CN104735272B - The hold-up interception method and system of a kind of harassing call - Google Patents
The hold-up interception method and system of a kind of harassing call Download PDFInfo
- Publication number
- CN104735272B CN104735272B CN201310722846.1A CN201310722846A CN104735272B CN 104735272 B CN104735272 B CN 104735272B CN 201310722846 A CN201310722846 A CN 201310722846A CN 104735272 B CN104735272 B CN 104735272B
- Authority
- CN
- China
- Prior art keywords
- calling
- suspected
- call
- user
- callback
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012360 testing method Methods 0.000 claims description 20
- 230000004044 response Effects 0.000 claims description 13
- 238000004458 analytical method Methods 0.000 claims description 7
- 238000011084 recovery Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 12
- 238000004590 computer program Methods 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Landscapes
- Telephonic Communication Services (AREA)
Abstract
本发明实施例公开了一种骚扰电话的拦截方法,所述方法包括:获取话单文件,分析所述话单文件中的用户号码,确定所述用户号码不在预先设置的白名单中,且确定所述用户号码符合预设条件时,将所述用户号码确定为疑似号码;将疑似号码进行反向回拨,根据回拨结果确定所述疑似号码为骚扰号码;发送限制指令给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;所述限制指令包括所述骚扰号码。本发明实施例同时还公开了一种骚扰电话的拦截系统。采用本发明实施例的技术方案,提高了骚扰电话的拦截效率,提高了用户的体验,且有效的阻止了网络电话的二次运营,避免了由于网络电话的二次运营给用户带来的损失。
The embodiment of the present invention discloses a method for intercepting harassing calls. The method includes: obtaining a bill file, analyzing the user number in the bill file, determining that the user number is not in the preset white list, and determining When the user number meets the preset conditions, the user number is determined as a suspected number; the suspected number is dialed back, and the suspected number is determined to be a harassment number according to the callback result; a restriction instruction is sent to the application server, and the The application server restricts the services of the harassing number; the restriction instruction includes the harassing number. The embodiment of the invention also discloses a system for intercepting harassing calls. Adopting the technical solution of the embodiment of the present invention improves the interception efficiency of harassing calls, improves user experience, and effectively prevents the secondary operation of the Internet phone, avoiding the loss caused to the user due to the secondary operation of the Internet phone .
Description
技术领域technical field
本发明涉及通信技术,具体涉及一种骚扰电话的拦截方法及系统。The invention relates to communication technology, in particular to a method and system for intercepting harassing calls.
背景技术Background technique
现阶段,针对骚扰电话的拦截方法一般都是通过系统筛选、人工确认、人工拦截封锁和人工解除封锁的过程,是人为参与较多的简单低效的方案。目前还没有提出一种自动识别、自动确认及自动拦截的有效解决方案。At this stage, the interception method for harassing calls is generally through the process of system screening, manual confirmation, manual interception and blocking, and manual unblocking, which is a simple and inefficient solution with more human participation. An effective solution for automatic identification, automatic confirmation and automatic interception has not yet been proposed.
发明内容Contents of the invention
为解决现有存在的技术问题,本发明实施例提供一种骚扰电话的拦截方法及系统,能够实现自动识别、自动确认及自动拦截功能。In order to solve the existing technical problems, the embodiment of the present invention provides a method and system for intercepting harassing calls, which can realize the functions of automatic identification, automatic confirmation and automatic interception.
为达到上述目的,本发明实施例的技术方案是这样实现的:In order to achieve the above object, the technical solution of the embodiment of the present invention is achieved in this way:
本发明实施例提供了一种骚扰电话的拦截方法,所述方法包括:An embodiment of the present invention provides a method for intercepting harassing calls, the method comprising:
获取话单文件,分析所述话单文件中的用户号码,确定所述用户号码不在预先设置的白名单中,且确定所述用户号码符合预设条件时,将所述用户号码确定为疑似号码;Obtain the bill file, analyze the user number in the bill file, determine that the user number is not in the preset white list, and determine that the user number meets the preset conditions, determine the user number as a suspected number ;
将疑似号码进行反向回拨,根据回拨结果确定所述疑似号码为骚扰号码;Call back the suspected number in reverse, and determine that the suspected number is a harassment number according to the callback result;
发送限制指令给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;所述限制指令包括所述骚扰号码。Send a restriction instruction to the application server, and the application server restricts the service of the nuisance number; the restriction instruction includes the harassment number.
上述方案中,所述预设条件包括:在预设时段内,所述用户号码的主叫通话次数大于第一预设阈值;或者,In the above solution, the preset condition includes: within a preset period of time, the number of calling calls of the user number is greater than a first preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值,且所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值;或者,The number of calling calls of the user number is greater than the first preset threshold, and the duration of the calling call of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than a third preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值或所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值。The number of calling calls of the user number is greater than the first preset threshold or the duration of calling calls of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than The third preset threshold.
上述方案中,所述根据回拨结果确定所述疑似号码为骚扰号码,包括:In the above solution, the determining that the suspected number is a harassment number according to the callback result includes:
当所述回拨结果为回拨不通或回拨直接断线时,确定所述疑似号码为骚扰号码;When the result of the callback is that the callback fails or the callback is directly disconnected, it is determined that the suspected number is a harassment number;
当所述回拨结果为正常接通时,将对通话过程进行录音生成的语音文件与预设的语音库中的语音文件匹配,将匹配成功的语音文件对应的疑似号码确定为骚扰号码;When the call-back result is normal connection, the voice file generated by recording the call process is matched with the voice file in the preset voice library, and the suspected number corresponding to the successfully matched voice file is determined as the harassment number;
当所述回拨结果为有回铃音但没有接通时,周期性的对所述疑似号码进行回拨,当回拨次数达到第四预设阈值时,确定所述疑似号码为骚扰号码。When the result of the callback is that there is a ringback tone but not connected, the suspected number is periodically called back, and when the number of callbacks reaches a fourth preset threshold, the suspected number is determined to be a nuisance number.
上述方案中,所述方法还包括:In the above scheme, the method also includes:
接收应用服务器返回的指令响应结果,当所述指令响应结果为指令执行成功时,将所述骚扰号码发送至业务支撑系统,由所述业务支撑系统向所述骚扰号码发送提示信息。Receive an instruction response result returned by the application server, and when the instruction response result is that the instruction is executed successfully, send the harassment number to a business support system, and the business support system sends a prompt message to the harassment number.
上述方案中,所述限制指令还包括所述骚扰号码的业务限制恢复时限。In the above solution, the restriction instruction further includes a service restriction recovery time limit for the harassing number.
上述方案中,所述获取话单,包括:根据预设的应用服务器地址登录所述应用服务器,从所述应用服务器中获取话单文件。In the above solution, the obtaining the bill includes: logging in to the application server according to a preset address of the application server, and obtaining the bill file from the application server.
本发明实施例还提供了一种骚扰电话的拦截系统,所述系统包括:话单采集单元、话单分析单元、反向拨测单元和指令收发单元;其中,An embodiment of the present invention also provides a system for intercepting harassing calls, the system comprising: a bill collection unit, a bill analysis unit, a reverse dial test unit, and an instruction transceiving unit; wherein,
所述话单采集单元,用于采集话单文件;The bill collection unit is used to collect bill files;
所述话单分析单元,用于读取所述话单采集单元中的话单文件,分析所述话单文件中的用户号码,确定所述用户号码不在预先设置的白名单中,且确定所述用户号码符合预设条件时,将所述用户号码确定为疑似号码,将所述疑似号码发送至所述反向拨测单元;The bill analysis unit is used to read the bill file in the bill collection unit, analyze the user number in the bill file, determine that the user number is not in the preset white list, and determine that the When the user number meets the preset conditions, determine the user number as a suspected number, and send the suspected number to the reverse dial testing unit;
所述反向拨测单元,用于将疑似号码进行反向回拨,根据回拨结果确定所述疑似号码为骚扰号码;The reverse dial testing unit is used to reverse dial back the suspected number, and determine that the suspected number is a harassment number according to the dial back result;
所述指令收发单元,用于发送限制指令给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;所述限制指令包括所述骚扰号码。The instruction transceiving unit is configured to send a restriction instruction to an application server, and the application server restricts the service of the nuisance number; the restriction instruction includes the harassment number.
上述方案中,所述预设条件包括:在预设时段内,所述用户号码的主叫通话次数大于第一预设阈值;或者,In the above solution, the preset condition includes: within a preset period of time, the number of calling calls of the user number is greater than a first preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值,且所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值;或者,The number of calling calls of the user number is greater than the first preset threshold, and the duration of the calling call of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than a third preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值或所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值。The number of calling calls of the user number is greater than the first preset threshold or the duration of calling calls of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than The third preset threshold.
上述方案中,所述反向拨测单元,用于当所述回拨结果为回拨不通或回拨直接断线时,确定所述疑似号码为骚扰号码;当所述回拨结果为有回铃音但没有接通时,周期性的对所述疑似号码进行回拨,当回拨次数达到第四预设阈值时,确定所述疑似号码为骚扰号码。In the above solution, the reverse dial testing unit is used to determine that the suspected number is a nuisance number when the callback result is that the callback fails or the callback is directly disconnected; When the ring tone is not connected, the suspected number is periodically called back, and when the number of callbacks reaches the fourth preset threshold, it is determined that the suspected number is a nuisance number.
上述方案中,所述系统还包括语音对比单元;In the above scheme, the system also includes a speech comparison unit;
所述反向拨测单元,还用于当所述回拨结果为正常接通时,将对通话过程进行录音生成的语音文件发送至所述语音对比单元;The reverse dial test unit is also used to send the voice file generated by recording the call process to the voice comparison unit when the callback result is normal connection;
所述语音对比文件,用于将所述反向拨测单元发送的语音文件与预设的语音库中的语音文件匹配,将匹配成功的语音文件对应的疑似号码确定为骚扰号码。The voice comparison file is used to match the voice file sent by the reverse dial testing unit with the voice file in the preset voice library, and determine the suspected number corresponding to the successfully matched voice file as a nuisance number.
上述方案中,所述系统还包括信息通知单元;In the above solution, the system further includes an information notification unit;
所述指令收发单元,还用于接收应用服务器返回的指令响应结果;The instruction transceiving unit is also used to receive the instruction response result returned by the application server;
所述信息通知单元,用于当所述指令收发单元接收到的指令响应结果为指令执行成功时,将所述骚扰号码发送至业务支撑系统,由所述业务支撑系统向所述骚扰号码发送提示信息。The information notification unit is configured to send the harassing number to a business support system when the command response result received by the command transceiving unit is that the command is executed successfully, and the business support system sends a prompt to the harassing number information.
上述方案中,所述话单采集单元,用于根据预设的应用服务器地址登录所述应用服务器,从所述应用服务器中获取话单文件。In the above solution, the bill collection unit is configured to log in to the application server according to a preset address of the application server, and obtain the bill file from the application server.
本发明实施例提供的技术方案,通过系统初步筛选、系统二次确认骚扰号码,并对骚扰号码进行拦截,实现了对骚扰电话的自动识别、自动确认及自动拦截,避免了人工确认、人工拦截的过程,节省了人力成本,提高了骚扰电话的拦截效率,提高了用户的体验,且有效的阻止了网络电话的二次运营,避免了由于网络电话的二次运营给用户带来的损失。The technical solution provided by the embodiment of the present invention realizes automatic identification, automatic confirmation and automatic interception of harassing calls through the system's preliminary screening, system secondary confirmation of harassing numbers, and interception of harassing numbers, avoiding manual confirmation and manual interception The process saves labor costs, improves the interception efficiency of harassing calls, improves user experience, and effectively prevents the secondary operation of Internet calls, avoiding the losses caused to users due to the secondary operations of Internet calls.
附图说明Description of drawings
图1为本发明实施例的应用场景的网络架构示意图;FIG. 1 is a schematic diagram of a network architecture of an application scenario according to an embodiment of the present invention;
图2为本发明实施例的骚扰电话的拦截方法的流程示意图;FIG. 2 is a schematic flow diagram of a method for intercepting harassing calls according to an embodiment of the present invention;
图3为本发明实施例中疑似号码的确定算法的流程示意图;Fig. 3 is a schematic flow chart of a determination algorithm of a suspected number in an embodiment of the present invention;
图4为本发明实施例的骚扰电话的拦截系统的组成结构示意图。FIG. 4 is a schematic diagram of the composition and structure of a system for intercepting harassing calls according to an embodiment of the present invention.
具体实施方式Detailed ways
图1为本发明实施例的应用场景的网络架构示意图,如图1所示,正常情况下,普通终端用户11通过接入设备12接入至IMS网络;而产生骚扰电话的网络架构,通常在接入侧网络中架设代理服务器13,所述代理服务器13通过直接连接至IP多媒体系统(IMS,IPMultimedia Subsystem)网络或通过综合接入设备(IAD,Integrated Access Device)/用户交换机(PBX,Private Branch Exchange)等接入设备12连接至IMS网络,向下作为个人计算机(PC,Personal Computer)网络电话终端14或手机网络电话终端15的服务器;在所述代理服务器13中配备一个号码资源池,当有终端注册到所述代理服务器13并有话务需求时,所述代理服务器13为用户每次通话随机分配一个空闲号码资源。网络电话服务提供者通过设置相应的计费策略,针对每次呼叫进行计费,以牟取暴利,本发明实施例中将所述现象称为IMS网络电话的二次运营。通过二次运营的网络电话有如下特征:主叫通话频次特别高、被叫通话频次特别低、主叫通话时间特别长、被叫通话时间特别短、反向回拨不正常等等。因此,只要能识别出符合上述特征的用户号码,便可确定所述用户号码为骚扰电话的用户号码,进一步下发指令至业务平台将所述用户号码的呼叫功能关闭,实现屏蔽骚扰电话的功能。Figure 1 is a schematic diagram of the network architecture of the application scenario of the embodiment of the present invention, as shown in Figure 1, under normal circumstances, ordinary end users 11 access the IMS network through the access device 12; A proxy server 13 is set up in the access side network, and the proxy server 13 is directly connected to an IP multimedia system (IMS, IPMultimedia Subsystem) network or through an integrated access device (IAD, Integrated Access Device)/private branch exchange (PBX, Private Branch Exchange) and other access devices 12 are connected to the IMS network, and serve as servers for personal computer (PC, Personal Computer) Internet phone terminals 14 or mobile phone Internet phone terminals 15; a number resource pool is equipped in the proxy server 13, when When a terminal is registered to the proxy server 13 and has a traffic demand, the proxy server 13 randomly allocates an idle number resource for each call of the user. The VoIP service provider sets a corresponding billing strategy to charge each call in order to reap huge profits. In the embodiment of the present invention, this phenomenon is referred to as the secondary operation of the IMS VoIP. VoIP through secondary operation has the following characteristics: extremely high calling frequency, extremely low calling frequency, extremely long calling time, extremely short calling time, abnormal reverse callback, etc. Therefore, as long as the user number that meets the above characteristics can be identified, it can be determined that the user number is a user number for harassing calls, and an instruction is further issued to the service platform to disable the call function of the user number to realize the function of blocking harassing calls .
下面结合附图及具体实施例对本发明作进一步详细的说明。The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
图2为本发明实施例的骚扰电话的拦截方法的流程示意图,如图2所示,包括以下步骤:Fig. 2 is a schematic flow diagram of a method for intercepting harassing calls according to an embodiment of the present invention, as shown in Fig. 2 , comprising the following steps:
步骤201:获取话单文件。Step 201: Obtain the bill file.
这里,本实施例可根据预先设置的所述应用服务器的地址登录所述应用服务器,从所述应用服务器中下载话单文件;具体的,可通过文件传输协议(FTP,File TransferProtocol)下载方式从应用服务器中获取话单文件。Here, this embodiment can log in to the application server according to the preset address of the application server, and download the bill file from the application server; specifically, it can be downloaded from Obtain the CDR file from the application server.
优选地,所述获取话单文件可预先设置时间间隔,例如5秒,按所述时间间隔获取话单,并将获取的话单存储在指定目录中。Preferably, the time interval for obtaining the bill file can be set in advance, for example, 5 seconds, and the bill is obtained according to the time interval, and the obtained bill is stored in a specified directory.
其中,所述话单文件中包括用户号码、通话时间、通话时长、主叫和被叫等信息。Wherein, the bill file includes information such as user number, call time, call duration, calling party and called party.
步骤202:分析所述话单文件中的用户号码,确定所述用户号码不在预先设置的白名单中,且确定所述用户号码符合预设条件时,将所述用户号码确定为疑似号码。Step 202: Analyze the user number in the bill file, determine that the user number is not in the preset white list, and determine that the user number meets the preset conditions, determine the user number as a suspected number.
具体的,可实时读取获取的话单,判断所述话单中的用户号码是否在预选设置的白名单中,所述白名单里的用户号码确定为合法用户的用户号码;当判断的结果为是时,直接分析下一条话单;当判断的结果为否时,判断所述用户号码是否符合预设条件,当判断的结果为是时,确定所述用户号码为疑似号码。Specifically, it is possible to read and obtain the bill in real time, and judge whether the user number in the bill is in the pre-selected white list, and the user number in the white list is determined to be the user number of a legal user; when the result of the judgment is If yes, directly analyze the next bill; when the judgment result is no, judge whether the user number meets the preset condition, and when the judgment result is yes, determine that the user number is a suspected number.
这里,根据二次运营的网络电话的特征,包括:主叫通话频次特别高、被叫通话频次特别低、主叫通话时间特别长、被叫通话时间特别短等特征设置预设条件。所述预设条件包括:在预设时段内,所述用户号码的主叫通话次数大于第一预设阈值;或者,Here, the preset conditions are set according to the characteristics of the Internet telephony in secondary operation, including: the calling frequency is extremely high, the called call frequency is extremely low, the calling time is extremely long, and the called time is extremely short. The preset condition includes: within a preset period of time, the number of calling calls of the user number is greater than a first preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值,且所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值;或者,The number of calling calls of the user number is greater than the first preset threshold, and the duration of the calling call of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than a third preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值或所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值。The number of calling calls of the user number is greater than the first preset threshold or the duration of calling calls of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than The third preset threshold.
其中,所述预设条件之间的逻辑关系可根据实际需求灵活配置。Wherein, the logical relationship between the preset conditions can be flexibly configured according to actual needs.
例如,根据用户号码在T(T>0)天内产生的话单进行统计。如果在所述时段内某些用户号码的主叫次数超过N,并且(或者)所述时段内的通话总时长超过K,并且被叫次数与主叫次数的比值小于M,则判定所述用户号码为疑似号码。For example, statistics are made based on the bills generated by the user number within T (T>0) days. If the number of calling times of some user numbers exceeds N within the time period, and (or) the total call duration in the time period exceeds K, and the ratio of the number of calls to the number of calls is less than M, the user is judged The number is a suspected number.
图3为本发明实施例中疑似号码的确定算法的流程示意图,如图3所示,包括以下步骤:Fig. 3 is a schematic flow chart of an algorithm for determining a suspected number in an embodiment of the present invention, as shown in Fig. 3 , comprising the following steps:
步骤301:依次取(t,t+T)、(t+P,t+P+T)...(t+nP,t+nP+T)时段的话单。Step 301: Get (t, t+T), (t+P, t+P+T) ... (t+nP, t+nP+T) time period bills sequentially.
本实施例中,T表示获取每T时间段内的话单;P表示每次获取话单的时间间隔为P;n表示获取话单的次数。In this embodiment, T indicates that the bills are acquired in every T time period; P indicates that the time interval for each acquiring the bills is P; n indicates the number of times of acquiring the bills.
步骤302:分别对每T时间段内除预设名单内的用户号码外的所有号码的呼叫次数、呼叫时长进行统计;Step 302: Count the number of calls and call duration of all numbers except the user numbers in the preset list within each T time period;
步骤303:判断主叫次数是否大于N;或者,主叫次数是否大于N和/或主叫总时长是否大于K,当判断的结果为是时,继续执行步骤304;否则,结束流程。Step 303: Determine whether the number of calls is greater than N; or, whether the number of calls is greater than N and/or whether the total duration of calls is greater than K, and if the result of the judgment is yes, proceed to step 304; otherwise, end the process.
步骤304:判断被叫次数与主叫次数的比值是否大于M当判断的结果为是时,执行步骤305;否则,结束流程。Step 304: Judging whether the ratio of the number of called times to the number of calling times is greater than M. If the result of the judgment is yes, execute Step 305; otherwise, end the process.
步骤305:标记所述用户号码为疑似号码。Step 305: Mark the user number as a suspected number.
本实施例中,所述主叫次数与主叫总时长的判断过程及之间的逻辑关系可根据实际情况灵活配置。In this embodiment, the judgment process of the number of calls and the total duration of calls and the logical relationship between them can be flexibly configured according to actual conditions.
步骤203:将疑似号码进行反向回拨,根据回拨结果确定所述疑似号码为骚扰号码。Step 203: Perform a reverse call back on the suspected number, and determine that the suspected number is a nuisance number according to the call back result.
这里,所述根据回拨结果确定所述疑似号码为骚扰号码,包括:Here, the determining that the suspected number is a nuisance number according to the callback result includes:
当所述回拨结果为回拨不通或回拨直接断线时,确定所述疑似号码为骚扰号码;这里,所述回拨不通或回拨直接断线可以表现为没有回铃音或没有彩铃音或者回拨直接断线等场景;When the result of the callback is that the callback fails or the callback is directly disconnected, it is determined that the suspected number is a harassing number; here, the callback cannot be reached or the callback is directly disconnected, which can be manifested as no ring back tone or color ring Tone or call back directly disconnection and other scenarios;
当所述回拨结果为有回铃音但没有接通时,周期性的对所述疑似号码进行回拨,当回拨次数达到第四预设阈值时,确定所述疑似号码为骚扰号码;When the result of the callback is that there is a ringback tone but not connected, periodically call back the suspected number, and when the number of callbacks reaches a fourth preset threshold, determine that the suspected number is a nuisance number;
当所述回拨结果为正常接通时,将对通话过程进行录音生成的语音文件与预设的语音库中的语音文件匹配,将匹配成功的语音文件对应的疑似号码确定为骚扰号码。When the call-back result is normal connection, the voice file generated by recording the call process is matched with the voice file in the preset voice library, and the suspected number corresponding to the successfully matched voice file is determined as the harassment number.
这里,所述语音库中存储有已确认的异常语音文件,将通话过程录音生成的语音文件与所述语音库中的语音文件匹配,通过匹配通话特征信息确定所述语音文件与所述语音库中的语音文件匹配成功,这里所述匹配方法为现有技术,此处不再赘述。Here, the confirmed abnormal voice files are stored in the voice database, the voice files generated by recording the call process are matched with the voice files in the voice database, and the voice files and the voice database are determined by matching the call feature information. The voice file in is successfully matched, and the matching method described here is the prior art, and will not be repeated here.
步骤204:发送限制指令给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;所述限制指令包括所述骚扰号码。Step 204: Send a restriction instruction to the application server, and the application server restricts the services of the nuisance number; the restriction instruction includes the harassment number.
本实施例中,将获取到的骚扰号码通过限制指令发送至应用服务器,由所述应用服务器对所述骚扰号码进行业务限制或者加入黑名单处理;所述业务限制可以是呼出业务限制等等;其中,所述限制指令还包括所述骚扰号码的业务限制恢复时限或黑名单解除时限,以便能够实现系统自动解除对所述骚扰号码的封锁,避免通过人工方式解除,提高了工作效率。In this embodiment, the acquired harassing number is sent to the application server through a restriction instruction, and the application server performs service restriction or blacklist processing on the harassing number; the service restriction may be outgoing call service restriction, etc.; Wherein, the restriction instruction also includes the service restriction recovery time limit or blacklist removal time limit of the harassing number, so that the system can automatically unblock the harassing number, avoid manual unlocking, and improve work efficiency.
这里,发送限制指令给应用服务器后,接收应用服务器返回的指令响应结果,当所述指令响应结果为指令执行成功时,将所述骚扰号码发送至业务支撑系统,由所述业务支撑系统向所述骚扰号码发送提示信息,以提醒所述骚扰号码的用户该号码的业务已被限制,使用户体验更加人性化;Here, after sending the restriction command to the application server, the command response result returned by the application server is received, and when the command response result is that the command is executed successfully, the harassment number is sent to the business support system, and the business support system sends the Send a reminder message to the harassing number to remind the user of the harassing number that the service of the number has been restricted, making the user experience more humane;
当所述指令响应结果为指令执行失败时,记录相应的日志。When the result of the command response is that the command execution fails, a corresponding log is recorded.
其中,若某疑似号码被多次判定为骚扰号码,则所述骚扰号码的业务限制的初始时间为最后一次判定时间。Wherein, if a suspected number is judged as a nuisance number multiple times, the initial time of service restriction of the nuisance number is the time of the last determination.
图4为本发明实施例的骚扰电话的拦截系统的组成结构示意图,如图4所示,所述系统包括:话单采集单元41、话单分析单元42、反向拨测单元43和指令收发单元45;其中,Fig. 4 is the constituent structure schematic diagram of the intercepting system of the harassing call of the embodiment of the present invention, as shown in Fig. 4, described system comprises: call list acquisition unit 41, call list analysis unit 42, reverse dial test unit 43 and order transceiving Unit 45; where,
所述话单采集单元41,用于采集话单文件;The bill collection unit 41 is used to collect bill files;
所述话单分析单元42,用于读取所述话单采集单元41中的话单文件,分析所述话单文件中的用户号码,确定所述用户号码不在预先设置的白名单中,且确定所述用户号码符合预设条件时,将所述用户号码确定为疑似号码,将所述疑似号码发送至所述反向拨测单元43;The bill analysis unit 42 is configured to read the bill file in the bill collection unit 41, analyze the user number in the bill file, determine that the user number is not in the preset white list, and determine When the user number meets the preset conditions, determine the user number as a suspected number, and send the suspected number to the reverse dial testing unit 43;
所述反向拨测单元43,用于将疑似号码进行反向回拨,根据回拨结果确定所述疑似号码为骚扰号码;The reverse dial testing unit 43 is used to reverse dial back the suspected number, and determine that the suspected number is a nuisance number according to the dial back result;
所述指令收发单元45,用于发送限制指令给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;所述限制指令包括所述骚扰号码。The instruction transceiving unit 45 is configured to send a restriction instruction to an application server, and the application server restricts the service of the nuisance number; the restriction instruction includes the harassment number.
其中,所述预设条件包括:在预设时段内,所述用户号码的主叫通话次数大于第一预设阈值;或者,Wherein, the preset condition includes: within a preset period of time, the number of calling calls of the user number is greater than a first preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值,且所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值;或者,The number of calling calls of the user number is greater than the first preset threshold, and the duration of the calling call of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than a third preset threshold; or,
所述用户号码的主叫通话次数大于第一预设阈值或所述用户号码的主叫通话时长大于第二预设阈值,且所述用户号码的被叫通话次数与主叫通话次数的比值小于第三预设阈值。The number of calling calls of the user number is greater than the first preset threshold or the duration of calling calls of the user number is greater than the second preset threshold, and the ratio of the number of called calls to the number of calling calls of the user number is less than The third preset threshold.
优选地,所述反向拨测单元43,用于当所述回拨结果为回拨不通或回拨直接断线时,确定所述疑似号码为骚扰号码;当所述回拨结果为有回铃音但没有接通时,周期性的对所述疑似号码进行回拨,当回拨次数达到第四预设阈值时,确定所述疑似号码为骚扰号码。Preferably, the reverse dial testing unit 43 is used to determine that the suspected number is a nuisance number when the callback result is that the callback fails or the callback is directly disconnected; When the ring tone is not connected, the suspected number is periodically called back, and when the number of callbacks reaches the fourth preset threshold, it is determined that the suspected number is a nuisance number.
优选地,所述系统还包括语音对比单元44;Preferably, the system also includes a speech comparison unit 44;
所述反向拨测单元43,还用于当所述回拨结果为正常接通时,将对通话过程进行录音生成的语音文件发送至所述语音对比单元44;The reverse dial testing unit 43 is also used to send the voice file generated by recording the call process to the voice comparison unit 44 when the callback result is normal connection;
所述语音对比文件44,用于将所述反向拨测单元43发送的语音文件与预设的语音库中的语音文件匹配,将匹配成功的语音文件对应的疑似号码确定为骚扰号码。The voice comparison file 44 is used to match the voice file sent by the reverse dial testing unit 43 with the voice file in the preset voice library, and determine the suspected number corresponding to the successfully matched voice file as a nuisance number.
优选地,所述系统还包括信息通知单元46;Preferably, the system further includes an information notification unit 46;
所述指令收发单元45,还用于接收应用服务器返回的指令响应结果;The instruction transceiving unit 45 is also used to receive the instruction response result returned by the application server;
所述信息通知单元46,用于当所述指令收发单元45接收到的指令响应结果为指令执行成功时,将所述骚扰号码发送至业务支撑系统,由所述业务支撑系统向所述骚扰号码发送提示信息。The information notification unit 46 is configured to send the nuisance number to a business support system when the command response result received by the command transceiving unit 45 is that the command is executed successfully, and the business support system sends the nuisance number to the nuisance number Send reminder message.
优选地,所述话单采集单元41,用于根据预设的应用服务器地址登录所述应用服务器,从所述应用服务器中获取话单。Preferably, the bill collection unit 41 is configured to log in to the application server according to a preset application server address, and obtain the bill from the application server.
具体的,话单采集单元41可根据预设的应用服务器地址登录所述应用服务器,从所述应用服务器中获取话单;话单分析单元42读取所述话单采集单元41中的话单,判断所述话单中的用户号码是否在预选设置的白名单中,所述白名单里的用户号码确定为合法用户的用户号码;当判断的结果为是时,直接分析下一条话单;当判断的结果为否时,判断所述用户号码是否符合预设条件,当判断的结果为是时,确定所述用户号码为疑似号码,将所述疑似号码发送至所述反向拨测单元43;Specifically, the bill collection unit 41 can log in the application server according to the preset application server address, and obtain the bill from the application server; the bill analysis unit 42 reads the bill in the bill collection unit 41, Judging whether the user number in the bill is in the white list of pre-selected settings, the user number in the white list is determined to be the user number of a legal user; when the judged result is yes, directly analyze the next bill; When the result of the judgment is no, it is judged whether the user number meets the preset condition; when the result of the judgment is yes, it is determined that the user number is a suspected number, and the suspected number is sent to the reverse dialing unit 43 ;
所述反向拨测单元43将疑似号码进行反向回拨,当所述回拨结果为回拨不通或回拨直接断线时,确定所述疑似号码为骚扰号码;当所述回拨结果为有回铃音但没有接通时,周期性的对所述疑似号码进行回拨,当回拨次数达到第四预设阈值时,确定所述疑似号码为骚扰号码,将所述骚扰号码发送至指令收发单元45;The reverse dial testing unit 43 reversely dials back the suspected number, and when the dial back result is that the dial back fails or the dial back is directly disconnected, it is determined that the suspected number is a nuisance number; when the dial back result When there is a ringback tone but not connected, periodically call back the suspected number, and when the number of callbacks reaches the fourth preset threshold, determine that the suspected number is a nuisance number, and send the nuisance number to to the instruction transceiving unit 45;
当所述回拨结果为正常接通时,将对通话过程进行录音生成的语音文件送至所述语音对比单元44,所述语音对比文件44将所述反向拨测单元43发送的语音文件与预设的语音库中的语音文件匹配,将匹配成功的语音文件对应的疑似号码确定为骚扰号码,将所述骚扰号码发送至指令收发单元45;When the call-back result is normally connected, the voice file generated by recording the call process is sent to the voice comparison unit 44, and the voice comparison file 44 is the voice file sent by the reverse dial test unit 43. Match with the voice file in the preset voice database, determine the suspected number corresponding to the successfully matched voice file as the harassment number, and send the harassment number to the instruction transceiver unit 45;
指令收发单元45将所述骚扰号码通过限制指令发送给应用服务器,由所述应用服务器对所述骚扰号码进行业务限制;当所述应用服务器返回指令执行成功的响应结果时,将所述骚扰号码发送至信息通知单元46,由所述信息通知单元46将所述骚扰号码发送至业务支撑系统,由所述业务支撑系统向所述骚扰号码发送提示信息。The instruction transceiving unit 45 sends the harassing number to the application server through a restriction instruction, and the application server restricts the service of the harassing number; The information is sent to the information notification unit 46, and the information notification unit 46 sends the nuisance number to a business support system, and the business support system sends prompt information to the nuisance number.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) having computer-usable program code embodied therein.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310722846.1A CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310722846.1A CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104735272A CN104735272A (en) | 2015-06-24 |
| CN104735272B true CN104735272B (en) | 2018-03-23 |
Family
ID=53458694
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201310722846.1A Active CN104735272B (en) | 2013-12-24 | 2013-12-24 | The hold-up interception method and system of a kind of harassing call |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104735272B (en) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017147804A1 (en) * | 2016-03-02 | 2017-09-08 | 吴伟东 | Cellphone application communication blocking method and system |
| CN109698885B (en) * | 2017-10-20 | 2021-03-16 | 中国移动通信集团公司 | A call request processing method, device, network side server and computer storage medium |
| CN109995707B (en) * | 2017-12-29 | 2021-11-02 | 中国移动通信集团陕西有限公司 | A high-definition voice anti-harassment and DDOS attack method and device |
| CN109996237A (en) * | 2018-01-02 | 2019-07-09 | 中兴通讯股份有限公司 | The method and device of harassing call is found in a kind of VoLTE network |
| CN108366173A (en) * | 2018-01-05 | 2018-08-03 | 腾讯科技(深圳)有限公司 | A kind of phone recognition methods, relevant device and system |
| CN109195168A (en) * | 2018-11-06 | 2019-01-11 | 中国联合网络通信集团有限公司 | A kind of voice intercepting processing method and system |
| CN109639913A (en) * | 2019-01-03 | 2019-04-16 | 中国联合网络通信集团有限公司 | A kind of automatic speech harassing and wrecking number processing method, apparatus and system |
| CN110445944B (en) * | 2019-08-19 | 2020-11-24 | 携程旅游信息技术(上海)有限公司 | Method and system for preventing telephone disturbance of call center |
| CN115580680B (en) * | 2021-06-21 | 2025-04-25 | 中国移动通信集团重庆有限公司 | Call restriction method, device, system, electronic device and storage medium |
| CN114500744B (en) * | 2022-02-07 | 2025-08-22 | 天津市国瑞数码安全系统股份有限公司 | A method and system for analyzing and collecting evidence of fraudulent and harassing calls |
| CN114710590B (en) * | 2022-03-28 | 2024-11-01 | 恒安嘉新(北京)科技股份公司 | Harassment call detection method, device, equipment and medium |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101132438A (en) * | 2007-03-20 | 2008-02-27 | 中国移动通信集团江苏有限公司 | Malicious nuisance call screening and interception method |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2011119953A (en) * | 2009-12-03 | 2011-06-16 | Hitachi Ltd | Speech recording system using function of call control and speech recording |
| CN202231767U (en) * | 2011-01-26 | 2012-05-23 | 北京炎强通信技术有限公司 | Crank call identification system |
-
2013
- 2013-12-24 CN CN201310722846.1A patent/CN104735272B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101132438A (en) * | 2007-03-20 | 2008-02-27 | 中国移动通信集团江苏有限公司 | Malicious nuisance call screening and interception method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104735272A (en) | 2015-06-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104735272B (en) | The hold-up interception method and system of a kind of harassing call | |
| EP3494690B1 (en) | Method and apparatus for threat identification through analysis of communications signaling, events, and participants | |
| WO2016197675A1 (en) | Method and apparatus for identifying crank call | |
| CN109698885B (en) | A call request processing method, device, network side server and computer storage medium | |
| CN114169438A (en) | A telecommunication network fraud identification method, device, equipment and storage medium | |
| Mustafa et al. | You can call but you can't hide: detecting caller id spoofing attacks | |
| CN102143461A (en) | Intelligent call forwarding method and device | |
| WO2011143847A1 (en) | Short message monitoring system and method | |
| CN101715192B (en) | Harassing call filtering method, device and system | |
| CN110611929A (en) | Abnormal user identification method and device | |
| CN104702800A (en) | Harassing number identifying method, device and system | |
| WO2016197646A1 (en) | Method and device for monitoring crank call | |
| CN111901790A (en) | Method, device, electronic device and storage medium for identifying telecommunication fraud | |
| US20150092567A1 (en) | Systems and methods for integrating route and rank information into call detaile records | |
| CN104869262A (en) | Method and device for intercepting terminal blacklist | |
| CN101730091A (en) | Method and device for limiting unlawful communication service | |
| CN119383261A (en) | Abnormal number identification method, device, equipment and medium | |
| EP2490423A1 (en) | A bypass detection system resembling human behaviour | |
| US8358742B2 (en) | System and method for managing a network | |
| CN105227789B (en) | The hold-up interception method and device of a kind of harassing call | |
| CN102958055B (en) | A kind of discrimination method of illegal callback service and system | |
| CN115174744A (en) | Method, device, storage medium and electronic equipment for identifying virtual dialing equipment | |
| WO2015054993A1 (en) | Method and device for processing spam information | |
| CN111818216A (en) | Incoming call processing method and device | |
| US20140211783A1 (en) | Systems and methods for integrating route and rank information into call detail records |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |