Harass call identification and interception method

A technology of harassing calls and identification factors, applied in the field of harassing calls identification and interception, which can solve problems such as flooding and limited coverage.

Inactive Publication Date: 2017-11-07
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although operators are continuing to control harassing phone calls, they are still flooding; Internet vendors have

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Harass call identification and interception method
  • Harass call identification and interception method
  • Harass call identification and interception method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0067] Such as figure 1 As shown, this embodiment includes the following steps:

[0068] S1: Collect the signaling information of the communication network, the original data is decoded and synthesized, data deduplication, protocol analysis, and then CDR synthesis is performed according to various protocol rules;

[0069] S2: According to the characteristics of harassing calls, select calling frequency, connection rate, average ringing duration, average call time when called, number concentration, ratio of empty numbers, ratio of CS call volume and PS traffic as the identification factor of harassing calls;

[0070] S3: Use weighted naive Bayes classification algorithm to classify all calls according to the identification factor of harassing calls, and identify harassing calls and non-harassing calls;

[0071] S4: Then perform a callback chec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a harass call identification and interception method, and discloses the harass call identification and interception method. The method comprises the steps that S1: communication network signaling information is acquired, decoding synthesis, data deduplication and protocol analysis are performed on original data and then CDR synthesis is performed according to various protocol rules; S2: identification factors are selected according to the harass call characteristics; S3: all the calls are classified by using a weighted naive Bayesian classification algorithm according to the identification factors of the harass calls and the harass calls and the non-harass calls are identified; S4: then the callback inspection is performed on the identified harass calls; and S5: finally the harass calls are intercepted. The harass calls can be effectively identified, and the interception efficiency of the harass calls can be enhanced and the user experience can be enhanced.

Description

Technical field [0001] The invention belongs to the field of communication technology, and relates to a method for identifying and intercepting harassing calls. Background technique [0002] With the continuous development of the communications industry, the majority of users have begun to gradually enjoy diversified communications services. However, at the same time, more and more fraudulent calls appear in users' daily lives. In some areas, fraud cases frequently occur during holidays. Frequent fraudulent calls not only disrupt the normal order of telecommunications operations, but also cause huge property losses to the deceived users, and affect social stability and harmony. Therefore, the research on the identification and interception of harassing calls has important practical significance. In response to harassing call behavior, although operators continue to manage, but it is still flooding; although Internet manufacturers have also participated in the management of hara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L15/02G10L15/04G10L15/06G10L17/04G10L19/032G10L21/0208G10L25/45G10L25/51H04M1/66H04M3/22H04M3/42H04M3/436H04W4/16
CPCG10L15/02G10L15/04G10L15/063G10L17/04G10L19/032G10L21/0208G10L25/45G10L25/51H04M1/66H04M3/2281H04M3/42195H04M3/436H04W4/16
Inventor 程方唐洪志张治中赵瑞莉
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products