CN105744525A - Method, device and system for mobile communication terminal to identify harassing communication - Google Patents

Method, device and system for mobile communication terminal to identify harassing communication Download PDF

Info

Publication number
CN105744525A
CN105744525A CN201410746562.0A CN201410746562A CN105744525A CN 105744525 A CN105744525 A CN 105744525A CN 201410746562 A CN201410746562 A CN 201410746562A CN 105744525 A CN105744525 A CN 105744525A
Authority
CN
China
Prior art keywords
harassing
wrecking
address
rfid
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410746562.0A
Other languages
Chinese (zh)
Inventor
张爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410746562.0A priority Critical patent/CN105744525A/en
Priority to PCT/CN2015/095597 priority patent/WO2016091074A1/en
Publication of CN105744525A publication Critical patent/CN105744525A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method, device and system for a mobile communication terminal to identify harassing communication. The method comprises: a mobile communication terminal obtaining a harassing address database; employing at least one harassing addresses in the harassing address database as a new communication mode of a specific contact person to be stored in a local address book; setting a harassing identification label for the harassing address stored in the communication modes of a specific contact person, or setting a harassing identification label for the specific contact person; when communication access occurs, if the network address of a communication access initiator is a harassing address in the harassing address database, obtaining the harassing identification label corresponding to the harassing address in the local address book, or the harassing identification label of the specific contact person corresponding to the harassing address, and presenting the harassing identification label. The technical scheme solves the problem that in the prior art, an IOS system APP can neither obtain incoming call numbers nor display harassing address information on an incoming call interface.

Description

The method of mobile communication terminal identification harassing and wrecking communication, Apparatus and system
Technical field
The present invention relates to a kind of computer realm, particularly relate to the method for a kind of mobile communication terminal identification harassing and wrecking communication, Apparatus and system.
Background technology
Along with the development of science and technology, obtain large quantities of subscriber phone number and become more and more easier.These telephone numbers being acquired utilized by some personnel carry out harassing, promote, swindle etc., cause people often to be bothered by various harassing calls in daily life.How to take precautions against and identify that these harassing calls have become is extremely important.
Occur in that some application (App) for identifying harassing call on the market at present.The recognition principle of these App is substantially: intercept and capture the incoming call event of cell phone system, obtains caller ID;By carrying out inquiry comparison with the harassing call number storehouse of local or high in the clouds, and then determine whether caller ID is harassing and wrecking numbers, then Query Result information is presented to coming on electric interface of cell phone system again.
Above-mentioned implementation has some following drawbacks and limitation:
One, App allows for getting caller ID.
Above-mentioned implementation premise is that the number taking incoming call, for relatively more open Android (Android) cell phone system, this is no problem, and App can accomplish this point completely.But, in the iOS system comparing closing, App cannot obtain caller ID, has not had this premise just to cannot be carried out follow-up identification work.
Two, the corresponding IOS system closed, existing APP cannot accomplish to be presented to harassing and wrecking information warning the coming on electric interface of cell phone system.
Summary of the invention
In view of the above problems, it is proposed that the present invention is so that providing a kind of and overcoming the problems referred to above or solve the method for mobile communication terminal identification harassing and wrecking communication of the problems referred to above, Apparatus and system at least in part.
According to the first aspect of the invention, it is provided that the method for a kind of mobile communication terminal identification harassing and wrecking communication, including:
Mobile communication terminal obtains harassing and wrecking address base;
At least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book as the newly-increased communication mode of designated contact;
Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
According to the second aspect of the invention, it is provided that the method for a kind of mobile communication terminal identification harassing and wrecking communication, including:
Network equipment region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
According to described positional information, it is determined that the region that described mobile communication terminal is presently in;
According to described region, obtain the described harassing and wrecking address base that described region is corresponding;
The described harassing and wrecking address base got is sent to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
According to the third aspect of the invention, it is provided that a kind of mobile communication terminal, including:
Acquisition module, is used for obtaining harassing and wrecking address base;
Preserve module, for being saved in local address book as the newly-increased communication mode of designated contact at least one the harassing and wrecking address comprised in described harassing and wrecking address base;
First arranges module, arranges harassing and wrecking identification (RFID) tag for the described harassing and wrecking address for being saved in the communication mode of described designated contact and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
First processing module, for when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
According to the fourth aspect of the invention, it is provided that a kind of network equipment, including:
Grouping module, for the region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiver module, for receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
First determines module, for according to described positional information, it is determined that the region that described mobile communication terminal is presently in;
Acquisition module, for according to described region, obtaining the described harassing and wrecking address base that described region is corresponding;
Sending module, described harassing and wrecking address base for getting sends to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
According to the fourth aspect of the invention, it is provided that a kind of communication system, including: mobile communication terminal and network equipment, wherein,
Described mobile communication terminal, including:
Acquisition module, is used for obtaining harassing and wrecking address base;
Preserve module, for being saved in local address book as the newly-increased communication mode of designated contact at least one the harassing and wrecking address comprised in described harassing and wrecking address base;
First arranges module, arranges harassing and wrecking identification (RFID) tag for the described harassing and wrecking address for being saved in the communication mode of described designated contact and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
First processing module, for when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
Described network equipment, including:
Grouping module, for the region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiver module, for receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
First determines module, for according to described positional information, it is determined that the region that described mobile communication terminal is presently in;
Acquisition module, for according to described region, obtaining the described harassing and wrecking address base that described region is corresponding;
Sending module, described harassing and wrecking address base for getting sends to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has the advantage that
The technical scheme that the embodiment of the present invention provides is by being saved in the harassing and wrecking comprised in harassing and wrecking address base address in local communication record as the newly-increased communication mode of designated contact, and arranges harassing and wrecking identification (RFID) tag for each harassing and wrecking address and/or arrange harassing and wrecking identification (RFID) tag for described designated contact;Make when mobile communication terminal has communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as then directly adopting existing communications access to present mechanism just to obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking identification (RFID) tag, solve prior art to obtain caller ID for IOS system APP and can not electric interface represents the problem harassing information warning, and owing to harassing and wrecking address is directly saved in local address book by the embodiment of the present invention, decrease of the prior art need to harassing call number storehouse carry out inquiry comparison process, accelerate the recognition speed of harassing and wrecking communication.It addition, the technical scheme that the embodiment of the present invention provides is applicable not only to be applicable to the equipment of IOS system, could be applicable to other operating system equipment, such as android system equipment.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, and can be practiced according to the content of description, below with presently preferred embodiments of the present invention and coordinateAccompanying drawingDescribe in detail as after.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit those of ordinary skill in the art be will be clear from understanding.Accompanying drawingOnly for illustrating the purpose of preferred implementation, and it is not considered as limitation of the present invention.And wholeIn accompanying drawing, it is denoted by the same reference numerals identical parts.?In accompanying drawing:
Fig. 1Illustrate that the flow process signal of the first realization of the method for communication is harassed in the mobile communication terminal identification that the embodiment of the present invention one providesFigure
Fig. 2Illustrate the example of the harassing and wrecking identification (RFID) tag arranged in the method that the mobile communication terminal identification harassing and wrecking that the embodiment of the present invention one provides communicate for each described harassing and wrecking address and designated contactFigure
Fig. 3Illustrate that in the method that the mobile communication terminal identification harassing and wrecking that the embodiment of the present invention one provides communicate, incoming call accesses the example pointing out the page when communications access is incoming call accessFigure
Fig. 4Illustrate that the flow process signal that the second of the method for communication realizes is harassed in the mobile communication terminal identification that the embodiment of the present invention one providesFigure
Fig. 5Illustrate that the flow process signal of the method for communication is harassed in the mobile communication terminal identification that the embodiment of the present invention two providesFigure
Fig. 6Illustrate that the flow process signal of the method for communication is harassed in the mobile communication terminal identification that the embodiment of the present invention three providesFigure
Fig. 7Illustrate the structural representation of the mobile communication terminal that the embodiment of the present invention four providesFigure
Fig. 8Illustrate the structural representation of the network equipment that the embodiment of the present invention five providesFigure
Fig. 9Illustrate the structural representation of the communication system that the embodiment of the present invention six providesFigure
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with in the embodiment of the present inventionAccompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Such as Fig. 1Shown in, the flow process signal of the method for the mobile communication terminal identification harassing and wrecking communication that the embodiment of the present invention one providesFigure.The executive agent of the described method that the present embodiment provides is mobile communication terminal.Described mobile communication terminal can be the mobile communication terminal being provided with IOS of not escaping from prison.Concrete, the described method that the present embodiment provides includes:
Step 101, mobile communication terminal obtain harassing and wrecking address base.
Wherein, described harassing and wrecking address base can obtain from network equipment.This network equipment can be cloud server.Namely mobile communication terminal can download described harassing and wrecking address base by wired or wireless network from network equipment.Such as, mobile communication terminal can download described harassing and wrecking address base by 2G, 3G and 4G network from network equipment;Access in the Internet also by LAN access waies such as Wi-Fi to realize downloading described harassing and wrecking address from network equipment;Internet can also be accessed by wired mode to realize downloading described harassing and wrecking address from network equipment.Certainly, it is also feasible that mobile communication terminal obtains the mode of the described harassing and wrecking address base being loaded in down in computing equipment by carrying out the mode of data syn-chronization with computing equipment, wherein, described computing equipment first passes through network and downloads described harassing and wrecking address base from network equipment.
In the present embodiment, mobile communication terminal can be adopted and download described harassing and wrecking address base from described network equipment with the following method, and the method includes:
First, mobile communication terminal can send, to network equipment, the request of download by client end interface.
Wherein, this download request carries the mark of mobile communication terminal.
Then, described network equipment can download request according to described, sends harassing and wrecking address base to mobile communication terminal.
Step 102, at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book as the newly-increased communication mode of designated contact.
Wherein, described designated contact can be one, it is also possible to is multiple.When designated contact is one, all harassing and wrecking addresses comprised in described harassing and wrecking address base can all be added in this designated contact.When designated contact is multiple, the all harassing and wrecking addresses comprised in harassing and wrecking address base can be divided by mobile communication terminal, to obtain the harassing and wrecking group of addresses identical with described designated contact quantity, then, each harassing and wrecking group of addresses is added in the designated contact of correspondence.
Need exist for illustrating: the described designated contact in the present embodiment can be newly-built contact person, it is also possible to be existing contact person in local communication record.Namely the described method that this enforcement provides, may also include the steps of:
Creating new contact person in described local address book, described new contact person is as described designated contact;Or
Specify in described local address book existing contact person as described designated contact.
In actual use, the setting that the network address in local communication record is carried out harassing and wrecking identification (RFID) tag that user may be autonomous.Now, namely above-mentioned appointed existing contact person can be marked the contact person of harassing and wrecking identification (RFID) tag by user, or includes the contact person of the network address that be marked harassing and wrecking identification (RFID) tag by user.
Step 103, harassing and wrecking identification (RFID) tag is set for the described harassing and wrecking address that has been saved in the communication mode of described designated contact and/or harassing and wrecking identification (RFID) tag is set for described designated contact.
Wherein, the harassing and wrecking identification (RFID) tag arranged for described designated contact can beFigureSheet or word etc..Such as, the harassing and wrecking identification (RFID) tag arranged for described designated contact can be harassing and wrecking marking head picture and/or harassing and wrecking mark title.Fig. 2Shown in, arrange for described designated contactSuch as Fig. 2Shown harassing and wrecking marking head picture, and harassing and wrecking mark title " harassing and wrecking contact person ", as long as so caller ID is the harassing and wrecking address comprised in this designated contact, mobile communication terminal is while display harassing and wrecking address and harassing and wrecking identification (RFID) tag, also show harassing and wrecking marking head picture, think that mobile communication terminal user provides significant suggesting effect.Assume insurance financing 1 incoming call,Such as Fig. 3Shown in, the incoming call access prompting page presents harassing and wrecking marking head picture simultaneously, contact person harasses mark title " harassing and wrecking contact person " and harasses the harassing and wrecking identification (RFID) tag " insurance financing 1 " of address.
Same, the harassing and wrecking tag identifier arranged for described harassing and wrecking address can also beFigureSheet or word etc..In actual applications, in described harassing and wrecking address base except including harassing and wrecking address, the harassing and wrecking labelling that each harassing and wrecking address is corresponding can also be included.The harassing and wrecking that respectively harassing and wrecking address is corresponding are labeled as " insurance financing ", " house property medium ", " ad promotions ", " express delivery food delivery ", " harassing call ", " ringing a sound " and " fraudulent call " etc..Thus, the address of harassing added in designated contact can be carried out the setting of harassing and wrecking identification (RFID) tag according to the harassing and wrecking labelling that each harassing and wrecking address is corresponding by mobile communication terminal.Such as, the type of harassing and wrecking address is " ringing a sound ", then mobile communication terminal can be the harassing and wrecking identification (RFID) tag that this harassing and wrecking address arranges " ringing a sound ".Therefore, corresponding above-mentioned all types of, mobile communication terminal is that the harassing and wrecking identification (RFID) tag that each harassing and wrecking address is arranged may is that " insurance financing ", " house property medium ", " ad promotions ", " express delivery food delivery ", " harassing call ", " ringing a sound " and " fraudulent call " etc..
For common phone, its phone label may is that " house ", " work ", " iPhone ", " mobile phone ", " mainly ", " house fax ", " work fax " and " call " etc..
Wherein, in actual applications, the harassing and wrecking identification (RFID) tag arranged for each described harassing and wrecking address can all differ.Such as,Such as Fig. 2Shown in, in harassing and wrecking identification (RFID) tag, add numerical character, such as " insurance financing 1 ", " insurance financing 2 ", " insurance financing 3 " etc..
Step 104, when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
Concrete, when described communications access accesses for incoming call, the network address of described communications access initiator is IP telephone numbers, Mobile Directory Number or fixed telephone number.
When described communications access is note or internet message accesses, the network address of described communications access initiator is Mobile Directory Number, mailbox user name or SMS platform number.
Described present described harassing and wrecking identification (RFID) tag, can particularly as follows: point out in communications access and the page present described harassing and wrecking identification (RFID) tag.
When described communications access accesses for incoming call, described prompting in communications access presents described harassing and wrecking identification (RFID) tag on the page, particularly as follows:
Access at incoming call and the prompting page presents described harassing and wrecking identification (RFID) tag, and hang up for responding user and connect the manipulation key that described incoming call accesses.
Such as Fig. 3Shown in, access at incoming call and the prompting page presents harassing and wrecking marking head picture, contact person simultaneously harass mark title " harassing and wrecking contact person ", the harassing and wrecking identification (RFID) tag " insurance financing 1 " of harassing and wrecking address;And the manipulation key that described incoming call accesses, " refusal " manipulation key and " answering " manipulation key is hung up and connects for relative users.Certainly, the incoming call access prompting page also presents " reminding me " manipulation key and " information " manipulates key.
The technical scheme that the present embodiment provides is by being saved in the harassing and wrecking comprised in harassing and wrecking address base address in local communication record as the newly-increased communication mode of designated contact, and arranges harassing and wrecking identification (RFID) tag for each harassing and wrecking address and/or arrange harassing and wrecking identification (RFID) tag for described designated contact;Make when mobile communication terminal has communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as then directly adopting existing communications access to present mechanism just to obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking identification (RFID) tag, solve prior art to obtain caller ID for IOS system APP and can not electric interface represents the problem harassing information warning, and owing to harassing and wrecking address is directly saved in local address book by the present embodiment, decrease of the prior art need to harassing call number storehouse carry out inquiry comparison process, accelerate the recognition speed of harassing and wrecking communication.It addition, the technical scheme that the present embodiment provides is applicable not only to be applicable to the equipment of IOS system, could be applicable to other operating system equipment, such as android system equipment.
It practice, harassing and wrecking address date very huge of storage in harassing and wrecking address base on network equipment.If all harassing and wrecking addresses in the harassing and wrecking address base downloaded from network equipment are all added in local address book by mobile communication terminal, the memory space that mobile communication terminal is very big can be taken, also have the normal of the address list affecting mobile communication terminal to be suitable for, cause opening of address list to become very slow.For solving the problems referred to above, the inventors found that the mobile communication terminal in harassing and wrecking region belonging to it only can be removed in the great majority harassing and wrecking address in harassing and wrecking address base.Such as, ad promotions phone only can be made service area at Pekinese's mobile communication terminal by certain Beijing ad promotions company;Harassing call only can be made the mobile communication terminal in region, house property medium place by house property medium company, etc..Therefore, the harassing and wrecking address belonging to a region together just according to region belonging to harassing and wrecking address, can be placed in a harassing and wrecking address base by network equipment side.It is just passable that such mobile communication terminal only can obtain harassing and wrecking address base corresponding to its region, place from network equipment.NamelySuch as Fig. 4Shown in, before in the described method that above-described embodiment provides, step 101, mobile communication terminal obtain harassing and wrecking address base, may also include that
Step 105, described mobile communication terminal upload the positional information of present position to described network equipment, so that described network equipment is according to described positional information, determine that mobile communication terminal is currently located region, and the download service of harassing and wrecking address base corresponding to described region is provided for described mobile communication terminal.
Wherein, but the IP address of positional information mobile communication terminal or GPS information.Region can be determined according to the service zoning that mobile supplier provides, as divided by provinces and cities.
Namely in the present embodiment, step 101, mobile communication terminal obtain harassing and wrecking address base, particularly as follows:
Step 101 ', described mobile communication terminal by wired or wireless network from network equipment download described harassing and wrecking address base.
Further, the method that above-described embodiment provides, may also include that
Prefix and/or suffix is added for described harassing and wrecking address;
Wherein, described prefix and/or suffix meet described harassing and wrecking address and can be identified by the system of described mobile communication terminal., stating prefix can beCountryCode;Described suffix can be ";”.Such as, during described prefix can beCountry of stateCode " 86 ".
The telephone number that this step is write does special format analysis processing, add prefix character " 86 " and suffix character ";", it is identified by operating system normally that neither affect mobile communication terminal, can evade again the friend recommendation that some social softwares are undertaken by telephone number.
Further, when the harassing and wrecking address comprised in described designated contact is two or more, step 102 in above-described embodiment, described using at least one the harassing and wrecking address comprised in described harassing and wrecking address base as after the newly-increased communication mode of designated contact is saved in local address book, may also include that
According to the ordering rule set, the plural harassing and wrecking address comprised in described designated contact is ranked up.
Accordingly, harassing and wrecking identification (RFID) tag is set for the described harassing and wrecking address being saved in the communication mode of described designated contact, including:
According to the clooating sequence of the plural harassing and wrecking address comprised in described designated contact, the harassing and wrecking identification (RFID) tag including the numerical character corresponding with described clooating sequence is sequentially set for each harassing and wrecking address.Such as Fig. 2Shown in, " insurance financing 1 ", " insurance financing 2 " ... " insurance financing 6 ".
Such as Fig. 5Shown in, the flow process signal of the method for the mobile communication terminal identification harassing and wrecking communication that the embodiment of the present invention two providesFigure.The executive agent of the described method that the present embodiment provides is network equipment, and this network equipment can be cloud device.Concrete, the method for the present embodiment two offer, including:
Step 201, the network equipment region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding.
Needing exist for supplementing: for the performance of not influential system, do not give the address book function of system itself with the negative effect on using, what each region was corresponding harass the harassing and wrecking address comprised in address base can set that a higher limit.Such as, the harassing and wrecking address base that this region is corresponding only comprises the harassing and wrecking address of this harassing and wrecking address, region ranking Top1000.Being learnt by actual experiment, harassing and wrecking address base comprises the harassing and wrecking address of Top1000, identifies that coverage rate can reach 30%~40%.
The download request that step 202, reception mobile communication terminal send, described download in request carries the positional information that described mobile communication terminal is currently located.
Wherein, described positional information is can be IP address or the GPS information of mobile communication terminal.
Step 203, according to described positional information, it is determined that the region that described mobile communication terminal is presently in.
Concrete, network equipment according to IP address and region synopsis, can determine the region that the IP address of mobile communication terminal is corresponding.Such as, IP address is that 211.136.24.23 passes through inquiry can to obtain this region corresponding to IP address be Beijing.Network equipment according to the actual geographic position, GPS information place of mobile communication terminal, can determine the region of mobile communication terminal.
Step 204, according to described region, obtain the described harassing and wrecking address base that described region is corresponding.
Step 205, the described harassing and wrecking address base transmission extremely described mobile communication terminal that will get, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
In the technical scheme that the present embodiment provides, network equipment is by dividing harassing and wrecking address according to affiliated region, obtains the harassing and wrecking address base that each region is corresponding, can effectively reduce mobile communication terminal and download the size of harassing and wrecking address base;In addition, the technical scheme that the present embodiment provides is by being saved in the harassing and wrecking comprised in harassing and wrecking address base address in local communication record as the newly-increased communication mode of designated contact, and arranges harassing and wrecking identification (RFID) tag for each harassing and wrecking address and/or arrange harassing and wrecking identification (RFID) tag for described designated contact;Make when mobile communication terminal has communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as then directly adopting existing communications access to present mechanism just to obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking identification (RFID) tag, solve prior art to obtain caller ID for IOS system APP and can not electric interface represents the problem harassing information warning, and owing to harassing and wrecking address is directly saved in local address book by the present embodiment, decrease of the prior art need to harassing call number storehouse carry out inquiry comparison process, accelerate the recognition speed of harassing and wrecking communication.It addition, the technical scheme that the present embodiment provides is applicable not only to be applicable to the equipment of IOS system, could be applicable to other operating system equipment, such as android system equipment.
Further, the method that above-described embodiment provides may also include the steps of:
Adopt the Data Analysis Model preset that the network address in data base is carried out data analysis, it is determined that to go out to harass address.
Concrete, when described communications access accesses for incoming call, the network address of described communications access initiator is IP telephone numbers, Mobile Directory Number or fixed telephone number.
When described communications access is note or internet message accesses, the network address of described communications access initiator is Mobile Directory Number, mailbox user name or SMS platform number.
Due in network equipment, such as cloud device, it is possible to storage has substantial amounts of data.These big data include the network address of reporting of user, also has network address that network equipment got by client application etc..In these network address, some is harassing and wrecking addresses, and some is probably and is designated as harassing and wrecking address by mistake, and some is likely to be exactly some common network address.Therefore, network equipment need to adopt corresponding technology to analyze harassing and wrecking address in big data.
Further, the method that above-described embodiment provides may also include the steps of:
Address feature according to the communications access record and/or described harassing and wrecking address of harassing address, it is determined that the region belonging to each harassing call.
Wherein, network equipment can according to the address feature of harassing and wrecking address, it is determined that the region belonging to each harassing call.Such as, 130-4249-****, its affiliated region can be identified according to number segment 130-4249.Base number can be identified according to area code.
And for the harassing and wrecking address that some cannot identify according to number itself, as 400-*** can adopt other mode to identify, i.e. the communications access record according to harassing and wrecking address, determine the region belonging to each harassing call.Such as, according to the communications access record of 400-***, the region belonging to the object of its communications access record can be analyzed, determines the region belonging to 400-***.It is assumed that the object number 60% that 400-*** dials away is all at Pekinese's number, the region of this 400-*** can be delimited as Beijing.
Such as Fig. 6Shown in, the flow process signal of the method for the mobile communication terminal identification harassing and wrecking communication that the embodiment of the present invention three providesFigure.Technical scheme provided by the invention, for cloud device and mobile communication terminal, is illustrated by the present embodiment three.Concrete, the described method of the present embodiment three offer, including:
Step 301, cloud device determine the region respectively harassed in data base belonging to address.
When specific embodiment, cloud device can first pass through the big aggregation of data analysis in high in the clouds and identify harassing and wrecking address, then further according to the address feature of the communications access record of harassing and wrecking address and/or described harassing and wrecking address, it is determined that the region belonging to each harassing call.
Step 302, the cloud device region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding.
Step 303, cloud device receive the download request that mobile communication terminal sends.
Wherein, described download in request carries the positional information that described mobile communication terminal is currently located.
Step 304, cloud device are according to described positional information, it is determined that the region that described mobile communication terminal is presently in.
Step 305, cloud device, according to described region, obtain the described harassing and wrecking address base that described region is corresponding, and send the described harassing and wrecking address base got to described mobile communication terminal.
At least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by step 306, mobile communication terminal as the newly-increased communication mode of designated contact.
Step 307, mobile communication terminal are that the described harassing and wrecking address being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact.
Step 308, when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, then mobile terminal equipment obtains harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harasses the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presents described harassing and wrecking identification (RFID) tag.
Implementing of each step in the present embodiment referring to the related content in above-described embodiment one and embodiment two, no longer can repeat herein.
It should be understood that for aforesaid each embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, embodiment described in this description belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
Such as Fig. 7Shown in, the structural representation of the mobile communication terminal that the embodiment of the present invention four providesFigure.The described mobile communication terminal that the present embodiment provides can realize the described method that above-described embodiment one provides.Concrete, the described mobile communication terminal of the present embodiment four offer, including:
Acquisition module 11, is used for obtaining harassing and wrecking address base;
Preserve module 12, for being saved in local address book as the newly-increased communication mode of designated contact at least one the harassing and wrecking address comprised in described harassing and wrecking address base;
Module 13 is set, harassing and wrecking identification (RFID) tag is set for the described harassing and wrecking address for being saved in the communication mode of described designated contact and/or harassing and wrecking identification (RFID) tag is set for described designated contact;
First processing module 14, for when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
The technical scheme that the present embodiment provides is by being saved in the harassing and wrecking comprised in harassing and wrecking address base address in local communication record as the newly-increased communication mode of designated contact, and arranges harassing and wrecking identification (RFID) tag for each harassing and wrecking address and/or arrange harassing and wrecking identification (RFID) tag for described designated contact;Make when mobile communication terminal has communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as then directly adopting existing communications access to present mechanism just to obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking identification (RFID) tag, solve prior art to obtain caller ID for IOS system APP and can not electric interface represents the problem harassing information warning, and owing to harassing and wrecking address is directly saved in local address book by the present embodiment, decrease of the prior art need to harassing call number storehouse carry out inquiry comparison process, accelerate the recognition speed of harassing and wrecking communication.It addition, the technical scheme that the present embodiment provides is applicable not only to be applicable to the equipment of IOS system, could be applicable to other operating system equipment, such as android system equipment.
Further, the described mobile communication terminal that the present embodiment provides may also include that
Second processing module, for creating new contact person in described local address book, described new contact person is as described designated contact;Or specify in described local address book existing contact person as described designated contact.
Further, the acquisition module described in the present embodiment, it may include: download unit.Wherein, download unit, for downloading described harassing and wrecking address base by wired or wireless network from network equipment.
Further, above-mentioned acquisition module, may also include that uploading unit.Wherein, uploading unit, for uploading the positional information of present position to described network equipment, so that described network equipment is according to described positional information, determine that mobile communication terminal is currently located region, and the download service of harassing and wrecking address base corresponding to described region is provided for described mobile communication terminal.
Further, in the described mobile communication terminal that the present embodiment provides, the described module that arranges specifically for arranging harassing and wrecking marking head picture and/or harassing and wrecking identification name title for described designated contact.
Further, the described mobile communication terminal that the present embodiment provides, may also include that interpolation module.Wherein, add module, for adding prefix and/or suffix for described harassing and wrecking address.Described prefix and/or suffix meet described harassing and wrecking address and can be identified by the system of described mobile communication terminal.
Further, when the harassing and wrecking address comprised in described designated contact is two or more, described mobile communication terminal also includes:
Order module, for according to the ordering rule set, being ranked up the plural harassing and wrecking address comprised in described designated contact.
Further, the present embodiment arranges module, specifically for the clooating sequence according to the plural harassing and wrecking address comprised in described designated contact, the harassing and wrecking identification (RFID) tag including the numerical character corresponding with described clooating sequence is sequentially set for each harassing and wrecking address.
Such as Fig. 8Shown in, the structural representation of the network equipment that the embodiment of the present invention five providesFigure.The network equipment that the present embodiment provides can realize the described method that above-described embodiment two provides.Described network equipment in the present embodiment can be specially cloud device.The network equipment that the present embodiment provides includes:
Grouping module 21, for the region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiver module 22, for receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
First determines module 23, for according to described positional information, it is determined that the region that described mobile communication terminal is presently in;
Acquisition module 24, for according to described region, obtaining the described harassing and wrecking address base that described region is corresponding;
Sending module 25, described harassing and wrecking address base for getting sends to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
In the technical scheme that the present embodiment provides, network equipment is by dividing harassing and wrecking address according to affiliated region, obtains the harassing and wrecking address base that each region is corresponding, can effectively reduce mobile communication terminal and download the size of harassing and wrecking address base;In addition, the technical scheme that the present embodiment provides is by being saved in the harassing and wrecking comprised in harassing and wrecking address base address in local communication record as the newly-increased communication mode of designated contact, and arranges harassing and wrecking identification (RFID) tag for each harassing and wrecking address and/or arrange harassing and wrecking identification (RFID) tag for described designated contact;Make when mobile communication terminal has communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as then directly adopting existing communications access to present mechanism just to obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address from described local address book and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking identification (RFID) tag, solve prior art to obtain caller ID for IOS system APP and can not electric interface represents the problem harassing information warning, and owing to harassing and wrecking address is directly saved in local address book by the present embodiment, decrease of the prior art need to harassing call number storehouse carry out inquiry comparison process, accelerate the recognition speed of harassing and wrecking communication.It addition, the technical scheme that the present embodiment provides is applicable not only to be applicable to the equipment of IOS system, could be applicable to other operating system equipment, such as android system equipment.
Further, the network equipment that the present embodiment provides, may also include that
Analysis module, for adopting default Data Analysis Model that telephone number in telephone number storehouse is carried out data analysis, it is determined that go out to harass address.
Further, the network equipment that the present embodiment provides, may also include that
Second determines module, for the address feature of the communications access record according to harassing and wrecking address and/or described harassing and wrecking address, it is determined that the region belonging to each harassing call.
Such as Fig. 9Shown in, the structural representation of the communication system that the embodiment of the present invention six providesFigure.The described communication system that the present embodiment provides includes: mobile communication terminal 100 and network equipment 200.Wherein, described network equipment can be cloud device.
Described mobile communication terminal 100 is used for:
Obtain harassing and wrecking address base;
At least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book as the newly-increased communication mode of designated contact;
Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
Described network equipment 200 is used for:
According to the region belonging to harassing and wrecking address, harassing and wrecking address identical for region is classified as one group, obtains the harassing and wrecking address base that each region is corresponding;
Receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
According to described positional information, it is determined that the region that described mobile communication terminal is presently in;
According to described region, obtain the described harassing and wrecking address base that described region is corresponding;
The described harassing and wrecking address base got is sent to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
Need exist for illustrating: the structure that the mobile communication terminal that the present embodiment six provides can adopt above-described embodiment four to provide realizes, and concrete implementation referring to the corresponding contents in above-described embodiment four, can repeat no more herein.The network equipment that the present embodiment six provides can adopt the structure realization that above-described embodiment five provides, concrete implementation can referring to the corresponding contents in above-described embodiment five, same, also repeat no more herein.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, certain embodiment there is no the part described in detail, it is possible to referring to the associated description of other embodiments.
It is understood that the correlated characteristic in said method and switch can reference mutually.It addition, " first ", " second " in above-described embodiment etc. is for distinguishing each embodiment, and do not represent the quality of each embodiment.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description, the specific works process of device and unit, it is possible to reference to the corresponding process in preceding method embodiment, do not repeat them here.
Not intrinsic to any certain computer, virtual system or miscellaneous equipment relevant in algorithm and the display of this offer.Various general-purpose systems can also with use based on together with this teaching.As described above, the structure constructed required by this kind of system is apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to utilize various programming language to realize the content of invention described herein, and the description above language-specific done is the preferred forms in order to disclose the present invention.
In description mentioned herein, describe a large amount of detail.It is to be appreciated, however, that embodiments of the invention can be put into practice when not having these details.In some instances, known method, structure and technology it are not shown specifically, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to what simplify that the disclosure helping understands in each inventive aspect, herein above in the description of the exemplary embodiment of the present invention, each feature of the present invention be sometimes grouped together into single embodiment,Figure, or descriptions thereof in.But, the method for the disclosure should be construed to the following meaning of reflectionFigure: namely the present invention for required protection requires feature more more than the feature being expressly recited in each claim.More precisely, as the following claims reflect, inventive aspect is in that all features less than single embodiment disclosed above.Therefore, it then follows claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, wherein each claim itself as the independent embodiment of the present invention.
Those skilled in the art are appreciated that, it is possible to carry out the module in the equipment in embodiment adaptively changing and they being arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit excludes each other, it is possible to adopt any combination to this specification (include adjoint claim, summary andAccompanying drawing) disclosed in all features and all processes or the unit of so disclosed any method or equipment be combined.Unless expressly stated otherwise, this specification (include adjoint claim, summary andAccompanying drawing) disclosed in each feature can be replaced by the alternative features providing identical, equivalent or similar purpose.
In addition, those skilled in the art it will be appreciated that, although embodiments more described herein include some feature included in other embodiments rather than further feature, but the combination of the feature of different embodiment means to be within the scope of the present invention and form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or realizes with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that some in the device (i.e. mobile communication terminal in embodiment four and the network equipment in embodiment five) that microprocessor or digital signal processor (DSP) can be used in practice to realize providing according to embodiments of the present invention or completePortion of portionThe some or all functions of part.The present invention is also implemented as part or all the equipment for performing method as described herein or device program (such as, computer program and computer program).The program of such present invention of realization can store on a computer-readable medium, or can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment without departing from the scope of the appended claims.In the claims, any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not exclude the presence of the element or step not arranged in the claims.Word "a" or "an" before being positioned at element does not exclude the presence of multiple such element.The present invention by means of including the hardware of some different elements and can realize by means of properly programmed computer.In the unit claim listing some devices, several in these devices can be through same hardware branch and specifically embody.Word first, second and third use do not indicate that any order.Can be title by these word explanations.
The method that the invention discloses A1, a kind of mobile communication terminal identification harassing and wrecking communication, including:
Mobile communication terminal obtains harassing and wrecking address base;
At least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book as the newly-increased communication mode of designated contact;
Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
A2, method as described in A1, also include:
Creating new contact person in described local address book, described new contact person is as described designated contact;Or
Specify in described local address book existing contact person as described designated contact.
A3, method as described in A1, wherein,
When described communications access accesses for incoming call, the network address of described communications access initiator is IP telephone numbers, Mobile Directory Number or fixed telephone number;
When described communications access is note or internet message accesses, the network address of described communications access initiator is Mobile Directory Number, mailbox user name or SMS platform number.
A4, method as described in A1, described in present described harassing and wrecking identification (RFID) tag, particularly as follows:
Point out in communications access and the page presents described harassing and wrecking identification (RFID) tag.
A5, method as described in A4, wherein,
When described communications access accesses for incoming call, described prompting in communications access presents described harassing and wrecking identification (RFID) tag on the page, particularly as follows:
Access at incoming call and the prompting page presents described harassing and wrecking identification (RFID) tag, and hang up for responding user and connect the manipulation key that described incoming call accesses.
A6, method as described in A1, wherein, described mobile communication terminal is the mobile communication terminal being provided with IOS of not escaping from prison.
A7, method as according to any one of A1~A6, wherein, described mobile communication terminal obtains harassing and wrecking address base, including:
Described mobile communication terminal downloads described harassing and wrecking address base by wired or wireless network from network equipment.
A8, method as described in A7, wherein, described mobile communication terminal by wired or wireless network from before network equipment downloads described harassing and wrecking address base, also including:
Described mobile communication terminal uploads the positional information of present position to described network equipment, so that described network equipment is according to described positional information, determine that mobile communication terminal is currently located region, and the download service of harassing and wrecking address base corresponding to described region is provided for described mobile communication terminal.
A9, method as according to any one of A1~A6, wherein, described arrange harassing and wrecking identification (RFID) tag for described designated contact, particularly as follows:
Harassing and wrecking marking head picture and/or harassing and wrecking mark title are set for described designated contact.
A10, method as according to any one of A1~A6, also include:
Prefix and/or suffix is added for described harassing and wrecking address;
Wherein, described prefix and/or suffix meet described harassing and wrecking address and can be identified by the system of described mobile communication terminal.
A11, method as described in A10, wherein, described prefix isCountryCode;Described suffix be ";”.
A12, method as according to any one of A1~A6, wherein, if the described harassing and wrecking address being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag, then the harassing and wrecking identification (RFID) tag arranged for each described harassing and wrecking address all differs.
A13, method as according to any one of A1~A6, wherein, when the harassing and wrecking address comprised in described designated contact is two or more, described using at least one the harassing and wrecking address comprised in described harassing and wrecking address base as after the newly-increased communication mode of designated contact is saved in local address book, also including:
According to the ordering rule set, the plural harassing and wrecking address comprised in described designated contact is ranked up.
A14, method as described in A13, wherein, the described described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag, including:
According to the clooating sequence of the plural harassing and wrecking address comprised in described designated contact, the harassing and wrecking identification (RFID) tag including the numerical character corresponding with described clooating sequence is sequentially set for each harassing and wrecking address.
The method that the invention also discloses B15, a kind of mobile communication terminal identification harassing and wrecking communication, including:
Network equipment region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
According to described positional information, it is determined that the region that described mobile communication terminal is presently in;
According to described region, obtain the described harassing and wrecking address base that described region is corresponding;
The described harassing and wrecking address base got is sent to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
B16, method as described in B15, also include:
Adopt the Data Analysis Model preset that the network address in data base is carried out data analysis, it is determined that to go out to harass address.
B17, method as described in B15 or B16, also include:
Address feature according to the communications access record and/or described harassing and wrecking address of harassing address, it is determined that the region belonging to each harassing call.
The invention also discloses C18, a kind of mobile communication terminal, including:
Acquisition module, is used for obtaining harassing and wrecking address base;
Preserve module, for being saved in local address book as the newly-increased communication mode of designated contact at least one the harassing and wrecking address comprised in described harassing and wrecking address base;
Module is set, harassing and wrecking identification (RFID) tag is set for the described harassing and wrecking address for being saved in the communication mode of described designated contact and/or harassing and wrecking identification (RFID) tag is set for described designated contact;
First processing module, for when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
C19, mobile communication terminal as described in C18, also include:
Second processing module, for creating new contact person in described local address book, described new contact person is as described designated contact;Or specify in described local address book existing contact person as described designated contact.
C20, mobile communication terminal as described in C18 or C19, described acquisition module, including:
Download unit, for downloading described harassing and wrecking address base by wired or wireless network from network equipment.
C21, mobile communication terminal as described in C20, described acquisition module, also include:
Uploading unit, for uploading the positional information of present position to described network equipment, so that described network equipment is according to described positional information, it is determined that mobile communication terminal is currently located region, and provide the download service of harassing and wrecking address base corresponding to described region for described mobile communication terminal.
C22, mobile communication terminal as described in C18 or C19, wherein, described arrange module, specifically for arranging harassing and wrecking marking head picture and/or harassing and wrecking identification name title for described designated contact.
C23, mobile communication terminal as described in C18 or C19, also include:
Add module, for adding prefix and/or suffix for described harassing and wrecking address;
Wherein, described prefix and/or suffix meet described harassing and wrecking address and can be identified by the system of described mobile communication terminal.
C24, mobile communication terminal as described in C18 or C19, when the harassing and wrecking address comprised in described designated contact is two or more, described mobile communication terminal also includes:
Order module, for according to the ordering rule set, being ranked up the plural harassing and wrecking address comprised in described designated contact.
C25, mobile communication terminal as described in C24, described module is set, specifically for the clooating sequence according to the plural harassing and wrecking address comprised in described designated contact, the harassing and wrecking identification (RFID) tag including the numerical character corresponding with described clooating sequence is sequentially set for each harassing and wrecking address.
The invention also discloses D26, a kind of network equipment, including:
Grouping module, for the region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiver module, for receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
First determines module, for according to described positional information, it is determined that the region that described mobile communication terminal is presently in;
Acquisition module, for according to described region, obtaining the described harassing and wrecking address base that described region is corresponding;
Sending module, described harassing and wrecking address base for getting sends to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
D27, network equipment as described in D26, also include:
Analysis module, for adopting default Data Analysis Model that telephone number in telephone number storehouse is carried out data analysis, it is determined that go out to harass address.
D28, network equipment as described in D26 or D27, also include:
Second determines module, for the address feature of the communications access record according to harassing and wrecking address and/or described harassing and wrecking address, it is determined that the region belonging to each harassing call.
The invention also discloses E29, a kind of communication system, including:
The above-mentioned mobile communication terminal according to any one of C18~C25;And
The above-mentioned network equipment according to any one of E26~E28.

Claims (10)

1. the method for a mobile communication terminal identification harassing and wrecking communication, it is characterised in that including:
Mobile communication terminal obtains harassing and wrecking address base;
At least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book as the newly-increased communication mode of designated contact;
Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;
When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
2. method according to claim 1, it is characterised in that also include:
Creating new contact person in described local address book, described new contact person is as described designated contact;Or
Specify in described local address book existing contact person as described designated contact.
3. method according to claim 1, it is characterised in that described in present described harassing and wrecking identification (RFID) tag, particularly as follows:
Point out in communications access and the page presents described harassing and wrecking identification (RFID) tag.
4. the method for a mobile communication terminal identification harassing and wrecking communication, it is characterised in that including:
Network equipment region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
According to described positional information, it is determined that the region that described mobile communication terminal is presently in;
According to described region, obtain the described harassing and wrecking address base that described region is corresponding;
The described harassing and wrecking address base got is sent to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
5. method according to claim 4, it is characterised in that also include:
Address feature according to the communications access record and/or described harassing and wrecking address of harassing address, it is determined that the region belonging to each harassing call.
6. a mobile communication terminal, it is characterised in that including:
Acquisition module, is used for obtaining harassing and wrecking address base;
Preserve module, for being saved in local address book as the newly-increased communication mode of designated contact at least one the harassing and wrecking address comprised in described harassing and wrecking address base;
Module is set, harassing and wrecking identification (RFID) tag is set for the described harassing and wrecking address for being saved in the communication mode of described designated contact and/or harassing and wrecking identification (RFID) tag is set for described designated contact;
First processing module, for when there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
7. mobile communication terminal according to claim 6, it is characterised in that also include:
Second processing module, for creating new contact person in described local address book, described new contact person is as described designated contact;Or specify in described local address book existing contact person as described designated contact.
8. a network equipment, it is characterised in that including:
Grouping module, for the region belonging to harassing and wrecking address, is classified as one group by harassing and wrecking address identical for region, obtains the harassing and wrecking address base that each region is corresponding;
Receiver module, for receiving the download request that mobile communication terminal sends, described download in request carries the positional information that described mobile communication terminal is currently located;
First determines module, for according to described positional information, it is determined that the region that described mobile communication terminal is presently in;
Acquisition module, for according to described region, obtaining the described harassing and wrecking address base that described region is corresponding;
Sending module, described harassing and wrecking address base for getting sends to described mobile communication terminal, so that at least one the harassing and wrecking address comprised in described harassing and wrecking address base is saved in local address book by described mobile communication terminal as the newly-increased communication mode of designated contact;Described harassing and wrecking address for being saved in the communication mode of described designated contact arranges harassing and wrecking identification (RFID) tag and/or arranges harassing and wrecking identification (RFID) tag for described designated contact;When there being communications access, if the network address of communications access initiator is the harassing and wrecking address in described harassing and wrecking address base, from described local address book, then obtain harassing and wrecking identification (RFID) tag corresponding to described harassing and wrecking address and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and presenting described harassing and wrecking identification (RFID) tag.
9. network equipment according to claim 8, it is characterised in that also include:
Second determines module, for the address feature of the communications access record according to harassing and wrecking address and/or described harassing and wrecking address, it is determined that the region belonging to each harassing call.
10. a communication system, it is characterised in that including:
Mobile communication terminal described in the claims 6 or 7;And
Network equipment described in the claims 8 or 9.
CN201410746562.0A 2014-12-08 2014-12-08 Method, device and system for mobile communication terminal to identify harassing communication Pending CN105744525A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410746562.0A CN105744525A (en) 2014-12-08 2014-12-08 Method, device and system for mobile communication terminal to identify harassing communication
PCT/CN2015/095597 WO2016091074A1 (en) 2014-12-08 2015-11-26 Method, device and system for identifying harassment communications via mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410746562.0A CN105744525A (en) 2014-12-08 2014-12-08 Method, device and system for mobile communication terminal to identify harassing communication

Publications (1)

Publication Number Publication Date
CN105744525A true CN105744525A (en) 2016-07-06

Family

ID=56106675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410746562.0A Pending CN105744525A (en) 2014-12-08 2014-12-08 Method, device and system for mobile communication terminal to identify harassing communication

Country Status (2)

Country Link
CN (1) CN105744525A (en)
WO (1) WO2016091074A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881647A (en) * 2018-06-07 2018-11-23 麒麟合盛网络技术股份有限公司 The method and apparatus for determining number characteristic information, showing number characteristic information
CN110677821A (en) * 2019-10-17 2020-01-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9900431B1 (en) 2017-08-04 2018-02-20 At&T Intellectual Property I, L.P. Communications handler for screening incoming calls

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN102970362A (en) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 Method and device for sharing cloud data
CN103781033A (en) * 2012-10-26 2014-05-07 北京神州泰岳软件股份有限公司 Communication method and device for mobile terminal with instant messaging function
CN103813018A (en) * 2014-02-28 2014-05-21 上海斐讯数据通信技术有限公司 Incoming call marking method for mobile terminal and marking system adopted by method
CN103944987A (en) * 2014-04-18 2014-07-23 北京搜狗科技发展有限公司 Method and device for integrating individual resources for users
CN104038491A (en) * 2014-06-09 2014-09-10 可牛网络技术(北京)有限公司 Information interception method, device and system
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8913994B2 (en) * 2012-11-02 2014-12-16 Lookout, Inc. System and method for call blocking and SMS blocking

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN103781033A (en) * 2012-10-26 2014-05-07 北京神州泰岳软件股份有限公司 Communication method and device for mobile terminal with instant messaging function
CN102970362A (en) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 Method and device for sharing cloud data
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN103813018A (en) * 2014-02-28 2014-05-21 上海斐讯数据通信技术有限公司 Incoming call marking method for mobile terminal and marking system adopted by method
CN103944987A (en) * 2014-04-18 2014-07-23 北京搜狗科技发展有限公司 Method and device for integrating individual resources for users
CN104038491A (en) * 2014-06-09 2014-09-10 可牛网络技术(北京)有限公司 Information interception method, device and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881647A (en) * 2018-06-07 2018-11-23 麒麟合盛网络技术股份有限公司 The method and apparatus for determining number characteristic information, showing number characteristic information
CN110677821A (en) * 2019-10-17 2020-01-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN110677821B (en) * 2019-10-17 2021-08-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time

Also Published As

Publication number Publication date
WO2016091074A1 (en) 2016-06-16

Similar Documents

Publication Publication Date Title
US9380440B2 (en) Method to implement E911 services in IMS (IP multimedia subsystem)
CN104168560B (en) Show method, monitoring device and the cloud server of strange number relevant information
CN104270521A (en) Method for processing incoming call number and mobile terminal
US10219150B2 (en) Method, client terminal and server for establishing communication
US8423060B2 (en) Mobile phone and method for processing short message
CN103220391A (en) Cloud address book-based device, server and calling method
CN104410700A (en) Method for issuing crank call list as well as crank call interception method and system
US20170032320A1 (en) Methods and devices for managing emails
CN104243661A (en) Method, server and mobile terminal for determining types of incoming call numbers
US20110082896A1 (en) Dynamically Updated Web-Enabled and Embedded Contact Address in Communication Devices
CN105744525A (en) Method, device and system for mobile communication terminal to identify harassing communication
CN103957306A (en) Method and device for sharing information between communication terminals
US10904394B1 (en) Remote management of VoIP device contact lists
US20150381562A1 (en) Method and system for detecting a change in contact information
CN107682194A (en) Obtain, the methods, devices and systems of processing configuration information
CN104618445A (en) Method and device for arranging files based on cloud storage space
AU2020412338B2 (en) Method and device for improving the searchability of incident-specific social media content posted via particularly identified communication devices
US20140192969A1 (en) Optimized call handling for recycled telephone numbers
CN105744035B (en) Mobile communication terminal carries out the method and mobile communication terminal that harassing and wrecking communication intercepts
CN108173973B (en) Public article positioning method and system
CN104468927B (en) The processing method of address list information and mobile communication terminal in mobile communication terminal
CN109302539A (en) Harassing call hold-up interception method and device
US20180131796A1 (en) Mobile App to Update Phone Number Automatically
KR20140073073A (en) Method and system for phone number inquiry
US9456077B2 (en) Communication server, communication terminal, and method of communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160706