CN106850552A - A kind of method that harmful Call Intercept is realized based on signaling re-injection - Google Patents

A kind of method that harmful Call Intercept is realized based on signaling re-injection Download PDF

Info

Publication number
CN106850552A
CN106850552A CN201611190962.3A CN201611190962A CN106850552A CN 106850552 A CN106850552 A CN 106850552A CN 201611190962 A CN201611190962 A CN 201611190962A CN 106850552 A CN106850552 A CN 106850552A
Authority
CN
China
Prior art keywords
signaling
call
harmful
calling
end server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611190962.3A
Other languages
Chinese (zh)
Inventor
庞韶敏
高华
薛二彭
田野
何文杰
张震
金红
杨满智
刘长永
陈晓光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eversec Beijing Technology Co Ltd
Original Assignee
Eversec Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eversec Beijing Technology Co Ltd filed Critical Eversec Beijing Technology Co Ltd
Priority to CN201611190962.3A priority Critical patent/CN106850552A/en
Publication of CN106850552A publication Critical patent/CN106850552A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to field of communication network security, a kind of method that harmful Call Intercept is realized based on signaling re-injection is disclosed, the method includes:Headend equipment gathers signaling and media information, obtains the caller information in signaling, is matched with the number in the information and date storehouse, if blacklist targeted customer, then headend equipment is intercepted using signaling re-injection mode to harmful calling;If gray list user sends into back-end server after then the signaling information of the calling is associated with media information, judge that the number is harmful caller through back-end server, then transmitting order to lower levels to headend equipment is intercepted, and headend equipment uses signaling re-injection mode, realizes the interception to being harmful to calling.The present invention can be to the calling of blacklist caller and by detecting that confirming as harmful calling realizes real-time blocking.

Description

Method for realizing harmful call interception based on signaling reinjection
Technical Field
The invention belongs to the technical field of communication network safety, and particularly relates to a method for realizing harmful call interception based on signaling reinjection.
Background
In recent years, fraud methods using telephones have been in an explosive trend, and have been widely defrauded and have huge money amounts, so that communication fraud has become a huge user pain point. In 2013, the national communication fraud scheme is more than 30 ten thousand, and the masses are cheated by 100 million yuan; in 2014, the national communication fraud scheme 40 has more than ten thousand, and 107 million yuan is lost by the masses; in 2015, 59 ten thousand telecom fraud cases were established by national public security institutions, the increase of the same ratio is 32.5%, and the economic loss is 222 million yuan. 35.5 thousands of nationwide concurrent telecom fraud cases from 1 month to 8 months of the year, similarly increasing by 36.4%, resulting in a loss of 114.2 million yuan. The report shows that in recent years, about 805 million yuan and 124 yuan are lost for net citizens due to personal information leakage, junk information, fraud information and the like, wherein about 4500 million net citizens suffer economic loss more than 1000 yuan in recent years. The lost back shadow shoots out a moving black product which is a complete chain and relates to a plurality of links, the moving black product cannot achieve the effective striking purpose only by the force of a certain party, and all parties need to be combined to exert force together.
In 2013 to the present, in nearly 10 years, the telecommunication fraud cases in China are rapidly increased at a speed of 20% -30% every year. From the telecom fraud case 104 with more than ten million elements being deceived and from the case 2392 with more than one million elements being deceived, all over the country. The 'old-age money' and 'life-saving money' of many people are deceived, and people are bought out of home and lost; some enterprises are cheated and bankruptcy is closed, and a group event is triggered.
In view of the above frequent occurrence of the electrical fraud cases, how to analyze the spam numbers from a plurality of phone numbers and circle out malicious numbers becomes a problem to be solved at present.
Disclosure of Invention
The invention aims to provide a method for realizing harmful call interception based on signaling reinjection so as to realize the interception of suspected harmful calls in communication.
The technical scheme adopted by the invention is as follows:
a method for implementing harmful call interception based on signaling reinjection, the method comprising:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, the front-end equipment directly intercepts the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the number is a harmful call or not, if the back-end server judges that the number is a harmful call, the back-end server sends a command to the front-end equipment for interception, and if the back-end server judges that the number is not a harmful call, the back-end server allows the back-end server to normally call.
Furthermore, the front-end equipment acquires the current network link in a bypass parallel connection mode, acquires the media plane information and decodes the acquired media information to complete the association of the signaling and the media, and the acquisition mode comprises mirroring and light splitting.
Further, the front-end equipment reports all call tickets to the back-end server, and the back-end server analyzes the call tickets based on external input characteristics, signaling characteristics and behavior characteristics of the calls, generates a grey list for the calls suspected to be harmful and sends the grey list to a grey list library of the front-end equipment.
Furthermore, the front-end equipment generates a signaling packet for releasing the call by adopting a signaling reinjection mode according to the matching result of the blacklist library and a command issued by the back-end server, and intercepts the harmful call, wherein the signaling reinjection comprises constructing related call information, and the information is sent to a network to realize the interception of the harmful call.
Furthermore, different reinjection signaling is adopted for control signaling in the network transmission protocol of SIP, BICC and ISUP.
Compared with the prior art, the method for realizing harmful call interception based on signaling reinjection can realize recognition of fraud calls by matching with blacklist telephone numbers and analyzing voice semantic features of grey list users. After the fraudulent call is identified, the call is intercepted in real time by using a method of signaling reinjection. The invention does not need to greatly reform the current network and does not influence the normal conversation in the current network.
Drawings
Fig. 1 is a schematic flowchart of a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention;
fig. 2 is a system architecture diagram of a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention.
Detailed Description
The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby. As certain terms are used throughout the description and claims to refer to particular components. As one skilled in the art will appreciate, manufacturers may refer to a component by different names. The present specification and claims do not intend to distinguish between components that differ in name but not function. The description which follows is a preferred embodiment of the present invention, but is made for the purpose of illustrating the general principles of the invention and not for the purpose of limiting the scope of the invention. The scope of the present invention is defined by the appended claims.
The invention is described in further detail below with reference to the figures and specific embodiments.
The invention aims to realize real-time effective interception of calls of blacklist numbers and calls confirmed to be harmful through detection.
As shown in fig. 1 and fig. 2, a method for implementing harmful call interception based on signaling reinjection according to an embodiment of the present invention includes the following steps:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, the front-end equipment directly intercepts the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the calling number is a harmful call or not, if the back-end server judges that the calling number is a harmful call, the back-end server sends a command to front-end equipment for interception, the call is prevented from continuing, and if the back-end server judges that the calling number is not a harmful call, the back-end server allows the calling number to be normally called.
Specifically, the invention mainly confirms through three steps of signaling collection and media collection, harmful call judgment and harmful call interception.
In the process of acquiring signaling and media, the signaling is acquired mainly by adopting a bypass parallel connection mode for the existing network link, and the acquisition mode is a mirror image or light splitting mode or a mode of combining the mirror image and the light splitting mode. The media mainly collects the media surface information, decodes the collected media information and restores the media information into an audio file. And completes the association of the signaling and the media by decoding the protocol. The bypass parallel connection mode has the advantages that the front-end equipment is in parallel connection with the equipment in the network, the normal operation of the network equipment cannot be influenced when the front-end equipment fails, and the network can be realized without great transformation of the existing network. The mirror mode is that a mirror link is constructed, so that the signal in the network equipment is transmitted to the front-end equipment in a mirror mode except for normal transmission. The optical splitting mode constructs an optical splitting link for the network device which carries out signal transmission through the optical network, so that the optical signal in the network device is split and transmitted to the front-end device except for normal transmission.
In the harmful call determination process, there are two main ways for the harmful call determination.
The first judgment mode is that the front-end equipment is provided with a blacklist library, decodes and analyzes the collected signaling information to obtain a calling number in the signaling, and matches the calling number with the blacklist library. And judging whether the number is owned by the blacklist library, and if the number is located in the blacklist library, judging the call as a harmful call.
The second way is that the calling number obtained by decoding and analyzing the signaling information is not in the black list library, the calling number is matched with the suspected harmful calling grey list library to judge whether the number is all in the grey list library, if the number is in the grey list library, the signaling information and the media information of the calling number are transmitted to a back-end server, the back-end server judges whether the call is a harmful call, and the back-end server judges that the call is a harmful call and intercepts the call.
Before the harmful call is judged, the front-end equipment reports all call tickets to the back-end server, the back-end server performs single or comprehensive analysis on external input characteristics, signaling characteristics and behavior characteristics, and generates a grey list for the suspected harmful call and sends the grey list to the grey list library of the front-end equipment, so that the grey list library is updated. The back-end server can generate a blacklist to be issued to the front-end blacklist library after the command intercepted by the front-end server is added to the call which is determined to be harmful, so that the updating of the blacklist library is realized.
And in the process of intercepting the harmful call, adopting a signaling reinjection mode, and issuing a command by the front-end equipment according to the blacklist matching result and the back-end server to generate a signaling packet for releasing the call so as to intercept the harmful call. The signaling reinjection is the construction of related call information, and the information is sent to the network, so that the interception of harmful calls can be realized. The construction of the signaling reinjection message is completed by the front-end equipment.
The present invention uses different reinjection signaling for different networks.
Intercepting the call before the call according to the blacklist, wherein the specific reinjection signaling is shown in the following table:
control signaling Controlling bearers Media bearer Reinjection signaling intercept control
SIP IP IP Sending SIP 486 messages
BICC IP IP Sending BICC REL messages
ISUP TDM SS7 TDM Sending ISUP REL message
Intercepting the call after the call according to the grey list, wherein the specific reinjection signaling is shown in the following table:
control signaling Controlling bearers Media bearer Reinjection signaling intercept control
SIP IP IP Sending SIP BYE messages
BICC IP IP Sending BICC REL messages
ISUP TDM SS7 TDM Sending ISUP REL message
Three signaling transport protocols are briefly described below.
Sip (session Initiation protocol) is a signaling control protocol of an application layer. For creating, modifying and releasing sessions of one or more participants.
SIP is independent of the transport layer, and uses User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) to flexibly connect users independent of the underlying infrastructure.
The SIP BYE message is used to terminate an established session, which can be ended by sending this message to the calling or called party.
BICC is an abbreviation of Bearer Independent Call Control protocol, i.e. Bearer Independent Call Control protocol. BICC is a call control protocol based on ISUP (ISDN User part). Since it is the call control protocol, the BICC is only responsible for setting up, modifying and terminating calls. BICC is a bearer independent protocol. REL is release message of BICC; REL is also the release message of ISUP.
The invention realizes the interception of harmful calls by a signaling reinjection mode, and the specific realization mode is that a bypass parallel connection mode is adopted in the current network link of the soft switching office to realize the acquisition of signaling and media. The front-end equipment reports the call ticket to the back-end server, and the back-end server generates a blacklist and a grey list according to external input, signaling characteristics, behavior characteristics and the like. The front-end equipment reports signaling and media information to the grey list, the back-end server judges the uploaded information, and if the uploaded information is judged to be harmful calls, an interception command is sent to the front-end equipment. The front-end equipment realizes the interception of harmful calls in a signaling reinjection mode.
The method of the invention can realize effective interception of harmful calls without greatly modifying the current network on the basis of not influencing normal calls of other networks in the current network.
It should be noted that the above-mentioned embodiments are only preferred embodiments of the present invention, and the scope of the present invention is not limited thereby, and the present invention may be modified in materials and structures, or replaced with technical equivalents, in the constructions of the above-mentioned various components. Therefore, structural equivalents made by using the description and drawings of the present invention or by directly or indirectly applying to other related arts are also encompassed within the scope of the present invention.

Claims (5)

1. A method for realizing harmful call interception based on signaling reinjection is characterized by comprising the following steps:
the front-end equipment acquires the signaling and the media information and acquires calling number information in the signaling and the media information;
matching the obtained calling number information with the calling numbers in the database, and judging whether harmful calling exists; wherein,
if the matching is the blacklist target user, directly intercepting the call;
if the matching is not the blacklist user, the calling number is matched with the suspected harmful calling grey list library again to judge whether the number is owned by the grey list library or not, wherein,
if the matching is not all in the grey list library, allowing the calling to be normally called;
if the matching exists in the grey list library, the signaling and the media information of the call are transmitted to a back-end server, and the back-end server judges whether the number is a harmful calling party or not, if the back-end server judges that the number is a harmful call, the back-end server sends a command to the front-end equipment for interception, and if the back-end server judges that the number is not a harmful call, the back-end server allows the back-end server to normally call.
2. The method of claim 1, wherein the front-end device performs acquisition by using a bypass parallel connection mode for a current network link, and the front-end device performs association between the signaling and the media by acquiring media plane information and decoding the acquired media information, and the acquisition modes include mirroring and light splitting.
3. The method for realizing harmful call interception based on signaling reinjection according to claim 1, wherein the front-end device reports all call tickets to the back-end server, and the back-end server analyzes the call tickets based on external input characteristics, signaling characteristics and behavior characteristics of the call, generates a grey list for the call suspected to be harmful, and sends the grey list to a grey list library of the front-end device.
4. The method according to claim 1, wherein the front-end device generates a signaling packet for releasing the call by means of signaling reinjection according to the matching result of the blacklist library and a command issued by the back-end server, and blocks the harmful call, wherein the signaling reinjection includes constructing related call information, and sending the information to the network to block the harmful call.
5. The method of claim 4, wherein different reinjection signaling is used for control signaling in SIP, BICC, ISUP to realize interception for network transmission protocol.
CN201611190962.3A 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection Pending CN106850552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611190962.3A CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611190962.3A CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Publications (1)

Publication Number Publication Date
CN106850552A true CN106850552A (en) 2017-06-13

Family

ID=59135066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611190962.3A Pending CN106850552A (en) 2016-12-21 2016-12-21 A kind of method that harmful Call Intercept is realized based on signaling re-injection

Country Status (1)

Country Link
CN (1) CN106850552A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833720A (en) * 2018-05-04 2018-11-16 北京邮电大学 Fraudulent call number identification method and system
CN109587114A (en) * 2018-10-31 2019-04-05 中国人民解放军战略支援部队信息工程大学 Based on the junk call identification device and protective device of media redirection of router, method
CN111314359A (en) * 2020-02-20 2020-06-19 上海欣方智能系统有限公司 Anti-fraud method based on SIP signaling collection
CN113691680A (en) * 2021-08-17 2021-11-23 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN114679432A (en) * 2022-02-28 2022-06-28 河南信大网御科技有限公司 Harmful telephone precaution device and method
CN118093734A (en) * 2024-03-01 2024-05-28 湖南微趣互动科技有限公司 Big data blacklist filtering method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
WO2013091492A1 (en) * 2011-12-20 2013-06-27 中兴通讯股份有限公司 Method and device for limiting fraudulent calls of false caller
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN104301896A (en) * 2014-10-15 2015-01-21 上海欣方智能系统有限公司 Intelligent fraud short message monitor and alarm system and method
US20150256662A1 (en) * 2014-03-07 2015-09-10 Dialogtech Inc. Phone fraud deterrence system for use with toll free and other fee generating numbers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN101453522A (en) * 2008-12-19 2009-06-10 中国移动通信集团浙江有限公司 Method for non-standardized dialing service monitoring between networks
WO2013091492A1 (en) * 2011-12-20 2013-06-27 中兴通讯股份有限公司 Method and device for limiting fraudulent calls of false caller
US20150256662A1 (en) * 2014-03-07 2015-09-10 Dialogtech Inc. Phone fraud deterrence system for use with toll free and other fee generating numbers
CN104093153A (en) * 2014-06-25 2014-10-08 东方通信股份有限公司 Method for achieving pseudo number call discrimination and interception based on signalling route analysis and system thereof
CN104301896A (en) * 2014-10-15 2015-01-21 上海欣方智能系统有限公司 Intelligent fraud short message monitor and alarm system and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833720A (en) * 2018-05-04 2018-11-16 北京邮电大学 Fraudulent call number identification method and system
CN109587114A (en) * 2018-10-31 2019-04-05 中国人民解放军战略支援部队信息工程大学 Based on the junk call identification device and protective device of media redirection of router, method
CN111314359A (en) * 2020-02-20 2020-06-19 上海欣方智能系统有限公司 Anti-fraud method based on SIP signaling collection
CN113691680A (en) * 2021-08-17 2021-11-23 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN113691680B (en) * 2021-08-17 2024-01-30 北京恒安嘉新安全技术有限公司 BICC call blocking method, system, device, equipment and medium
CN114679432A (en) * 2022-02-28 2022-06-28 河南信大网御科技有限公司 Harmful telephone precaution device and method
CN114679432B (en) * 2022-02-28 2024-01-05 河南信大网御科技有限公司 Harmful telephone prevention equipment and method
CN118093734A (en) * 2024-03-01 2024-05-28 湖南微趣互动科技有限公司 Big data blacklist filtering method

Similar Documents

Publication Publication Date Title
CN106850552A (en) A kind of method that harmful Call Intercept is realized based on signaling re-injection
CN104243727B (en) System and method for performing big data analysis confirmation and interception on phone scams
US20180294959A1 (en) Identity and content authentication for phone calls
US9871913B1 (en) Systems and methods to identify ANI and caller ID manipulation for determining trustworthiness of incoming calling party and billing number information
US7233656B2 (en) Method and system for identifying telemarketer communications
US20120287823A1 (en) Verification method and system for screening internet caller id spoofs and malicious phone calls
US7283969B1 (en) Methods and systems for automatically registering complaints against calling parties
Mustafa et al. You can call but you can't hide: detecting caller id spoofing attacks
WO2002075339A1 (en) Communications system with fraud monitoring
CN111314359B (en) Anti-fraud method based on SIP signaling collection
EP3577886B1 (en) Detection and prevention of unwanted calls in a telecommunications system
CN102075639A (en) Method and device for intercepting malicious call in international service communication network
US7152103B1 (en) Lawful communication interception—intercepting communication associated information
CN107770777A (en) A kind of recognition methods for fraudulent call of recording
KR101945782B1 (en) Method and apparatus for providing illegal phishing call blocking services of VoIP call
CN102438243A (en) Method for analyzing telephone frequency and identifying harassing calls
CN107295491A (en) The method and system of automatic screening calling subscribe during call forwarding
CN106453799A (en) False communication identifying method and system
CN101771757A (en) Method for detecting and intercepting nuisance calls
WO2019190438A2 (en) Ott bypass fraud detection by using call detail record and voice quality analytics
CN101127777A (en) Method, device and system for processing security threat information of voice communication
CN101022475A (en) Method, device and system for legal monitoring
Gritzalis et al. SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT)
KR101379779B1 (en) Caller Information Modulated Voice/Message Phishing Detecting and Blocking Method
CN101222539B (en) IP multimedia subsystem and its supplementary service monitoring method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 100191 Beijing City, North Third Ring Road West, No. 27, building 25, room five, floor 5002

Applicant after: Heng Jia Jia (Beijing) Technology Co., Ltd.

Address before: 100089, room 27, building five, building 25, No. 5002 West Third Ring Road, Haidian District, Beijing

Applicant before: Eversec (Beijing) Technology Co., Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613