Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A call connection method and a call connection device

A technology of call connection and call party, applied in the field of information security, can solve the problems of fraudsters causing property damage to users, misleading voice confirmation of call users, etc., and achieve the effect of avoiding property and other losses.

Active Publication Date: 2019-04-12
VIVO MOBILE COMM CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a call connection method and a call connection device to solve the problem in the prior art that the calling user is misled to perform voice confirmation by means of call transfer, which may cause fraudsters to bring property losses to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A call connection method and a call connection device
  • A call connection method and a call connection device
  • A call connection method and a call connection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 The implementation flow of the call connection method provided by the first embodiment of the present invention is shown, and the details are as follows:

[0053] In step S101, a call request is received, and it is detected whether there is a call transfer between the first call party and the second call party to be connected by the call request.

[0054] Specifically, the call connection establishment request is usually initiated by the first call party who may be defrauded. For example, when a user receives a text message for remittance or phone charge, for security reasons, the user usually initiates a call confirmation request to the text message sender.

[0055] Fraudsters usually gain the trust of the SMS sender in advance, and change the contact name corresponding to the fraudulent call to the fraudulent contact name. For example, fraudsters may use a fake base station to impersonate the mobile phone number B of the second caller to send a number change ...

Embodiment 2

[0084] figure 2 Provided for the second embodiment of the present invention, based on the implementation process of a specific identity verification method in step S102 in the first embodiment, the details are as follows:

[0085] In step S201, the called number selected when the call is initiated and the contact name corresponding to the called number are obtained, and the number and the contact name are sent to the operator server.

[0086] When the trigger mode of the called number is a fraudulent request triggered by the user in the contact list, the name of the contact corresponding to the called may be obtained directly from the contact list.

[0087] When the called number is the number after the user modifies the contact, the name of the contact corresponding to the called can be obtained from the modified contact item.

[0088] When the called number is a number change text message (for example, when a specific number change keyword is included), the name of the con...

Embodiment 3

[0097] image 3 The implementation process of the identity verification method based on the first embodiment provided by the third embodiment of the present invention is described in detail as follows:

[0098] In step S301, the instant messaging account of the contact person corresponding to the called number is searched, and the instant messaging tool corresponding to the instant messaging account is activated.

[0099] Specifically, the instant messaging account of the contact person corresponding to the called number may be QQ, WeChat, Weibo or the like. Or, as an optional implementation manner of the present invention, other communication tools of the contact person, such as telephone number and email address, etc. may also be obtained.

[0100] The instant messaging account of the contact may be pre-set by the user in the contact information in the address book. When determining the contact corresponding to the called number, if the called number is a number in the con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a talking connection method and device. The method includes the following steps that a calling request is received, and whether call forwarding exists between a first talking party and a second talking party which are required to be connected according to the calling request or not is detected; when call forwarding exists between the first talking party and the second talking party, identity verification is conducted; if identity verification is successful, the talking connection between the first talking party and the second talking party is established. The method allows a user to find call forwarding timely, the called number is effectively verified, the security of talking is improved, and property loss and other loss of the user are avoided.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a call connection method and a call connection device. Background technique [0002] In recent years, incidents of telecom fraud have intensified, not only causing property losses to a large number of victims, but also endangering the lives of many people. As a widely popular mobile network terminal, mobile phones are also involved in telecom fraud from time to time. [0003] For example, the existing fraud methods include using a fake base station to impersonate the mobile phone number A of the first user, or controlling the mobile phone number A of the first user through viruses, or using the mobile phone number B of the second user who is fraudulent, to send The mobile phone number C of the defrauded third user sends fraudulent information, for example, the fraudulent signal includes the information that "the mobile phone number A of the first user has been cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/16H04W12/12
CPCH04W4/16H04W12/12
Inventor 周芳香
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products