Call processing method and device

A call processing and call status technology, applied in the field of communication, can solve the problems of low efficiency and limited application scope of malicious voice information, and achieve the effect of reducing the possibility of being harassed and being defrauded, wide application scope, and improving prevention awareness.

Active Publication Date: 2017-10-24
CHINA MOBILE GROUP DESIGN INST
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a call processing method and device to solve the problems of limited scope of application and low efficiency of finding malicious voice information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call processing method and device
  • Call processing method and device
  • Call processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The malicious voice information harassment in the embodiment of the present invention may include harassing calls and false calls, and may also include other forms of voice information that harass users.

[0025] Such as figure 1 As shown, it is a schematic flowchart of the call processing method in Embodiment 1 of the present invention, and the call processing method may include the following steps:

[0026] Step 101: After receiving a call request from the calling number to call the called number, obtain the evaluation coefficient of the calling number; wherein, the evaluation coefficient includes at least one of the following parameters: the number difference between the calling number and the preset dangerous number , the user credibility of the user to which the calling number belongs, and the calling state credibility determined by whether the calling number is in a call state.

[0027] Step 102: Calculate the single reliability of the calling number according to...

Embodiment 2

[0117] In order to further understand the call processing method provided by the embodiment of the present invention, a specific embodiment is used to describe it here, as figure 2 Shown is the schematic flow chart of this method, and this method comprises the following steps:

[0118] Step 201: After receiving a call request from the calling number to call the called number, determine whether the calling number is in the preset blacklist, if yes, go to step 202; if not, go to step 203.

[0119] Step 202: Interrupt the calling operation of the calling number.

[0120] Step 203: Obtain the evaluation coefficient of the calling number.

[0121] Step 204: Calculate the single reliability of the calling number according to the obtained evaluation coefficient.

[0122] Step 205: Judging whether the calculated single credibility is less than the first preset credibility threshold, if yes, go to step 206; if not, go to step 208:

[0123] Step 206: Determine whether the single rel...

Embodiment 3

[0134] Based on the same inventive concept, the present invention also provides a call processing device, such as image 3 Shown is a schematic structural diagram of the device, including:

[0135] The evaluation coefficient module 301 is configured to obtain the evaluation coefficient of the calling number after receiving a call request from the calling number to the called number; wherein, the evaluation coefficient includes at least one of the following parameters: the calling number and the preset dangerous number The degree of number difference, the user credibility of the user to which the calling number belongs, and the credibility of the call state determined by whether the calling number is in a call state;

[0136] A single credibility calculation module 302, configured to calculate the single credibility of the calling number according to the obtained evaluation coefficient;

[0137] The first judging module 303 is used to judge whether the calculated single credib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a call processing method and device. In the scheme of the invention, the single credibility of a calling number is assessed through an assessment coefficient, and a prompt that the calling number cannot be readily believed is sent to a called number when the single credibility is less than a first preset credibility threshold. Therefore, a subscriber of the called number is timely notified not to believe in the calling number, so that the precaution consciousness of the subscriber of the called number can be improved, and the possibility that the subscriber of the called number is disturbed or defrauded is reduced. Whether to send the prompt that calling number cannot be readily believed to the called number or not can be determined only through the assessment coefficient, and a malicious voice message can be determined only when the calling number belongs to a local operator and the voice message is initiated from another operator in the prior art, so that the technical scheme provided by the embodiment of the invention is wider in application range and can improve the malicious voice message discovering efficiency.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a call processing method and device. Background technique [0002] Malicious voice information harassment is one of the main threats to the security of modern communication networks. It mainly includes two types of harassment information: harassing calls and false calls. [0003] Harassing calls refer to illegal users making large-scale calls to normal users, ringing once and hanging up. When the user calls back, in most cases, the call will be transferred to the voice information platform or recorded phone, thereby causing harassment. [0004] False calling refers to making or imitating a mobile or fixed network phone number to make a call without authorization, and achieve the purpose of fraud. [0005] Since various types of malicious voice information occur in many scenarios and the types are complex, existing network technical solutions can only solve malicio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/663H04M1/2745H04W12/12
CPCH04M1/2748H04M1/663H04W12/12
Inventor 张艋杜雪涛张晨袁捷朱艳云张高山刘利军李祥军洪东张琳温暖高曼颖
Owner CHINA MOBILE GROUP DESIGN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products