Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for non-standardized dialing service monitoring between networks

A business and standardized technology, applied in the direction of automatic exchange, telephone communication, electrical components, etc., can solve the problems of inability to identify malicious calls, adverse maintenance, normal business impact, etc.

Inactive Publication Date: 2009-06-10
CHINA MOBILE GROUP ZHEJIANG
View PDF1 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Relying on the DTMF number to judge whether the callback card business is not accurate enough, causing misjudgment and affecting normal business;
[0007] 2. It is necessary to modify the signal sent between the networks. Once the equipment fails, the normal business may be affected
[0014] 1. The blacklist interception method can only set individual specific numbers through operators and users, and cannot intelligently judge and intercept general numbers; the timeliness is poor, and it cannot be screened and intercepted in time; it cannot meet the judgment and interception of harassing calls with large call volumes at the carrier level , operators cannot distinguish malicious calls in normal communication
[0015] 2. The scope of application of the password detection method is too small, which will hinder the normal calls between a large number of non-fixed contacts, and will also cause great damage to the convenience of mobile phone users
[0016] 3. Judging harassing calls based on single characteristics such as ringing duration and ringing times is not accurate enough, and many normal calls will also be blocked
In the face of these harassing calls with changing characteristics, it is difficult for existing technologies to accurately identify and intercept them under the premise of ensuring normal user communication
[0018] The disadvantage of the existing monitoring solution for non-standard ANN messages between networks is that it is only applicable to the switching equipment of some manufacturers
[0021] The disadvantage of this existing technology is: in order to effectively restrict illegal incoming calls, it is necessary to upgrade the software on all gateways in the network and make a black and white list, which consumes huge manpower, material resources and time costs, and cannot restrict some special prefixes. Not conducive to future maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for non-standardized dialing service monitoring between networks
  • Method for non-standardized dialing service monitoring between networks
  • Method for non-standardized dialing service monitoring between networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] To monitor the callback card business, the specific steps are as follows:

[0046] Step 1, the user initiates an inter-network call request;

[0047] Step 2, MSC (Mobile Switching Center, Mobile Switching Center) triggers a call to intercept monitoring node according to user subscription information;

[0048] Step 3. Call back the card platform to call back the user;

[0049] Step 4, the GMSC of the gateway office triggers the inter-network incoming calls to the interception monitoring node;

[0050] Step 5. Intercept the monitoring node to collect the user's inter-network call records (including calling number, called number, call time, roaming location, ringing duration, call duration, etc.), and transfer the call records to the analysis via FTP node;

[0051] Step 6, the analysis node loads the call record provided by the interception monitoring node into the database for data analysis, setting the time threshold t and the quantity threshold n, as there is once A-...

Embodiment 2

[0057] The specific steps for the monitoring of harassing calls on the Internet are as follows:

[0058] Step 1, the user initiates an inter-network call request;

[0059] Step 2, the gateway office GMSC / tandem office TMSC receives the request, and triggers the call to the intercepting monitoring node;

[0060] Step 3, intercepting the call record (comprising information such as calling number, called number, calling time, ringing duration, call duration) of monitoring node collection user;

[0061] And transfer the call record to the analysis node through FTP;

[0062] Step 4, the analysis node loads the call record provided by the interception monitoring node into the database, first screens out the ultra-short ringing bill, and then according to the set parameter combination (such as call frequency, ringing duration, call time period, call range , Calling / Called Number Dispersion, Reply Connect Rate, etc., can use data mining software for logistic regression analysis to o...

Embodiment 3

[0068] The ANN call monitoring method is not standardized in the network, and the specific steps are as follows:

[0069] Step 1: The user initiates an inter-network call request;

[0070] Step 2: MSC receives the request, and triggers the call to the intercepting monitoring node according to the user's subscription information;

[0071] Step 3: Intercepting the monitoring node to collect the user's call record (including calling number, called number, calling time, roaming place and other information);

[0072] And transfer the call record to the analysis node through FTP;

[0073] Step 4: the analysis node loads the call records provided by the interception monitoring node into the database for data analysis, and adds the called numbers (such as high calling frequency and wide range of calling users) that meet certain statistical characteristics into the outgoing call answering monitoring list; The intercept monitoring node conducts response monitoring and real-time analys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for monitoring internetwork nonstandard dialing services, which is to acquire internetwork incoming and outgoing call records by intercepting monitoring nodes, to perform data analysis on the call records, to examine and verify internetwork call doubtful numbers through an operating center, and to add illegal numbers into an interception number list for interception, so that the method can effectively judge and intercept illegal internetwork communication, and avoid loss of telephone expenses. Moreover, the method has low system modification cost and can be effectively popularized into actual application.

Description

technical field [0001] The invention relates to call monitoring in a mobile communication network. Background technique [0002] With the development of communication technology and services, the competition among operators is becoming more and more fierce, and there are more and more problems in inter-network calls. For example, the callback card service for free calls, frequent harassing calls, free voice calls, irregular ANN calls, and illegal calling, all of which result in the loss of call charges and bring losses to network operators. [0003] Due to the popularity of free mobile calls and the unequal settlement between operators, some fixed network operators took the opportunity to launch an automatic callback card service, adding a set Callback card system 105, the switch automatically completes the call back, and the normal process of establishing a call between the calling party and the called party is modified to user reservation access, the callback system calls...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/436
Inventor 祝瑾华周平李惟佳李红英
Owner CHINA MOBILE GROUP ZHEJIANG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products