CN1078789C - Method and system for intercepting malicious calling and automatically notifying user - Google Patents
Method and system for intercepting malicious calling and automatically notifying user Download PDFInfo
- Publication number
- CN1078789C CN1078789C CN96107900A CN96107900A CN1078789C CN 1078789 C CN1078789 C CN 1078789C CN 96107900 A CN96107900 A CN 96107900A CN 96107900 A CN96107900 A CN 96107900A CN 1078789 C CN1078789 C CN 1078789C
- Authority
- CN
- China
- Prior art keywords
- report
- circuit
- tone
- dialing
- calling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The present invention discloses a method and a systematic device for intercepting a malicious call and automatically informing a user. The present invention utilizes monolithic computer technology which is combined with telephone technology and computer voice synthesizing technology so as to realize the technology that a malicious call tracing report of the SPC telephone exchange is automatically intercepted so as to automatically call back a called user and generate a piece of voice information of a calling number. The present invention is applied to all the malicious call tracing services of the SPC telephone exchanges with a malicious call tracing function.
Description
This invention relates to a kind of intercepting malicious calling report and notifies user's method and system device automatically, be applied to the SPC telephone exchange malicious call and trace special clothes business, it is to utilize singlechip technology, telephony, computerized speech synthetic technology realize, are applicable to that all possess the SPC telephone exchange of Malicious Call Identification function.
Malicious call is a kind of a kind of distinctive criminal offence of harassing by phone, and along with popularizing of China's telephone communication, this case also rises day by day, can accurately and timely know rear subscriber number, becomes by harassing and wrecking person's a big requirement.
Malicious Call Identification (MALICIOUS CALL TRACING) is a special service business on the present domestic and international all kinds of stored-program control exchanges, when the user needs this service, can handle application by the business window of telephone office.Its using method is (phone of having applied for this function): when to party call you the time, please you pick up phone, (be not as the criterion in on-hook or the on-hook 100ms the other side according to can't hear busy tone, this time limit is different because of type), clap " R " key of hook switch or phone fast, after switch recognizes user's request, just in the alarm type mode, with both sides' number and call time, on printer or operating maintenance terminal screen, export.
Existing inquiry mode is: the user must put through the phone of exchange room, the inquiry operator on duty.This kind method of service depends on the machine room operator on duty, and the exchange room phone is generally underground, mostly after this function of user applies, where do not know inquiry, the telephone office that has sets up special reception phone, but influenced by operator on duty's service level, can not guarantee that service in time, and reception phone must be waited for round the clock, has increased machine room personnel's burden and labour intensity, has influenced carrying out of this business.
Except ISDN(Integrated Service Digital Network) (ISDN) user, utilize digital subset can the display of calling number outside, because what most of telephone subscribers used all is analog telephone, on analog line, transmit calling number, SPC telephone exchange does not possess this function both at home and abroad at present, moreover ordinary telephone set does not possess the function that receives calling number yet.
Task of the present invention just provides the method and system device that the user is notified in a kind of intercepting malicious calling report automatically, malicious call report on the intercepting switch report output equipment of its energy intelligence, and, utilize computer synthetic speech form to notify its calling number from the automatic call back called subscriber.For finishing above-mentioned task, the solution that the present invention takes is: be that core is formed hardware circuit with the single-chip microcomputer, trace report by intercepting malicious call on the report output equipment that is programmed in switch automatically, sub-argument calling and called number, and by the phone that links to each other with the present invention from trend called subscriber callback, behind the called party answer, with speech synthesis technique with calling number with the speech form advise called subscriber.
Because switch report output equipment can be Computer Simulation terminal, pure terminal or printer (these equipment are communicated by letter with switch is connected in series), thereby the particular hardware knot mouth that is embodied in the intercepting and capturing report of above scheme is also different, corresponding the former, can be designed to computer card, be inserted in the expansion slot and directly intercept and capture report from parallel bus; The latter two can make external form, utilize the serial ports with the switch same protocol, be connected across on the string line that connects with pure terminal or printer, certainly, but also terminating at one independently on the switch serial output report port.
Above-mentioned solution than existing, it is professional to user's automatization of service, transparence that the phone malicious call is traced, changed the artificial enquiry mode that existing malicious call is traced, promptly having improved service quality makes the machine room personnel free from mixed and disorderly inquiry telephone bell again, because function of the present invention realizes by software programming, thereby not influenced by the switch model, be applicable to various switches.
Below in conjunction with drawings and Examples the present invention is described in further detail:
Fig. 1 is the schematic block circuit diagram of first embodiment of the invention;
Fig. 2 is the software flow pattern of Fig. 1 embodiment or second embodiment.
In circuit shown in Figure 1, the dotted line right-hand part is the switch part relevant with system and device of the present invention, the left side is that system of the present invention forms, for parallel processing receives report and notifies called two different courses of work, adopted dual-cpu structure, (certainly, also can single CPU time-sharing work) first half is for receiving report section, Lower Half is for notifying called part, and the data between two parts transmit by the parallel interface 8255 B mouths of expansion.
1, report receives principle:
The embodiment of the invention 1 is made a computer card, is inserted in the bus expansion slot of the anti-true terminal of microcomputer ' address decoding among the figure.External interrupt trigger interface circuit ' link to each other with the address bus of expansion slot, finish address decoding and match with the bus reading signal lines, provide an external interrupt triggering signal to CPU, the A mouth of expansion parallel port 8255 and the data/address bus of expansion slot link by ' data interface circuit ', when the switch output report, the microcomputer simulation terminal is carried out read operation to port, after CPU receives external interrupt, data on the while readout data bus, 8255 B mouths are used for to notifying called part to send data.The first half ' form receiving software flow process ' with reference to figure illustrates that its software flow is as follows:
This part software mainly is made up of main program and exterior I NTO interrupt routine, whether be not sent to the malicious call data that next stage is notified called part in the main program circular test data storage in addition, if any, then wait for sending data when next stage is idle open simultaneously the interruption.The term of execution of main program, take place if any external interrupt, software enters interrupt routine, interrupt routine at first audit report has or not the malicious call banner string, (as: MALICIOUS CALLIDENTIFICATION) if any, then think the malicious call report, continue to read in the corresponding call time, called number and calling number, put into data storage, up to recognizing report termination character (as: END REPORT) sign, whether main program all carried out one time in character of the every reception of program, check and determine to notify called part busy and send data by 8255 B mouths to it with data memory area; As the call sign that means no harm, think that then current report is not the malicious call report, up to having malicious call sign or EOI to return main program.
2, notify called part principle:
This part mainly is made up of CPU and peripheral circuit, sound-compound-circuit 5100, double-tone dialing frequently circuit 5087, telephone signal tone identification and control circuit, voice data memory.The A mouth control dial-up circuit 5087 of expansion parallel interface 8255; The C mouth transmits speech data to VODER 5100, and the B mouth receives the calling and called number data that the report receiving unit is sent here, ' telephony interface.Signal tone identification ' circuit is responsible for the machine that rises, the on-hook of control ' callback telephone line ' and detects dialing tone, ring-back tone, busy tone and anti-polar signal." notify called software flow " with reference to the latter half of Fig. 2 and illustrate that its software flow is as follows:
This part software function mainly contains main program, phone control and the identification of sound sound, dual-tone dialing and phonetic synthesis control subprogram and finishes.
Whether main program circular test upper level has data to send here, if any, then data are put into the dial buffer district of data storage, call on phone control and the signal tone recognition subroutine control card phone and prepare dialing; As not having, then check and wait to dial buffer empty not? as sky, main program is carried out in circulation, otherwise, will wait to dial data and send into the dial buffer district, prepare dialing once more.After dial data is ready to, connect telephone line by phone control and signal tone recognition subroutine, as no dial tone then on-hook restart, if any dialing tone, then allot the dialing of work song program.The dialing subprogram is taken out the called number in the dial buffer district successively, and control dial-up circuit 5087 up to called end, is transferred the playback subprogram to the switch dialing then.The playback subprogram is at first differentiated the signal tone of sending here on the telephone wire, as is busy tone, then the dialing area data is sent to and waits to dial buffering area, returns main program then; Ring-back tone has in this way judged whether that then polarity reversing signal waits for that the user plays machine, and as user's long time no answer, the service then abandoned is returned, if any polarity reversing signal, at first take out in the speech memory " hello! Just now called out that a phone call for you is " take out the calling number in the dial buffer district then successively; and calculate the storage address of corresponding voice; corresponding speech data is sent to VODER 5100 reduction speech play to telephone line; finishes up to calling number; as calling number is long-distance sign; the speech data that then takes out " letting down, was trunk call just now, and specifically number is not quite clear " is sent.After continuous 6 identifications of program are less than dialing tone, just make callback telephone line failure judgment, withdraw from 30 fens kinds of service.
Certainly, the another kind of form of above-mentioned solution is to make an external device, and cross-over connection or terminating are on switch report output serial port circuit, and its essence is identical with embodiment 1, just its ' address decoding.External interrupt trigger interface circuit ' different with ' data interface circuit ' part, particularly ' data interface circuit ' will have one ' serial/parallel ' change-over circuit, and other parts are not repeated with embodiment 1.
More than the CPU that adopts among two embodiment be INT 8031, certainly also can adopt other model or Series chip, expansion parallel port circuit not necessarily 8255, sound-compound-circuit and dialing circuit also are not limited only to 5100 and 5087, also can adopt other circuit, as: T6668 and HM5089 etc.
First embodiment is an optimum implementation, makes computer card because of it, has saved working power and configuration design, does not take up space again.
Claims (3)
1, a kind of method of the intercepting malicious calling report being notified automatically the user: it is characterized in that: accept and analyze the report of switch output, report is traced in the identification malicious call, separates calling and called number and other call informations; The malfunction of the dialing tone that identification switch provides, busy tone and phone determines whether dialing; Dial and be the called subscriber; Calling number is converted to corresponding voice, and the control sound circuit is play voice.
2, method according to claim 1 is characterized in that described software flow is as follows:
The report that switch is exported is also analyzed in acceptance, it is characterized in that discerning malicious call and traces report, separates master, quilt than number and other call informations; The state of phone that judgement connects determines whether dialing, it is characterized in that the malfunction of dialing tone, busy tone and phone that identification switch provides; Determine on-hook or playback, it is characterized in that ring-back tone, busy tone and polarity reversing signal that identification switch provides; The control sound circuit is play voice, it is characterized in that calling number is converted to the individual voice of answering.
3, a kind ofly notify user's system and device automatically with intercepting malicious calling report, it comprises:
1. single-chip microcomputer and peripheral circuit have a CPU and speech memory at least;
2. with the interface circuit of report output equipment, finish and the interface of microcomputer expansion slot parallel bus or the interface of general serial mouth;
3. telephone dialer circuit produces the dual-tone multifrequency of exchange function identification and the circuit or the integrated device of dc pulse signal, dialing automatically under CPU control;
4. telephony interface and signal tone identification circuit connect a telephone line at least, in order to finish the detection of dislodging machine and dialing, ring-back tone, busy tone and polarity reversing signal;
5. sound-compound-circuit, the integrated device with speech-sound synthesizing function are that core and peripheral circuit are formed, and play voice under Single-chip Controlling.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN96107900A CN1078789C (en) | 1996-06-12 | 1996-06-12 | Method and system for intercepting malicious calling and automatically notifying user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN96107900A CN1078789C (en) | 1996-06-12 | 1996-06-12 | Method and system for intercepting malicious calling and automatically notifying user |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1143876A CN1143876A (en) | 1997-02-26 |
CN1078789C true CN1078789C (en) | 2002-01-30 |
Family
ID=5119814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN96107900A Expired - Fee Related CN1078789C (en) | 1996-06-12 | 1996-06-12 | Method and system for intercepting malicious calling and automatically notifying user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1078789C (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101621775A (en) * | 2009-08-12 | 2010-01-06 | 中兴通讯股份有限公司 | Service control point of intelligent network and call intercepting method |
CN103874028A (en) * | 2012-12-11 | 2014-06-18 | 联想(北京)有限公司 | Information control method and electronic device |
CN104104772B (en) * | 2014-07-15 | 2017-06-27 | 中国联合网络通信集团有限公司 | One kind fraud telephone prompts method, server and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61238156A (en) * | 1985-04-15 | 1986-10-23 | Nec Eng Ltd | Malicious call recording system |
JPS6214565A (en) * | 1985-07-12 | 1987-01-23 | Nec Corp | Malicious call searching system |
EP0424877A2 (en) * | 1989-10-23 | 1991-05-02 | Nec Corporation | Malicious call detection method and system |
-
1996
- 1996-06-12 CN CN96107900A patent/CN1078789C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61238156A (en) * | 1985-04-15 | 1986-10-23 | Nec Eng Ltd | Malicious call recording system |
JPS6214565A (en) * | 1985-07-12 | 1987-01-23 | Nec Corp | Malicious call searching system |
EP0424877A2 (en) * | 1989-10-23 | 1991-05-02 | Nec Corporation | Malicious call detection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN1143876A (en) | 1997-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1181663C (en) | Device for called user to resist harassing call positively | |
CN1078789C (en) | Method and system for intercepting malicious calling and automatically notifying user | |
CN1021184C (en) | Private telephone automatic calling receiving method and equipment | |
CN102196105A (en) | Telephone voice assisting system | |
CN2225736Y (en) | Intelligent telephone set | |
CN201515424U (en) | Embedded phone system playing voice according to keystroke | |
CN2613952Y (en) | Apparatus for collecting real communication process and state data of any telephone number | |
CN2682758Y (en) | Wireless access device for fixed telephone network | |
CN2150685Y (en) | Computer cipher controller for long-distance telephone | |
CN1124429A (en) | Intelligent telephone equipment | |
CN2157640Y (en) | Inverted signal generator for telephone | |
CN2329123Y (en) | Anti-frandulent use of telephone and cipher limiting dialing and automatic dialing alarm | |
CN2341327Y (en) | Calling number indicator of telephone | |
CN102932560B (en) | Method for realizing relay junction and calling information extraction by using digital relay voice card | |
CN2156634Y (en) | Program control residance telephone multi-function multiplexing device | |
CN2415561Y (en) | Telephone number roam and card account interactive charge type IC card telephone | |
CN2764073Y (en) | IP telephone switch | |
CN2134758Y (en) | Stripe code telephone controller | |
CN1400797A (en) | Device for treating calling information of telephone | |
CN2426657Y (en) | Multichannel IP telephone dial machine | |
CN201278575Y (en) | Multiple communication operator compatible building inter-comm apparatus | |
CN2775959Y (en) | Personal communication intelligent identifying device | |
CN2187859Y (en) | Card type telephone managing device | |
CN2508486Y (en) | Mobile phone controlled newspaper vending circuit | |
CN2444356Y (en) | Telephone set with active counteract interference by called user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |