Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing filtering of malicious calls through real-time algorithm

A technology of malicious calls and algorithms, applied in the direction of telephone communications, transmission systems, electrical components, etc., can solve the problems of operators and mobile users lack of governance means, and achieve the effects of reducing pressure, accurate interception, and high efficiency

Active Publication Date: 2017-03-15
ZHEJIANG PONSHINE INFORMATION TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For such malicious calls, operators and mobile users currently lack effective management methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing filtering of malicious calls through real-time algorithm
  • Method and system for realizing filtering of malicious calls through real-time algorithm
  • Method and system for realizing filtering of malicious calls through real-time algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solutions of the present invention will be further described and illustrated through specific examples below.

[0067] This software has the following characteristics: (1) 24-hour uninterrupted operation; (2) automatic redialing in case of busyness, and the number of redialing times can be set arbitrarily; (3) system working time can be set arbitrarily. Criminals take advantage of the above-mentioned features of the HUDEI software to maliciously harass mobile phone users, which brings great troubles to users. In view of the above situation, the present invention develops a method and system for filtering malicious calls by using real-time algorithms.

[0068] The method and system for realizing malicious call filtering by using a real-time algorithm require users to apply for services protected by you on the malicious call real-time analysis and filtering platform. The scope of acceptance of this business includes all China Telecom, China Unicom and mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of mobile telephone communication, and particularly relates to a method for realizing filtering of malicious calls through a real-time algorithm. The method comprises the following steps that: a calling number initiates a call to a called number already applying for malicious call protection; the calling number and the called number are transmitted to a real-time malicious call analyzing and filtering platform; the real-time malicious call analyzing and filtering platform matches the calling number and the called number with a number library, and judges whether to intercept the calling number or not by using the real-time algorithm; and if the calling number is not intercepted, the calling number is put through. The invention also discloses a malicious call filtering system. The malicious call filtering system comprises a malicious call intercepting assembly module, a support platform module, an algorithm model module and an external connection interface module. In the method, the malicious call protection is applied through the called number, the calling number and the called number are transmitted to the real-time malicious call analyzing and filtering platform, the calling number and the called number are matched with the number library for interception, and whether to intercept the non-intercepted calling number or not is judged by the real-time algorithm, so that filtering of the malicious calls is realized, and the trouble of a called user is avoided.

Description

technical field [0001] The invention belongs to the technical field of mobile phone communication, and in particular relates to a method and a system for realizing malicious phone filtering by using a real-time algorithm. Background technique [0002] Mobile phones have become one of the main tools for people to communicate, and users can use mobile terminals such as mobile phones to perform communication behaviors such as calling with other users. While enjoying the convenience brought by mobile terminals such as mobile phones to work or life, users may be disturbed by harassing calls such as fraud and marketing. These harassing calls have seriously affected people's normal work and life. [0003] In order to identify harassing phone numbers, the method adopted in the prior art is that operators manually collect harassing phone numbers, generate a blacklist, and then send it to the terminal, and the terminal stores the blacklist locally. When the terminal receives an incom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/2745H04M3/436H04L29/06
CPCH04L63/101H04M1/2745H04M3/436
Inventor 陈晓莉林建洪徐菁聂宜君徐佳丽肖炜柴永恒
Owner ZHEJIANG PONSHINE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products