Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious call identification method

A malicious call and identification method technology, applied in the communication field, can solve the problems of large storage space, application server occupation, inconvenience, etc., and achieve the effect of meeting the demand

Inactive Publication Date: 2008-07-30
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above method has the following disadvantages: the application server needs to record all the calls of user A, on the one hand, it will occupy a large storage space of the application server, on the other hand, user A needs to screen out the real malicious ones from a large amount of call information in the future call, it is inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious call identification method
  • Malicious call identification method
  • Malicious call identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings.

[0022] refer to figure 2 , illustrating a malicious call identification method according to an embodiment of the present invention. Such as figure 2 As shown, the malicious call identification method includes the following steps: S202, the second user terminal initiates a call invitation request to the first user terminal and establishes a connection with the first user terminal, wherein the first user terminal pre-registers the malicious call identification service, The call invitation request passes through the malicious call identification application server, and the malicious call identification application server temporarily stores the information of the call invitation request; S204, the first user terminal judges that the call is a malicious call, and sends the malicious call The information record instruction is sent t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for recognizing malicious calls. The method comprises the following steps that: S102, a first user terminal sends a communication invitation to a second user terminal and connects with the second user terminal; S104, the first user terminal judges that the communication is a malicious call, and then a malicious call message is sent to an application server for recognizing the malicious calls during or after the communication; S106, the transaction entry of the recognizing malicious call is checked and feed back to the user by the application server for recognizing the malicious calls; and S108, when the communication between the first user terminal and the second user terminal is stopped for a scheduled time, the temporary relative information is released by the application server for recognizing the malicious calls. The recognition service of the malicious calls in NGN can be realized by the method, and the demands of recognition service of the malicious calls of the operator and user are satisfied.

Description

technical field [0001] The present invention relates to the communication field, and more specifically relates to a malicious call identification method. Background technique [0002] Malicious Call Identification (MCID) is a supplementary service in the communication system, and the application methods that can be realized in the prior art are: [0003] User A registers the malicious call automatic identification service in the communication system in advance. When other users call this user, the communication system automatically records the caller and called numbers, call time and other information of this call. [0004] The information recorded by the communication system in the above ways can be provided to user A in various ways, for example: the user directly inquires at the operator's business hall, the user dials the operator's customer service center for inquiry, and so on. The present invention does not relate to a specific way of providing. [0005] In the next...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/22H04M3/42H04M1/57
CPCH04M7/006H04M1/663H04M3/2281H04L63/304
Inventor 沈岷郝振武凌文杰施皓王志松沈程念
Owner ZTE CORP