CN101184264A - Mobile phone telephone and message anti-disturbance and private communication method and system - Google Patents

Mobile phone telephone and message anti-disturbance and private communication method and system Download PDF

Info

Publication number
CN101184264A
CN101184264A CNA200710178179XA CN200710178179A CN101184264A CN 101184264 A CN101184264 A CN 101184264A CN A200710178179X A CNA200710178179X A CN A200710178179XA CN 200710178179 A CN200710178179 A CN 200710178179A CN 101184264 A CN101184264 A CN 101184264A
Authority
CN
China
Prior art keywords
note
user
multimedia message
message
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710178179XA
Other languages
Chinese (zh)
Inventor
李锋
党劲峰
邹仕洪
林宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Netqin Technology Co Ltd
Original Assignee
Beijing Netqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Netqin Technology Co Ltd filed Critical Beijing Netqin Technology Co Ltd
Priority to CNA200710178179XA priority Critical patent/CN101184264A/en
Publication of CN101184264A publication Critical patent/CN101184264A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a processing method and the system of anti-harassment of mobile phone calls and messages and private communication, which is as follow: when grouping the contacts in the mobile phone address list according to different classes, a private group of private communicating contacts is added, and different scene modes of the user are set; when receiving a mobile phone call or a message (text message, multimedia message), depending on the grouping sort of the contact of the incoming call or the message or the multimedia message, and the current scene of the user, together with the behavior characteristics of the harassing call and the spam message with the database information of the public harassing message issued by the authoritative institution or obtained from social statistics, the corresponding process to the call, the message and the multimedia message of the mobile phone is executed to reduce harassment; meanwhile the communication records of incoming, dialed calls and message, multimedia message with the contacts in the private grouping are encrypted and preserved to protect the personal privacy of the user. The invention has the advantages of adopting the operating steps of uniform process, and resolving synthetically the harassment of calls, messages and multimedia messages for the mobile phone and the private protection.

Description

The method and system of a kind of mobile portable phone and message anti-disturbance and private communication
Technical field
The present invention relates to the method and system of a kind of mobile portable phone and message anti-disturbance and private communication, belong to the technical field of mobile communication and information security.
Background technology
Along with developing rapidly of microelectronics, computer and wireless communication technology, the style of mobile phone and function are brought in constant renewal in, are enriched, and the mobile phone popularity rate in town and country is at home improved rapidly.Now, mobile phone has more and more become the indispensable communication tool of people, and meanwhile, the harassing and wrecking problem on the mobile phone is also more serious.Various harassing calls and rubbish message (comprising note, multimedia message) are often perplexing people lives normally, in addition, the leakage problem of individual privacies such as mobile phone information (note, multimedia message), phone, also of common occurrence.Therefore, people's product and technology of needing filtration harassing call/message (note, multimedia message) badly, carrying out secret protection.
At present, some cell phone softwares have been developed, to adapt to user's request and its rights and interests of protection to sending a telegram here and coming note or multimedia message to filter and protect privacy.But, all there are certain limitation in these products or technology, its common drawback is poor accuracy, can't utilizes social knowledge and harassing call and junk information feature to help the user to carry out the anti-clutter judgement, can not satisfy privacy demand of user individual or the like.
For example, after the official website of retrieval Patent Office of the People's Republic of China, inquire following patent application about interception or filtration harassing call and refuse messages and user mobile phone privacy information protection.Wherein, the patent application of Barassment preventing telephone is: " method of incoming call filter and electronics dress "<publication number CN1885873 〉, be characterized in: particular contact is provided with the corresponding incoming call handling rule according to the period.Anti-refuse messages related application is: " based on the garbage information filtering method and the filter thereof of mobile radio communication "<publication number 1777212 〉, be characterized in: this method only is according to the given filter contact person, or short message is simply classified realize filtering." a kind of method of screening SMS "<publication number 1909683 〉, be characterized in: this method only is to realize short message filtering according to key-strings.The method of short message " mobile phone rejection "<publication number 1545355 〉, be characterized in: this method only is to have realized short message filtering to particular contact according to being provided with of address list." method of mobile phone isolating unwanted receiving messages automatically "<publication number 1700712 〉, be characterized in: this method only is the setting according to address list, such as blacklist is set, realizes the short message filtering to particular contact." a kind of short message filter method "<publication number 1863237 based on cell phone address book 〉, be characterized in: this method has also just realized short message filtering to particular contact according to being provided with of address list.The related application of user mobile phone protection privacy information is: " information encryption system and method "<publication number 1738453 〉; be characterized in: this method is carried out encryption when only cellphone information is deposited in this locality, does not relate to the incoming call of the application's solution and the privacy protection problem of SMS communication process.
In sum, these prior aries are all fairly simple to the anti-clutter treatment technology of mobile portable phone and note, multimedia message, and effect is difficult to satisfactory.Such as, the filter method of refuse messages, garbage multimedia messages is very simple: mainly filter by refuse messages, the garbage multimedia messages that preestablishes based on keyword, or filter based on refuse messages, the garbage multimedia messages of the default phone number of simple user.And for example, IN-Fusio incoming call and short message fire compartment wall, this equipment only can filter the note that blacklist is sent simply by the blacklist of phone number is set.In fact, because refuse messages and garbage multimedia messages source are constantly to change, this filter effect is very poor.For the filtration of harassing call, also be to adopt fairly simple blacklist mechanism, need the user to be provided with after, just can filter out the phone that the user has been made as blacklist.
Moreover, prior art does not have to introduce the knowledge can help the user to distinguish whether to be harassing call/message (note, multimedia message) (comprise common harassing call set of numbers, doubtful harassing call judgment rule and at the analysis of note, MMS content), arrive such as an incoming call, if can tell the user that this is a phone from " XX insurance company ", the user just can determine whether answering this phone according to this information and present located sight (such as meeting, rest etc.).For another example, a ticket booking note from ctrip.com, the ticket booking note shortcode (supposition is AAA) of taking journey is a kind of knowledge, can be used in the identification of refuse messages or multimedia message.Simultaneously, prior art is not introduced the behavioural characteristic of harassing call and refuse messages yet, to improve the precision of anti-clutter.Such as, the incoming call of a strangeness numbers only jingle bell was just hung up in 1 second, then was likely doubtful harassing call.
In addition, in the firewall system of traditional mobile portable phone and note, multimedia message, do not carry out specialized designs, do not take all factors into consideration the unified personal secrets problem of people yet at aspects such as mobile portable phone and note, multimedia messages for people's communication privacy.When the user changes mobile phone or refitting mobile phone operating system, all kinds of service logic information such as black and white lists, filtering policy all can not be carried, the user must re-enter these data in new cell-phone or new mobile portable phone, note, MMS system, this process is very loaded down with trivial details, complicated, even the professional person also is very much thorny.
Summary of the invention
In view of this; the method and system that the purpose of this invention is to provide a kind of mobile portable phone and message (comprising note, multimedia message) anti-clutter and private communication; this method adopts unified structural framing and the operating procedure of handling; comprehensive mobile portable phone and message (comprising note, multimedia message etc.) harassing and wrecking and the secret protection problem thereof of solving; and can make that these business are well continued when the user changes mobile phone, the present invention is based on Same Way and realize two big functions.
In order to achieve the above object, the invention provides a kind of mobile portable phone and message (note, multimedia message) method of anti-clutter and private communication, it is characterized in that: in cell phone address book, according to different classes of when the contact person is divided into groups, set up private communication contact person's secret grouping, and the residing different contextual models of user are set, when receiving cell phone incoming call or note, multimedia message, according to this incoming call or note, the packet class and the current sight of living in of user of contact person's ownership of multimedia message, and in conjunction with harassing call and refuse messages, the behavioural characteristic of garbage multimedia messages and by authoritative institution issue or the known harassing and wrecking information data library information that obtains by social statistics, to this mobile portable phone and refuse messages, garbage multimedia messages is carried out corresponding handling process, to reduce harassing and wrecking; Simultaneously to secret grouping in the coming, go phone and come, go the log of note and multimedia message to carry out encrypting storing, of contact person with protection individual subscriber privacy.
Described method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: address book contact is divided into groups, contextual model is set, create privacy mode, enter or dispose privacy mode; Above-mentioned deploy content is optional, and order can be adjusted;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come note, come multimedia message and remove electricity, go note, go the system class incident of multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
In order to achieve the above object, the present invention also provides a kind of network system that is used to realize the method for above-mentioned mobile portable phone and message (note, multimedia message) anti-clutter and private communication, comprising: wireless communication networks, base station, portable terminal and connect on the internet server; It is characterized in that: binding is useful on directly and server carries out mutual client modules in the described portable terminal, this client modules comprises the following function module: be responsible for uploading between client modules and the server or the communication module of the breath of delivering a letter down, be used for Subscriber Interface Module SIM that processing result information is shown and obtains to feed back from from the user to the user, the responsible incident or the detected all kinds of incident branches of client modules that will comprise that system event, user trigger are tasked the event-monitoring module of corresponding processing module separately, and
The local data administration module, the responsible corresponding operating of carrying out the handling process of " address book contact is divided into groups fast ", " contextual model is set ", " increase the contact person newly or the strangeness numbers that does not add the contact person is arranged ", " establishment privacy mode " and " entering or dispose privacy mode ";
The processing of note or multimedia message secret is sent a telegram here, come to secret processing module, the responsible execution " " and the corresponding operating of " remove electricity, go note or multimedia message secret to handle " flow process;
Phone and message processing module, the responsible corresponding operating of carrying out " incoming call handling " and " coming note or multimedia message to handle " flow process;
Upgrade, back up, recover module, be responsible for carrying out client modules corresponding operating partly in " request renewal ", " request backup ", " request recovers " handling process;
Described server is provided with the following function module: upload between charge server and the client modules or the communication module of the breath of delivering a letter down, responsible known harassing and wrecking information bank administration module and the database thereof that known harassing and wrecking information bank is managed, the client modules business datum collector of being responsible for the client modules Service Database is managed is managed module and database thereof, be responsible for carrying out the update module of server corresponding operating in " request is upgraded " handling process, be responsible for carrying out the backup/restoration module of server corresponding operating in " request back-up processing " and " request recovers to handle " flow process, be responsible for carrying out the statistical analysis module of " statistical analysis processing " flow process corresponding operating.
In order to achieve the above object, the present invention provides a kind of mobile portable phone and note again, the method of multimedia message anti-clutter, it is characterized in that: in cell phone address book, according to dissimilar the contact person is divided into groups, and the residing different contextual models of user are set, when receiving cell phone incoming call or note, during multimedia message, according to this incoming call or note, the packet class and the current sight of living in of user of contact person's ownership of multimedia message, and in conjunction with the behavioural characteristic of harassing call and rubbish short message and by authoritative institution's issue or the known harassing and wrecking information data library information that obtains by social statistics, to mobile portable phone and note, corresponding handling process is carried out in multimedia message, to reduce harassing and wrecking.This method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: address book contact is divided into groups, contextual model is set;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come the system class incident of note or multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
In order to achieve the above object; the present invention more provides the method for the private communication of a kind of mobile portable phone and note, multimedia message; it is characterized in that: in cell phone address book; according to dissimilar when the contact person is divided into groups; private contact packet class and the residing different contextual models of user are set; when receive cell phone incoming call, when coming note or multimedia message; judge whether contact person earlier from the secret grouping; so that to the coming, go phone and come, go the log of note or multimedia message to carry out encrypting storing, of secret grouping contact person with protection individual subscriber privacy.This method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: the secret grouping is set, when address book contact is divided into groups, the private communication contact person is put into the secret grouping, contextual model is set, create privacy mode, enter or dispose privacy mode; Above-mentioned deploy content is optional, and order can be adjusted;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come note or multimedia message and remove electricity, go the system class incident of note or multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
For present correlation technique, innovation advantage and effect that the present invention had are:
The present invention proposes the feature of harassing call and rubbish message (note, multimedia message), as the judgement criterion of identification harassing call and rubbish message (note, multimedia message).In addition, rubbish and harassing and wrecking information by the issue of user feedback or authoritative institution again, carry out statistical analysis and obtain known harassing and wrecking information bank, be updated to user mobile phone then, formation is filtered rubbish message (note, multimedia message) and harassing call better with the common multi-filtration mechanism that constitutes of address list, user's black and white lists, known black and white lists, rubbish message (note, multimedia message) and harassing call feature identification criterion.And in implementation process, adopt the mode of this " All for one and one for all ", the effect of constantly circulation, optimization anti-clutter.Moreover the operating procedure of the inventive method is simple, practical, is convenient to people and grasps, uses, and rate of false alarm and rate of failing to report are low.
Another important innovations characteristics of the present invention are to adopt same system and method, realize two big functions.Just; under Unified frame and operating procedure; both can realize effectively stopping the interference of harassing call and refuse messages, garbage multimedia messages to the user; can solve the secret protection problem of mobile portable phone, note, multimedia message preferably again, but also a kind of encryption note and multimedia message communication function with higher privacy, security requirement is provided.In addition, the present invention proposes a kind of " multinuclear privacy mode " for private communication innovation ground, promptly enters different privacy mode with different passwords.System can provide a plurality of pseudo-privacy mode, can solve the emergent demand of user under some special situation well.Such as coercing the ruffian when requiring to check the content of privacy mode, can enter pseudo-privacy mode, reach the purpose of the own important privacy information of protection.
At last, the present invention also provides the method for a kind of backup of business datum easily and recovery, is used to realize the seamless migration of business datum, for the user of frequent replacing mobile phone, need not to carry out again loaded down with trivial details system's setting, and this is very big advantage.In a word, the present invention can solve preferably and effectively stop harassing call and refuse messages, the garbage multimedia messages secret protection problem to user's interference and mobile portable phone and note, multimedia message, has good popularization and application prospect.
Description of drawings
Fig. 1 is the method for operation overview flow chart of mobile portable phone of the present invention and message (note, multimedia message) anti-clutter and private communication.
Fig. 2 is " grouping " flow chart.
Fig. 3 is incoming call handling flow chart (incoming call is meant and receives the phone of making).
Fig. 4 comes weakness reason flow chart (lack and be meant note, the multimedia message that receives).
Fig. 5 is incoming call or lacks the secret process chart.
Fig. 6 is electricity or removes short secret process chart.
Fig. 7 is that the network architecture of the present invention's method of being used to realize mobile portable phone and message (note, multimedia message) anti-clutter and private communication is formed schematic diagram.
Fig. 8 is that the system module structure is formed schematic diagram.
Fig. 9 is that the initialization of the embodiment of the invention is provided with user interface UI schematic diagram.
Figure 10 is that the embodiment of the invention is newly added contact person/stranger's user interface UI schematic diagram of grouping fast.
Figure 11 is the known connection people of the embodiment of the invention user interface display screen schematic diagram of sending a telegram here.
Figure 12 is the stranger of embodiment of the invention user interface display screen schematic diagram when sending a telegram here.
Figure 13 is embodiment of the invention known connection people user interface display screen schematic diagram when sending note/multimedia message.
Figure 14 is the stranger of embodiment of the invention user interface display screen schematic diagram when sending note or multimedia message.
Figure 15 (a) and (b) are respectively embodiment of the invention privacy mode incoming calls and come note or multimedia message prompting figure.
Figure 16 is the quick processing method schematic diagram of a key of the incoming call of the embodiment of the invention.
Figure 17 is the quick processing method schematic diagram of a key that comes note or multimedia message of the embodiment of the invention.
Figure 18 (a) and (b) be the embodiment of the invention privacy mode enter schematic flow sheet.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
The present invention is a kind of mobile portable phone and message (note, multimedia message) method of anti-clutter and private communication, it is in cell phone address book, according to different classes of when the contact person is divided into groups, set up private communication contact person's secret grouping, and the residing different contextual models of user are set, when receiving cell phone incoming call or coming note or during multimedia message, according to this incoming call or come note or the packet class and the current sight of living in of user of the contact person of multimedia message ownership, and in conjunction with the behavioural characteristic of harassing call and refuse messages or garbage multimedia messages and by authoritative institution's issue or the known harassing and wrecking information data library information that obtains by social statistics, this mobile portable phone and note or multimedia message are carried out corresponding handling process, to reduce harassing and wrecking; Simultaneously the log relevant with the contact person in the secret grouping (comprise coming, go phone and come, go the log of note or multimedia message etc.) carried out encrypting storing, with protection individual subscriber privacy.
Before introducing concrete operations flow process of the present invention, earlier as follows to related important noun and concept explanation:
Mobile phone information (note, multimedia message) comprises note, multimedia message." incoming call " refers to phone to be answered, and " going " refers to the phone that the user initiatively dials.
The packet class of contact person's ownership is needs and the use habit of user according to oneself, to the different groups that the address book contact of storing in the portable terminal is classified, packet class comprises: blacklist, white list, honored guest VIP, relatives, commercial affairs, colleague, classmate, friend, secret grouping.Wherein, blacklist, white list are the essential groupings of anti-clutter, and the secret grouping is private communication contact person's essential grouping; The user can comprise the edit operation of interpolation, rename, modification as required to grouping.
Contact person's " secret grouping "; be private contact grouping be the user will with the log of wherein private contact as secret and adopt contact person's packet class of secret protection; adopt the secret communication pattern with secret grouping contact person's interactive information storage: all communication informations, communications records and the Content of communciation of user and private contact are all hidden stored into other people sightless mobile phone privacy case, have only the password of importing user preset just can enter privacy mode and check private information.
User-defined " blacklist " is contact person adding wherein a kind of special packet class of user with the communication of oneself being unwilling.The contact person who recognizes from " blacklist " grouping when cell-phone customer terminal module of the present invention sends a telegram here, when coming note or multimedia message, refusing incoming call is maybe directly put into dustbin with this note or multimedia message, avoids the harassing and wrecking that the user is caused.
User-defined " white list " is that the user will be to contact person's adding a kind of particular packet classification wherein own significant, communication in time.When cell-phone customer terminal module of the present invention recognizes the contact person's incoming call that divides into groups from " white list " or comes note or multimedia message, will point out incoming call, and normally accept this note or multimedia message, thereby avoid the user to omit important relation people's phone or note.
Contextual model be meant the user under specific occasion or sight (as meeting, drive, lunch break, weekend etc.), to the contact person's of different grouping incoming call, the difference of coming note or multimedia message etc. to be taked answer, the combination of receive mode.
The present invention comprises for the contextual model of user preset: only refuse blacklist, meeting, lunch break, weekend, leisure, the user can revise contextual model, or create new contextual model, and the incoming call under the various different contextual models is set respectively or comes the different disposal scheme of message (note, multimedia message).
Incoming call under the contextual model, to come the processing scheme of message (note, multimedia message) be set a kind of under the fixed scene pattern, the scheme how incoming call, note, the multimedia message of designated contact grouping are handled.Such as, when lunch break, have only the just ring of phone of VIP grouping, the same rejection of other phones.
Molestation comprises harassing call and rubbish message (note, multimedia message).Wherein the behavioural characteristic of harassing call comprises following situation: harassing call normally is strangeness numbers (promptly not the number in user communication record) for the user.Harassing call can be hung up after being answered by the user fast, so its duration of call is very short.When usually answering at the called mobile phone swift ringing, the harassing call that has just do not hang up.Many harassing calls belong to sale call, and the calling party generally can introduce self identity earlier, such as, I am an XX insurance company.Here, " insurance " can be defined as harassing call feature speech, harassing call feature speech can be added according to actual needs by the user.Technically, can be with in the setting duration after calling party's voice flow is connected, the keyword that whether detects the harassing call feature by speech recognition technology is as one of harassing call feature.This harassing call keyword is provided with according to actual needs by the user.Therefore, in conjunction with above-mentioned feature, the present invention has following three kinds to the distinguishing rule of doubtful harassing call: strangeness numbers and the duration of call<K, K are 2~20 seconds; Strangeness numbers and ring time<L, L are 1~10 second; Or strangeness numbers and in setting duration M, detect the harassing call keyword, M is 0~30 second.As long as possess one of them, just think doubtful harassing call.
The behavioural characteristic of refuse messages or garbage multimedia messages comprises following situation: the number that sends refuse messages or garbage multimedia messages is strangeness numbers (promptly not the telephone number in the user communication record) for the user; Refuse messages or garbage multimedia messages generally comprise the keyword of specific junk information feature, and the note and the multimedia message of for example insuring generally comprises the keyword of junk information features such as " insurances "; Advertising message in refuse messages or the garbage multimedia messages has the telephone number or the network address of promoting the sale of products.Therefore, message (note, the multimedia message) differentiation that the present invention will satisfy above-mentioned feature is doubtful refuse messages or garbage multimedia messages, by statistics, generate the keyword and the synthetic filter rule of known rubbish message note or garbage multimedia messages again to a large amount of refuse messages or garbage multimedia messages.
For the rubbish message that receives (note, multimedia message), mobile phone directly puts it into dustbin (promptly depositing the memory space of refuse messages or garbage multimedia messages), and regularly checks dustbin for the user, wherein whether includes the note or the multimedia message of usefulness with identification.
Known harassing and wrecking information database be meant provide by authoritative institution or by the server end of system of the present invention by collect each cellphone subscriber upload harassing and wrecking information add up obtain, whether be the content of harassing and wrecking information, mainly comprise the crucial dictionary of harassing call number storehouse, rubbish message (note, multimedia message) and filtering rule etc. if being used to distinguish.In addition, also comprise: known phone black and white lists, well-known message (note, multimedia message) black and white lists, known with reference to list, known doubtful harassing call list, the crucial dictionary of known doubtful harassment messages (note, multimedia message) etc.Following brief description it,
" the known blacklist database " that well-known message (note, multimedia message) blacklist provides from authoritative institution, such as, the mass-sending number or number section of the mass-sending rubbish message (note, multimedia message) of public security department's issue, the trick collection for phone numbers of issue etc.
" the known white list database " that well-known message (note, multimedia message) white list provides from authoritative institution, the number of the affirmation message (note, multimedia message) of the POS that sends to the client such as, bank etc.
Known is the special industry telephone number database that is provided by authoritative institution with reference to list, and such as XX insurance company, whether the user can answer this phone according to incoming call situation decision at that time.
Known doubtful harassing call blacklist, the doubtful harassing call that the user receives client modules record he or she, then server end each user's doubtful harassing call list gathered and add up after obtain.
The crucial dictionary and the filtering rule storehouse of known doubtful rubbish message (note, multimedia message), the doubtful rubbish message (note, multimedia message) that the user receives client modules record he or she, then server end each user's doubtful rubbish message (note, multimedia message) gathered and add up after obtain.
Privacy mode is the special processing pattern at the private contact grouping.Such as, all communication informations, communications records, the Content of communciation of user and private contact grouping are hidden, other people are invisible, enter privacy mode and check private information, can only conduct interviews by the predefined password of input user.
Secret case: be used to deposit all relevant information of private contact.
Referring to Fig. 1, the operating procedure of the main flow of the inventive method is described:
(1) starts client modules first;
(2) initial configuration client modules: to address book contact divide into groups (referring to " address book contact is divided into groups fast " flow process), contextual model (referring to " contextual model is set " flow process) is set, create privacy mode (referring to " establishment privacy mode " flow process), enter or dispose privacy mode (referring to " entering or dispose privacy mode " flow process); Above-mentioned deploy content is optional, and order can be adjusted;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come message (note, multimedia message) and remove electricity, the go message system class incident of (note, multimedia message), and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
Wherein, the incoming call incident comes message (note, multimedia message) referring to " coming message (note, multimedia message) to handle " flow process referring to " incoming call handling " flow process; Remove electricity, in (note, the multimedia message) incident of going message, if private contact, referring to " remove electricity or go message (note, multimedia message) secret to handle " flow process; Otherwise client modules does not deal with.And detect in some pending incident that changes generation for user's request or client, then comprise following situation and the respective handling measure of being taked thereof;
Client-initiated " contact person's grouping is carried out in request " incident: change " address book contact is divided into groups fast " flow process over to;
The user has newly added the contact person, and client modules prompting user detects this incident; Or client modules has detected a strange incoming call or has come message (note, multimedia message), whether the prompting user will this strange incoming call comes the contact person of message (note, multimedia message) to add address list and divides into groups, promptly handle " newly-increased contact person " incident:, then change " system newly adds the contact person or the strangeness numbers that does not add the contact person is arranged " flow process over to if user's affirmation will be divided into groups;
User's " request configuration contextual model " incident: change " contextual model is set " flow process over to;
User's " privacy mode is created in request " incident: change over to and " create privacy mode " flow process;
User's request enters privacy mode, perhaps client modules detects the secret incoming call or comes message (note, multimedia message), certain secret prompting sign with prior setting is reminded the user, the user enters or disposes privacy mode, triggers this privacy mode incident: change " entering or dispose privacy mode " flow process over to;
By user or the update event regularly initiated by client modules: change " upgrade and handle " flow process over to;
By the user or the request backup event of regularly initiating: change " back-up processing " flow process over to by client modules;
Recover incident by the Client-initiated request: change " recovering to handle " flow process over to; After finishing above-mentioned corresponding each handling process, the cell-phone customer terminal module enters idle condition, continues to monitor all kinds of incidents and handle.
Below in conjunction with accompanying drawing, specify the operating procedure and the content of each flow process.
Referring to Fig. 2, the operating procedure of introducing " address book contact is divided into groups fast " flow process is as follows:
(21) the pre-defined a plurality of packet types that comprise following option of client modules: blacklist, honored guest VIP, relatives, commercial affairs, colleague, classmate, friend Buddhist monk do not divide into groups, and acquiescence initially all is classified as a class default packet with the All Contacts in the address list, such as " as yet grouping "; The user can be provided with this default packet (being that " not grouping as yet " is example with default packet hereinafter for convenience of description).When opening the user mobile phone address list, the client modules initialization operation all is classified as a class with the All Contacts: not grouping as yet;
(22) client modules judges whether to finish the grouping to the All Contacts in " not grouping as yet " earlier, if preserve group result, the end of packet operation; Otherwise, the operation of execution in step (23);
(23) be followed successively by the still ungrouped contact person of the next one grouping is set; Simultaneously, client modules judges whether the user withdraws from division operation, if preserve group result, the end of packet operation; Otherwise, return the operation of execution in step (22).
The operating procedure of introducing " newly add the contact person or the strangeness numbers that does not add the contact person is arranged " flow process is as follows:
A, add a contact person when the user is new, client modules detects and produces this incident; Perhaps mobile phone receives phone or the message (note, multimedia message) from strange telephone number, and after the user handled incoming call or comes message (note, multimedia message), client modules can detect this incident;
Whether B, client modules prompting user newly add the contact person to this and divide into groups, when the user confirms to divide into groups to be provided with, and the operation of execution in step C; Otherwise flow process finishes;
C, jump to the step (22) of above-mentioned " address book contact is divided into groups fast " flow process, the contact person who promptly is followed successively by newly-increased contact person or strangeness numbers is provided with grouping; Simultaneously, client modules judges whether the user withdraws from division operation, if withdraw from grouping, then preserves group result, and flow process finishes; Otherwise, continue to carry out this step operation.
Usually after grouping was finished, the operating procedure of " contextual model is set " flow process that changes over to was as follows in introduction:
A, client modules set in advance the multiple contextual model that comprises following option: only refuse blacklist, meeting, lunch break, leisure, weekend, the user can add contextual model, the edit operation of rename, deletion;
B, user are provided with the scheme of answering that comprises following option accordingly to every kind of contextual model: all answer, all rejections, answer designated packet, rejection designated packet; Again the rejection scheme is provided with following option: directly hang up, hang up with message reply, noiseless, message just recorded and reply; The process ends operation.
The operating procedure of introducing " establishment privacy mode " flow process is as follows:
A, earlier the privacy mode quantity that client modules allows the user to create to be set be N, and N is not less than 1 natural number; The user clicks " establishment privacy mode " menu or button that client modules provides; and set an inlet password distinguishing unique correspondence separately for each privacy mode; so that use different passwords to enter different privacy mode; its objective is the emergent demand under some special situation for the user; can protect the privacy information of oneself conscientiously; coerce the content that requires to check privacy mode such as the ruffian, can enter pseudo-privacy mode this moment, protects the important privacy information of oneself.
B, client modules comprise the system resource of corresponding separately secret case for each privacy mode disposes respectively, and each secret case all has own corresponding inlet password; The process ends operation.
The operating procedure of introducing " establishment privacy mode " flow process is as follows:
A, the special keyboard character string of presetting in the direct input in the main interface of mobile phone standby interface or client software that comprises the inlet password (for example: * password X* make up, be used to enter the privacy mode X of password X correspondence), perhaps menu or the button that provides by client modules, directly import inlet password X, so that can enter the pairing privacy mode X of this inlet password;
B, the configuration of this privacy mode made amendment or edits after, the process ends operation.
Referring to Fig. 3, the operating procedure of introducing " incoming call handling " flow process is as follows:
(31) but this step is a selection operation: when each incoming call arrives, judge earlier whether this incoming call belongs to the secret incoming call,, change " send a telegram here or come the processing of message (note, multimedia message) secret " flow process over to if secret is sent a telegram here; Otherwise, judge that again this caller ID whether in address list, if in address list, then handles this incoming call according to the contextual model processing scheme of this moment, otherwise the operation of execution in step (32);
(32) judge whether this incoming call belongs to blacklist, known phone blacklist, maybe this is sent a telegram here and is rejection in the contextual model processing scheme at this moment, if satisfy above-mentioned arbitrary condition, then select following processing mode: directly rejection, rejection and message reply or message just recorded are replied, with refusing incoming call; Otherwise, the operation of execution in step (33);
(33) with ring and the alternate manner that shows incoming call connection people's information or setting at the mobile phone desktop to user prompt should incoming call arrival, at this moment, mobile phone can provide following selectively actuatable to the user: answer, rejection, put into blacklist, put into " key is fast handled " button of secret case, with user-friendly; The user selects to answer this phone or other operations according to information;
(34) after the user handles this incoming call,, judge whether this incoming call is doubtful harassing call, if harassing call, the then operation of execution in step (35) according to aforesaid harassing call basis for estimation; Otherwise, finish this handling process;
(35) whether the prompting user should send a telegram here and add blacklist or address list, if the user will add, then caller ID was added corresponding blacklist or address list, otherwise, finish this handling process.The execution sequence interchangeable of this step (35) and (34).
Referring to Fig. 4, the operating procedure of introducing " coming message (note, multimedia message) to handle " flow process is as follows:
(41) this step is a selectively actuatable: when receiving message (note, multimedia message), judge earlier whether this message (note, multimedia message) belongs to the secret incoming call,, change " send a telegram here or come the processing of message (note, multimedia message) secret " flow process over to if the secret incoming call; Otherwise whether the caller ID of judging this message (note, multimedia message) again in address list, if in address list, then accepts this message (note, multimedia message), the operation of redirect execution in step (43) according to normal mode; Otherwise, the operation of execution in step (42);
(42) whether the contact person who judge to send this message (note, multimedia message) belongs to blacklist, known phone blacklist or can judge that according to known rubbish message (note, multimedia message) crucial dictionary and filtering rule it is doubtful rubbish message (note, multimedia message), if satisfy above-mentioned arbitrary condition, directly this message (note, multimedia message) is put into dustbin, do not send the prompt tone that influences the user; Otherwise, the operation of execution in step (43);
(43) point out the arrival of this message (note, multimedia message) with the alternate manner of the associated person information that show to send this short message at the mobile phone desktop or setting, at this moment, mobile phone can provide following selectively actuatable to the user: check, read, put into blacklist, put into the secret case, add " key is fast handled " button of contact person, with user-friendly;
(44) user is according to information, select corresponding concrete operations after; Finish this handling process.In the aforesaid operations, judge that the order of private contact, address list or blacklist can be changed.
Referring to Fig. 5, the operating procedure of introducing " send a telegram here or come message (note, multimedia message) secret to handle " flow process is as follows:
(51) judge whether earlier to be the incoming call incident that if the incoming call incident is then carried out incoming call handling according to secret incoming call handling rule, processing mode comprises direct rejection, rejection and message reply, prompting user and answers, the operation of execution in step (52) then; Otherwise, the operation of redirect execution in step (53);
(52) mode with message registration is kept at the secret case with incoming information, then, deletes communications records information relevant with this incoming call in all cell phone systems; Finish the secret of incoming call and handle operation;
(53) judge whether this message (note, multimedia message) encrypts, if then be decrypted processing;
(54) this message (note, multimedia message) is copied in the secret case, and from mobile phone information (note, multimedia message) mailbox, delete it; Simultaneously, all communications records information relevant in the deletion cell phone system with this message (note, multimedia message); Finish to come the secret of message (note, multimedia message) to handle operation.The step (51) of above-mentioned judgement incoming call, (52) and judgement come step (53), (54) execution sequence interchangeable of message (note, multimedia message).
Referring to Fig. 6, the operating procedure of introducing " remove electricity or go message (note, multimedia message) secret to handle " flow process is as follows:
(61) judge whether earlier to going electric incident, if remove electricity, the then operation of execution in step (62); Otherwise, the operation of redirect execution in step (63);
(62) call out private contact and converse, behind the end of conversation, go all relevant communications records information of electricity with this in the deletion cell phone system; Finishing this time goes the secret of electricity to handle operation;
(63) do you judge that this message (note, multimedia message) in the privacy mode configuration needs to encrypt? if desired, then carry out encryption;
(64) send this message (note, multimedia message), delete all relevant in cell phone system communications records information then, finish this time and go the secret of message (note, multimedia message) to handle operation with this message (note, multimedia message); The operating procedure (61) of above-mentioned judgement incoming call, (62) and judgement come the operating procedure (63) of message (note, multimedia message), the execution sequence interchangeable of (64).
The operating procedure of introducing " report is handled " flow process again is as follows:
A, user initiate the report request by client modules to server;
B, server carry out authentication to client, if by authentication, client is uploaded to server with local dustbin and doubtful harassing call storehouse; Otherwise, server prompts client modules mistake; Flow process finishes.
And the operating procedure of " statistical analysis " flow process of server is as follows: the harassing and wrecking information that server regularly provides according to the junk information and the authoritative institution of user feedback, statistical analysis generates known harassing and wrecking information bank.
The operating procedure of introducing " upgrade and handle " flow process is as follows:
A, user initiate update request by client modules to server;
B, server carry out authentication to client and charge and confirm, if enough by authentication and rate smoothly, pass to client modules under the new known harassing and wrecking information bank that server will obtain by statistical analysis; Otherwise the server prompts client modules can not receive this service; Flow process finishes.
The operating procedure of introducing " back-up processing " flow process is as follows:
A, user initiate backup request by client modules to server, and client modules prompting user imports account number and encrypted message, and gives server with this information uploading;
B, this user's of server authentication account number and encrypted message, if the checking result is a mistake, then server should verify that object information fed back to client modules, and client modules shows this error message to the user, and flow process finishes; Otherwise it is correct information that server returns the checking result to client modules, and after by client modules client modules business datum collection being backed up to server, flow process finishes.
The operating procedure of introducing " recovering to handle " flow process is as follows:
A, user initiate recovery request by client modules to server, and client modules prompting user imports account number and encrypted message, and gives server with this information uploading;
B, this user's of server authentication account number and encrypted message, if the checking result is a mistake, then server should verify that results messages fed back to client modules, and client modules shows this error message to the user, and flow process finishes; Otherwise it is correct information that server returns the checking result to client modules, and by passing to client modules under the business datum collection of server with this client modules, after client modules covered the local service data with the data downloaded collection again, flow process finished.
Referring to Fig. 7 and Fig. 8, introduce network system architecture of the present invention: the present invention is a kind of network system that is used to realize mobile portable phone and message (note, multimedia message) anti-clutter and private communication processing method, comprising: wireless communication networks, base station, portable terminal and connection server on the internet; Wherein binding is useful on directly and carries out mutual client modules with server in the portable terminal, this client modules be used to realize mobile phone to send a telegram here, come message (note, multimedia message), remove electricity, go message all processing of (note, multimedia message); It comprises following function module (referring to Fig. 8):
Communication module is responsible for interactive information between client modules and the server;
Subscriber Interface Module SIM is used for processing result information is obtained feedback to user's demonstration and from the user;
The event-monitoring module, the responsible incident or the detected all kinds of incident branches of client modules that will comprise that system event, user trigger are tasked corresponding separately processing module;
The local data administration module, the responsible corresponding operating of carrying out the handling process of " address book contact is divided into groups fast ", " contextual model is set ", " increase the contact person newly or the strangeness numbers that does not add the contact person is arranged ", " establishment privacy mode " and " entering or dispose privacy mode "; And the client modules Service Database managed, store the client modules local maintenance and professional all relevant data in this database, comprise address list, contact person divide into groups all the elements of situation, contextual model setting and processing scheme thereof, doubtful harassing call storehouse, doubtful junk information storehouse (dustbin), secret case, the configuration parameter under each quasi-mode etc.
The secret processing module, the corresponding operating of responsible execution the " incoming call comes message (note, multimedia message) secret to handle " and " going electricity to go message (note, multimedia message) secret to handle " flow process;
Phone and message (note, multimedia message) processing module, the responsible corresponding operating of carrying out " incoming call handling " and " coming message (note, multimedia message) to handle " flow process;
Upgrade, back up, recover module, be responsible for carrying out client modules corresponding operating partly in " request renewal ", " request backup ", " request recovers " handling process;
Client modules adopts and to comprise that GPRS, multimedia message, note, mail, data wire, bluetooth, several data such as infrared upload mode the client modules business datum collection of its preservation is sent to server.Its downloading mode comprises GPRS, WiMax, WiFi, 3G, multimedia message, note, mail, data wire, bluetooth, multiple mode such as infrared.The rubbish report: the user can be uploaded to server by client modules dustbin and doubtful harassing call storehouse that it is local, carries out statistical analysis for server.
Data backup of the present invention and recovery: client modules administrative client modular service data set, this data set can client modules be uploaded mode and are backed up, and download to mobile phone this locality in biography mode under the client modules, thereby realize professional continuity.Such as, the user has changed mobile phone, can on former mobile phone client modules business datum collection be backuped on the server, re-uses new cell-phone and downloads recovery by client modules, realizes the seamless migration of all service conditions of user.
Server is provided with following function module (referring to Fig. 8): upload between charge server and the client modules or the communication module of the breath of delivering a letter down, be in charge of the known harassing and wrecking information bank administration module and the database thereof of known harassing and wrecking information bank, be in charge of the client modules business datum collector reason module and the database thereof of client modules Service Database, be responsible for carrying out the update module of server corresponding operating in " request is upgraded " handling process, be responsible for carrying out the backup/restoration module of server corresponding operating in request " back-up processing " and " recovering to handle " flow process, be responsible for carrying out the statistical analysis module of " statistical analysis processing " flow process corresponding operating.
Mobile terminal client terminal module of the present invention can be regularly from the known harassing and wrecking information bank of server down loading updating.Because the memory capacity of mobile phone is limited, can not store excessive data, add that there is the difference between the region in harassing and wrecking information.In order to carry out anti-clutter more accurately, known information bank can be added up according to the region.Such as user feedback, generate doubtful harassing call list and doubtful rubbish message (note, multimedia message) the crucial dictionary and the filtering rule storehouse of Beijing area based on the Beijing area.According to user's cell-phone number, can select to download the database relevant like this to user mobile phone this locality with the user region.Such as, user mobile phone number belongs to the Beijing area, can download the known list in Pekinese to user mobile phone.Here it is user data update.
Server of the present invention carries out statistical analysis according to the rubbish short message and the harassing call number of user's report, and in conjunction with the up-to-date harassing and wrecking information that authoritative institution issues, forms the known harassing and wrecking information bank of real-time update.Server can be regularly published known harassing and wrecking information bank usually, and client modules can download to this locality by biography mode under the client modules.This knowledge database comprises client modules business information base of known phone black and white lists database, known note/multimedia message black and white lists database, known doubtful harassing call list, known doubtful rubbish message (note, multimedia message) crucial dictionary and filtering rule storehouse, backup or the like.
Utilize the processing mode of backup of the present invention, recovery, renewal, can realize business datum seamless migration and recovery anywhere or anytime, change frequent user, need not to carry out again loaded down with trivial details system's setting for mobile phone.
Realize the backup of business information by " back-up processing " flow process, the business information that server can recording user so that when next user recovers, is stored into the business information of this moment again.
Realize the continuity of business information by " recovering to handle " flow process, client modules has recovered the business information of the last backup from server like this.
Realize the renewal of business information by " upgrade and handle " flow process, client modules obtains up-to-date well known data information from server end, makes client modules possess up-to-date business process rule, obtains better service.
The present invention has done a large amount of enforcement tests, below in conjunction with accompanying drawing, illustrates the situation of embodiment.
The flow process of embodiment is as shown in Figure 1: when starting FTP client FTP first, the prompting user carries out initial configuration.Comprise address book contact is divided into groups fast, contextual model is set, create privacy mode, configuration privacy mode or the like.If the user does not carry out any configuration, client modules can use the initial configuration that carries, as the contact person in the cell phone address book be placed in " as yet grouping ", contextual model is 12345 or the like for the initial password of " only refusing blacklist ", a privacy mode.
After finishing initial configuration, client modules is monitored the variety of event that takes place at any time, comprise cell phone incoming call, come message (note, multimedia message), privacy mode incident, remove electricity or remove message (note, multimedia message), contact person's grouping, newly-increased contact person's grouping, configuration contextual model, create privacy mode, request is upgraded, request backup, request recovery incident etc.
Introduce the detailed process flow process of each incident below:
Referring to Fig. 9, illustrate that successively user interface UI to grouping, contextual model, privacy mode carries out initialization situation is set.
The cursor of UI drops on each row during grouping, uses right and left key to select grouping, and the contact person is selected in use key up and down, can also search the contact person fast by letter/phonetic, and certain contact person is divided into groups fast.
Then, carry out the setting of contextual model UI: when selecting contextual model, key focuses on some contextual models up and down, comprises following option: lunch break, meeting, weekend.Re-use right and left key and select the tupe of this sight: select tupe is comprised following option: answer designated packet, the rejection designated packet.Select grouping then: by middle key all group list of navigating out, scroll-up/down then, key is selected grouping in the use.At this moment, the user can add or the deletion contextual model according to own needs.
The UI explanation of privacy mode is set then: privacy mode has unlatching, closes two states.Unlatching then possesses the privacy mode processing capacity, closes then not possess.Privacy mode has been deposited note, the telephony recording of all private contacts, and the user can enter and check, the user can change the password of place privacy mode, and the user can create new privacy mode, and corresponding password is set.
Fig. 2 has introduced the handling process of division operation of the present invention.Need to prove that when newly adding contact person/stranger's phone, client modules monitors this incident, can point out the user to divide into groups fast.The user can directly enter the grouping management interface by shortcut and carry out division operation (referring to Figure 10).
Fig. 3 has introduced incoming call handling flow process of the present invention, when client modules has monitored incoming call, checks at first whether this contact person belongs to the personnel in the cell phone address book, carries out following different processing operation:
If the contact person in the cell phone address book, then according to the grouping that this contact person belonged to, and this moment, contextual model was handled.Such as, contact person X is the VIP of user A, the contextual model of this moment is a conference model, if according to the contextual model of setting that Fig. 9 shows, then answer, and show the information of this contact person X at mobile phone standby interface.If contact person Y is the relatives of user A, this moment, contextual model was a conference model, and then the contextual model according to Fig. 9 setting is rejection, then carried out rejection and handled.
Referring to Figure 10, this figure is the quick grouping UI signal to newly-increased contact person/stranger that the present invention adopts, and when a newly-increased contact person/stranger, whether client modules detects this incident, can point out and divide into groups immediately.The user can select [being], then this contact person is carried out quick division operation, and the grouping that the user only needs right and left key to select to need to be provided with gets final product.
Referring to Figure 11, this figure is a kind of known connection people's of adopting of the present invention incoming call mobile phone interaction interface UI, comprise detailed personal information such as personalized portrait, this name of contact person, affiliated grouping, company, and a plurality of shortcuts, comprise following optional button: pull blacklist into, put into shortcuts such as secret case, report, grouping.
If incoming call is stranger (referring to Figure 12): then judge earlier whether this incoming call is the secret incoming call, if secret incoming call, change " send a telegram here or come message (note, multimedia message) secret handle " flow process over to, otherwise, judge that again this caller ID is whether in address list, if in address list, then this incoming call is handled according to the contextual model processing scheme of this moment, otherwise judge whether this contact person belongs to blacklist or known blacklist, or whether should send a telegram here by rejection this moment in the contextual model processing scheme.If rejection then finishes this handling process, otherwise cell-phone bell, and show the mutual interface of above-mentioned Figure 11, to show incoming call connection people's information at mobile phone standby interface.
The user selects whether to answer this phone or carry out other operations according to this interface information.After the user handles this incoming call, judge whether this incoming call is doubtful harassing call.If, then list this contact person in doubtful blacklist, if not, then whether prompting is to this stranger's grouping, and the user can divide into groups fast.
Fig. 4 has introduced handling process of coming message (note, multimedia message) of the present invention, when client modules has monitored message (note, multimedia message) when coming, checks earlier whether the contact person belongs to the personnel in the cell phone address book, carries out following different processing operation:
If the contact person in the cell phone address book (referring to Figure 13): normally receive note and on display screen, show this associated person information.
If stranger (referring to Figure 14): judge that earlier this comes message (note, multimedia message) whether be private message (note, multimedia message), if private message (note, multimedia message), change " send a telegram here or come message (note; multimedia message) secret handle " flow process over to, otherwise, judge that again this comes message (note, whether telephone number multimedia message) is in address list, if in address list, then this is come message (note according to the contextual model processing scheme of this moment, multimedia message) handles, otherwise judge whether this contact person belongs to blacklist or known blacklist, if this contact person belongs to blacklist or known blacklist, perhaps according to rubbish message (note, multimedia message) feature and filtering rule judge that this comes message (note, multimedia message) whether be doubtful rubbish message (note, multimedia message).If then list this stranger in doubtful blacklist, and whether prompting pulls it into blacklist; If do not pull blacklist into, the prompting user divides into groups fast to it.If not rubbish message (note, multimedia message), then show this short message and contact person's information at mobile phone standby interface.Provide simultaneously and comprise and check, read, put into blacklist, put into the secret case, add " key is fast handled " button such as contact person to the user.
If call of private contact or lack is handled (referring to Figure 15) respectively according to event type:
If the secret incoming call then according to secret incoming call handling rule, carries out incoming call handling.Such as contact person X is the private contact of user A, if this moment, processing rule was: the prompting user, then use the special prompting sign of secret (be a portrait among the figure, can adopt user-defined different colours and pattern to come the various forms of predefine) on mobile phone standby interface, to point out user A; User A selects to answer or do not answer to this incoming call or operation such as rejection; At last, this time private communication record is deposited in the secret case.
If secret is come message (note, multimedia message), then come message (note, multimedia message) processing rule according to secret, handle.For example, at first client is tackled this note, judges whether to encrypting note.If, then deciphering.Otherwise use the secret prompting to be identified at prompting user A on the mobile phone standby interface,
For removing electricity or going the secret handling process of message (note, multimedia message), if remove electricity or remove the artificial private contact of contact of message (note, multimedia message), after finishing the processing operation, all logs all are placed into the secret case so, and all cell phone systems records are completely deleted.
Referring to Figure 16, introduce a key quick processing method of the present invention: directly show all information of user at mobile phone standby interface earlier to incoming call, and provide a series of shortcuts to carry out fast processing, comprised following option: pulled blacklist into, put into secret case, report, grouping.
Pull blacklist into: pull the contact person into blacklist by shortcut.The user can see this contact person in " grouping → blacklist " of client, its incoming call, come short operation all to handle according to the defined blacklist rule of classification of user.
Put into the secret case: log one key is added the secret case by shortcut.The user can view this contact person in privacy mode, to its incoming call, come short operation all to handle according to the defined secret rule of classification of user.
Report: by shortcut above-mentioned contact person is reported, be uploaded to server, strengthen the knowledge learning ability of client, for the user provides better service.
Grouping: directly enter quick packet interface by shortcut, this contact person is divided into groups.
Referring to Figure 17, introduce the present invention to coming the quick processing method of a key of message (note, multimedia message): all information of directly showing this message (note, multimedia message) sender at mobile phone standby interface, and provide a series of shortcuts to carry out fast processing, comprised following option: put into dustbin, pull blacklist into, put into secret case, report, grouping.Wherein,
Put into dustbin: short message one key is added dustbin by shortcut.The user can enter the dustbin of client and check this note.
Pull blacklist into: pull this contact person into blacklist by shortcut.The user can see this contact person in " grouping → blacklist " of client, its incoming call, come short operation all to handle according to the defined blacklist rule of classification of user.
Put into the secret case: short message one key is added the secret case by shortcut.The user can view this contact person in privacy mode, to its incoming call, come short operation all to handle according to the defined secret rule of classification of user.
Report: with this junk information report, be uploaded to server by shortcut, strengthen the refuse messages learning ability of client, for the user provides better service.
Grouping: directly enter quick packet interface by shortcut, this contact person is divided into groups.
Referring to Figure 18, introduce the stream that enters of privacy mode: the user imports special keyboard combined sequence at mobile phone standby interface or software master interface, and for example: * password * (being * 12345*) enters privacy mode.The user can enter different privacy mode by the different special keyboard combined sequence of key of input.
In a word, the test of embodiments of the invention is successful, has realized goal of the invention.

Claims (19)

1. mobile portable phone and note, the method of multimedia message anti-clutter and private communication, it is characterized in that: in cell phone address book, according to different classes of when the contact person is divided into groups, set up private communication contact person's secret grouping, and the residing different contextual models of user are set, when receiving cell phone incoming call or note, multimedia message, according to this incoming call or note, the packet class and the current sight of living in of user of contact person's ownership of multimedia message, and in conjunction with harassing call and refuse messages, the behavioural characteristic of garbage multimedia messages and by authoritative institution issue or the known harassing and wrecking information data library information that obtains by social statistics, to this mobile portable phone and refuse messages, garbage multimedia messages is carried out corresponding handling process, to reduce harassing and wrecking; Simultaneously to secret grouping in the coming, go phone and come, go the log of note and multimedia message to carry out encrypting storing, of contact person with protection individual subscriber privacy.
2. the method for mobile portable phone according to claim 1 and note, multimedia message anti-clutter and private communication is characterized in that, described method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: address book contact is divided into groups, contextual model is set, create privacy mode, enter or dispose privacy mode; Above-mentioned deploy content is optional, and order can be adjusted;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come note, come multimedia message and remove electricity, go note, go the system class incident of multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
3. the method for mobile portable phone according to claim 1 and note, multimedia message anti-clutter and private communication, it is characterized in that: the packet class of described contact person ownership be the user as required and use habit, to the different groups that the address book contact of storing in the portable terminal is classified, packet class comprises: blacklist, white list, honored guest VIP, relatives, commercial affairs, colleague, classmate, friend, secret grouping; Wherein, the secret grouping is private communication contact person's essential grouping; The user can comprise the edit operation of interpolation, rename, modification as required to grouping.
4. mobile portable phone according to claim 3 and note, the method of multimedia message anti-clutter and private communication, it is characterized in that: described contact person's " secret grouping " be the user will with the log of wherein private contact as secret and adopt contact person's packet class of secret protection, adopt the secret communication pattern with secret grouping contact person's interactive information storage: with all communication informations of user and private contact, communications records and Content of communciation are all hidden and are stored other people sightless mobile phone privacy case into, have only the password of importing user preset just can enter privacy mode and check private information; Described contact person's " blacklist " is contact person adding wherein the packet class of user with the communication of oneself being unwilling, when the cell-phone customer terminal module recognizes from the contact person incoming call of " blacklist " grouping, when coming note or coming multimedia message, refusing incoming call is maybe directly put into dustbin with this note, multimedia message, avoid harassing the user; Described contact person's " white list " is that the user will be to contact person's adding packet class wherein own significant, communication in time, the contact person who recognizes from " white list " grouping when the cell-phone customer terminal module sends a telegram here, when coming note or coming multimedia message, will point out incoming call or normally accept this note or multimedia message.
5. mobile portable phone according to claim 1 and note, the method of multimedia message anti-clutter and private communication, it is characterized in that: described contextual model is that the user is in and comprises meeting, drive, lunch break, under the various specific occasions or sight at weekend, to the contact person's of different grouping incoming call or come note or difference that multimedia message is taked is answered, the combination of receive mode, default contextual model comprises at least: only refuse blacklist, meeting, lunch break, weekend, leisure, the user can revise contextual model, or create new contextual model, and the incoming call under the various different contextual models is set respectively or comes note or the different disposal scheme of multimedia message.
6. the method for mobile portable phone according to claim 1 and note, multimedia message anti-clutter and private communication, it is characterized in that: the behavioural characteristic of described harassing call comprises following situation: harassing call is a strangeness numbers for the user, i.e. the telephone number in user communication record not; Harassing call can be hung up after being answered by the user fast, and its duration of call is very short; When answering at the called mobile phone swift ringing, the harassing call that has just do not hang up; In the setting duration after calling party's voice flow is connected, detect the keyword of harassing call feature by speech recognition technology, this harassing call keyword is provided with according to actual needs by the user; Therefore the harassing call distinguishing rule has following three kinds: strangeness numbers and the duration of call<K, K are 2~20 seconds; Strangeness numbers and ring time<L, L are 1~10 second; Or strangeness numbers and in setting duration M, detect the harassing call keyword, M is 0~30 second;
The behavioural characteristic of described refuse messages or garbage multimedia messages comprises following situation: the number that sends refuse messages or garbage multimedia messages is a strangeness numbers for the user, i.e. the telephone number in the user communication record not; Rubbish message note or garbage multimedia messages comprise the keyword of specific junk information feature; Advertising message in refuse messages or the garbage multimedia messages has the telephone number or the network address of promoting the sale of products; Differentiated and be doubtful refuse messages or doubtful garbage multimedia messages so satisfy the note of above-mentioned feature or multimedia message,, generated the keyword and the synthetic filter rule of known refuse messages or garbage multimedia messages again by statistics to a large amount of refuse messages and garbage multimedia messages;
For refuse messages that receives or garbage multimedia messages, mobile phone directly puts it into dustbin, promptly deposits the space of refuse messages and garbage multimedia messages, and regularly checks dustbin for the user, wherein whether includes the note or the multimedia message of usefulness with identification.
7. the method for mobile portable phone according to claim 1 and note, multimedia message anti-clutter and private communication, it is characterized in that: the data in the described known harassing and wrecking information database are provided by authoritative institution or add up by the harassing and wrecking information that the server end of system is uploaded each cellphone subscriber whether obtain, be used to distinguish be the content of harassing and wrecking information, comprise the crucial dictionary and the filtering rule storehouse of harassing call number storehouse, refuse messages, garbage multimedia messages.
8. the method for mobile portable phone according to claim 2 and note, multimedia message anti-clutter and private communication is characterized in that: four operations in the described step (2) further comprise following concrete steps:
Wherein, the operation that address book contact is divided into groups fast comprises the following steps:
(201) the pre-defined a plurality of packet types that comprise following option of client modules: blacklist, honored guest VIP, relatives, commercial affairs, colleague, classmate, friend, not grouping, and acquiescence as yet initially is classified as the All Contacts in the address list " not grouping as yet "; When opening the user mobile phone address list, the client modules initialization operation all is classified as a class with the All Contacts: not grouping as yet;
(202) judge whether to finish grouping earlier, if preserve group result, the end of packet operation to the All Contacts in " grouping as yet "; Otherwise, the operation of execution in step (203);
(203) be followed successively by the still ungrouped contact person of the next one grouping is set; Simultaneously, client modules judges whether the user withdraws from division operation, if preserve group result, the end of packet operation; Otherwise, return the operation of execution in step (202);
The described operation that contextual model is set comprises the following steps:
(211) client modules sets in advance the multiple contextual model that comprises following option: only refuse blacklist, meeting, lunch break, leisure, weekend, the user can add contextual model, the edit operation of rename, deletion;
(212) user is provided with the scheme of answering that comprises following option accordingly to every kind of contextual model: all answer, all rejections, answer designated packet, rejection designated packet; Again the rejection scheme is provided with following option: directly hang up, hang up with message reply, noiseless, message just recorded and reply; The process ends operation;
The operation of described establishment privacy mode comprises the following steps:
(221) the privacy mode quantity that client modules allows the user to create being set earlier is N, and N is not less than 1 natural number; The user clicks " establishment privacy mode " menu or button that client modules provides, and set an inlet password distinguishing unique correspondence separately for each privacy mode, so that use different passwords to enter different privacy mode, protect the privacy information of oneself conscientiously;
(222) client modules comprises the system resource of corresponding separately secret case for each privacy mode disposes respectively, and each secret case all has own corresponding inlet password; The process ends operation;
The described operation that enters or dispose privacy mode comprises the following steps:
(231) in the directly default special keyboard character string combination that comprises the inlet password of input of the main interface of mobile phone standby interface or client software, perhaps menu or the button that provides by client modules, directly import the inlet password, so that can enter the pairing privacy mode of this inlet password;
(232) configuration of this privacy mode made amendment or edit after, the process ends operation.
9. the method for mobile portable phone according to claim 2 and note, multimedia message anti-clutter and private communication is characterized in that: in the described step (3), to the incoming call incident treatment measures comprise following operating procedure:
(301) but this step is a selection operation: when each incoming call arrives, judge earlier whether this incoming call belongs to the secret incoming call, if secret incoming call, change " sending a telegram here, come note or multimedia message secret to handle " flow process over to, otherwise, judge that again this caller ID is whether in address list, if in address list, then this incoming call is handled according to the contextual model processing scheme of this moment, otherwise the operation of execution in step (302);
(302) judge whether this incoming call belongs to blacklist, known phone blacklist, maybe this is sent a telegram here and is rejection in the contextual model processing scheme at this moment, if satisfy above-mentioned arbitrary condition, then select following processing mode: directly rejection, rejection and message reply or message just recorded are replied, with refusing incoming call; Otherwise, the operation of execution in step (303);
(303) with ring and the alternate manner that shows incoming call connection people's information or setting at the mobile phone desktop to user prompt should incoming call arrival, at this moment, mobile phone can provide following selectively actuatable to the user: answer, rejection, put into blacklist, put into " key is fast handled " button of secret case, with user-friendly; The user selects to answer this phone or other operations according to information;
(304) after the user handles this incoming call,, judge whether this incoming call is doubtful harassing call, if harassing call, the then operation of execution in step (305) according to aforesaid harassing call basis for estimation; Otherwise, finish this handling process;
(305) whether the prompting user should send a telegram here and add blacklist or address list, if the user will add, then caller ID was added corresponding blacklist or address list, otherwise, finish this handling process.
10. the method for mobile portable phone according to claim 2 and note, multimedia message anti-clutter and private communication is characterized in that: in the described step (3), the treatment measures of coming note or multimedia message event are comprised following operating procedure:
(311) this step is a selectively actuatable: when receiving note or multimedia message, judge earlier whether this note or multimedia message belong to the secret incoming call, if the secret incoming call changes " sending a telegram here, come note or multimedia message secret to handle " flow process over to; Otherwise whether the caller ID of judging this note or multimedia message again in address list, if in address list, then accepts this note or multimedia message according to normal mode, the operation of redirect execution in step (313); Otherwise, the operation of execution in step (312);
(312) whether the contact person who judge to send this note or multimedia message belongs to blacklist, known phone blacklist or can judge that according to known refuse messages or the crucial dictionary of garbage multimedia messages and filtering rule it is doubtful refuse messages, doubtful garbage multimedia messages, if satisfy above-mentioned arbitrary condition, directly this note or multimedia message are put into dustbin, do not send the prompt tone that influences the user; Otherwise, the operation of execution in step (313); The execution sequence interchangeable of this step (312) and (311);
(313) point out the arrival of this note or multimedia message with the alternate manner of the associated person information that show to send this note or multimedia message at the mobile phone desktop or setting, at this moment, mobile phone can provide following selectively actuatable to the user: check, read, put into blacklist, put into the secret case, add " key is fast handled " button of contact person, with user-friendly;
(314) user is according to information, select corresponding concrete operations after; Finish this handling process.
11. the method according to claim 9 or 10 described mobile portable phones and note, multimedia message anti-clutter and private communication is characterized in that: described " sending a telegram here, come note or multimedia message secret to handle " flow process comprises following operating procedure:
Steps A 1, judge whether to be the incoming call incident that if the incoming call incident is then carried out incoming call handling according to secret incoming call handling rule, processing mode comprises direct rejection, rejection and message reply, prompting user and answers, the operation of execution in step A2 then earlier; Otherwise, the operation of redirect execution in step A3;
Steps A 2, incoming information is kept at the secret case, then, deletes communications records information relevant in all cell phone systems with this incoming call in the mode of message registration; Finish the secret of incoming call and handle operation;
Steps A 3, judge whether this note or multimedia message are to encrypt note, if then be decrypted processing;
Steps A 4, this note or multimedia message are copied in the secret case, and from the mailbox of SMS or multimedia message, delete it; Simultaneously, all communications records information relevant in the deletion cell phone system with this note or multimedia message; Finish to come the secret of note or multimedia message to handle operation;
The execution sequence interchangeable of above-mentioned steps A2 and steps A 3, A4.
12. the method for mobile portable phone according to claim 2 and note, multimedia message anti-clutter and private communication, it is characterized in that: in the described step (3), handle and to remove electricity, the following operating procedure of " remove electricity, go note or the multimedia message secret to handle " flow process of going the system class incident of note or multimedia message further to comprise:
Step B1, judge whether to going electric incident earlier, if remove electricity, the then operation of execution in step B2; Otherwise, the operation of redirect execution in step B3;
Step B2, calling private contact are conversed, and behind the end of conversation, go all relevant communications records information of electricity with this in the deletion cell phone system; Finishing this time goes the secret of electricity to handle operation;
Do you step B3, judge that this note or multimedia message in the privacy mode configuration need to encrypt? if desired, then carry out encryption;
Step B4, send this note or multimedia message, delete all relevant in cell phone system communications records information then, finish this time and go the secret of note or multimedia message to handle operation with this note or multimedia message;
The execution sequence interchangeable of above-mentioned steps B2 and step B3, B4.
13. the method for mobile portable phone according to claim 2 and note, multimedia message anti-clutter and private communication, it is characterized in that: in the described step (3), user's request or the detected pending incident of client comprise: ask to carry out the contact person and divide into groups, increase newly contact person, request configuration contextual model, ask to enter or dispose privacy mode, ask establishment privacy mode, request to upgrade, ask to back up, ask to recover.
14. the method for mobile portable phone according to claim 13 and note, multimedia message anti-clutter and private communication is characterized in that: described " newly-increased contact person " handling process further comprises following operating procedure:
C1, as the newly-increased contact person of user, perhaps mobile phone receives from the phone of strangeness numbers or note, multimedia message, and after the user handled this incoming call or note, multimedia message, client modules all can detect this incident;
C2, client modules remind the user whether will or come note or the contact person of the strangeness numbers of multimedia message divides into groups to this newly-increased contact person, incoming call, when the user confirms to divide into groups to be provided with to this newly-increased contact person, and the operation of execution in step C3; Otherwise, finish this flow operations;
C3, the contact person who is followed successively by newly-increased contact person or strangeness numbers are provided with grouping; Simultaneously, client modules judges whether the user withdraws from division operation, if withdraw from grouping, then preserves group result, finishes this flow operations; Otherwise, continue to carry out the operation of this step;
Described " request is upgraded " handling process further comprises following operating procedure:
D1, client modules are initiated update request to server;
D2, server carry out authentication to client and charge and confirm, if enough by authentication and expense smoothly, pass to client modules under the known harassing and wrecking information bank that server will obtain by statistical analysis; Otherwise the server prompts client modules can not receive this service; Finish this flow operations then;
Described " request backup " handling process further comprises following operating procedure:
E1, client modules are imported account number and password to user prompt, and give server with this information uploading;
E2, this cellphone subscriber's of server authentication account number and password, if the checking result is a mistake, then server should verify that object information fed back to client modules, client modules shows this checking erroneous results information to the user, finishes this flow operations; Otherwise it is correct information that server returns the checking result to client modules, and after by client modules client modules business datum collection being backed up to server, finishes this flow operations;
Described " request recovers " handling process further comprises following operating procedure:
F1, client modules are imported account number and password to user prompt, and give server with this information uploading;
F2, this user's of server authentication account number and password, if the checking result is a mistake, then server should verify that results messages fed back to client modules, client modules shows this checking erroneous results information to the user, finishes this flow operations; Otherwise, it is correct information that server returns the checking result to client modules, and by passing to client modules under the business datum collection of server with this client modules, client modules finishes this flow operations after covering the local service data with the data downloaded collection again.
15. a network system that is used to realize the processing method of the described mobile portable phone of claim 1 and note, multimedia message anti-clutter and private communication comprises: wireless communication networks, base station, portable terminal and connect on the internet server; It is characterized in that: binding is useful on directly and server carries out mutual client modules in the described portable terminal, this client modules comprises the following function module: be responsible for uploading between client modules and the server or the communication module of the breath of delivering a letter down, be used for Subscriber Interface Module SIM that processing result information is shown and obtains to feed back from from the user to the user, the responsible incident or the detected all kinds of incident branches of client modules that will comprise that system event, user trigger are tasked the event-monitoring module of corresponding processing module separately, and
The local data administration module, the responsible corresponding operating of carrying out the handling process of " address book contact is divided into groups fast ", " contextual model is set ", " increase the contact person newly or the strangeness numbers that does not add the contact person is arranged ", " establishment privacy mode " and " entering or dispose privacy mode ";
The processing of note or multimedia message secret is sent a telegram here, come to secret processing module, the responsible execution " " and the corresponding operating of " remove electricity, go note or multimedia message secret to handle " flow process;
Phone and message processing module, the responsible corresponding operating of carrying out " incoming call handling " and " coming note or multimedia message to handle " flow process;
Upgrade, back up, recover module, be responsible for carrying out client modules corresponding operating partly in " request renewal ", " request backup ", " request recovers " handling process;
Described server is provided with the following function module: upload between charge server and the client modules or the communication module of the breath of delivering a letter down, responsible known harassing and wrecking information bank administration module and the database thereof that known harassing and wrecking information bank is managed, the client modules business datum collector of being responsible for the client modules Service Database is managed is managed module and database thereof, be responsible for carrying out the update module of server corresponding operating in " request is upgraded " handling process, be responsible for carrying out the backup/restoration module of server corresponding operating in " request back-up processing " and " request recovers to handle " flow process, be responsible for carrying out the statistical analysis module of " statistical analysis processing " flow process corresponding operating.
16. mobile portable phone and note, the method of multimedia message anti-clutter, it is characterized in that: in cell phone address book, according to dissimilar the contact person is divided into groups, and the residing different contextual models of user are set, when receiving cell phone incoming call or note, during multimedia message, according to this incoming call or note, the packet class and the current sight of living in of user of contact person's ownership of multimedia message, and in conjunction with the behavioural characteristic of harassing call and rubbish short message and by authoritative institution's issue or the known harassing and wrecking information data library information that obtains by social statistics, to mobile portable phone and note, corresponding handling process is carried out in multimedia message, to reduce harassing and wrecking.
17. the method for mobile portable phone according to claim 16 and note, multimedia message anti-clutter is characterized in that, this method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: address book contact is divided into groups, contextual model is set;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come the system class incident of note or multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
18. the method for the private communication of mobile portable phone and note, multimedia message; it is characterized in that: in cell phone address book; according to dissimilar when the contact person is divided into groups; private contact packet class and the residing different contextual models of user are set; when receive cell phone incoming call, when coming note or multimedia message; judge whether contact person earlier from the secret grouping; so that to the coming, go phone and come, go the log of note or multimedia message to carry out encrypting storing, of secret grouping contact person with protection individual subscriber privacy.
19. the method for mobile portable phone according to claim 18 and note, multimedia message private communication is characterized in that, this method comprises following operating procedure:
(1) starts client modules first;
(2) initial configuration client modules: the secret grouping is set, when address book contact is divided into groups, the private communication contact person is put into the secret grouping, contextual model is set, create privacy mode, enter or dispose privacy mode; Above-mentioned deploy content is optional, and order can be adjusted;
(3) the cell-phone customer terminal module begins to monitor all kinds of incidents: comprise incoming call, come note or multimedia message and remove electricity, go the system class incident of note or multimedia message, and user's request or the detected pending incident of client, and take measures areput respectively; And after finishing corresponding handling process, enter idle condition, continue to monitor all kinds of incidents and handle.
CNA200710178179XA 2007-11-27 2007-11-27 Mobile phone telephone and message anti-disturbance and private communication method and system Pending CN101184264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710178179XA CN101184264A (en) 2007-11-27 2007-11-27 Mobile phone telephone and message anti-disturbance and private communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710178179XA CN101184264A (en) 2007-11-27 2007-11-27 Mobile phone telephone and message anti-disturbance and private communication method and system

Publications (1)

Publication Number Publication Date
CN101184264A true CN101184264A (en) 2008-05-21

Family

ID=39449307

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710178179XA Pending CN101184264A (en) 2007-11-27 2007-11-27 Mobile phone telephone and message anti-disturbance and private communication method and system

Country Status (1)

Country Link
CN (1) CN101184264A (en)

Cited By (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605308A (en) * 2009-03-05 2009-12-16 上海闻泰电子科技有限公司 A kind of management method of short message
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN101854424A (en) * 2010-05-27 2010-10-06 深圳市五巨科技有限公司 Method and device for filtering incoming call and information of mobile terminal
CN101895868A (en) * 2010-04-29 2010-11-24 上海华勤通讯技术有限公司 Method for filtering fallacious message based on mobile phone
CN101895628A (en) * 2010-05-21 2010-11-24 中山大学 System and method for recording multiple operation behaviors of mobile phone
CN101938612A (en) * 2010-08-26 2011-01-05 中兴通讯股份有限公司 Method and device for synchronously displaying new message while playing television program
WO2011069438A1 (en) * 2009-12-08 2011-06-16 北京网秦天下科技有限公司 Working method and system for self-learning intellectualized short message firewall of mobile terminal
CN102118515A (en) * 2011-04-14 2011-07-06 智比特信息技术(镇江)有限公司 Method for carrying out selective anonymity on communication records
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102299800A (en) * 2011-08-29 2011-12-28 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN102316430A (en) * 2011-09-23 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Telephone answering method and apparatus thereof
CN102412959A (en) * 2010-09-09 2012-04-11 西尔瑞特有限公司 Conditionally intercepting data indicating one or more aspects of a communique to obfuscate the one or more aspects of the communique
CN102447772A (en) * 2010-11-09 2012-05-09 微软公司 Privacy in mobile device communication
CN102571915A (en) * 2011-11-29 2012-07-11 王慧升 System for collecting and releasing 'harassing numbers'
CN102572750A (en) * 2011-12-26 2012-07-11 中兴通讯股份有限公司 Method and terminal for protecting short messages
CN102663106A (en) * 2012-04-13 2012-09-12 北京搜狗科技发展有限公司 Method and system for creating number information database
CN102724361A (en) * 2012-06-13 2012-10-10 广东步步高电子工业有限公司 Information processing method
CN102752732A (en) * 2012-07-09 2012-10-24 江南大学 Junk message rejection method based on cloud framework
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN102946601A (en) * 2012-11-27 2013-02-27 广东欧珀移动通信有限公司 Mobile phone and private communication management method thereof
CN103179533A (en) * 2011-12-23 2013-06-26 腾讯科技(深圳)有限公司 Call screening method and mobile terminal
CN103257787A (en) * 2013-05-16 2013-08-21 北京小米科技有限责任公司 Method and device for starting voice assistant application
CN103647865A (en) * 2013-11-27 2014-03-19 上海斐讯数据通信技术有限公司 Incoming call management method and system on the basis of gesture
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN104010284A (en) * 2014-05-30 2014-08-27 可牛网络技术(北京)有限公司 Method and device for processing spam short message
CN104052880A (en) * 2014-07-02 2014-09-17 深圳市中兴移动通信有限公司 Mobile terminal and harassment information processing method and device thereof
CN104219364A (en) * 2013-05-31 2014-12-17 腾讯科技(深圳)有限公司 Strange number processing method and device
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104284325A (en) * 2014-10-15 2015-01-14 北京搜狗科技发展有限公司 Method and device for updating address list
CN104301877A (en) * 2014-10-27 2015-01-21 小米科技有限责任公司 Short message prompting method and device
CN104333811A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Display method and electronic equipment
WO2015014250A1 (en) * 2013-07-30 2015-02-05 Tencent Technology (Shenzhen) Company Limited Incoming call management method and apparatus for mobile terminal
CN104378512A (en) * 2014-12-11 2015-02-25 北京奇虎科技有限公司 Mobile terminal and method for displaying communication information of mobile terminal
CN104539779A (en) * 2014-12-09 2015-04-22 深圳天珑无线科技有限公司 Electronic device and management method and module for blacklist of linkman list of electronic device
CN104584597A (en) * 2012-08-17 2015-04-29 朴相龙 User interface method which controls output of incoming dial tone of smart device
CN104822138A (en) * 2015-04-02 2015-08-05 深圳市金立通信设备有限公司 Short message prompting method
CN104836901A (en) * 2015-04-02 2015-08-12 深圳市金立通信设备有限公司 Terminal
CN105007361A (en) * 2015-06-13 2015-10-28 安徽味唯网络科技有限公司 Method for intelligently and automatically shielding nuisance calls
CN105119799A (en) * 2015-06-15 2015-12-02 阿里巴巴集团控股有限公司 Instant communication message processing method and client
CN105163296A (en) * 2015-09-22 2015-12-16 电子科技大学 Multi-dimensional spam message filtering method and system
CN105323388A (en) * 2014-05-26 2016-02-10 联想移动通信科技有限公司 Incoming call processing method, server, incoming call setting method and mobile terminal
CN105323732A (en) * 2014-06-05 2016-02-10 中国移动通信集团公司 Abnormal short message identification method and device
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
WO2016091074A1 (en) * 2014-12-08 2016-06-16 北京奇虎科技有限公司 Method, device and system for identifying harassment communications via mobile communication terminal
CN105744035A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Mobile communication terminal harassing communication interception method and mobile communication terminal
CN105792116A (en) * 2014-12-19 2016-07-20 北京奇虎科技有限公司 Method for determining region of mobile communication terminal and network side equipment
CN105979062A (en) * 2016-04-14 2016-09-28 北京小米移动软件有限公司 Method and device for processing communication event
CN106034176A (en) * 2015-03-16 2016-10-19 深圳酷派技术有限公司 Call management method of multi-system terminals, apparatus and terminal thereof
CN106358220A (en) * 2015-07-17 2017-01-25 腾讯科技(深圳)有限公司 Detection method of abnormal contact person information, device and system
CN106357938A (en) * 2016-11-30 2017-01-25 深圳天珑无线科技有限公司 Caller ID (identification) processing method and caller ID processing device
CN106470279A (en) * 2016-09-09 2017-03-01 北京珠穆朗玛移动通信有限公司 A kind of many cartoon letters method to set up and mobile terminal
CN106488025A (en) * 2016-10-18 2017-03-08 北京奇虎科技有限公司 Smart mobile phone and its method that message is processed
CN106527691A (en) * 2016-10-18 2017-03-22 北京奇虎科技有限公司 Message processing method and cloud server
CN106529238A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Information protection method and mobile terminal
US9641537B2 (en) 2008-08-14 2017-05-02 Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
CN106686194A (en) * 2016-09-06 2017-05-17 腾讯科技(深圳)有限公司 Information intercepting method, terminal and system
US9659188B2 (en) 2008-08-14 2017-05-23 Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
CN106713616A (en) * 2016-11-24 2017-05-24 腾讯科技(深圳)有限公司 Communication event processing method and device
CN106791229A (en) * 2012-04-13 2017-05-31 北京搜狗科技发展有限公司 The identification method and device of number
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal
WO2017124345A1 (en) * 2016-01-20 2017-07-27 李强生 Data acquisition method for missed call distinguishing technology and phone system
CN107046681A (en) * 2016-02-05 2017-08-15 普天信息技术有限公司 The group member of trunked communication system exempts to disturb the implementation method of function and device
CN107181857A (en) * 2017-04-07 2017-09-19 联想(北京)有限公司 A kind of information processing method and the first electronic equipment
CN107306395A (en) * 2016-04-22 2017-10-31 姚锐 A kind of call method for building up based on control of authority
CN107508957A (en) * 2017-09-25 2017-12-22 南京律智诚专利技术开发有限公司 A kind of communication filter identifying system
CN107708079A (en) * 2017-10-09 2018-02-16 西安交通大学 A kind of Barassment preventing telephone and to the method for its reverse punishment
CN108206892A (en) * 2017-12-29 2018-06-26 努比亚技术有限公司 Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN108462626A (en) * 2017-02-20 2018-08-28 腾讯科技(深圳)有限公司 A kind of processing method of instant communication information, device and system
CN109886012A (en) * 2019-01-03 2019-06-14 腾讯科技(深圳)有限公司 A kind of management method and system of application permission
CN110971746A (en) * 2018-09-29 2020-04-07 北京奇虎科技有限公司 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium
CN111324472A (en) * 2020-01-21 2020-06-23 上海众言网络科技有限公司 Method and device for judging garbage items of information to be detected
CN112073568A (en) * 2020-09-04 2020-12-11 中国科学院大学 Incoming call rejection method and system based on identity recognition
CN116055636A (en) * 2023-01-10 2023-05-02 荣耀终端有限公司 Strange call display method and mobile terminal
CN116418912A (en) * 2021-12-31 2023-07-11 博泰车联网(南京)有限公司 Communication information processing method in intelligent terminal, electronic equipment and storage medium
CN117834776A (en) * 2024-01-05 2024-04-05 广州新致信息科技有限公司 Intelligent monitoring system for mobile user suspicious telephone

Cited By (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
US9641537B2 (en) 2008-08-14 2017-05-02 Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US9659188B2 (en) 2008-08-14 2017-05-23 Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN101605308A (en) * 2009-03-05 2009-12-16 上海闻泰电子科技有限公司 A kind of management method of short message
WO2011069438A1 (en) * 2009-12-08 2011-06-16 北京网秦天下科技有限公司 Working method and system for self-learning intellectualized short message firewall of mobile terminal
CN101895868A (en) * 2010-04-29 2010-11-24 上海华勤通讯技术有限公司 Method for filtering fallacious message based on mobile phone
CN101895628A (en) * 2010-05-21 2010-11-24 中山大学 System and method for recording multiple operation behaviors of mobile phone
CN101854424A (en) * 2010-05-27 2010-10-06 深圳市五巨科技有限公司 Method and device for filtering incoming call and information of mobile terminal
CN101938612A (en) * 2010-08-26 2011-01-05 中兴通讯股份有限公司 Method and device for synchronously displaying new message while playing television program
CN102710587A (en) * 2010-09-09 2012-10-03 西尔瑞特有限公司 Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiques addressed to the one or more secret entities
CN102412959A (en) * 2010-09-09 2012-04-11 西尔瑞特有限公司 Conditionally intercepting data indicating one or more aspects of a communique to obfuscate the one or more aspects of the communique
CN106453800A (en) * 2010-11-09 2017-02-22 微软技术许可有限责任公司 Privacy in mobile device communications
CN102447772A (en) * 2010-11-09 2012-05-09 微软公司 Privacy in mobile device communication
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102118503B (en) * 2011-01-25 2013-12-11 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102118515A (en) * 2011-04-14 2011-07-06 智比特信息技术(镇江)有限公司 Method for carrying out selective anonymity on communication records
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN102299800A (en) * 2011-08-29 2011-12-28 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN102299800B (en) * 2011-08-29 2014-01-29 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN102316430A (en) * 2011-09-23 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Telephone answering method and apparatus thereof
CN102571915A (en) * 2011-11-29 2012-07-11 王慧升 System for collecting and releasing 'harassing numbers'
CN103179533A (en) * 2011-12-23 2013-06-26 腾讯科技(深圳)有限公司 Call screening method and mobile terminal
CN102572750A (en) * 2011-12-26 2012-07-11 中兴通讯股份有限公司 Method and terminal for protecting short messages
CN102663106A (en) * 2012-04-13 2012-09-12 北京搜狗科技发展有限公司 Method and system for creating number information database
CN106791229A (en) * 2012-04-13 2017-05-31 北京搜狗科技发展有限公司 The identification method and device of number
CN102724361A (en) * 2012-06-13 2012-10-10 广东步步高电子工业有限公司 Information processing method
CN102752732A (en) * 2012-07-09 2012-10-24 江南大学 Junk message rejection method based on cloud framework
CN104584597A (en) * 2012-08-17 2015-04-29 朴相龙 User interface method which controls output of incoming dial tone of smart device
CN102946601A (en) * 2012-11-27 2013-02-27 广东欧珀移动通信有限公司 Mobile phone and private communication management method thereof
CN102946601B (en) * 2012-11-27 2015-07-01 广东欧珀移动通信有限公司 Mobile phone and private communication management method thereof
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN103257787A (en) * 2013-05-16 2013-08-21 北京小米科技有限责任公司 Method and device for starting voice assistant application
CN104219364A (en) * 2013-05-31 2014-12-17 腾讯科技(深圳)有限公司 Strange number processing method and device
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104333811A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Display method and electronic equipment
WO2015014250A1 (en) * 2013-07-30 2015-02-05 Tencent Technology (Shenzhen) Company Limited Incoming call management method and apparatus for mobile terminal
CN103647865B (en) * 2013-11-27 2019-06-07 上海斐讯数据通信技术有限公司 Call management method and system based on gesture
CN103647865A (en) * 2013-11-27 2014-03-19 上海斐讯数据通信技术有限公司 Incoming call management method and system on the basis of gesture
CN105323388A (en) * 2014-05-26 2016-02-10 联想移动通信科技有限公司 Incoming call processing method, server, incoming call setting method and mobile terminal
CN104010284A (en) * 2014-05-30 2014-08-27 可牛网络技术(北京)有限公司 Method and device for processing spam short message
CN105323732B (en) * 2014-06-05 2018-12-04 中国移动通信集团公司 A kind of improper short message identification method and device
CN105323732A (en) * 2014-06-05 2016-02-10 中国移动通信集团公司 Abnormal short message identification method and device
CN104052880A (en) * 2014-07-02 2014-09-17 深圳市中兴移动通信有限公司 Mobile terminal and harassment information processing method and device thereof
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN104284325A (en) * 2014-10-15 2015-01-14 北京搜狗科技发展有限公司 Method and device for updating address list
CN104284325B (en) * 2014-10-15 2018-07-31 北京搜狗科技发展有限公司 A kind of address book updating method and device
CN104301877A (en) * 2014-10-27 2015-01-21 小米科技有限责任公司 Short message prompting method and device
CN105744525A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Method, device and system for mobile communication terminal to identify harassing communication
CN105744035B (en) * 2014-12-08 2019-04-19 北京奇虎科技有限公司 Mobile communication terminal carries out the method and mobile communication terminal that harassing and wrecking communication intercepts
CN105744035A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Mobile communication terminal harassing communication interception method and mobile communication terminal
WO2016091074A1 (en) * 2014-12-08 2016-06-16 北京奇虎科技有限公司 Method, device and system for identifying harassment communications via mobile communication terminal
CN104539779A (en) * 2014-12-09 2015-04-22 深圳天珑无线科技有限公司 Electronic device and management method and module for blacklist of linkman list of electronic device
CN104378512A (en) * 2014-12-11 2015-02-25 北京奇虎科技有限公司 Mobile terminal and method for displaying communication information of mobile terminal
CN105792116B (en) * 2014-12-19 2019-08-30 北京奇虎科技有限公司 Determine the method and network side equipment of the affiliated region of mobile communication terminal
CN105792116A (en) * 2014-12-19 2016-07-20 北京奇虎科技有限公司 Method for determining region of mobile communication terminal and network side equipment
CN106034176A (en) * 2015-03-16 2016-10-19 深圳酷派技术有限公司 Call management method of multi-system terminals, apparatus and terminal thereof
CN104822138A (en) * 2015-04-02 2015-08-05 深圳市金立通信设备有限公司 Short message prompting method
CN104836901A (en) * 2015-04-02 2015-08-12 深圳市金立通信设备有限公司 Terminal
CN105007361A (en) * 2015-06-13 2015-10-28 安徽味唯网络科技有限公司 Method for intelligently and automatically shielding nuisance calls
US10367779B2 (en) 2015-06-15 2019-07-30 Alibaba Group Holding Limited Method and client terminal for prompting instant communication message
CN105119799B (en) * 2015-06-15 2019-11-19 阿里巴巴集团控股有限公司 Instant communication information processing method and client
CN105119799A (en) * 2015-06-15 2015-12-02 阿里巴巴集团控股有限公司 Instant communication message processing method and client
WO2017012401A1 (en) * 2015-07-17 2017-01-26 腾讯科技(深圳)有限公司 Abnormal contact information detection method, server and system
CN106358220B (en) * 2015-07-17 2019-11-22 腾讯科技(深圳)有限公司 The detection method of abnormal contact information, apparatus and system
US10205813B2 (en) * 2015-07-17 2019-02-12 Tencent Technology (Shenzhen) Company Limited Method and system for detecting abnormal contact information and server
CN106358220A (en) * 2015-07-17 2017-01-25 腾讯科技(深圳)有限公司 Detection method of abnormal contact person information, device and system
US20180034949A1 (en) * 2015-07-17 2018-02-01 Tencent Technology (Shenzhen) Company Limited Method and system for detecting abnormal contact information and server
CN105163296A (en) * 2015-09-22 2015-12-16 电子科技大学 Multi-dimensional spam message filtering method and system
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal
WO2017124345A1 (en) * 2016-01-20 2017-07-27 李强生 Data acquisition method for missed call distinguishing technology and phone system
CN107046681A (en) * 2016-02-05 2017-08-15 普天信息技术有限公司 The group member of trunked communication system exempts to disturb the implementation method of function and device
CN107046681B (en) * 2016-02-05 2020-08-14 普天信息技术有限公司 Method and device for realizing interference-free function of group members of trunking communication system
CN105979062A (en) * 2016-04-14 2016-09-28 北京小米移动软件有限公司 Method and device for processing communication event
CN105979062B (en) * 2016-04-14 2020-01-10 北京小米移动软件有限公司 Communication event processing method and device
CN107306395A (en) * 2016-04-22 2017-10-31 姚锐 A kind of call method for building up based on control of authority
CN106686194A (en) * 2016-09-06 2017-05-17 腾讯科技(深圳)有限公司 Information intercepting method, terminal and system
CN106470279A (en) * 2016-09-09 2017-03-01 北京珠穆朗玛移动通信有限公司 A kind of many cartoon letters method to set up and mobile terminal
CN106488025B (en) * 2016-10-18 2019-12-03 北京安云世纪科技有限公司 Smart phone and its method that message is handled
CN106527691B (en) * 2016-10-18 2020-01-07 北京安云世纪科技有限公司 Method for processing message and cloud server
CN106488025A (en) * 2016-10-18 2017-03-08 北京奇虎科技有限公司 Smart mobile phone and its method that message is processed
CN106527691A (en) * 2016-10-18 2017-03-22 北京奇虎科技有限公司 Message processing method and cloud server
CN106529238A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Information protection method and mobile terminal
CN106713616B (en) * 2016-11-24 2019-03-08 腾讯科技(深圳)有限公司 Communication event processing method and processing device
CN106713616A (en) * 2016-11-24 2017-05-24 腾讯科技(深圳)有限公司 Communication event processing method and device
CN106357938A (en) * 2016-11-30 2017-01-25 深圳天珑无线科技有限公司 Caller ID (identification) processing method and caller ID processing device
CN108462626B (en) * 2017-02-20 2021-07-06 腾讯科技(深圳)有限公司 Instant messaging information processing method, device and system
CN108462626A (en) * 2017-02-20 2018-08-28 腾讯科技(深圳)有限公司 A kind of processing method of instant communication information, device and system
CN107181857A (en) * 2017-04-07 2017-09-19 联想(北京)有限公司 A kind of information processing method and the first electronic equipment
CN107508957A (en) * 2017-09-25 2017-12-22 南京律智诚专利技术开发有限公司 A kind of communication filter identifying system
CN107708079A (en) * 2017-10-09 2018-02-16 西安交通大学 A kind of Barassment preventing telephone and to the method for its reverse punishment
CN108206892A (en) * 2017-12-29 2018-06-26 努比亚技术有限公司 Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN110971746A (en) * 2018-09-29 2020-04-07 北京奇虎科技有限公司 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium
CN109886012A (en) * 2019-01-03 2019-06-14 腾讯科技(深圳)有限公司 A kind of management method and system of application permission
CN109886012B (en) * 2019-01-03 2023-03-07 腾讯科技(深圳)有限公司 Application authority management method and system
CN111324472A (en) * 2020-01-21 2020-06-23 上海众言网络科技有限公司 Method and device for judging garbage items of information to be detected
CN111324472B (en) * 2020-01-21 2020-11-20 上海众言网络科技有限公司 Method and device for judging garbage items of information to be detected
CN112073568A (en) * 2020-09-04 2020-12-11 中国科学院大学 Incoming call rejection method and system based on identity recognition
CN116418912A (en) * 2021-12-31 2023-07-11 博泰车联网(南京)有限公司 Communication information processing method in intelligent terminal, electronic equipment and storage medium
CN116055636A (en) * 2023-01-10 2023-05-02 荣耀终端有限公司 Strange call display method and mobile terminal
CN116055636B (en) * 2023-01-10 2023-11-14 荣耀终端有限公司 Strange call display method, mobile terminal and storage medium
CN117834776A (en) * 2024-01-05 2024-04-05 广州新致信息科技有限公司 Intelligent monitoring system for mobile user suspicious telephone

Similar Documents

Publication Publication Date Title
CN101184264A (en) Mobile phone telephone and message anti-disturbance and private communication method and system
CN1823347B (en) Be used to provide a kind of system and method for service
CN201142742Y (en) Address book management system
CN104429024B (en) The method that destination address suggestion is provided
US20030152207A1 (en) Telecommunications and cellular telephone homepage call screening control center
CN101631311A (en) Profile service for sharing rights-enabled mobile profiles
CN101754182A (en) Packed-based network contact list implementation method and system
CN101702795A (en) System and method for sharing authority enabled user simple files
CN104038647A (en) Social communication system
GB2408179A (en) Multi-user mobile telephone
CN101808086A (en) Method for adding and storing telephone website in communication terminal telephone directory
CN101621393A (en) Determining a preferable mode of communicating with a called party
CN101141530A (en) Centralised storage of data
CN101707640A (en) Push-to-talk (PTT) voice mobile phone terminal, communication service system and communication service method thereof
US20040066924A1 (en) Automated reminder system
WO2014106385A1 (en) Method and system for integrating information about each contact person and mobile terminal
CN101212733A (en) Method for setting a short message for calendar reminding automatically on mobile telephone
CN106789550A (en) Information processing method and device
CN101406028A (en) Dynamic speed dial number mapping
AU2010337430A1 (en) System and method for a global directory service
CN104301490A (en) Method for associating communication object with record and smart mobile terminal
US8300780B1 (en) Smart capture for populating an address book with entries
CN103548368B (en) For using annular data to provide the ARS system and method for interlocking data
CN101202760A (en) Remote control operation
CN103051792A (en) Contact information changing method and communication terminal thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080521