Implementation method and system for intercepting network fraud calls based on IMS (IP Multimedia Subsystem)
A technology of fraudulent phone calls and implementation methods, applied in the field of communications, can solve problems such as unsupportable, unrepeatable signing, and reducing the scope of users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] In order to make the purpose, technical means and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings.
[0056] In this application, the call initiated in the IMS network is triggered to the fraud call interception platform, and through the interception processing of the platform, a disconnection signaling is generated and sent to the IMS network, so that the call is disconnected. This application uses the SIP AS (application service) method to realize real-time disconnection of fraudulent calls, provides an interface for real-time interception of fraudulent calls, encapsulates the call management and control capabilities of the IMS core network, and extends the communication network to the industry through interface calls. Scope of service: Under the current domestic situation of cracking down on telecom fraud, by opening the fraud call interception interface under...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com