensive analysis on external input characteristics, signaling characteristics and behavior characteristics, and generates a grey list for the suspected harmful call and sends the grey list to the grey list library of the front-end equipment, so that the grey list library is updated. The back-end server can generate a blacklist to be issued to the front-end blacklist library after the command intercepted by the front-end server is added to the call which is determined to be harmful, so that the updating of the blacklist library is realized.
And in the process of intercepting the harmful call, adopting a signaling reinjection mode, and issuing a command by the front-end equipment according to the blacklist matching result and the back-end server to generate a signaling packet for releasing the call so as to intercept the harmful call. The signaling reinjection is the construction of related call information, and the information is sent to the network, so that the interception of harmful calls can be realized. The construction of the signaling reinjection message is completed by the front-end equipment.
The present invention uses different reinjection signaling for different networks.
Intercepting the call before the call according to the blacklist, wherein the specific reinjection signaling is shown in the following table:
control signaling | Controlling bearers | Media bearer | Reinjection signaling intercept control |
SIP | IP | IP | Sending SIP 486 messages |
BICC | IP | IP | Sending BICC REL messages |
ISUP | TDM SS7 | TDM | Sending ISUP REL message |
Intercepting the call after the call according to the grey list, wherein the specific reinjection signaling is shown in the following table:
control signaling | Controlling bearers | Media bearer | Reinjection signaling intercept control |
SIP | IP | IP | Sending SIP BYE messages |
BICC | IP | IP | Sending BICC REL messages |
ISUP | TDM SS7 | TDM | Sending ISUP REL message |
Three signaling transport protocols are briefly described below.
Sip (session Initiation protocol) is a signaling control protocol of an application layer. For creating, modifying and releasing sessions of one or more participants.
SIP is independent of the transport layer, and uses User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) to flexibly connect users independent of the underlying infrastructure.
The SIP BYE message is used to terminate an established session, which can be ended by sending this message to the calling or called party.
BICC is an abbreviation of Bearer Independent Call Control protocol, i.e. Bearer Independent Call Control protocol. BICC is a call control protocol based on ISUP (ISDN User part). Since it is the call control protocol, the BICC is only responsible for setting up, modifying and terminating calls. BICC is a bearer independent protocol. REL is release message of BICC; REL is also the release message of ISUP.
The invention realizes the interception of harmful calls by a signaling reinjection mode, and the specific realization mode is that a bypass parallel connection mode is adopted in the current network link of the soft switching office to realize the acquisition of signaling and media. The front-end equipment reports the call ticket to the back-end server, and the back-end server generates a blacklist and a grey list according to external input, signaling characteristics, behavior characteristics and the like. The front-end equipment reports signaling and media information to the grey list, the back-end server judges the uploaded information, and if the uploaded information is judged to be harmful calls, an interception command is sent to the front-end equipment. The front-end equipment realizes the interception of harmful calls in a signaling reinjection mode.
The method of the invention can realize effective interception of harmful calls without greatly modifying the current network on the basis of not influencing normal calls of other networks in the current network.
It should be noted that the above-mentioned embodiments are only preferred embodiments of the present invention, and the scope of the present invention is not limited thereby, and the present invention may be modified in materials and structures, or replaced with technical equivalents, in the constructions of the above-mentioned various components. Therefore, structural equivalents made by using the description and drawings of the present invention or by directly or indirectly applying to other related arts are also encompassed within the scope of the present invention.
Claims (5)
1. A method for realizing harmful call interception based on signaling reinjection is characterized by comprising the following steps:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, directly intercepting the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the number is a harmful calling party or not, if the back-end server judges that the number is a harmful call, the back-end server sends a command to the front-end equipment for interception, and if the back-end server judges that the number is not a harmful call, the back-end server allows the back-end server to normally call.
2. The method of claim 1, wherein the front-end device performs acquisition by using a bypass parallel connection mode for a current network link, and the front-end device performs association between the signaling and the media by acquiring media plane information and decoding the acquired media information, and the acquisition modes include mirroring and light splitting.
3. The method for realizing harmful call interception based on signaling reinjection according to claim 1, wherein the front-end device reports all call tickets to the back-end server, and the back-end server analyzes the call tickets based on external input characteristics, signaling characteristics and behavior characteristics of the call, generates a grey list for the call suspected to be harmful, and sends the grey list to a grey list library of the front-end device.
4. The method according to claim 1, wherein the front-end device generates a signaling packet for releasing the call by means of signaling reinjection according to the matching result of the blacklist library and a command issued by the back-end server, and blocks the harmful call, wherein the signaling reinjection includes constructing related call information, and sending the information to the network to block the harmful call.
5. The method of claim 4, wherein different reinjection signaling is used for control signaling in SIP, BICC, ISUP to realize interception for network transmission protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190962.3A CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190962.3A CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106850552A true CN106850552A (en) | 2017-06-13 |
Family
ID=59135066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611190962.3A Pending CN106850552A (en) | 2016-12-21 | 2016-12-21 | A kind of method that harmful Call Intercept is realized based on signaling re-injection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850552A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833720A (en) * | 2018-05-04 | 2018-11-16 | 北京邮电大学 | Fraudulent call number identification method and system |
CN109587114A (en) * | 2018-10-31 | 2019-04-05 | 中国人民解放军战略支援部队信息工程大学 | Based on the junk call identification device and protective device of media redirection of router, method |
CN111314359A (en) * | 2020-02-20 | 2020-06-19 | 上海欣方智能系统有限公司 | Anti-fraud method based on SIP signaling collection |
CN113691680A (en) * | 2021-08-17 | 2021-11-23 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN114679432A (en) * | 2022-02-28 | 2022-06-28 | 河南信大网御科技有限公司 | Harmful telephone precaution device and method |
CN118093734A (en) * | 2024-03-01 | 2024-05-28 | 湖南微趣互动科技有限公司 | Big data blacklist filtering method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415161A (en) * | 2008-11-26 | 2009-04-22 | 深圳华为通信技术有限公司 | Method and apparatus for filtrating rubbish short message |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101453522A (en) * | 2008-12-19 | 2009-06-10 | 中国移动通信集团浙江有限公司 | Method for non-standardized dialing service monitoring between networks |
WO2013091492A1 (en) * | 2011-12-20 | 2013-06-27 | 中兴通讯股份有限公司 | Method and device for limiting fraudulent calls of false caller |
CN104093153A (en) * | 2014-06-25 | 2014-10-08 | 东方通信股份有限公司 | Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof |
CN104301896A (en) * | 2014-10-15 | 2015-01-21 | 上海欣方智能系统有限公司 | Intelligent fraud short message monitor and alarm system and method |
US20150256662A1 (en) * | 2014-03-07 | 2015-09-10 | Dialogtech Inc. | Phone fraud deterrence system for use with toll free and other fee generating numbers |
-
2016
- 2016-12-21 CN CN201611190962.3A patent/CN106850552A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101415161A (en) * | 2008-11-26 | 2009-04-22 | 深圳华为通信技术有限公司 | Method and apparatus for filtrating rubbish short message |
CN101453522A (en) * | 2008-12-19 | 2009-06-10 | 中国移动通信集团浙江有限公司 | Method for non-standardized dialing service monitoring between networks |
WO2013091492A1 (en) * | 2011-12-20 | 2013-06-27 | 中兴通讯股份有限公司 | Method and device for limiting fraudulent calls of false caller |
US20150256662A1 (en) * | 2014-03-07 | 2015-09-10 | Dialogtech Inc. | Phone fraud deterrence system for use with toll free and other fee generating numbers |
CN104093153A (en) * | 2014-06-25 | 2014-10-08 | 东方通信股份有限公司 | Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof |
CN104301896A (en) * | 2014-10-15 | 2015-01-21 | 上海欣方智能系统有限公司 | Intelligent fraud short message monitor and alarm system and method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833720A (en) * | 2018-05-04 | 2018-11-16 | 北京邮电大学 | Fraudulent call number identification method and system |
CN109587114A (en) * | 2018-10-31 | 2019-04-05 | 中国人民解放军战略支援部队信息工程大学 | Based on the junk call identification device and protective device of media redirection of router, method |
CN111314359A (en) * | 2020-02-20 | 2020-06-19 | 上海欣方智能系统有限公司 | Anti-fraud method based on SIP signaling collection |
CN113691680A (en) * | 2021-08-17 | 2021-11-23 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN113691680B (en) * | 2021-08-17 | 2024-01-30 | 北京恒安嘉新安全技术有限公司 | BICC call blocking method, system, device, equipment and medium |
CN114679432A (en) * | 2022-02-28 | 2022-06-28 | 河南信大网御科技有限公司 | Harmful telephone precaution device and method |
CN114679432B (en) * | 2022-02-28 | 2024-01-05 | 河南信大网御科技有限公司 | Harmful telephone prevention equipment and method |
CN118093734A (en) * | 2024-03-01 | 2024-05-28 | 湖南微趣互动科技有限公司 | Big data blacklist filtering method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850552A (en) | A kind of method that harmful Call Intercept is realized based on signaling re-injection | |
CN104243727B (en) | System and method for performing big data analysis confirmation and interception on phone scams | |
US20180294959A1 (en) | Identity and content authentication for phone calls | |
US9871913B1 (en) | Systems and methods to identify ANI and caller ID manipulation for determining trustworthiness of incoming calling party and billing number information | |
US7233656B2 (en) | Method and system for identifying telemarketer communications | |
US20120287823A1 (en) | Verification method and system for screening internet caller id spoofs and malicious phone calls | |
US7283969B1 (en) | Methods and systems for automatically registering complaints against calling parties | |
Mustafa et al. | You can call but you can't hide: detecting caller id spoofing attacks | |
WO2002075339A1 (en) | Communications system with fraud monitoring | |
CN111314359B (en) | Anti-fraud method based on SIP signaling collection | |
EP3577886B1 (en) | Detection and prevention of unwanted calls in a telecommunications system | |
CN102075639A (en) | Method and device for intercepting malicious call in international service communication network | |
US7152103B1 (en) | Lawful communication interception—intercepting communication associated information | |
CN107770777A (en) | A kind of recognition methods for fraudulent call of recording | |
KR101945782B1 (en) | Method and apparatus for providing illegal phishing call blocking services of VoIP call | |
CN102438243A (en) | Method for analyzing telephone frequency and identifying harassing calls | |
CN107295491A (en) | The method and system of automatic screening calling subscribe during call forwarding | |
CN106453799A (en) | False communication identifying method and system | |
CN101771757A (en) | Method for detecting and intercepting nuisance calls | |
WO2019190438A2 (en) | Ott bypass fraud detection by using call detail record and voice quality analytics | |
CN101127777A (en) | Method, device and system for processing security threat information of voice communication | |
CN101022475A (en) | Method, device and system for legal monitoring | |
Gritzalis et al. | SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) | |
KR101379779B1 (en) | Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method | |
CN101222539B (en) | IP multimedia subsystem and its supplementary service monitoring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information |
Address after: 100191 Beijing City, North Third Ring Road West, No. 27, building 25, room five, floor 5002 Applicant after: Heng Jia Jia (Beijing) Technology Co., Ltd. Address before: 100089, room 27, building five, building 25, No. 5002 West Third Ring Road, Haidian District, Beijing Applicant before: Eversec (Beijing) Technology Co., Ltd. |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |