CN108684032B - Interception setting method and related equipment - Google Patents

Interception setting method and related equipment Download PDF

Info

Publication number
CN108684032B
CN108684032B CN201810286461.8A CN201810286461A CN108684032B CN 108684032 B CN108684032 B CN 108684032B CN 201810286461 A CN201810286461 A CN 201810286461A CN 108684032 B CN108684032 B CN 108684032B
Authority
CN
China
Prior art keywords
card
prompt
interception
interception setting
subscriber identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810286461.8A
Other languages
Chinese (zh)
Other versions
CN108684032A (en
Inventor
刘齐虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810286461.8A priority Critical patent/CN108684032B/en
Publication of CN108684032A publication Critical patent/CN108684032A/en
Application granted granted Critical
Publication of CN108684032B publication Critical patent/CN108684032B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an interception setting method and related equipment, wherein the method comprises the following steps: under the condition that the user identification card is inserted into the first card slot, determining whether the first card slot is associated with the user identification card or not and whether first interception setting information associated with the user identification card is stored in the mobile terminal or not; under the conditions that the first card slot is not associated with the user identification card and first interception setting information associated with the user identification card is stored in the mobile terminal, acquiring the first interception setting information; and carrying out interception setting of the user identification card according to the first interception setting information. By adopting the embodiment of the application, the problem of how to perform interception setting of the user identification card when the user identification card which is not related is inserted into the card slot can be solved.

Description

Interception setting method and related equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an intercept setting method and related devices.
Background
With the development of mobile terminal technology (such as smart phones), mobile terminals have become indispensable devices in people's daily life and work. Meanwhile, the promotion telephone, the fraud telephone, the promotion message, the fraud message, the promotion mail and the like bring inconvenience and trouble to the user. Therefore, how to perform the interception setting is an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides an interception setting method and related equipment, which are used for solving the problem of how to perform interception setting of a user identification card when the user identification card which is not related is inserted into a card slot.
In a first aspect, an embodiment of the present application provides an interception setting method, including:
under the condition that a user identification card is inserted into a first card slot, determining whether the first card slot is associated with the user identification card and whether first interception setting information associated with the user identification card is stored in a mobile terminal;
acquiring first interception setting information associated with the user identification card under the condition that the first card slot is not associated with the user identification card and the first interception setting information is stored in the mobile terminal;
and carrying out interception setting on the user identification card according to the first interception setting information.
In a second aspect, an embodiment of the present application provides an interception setting apparatus, including:
a determining unit, configured to determine whether a first card slot is associated with a subscriber identity card and whether first interception setting information associated with the subscriber identity card is stored in a mobile terminal, in a case where the subscriber identity card is inserted into the first card slot;
an obtaining unit, configured to obtain first interception setting information associated with the subscriber identity module card when the first card slot is not associated with the subscriber identity module card and the mobile terminal stores the first interception setting information associated with the subscriber identity module card;
and the setting unit is used for carrying out interception setting on the user identification card according to the first interception setting information.
In a third aspect, an embodiment of the present application provides a mobile terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing the steps in any of the methods of the first aspect of the embodiments of the present application.
In a fourth aspect, this application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program is to make a computer perform part or all of the steps as described in any one of the methods of the first aspect of this application, and the computer includes a mobile terminal.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package, said computer comprising a mobile terminal.
It can be seen that, in the embodiment of the present application, under the condition that the unrelated subscriber identity card is inserted into the card slot, if the interception setting information associated with the subscriber identity card is stored in the mobile terminal, the mobile terminal directly uses the interception setting information associated with the subscriber identity card to perform interception setting on the subscriber identity card, thereby increasing the speed of interception setting, and solving the problem of how to perform interception setting on the subscriber identity card when the unrelated subscriber identity card is inserted into the card slot.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an interception setting method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another interception setting method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of another mobile terminal provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of an interception setting apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The Mobile terminal according to the embodiment of the present application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like. For convenience of description, the above-mentioned devices are collectively referred to as a mobile terminal.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application. The mobile terminal includes a processor, memory, signal processor, transceiver, display, speaker, microphone, RAM, at least one card slot, and the like. The memory, the signal processor, the display screen, the loudspeaker, the microphone, the RAM and the at least one card slot are all connected with the processor, and the transceiver is connected with the signal processor.
The processor is the control center of the mobile terminal, connects each part of the whole mobile terminal by various interfaces and lines, and executes various functions and processes data of the mobile terminal by operating or executing software programs and/or modules stored in the memory and calling the data stored in the memory, thereby carrying out the overall monitoring of the mobile terminal.
Alternatively, the processor may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The memory is used for storing software programs and/or modules, and the processor executes various functional applications and data processing of the mobile terminal by operating the software programs and/or modules stored in the memory. The memory mainly comprises a program storage area and a data storage area, wherein the program storage area can store an operating system, a software program required by at least one function and the like; the storage data area may store data created according to the use of the mobile terminal, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
Referring to fig. 2, fig. 2 is a schematic flowchart of an intercept configuration method applied to a mobile terminal according to an embodiment of the present application, where the intercept configuration method includes:
step 201: in the case where a subscriber identification card is inserted into a first card slot, a mobile terminal determines whether the first card slot is associated with the subscriber identification card and whether first interception setting information associated with the subscriber identification card is stored in the mobile terminal.
Step 202: and under the conditions that the first card slot is not associated with the user identification card and first interception setting information associated with the user identification card is stored in the mobile terminal, the mobile terminal acquires the first interception setting information.
Step 203: and the mobile terminal carries out interception setting on the user identification card according to the first interception setting information.
Optionally, the mobile terminal comprises one card slot, or the mobile terminal comprises a plurality of card slots.
Optionally, the subscriber identity card comprises a mobile subscriber identity card, a universal subscriber identity card or a telecommunication subscriber identity card, etc. Optionally, the Subscriber Identity Module (SIM) card is a Subscriber Identity Module (SIM) card or a Universal Subscriber Identity Module (USIM) card.
Optionally, the association of a certain card slot with a certain subscriber identity card means that the certain card slot is mainly used for placing the certain subscriber identity card, or the association of a certain card slot with a certain subscriber identity card means that the certain subscriber identity card is often placed with the certain card slot.
Optionally, the card slot is associated with the subscriber identity module card in advance, the card slot is associated with the interception setting information in advance, and the subscriber identity module card is associated with the interception setting information in advance, where the 3 association relations are specifically shown in tables 1, 2, and 3.
Further, the association shown in table 1 is user-defined; or, the association shown in table 1 is self-defined by the mobile terminal, specifically including: when the mobile terminal detects that the number of times a certain subscriber identity card is inserted into a certain card slot exceeds a set value (for example, 3 times), the mobile terminal associates the certain subscriber identity card with the certain card slot.
Further, the association shown in table 2 is user-defined; or, the association shown in table 2 is self-defined by the mobile terminal, and specifically includes: after the user performs interception setting under a certain card slot, the mobile terminal stores and associates interception setting information for performing interception setting under the certain card slot.
Further, the association shown in table 3 is user-defined; or, the association shown in table 3 is self-defined by the mobile terminal, and specifically includes: after the interception setting is carried out when a user inserts a certain user identification card, the mobile terminal stores and associates the interception setting information of the interception setting carried out by the user on the certain user identification card.
TABLE 1
Figure BDA0001616136680000051
TABLE 2
Figure BDA0001616136680000052
TABLE 3
Figure BDA0001616136680000061
Optionally, in a case that the subscriber identity card is inserted into the first card slot, the mobile terminal obtains a card identifier of the subscriber identity card; in the case that the card identifier is consistent with the card identifier of one of the at least one subscriber identity card associated with the first card slot, indicating that the first card slot is associated with the subscriber identity card; and in the case that the card identification is not consistent with the card identification of any subscriber identification card in the at least one subscriber identification card associated with the first card slot, indicating that the first card slot is not associated with the subscriber identification card.
The card identifier may include a Public Land Mobile Network (PLMN), an International Mobile Subscriber Identity (IMSI), an Integrated Circuit Card Identity (ICCID), an Integrated Services Digital Network (ISDN) Number of a Mobile Subscriber (MSISDN), and the like.
The interception setting information includes incoming call interception setting proceeding, short message interception setting information and the like. The short message includes a short message, instant messaging information (such as QQ information, wechat information, etc.), mail information, etc.
It can be seen that, in the embodiment of the present application, under the condition that the unrelated subscriber identity card is inserted into the card slot, if the interception setting information associated with the subscriber identity card is stored in the mobile terminal, the mobile terminal directly uses the interception setting information associated with the subscriber identity card to perform interception setting on the subscriber identity card, thereby increasing the speed of interception setting, and solving the problem of how to perform interception setting on the subscriber identity card when the unrelated subscriber identity card is inserted into the card slot.
In an embodiment of the present application, the method further includes:
the mobile terminal carries out a first prompt, wherein the first prompt is used for prompting whether the interception setting associated with the user identification card is used or not;
and under the condition that a confirmation instruction aiming at the first prompt is detected, the mobile terminal acquires the first interception setting information.
Specifically, the user identification card is not associated with the first card slot, which means that the first card slot is not mainly used for placing the user identification card, and under the condition, before the first interception setting information is acquired, whether the user uses the interception setting associated with the user identification card is prompted, so that the process of man-machine interaction can be increased, and the user experience is improved.
In an embodiment of the present application, the method further includes:
the mobile terminal carries out a second prompt, wherein the second prompt is used for prompting whether the user identification card is replaced to a second card slot, and the second card slot is associated with the user identification card;
under the condition that a confirmation instruction aiming at the second prompt is detected, the mobile terminal detects whether the subscriber identity module card is inserted into the second card slot;
and under the condition that the user identification card is inserted into the second card slot and second interception setting information associated with the second card slot is stored in the mobile terminal, the mobile terminal acquires the second interception setting information and carries out interception setting on the user identification card according to the second interception setting information.
The prompting method may be a voice prompting method and/or a display prompting method, or other prompting methods, which are not limited herein.
It should be noted that the mobile terminal may perform the first prompt first and then perform the second prompt after a period of time, or perform the second prompt first and then perform the first prompt after a period of time, or perform the first prompt and the second prompt simultaneously, which is not limited herein.
Specifically, because this subscriber identity module card is associated with the second draw-in groove, show that the second draw-in groove mainly used places this subscriber identity module card, under this kind of circumstances, whether suggestion user changes this subscriber identity module card to the second draw-in groove earlier, multiplicable human-computer interaction's process like this, and then promoted user experience. In addition, after the user identification card is replaced to the second card slot, the user identification card is intercepted and set according to the interception setting information associated with the second card slot, and the problem that due to the fact that the user identification card is inserted into the wrong card slot, preset interception is not effective is avoided.
In an embodiment of the present application, the method further includes:
under the condition that a confirmation instruction aiming at the second prompt is detected, the mobile terminal carries out a third prompt, wherein the third prompt is used for judging whether the mobile terminal is in a power-off state to be replaced or not;
under the condition that a denial instruction for the third prompt is detected, the mobile terminal performs a fourth prompt, wherein the fourth prompt is used for prompting hot plug operation;
and under the condition that the subscriber identity module card is pulled out of the first card slot, the mobile terminal sets the setting state of an incoming call interception option and/or a short message interception option in an interception setting interface to be 'inaccessible'.
It should be noted that the steps of "the mobile terminal detecting whether the subscriber identity module card is inserted into the second card slot" and "the mobile terminal performing the third prompt" are executed in parallel; or, the step "the mobile terminal detects whether the subscriber identity card is inserted into the second card slot" after the step "the mobile terminal performs the fourth prompt", and so on, which is not limited herein.
The hot plug operation refers to the operation of plugging and unplugging the subscriber identity module card when the mobile terminal is not powered off.
After the mobile terminal sets the setting state of incoming call interception and/or short message interception in the interception setting interface as 'inaccessible', the user clicks the incoming call interception option or the short message interception option in the interception setting interface without any reaction.
Specifically, in the process of currently pulling out the subscriber identity module card from the first card slot and replacing the subscriber identity module card with another card slot, if the user enters the setting interception interface by mistake for interception setting without the subscriber identity module card at this time, a problem of setting errors may occur, and therefore, in order to avoid the problem, in this case, the setting state of the incoming call interception option and/or the short message interception option in the interception setting interface is set to be "not accessible".
In an embodiment of the present application, the method further includes:
performing a fifth prompt on the condition that a denial instruction for the first prompt is detected, wherein the fifth prompt is used for prompting whether to use the interception setting associated with the first card slot;
and under the condition that a confirmation instruction aiming at the fifth prompt is detected and third interception setting information associated with the first card slot is stored in the mobile terminal, acquiring the second interception setting information and carrying out interception setting on the user identification card according to the third interception setting information.
Referring to fig. 3, fig. 3 is a schematic flowchart of an interception configuration method according to an embodiment of the present application, where as shown in the figure, the interception configuration method includes:
step 301: in the case where a subscriber identification card is inserted into a first card slot, a mobile terminal determines whether the first card slot is associated with the subscriber identification card.
If yes, go to step 317.
If not, go to step 302.
Step 302: and the mobile terminal determines whether the first interception setting information associated with the user identification card is stored in the mobile terminal.
If yes, go to step 303.
If not, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 303: the mobile terminal carries out a first prompt and a second prompt, wherein the first prompt is used for prompting whether to use the interception setting associated with the subscriber identity module card, the second prompt is used for prompting whether to replace the subscriber identity module card to a second card slot, and the second card slot is associated with the subscriber identity module card.
In case a confirmation instruction for the first prompt is detected, step 304 is performed.
In case a denial instruction for the first prompt is detected, step 306 is performed.
In case a confirmation instruction for the second prompt is detected, step 310 and step 314 are performed.
And under the condition that a negative instruction aiming at the second prompt is detected, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 304: and the mobile terminal acquires the first interception setting information.
Step 305: and the mobile terminal carries out interception setting on the user identification card according to the first interception setting information.
Step 306: and the mobile terminal carries out a fifth prompt, wherein the fifth prompt is used for prompting whether the interception setting associated with the first card slot is used or not.
In case a confirmation instruction for the fifth prompt is detected, step 307 is executed.
And under the condition that a negative instruction aiming at the fifth prompt is detected, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 307: and the mobile terminal determines whether the mobile terminal stores third interception setting information associated with the first card slot.
If yes, go to step 308.
If not, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 308: and the mobile terminal acquires the third interception setting information.
Step 309: and the mobile terminal carries out interception setting on the user identification card according to the third interception setting information.
Step 310: and the mobile terminal detects whether the subscriber identity module card is inserted into the second card slot.
In case it is detected that the subscriber identity card is inserted into the second card slot, step 312 is performed.
Step 311: and the mobile terminal determines whether second interception setting information associated with the second card slot is stored in the mobile terminal.
If yes, go to step 312.
If not, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 312: and the mobile terminal acquires the second interception setting information.
Step 313: and the mobile terminal carries out interception setting on the user identification card according to the second interception setting information.
Step 314: and the mobile terminal carries out a third prompt, wherein the third prompt is used for judging whether the mobile terminal is in a power-off state to be replaced or not.
In the event a denial instruction for the third prompt is detected, step 315 is performed.
And under the condition that a confirmation instruction aiming at the third prompt is detected, the mobile terminal carries out shutdown operation.
Step 315: and the mobile terminal carries out a fourth prompt, wherein the fourth prompt is used for prompting the hot plug operation.
Step 316: and under the condition that the subscriber identity module card is pulled out of the first card slot, the mobile terminal sets the setting state of an incoming call interception option and/or a short message interception option in an interception setting interface to be 'inaccessible'. Step 310 is performed after step 316 is performed.
Step 317: and the mobile terminal determines whether the mobile terminal stores third interception setting information associated with the first card slot.
If yes, go to step 318.
If not, the mobile terminal prompts the user to carry out interception setting on the user identification card or does not carry out any operation.
Step 318: and the mobile terminal determines whether the first interception setting information associated with the user identification card is stored in the mobile terminal.
If yes, go to step 319.
If not, go to step 321.
Step 319: the mobile terminal determines whether the third interception setting information is the same as the first interception setting information.
If yes, go to step 320.
If not, go to step 321.
Step 320: and the mobile terminal carries out interception setting on the subscriber identity module card according to the third interception setting information or the first interception setting information.
Step 321: and the mobile terminal carries out interception setting on the user identification card according to the third interception setting information.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
Consistent with the embodiments shown in fig. 2 and fig. 3, please refer to fig. 4, and fig. 4 is a schematic structural diagram of a mobile terminal provided in an embodiment of the present application, where the mobile terminal runs one or more applications, and as shown, the mobile terminal includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are different from the one or more applications, and the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the following steps:
under the condition that a user identification card is inserted into a first card slot, determining whether the first card slot is associated with the user identification card and whether first interception setting information associated with the user identification card is stored in a mobile terminal;
acquiring first interception setting information associated with the user identification card under the condition that the first card slot is not associated with the user identification card and the first interception setting information is stored in the mobile terminal;
and carrying out interception setting on the user identification card according to the first interception setting information.
It can be seen that, in the embodiment of the present application, under the condition that the unrelated subscriber identity card is inserted into the card slot, if the interception setting information associated with the subscriber identity card is stored in the mobile terminal, the mobile terminal directly uses the interception setting information associated with the subscriber identity card to perform interception setting on the subscriber identity card, thereby increasing the speed of interception setting, and solving the problem of how to perform interception setting on the subscriber identity card when the unrelated subscriber identity card is inserted into the card slot.
In an embodiment of the application, the program comprises instructions for further performing the steps of:
performing a first prompt, wherein the first prompt is used for prompting whether to use the interception setting associated with the user identification card;
acquiring the first interception setting information in a case where a confirmation instruction for the first prompt is detected.
In an embodiment of the application, the program comprises instructions for further performing the steps of:
performing a second prompt, wherein the second prompt is used for prompting whether the subscriber identity module card is replaced to a second card slot, and the second card slot is associated with the subscriber identity module card;
detecting whether the subscriber identity card is inserted into the second card slot or not under the condition that a confirmation instruction aiming at the second prompt is detected;
and under the condition that the user identification card is inserted into the second card slot and second interception setting information associated with the second card slot is stored in the mobile terminal, acquiring the second interception setting information, and performing interception setting on the user identification card according to the second interception setting information.
In an embodiment of the application, the program comprises instructions for further performing the steps of:
under the condition that a confirmation instruction aiming at the second prompt is detected, performing a third prompt, wherein the third prompt is used for judging whether the mobile terminal is in a power-off state to be replaced or not;
when a denial instruction for the third prompt is detected, performing a fourth prompt, wherein the fourth prompt is used for prompting hot plug operation;
and setting the setting state of an incoming call interception option and/or a short message interception option in an interception setting interface as 'inaccessible' under the condition that the subscriber identity module card is pulled out of the first card slot.
In an embodiment of the application, the program comprises instructions for further performing the steps of:
performing a fifth prompt on the condition that a denial instruction for the first prompt is detected, wherein the fifth prompt is used for prompting whether to use the interception setting associated with the first card slot;
and under the condition that a confirmation instruction aiming at the fifth prompt is detected and third interception setting information associated with the first card slot is stored in the mobile terminal, acquiring the second interception setting information and carrying out interception setting on the user identification card according to the third interception setting information.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
Fig. 5 shows a block diagram of a possible functional unit of the interception setting means involved in the embodiment. The interception setting means 500 includes:
a determining unit 501, configured to determine, when a subscriber identity card is inserted into a first card slot, whether the first card slot is associated with the subscriber identity card and whether first interception setting information associated with the subscriber identity card is stored in a mobile terminal;
an obtaining unit 502, configured to obtain first interception setting information associated with the subscriber identity module card when the first card slot is not associated with the subscriber identity module card and the first interception setting information associated with the subscriber identity module card is stored in the mobile terminal;
a setting unit 503, configured to perform interception setting on the subscriber identity card according to the first interception setting information.
It can be seen that, in the embodiment of the present application, under the condition that the unrelated subscriber identity card is inserted into the card slot, if the interception setting information associated with the subscriber identity card is stored in the mobile terminal, the mobile terminal directly uses the interception setting information associated with the subscriber identity card to perform interception setting on the subscriber identity card, thereby increasing the speed of interception setting, and solving the problem of how to perform interception setting on the subscriber identity card when the unrelated subscriber identity card is inserted into the card slot.
In an embodiment of the present application, the interception setting apparatus 500 further includes:
a prompt unit 504, configured to perform a first prompt, where the first prompt is used to prompt whether to use the interception setting associated with the subscriber identity card;
the obtaining unit 502 is specifically configured to:
acquiring the first interception setting information in a case where a confirmation instruction for the first prompt is detected.
In one embodiment of the present application,
a prompting unit 504, configured to perform a second prompt, where the second prompt is used to prompt whether to replace the subscriber identity card with a second card slot, and the second card slot is associated with the subscriber identity card;
the interception setting means 500 further includes:
a detecting unit 505, configured to detect whether the subscriber identity card is inserted into the second card slot when a confirmation instruction for the second prompt is detected;
an obtaining unit 502, configured to obtain second interception setting information associated with the second card slot when it is detected that the subscriber identity card is inserted into the second card slot and the second interception setting information is stored in the mobile terminal;
the setting unit 503 is further configured to perform interception setting on the subscriber identity module according to the second interception setting information.
In an embodiment of the present application, the prompting unit 504 is further configured to perform a third prompt when a confirmation instruction for the second prompt is detected, where the third prompt is used to determine whether to replace the mobile terminal in an off state;
a prompt unit 504, configured to perform a fourth prompt when a denial instruction for the third prompt is detected, where the fourth prompt is used to prompt a hot plug operation;
the setting unit 503 is further configured to set a setting state of an incoming call interception option and/or a short message interception option in an interception setting interface to "not accessible" when the subscriber identity module card is pulled out of the first card slot.
In an embodiment of the present application, the prompting unit 504 is further configured to perform a fifth prompt when a denial instruction for the first prompt is detected, where the fifth prompt is used to prompt whether to use the interception setting associated with the first card slot;
an obtaining unit 502, configured to obtain the second interception setting information when a confirmation instruction for the fifth prompt is detected and third interception setting information associated with the first card slot is stored in the mobile terminal;
the setting unit 503 is further configured to perform interception setting on the subscriber identity module according to the third interception setting information.
It should be noted that the mobile terminal described in the embodiments of the apparatus of the present application is presented in the form of a functional unit. The term "unit" as used herein is to be understood in its broadest possible sense, and objects used to implement the functions described by the respective "unit" may be, for example, an integrated circuit ASIC, a single circuit, a processor (shared, dedicated, or chipset) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
Wherein, the determining unit 501, the setting unit 503, the prompting unit 50/4 and the detecting unit 505 may be a processor or a controller, and the obtaining unit 502 may be an internal communication interface between the processor and the program running space.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods described in the method embodiments, and the computer includes a mobile terminal.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as recited in the method embodiments. The computer program product may be a software installation package, said computer comprising a mobile terminal.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the embodiments described herein may be performed by associated hardware as instructed by a program, which may be stored in a computer readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (9)

1. An interception setting method, comprising:
under the condition that a user identification card is inserted into a first card slot, determining whether the first card slot is associated with the user identification card and whether first interception setting information associated with the user identification card is stored in a mobile terminal;
acquiring first interception setting information associated with the user identification card under the condition that the first card slot is not associated with the user identification card and the first interception setting information is stored in the mobile terminal;
intercepting setting of the user identification card is carried out according to the first intercepting setting information;
wherein the method further comprises:
performing a second prompt, wherein the second prompt is used for prompting whether the subscriber identity module card is replaced to a second card slot, and the second card slot is associated with the subscriber identity module card;
detecting whether the subscriber identity card is inserted into the second card slot or not under the condition that a confirmation instruction aiming at the second prompt is detected; and under the condition that the user identification card is inserted into the second card slot and second interception setting information associated with the second card slot is stored in the mobile terminal, acquiring the second interception setting information, and performing interception setting on the user identification card according to the second interception setting information.
2. The method of claim 1, further comprising:
performing a first prompt, wherein the first prompt is used for prompting whether to use the interception setting associated with the user identification card;
acquiring the first interception setting information in a case where a confirmation instruction for the first prompt is detected.
3. The method of claim 1, further comprising:
under the condition that a confirmation instruction aiming at the second prompt is detected, performing a third prompt, wherein the third prompt is used for judging whether the mobile terminal is in a power-off state to be replaced or not;
when a denial instruction for the third prompt is detected, performing a fourth prompt, wherein the fourth prompt is used for prompting hot plug operation;
and setting the setting state of an incoming call interception option and/or a short message interception option in an interception setting interface as 'inaccessible' under the condition that the subscriber identity module card is pulled out of the first card slot.
4. The method of claim 2, further comprising:
under the condition that a confirmation instruction aiming at the second prompt is detected, performing a third prompt, wherein the third prompt is used for judging whether the mobile terminal is in a power-off state to be replaced or not;
when a denial instruction for the third prompt is detected, performing a fourth prompt, wherein the fourth prompt is used for prompting hot plug operation;
and setting the setting state of an incoming call interception option and/or a short message interception option in an interception setting interface as 'inaccessible' under the condition that the subscriber identity module card is pulled out of the first card slot.
5. The method according to any one of claims 2 or 4, further comprising:
performing a fifth prompt on the condition that a denial instruction for the first prompt is detected, wherein the fifth prompt is used for prompting whether to use the interception setting associated with the first card slot;
and under the condition that a confirmation instruction aiming at the fifth prompt is detected and third interception setting information associated with the first card slot is stored in the mobile terminal, acquiring the third interception setting information and carrying out interception setting on the user identification card according to the third interception setting information.
6. An interception setting device characterized by comprising:
a determining unit, configured to determine whether a first card slot is associated with a subscriber identity card and whether first interception setting information associated with the subscriber identity card is stored in a mobile terminal, in a case where the subscriber identity card is inserted into the first card slot;
an obtaining unit, configured to obtain first interception setting information associated with the subscriber identity module card when the first card slot is not associated with the subscriber identity module card and the mobile terminal stores the first interception setting information associated with the subscriber identity module card;
the setting unit is used for carrying out interception setting on the user identification card according to the first interception setting information;
wherein, the interception setting means further comprises: the prompting unit is used for prompting whether the subscriber identity module card is replaced to a second card slot or not, and the second card slot is associated with the subscriber identity module card;
the interception setting means further comprises:
a detection unit configured to detect whether the subscriber identity card is inserted into the second card slot when a confirmation instruction for the second prompt is detected;
the obtaining unit is further configured to obtain second interception setting information associated with the second card slot when it is detected that the subscriber identity module card is inserted into the second card slot and the second interception setting information is stored in the mobile terminal;
the setting unit is further configured to perform interception setting of the subscriber identity module card according to the second interception setting information.
7. The device of claim 6, wherein the prompting unit is further configured to perform a first prompt, where the first prompt is used to prompt whether to use the interception setting associated with the subscriber identity card;
the obtaining unit is specifically configured to:
acquiring the first interception setting information in a case where a confirmation instruction for the first prompt is detected.
8. A mobile terminal comprising a processor, memory, a communications interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method of any of claims 1-5.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method according to any one of claims 1-5, the computer comprising a mobile terminal.
CN201810286461.8A 2018-03-30 2018-03-30 Interception setting method and related equipment Expired - Fee Related CN108684032B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810286461.8A CN108684032B (en) 2018-03-30 2018-03-30 Interception setting method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810286461.8A CN108684032B (en) 2018-03-30 2018-03-30 Interception setting method and related equipment

Publications (2)

Publication Number Publication Date
CN108684032A CN108684032A (en) 2018-10-19
CN108684032B true CN108684032B (en) 2021-05-18

Family

ID=63799771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810286461.8A Expired - Fee Related CN108684032B (en) 2018-03-30 2018-03-30 Interception setting method and related equipment

Country Status (1)

Country Link
CN (1) CN108684032B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351432B (en) * 2019-07-18 2023-09-15 深圳传音控股股份有限公司 Communication card information display method and mobile terminal
CN113079249B (en) * 2021-03-25 2022-07-08 惠州Tcl移动通信有限公司 Prompting method, prompting device, storage medium and mobile terminal

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1561125A (en) * 2004-03-01 2005-01-05 Mobile phone message shield control method
KR20050068923A (en) * 2003-12-30 2005-07-05 엘지전자 주식회사 Spam call interception method for mobile communication terminal
CN1756399A (en) * 2004-09-30 2006-04-05 华为技术有限公司 Method for recording information in extending user card
WO2006069279A3 (en) * 2004-12-22 2006-08-17 Intel Corp Routing of messages
CN101389085A (en) * 2008-10-14 2009-03-18 中国联合通信有限公司 Rubbish short message recognition system and method based on sending behavior
CN102204289A (en) * 2011-05-26 2011-09-28 华为技术有限公司 Method and device for intercepting copy card notes
CN103067610A (en) * 2013-01-23 2013-04-24 广东欧珀移动通信有限公司 Method and system and mobile terminal of interception of junk short message
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal
CN105357384A (en) * 2015-10-30 2016-02-24 上海卓易科技股份有限公司 Incoming call reminding method and system
CN106060799A (en) * 2016-05-16 2016-10-26 北京奇虎科技有限公司 Method and apparatus for acquiring single card with multiple communication numbers and communication device
WO2016197337A1 (en) * 2015-06-10 2016-12-15 华为技术有限公司 Short message processing method and apparatus, and electronic device
CN107135298A (en) * 2017-04-14 2017-09-05 努比亚技术有限公司 Call blocking method and apparatus
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869550A (en) * 2014-02-24 2015-08-26 腾讯科技(深圳)有限公司 Communication event processing method and device
CN104661207B (en) * 2015-03-10 2019-04-12 西安酷派软件科技有限公司 Setting method, setting device and the terminal of network protocol type
CN107404580A (en) * 2017-07-25 2017-11-28 惠州Tcl移动通信有限公司 A kind of method, storage medium and equipment for intercepting harassing call number and short message

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050068923A (en) * 2003-12-30 2005-07-05 엘지전자 주식회사 Spam call interception method for mobile communication terminal
CN1561125A (en) * 2004-03-01 2005-01-05 Mobile phone message shield control method
CN1756399A (en) * 2004-09-30 2006-04-05 华为技术有限公司 Method for recording information in extending user card
WO2006069279A3 (en) * 2004-12-22 2006-08-17 Intel Corp Routing of messages
CN101389085A (en) * 2008-10-14 2009-03-18 中国联合通信有限公司 Rubbish short message recognition system and method based on sending behavior
CN102204289A (en) * 2011-05-26 2011-09-28 华为技术有限公司 Method and device for intercepting copy card notes
CN103067610A (en) * 2013-01-23 2013-04-24 广东欧珀移动通信有限公司 Method and system and mobile terminal of interception of junk short message
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system
WO2016197337A1 (en) * 2015-06-10 2016-12-15 华为技术有限公司 Short message processing method and apparatus, and electronic device
CN105357384A (en) * 2015-10-30 2016-02-24 上海卓易科技股份有限公司 Incoming call reminding method and system
CN106060799A (en) * 2016-05-16 2016-10-26 北京奇虎科技有限公司 Method and apparatus for acquiring single card with multiple communication numbers and communication device
CN107135298A (en) * 2017-04-14 2017-09-05 努比亚技术有限公司 Call blocking method and apparatus
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
骚扰电话智能拦截策略分析;谢美德,张诚;《通讯世界》;20151125(第22期);全文 *

Also Published As

Publication number Publication date
CN108684032A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
WO2017054572A1 (en) Communication method and device for dual sim, dual standby and single-pass terminal
KR101026247B1 (en) Structure of Smart-Card for Storing Multiple IMSI and IMSI Setting Method thereof
CN105916131B (en) Access control method and device
CN105406892A (en) Method and device for determining network type and mobile terminal
CN104506711A (en) Communication information processing method and device for terminal
CN108112010A (en) Access method, apparatus, terminal and the computer readable storage medium of network
CN108684032B (en) Interception setting method and related equipment
CN103561153A (en) Incoming call processing method, device and system of portable positioning device
EP2770766B1 (en) Displaying stored data while provisioning service functionalities of a mobile terminal
CN109343944B (en) Data processing method and device for eSIM card, terminal and storage medium
EP3565227B1 (en) Blacklist management method and device
CN114401492A (en) Incoming call information notification method, incoming call information notification device, call notification server, and storage medium
CN106537956B (en) User identification card control method and mobile terminal
CN113242542B (en) Network searching control method and device of mobile terminal and mobile terminal
CN105682217B (en) Network registration method, network registration device and terminal
CN108574503B (en) Setting method of interception setting option and related equipment
CN104639752A (en) Incoming call and outgoing call processing and communication method, terminal equipment and communication system
CN108833820B (en) Video call method and related product
CN106304287B (en) Method for reducing standby power consumption of mobile terminal and mobile terminal
CN115776666A (en) Network parameter configuration method and related equipment
CN107835508B (en) Method and device for displaying operator name and computer readable storage medium
CN107483750B (en) Ringtone setting method and device
CN111246020A (en) Incoming call prompting method and equipment
CN100442940C (en) Method for eliminating same wireless terminal
CN113079477B (en) Method for re-registering multi-card multi-standby terminal, multi-card multi-standby terminal and network side equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: No.18, Wusha Haibin Road, Chang'an Town, Dongguan City, Guangdong Province

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210518

CF01 Termination of patent right due to non-payment of annual fee