Method and system for preventing call harassment of call center
A call center, telephone technology, applied in the field of computer information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] This embodiment provides a method for a call center to prevent telephone harassment, such as figure 1 As shown, the method in this embodiment includes:
[0071] Step 101, setting the first white list according to the IP of the legal call source of the call center;
[0072] Step 102, obtaining current call data;
[0073] Step 103, judging whether the current call source IP belongs to the IP in the first whitelist, if yes, then execute step 104, if not, then execute step 105;
[0074] Step 104 , judging whether the call frequency of the current call source IP exceeds the first frequency threshold, if so, execute step 106 , if not, execute step 107 .
[0075] Step 105, blocking the call from the current call source IP;
[0076] Step 106, blocking calls and messages from the current call source IP;
[0077] Step 107, determine that the current call is not a nuisance call.
[0078] In step 102, the current call data includes the current call source IP and the call frequ...
Embodiment 2
[0083] This embodiment is a further improvement on the basis of implementation 1. In step 102 of this embodiment, the obtained current call data includes not only the data obtained in Embodiment 1, but also the current calling number and the current called number. number, in this embodiment, in addition to including the steps in embodiment 1, such as figure 2 shown, also includes:
[0084] Step 201, setting a second white list according to the legal PSTN number of the call center;
[0085] Step 202, judging whether the current calling number belongs to the legal PSTN number in the second white list, if not, then perform step 203, if yes, then perform step 204;
[0086] Step 203, judging whether the current called number is an extension number, if not, then perform step 205, if so, then perform step 206;
[0087] Step 204, determining that the current call is not a nuisance call;
[0088] Step 205, determine that the current call is a nuisance call, and execute step 208;
...
Embodiment 3
[0094] This embodiment is a further improvement to Embodiment 2. In step 102 of this embodiment, the obtained current call data includes not only the data obtained in Embodiment 2, but also the call duration of the current calling number, the current calling number The calling frequency and the calling duration interval of the current calling number.
[0095] Among them, such as image 3 As shown, the current call data is calculated by the following steps to calculate the current suspiciousness:
[0096] Step 301, judging whether the call duration of the current calling number satisfies the first condition, if so, execute step 302, and if not, execute step 303;
[0097] Step 302, setting the value of the current suspicious degree as the initial suspicious degree plus the first suspicious degree value, and performing step 401;
[0098] Step 303, judging whether the frequency of calling the same called number by the current calling number within the fifth time threshold exceed...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com