Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Illegal automatic call shielding method and system and voice authentication equipment

An automatic calling and authentication technology, applied in transmission systems, automatic switching offices, user identity/authority verification, etc., can solve the problems of illegal use of automatic calling software, affecting users' normal calls, etc., and achieve the effect of solving the problem of illegal infringement.

Inactive Publication Date: 2015-01-14
CHINA TELECOM CORP LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] A technical problem to be solved by the embodiment of the present invention is to solve the problem that some automatic calling software is illegally used to make a large number of illegal calls for specific users, which affects the normal conversation of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal automatic call shielding method and system and voice authentication equipment
  • Illegal automatic call shielding method and system and voice authentication equipment
  • Illegal automatic call shielding method and system and voice authentication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0033] In order to solve the problem that some automatic calling software is illegally used to make a large number of illegal calls for specific users, which affects the normal conversation of users, this invention proposes a shielding scheme for illegal automatic calling, which adds a voice authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal automatic call shielding method and system and voice authentication equipment and relates to the field of mobile communication safety. According to the illegal automatic call shielding method and system and the voice authentication equipment, the voice authentication equipment is additionally arranged on the local end network side, after a called user applies for voice incoming call authentication services, calls of the called user are routed to the voice authentication equipment through calling side network equipment, in coming call authentication of a calling party is conducted by the voice authentication equipment, the illegal automatic calls with authentication failed are intercepted, only the normal manual calls with the authentication passed are allowed to start calling a terminal of the called user. Thus, a large amount of illegal automatic incoming calls can be shielded, the problems of illegal infringements of automatic call software such as call death is solved, and meanwhile the incoming calls of normal calling users are not influenced.

Description

technical field [0001] The invention relates to the field of mobile communication security, in particular to a method and system for shielding illegal automatic calls and voice authentication equipment. Background technique [0002] VOIP Internet phone is a voice service based on IP data packets, which enables users to transmit services such as voice, fax, video and data through the Internet for free or at a very low cost. [0003] At present, there are some automatic calling software such as "Calling Dead", also known as the automatic calling system of the Internet phone, which uses the Internet phone with low communication costs as the calling platform, and adopts advanced Internet phone communication technology, which can easily call people in any area and any place. A landline and mobile phone number. [0004] Some illegal personnel use automatic calling software such as "call dead" to make a large number of illegal calls to specific users, and carry out illegal activit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M7/00H04L9/32
CPCH04M3/436H04M7/006H04W12/06
Inventor 田海波石彦彬阳志明李凌
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products