CN111371941A - Method and device for preventing harassing call, terminal and storage medium - Google Patents

Method and device for preventing harassing call, terminal and storage medium Download PDF

Info

Publication number
CN111371941A
CN111371941A CN201811599915.3A CN201811599915A CN111371941A CN 111371941 A CN111371941 A CN 111371941A CN 201811599915 A CN201811599915 A CN 201811599915A CN 111371941 A CN111371941 A CN 111371941A
Authority
CN
China
Prior art keywords
terminal
data set
mark
node
marking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811599915.3A
Other languages
Chinese (zh)
Inventor
刘建敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201811599915.3A priority Critical patent/CN111371941A/en
Priority to PCT/CN2019/127804 priority patent/WO2020135393A1/en
Publication of CN111371941A publication Critical patent/CN111371941A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Abstract

The embodiment of the application discloses a method and a device for preventing harassing calls, a terminal and a storage medium. The method comprises the following steps: when a terminal receives a strange call, acquiring the address of a node where a data set on a block chain is located; acquiring marking information in the data set according to the address of the node where the data set is located; and when the marking information comprises the telephone number of the unfamiliar incoming call, marking the telephone number as a crank call.

Description

Method and device for preventing harassing call, terminal and storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to but not limited to a method and a device for preventing harassing calls, a terminal and a storage medium.
Background
The blockchain is originally a mode of storing data by using encryption currencies such as bitcoin and the like, is a self-reference data structure, is used for storing a large amount of transaction information, and has the characteristics of openness, transparency, no tampering and convenience in tracing because each record is orderly linked from back to front. The concept of blockchain comes from the realization of cryptocurrency such as bitcoin, but at present, the technology is gradually applied to various fields.
In the field of mobile communication, users are always troubled by harassing calls, and a harassing call prevention method in the related technology has three common ways of harassing call identification, wherein the first way is that the users manually mark the harassing calls, and the mark only exists in the mobile phones of the users; secondly, a mobile phone manufacturer marks, and the marking method limits the brand of a mobile phone; third, cloud recognition is performed using software provided by a third party, but requires specific software support. In any of the above manners, the identification of the harassing call is affected by the factor of changing the telephone, changing the number or changing the operator, etc., which brings inconvenience to the user. The embodiment of the application provides a method for preventing harassing calls on the basis of a block chain technology so as to solve the problems.
Disclosure of Invention
In view of this, embodiments of the present application provide a method and an apparatus for preventing a nuisance call, a terminal, and a storage medium to solve at least one problem in the prior art.
The embodiment of the application provides a method for preventing harassing calls, which comprises the following steps:
when a terminal receives a strange call, acquiring the address of a node where a data set on a block chain is located;
acquiring marking information in the data set according to the address of the node where the data set is located;
and when the marking information comprises the telephone number of the unfamiliar incoming call, marking the telephone number as a crank call.
The embodiment of the application provides another method for preventing harassing calls, which comprises the following steps:
a node where a data set is located receives a marked uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
storing the marking information in a marking list;
transmitting the marker list to other terminals in the block chain.
The embodiment of the application provides a device for preventing harassing calls, which comprises:
the first acquisition unit is configured to acquire the address of a node where a data set on a block chain is located when an unfamiliar incoming call is received;
the second acquisition unit is configured to acquire the mark information in the data set according to the address of the node where the data set is located;
and the marking unit is configured to mark the telephone number as a harassing call when the marking information comprises the telephone number of the unfamiliar incoming call.
The embodiment of the application provides a device for preventing harassing calls, which comprises:
a first receiving unit configured to receive a tag uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
a holding unit configured to hold the tag information in a tag list;
a first sending unit configured to transmit the tag list to other terminals in the block chain.
The embodiment of the present application further provides a terminal for preventing harassing calls, where the terminal includes: the device comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor executes the computer program to realize the method for preventing the harassing call.
An embodiment of the present application further provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and the computer-executable instructions are configured to execute the above method for preventing harassing calls.
According to the technical scheme provided by the embodiment of the application, the incoming call identification of the mobile phone is carried out by using a block chain technology. Especially aiming at the identification of the crank call, the block chain technology is not influenced by the factors of changing a telephone, changing a number, changing an operator and the like, as long as the block chain has the recorded number, the marking information of the incoming call on the block chain can be obtained at any time and any place under the condition of having a data network so as to identify whether the incoming call is the crank call, and because the data can be used by any person and any organization in the block chain network, the alliance effect can be finally achieved, and the data can be shared.
Drawings
FIG. 1 is a schematic flow chart of an implementation of a method for preventing a harassing call according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of another implementation of a method for preventing a crank call according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of an implementation of a method for marking a crank call according to an embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating a further implementation of a method for preventing a crank call according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of a further implementation of a method for preventing a crank call according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a structure of a device for preventing harassing calls according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a structure of a still another device for preventing harassing calls according to the embodiment of the application;
fig. 8 is a schematic diagram of a hardware structure of a terminal in the embodiment of the present application.
Detailed Description
For a better understanding of the embodiments of the present application, the following terms are now explained:
the block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a digital algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. The blockchain is an important concept of virtual currency, is essentially a decentralized database and is used as the underlying technology of the virtual currency. The block chain is a series of data blocks which are associated by using a cryptographic method, and each data block contains information of one bitcoin network transaction, so that the validity (anti-counterfeiting) of the information is verified and a next block is generated.
Decentralization is a social relationship form and a content generation form formed in the internet development process, and is a novel network content production process relative to centralization. In a system having a plurality of nodes distributed throughout, each node has a highly autonomous character. The nodes can be freely connected with each other to form a new connection unit. Any node can become a phased hub, but does not have mandatory hub control functions. The influence between nodes can form a nonlinear causal relationship through the network. This open, flattened, equal system phenomenon or structure is called decentralization.
Ethereum is an open-source, common blockchain platform with intelligent contract functionality, which provides an decentralized Virtual Machine (ethernet Virtual Machine) to handle point-to-point contracts through its private cryptocurrency etherman.
EOS (Enterprise Operation System, provided by a commercial distributed blockchain operating System) is a new blockchain architecture, and aims to implement performance expansion of distributed applications.
An intelligent contract is a computer protocol intended to propagate, validate or execute contracts in an informational manner. Smart contracts allow trusted transactions to be conducted without third parties, which transactions are traceable and irreversible. All users on the blockchain can see the intelligent contracts based on the blockchain.
In the related art, the marking means of the harassing calls is generally limited by the following aspects:
firstly, limited by smart phone manufacturers, different mobile phone manufacturers can adopt different incoming call anti-harassment schemes, and no matter local storage or cloud service storage is adopted, the data can be stored in own data of the manufacturers, the mobile phones of the manufacturers are only supported to use, and users cannot use original data after replacing the mobile phones of different manufacturers.
Secondly, limited by a third-party yellow page service company, the yellow page service company can maintain relevant data based on the marks of the users, and a mobile phone manufacturer integrates the data to acquire the capability of identifying the incoming call. However, this kind of marking method has the same problem as the first aspect, and different mobile phone manufacturers may choose to integrate different yellow page contents, so that the user cannot use the original data after replacing the mobile phones of different manufacturers.
And thirdly, the data can be usually stored in the cloud by marking through the application program, and a user can log in through a mobile phone number, so that the user can use the original data even if the user changes the mobile phone. However, the disadvantage of using the application program is that the marked data is completely controlled by the operator of the application program, and although the harassing calls marked by the users can be uploaded to the cloud, other users may acquire the data only if the number of the marks reaches a certain degree. And the method has the delay of data sharing and can be even tampered by operators. In addition, data of different application programs cannot be shared, and efficient and accurate identification cannot be achieved.
The following is illustrated with reference to the examples:
the embodiment of the application provides a method for preventing harassing calls, the method is used in a terminal, the terminal can be a computer or a mobile intelligent device, the computer or the mobile intelligent device can identify harassing call numbers by using a block chain technology when executing the method, and the method is not influenced by changing a telephone, changing numbers or changing operators, the functions realized by the method can be realized by calling program codes through a processor in the terminal, of course, the program codes can be stored in a storage medium readable by the computer, and the terminal at least comprises the processor and the storage medium.
Fig. 1 is a schematic flow chart of an implementation process of a method for preventing a harassing call according to an embodiment of the present application, and as shown in fig. 1, the method includes:
step S101, when a terminal receives a strange call, acquiring an address of a node where a data set on a block chain is located;
in practical application, the data set may be an intelligent contract in a block chain, and the terminal acquires an address of the intelligent contract so as to implement marking of a harassing call by the intelligent contract subsequently. In this embodiment, when a terminal receives an unfamiliar incoming call, whether the unfamiliar incoming call is a harassing call is judged through a blockchain, and actually, under the condition that the unfamiliar incoming call is not received, the marking information of the harassing call recorded in an intelligent contract can be obtained through the intelligent contract in the blockchain and downloaded to the local; when an unfamiliar incoming call is received, whether the incoming call number is a crank call can be known by searching the local record.
Step S102, acquiring mark information in the data set according to the address of the node where the data set is located;
the terminal acquires the mark information recorded in the intelligent contract according to the intelligent contract address in the block chain. The tagging information here is used to tag telephone numbers that have been identified as nuisance calls. The tag information comprises a telephone number, when the terminal receives an unfamiliar call, the telephone number of the unfamiliar call is found in the tag information, and the telephone number is considered as a crank call. Other characteristic attributes related to the telephone number, such as region, type, etc., may also be included in the tagging information, and the time of tagging, the number of times of tagging, etc. may also be included in the tagging information. The information can be provided to the terminal by the intelligent contract, and when the terminal receives an unfamiliar call, the user can determine whether to answer the call by marking the content in the information.
And step S103, when the mark information comprises the telephone number of the unfamiliar incoming call, marking the telephone number as a crank call.
The tag information may include various telephone numbers that have been marked as harassing calls, when the terminal receives an unfamiliar incoming call, the telephone number of the unfamiliar incoming call may be searched for in the tag information, and when the telephone number can be found in the tag information, it is described that the telephone number has been marked as a harassing call, and at this time, the terminal marks the telephone number as a harassing call, and the terminal may also perform corresponding operations on the telephone number. For example, the number is directly displayed as a crank call on a display interface during incoming call to remind the user; it can also be set to directly reject automatically or mask automatically an incoming call, etc. And when the telephone number of the strange incoming call cannot be found in the marking information, the telephone number is not marked as a harassing call, and at the moment, the terminal can not perform operations such as reminding and the like.
In other embodiments, the tag information includes a phone number and a tag time; the acquiring the mark information in the data set according to the address of the node where the data set is located includes:
step S102a, downloading a mark list in the data set according to the address of the node where the data set is located; wherein the tag list includes at least one item of the tag information;
step S102b, obtaining the label information from the label list.
The intelligent contract in the block chain records all the marked information marked with the crank call in the mark list, and the terminal downloads the mark list first and acquires the mark information through the mark list. The tag information here includes a telephone number and a tag time, and since the telephone number recorded in the tag information is a telephone number tagged as a nuisance call, it is possible to record only the tagged telephone number without recording other information, or to record other related information such as the tag time.
In practical application, the terminal can download the mark list in the intelligent contract periodically, and can also download the mark list in the intelligent contract when an unfamiliar call is received. After the terminal downloads the mark list, the downloaded data or repeated data can be deleted, so that the memory space is saved.
An embodiment of the present application provides another method for preventing a harassing call, as shown in fig. 2, where the method includes:
step S201, when a terminal receives a strange call, acquiring an address of a node where a data set on a block chain is located;
step S202, the terminal acquires mark information in the data set according to the address of the node where the data set is located;
step S203, when the marking information comprises the telephone number of the unfamiliar incoming call, the terminal marks the telephone number as a crank call;
step S204, when the terminal determines that the unfamiliar incoming call is a crank call, a marked uplink instruction is sent to a node where the data set is located according to the address of the node where the data set is located; wherein the tag _ UpLink instruction includes tag information.
The terminal determines that the unfamiliar incoming call is a harassing call, the unfamiliar incoming call can be judged as a harassing call by the user according to the call content after answering the call, or judged as a harassing call according to the identification results of the steps S201 to S203, or judged as a harassing call according to the experience of the user or other ways. No matter how the strange incoming call is determined as a crank call, the strange incoming call can be actively marked as a crank call and uploaded to the block chain for other terminals to use.
The terminal uploads the time including the telephone number to be marked and the mark to the block chain, namely, a uplink command is sent to the intelligent contract address of the block chain, and after the intelligent contract on the block chain receives the uplink command, the mark information is stored in a mark list of the intelligent contract. At this time, the terminal completes the uplink of the harassing call sign. The terminal of each node in the block chain can perform the marking operation, and the sharing of the marking information is realized.
In other embodiments, the method further comprises:
step S11, the terminal generates account information according to the address of the digital wallet and the account password;
step S12, when the terminal sends the marking uplink instruction to the node where the data set is located, paying the token in the digital wallet according to the address of the digital wallet; wherein the marked uplink command further includes the account information.
In order to prevent the user from maliciously tagging the phone number, an anti-malicious mechanism needs to be introduced. Here, it is implemented using digital currency in the blockchain. The user can register an account for using the harassing call function on the blockchain, and the user registers according to the digital wallet information in the blockchain and the set account password. Here, the terminal generates account information from the digital wallet information and the account password.
When the terminal needs to mark a crank call, the account information needs to be uploaded to an intelligent contract in the block chain together through a mark uplink command, and the intelligent contract deducts a certain token according to the account information. That is, by restricting the marking of a harassing call by paying a token, it is possible to prevent a malicious marking to some extent.
Of course, to encourage users to mark true nuisance calls, a degree of reward may be applied to the user based on the quality of the user mark to offset tokens paid out by the user mark. Corresponding rewards can be made according to the number of times the marked telephone number is marked by other people, for example, if one telephone number is marked as a harassing call by a plurality of people, the first person marking the telephone number can obtain the reward; for another example, when a telephone number is marked as a nuisance call by a terminal, all users who have previously marked the same telephone number may receive a corresponding reward.
In other embodiments, the method further comprises:
step S13, when the terminal determines that the strange incoming call is not a crank call, sending an anti-tag uplink instruction to the node where the data set is located according to the address of the node where the data set is located; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time.
In order to prevent the non-crank telephone numbers from being marked or the original crank telephone numbers from being used by others and no longer being crank telephones, it is necessary to perform a reverse marking in the blockchain to mark the corresponding telephone numbers as non-crank telephones. Here, an anti-tag uplink command is sent to the smart contract in the blockchain in a method similar to the tagging of the crank call, and the anti-tag uplink command further comprises an anti-tag identifier besides the telephone number and the tag time, and the anti-tag identifier is used for indicating that the telephone number is tagged as a non-crank call.
The embodiment of the application provides a method for preventing harassing calls, which is applied to intelligent contracts of block chains, and as shown in fig. 3, the method comprises the following steps.
Step S301, a node where a data set is located receives a marked uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
step S302, the data set stores the marking information in a marking list;
step S303, transmitting the mark list to other terminals in the block chain.
The node where the data set is located is the node where the intelligent contract in the block chain is located. And the intelligent contract records the marked telephone number and the marked time according to the marked uplink command sent by the first terminal. And generating marking information according to the telephone numbers and the marking time, namely, forming a piece of marking information by each marked telephone number and the time (namely, the marking time) of the corresponding uploading marking uplink instruction, establishing a marking list by the intelligent contract, and storing each piece of marking information in the marking list. The intelligent contract adds a new piece of marking information to the marking list every time the intelligent contract receives the new piece of marking information.
When the terminal downloads the mark list or when the mark list is updated, the intelligent contract sends the mark list to the terminals of all the nodes of the block chain, so that the terminals on the block chain share the mark information. Here, the update of the tag list may be a periodic update, or may be an update when the intelligent contract acquires tag information of a new uplink. When a new marking information cochain exists and a marking list is carried out, the intelligent contract sends the updated marking list to the terminal of each node; or when a terminal requests to download the mark list, the intelligent contract sends the current mark list to the terminal; the tag list may also be sent to the terminals of the respective nodes periodically.
In other embodiments, the marked uplink instruction further comprises: an address of a digital wallet of the first terminal; the method further comprises the following steps:
and step S21, deducting the token from the digital wallet of the first terminal by the node where the data set is located according to the address of the digital wallet of the first terminal.
Here, the node where the data set is located, that is, the smart contract on the block chain, may obtain, according to the marked uplink instruction sent by the first terminal, the digital wallet address corresponding to the account information of the first terminal. In order to prevent malicious signature nuisance calls, when a new uplink command is received by the smart contract, certain tokens are deducted according to the address of the digital wallet. The token can be digital currency, real currency, cash voucher, coupon or other reward and punishment mechanism.
In other embodiments, the method further comprises:
step S22, the node where the data set is located determines, according to the tag uplink command, that the phone number in the tag uplink command is tagged by the second terminal before the current tagging time and is stored in the tag list;
and step S23, transmitting a reward token to the digital wallet of the second terminal according to the mark uplink instruction transmitted by the second terminal.
To encourage users to mark nuisance calls, it is desirable to give appropriate rewards to high quality marks. The reward criteria herein may be used to assess the quality of the token by the number of times the telephone number is re-signed by another terminal after the token. When the first terminal marks, the intelligent contract can search whether the telephone number is marked before the marking according to the marking time, and if the telephone number is marked by the second terminal, the intelligent contract rewards the second terminal. Thus, the earliest marked terminal, the user of which receives the most reward, can receive the most reward. Of course, it is also possible to award the second terminal only once, for example, when the number of times that the telephone number marked by the second terminal is marked by the other terminal after the marking time reaches a certain number, the award is given to the second terminal.
The rewarding form can still issue a rewarding token to the digital wallet corresponding to the rewarded terminal through the digital wallet and the intelligent contract, so that on one hand, the token consumed during marking can be offset, and the situation that the marking of a harassing call by a user is negative is avoided; on the one hand, additional rewards can be obtained, giving rewards for high quality marks.
In other embodiments, the method further comprises:
step S31, the node where the data set is located receives the anti-tag uplink command sent by the first terminal; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time;
step S32, respectively counting the marked times N and the unmarked times M of the telephone number according to the unmarked uplink command; wherein N and M are positive integers greater than or equal to 0;
and step S33, when M is larger than or equal to N, deleting all the mark information with the telephone number from the mark list.
In order to prevent someone from maliciously tagging their own telephone number, or telephone numbers that were once tagged as nuisance calls are no longer nuisance calls, for example, the operator has been re-released for use by other users. Then the number cannot be made to exist in the tag information of the blockchain as a crank call all the time, and is permanently identified as a crank call. Here, an anti-tagging strategy is proposed to prevent a number from being permanently identified as a nuisance call.
When a user marks through a terminal, the user can be divided into a mark and an anti-mark, the mark uplink instruction is used for uploading the telephone number marked as a harassing call to the block chain, and the anti-mark uplink instruction is used for uploading the telephone number of a non-harassing call to the block chain. The anti-tag _ UL instruction can be distinguished from the tag _ UL instruction by carrying an anti-tag flag. For example, a 0 bit is added after the telephone number as the anti-tag identification. It is also possible to add different identifiers to the tag uplink command and the anti-tag uplink command, for example, in the tag uplink command, a bit 1 is added after the telephone number as the identifier of the harassing call, and in the anti-tag uplink command, a bit 0 is added after the telephone number as the identifier of the non-harassing call.
When the anti-marking times of the same telephone number are larger than or equal to the marking times, the intelligent contract automatically determines the telephone number as a non-harassing call and deletes all the marking information of the telephone number in the current marking list, so that the telephone number cannot be found in the marking information acquired by the terminal and cannot be identified as a harassing call. The smart contract may provide token rewards to the terminal account providing the anti-branding to encourage the user's anti-branding behavior, facilitating sufficient data volume to ensure the accuracy of the branding.
In practical application, the marking information in the marking list may not be deleted, the intelligent contract records the times of marking and inversely marking the same telephone number, and both the times of marking are provided to the terminal, and the terminal may decide which kind of processing is performed on the telephone number according to the data provided by the intelligent contract.
The embodiment of the application provides a method for preventing harassing calls, which is suitable for a smart phone terminal, wherein the smart phone terminal is required to have a data connection function such as a wireless network or WIFI. As shown in fig. 4, the method comprises the steps of:
step S401, storing an intelligent contract on a block chain network;
the intelligent contract can be regarded as a data set, which mainly realizes the following three functions:
the intelligent contract management method comprises the steps that firstly, all marking information is used for being collected, and the marking information of a user is sent to a contract address of an intelligent contract;
and secondly, the intelligent contract is used for providing a query service, and a user can query all the mark records and the mark number information through the contract address of the intelligent contract.
Third, the smart contract may also include a digital wallet address that rewards the user based on the user's token and the validity of the token.
The intelligent contract address can be preset by the terminal, and can also be published through media such as official networks, specifications and the like for users to obtain and use.
And S402, setting a menu in the call record of the terminal, wherein the menu comprises the digital wallet address, the password and the intelligent contract address of the user.
Here, the digital wallet address requires the user to apply for, and if the mobile phone has the wallet function, the wallet address on the mobile phone can be directly used, and the wallet address is used for transmission verification to ensure interaction with the smart contract on the blockchain.
Step S403, the terminal automatically downloads the existing marking information from the intelligent contract address through the network;
the mark information can include mark number and mark time, if downloaded, the latest mark information after the mark time of the last mark can be automatically downloaded and stored in a local specific directory, and redundant information is deleted by statistically combining the downloaded mark information, so that the occupation of local space is reduced.
Step S404, the terminal records the marked data in the mark information according to the mark of the user;
the uplink refers to that after the user marks successfully, the terminal automatically sends an instruction to the intelligent contract address, and the instruction contains information such as the initiating time of the instruction, the intelligent contract address, the digital wallet address of the user, transmission cost, number and the like. Here, the transmission can be performed only in the WIFI network, and also in both the WIFI network and the data network.
Step S405, when the terminal receives an incoming call, the terminal inquires local marking information, checks whether the number is marked as a crank call, and if the number is marked, the number is displayed as a crank call.
In other embodiments, a particular token (token) in the user's digital wallet is deducted when the token information is uplinked after the user has signed on the terminal.
Here, the user needs to consume a certain token for each marking. The purpose is to prevent the user from marking the number uplink at will, i.e. to prevent rules for malicious marking.
In other embodiments, after the user marks on the terminal, whether other users mark the same number is judged, and if so, the token is automatically returned to the user through the intelligent contract to be used as the reward. For example, when user a marks a number a, user a consumes the token when marked, the subsequent system finds that user B also marks the same number a, and user B consumes the token but gives user a reward; when user C also marks number a, user C consumes the token, giving user A and user B a reward. Alternatively, to better enhance the accuracy of the marking, a reward may be given when the marking reaches a certain amount. For example, user a marks number a, and when other N users all mark number a subsequently, user a is given a certain reward. If no one has marked the number a again, the user a will not receive any more rewards. This is done to encourage users to actively participate in the tagging collaboration to prevent nuisance calls, and to prevent malicious tagging of users.
In other embodiments, in order to prevent the user from randomly marking or unmarking, or in order to prevent the marked number from being used by the harasser and released to the normal user by the operator, the terminal provides an anti-marking function, and the anti-marked number is also linked with corresponding information. For example, when a crank call is marked, the number information sent in uplink is 13900000000_1_0, wherein the first 11 digits are marked telephone numbers, and the middle 1 represents marked crank calls; when the number tag is cancelled, the number information sent by the uplink is 13900000000_0_1, and the last 1 represents the anti-tag. The intelligent contract automatically counts each number in real time, and the terminal can be called or downloaded for use. When the counted number of times of anti-marking is larger than or equal to the marked number, the terminal side can automatically set the number as a non-harassing call.
By the method in the embodiment, when the terminal refreshes the version, or changes the mobile phone, the operator and the like, the intelligent contract is logged in again through the account and the password to obtain the intelligent contract address and the digital wallet address. Therefore, the marking content of the anti-harassing call is not restricted by the replacement of the mobile phone, the operator or the application program, and the union effect of the anti-harassing call is achieved.
The embodiment of the present application provides another method for preventing a harassing call, as shown in fig. 5, the method includes the following steps:
step S501, the terminal sets the digital wallet address, the password and the intelligent contract address of the user through the call record setting menu;
step S502, the terminal downloads all the mark number information associated with the intelligent contract address to a local directory according to a predefined rule;
step S503, the terminal carries out merging statistical processing on the downloaded data and deletes redundant information to reduce the occupation of space;
step S504, the terminal selects the number in the call record to be marked as a crank call, or carries out reverse marking;
the anti-marking means that the terminal selects the number in the call record and marks the number as a non-harassing call;
step S505, the terminal sends a chaining instruction to the intelligent contract address, wherein the instruction comprises the information of the instruction initiating time, the intelligent contract address, the user digital wallet address, the transmission cost, the number and the like;
step S506, the intelligent contract stores the related content in the received uplink command in the blockchain network;
step S507, the intelligent contract awards the token reward to the terminal according to the reward rule.
In this embodiment, when the terminal side receives an unfamiliar incoming call, the incoming call anti-harassment needs to be realized according to the following steps:
step S41, when the terminal receives an unfamiliar call, all the marking information under the local directory is inquired;
step S42, the terminal judges whether the label information has a record that the strange incoming call number is labeled as a harassing call;
step S43, if the record that the unfamiliar incoming call number is marked as a harassing call exists in the marking information, the unfamiliar incoming call number is displayed as a harassing call;
and step S44, if no strange incoming call number record of the number exists in the marking information, the number is not processed, and the incoming call state is displayed normally.
According to the method and the device, identification of the incoming call number can be guaranteed by using the block chain technology, particularly identification of a crank call can be free from influences of factors such as changing a telephone number, changing a number, changing an operator and the like, and as long as the block chain has the recorded number, the marking information of the incoming call on the block chain can be acquired anytime and anywhere under the condition of a data network so as to identify whether the incoming call is a crank call or not, and the data can be used by any person or any mechanism on the block chain, so that a union effect, namely data sharing is achieved finally. The block chain network adopted in the embodiment of the application can be an existing block chain network, such as Ethereum or EOS, or a newly built block chain network.
The embodiment of the application also provides a device for preventing the harassing call, which comprises all the units and all the modules included by all the units, and can be realized by a processor in the terminal; of course, it may also be implemented by logic circuitry; in implementation, the processor may be a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
Fig. 6 is a schematic structural diagram of a device for preventing harassing calls according to an embodiment of the present application, and as shown in fig. 6, the device 600 includes:
a first obtaining unit 601, configured to obtain an address of a node where a data set is located on a block chain when an unfamiliar incoming call is received;
a second obtaining unit 602, configured to obtain, according to an address of a node where the data set is located, tag information in the data set;
a marking unit 603 configured to mark the telephone number as a harassing call when the marking information includes the telephone number of the unfamiliar incoming call.
In other embodiments, the tagging information includes a phone number and a tagging time;
the second acquisition unit includes: the downloading module is configured to download the mark list in the data set according to the address of the node where the data set is located; wherein the tag list includes at least one item of the tag information;
an obtaining module configured to obtain the tag information from the tag list.
In other embodiments, the apparatus further comprises: the first sending unit is configured to send a marked uplink instruction to a node where the data set is located according to the address of the node where the data set is located when the unfamiliar incoming call is determined to be a crank call; wherein the tag _ UpLink instruction includes tag information.
In other embodiments, the apparatus further comprises: a generating unit configured to generate account information according to an address of the digital wallet and an account password; the payment unit is configured to pay the tokens in the digital wallet according to the address of the digital wallet when the node where the data set is located sends the tag uplink instruction; wherein the marked uplink command further includes the account information.
In other embodiments, the apparatus further comprises: the second sending unit is configured to send an anti-tag uplink instruction to the node where the data set is located according to the address of the node where the data set is located when the unfamiliar incoming call is determined not to be a harassing call; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time.
The embodiment of the application also provides another device for preventing harassing calls, and each unit included in the device and each module included in each unit can be realized by a processor in the terminal; of course, it may also be implemented by logic circuitry; in implementation, the processor may be a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
Fig. 7 is a schematic structural diagram of a device for preventing harassing calls according to an embodiment of the present application, and as shown in fig. 7, the device 700 includes:
a first receiving unit 701, configured to receive a tag uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
a generating unit 702 configured to generate tag information according to the phone number and the tag time, and store the tag information in a tag list;
a first sending unit 703 configured to transmit the tag list to other terminals in the block chain.
In other embodiments, the marked uplink instruction further comprises: an address of a digital wallet of the first terminal;
the device also includes:
and the deduction unit deducts the token from the digital wallet of the first terminal according to the address of the digital wallet of the first terminal.
In other embodiments, the apparatus further comprises:
a determining unit, configured to determine, according to the tag uplink instruction, that the telephone number in the tag uplink instruction is tagged by the second terminal before the current tagging time and is stored in the tag list;
and the second sending unit is configured to send a reward token to the digital wallet of the second terminal according to the mark uplink instruction sent by the second terminal.
In other embodiments, the apparatus further comprises:
a second receiving unit, configured to receive an anti-tag uplink command sent by the first terminal; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time;
the counting unit is configured to count the marked times N and the anti-marked times M of the telephone number respectively according to the anti-marked uplink instruction; wherein N and M are positive integers greater than or equal to 0;
a deleting unit configured to delete all the tag information with the phone number from the tag list when the M is greater than or equal to N.
The above description of the apparatus embodiments, similar to the above description of the method embodiments, has similar beneficial effects as the method embodiments. For technical details not disclosed in the embodiments of the apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It should be noted that, in the embodiment of the present application, if the method for preventing harassing calls is implemented in the form of a software functional module and is sold or used as a standalone product, it may also be stored in a computer-readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially implemented in the form of a software product, which is stored in a storage medium and includes several instructions to enable a terminal (which may be a personal computer, a mobile terminal, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
Correspondingly, the terminal for preventing the crank call comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor executes the program to realize the steps in the method for preventing the crank call provided by the embodiment.
Correspondingly, the embodiment of the application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps in the method for preventing harassing calls provided by the above embodiment.
Here, it should be noted that: the above description of the storage medium and device embodiments is similar to the description of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It should be noted that fig. 8 is a schematic diagram of a hardware structure of a terminal in an embodiment of the present application, and as shown in fig. 8, a hardware entity of the terminal 800 includes: a processor 801, a communication interface 802, and a memory 803, wherein
The processor 801 generally controls the overall operation of the terminal 800.
The communication interface 802 may enable the terminal to communicate with other terminals or servers via a network.
The Memory 803 is configured to store instructions and applications executable by the processor 801, and may also buffer data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or already processed by the processor 801 and modules in the terminal 800, and may be implemented by a FLASH Memory (FLASH) or a Random Access Memory (RAM).
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application. The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially implemented in the form of a software product, which is stored in a storage medium and includes several instructions to enable a terminal (which may be a personal computer, a mobile terminal, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. A method of preventing crank calls, the method comprising:
when a terminal receives a strange call, acquiring the address of a node where a data set on a block chain is located;
acquiring marking information in the data set according to the address of the node where the data set is located;
and when the marking information comprises the telephone number of the unfamiliar incoming call, marking the telephone number as a crank call.
2. The method according to claim 1, wherein the obtaining the tag information in the data set according to the address of the node where the data set is located comprises:
downloading a mark list in the data set according to the address of the node where the data set is located; wherein the tag list includes at least one item of the tag information;
and acquiring the mark information from the mark list.
3. The method of claim 1, further comprising:
when the terminal determines that the unfamiliar incoming call is a harassing call, a marked uplink instruction is sent to a node where the data set is located according to the address of the node where the data set is located; wherein the tag _ UpLink instruction includes tag information.
4. The method of claim 3, further comprising:
the terminal generates account information according to the address of the digital wallet and the account password;
when the terminal sends the mark uplink command to the node where the data set is located, paying the token in the digital wallet according to the address of the digital wallet; wherein the marked uplink command further includes the account information.
5. The method of claim 3, further comprising:
when the terminal determines that the unfamiliar incoming call is not a harassing call, an anti-mark uplink instruction is sent to a node where the data set is located according to the address of the node where the data set is located; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time.
6. A method of preventing crank calls, the method comprising:
a node where a data set is located receives a marked uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
storing the marking information in a marking list;
transmitting the marker list to other terminals in the block chain.
7. The method of claim 6 wherein said marked uplink command further comprises: an address of a digital wallet of the first terminal;
the method further comprises the following steps:
and deducting the token from the digital wallet of the first terminal by the node where the data set is located according to the address of the digital wallet of the first terminal.
8. The method of claim 7, further comprising:
the node where the data set is located determines that the telephone number in the marked uplink instruction is marked by the second terminal before the current marking time and is stored in the mark list according to the marked uplink instruction;
and sending a reward token to the digital wallet of the second terminal according to the mark uplink instruction sent by the second terminal.
9. The method of claim 6, further comprising:
a node where a data set is located receives an anti-mark uplink instruction sent by a first terminal; wherein, the anti-mark uplink command comprises a telephone number, an anti-mark identifier and a mark time;
according to the anti-marking uplink command, respectively counting the marked times N and the anti-marked times M of the telephone number; wherein N and M are positive integers greater than or equal to 0;
and when the M is greater than or equal to the N, deleting all the marking information with the telephone number from the marking list.
10. An apparatus for preventing nuisance calls, said apparatus comprising:
the first acquisition unit is configured to acquire the address of a node where a data set on a block chain is located when an unfamiliar incoming call is received;
the second acquisition unit is configured to acquire the mark information in the data set according to the address of the node where the data set is located;
and the marking unit is configured to mark the telephone number as a harassing call when the marking information comprises the telephone number of the unfamiliar incoming call.
11. An apparatus for preventing nuisance calls, said apparatus comprising:
a first receiving unit configured to receive a tag uplink command sent by a first terminal in a block chain; the tag _ UL instruction comprises tag information;
a holding unit configured to hold the tag information in a tag list;
a first sending unit configured to transmit the tag list to other terminals in the block chain.
12. A terminal, characterized in that the terminal comprises: memory storing a computer program operable on a processor, the processor implementing a method of preventing crank calls as provided in any of claims 1 to 9 when executing the computer program.
13. A computer-readable storage medium having computer-executable instructions stored thereon, the computer-executable instructions configured to perform the method for preventing crank calls as provided by any of claims 1 to 9.
CN201811599915.3A 2018-12-26 2018-12-26 Method and device for preventing harassing call, terminal and storage medium Pending CN111371941A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811599915.3A CN111371941A (en) 2018-12-26 2018-12-26 Method and device for preventing harassing call, terminal and storage medium
PCT/CN2019/127804 WO2020135393A1 (en) 2018-12-26 2019-12-24 Nuisance call prevention method and device, terminal, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811599915.3A CN111371941A (en) 2018-12-26 2018-12-26 Method and device for preventing harassing call, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN111371941A true CN111371941A (en) 2020-07-03

Family

ID=71125695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811599915.3A Pending CN111371941A (en) 2018-12-26 2018-12-26 Method and device for preventing harassing call, terminal and storage medium

Country Status (2)

Country Link
CN (1) CN111371941A (en)
WO (1) WO2020135393A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979378A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Incoming call processing method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116437349B (en) * 2023-06-13 2023-09-05 武汉博易讯信息科技有限公司 Method, device, equipment and medium for controlling access to mobile network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107851111A (en) * 2015-05-05 2018-03-27 识卡公司 Use the identity management services of block chain
CN109067824A (en) * 2018-06-12 2018-12-21 东方银谷(北京)投资管理有限公司 User information processing method and processing device based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979378A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Incoming call processing method and device
CN114979378B (en) * 2022-05-07 2023-11-10 中移互联网有限公司 Incoming call processing method and device

Also Published As

Publication number Publication date
WO2020135393A1 (en) 2020-07-02

Similar Documents

Publication Publication Date Title
US20210334856A1 (en) Telecommunications call augmentation system
CN109102269B (en) Transfer method and device based on block chain, block chain node and storage medium
US20170031874A1 (en) Blockchain and deep links for mobile apps
JP5399553B2 (en) Method, apparatus and computer program product for invoking an application service for local communication
CN106934615B (en) Payment and service processing method and device based on mobile terminal bar code
EP2538641A1 (en) Secure tag management method and system
CN107979525A (en) A kind of red packet distribution method, equipment and medium
US20200257749A1 (en) Method and a device for friend recommendation
US9137649B2 (en) Short code management for messaging campaigns
CN108509806A (en) A kind of big data precision marketing system and equipment with secret protection
CN110599349A (en) Data processing method based on block chain network, related equipment and storage medium
CN111371941A (en) Method and device for preventing harassing call, terminal and storage medium
CN102122378A (en) Method, device and system for issuing electronic coupons
CN110955905A (en) Block chain based asset transfer method, device, equipment and readable storage medium
CN104766231A (en) Real-time communication information transmission method for the same commodity
WO2021038945A1 (en) Digital currency exchange device, digital currency exchange method, and digital currency exchange system
CN111026926A (en) Data processing method, device, equipment and storage medium
CN116303250A (en) Accounting archive data management method and device, electronic equipment and medium
CN108234471A (en) Enter group verification method, device, computer installation and computer readable storage medium
CN102999570B (en) The Off-line control method of application program critical data and system in mobile equipment
WO2016079539A1 (en) Telecommunications call augmentation system
US20140019837A1 (en) Online document distribution method and system for moble device
KR20150063613A (en) System and method for managing online business card
CN111291335B (en) Bill data processing method and device, computer equipment and storage medium
US10129411B1 (en) System and method of enhancing a mobile device upgrade offer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination