CN106790969A - Call block method, device and mobile terminal - Google Patents

Call block method, device and mobile terminal Download PDF

Info

Publication number
CN106790969A
CN106790969A CN201611005939.2A CN201611005939A CN106790969A CN 106790969 A CN106790969 A CN 106790969A CN 201611005939 A CN201611005939 A CN 201611005939A CN 106790969 A CN106790969 A CN 106790969A
Authority
CN
China
Prior art keywords
caller
call
list
answer
case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611005939.2A
Other languages
Chinese (zh)
Inventor
黄钱红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611005939.2A priority Critical patent/CN106790969A/en
Publication of CN106790969A publication Critical patent/CN106790969A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • H04M3/4365Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure is directed to a kind of call block method, device and mobile terminal.The method includes:Obtain the caller ID of current call;In the case where the caller ID is not belonging to default list, the current call is intercepted;Checking information is sent to the caller ID, the checking information includes validation problem.By the call block method of the disclosure, device and mobile terminal, in the case where the caller ID of current call is not belonging to default list, current call can be intercepted, and include the checking information of validation problem to caller ID transmission, unknown phone number can effectively be recognized, harassing call is prevented, the experience of user is improved.

Description

Call block method, device and mobile terminal
Technical field
This disclosure relates to communication technique field, more particularly to a kind of call block method, device and mobile terminal.
Background technology
With the continuous expansion of Mobile Communication Service, the phenomenon for dialing harassing call using mobile communications network is a large amount of therewith Occur.Various distributions, the harassing call of commercial paper are emerged in an endless stream, and great inconvenience is brought to user.In correlation technique, harassing and wrecking The interception of phone is generally basede on local black and white lists and intercepts, or the lable number based on high in the clouds big data is intercepted.
It refers to that user sets up black and white lists that black and white lists are intercepted, and is as shown in Figure 1 local black and white lists.For example, user Can set number on white list can normally incoming call, and the number on blacklist is intercepted.
It is the utilization based on high in the clouds big data that lable number is intercepted.For example, working as has user to be connected to the harassing and wrecking of some number After phone, locally the number can be marked, this mark can upload to cloud server.When labeled number again During calling other users, other users are known that it is labeled number, thus can carry out intelligent intercept.
The mode that black and white lists are intercepted can not be intercepted to the harassing call beyond blacklist.Due to caller ID modification Technology has been widely used, and causes the effect of lable number interception mode blocking disturbance call poor.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of call block method, device and mobile terminal.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of call block method, including:
Obtain the caller ID of current call;
In the case where the caller ID is not belonging to default list, the current call is intercepted;
Checking information is sent to the caller ID, the checking information includes validation problem.
For the above method, in a kind of possible implementation, the default list is included by verifying list.
For the above method, in a kind of possible implementation, the default list includes blacklist and/or white name It is single.
For the above method, in a kind of possible implementation, methods described also includes:
The reply message from the caller ID is received, the reply message includes answer to be verified;
The answer to be verified is verified according to the corresponding answer of the validation problem;
In the case where the answer to be verified is by checking, the caller ID is added by verifying list.
For the above method, in a kind of possible implementation, methods described also includes:
In the case where the answer to be verified is by checking, the caller ID is called.
For the above method, in a kind of possible implementation, methods described also includes:
The caller ID belong to by verifying list, white list or Affiliates List in the case of, show institute State current call.
For the above method, in a kind of possible implementation, methods described also includes:
In the case where the caller ID belongs to blacklist, the current call is intercepted.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of call block device, including:
Caller ID acquisition module, the caller ID for obtaining current call;
First call blocking module, in the case of being not belonging to default list in the caller ID, intercepts described working as Preceding incoming call;
Checking information sending module, for sending checking information to the caller ID, the checking information includes checking Problem.
For said apparatus, in a kind of possible implementation, the default list is included by verifying list.
For said apparatus, in a kind of possible implementation, the default list includes blacklist and/or white name It is single.
For said apparatus, in a kind of possible implementation, described device also includes:
Reply message receiver module, for receiving the reply message from the caller ID, the reply message includes Answer to be verified;
Answer authentication module to be verified, for being carried out to the answer to be verified according to the corresponding answer of the validation problem Checking;
Module is added by verifying list, in the case of in the answer to be verified by checking, will be described next Electric number is added by verifying list.
For said apparatus, in a kind of possible implementation, described device also includes:
Caller ID calling module, in the case of in the answer to be verified by checking, calls the incoming call number Code.
For said apparatus, in a kind of possible implementation, described device also includes:
Current call display module, for belonging to by verifying list, white list or contact in the caller ID In the case of roster, the current call is shown.
For said apparatus, in a kind of possible implementation, described device also includes:
Second call blocking module, in the case of belonging to blacklist in the caller ID, interception is described to work as to come Electricity.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of mobile terminal, including call block device as mentioned.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of call block device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Obtain the caller ID of current call;
In the case where the caller ID is not belonging to default list, the current call is intercepted;
Checking information is sent to the caller ID, the checking information includes validation problem.
The technical scheme provided by this disclosed embodiment can include the following benefits:By the call block of the disclosure Method, device and mobile terminal, in the case where the caller ID of current call is not belonging to default list, can intercept and work as to come Electricity, and include the checking information of validation problem to caller ID transmission, unknown phone number can be effectively recognized, harassing call is prevented, Improve the experience of user.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and it is used to explain the principle of the disclosure together with specification.
Fig. 1 is the schematic diagram of blacklist in the intelligent intercept according to correlation technique and white list.
Fig. 2 is a kind of flow chart of the call block method according to an exemplary embodiment.
Fig. 3 is that a kind of call block method according to an example of an exemplary embodiment realizes flow chart.
Fig. 4 is that a kind of call block method according to an example of an exemplary embodiment realizes flow chart.
Fig. 5 is a kind of block diagram of the call block device according to an exemplary embodiment.
Fig. 6 is a kind of another block diagram of the call block device according to an example of an exemplary embodiment.
Fig. 7 is a kind of block diagram of the device 800 for call block according to an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in implementation method do not represent all implementation methods consistent with the disclosure.Conversely, they be only with it is such as appended The example of the consistent apparatus and method of some aspects described in detail in claims, the disclosure.
Fig. 2 is a kind of flow chart of the call block method according to an exemplary embodiment.The call block method Can be used for the user equipmenies such as smart mobile phone, intelligent watch (User Equipment), be not limited thereto.As shown in Fig. 2 should Call block method, may comprise steps of.
In step s 201, the caller ID of current call is obtained.
The current call of the present embodiment can refer to the phone of incoming call under current time.It is understood that in correlation technique Having various methods can realize detecting current call, not limit herein.The present embodiment does not limit the caller ID of current call Type, such as caller ID can be phone number etc..
As an example of the present embodiment, detecting in the case that there is phone incoming call at current time, obtaining this current The caller ID of incoming call.
In step S202, in the case where caller ID is not belonging to default list, current call is intercepted.
In the present embodiment, caller ID is not belonging to default list can refer in default list do not have recording incoming number Situation.The present embodiment is not limited to the mode of record telephone number in default list, for example, can add by default list Plus telephone number method and realize record telephone number.
As an example of the present embodiment, number A and number B is added with default list.If current call is next Electric number is number B, then the caller ID (number B) belongs to default list.If the caller ID of current call is number C, Then the caller ID (number C) is not belonging to default list, intercepts the current call.
The present embodiment does not limit the type of default list.For example, default list can be that user uses according to call List such as blacklist that the mobile terminal such as list that demand builds in the mobile terminals such as mobile phone, or mobile phone is carried or Person's white list, does not limit herein.
In a kind of possible implementation, default list can include by verify list, blacklist, white list and One or more in Affiliates List.Wherein, can be used for adding the phone having been verified by by verifying list Number, blacklist can be used for adding the intercepted telephone number of needs, and white list can be used for the phone that cannot do not added interceptedly Number, Affiliates List can be used for adding the telephone number of the contact person such as friends and family that user preserves etc..It is appreciated that , the present embodiment do not limit the mode that telephone number is added to various lists, for example can be the operation based on user and Be added, or based on telephone number meet it is pre-conditioned for example by checking in the case of and be added.
Further, it is to be understood that, the present embodiment does not limit the mode for intercepting current call, there is each in correlation technique The method of kind can be realized intercepting current call, for example, can realize intercepting current call by way of hanging up current call, Do not limit herein.
Used as an example of the present embodiment, default list can include by verifying list.For example, if number Code D is carried out during certain incoming call and by checking, then number D is added to by verifying list.In number D Again in the case of incoming call, because number D belongs to by verifying list, then do not intercepted.If number E was not carried out (such as number E is the number of incoming call first), or number E not over checking (for example number E is during certain incoming call Carry out but not over checking), then number E will not be added to by verifying list.In the case of number E incoming calls, Because number E is not belonging to by verifying list, then intercepted.
In step S203, checking information is sent to caller ID, the checking information includes validation problem.
The present embodiment does not limit the mode that checking information is sent to caller ID, for example can be by short message or IMU News instrument sends checking information.Further, checking information can include validation problem.The present embodiment does not limit validation problem Type.For example, validation problem can include the problem related to user's self-characteristic, such as " what my name is ", " where I work " etc..The present embodiment does not limit the quantity of validation problem.For example, user can be mobile eventually in mobile phone etc. End sets one or more validation problem, and pre-sets corresponding answer for set validation problem.
Used as an example of the present embodiment, user can set a validation problem for example in mobile terminals such as mobile phones " what my name is ", and pre-set corresponding answer such as " Zhang San " for validation problem setting.In current call Caller ID be not belonging to default list in the case of, intercept the current call, and sent to the caller ID and include that checking is asked Inscribe the short message (checking information) of " what my name is ".For example short message can point out other side:Phone by intelligent intercept, such as Fruit needs to continue to contact, and please answer subsidiary problem in short message.Subsidiary problem can be believed on personal identity in short message Breath, such as " what my name is", or some simple questions, its effect is similar to authentication.
By the call block method of the present embodiment, the situation of default list is not belonging in the caller ID of current call Under, current call can be intercepted, and include the checking information of validation problem to caller ID transmission, can effectively recognize strange number Code, prevents harassing call, improves the experience of user.
Fig. 3 is that a kind of call block method according to an example of an exemplary embodiment realizes flow chart. As shown in figure 3, the call block method, may comprise steps of.
In step S301, the caller ID of current call is obtained.
Description to the step may refer to step S201.
In step s 302, in the case where caller ID is not belonging to default list, current call is intercepted.
Description to the step may refer to step S202.
In step S303, checking information is sent to caller ID, the checking information includes validation problem.
Description to the step may refer to step S203.
In step s 304, the reply message from caller ID is received, the reply message includes answer to be verified.
The present embodiment does not limit the mode for receiving reply message, such as in the case of by short message sending checking information, Reply message can be received by short message, in the case where checking information is sent by a certain JICQ, can passed through The immediate communication tool receives reply message.Further, reply message can include answer to be verified.The present embodiment it is to be tested Card answer can be the corresponding user of caller ID for answering that the validation problem included by received checking information is made Case.
In step S305, Validation Answer Key is treated according to the corresponding answer of validation problem and is verified.
Treating Validation Answer Key according to the corresponding answer of validation problem and being verified for the present embodiment, can be directed to user The corresponding answer that validation problem pre-sets is compared with answer to be verified.It is corresponding with validation problem in answer to be verified In the case that answer is same or similar, or one in answer to be verified multiple answers corresponding with multiple validation problems Or in the case that several answers are same or similar, answer to be verified is by checking.Wherein, answer to be verified and validation problem Corresponding answer is similar, the keyword or keyword of the corresponding answer of validation problem can be included for answer to be verified, herein It is not construed as limiting.
In step S306, in the case where answer to be verified is by checking, caller ID is added by verifying name It is single.
Used as an example of the present embodiment, user can set a validation problem for example in mobile terminals such as mobile phones " what my name is ", and pre-set corresponding answer such as " Zhang San " for validation problem setting.In current call Caller ID be not belonging to default list in the case of, intercept the current call, and sent to the caller ID and include that checking is asked Inscribe the short message (checking information) of " what my name is ".If user's answer short message " Zhang San " of caller ID, this is to be tested Card answer will be added to by verifying list by checking, the caller ID.If the user of caller ID does not reply short Letter, or answer short message " Li Si ", then not by checking, the caller ID is not added to pass through checking for the answer to be verified List.
By the call block method of the present embodiment, the situation of default list is not belonging in the caller ID of current call Under, current call can be intercepted, and include the checking information of validation problem to caller ID transmission.Further, receiving In the case of the reply message of caller ID, the answer to be verified included by the reply message is verified, and will be by testing The caller ID of card is added by verifying list.Unknown phone number can be effectively recognized, harassing call is prevented, and will be by checking Caller ID be added to by verifying list, to cause the caller ID again in the case of incoming call, can show and deserve Preceding incoming call, improves the experience of user.
Fig. 4 is that a kind of call block method according to an example of an exemplary embodiment realizes flow chart. As shown in figure 4, the call block method, may comprise steps of.
In step S401, the caller ID of current call is obtained.
In step S402, judge whether caller ID belongs to blacklist, in the case where caller ID belongs to blacklist, Step S403 is performed, in the case where caller ID is not belonging to blacklist, step S404 is performed.
In step S403, current call is intercepted.
In step s 404, judge whether caller ID belongs to white list or Affiliates List, belong in caller ID In the case of white list or Affiliates List, step S405 is performed, in the case where caller ID is not belonging to white list, performed Step S406.
In step S405, current call is shown.
In step S406, judge whether caller ID belongs to by verifying list, belong in caller ID and passed through Checking list in the case of, perform step S405, caller ID be not belonging to by verifying list in the case of, perform step S407。
In step S 407, current call is intercepted, checking information is sent to caller ID, the checking information is asked including checking Topic.
In step S408, the reply message from caller ID is received, the reply message includes answer to be verified.
In step S409, Validation Answer Key is treated according to the corresponding answer of validation problem and is verified, in answer to be verified In the case of checking, step S410 is performed.
In step S410, caller ID is added by verifying list.
In step S411, the caller ID is called.
If the user of intercepted caller ID has replied information and has passed through checking, then may determine that it is mistake Phone is intercepted, user's respective handling this mistake interception can have at this time been notified, and the caller ID has been added to By verifying list.Further, for the incoming call intercepted by above-mentioned mistake, automatic clawback can be enabled, clawback is by mistake The caller ID of interception simultaneously sets up call.
By the call block method of the present embodiment, the situation of default list is not belonging in the caller ID of current call Under, current call can be intercepted, and include the checking information of validation problem to caller ID transmission.Further, receiving In the case of the reply message of caller ID, the answer to be verified included by the reply message is verified.Answered to be verified In the case that case is by checking, the caller ID is added by verifying list, and call the caller ID.Can effectively know Other unknown phone number, prevents harassing call, while not missing normal phone information again.Additionally, by by the caller ID of checking It is added to by verifying list, can causes the caller ID again in the case of incoming call, the current call can be shown, carries The experience of user high.
Fig. 5 is a kind of block diagram of the call block device according to an exemplary embodiment.Reference picture 5, the device bag Include caller ID acquisition module 11, the first call blocking module 13 and checking information sending module 15.
Wherein, caller ID acquisition module 11 is configured as obtaining the caller ID of current call;First call blocking mould Block 13 is configured as, in the case where the caller ID is not belonging to default list, intercepting the current call;Checking information is sent out Module 15 is sent to be configured as sending checking information to the caller ID, the checking information includes validation problem.
In a kind of possible implementation, the default list is included by verifying list.
In a kind of possible implementation, the default list includes blacklist and/or white list.
Fig. 6 is a kind of another block diagram of the call block device according to an example of an exemplary embodiment.
In a kind of possible implementation, reference picture 6, the device also includes reply message receiver module 21, to be verified Answer authentication module 23 and by verify list add module 25.
Wherein, reply message receiver module 21 is configured as receiving the reply message from the caller ID, described to answer Complex information includes answer to be verified;Answer authentication module 23 to be verified is configured as according to the corresponding answer pair of the validation problem The answer to be verified is verified;Module 25 is added to be configured as in the answer to be verified by testing by verifying list In the case of card, the caller ID is added by verifying list.
In a kind of possible implementation, reference picture 6, the device also includes caller ID calling module 31.
Wherein, caller ID calling module 31 is configured as in the case where the answer to be verified is by checking, calling The caller ID.
In a kind of possible implementation, reference picture 6, the device also includes current call display module 33.
Wherein, current call display module 33 is configured as belonging to by verifying list, white name in the caller ID In the case of list or Affiliates List, the current call is shown.
In a kind of possible implementation, reference picture 6, the device also includes the second call blocking module 35.
Wherein, the second call blocking module 35 is configured as, in the case where the caller ID belongs to blacklist, intercepting The current call.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
By the call block device of the present embodiment, the situation of default list is not belonging in the caller ID of current call Under, current call can be intercepted, and include the checking information of validation problem to caller ID transmission.Further, receiving In the case of the reply message of caller ID, the answer to be verified included by the reply message is verified.Answered to be verified In the case that case is by checking, the caller ID is added by verifying list, and call the caller ID.Can effectively know Other unknown phone number, prevents harassing call, while not missing normal phone information again.Additionally, by by the caller ID of checking It is added to by verifying list, can causes the caller ID again in the case of incoming call, the current call can be shown, carries The experience of user high.
Fig. 7 is a kind of block diagram of the device 800 for call block according to an exemplary embodiment.For example, dress It can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, medical treatment to put 800 Equipment, body-building equipment, personal digital assistant etc..
Reference picture 7, device 800 can include following one or more assemblies:Processing assembly 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and Communication component 816.
The integrated operation of the usual control device 800 of processing assembly 802, such as with display, call, data communication, phase Machine is operated and the associated operation of record operation.Processing assembly 802 can refer to including one or more processors 820 to perform Order, to complete all or part of step of above-mentioned method.Additionally, processing assembly 802 can include one or more modules, just Interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, it is many to facilitate Interaction between media component 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in device 800.These data are shown Example includes the instruction for any application program or method operated on device 800, and contact data, telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 800.
Multimedia groupware 808 is included in one screen of output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detection and the touch or slide related duration and pressure.In certain embodiments, many matchmakers Body component 808 includes a front camera and/or rear camera.When device 800 be in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, to provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented Estimate.For example, sensor cluster 814 can detect the opening/closed mode of device 800, the relative positioning of component is for example described Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device Position change, user is presence or absence of with what device 800 was contacted, the orientation of device 800 or acceleration/deceleration and device 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to be detected when without any physical contact The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realization, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And can without departing from the scope carry out various modifications and changes.The scope of the present disclosure is only limited by appended claim.

Claims (16)

1. a kind of call block method, it is characterised in that including:
Obtain the caller ID of current call;
In the case where the caller ID is not belonging to default list, the current call is intercepted;
Checking information is sent to the caller ID, the checking information includes validation problem.
2. call block method according to claim 1, it is characterised in that the default list is included by verifying name It is single.
3. call block method according to claim 1 and 2, it is characterised in that the default list include blacklist and/ Or white list.
4. call block method according to claim 1, it is characterised in that methods described also includes:
The reply message from the caller ID is received, the reply message includes answer to be verified;
The answer to be verified is verified according to the corresponding answer of the validation problem;
In the case where the answer to be verified is by checking, the caller ID is added by verifying list.
5. call block method according to claim 4, it is characterised in that methods described also includes:
In the case where the answer to be verified is by checking, the caller ID is called.
6. call block method as claimed in any of claims 1 to 5, it is characterised in that methods described also includes:
The caller ID belong to by verifying list, white list or Affiliates List in the case of, display is described to work as Preceding incoming call.
7. call block method as claimed in any of claims 1 to 5, it is characterised in that methods described also includes:
In the case where the caller ID belongs to blacklist, the current call is intercepted.
8. a kind of call block device, it is characterised in that including:
Caller ID acquisition module, the caller ID for obtaining current call;
First call blocking module, in the case of being not belonging to default list in the caller ID, interception is described to work as to come Electricity;
Checking information sending module, for sending checking information to the caller ID, the checking information includes validation problem.
9. call block device according to claim 8, it is characterised in that the default list is included by verifying name It is single.
10. call block device according to claim 8 or claim 9, it is characterised in that the default list includes blacklist And/or white list.
11. call block devices according to claim 8, it is characterised in that described device also includes:
Reply message receiver module, for receiving the reply message from the caller ID, the reply message includes to be tested Card answer;
Answer authentication module to be verified, for being tested the answer to be verified according to the corresponding answer of the validation problem Card;
Module is added by verifying list, in the case of in the answer to be verified by checking, by the incoming call number Code is added by verifying list.
12. call block devices according to claim 11, it is characterised in that described device also includes:
Caller ID calling module, in the case of in the answer to be verified by checking, calls the caller ID.
The 13. call block device according to any one in claim 8 to 12, it is characterised in that described device is also wrapped Include:
Current call display module, for belonging to by verifying list, white list or contact name in the caller ID In the case of list, the current call is shown.
The 14. call block device according to any one in claim 8 to 12, it is characterised in that described device is also wrapped Include:
Second call blocking module, in the case of belonging to blacklist in the caller ID, intercepts the current call.
15. a kind of mobile terminals, it is characterised in that including the call block dress as described in any one in claim 8 to 14 Put.
A kind of 16. call block devices, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Obtain the caller ID of current call;
In the case where the caller ID is not belonging to default list, the current call is intercepted;
Checking information is sent to the caller ID, the checking information includes validation problem.
CN201611005939.2A 2016-11-15 2016-11-15 Call block method, device and mobile terminal Pending CN106790969A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611005939.2A CN106790969A (en) 2016-11-15 2016-11-15 Call block method, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611005939.2A CN106790969A (en) 2016-11-15 2016-11-15 Call block method, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN106790969A true CN106790969A (en) 2017-05-31

Family

ID=58969614

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611005939.2A Pending CN106790969A (en) 2016-11-15 2016-11-15 Call block method, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN106790969A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043686A (en) * 2007-04-24 2007-09-26 北京网秦天下科技有限公司 Inquiry based method for mobile terminal to refuse rubbish SMS
CN104378482A (en) * 2014-11-20 2015-02-25 广东欧珀移动通信有限公司 Mobile terminal address book updating method and system
CN105187605A (en) * 2015-06-16 2015-12-23 惠州Tcl移动通信有限公司 Telephone verification method and system
CN105187606A (en) * 2015-08-05 2015-12-23 郑卫兵 Method for preventing crank calls based on identity authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043686A (en) * 2007-04-24 2007-09-26 北京网秦天下科技有限公司 Inquiry based method for mobile terminal to refuse rubbish SMS
CN104378482A (en) * 2014-11-20 2015-02-25 广东欧珀移动通信有限公司 Mobile terminal address book updating method and system
CN105187605A (en) * 2015-06-16 2015-12-23 惠州Tcl移动通信有限公司 Telephone verification method and system
CN105187606A (en) * 2015-08-05 2015-12-23 郑卫兵 Method for preventing crank calls based on identity authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal

Similar Documents

Publication Publication Date Title
CN104391870B (en) Logistics information acquisition methods and device
CN106376043A (en) Automatic switching method and device for SIM (Subscriber Identification Module) card
CN104159230B (en) Call recognition methods and device
CN105516508A (en) Method and device for activating virtual SIM card
CN106535291A (en) SIM card selection method and device
CN105704766A (en) Control method and device of double-card mobile terminal
CN105162940A (en) Call processing method and call processing device
CN104113646A (en) Method and apparatus for calling forwarding
CN107396367A (en) Reminding method, device, terminal and the computer-readable recording medium of pseudo-base station
CN104899501A (en) Dialog list display method and device and terminal
CN105323152A (en) Message processing method, device and equipment
CN110249655A (en) Error reason report method and device
CN107147815A (en) Based on the call handling method and device called a taxi
CN104703157A (en) Call processing method and device
CN105245705A (en) Telephone prompting method and device
CN104184888A (en) Call transfer method, device and terminal
CN106535166A (en) Data service processing method and device
CN105704322A (en) Weather information obtaining method and apparatus
CN104780256A (en) Address book management method and device and intelligent terminal
CN105635414A (en) Method and device for screening incoming calls
CN106791145A (en) Short message management method and device
CN105512542A (en) Information inputting method and system
CN106060251A (en) Short message enquiry and reading method, short message enquiry and reading device and related equipment
CN105101258A (en) Communication request transfer method and device
CN104917995A (en) Realization method and device of off-line video communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531