Embodiment
Embodiment mono-
The schematic flow sheet that Fig. 1 is call spam prevention method embodiment mono-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by calling terminal, and this calling terminal can be the terminal equipments such as smart mobile phone.As shown in Figure 1, the method for the present embodiment comprises:
Step 101, calling terminal are registered at call spam strick precaution center, obtain identifying code.
Particularly, terminal is opened Internet protocol, and (Internet Protocol, be called for short: IP), after the functional software of communication, at first at call spam strick precaution center, registered, so that each terminal is taken precautions against center remarks self information at call spam, obtain the identifying code that is different from other terminal.This identifying code is taken precautions against center with the terminal corresponding stored of initiating registration request at call spam; Simultaneously, this identifying code is kept in the terminal of this initiation registration request.Wherein, terminal comprises calling terminal and terminal called, and the two is relative, and the terminal of the mutual request of initiating communication is calling terminal, and the terminal of the mutual request of received communication is terminal called.
Calling terminal is registered at call spam strick precaution center, can obtain identifying code by following two kinds of modes:
Mode one, single channel obtain identifying code.
1, calling terminal sends registration request to call spam strick precaution center, carries the calling terminal title in described registration request, for example, and caller@domain.com, and calling terminal IP address;
2, calling terminal receives and stores call spam and takes precautions against center according to the calling terminal title by IP tunnel, for example, and caller domain.com, the identifying code of generation.
Mode two, binary channels are obtained identifying code.
1, calling terminal sends registration request to call spam strick precaution center, carries described calling terminal number in described registration request, for example, and 15612345678; The calling terminal title, for example, caller@domain.com; Calling terminal IP address;
2, calling terminal is by short message channel, and the mobile switch net, receive call spam and take precautions against center according to calling terminal number, and 15612345678, the first identifying code of generation;
3, calling terminal receives call spam by IP tunnel and takes precautions against center according to the calling terminal title, for example, and caller domain.com, the second identifying code of generation;
4, calling terminal adopts the first preset algorithm, and the first identifying code and the second identifying code are calculated to identifying code, and preserves.
Step 102, described calling terminal are asked to the terminal called initiating communication alternately by IP tunnel.
Wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request.Calling terminal, for example, mobile phone, after accessing Internet, ask alternately by the IP tunnel initiating communication, carry the calling terminal title in this communication interaction request, for example, caller@domain.com and calling terminal IP address, for example, 10.1.2.3, and this communication interaction request is not limited to voice call.
Step 103, described calling terminal and described terminal called are mutual, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
Particularly, after the mutual request of calling terminal initiating communication, the terminal called of its corresponding end receives this communication interaction request, obtains calling terminal title and the calling terminal IP address of carrying in this communication interaction request, and is judged whether this calling terminal is legal.
Below enumerate a kind of feasible execution mode explanation calling terminal and terminal called mutual, so that terminal called is judged whether calling terminal is legal according to identifying code:
Calling terminal, for example, caller@domain.com, receive terminal called by IP tunnel, for example, callee@domain.com, the random number sent, this random number is terminal called random generation after the communication interaction request that receives the calling terminal initiation, and for example, this random number can be aaa;
The second preset algorithm and identifying code that calling terminal prestores according to self, and random number, for example, aaa, generate the first operation result;
Calling terminal sends this first operation result to terminal called, so that terminal called judged whether calling terminal is legal according to the first operation result, if not, blocks communication interaction this time.
When terminal called is judged whether calling terminal is legal according to the first operation result, simultaneously according to by call spam, taking precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of calling terminal, and the second operation result of described random number generation, relatively whether this first operation result is consistent with the second operation result, and then judges that whether this calling terminal is legal.
The present invention is by registration and the terminal called checking whether legal to described calling terminal of calling terminal, determine whether to connect the communication interaction that described calling terminal is initiated, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
Embodiment bis-
The schematic flow sheet that Fig. 2 is call spam prevention method embodiment bis-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by terminal called, and this terminal called can be the terminal equipments such as smart mobile phone.As shown in Figure 2, the method for the present embodiment comprises:
Step 201, terminal called receive the communication interaction request that calling terminal is initiated in IP tunnel.
Wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request.This step is the operation ofstep 102 respective side in embodiment mono-, does not repeat them here.
Step 202, described terminal called and described calling terminal are mutual, and the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
Particularly, the calling terminal of the mutual request of initiating communication is registered and is obtained identifying code at call spam strick precaution center, be that the identifying code that this calling terminal is corresponding is all preserved at calling terminal and the call spam center of taking precautions against, according to this identifying code, by terminal called, the legitimacy to this calling terminal is judged.
On the basis of the above, below enumerate a kind of feasible execution mode explanation terminal called and calling terminal mutual, the identifying code obtained in the registration of call spam strick precaution center according to calling terminal is judged whether calling terminal is legal:
Terminal called, for example, callee@domain.com, generate random number, and for example, aaa, and be consistent instep 101;
Terminal called is by random number, and for example, aaa, send to calling terminal by IP tunnel, for example, and caller@domain.com;
Terminal called is random number, for example, aaa, and calling terminal title, for example, caller@domain.com, send to call spam to take precautions against center;
Terminal called receives the first operation result from calling terminal, and this first operation result is the second preset algorithm of prestoring according to self of calling terminal and the identifying code of self, and random number, for example, aaa, generation, concrete generative process is existing in embodiment mono-to be introduced in detail, repeats no more herein;
Terminal called receives the second operation result from call spam strick precaution center, this second operation result is that call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of calling terminal, and random number, for example, aaa, generation, concrete generative process refers to embodiment tri-, repeats no more herein;
Terminal called judges that whether the first operation result is consistent with the second operation result, if consistent, calling terminal is legal; If not, calling terminal is illegal.
In the present embodiment, terminal called is asked alternately to initiating communication, and the legitimacy of obtaining the calling terminal of identifying code in the registration of call spam strick precaution center is judged, determine whether to connect by this judged result the communication interaction that this calling terminal is initiated, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
Embodiment tri-
The schematic flow sheet that Fig. 3 is call spam prevention method embodiment tri-of the present invention, the present embodiment provides a kind of call spam prevention method, and the method can be carried out by call spam strick precaution center, and this call spam is taken precautions against center can be specially server.As shown in Figure 3, the method for the present embodiment comprises:
Step 301, call spam are taken precautions against the registration request that the center receiving terminal sends, and the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal.
In this step, terminal comprises calling terminal and terminal called, and the terminal of the mutual request of initiating communication is as calling terminal, and calling terminal and terminal called are corresponding to be existed.Calling terminal in this step and embodiment mono-is registered at call spam strick precaution center, obtain the setting of identifying code operational correspondence, call spam strick precaution center receives the registration request that calling terminal sends, generate the identifying code that is different from other terminal corresponding to calling terminal according to the calling terminal information that carries in this registration request, and be kept in the call spam strick precaution in the heart this identifying code is corresponding with the calling terminal that obtains this identifying code; Call spam is taken precautions against center and also this identifying code is returned to calling terminal, by this calling terminal, is preserved.
Particularly, call spam is taken precautions against center and can be generated identifying code according to following two kinds of modes:
Mode one, single channel generate identifying code.
1, call spam strick precaution center obtains the terminal name in registration request, for example, and caller@domain.com, and IP address of terminal;
2, call spam is taken precautions against center according to terminal name, and for example, caller domain.com, generate identifying code;
3, call spam is taken precautions against center corresponding preservation identifying code and terminal name and IP address of terminal, and by IP tunnel, this identifying code is sent to terminal.
Mode two, binary channels generate identifying code.
1, call spam strick precaution center obtains the terminal name in registration request, for example, and caller@domain.com; Termination number, for example, 15612345678; IP address of terminal;
2, call spam is taken precautions against center according to termination number, and 15612345678, generate and preserve the first identifying code, send to terminal by short message channel;
3, call spam is taken precautions against center according to terminal name, and for example, caller domain.com, generate and preserve the second identifying code, by IP tunnel, sends to terminal;
4, the call spam center of taking precautions against prestores according to self the first preset algorithm, the first identifying code and the second identifying code generate identifying code, and preserve.This first preset algorithm is identical with the first preset algorithm in embodiment mono-, and the preservation here refer to by the first identifying code, the second identifying code and identifying code corresponding with terminal be kept at call spam take precautions against in the heart.
Step 302, at terminal called, based on IP tunnel, set up with before the communicating by letter of calling terminal, described call spam strick precaution center receives the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result.
Particularly, terminal called, for example, callee@domain.com, after the communication interaction request that receives the calling terminal transmission, obtain the calling terminal title of carrying in this communication interaction request, for example, caller@domain.com, and calling terminal IP address, for example, 10.1.2.3, simultaneously, generate a random number, for example, aaa, and calling terminal title and random number are sent to strick precaution center, rubbish center.Call spam strick precaution center receives this calling terminal title and random number, and the second preset algorithm prestored according to self and corresponding identifying code and the random number of this calling terminal title, generates the second operation result.Wherein, the second preset algorithm prestored in the second preset algorithm that call spam strick precaution center prestores and calling terminal is identical.
Step 303, described call spam strick precaution center send described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
Particularly, described call spam strick precaution center sends described the second operation result to described terminal called, correspondingly, described terminal called receives this second operation result, and according to this second operation result and initiate the first operation result that the calling terminal of this communication interaction request sends and judge that whether this calling terminal is legal, and then determine whether to connect this time communication interaction.
In the present embodiment, the registration request of each terminal is accepted at call spam strick precaution center, makes and himself with each terminal, has identical identifying code; Generate the second operation result and feed back to terminal called according to this identifying code, whether the calling terminal of by terminal called, according to this second operation result judgement, initiating this communication interaction request is legal, thereby prevent the generation of a large amount of call spam of IP network, guarantee the reliability of communication, strengthen customer experience.
It should be noted that, in all embodiment of the present invention, be terminal called to the executive agent of the proof procedure of calling terminal legitimacy, has following potential safety hazard:
1, hacker's terminal called that disguises oneself as, ceaselessly send message and take precautions against center to call spam, causes the magnanimity computing of strick precaution center;
2, hacker's terminal called that disguises oneself as, the mass data of attempt corresponding operation result by certain terminal of call spam strick precaution center feedback in communication repeatedly calculates the identifying code of this terminal.
Therefore, on the basis of above-mentioned steps, described call spam strick precaution center sends described the second operation result to before described terminal called, can also comprise: the behavior that the described call spam center of taking precautions against sends message according to described terminal called judges that whether terminal called is legal.
Particularly, whether legal by following operation judges terminal called:
Call spam strick precaution center judges whether the message number that terminal called sends in setting-up time reaches setting quantity; If the message number reaches while setting quantity, judge that whether the calling terminal of each message is identical; When if calling terminal is identical, to calling terminal, sends and confirm that whether request is abnormal with the message of checking terminal called transmission; The confirmation the result whether message returned according to calling terminal is abnormal, determine that whether terminal called is legal.Wherein, terminal called legitimate verification process is referred to step 501 in embodiment tetra-.By to the terminal called legitimate verification, avoiding the hacker to be forged into terminal called, attack call spam and take precautions against center, or the premeditated identifying code that obtains other terminal, realize the assurance of communication quality.
Embodiment tetra-
The present embodiment is mutual embodiment between calling terminal, terminal called and call spam strick precaution center.The application scenarios of the present embodiment is that calling terminal and terminal called complete registration at call spam strick precaution center, obtains identifying code separately.
The schematic flow sheet that Fig. 4 is call spam prevention method embodiment tetra-of the present invention, as shown in Figure 4, the method can comprise:
Step 401, the request of transmission communication interaction.
Calling terminal sends the communication interaction request by IP tunnel to terminal called, carries calling terminal title and calling terminal IP address in this communication interaction request.Wherein, this communication interaction is not limited to voice communication.
Step 402, obtain calling terminal title and calling terminal IP address, generate random number.
Terminal called obtains calling terminal title and the calling terminal IP address of carrying in this communication interaction request after receiving the communication interaction request that calling terminal sends by IP tunnel, simultaneously, generates a random number.
Step 403, transmission random number.
Terminal called sends to calling terminal by the random number of its generation by IP tunnel.
Step 404, generate the first operation result.
Calling terminal receives by IP tunnel the random number that terminal called sends, and identifying code and this random number that the second preset algorithm prestored according to self prestores to himself calculated, and generates the first operation result.
Step 405, send the first operation result.
Calling terminal sends the first operation result to terminal called, so that terminal called judged whether calling terminal is legal according to this first operation result, if not, blocks communication interaction this time.
Step 403-step 405 generates the related operation of the first operation result for calling terminal.
Step 406, transmission calling terminal title and random number.
Terminal called sends to call spam to take precautions against center the random number of its generation and the calling terminal title of obtaining.
Step 407, generate the second operation result.
Call spam strick precaution center receives random number and the calling terminal title that terminal called sends, and corresponding identifying code and this random number of the second preset algorithm prestored according to self this calling terminal title that himself is prestored calculated, generate the second operation result.Wherein, the second preset algorithm in this step and the second preset algorithm instep 404 are same algorithms.
Step 408, send the second operation result.
Call spam strick precaution center sends the second operation result to terminal called, so that terminal called is judged whether calling terminal is legal according to this second operation result.
Step 406-step 408 generates the related operation of the second operation result for call spam strick precaution center.Wherein, the first operation result and the second operation result can generate simultaneously, and step 403-step 405 and step 406-step 408 can executed in parallel, to improve time efficiency.
Step 409, calling terminal legitimate verification.
Terminal called receives the first operation result from calling terminal, from call spam strick precaution center, receives the second operation result; Judge that whether this first operation result is consistent with the second operation result, if consistent, determine that calling terminal is legal, performsstep 410; If not, determine that calling terminal is illegal, performsstep 411.
Step 410, communication interaction.
Execution is legal to this step explanation calling terminal, and terminal called is connected this communication interaction that calling terminal is initiated.
Step 411, calling terminal is added to blacklist.
Execution to this step explanation calling terminal is illegal, this communication interaction that terminal called refusal calling terminal is initiated, and calling terminal IP address is set in the blacklist of this terminal called, performstep 412 simultaneously, wherein, calling terminal IP address and calling terminal number are mutual bindings, one to one.
Step 412, report calling terminal information.
Terminal called is by illegal calling terminal information, and for example, the information such as calling terminal title and calling terminal IP address, report call spam and take precautions against center, by call spam strick precaution center, carries out subsequent treatment.
The reciprocal process that the present embodiment is taken precautions against center to calling terminal, terminal called and call spam has been described in detail, by in call spam is taken precautions against, completing registration in the heart, obtain the checking of legitimacy of the calling terminal of identifying code, determine whether to connect the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication.
In above-mentioned steps, to the executive agent of the proof procedure of calling terminal legitimacy, be terminal called, exist with potential safety hazard same in embodiment tri-.Therefore, as shown in Figure 5, on the basis of Fig. 4, call spam strick precaution center sends the second operation result to before terminal called, can also comprise:
Step 501, terminal called legitimate verification.
The behavior that the call spam center of taking precautions against sends message according to terminal called judges that whether terminal called is legal.This step can be refined as following operation:
1, call spam strick precaution center judges whether the message number that terminal called sends in setting-up time reaches setting quantity.
Take precautions against center in setting-up time when call spam, for example, 180 seconds, whether the number of the message from terminal called received reached setting quantity, for example, and 5, if carry out 2; If not, illustrate that this terminal called is legal, send the second operation result to terminal called.
If 2 message numbers reach while setting quantity, judge that whether the calling terminal of each message is identical.
If the message number reaches while setting quantity, the information whether each message comprises same calling terminal is inquired about at call spam strick precaution center, if carry out 3; If not, think that the terminal called of this forgery is the malicious attack user, the message that this terminal called IP address is refused at call spam strick precaution center receives, and refusal is connected this communication interaction, and blacklists it.
If 3 calling terminals are when identical, to described calling terminal, send and confirm that whether request is abnormal with the message of verifying described terminal called and sending.
If calling terminal is identical, call spam is taken precautions against center and is sent and confirm request to this calling terminal by mobile switch net or IP tunnel, and whether this calling terminal has been initiated the communication interaction request of this number to this terminal called in checking.
The confirmation the result whether message 4, returned according to described calling terminal is abnormal, determine that whether described terminal called is legal.
If this calling terminal confirms that result is that message is normal, call spam strick precaution center thinks that this terminal called is legal, sends the second operation result to this terminal called; If this calling terminal confirms that result is that message is abnormal, call spam strick precaution center thinks that this terminal called is for the disabled user, and the message reception of the IP address of this terminal called is refused at call spam strick precaution center, and blacklists it.
By aforesaid operations, can avoid the hacker to be forged into terminal called, attack call spam and take precautions against center, or the premeditated identifying code that obtains other terminal, realize the assurance of communication quality.
Fig. 6 and Fig. 7 are the register flow path schematic diagram in call spam prevention method embodiment tetra-of the present invention.On the basis of above-described embodiment, calling terminal is registered at call spam strick precaution center, obtain the further refinement of operation of identifying code.
As shown in Figure 6, this operation can comprise:
Step 601, described calling terminal send registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request.
Particularly, calling terminal sends registration request to call spam strick precaution center, and this registration request comprises the information such as calling terminal title and calling terminal IP address, and wherein, the calling terminal title, can be for example ABC qq.com.
After this registration request is received at call spam strick precaution center, extract calling terminal title and calling terminal IP address in this registration request, and the random generation identifying code corresponding with this calling terminal title, send to this calling terminal by IP tunnel, and preserve this identifying code.
Step 602, described calling terminal receive and store described call spam and take precautions against the identifying code that center generates according to described calling terminal title by IP tunnel.
This step is directly by IP tunnel Receipt Validation code, there is the hidden danger of easily being intercepted and captured by the hacker in single channel transmission identifying code, therefore, if consider the needs of secure communication, adopt schematic flow sheet as shown in Figure 7 to complete the registration of calling terminal at call spam strick precaution center, this register flow path can comprise:
Step 701, described calling terminal send registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request.
This step, with respect to step 601, is carried calling terminal number in registration request.
After this registration request is received at call spam strick precaution center, obtain calling terminal title, calling terminal number and calling terminal IP address in described registration request, and generate and preserve the first identifying code according to this calling terminal number, send to this calling terminal by short message channel; Generate and preserve the second identifying code according to this calling terminal title, by IP tunnel, send to this calling terminal.In addition, the first preset algorithm that the call spam center of taking precautions against prestores according to self, described the first identifying code and described the second identifying code generate identifying code, and preserve.
Step 702, described calling terminal receive described call spam by short message channel and take precautions against the first identifying code that center generates according to described calling terminal number.
Step 703, described calling terminal receive described call spam by IP tunnel and take precautions against the second identifying code that center generates according to described calling terminal title.
In above-mentioned two steps, execution sequence does not have sequential relationship, can carry out simultaneously, can first carry out one of them yet, is carrying out another.Calling terminal is by short message channel, and the mobile switch net, receive the first identifying code, by IP tunnel, receives the second identifying code, and during the binary channels transmission, the hidden danger that the hacker intercepts and captures reduces greatly, further ensures communication safety.
Step 704, described calling terminal adopt the first preset algorithm, and described the first identifying code and the second identifying code are calculated to described identifying code, and preserve.
In this step, the first preset algorithm is identical with the first preset algorithm that instep 701, call spam strick precaution center generation identifying code is used.
Embodiment five
The structural representation that Fig. 8 is calling terminal embodiment mono-of the present invention, this calling terminal can be the terminal equipments such as smart mobile phone.As shown in Figure 8, the calling terminal of the present embodiment comprises: thefirst Registering modules 81, thefirst sending module 82 and thefirst processing module 83.
Wherein, thefirst Registering modules 81, for being registered at call spam strick precaution center, obtains identifying code; Thefirst sending module 82, for asking alternately to the terminal called initiating communication by the Internet protocol IP tunnel, carries described calling terminal title and described calling terminal IP address in described communication interaction request; Thefirst processing module 83 is for mutual with described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described identifying code.
The calling terminal of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment mono-, its realize principle and technique effect similar, repeat no more herein.
In a kind of implementation, as shown in Figure 9, thefirst Registering modules 81 can comprise: the first transmitting element 911, for send registration request to described call spam strick precaution center, carry described calling terminal title and described calling terminal IP address in described registration request; The first receiving element 912, take precautions against for receive and store described call spam by IP tunnel the identifying code that center generates according to described calling terminal title.
In another kind of implementation, as shown in figure 10, thefirst Registering modules 81 can comprise: the second transmitting element 1001, for send registration request to described call spam strick precaution center, carry described calling terminal number, described calling terminal title and described calling terminal IP address in described registration request; The second receiving element 1002, take precautions against for receive described call spam by short message channel the first identifying code that center generates according to described calling terminal number; And, receive described call spam by IP tunnel and take precautions against the second identifying code that center generates according to described calling terminal title; The first computing unit 1003, for adopting the first preset algorithm, calculated described identifying code to described the first identifying code and the second identifying code, and preserve.
Further, thefirst processing module 83 can specifically for: receive by IP tunnel the random number that described terminal called sends; The second preset algorithm prestored according to self and described identifying code, and described random number generates the first operation result; And, send described the first operation result to described terminal called, so that described terminal called judged whether described calling terminal is legal according to described the first operation result, if not, block communication interaction this time.
The present embodiment completes the registration of calling terminal by the first Registering modules, make calling terminal and call spam strick precaution center there is identical identifying code, then, by the first sending module initiating communication, ask alternately, and first processing module and terminal called mutual, and determine whether to connect by terminal called the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication, strengthen customer experience.
Embodiment six
The structural representation that Figure 11 is terminal called embodiment mono-of the present invention, this terminal called can be the terminal equipments such as smart mobile phone, with the calling terminal of mentioning in above-described embodiment, carries out alternately.As shown in figure 11, the terminal called of the present embodiment comprises: thefirst receiver module 111, for receive the communication interaction request that calling terminal is initiated in the Internet protocol IP tunnel, wherein, carry described calling terminal title and described calling terminal IP address in described communication interaction request; Thesecond processing module 112, for mutual with described calling terminal, the identifying code obtained in the registration of call spam strick precaution center according to described calling terminal is judged whether described calling terminal is legal.
The terminal called of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment bis-, its realize principle and technique effect similar, repeat no more herein.
Further, thesecond processing module 112 specifically for:
Generate random number;
Described random number is sent to described calling terminal by IP tunnel;
Send to described call spam to take precautions against center described random number and described calling terminal title;
Receive the first operation result from described calling terminal, described the first operation result is the second preset algorithm of prestoring according to self of described calling terminal and the identifying code of self, and described random number generates;
Receive the second operation result from described call spam strick precaution center, described the second operation result is that described call spam is taken precautions against the second preset algorithm that center prestores according to self, the corresponding identifying code of described calling terminal, and the generation of described random number;
Judge that whether described the first operation result is consistent with the second operation result, if consistent, described calling terminal is legal; If not, described calling terminal is illegal.
Embodiment seven
The structural representation that Figure 12 is server example one of the present invention, as shown in figure 11, the server of the present embodiment comprises: thesecond Registering modules 121, the3rd processing module 122 and thesecond sending module 123.
Wherein, thesecond Registering modules 121, the registration request sent for receiving terminal, the described registration request sent according to terminal generates identifying code, and preserves, and returns to described terminal; The3rd processing module 122, for setting up at terminal called internet protocol-based IP tunnel with before the communicating by letter of calling terminal, receive the described calling terminal title of terminal called transmission and the random number that terminal called produces, and the second preset algorithm prestored according to self and with the corresponding identifying code of described calling terminal and random number, generate the second operation result; Thesecond sending module 123, for sending described the second operation result to described terminal called, so that described terminal called is judged whether described calling terminal is legal according to described the second operation result.
The server of the present embodiment, can be for carrying out the technical scheme of the inventive method embodiment tri-, its realize principle and technique effect similar, repeat no more herein.
Further, in a kind of implementation, thesecond Registering modules 121 can specifically for:
Obtain terminal name and IP address of terminal in described registration request;
Generate identifying code according to described terminal name;
Preserve described identifying code, and send to described terminal by IP tunnel.
Further, in another kind of implementation, thesecond Registering modules 121 can specifically for:
Obtain terminal name, termination number and IP address of terminal in described registration request;
Generate and preserve the first identifying code according to described termination number, by short message channel, send to described terminal;
Generate and preserve the second identifying code according to described terminal name, by IP tunnel, send to described terminal;
The first preset algorithm prestored according to self, described the first identifying code and described the second identifying code generate described identifying code, and preserve.
Closer, as shown in figure 13, server provided by the invention can also comprise:judge module 131, at the second sending module, send described the second operation result to described terminal called before, the behavior that sends message according to described terminal called judges that whether terminal called legal.
On the basis of the above, describedjudge module 131 can comprise:
Whether thefirst judging unit 1311, reach setting quantity for judging the message number that described terminal called sends in setting-up time;
Thesecond judging unit 1312, if be yes for the first judging unit Output rusults, judge that whether the calling terminal of each message is identical;
The3rd judging unit 1313, if be yes for the second judging unit Output rusults, send and confirm that whether request is abnormal with the message of verifying described terminal called transmission to described calling terminal;
The4th judging unit 1314, the whether abnormal confirmation result for the message returned according to described calling terminal, determine that whether described terminal called is legal.
Embodiment eight
The structural representation that Figure 14 is call spam crime prevention system embodiment mono-of the present invention, as shown in figure 14, the call spam crime prevention system of the present embodiment comprises: callingterminal 141, terminal called 142 and server 143.Wherein, callingterminal 141 can be the calling terminal as shown in arbitrary in Fig. 8-Figure 10; Terminal called 142 can be terminal called as shown in figure 11;Server 143 can be the server as shown in Figure 12 or 13.
The present embodiment is mutual by calling terminal, terminal called and server, calling terminal completes registration in server, the checking of terminal called to the legitimacy of the calling terminal that obtains identifying code, determine whether to connect the communication interaction that this calling terminal is initiated, thereby prevent the generation of IP network call spam, guarantee the reliability of communication.
One of ordinary skill in the art will appreciate that: realize that the hardware that all or part of step of above-mentioned each embodiment of the method can be relevant by program command completes.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: above each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to aforementioned each embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: its technical scheme that still can put down in writing aforementioned each embodiment is modified, or some or all of technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the scope of various embodiments of the present invention technical scheme.