Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method and system for intercepting network fraud calls based on IMS (IP Multimedia Subsystem)

A technology of fraudulent phone calls and implementation methods, applied in the field of communications, can solve problems such as unsupportable, unrepeatable signing, and reducing the scope of users

Pending Publication Date: 2021-12-07
上海欣方智能系统有限公司 +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The real-time interception technology of fraudulent calls using the traditional intelligent network method is relatively mature, and the technical support of the intelligent network is also relatively complete in terms of security and disaster recovery of the entire switching network. Call the number to activate the intelligent network subscription function. However, in the traditional switching network, the subscription attribute of the number is unique and cannot be signed repeatedly. Many services (such as virtual network services, prepaid services, etc.) Intelligent network signing is implemented, so this method has mutual exclusion between intelligent network signing and other services, reducing the scope of users
[0010] With the development of communication technology, the switching network has been upgraded from traditional circuit switching to IP-based IMS switching network. With the popularization of 4G communication technology and the promotion of 5G, mobile phone and fixed phone users based on IMS network In this context, the real-time interception function of fraudulent calls based on the traditional circuit domain can no longer support the majority of IMS network users, and it is necessary to support the real-time call interception function under the IMS network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and system for intercepting network fraud calls based on IMS (IP Multimedia Subsystem)
  • Implementation method and system for intercepting network fraud calls based on IMS (IP Multimedia Subsystem)
  • Implementation method and system for intercepting network fraud calls based on IMS (IP Multimedia Subsystem)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical means and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings.

[0056] In this application, the call initiated in the IMS network is triggered to the fraud call interception platform, and through the interception processing of the platform, a disconnection signaling is generated and sent to the IMS network, so that the call is disconnected. This application uses the SIP AS (application service) method to realize real-time disconnection of fraudulent calls, provides an interface for real-time interception of fraudulent calls, encapsulates the call management and control capabilities of the IMS core network, and extends the communication network to the industry through interface calls. Scope of service: Under the current domestic situation of cracking down on telecom fraud, by opening the fraud call interception interface under...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IMS (IP Multimedia Subsystem) network-based fraud call interception implementation method, which comprises the following steps: at a fraud call interception platform side, receiving a first call triggered by an IMS network, storing call parameters carried by the first call, wherein the call parameters comprise a calling number, a called number and a call identifier; and when an interception request from an external system is received, querying the stored call parameters according to at least one or any combination of a calling number and a called number carried by the request, and if the stored call parameters are queried, sending a disconnection signaling to the IMS network so as to enable the first call to be disconnected. According to the invention, fraud phone monitoring and interception can be carried out on the call based on the IMS network, communication can be cut off in real time, and new business services can be provided for users.

Description

technical field [0001] The invention relates to the communication field, in particular to an implementation method for intercepting fraudulent calls based on the IMS network. Background technique [0002] In recent years, fraud through communication means has shown an increasing trend, which has had a negative impact on social stability. With the upgrading of communication technology, the communication system is upgraded from the original circuit switching technology to the IMS (IP Multimedia System) technology based on IP network. For example, the currently used fixed telephone communication network and 4G / 5G mobile communication network system It is realized through the IMS network and technology; under the current communication technology background, the proportion of fraudulent calls through the IMS network is also increasing, and it is imperative to control and intercept fraudulent calls initiated by the IMS network. [0003] At present, the interception technology for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/22H04M3/42H04M3/436H04M7/00H04L29/06
CPCH04M3/2281H04M3/42059H04M3/4365H04M7/0078H04L65/1016
Inventor 高树江丁正顾晓东祝敬安韦红刘志永刘艳曹迪
Owner 上海欣方智能系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products