CN103037062A - Method and terminal and server used for intercepting crank calls - Google Patents

Method and terminal and server used for intercepting crank calls Download PDF

Info

Publication number
CN103037062A
CN103037062A CN2012105260487A CN201210526048A CN103037062A CN 103037062 A CN103037062 A CN 103037062A CN 2012105260487 A CN2012105260487 A CN 2012105260487A CN 201210526048 A CN201210526048 A CN 201210526048A CN 103037062 A CN103037062 A CN 103037062A
Authority
CN
China
Prior art keywords
described
information
harassing call
incoming information
server
Prior art date
Application number
CN2012105260487A
Other languages
Chinese (zh)
Inventor
曹万鹏
杜杏兰
王尧
严琦
Original Assignee
中国联合网络通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国联合网络通信集团有限公司 filed Critical 中国联合网络通信集团有限公司
Priority to CN2012105260487A priority Critical patent/CN103037062A/en
Publication of CN103037062A publication Critical patent/CN103037062A/en

Links

Abstract

The invention provides a method, a terminal and a server used for intercepting crank calls. According to the method used for intercepting crank calls, incoming call information is obtained, and then the incoming call information is sent to the server, so that the server searches in a local crank call data base and judges whether the incoming call information is a crank call; prompt information sent from the server is received and is used for indicating whether the incoming call information is the crank call; and if the prompt information indicates that the incoming call information is the crank call, the incoming call information is intercepted. According to the method and the terminal and the server used for intercepting crank calls, after a call is received by the terminal, the incoming call information is checked and judged in the crank call data base through the server, the judged result is sent to the terminal through the prompt information, and therefore the prevention capacity of a user against crank calls and fraud calls is effectively improved.

Description

Harassing call hold-up interception method, terminal and server

Technical field

The present invention relates to communication technical field, relate in particular to a kind of harassing call hold-up interception method, terminal and server.

Background technology

Fast development along with the information age, intelligent mobile phone terminal has become one of indispensable communication tool in people's life, its also many hidden danger under cover when giving people life and bringing convenience, as make nuisance calls, mobile phone swindle is exactly one of wherein maximum hidden danger, had a strong impact on people's normal production, life.

Existing harassing call hold-up interception method, interpolation harassing and wrecking, fraudulent call number are realized the interception to harassing call in the anti-harassment Software Blacklist that the user arranges in terminal.Yet the harassing and wrecking that the method was not received in the past for the user, fraudulent call do not possess the prevention and control ability.

Summary of the invention

The invention provides a kind of harassing call hold-up interception method, terminal and server, in order to solving in the existing harassing call hold-up interception method, the harassing and wrecking of not receiving in the past for the user, the problem that fraudulent call does not possess the prevention and control ability.

On the one hand, the embodiment of the invention provides a kind of harassing call hold-up interception method, it is characterized in that, comprising:

Obtain incoming information;

Described incoming information is sent to server, so that whether the harassing call database lookup described incoming information of described server in this locality is harassing call;

Receive the information that described server sends, whether described information is used to indicate described incoming information is harassing call;

If it is harassing call that described information is indicated described incoming information, then described incoming information is tackled.

The embodiment of the invention provides another harassing call hold-up interception method, it is characterized in that, comprising:

The incoming information that receiving terminal sends;

In the harassing call database of this locality, search described incoming information, to judge that whether described incoming information is as harassing call;

Send information to described terminal, whether described information is used to indicate described incoming information is harassing call, so that described terminal is tackled harassing call.

On the other hand, the embodiment of the invention provides a kind of terminal, it is characterized in that, comprising:

Acquisition module is used for obtaining incoming information;

The first sending module is used for described incoming information is sent to server, so that whether the harassing call database lookup described incoming information of described server in this locality is harassing call;

The first receiver module is used for receiving the information that described server sends, and whether described information is used to indicate described incoming information is harassing call;

Processing module is used for when described information indicates described incoming information to be harassing call described incoming information being tackled.

On the other hand, the embodiment of the invention provides a kind of server, it is characterized in that, comprising:

The second receiver module is used for the incoming information that receiving terminal sends;

Search module, be used for searching described incoming information at the harassing call database of this locality, to judge that whether described incoming information is as harassing call;

The second sending module is used for sending information to described terminal, and whether described information is used to indicate described incoming information is harassing call, so that described terminal is tackled harassing call.

Harassing call hold-up interception method provided by the invention, terminal and server after terminal receives incoming call, by in the harassing call database in the server incoming information being searched and judged, and send to terminal with judged result in the information mode.Thereby Effective Raise the user to harassing and wrecking, fraudulent call the prevention and control ability.

Description of drawings

Fig. 1 is the flow chart of an embodiment of harassing call hold-up interception method provided by the invention;

Fig. 2 is the flow chart of another embodiment of harassing call hold-up interception method provided by the invention;

Fig. 3 is the flow chart of another embodiment of harassing call hold-up interception method provided by the invention;

Fig. 4 is the structural representation of an embodiment of terminal provided by the invention;

Fig. 5 is the structural representation of another embodiment of terminal provided by the invention;

Fig. 6 is the structural representation of an embodiment of server provided by the invention;

Fig. 7 is the structural representation of another embodiment of server provided by the invention.

Embodiment

Fig. 1 is the flow chart of an embodiment of harassing call hold-up interception method provided by the invention, and the executive agent of the method following steps can be terminal, such as mobile phone, and landline telephone etc.Perhaps can also be to be integrated in chip in the terminal, module etc.As shown in Figure 1, this harassing call hold-up interception method specifically comprises:

S101 obtains incoming information;

The telephone number that this incoming information can receive for terminal, for example: phone number, fixed telephone number or network IP telephone number etc.

S102 is sent to server with incoming information, so that whether the harassing call database lookup described incoming information of server in this locality is harassing call;

Particularly, after terminal is obtained incoming information, for strange incoming information, i.e. do not have the number information of storage in the local communication record, terminal can be sent to server with incoming information.This server can be the server with number inquiry function of network side setting, is provided with the harassing call database of storage harassing call on it.After server receives the incoming information of terminal transmission, can by this incoming information of inquiry in the harassing call database of this locality, if comprise, judge that then this incoming information is harassing call.Wherein, the harassing call information of storing in this harassing call database can be collected and is stored in the server by operator, perhaps can also be provided by public security department, perhaps, can also be provided by the terminal use.

Optionally, before terminal sent to server with incoming information, terminal can also judge first whether this incoming information is present in the address list or Local Black list of terminal.Wherein, the Local Black list is the phone information tabulation that is arranged in the anti-harassment software of terminal inner, and this phone information can directly be inputted by the user, when terminal is received phone information in the blacklist, can directly tackle this phone information.If this incoming information is present in the address list, then the user can access this incoming call; If this incoming information is present in the Local Black list, then the user can tackle this incoming information, is specifically as follows to press refusal button refusal and answer, and perhaps can also not press any button and wait for that the caller hangs up.

S103, the information that reception server sends, whether this information is used to indicate incoming information is harassing call;

When terminal sends incoming information to server, server inquire about this incoming information in the harassing call database of this locality, inquire about complete backward terminal transmission information.Terminal receives the information that server returns, and whether this information indicates this incoming information is harassing call.

S104 is harassing call if information is indicated this incoming information, then this incoming information is tackled.

Particularly, when server found this incoming information in the harassing call database, it was harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user saw this information, refusal was answered this incoming call, to realize the interception to harassing call; When server did not find this incoming information in the harassing call database, it was not harassing call in the local harassing call database that this information will be indicated this incoming information, and determines whether to answer this incoming call by the user.

Further, after the information that receives the server transmission, if the harassing call in the harassing call database that this information indication incoming information is not this locality, and determining behind the incoming call answering that this incoming information is in the situation of harassing call, terminal can send report information to server, it is harassing call that this report information is used to indicate this incoming information, so that server is stored in this harassing call in the local harassing call database, realizes the phone information of database is upgraded.Particularly, the user can find this message registration in the nearest call catalog of terminal, and by the report key in the menu this incoming information is sent to server, has finished the transmission of report information.Receive the report information for same incoming information of the different user terminals transmission of satisfying more than the setting quantity when server after, this incoming information is stored in the described harassing call database.Wherein, this setting quantity can according to circumstances be set by operator.For example, receive N(N when server and equal 2) individual above different user terminals send for same incoming information report information the time, just this incoming information is stored in the described harassing call database.

Harassing call hold-up interception method provided by the invention after terminal receives incoming call, by in the harassing call database in server incoming information being searched and judged, and sends to terminal with judged result in the information mode.Thereby Effective Raise the user to harassing and wrecking, fraudulent call the prevention and control ability.

Fig. 2 is the flow chart of another embodiment of harassing call hold-up interception method provided by the invention, and the executive agent of the method following steps can be the server with number inquiry function of network side setting.As shown in Figure 2, this harassing call hold-up interception method specifically comprises:

S201, the incoming information that receiving terminal sends;

The telephone number that this incoming information can receive for terminal, for example: phone number, fixed telephone number or network IP telephone number etc.

S202 searches this incoming information in the harassing call database of this locality, to judge that whether this incoming information is as harassing call;

Particularly, after terminal is obtained incoming information, for strange incoming information, i.e. do not have the number information of storage in the local communication record, terminal can be sent to server with incoming information.This server can be the server with number inquiry function of network side setting, is provided with the harassing call database of storage harassing call on it.Receive the incoming information of terminal transmission when server after, by searching local harassing call database, determine whether comprise this incoming information in this harassing call database, if comprise, judge that then this incoming information is harassing call.Wherein, the harassing call information of storing in this harassing call database can be collected and is stored in the server by operator, perhaps can also be provided by public security department, perhaps, can also be provided by the terminal use.

S203 sends information to terminal, and whether this information is used to indicate incoming information is harassing call, so that terminal is tackled harassing call.

Particularly, when server found this incoming information in the harassing call database, it was harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user saw this information, refusal was answered this incoming call, to realize the interception to harassing call; When server did not find this incoming information in the harassing call database, it was not harassing call in the local harassing call database that this information will be indicated this incoming information, and determines whether to answer this incoming call by the user.

Further, terminal is after the information that receives the server transmission, also comprise: if the harassing call in the harassing call database that this information indication incoming information is not this locality, and determining behind the incoming call answering that this incoming information is in the situation of harassing call, terminal can send report information to server, and it is harassing call that this report information is used to indicate this incoming information.Server is stored in this harassing call in the local harassing call database behind the report information that receives the terminal transmission, thereby realizes phone information in this database is upgraded.Particularly, the user can find this message registration in the nearest call catalog of terminal, and by the report key in the menu this incoming information is sent to server, to finish the transmission of report information.Receive the report information for same incoming information of the different user terminals transmission of satisfying more than the setting quantity when server after, this incoming information is stored in the described harassing call database.Wherein, this setting quantity can according to circumstances be set by operator.For example, receive N(N when server and equal 2) individual above different user terminals send for same incoming information report information the time, just this incoming information is stored in the described harassing call database.

Harassing call hold-up interception method provided by the invention after terminal receives incoming call, by in the harassing call database in server incoming information being searched and judged, and sends to terminal with judged result in the information mode.Thereby Effective Raise the user to harassing and wrecking, fraudulent call the prevention and control ability.

Fig. 3 is the flow chart of another embodiment of harassing call hold-up interception method provided by the invention, and as shown in Figure 3, this harassing call hold-up interception method specifically comprises:

S301, terminal is obtained incoming information;

The telephone number that this incoming information can receive for terminal, for example: phone number, fixed telephone number or network IP telephone number etc.

S302 determines whether incoming information is present in the Local Black list; If this incoming information is present in the Local Black list, then incoming information is tackled.

Particularly, after receiving incoming information, judge first whether this incoming information is present in the address list or Local Black list of terminal.Wherein, the Local Black list is the phone information tabulation that is arranged in the anti-harassment software of terminal inner, and this phone information can directly be inputted by the user, when terminal is received phone information in the blacklist, can directly tackle this phone information.If this incoming information is present in the address list, then the user can access this incoming call; If this incoming information is present in the Local Black list, then the user can tackle this incoming information, is specifically as follows to press refusal button refusal and answer, and perhaps can also not press any button and wait for that the caller hangs up.

S303, terminal is sent to server with incoming information, so that whether server this incoming information of harassing call database lookup in this locality is harassing call;

Particularly, when this incoming information of terminal judges is the Stranger Calls that is not present in the Local Black list, i.e. do not have the number information of storage in the local communication record, this incoming information can be sent to server.This server can be the server with number inquiry function of network side setting, is provided with the harassing call database of storage harassing call on it.Whether server comprises this incoming information by searching in this database, if comprise, judge that then this incoming information is harassing call.Wherein, the harassing call information of storing in this harassing call database can be collected and is stored in the server by operator, perhaps can also be provided by public security department, perhaps, can also be provided by the terminal use.

S304, server is searched incoming information in the harassing call database of this locality, to judge that whether this incoming information is as harassing call;

Particularly, server comes whether to comprise this incoming information in the specified data storehouse by searching local harassing call database, if comprise, judges that then this incoming information is harassing call.

S305, server send information to terminal, and whether this information is used to indicate incoming information is harassing call, so that terminal is tackled this harassing call.

Particularly, when finding this incoming information in the harassing call database of server in this locality, it is harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user saw this information, refusal was answered this incoming call, to realize the interception to harassing call; When not finding this incoming information in the harassing call database of server in this locality, it is not harassing call in the local harassing call database that this information will be indicated this incoming information, and determines whether to answer this incoming call by the user.

S306, if information indication incoming information is harassing call, then terminal is tackled this incoming information.

Particularly, when finding this incoming information in the harassing call database of server in this locality, it is harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user saw this information, refusal was answered this incoming call, to realize the interception to harassing call.

Further, after step 306, can also comprise step 307 ~ 308:

S307, if information indication incoming information is not the harassing call in the local harassing call database, definite this incoming information is harassing call after answering this incoming call;

Send report information to server, it is harassing call that this report information is used to indicate this incoming information, so that this server is stored in this harassing call in the local harassing call database.

Particularly, after the information that receives the server transmission, if the harassing call in the harassing call database that this information indication incoming information is not this locality, and determining behind the incoming call answering that this incoming information is in the situation of harassing call, terminal can send report information to server, it is harassing call that this report information is used to indicate this incoming information, so that server is stored in this harassing call in the local harassing call database, realizes the phone information of database is upgraded.Particularly, the user can find this message registration in the nearest call catalog of terminal, and by the report key in the menu this incoming information is sent to server, to finish the transmission of report information.

S308, server judge whether to receive the report information for same incoming information of setting the above different terminals transmission of quantity;

Set the report information for same incoming information that the above different terminals of quantity sends if receive, then this incoming information is stored in the local harassing call database.

Particularly, after server receives the report information for same incoming information that different user terminals that satisfy to set more than the quantity sends, this incoming information is stored in the local harassing call database.Wherein, this setting quantity can according to circumstances be set by operator.For example, receive N(N when server and equal 2) individual above different user terminals send for same incoming information report information the time, just this incoming information is stored in the harassing call database of this locality.

The harassing call hold-up interception method that the embodiment of the invention provides, terminal can be after receiving incoming call, by in the harassing call database in server incoming information being searched and being judged that server sends to terminal with judged result in the information mode; Terminal can also send report information to server the harassing call database is upgraded, thereby the Effective Raise user is to the prevention and control ability of harassing and wrecking, fraudulent call.

Fig. 4 is the structural representation of an embodiment of terminal provided by the invention, the institute that this terminal can be carried out as shown in Figure 1 harassing call hold-up interception method in steps, and the part steps in the harassing call hold-up interception method as shown in Figure 3.The function of this terminal also can be finished by the chip or the module that are integrated in the terminal.As shown in Figure 4, this terminal comprises: acquisition module 41, the first sending module 42, first receive 43 of moulds and processing module 44, wherein:

Acquisition module 41 is used for obtaining incoming information;

The first sending module 42 is used for incoming information is sent to server, so that whether server this incoming information of harassing call database lookup in this locality is harassing call;

The first receiver module 43 is used for the information that reception server sends, and whether this information is used to indicate incoming information is harassing call;

Processing module 44 is used for when information indication incoming information is harassing call this incoming information being tackled.

Particularly, terminal is after receiving incoming call, the telephone number that terminal is received by acquisition module 41, for example: phone number, fixed telephone number or network IP telephone number etc. extract as incoming information, and by the Stranger Calls information that the first sending module 42 is incited somebody to action wherein, i.e. there is not the number information of storage to be sent to server in the local communication record.This server can be the server with number inquiry function of network side setting, is provided with the harassing call database of storage harassing call on it.This server if comprise, judges then that this incoming information is harassing call by search this incoming information in the harassing call database of this locality.Wherein, the harassing call information of storing in this harassing call database can be collected and is stored in the server by operator, perhaps can also be provided by public security department, perhaps, can also be provided by the terminal use.When terminal sends incoming information to server by the first sending module 42, can receive the information that server returns by the first receiver module 43, whether this information indicates this incoming information is harassing call.Particularly, server is behind the incoming information that receives the terminal transmission, can in the harassing call database of this locality, search this incoming information, when finding this incoming information in the harassing call database of server in this locality, it is harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user sees this information, answer this incoming call by processing module 44 refusals, to realize the interception to harassing call; When not finding this incoming information in the harassing call database of server in this locality, it is not harassing call in the local harassing call database that this information will be indicated this incoming information, and determines whether to answer this incoming call by the user.

Fig. 5 is the structural representation of another embodiment of terminal provided by the invention, and on basis embodiment illustrated in fig. 4, optional, this terminal can also comprise: determination module 45, as shown in Figure 5, wherein:

Determination module 45 is used for determining whether incoming information is present in the Local Black list;

If incoming information is present in the Local Black list, then tackle by 44 pairs of these incoming informations of processing module.

Further, above-mentioned the first sending module 42, also being used for when judging that information is indicated this incoming information is not the harassing call of the harassing call database of this locality, is defined as harassing call behind incoming call answering;

Send report information to this server, it is harassing call that this report information is used to indicate this incoming information, so that this server is stored in this harassing call in the local harassing call database.

Particularly, send incoming informations by the first sending module 42 to the server in terminal, judge by determination module 45 whether this incoming information is present in the address list or Local Black list of terminal first.Wherein, the Local Black list is the phone information tabulation that is arranged in the anti-harassment software of terminal inner, and this phone information can directly be inputted by the user, when terminal is received phone information in the blacklist, can directly tackle incoming information.If this incoming information is present in the address list, then the user can access this incoming call; If this incoming information is present in the Local Black list, then the user can tackle this incoming information, is specifically as follows to press refusal button refusal and answer, and perhaps can also not press any button and wait for that the caller hangs up.

Further, terminal receives the information of server transmission by the first receiver module 43 after, if the harassing call in the harassing call database that this information indication incoming information is not this locality, and determining behind the incoming call answering that this incoming information is in the situation of harassing call, terminal can send report information to server by the first sending module 42, it is harassing call that this report information is used to indicate this incoming information, so that server is stored in this harassing call in the local harassing call database, realize the phone information of database is upgraded.Particularly, the user can find this message registration in the nearest call catalog of terminal, and by the report key in the menu this incoming information is sent to server, has finished the transmission of report information.Receive the report information for same incoming information of the different user terminals transmission of satisfying more than the setting quantity when server after, this incoming information is stored in the local harassing call database.Wherein, this setting quantity can according to circumstances be set by operator.For example, receive N(N when server and equal 2) individual above different user terminals send for same incoming information report information the time, just this incoming information is stored in the harassing call database of this locality.

The terminal that the embodiment of the invention provides after receiving incoming call, by in the harassing call database in server incoming information being searched and judged, and sends to terminal with judged result in the information mode.Thereby Effective Raise the user to harassing and wrecking, fraudulent call the prevention and control ability.

Fig. 6 is the structural representation of an embodiment of server provided by the invention, this server can be the server with number inquiry function of network side setting, and can carry out the institute of harassing call hold-up interception method as shown in Figure 2 in steps, and the part steps in the harassing call hold-up interception method as shown in Figure 3.As shown in Figure 6, this server comprises: the second receiver module 61, search module 62 and the second sending module 63, wherein:

The second receiver module 61 is used for the incoming information that receiving terminal sends;

Search module 62, be used for searching this incoming information at the harassing call database of this locality, to judge that whether this incoming information is as harassing call;

The second sending module 63 is used for sending information to terminal, and whether this information is used to indicate this incoming information is harassing call, so that terminal is tackled this harassing call.

Particularly, the incoming information that server sends by the second receiver module 61 receiving terminals, the telephone number that this incoming information can receive for terminal, for example: phone number, fixed telephone number or network IP telephone number etc.This server can be the server with number inquiry function of network side setting, is provided with the harassing call database of storage harassing call on it.This server searches in the local harassing call database whether comprise this incoming information by searching module 62, if comprise, judges that then this incoming information is harassing call.Wherein, the harassing call information of storing in this harassing call database can be collected and is stored in the server by operator, perhaps can also be provided by public security department, perhaps, can also be provided by the terminal use.When server by search module 62 search local harassing call database complete after, can send informations to terminal by the second sending module 63.Particularly, when finding this incoming information in the harassing call database of server in this locality, it is harassing call that this information will be indicated this incoming information, and suggestion user refusal is answered.After the user saw this information, refusal was answered this incoming call, to realize the interception to harassing call; When not finding this incoming information in the harassing call database of server in this locality, it is not harassing call in the local harassing call database that this information will be indicated this incoming information, and determines whether to answer this incoming call by the user.

Further, the second receiver module 61 in this server also can be used for the report information that receiving terminal sends, and it is harassing call that this report information is used to indicate this incoming information;

Optionally, this server can also comprise: memory module 64 and processing module 65, as shown in Figure 7, wherein:

Memory module 64 is used for described incoming information is stored in local harassing call database;

Processing module 65 is used for judging whether the second receiver module 61 receives the report information for same described incoming information of setting the above different terminals transmission of quantity;

Particularly, terminal is after receiving the information of server by 63 transmissions of the second sending module, if the harassing call in the harassing call database that this information indication incoming information is not this locality, and determining behind the incoming call answering that this incoming information is in the situation of harassing call, terminal can send report information to server, and it is harassing call that this report information is used to indicate this incoming information.Server can receive the report information that terminal sends by the second receiver module 61, if this report information quantity that sends for the different terminals of this incoming information reaches setting quantity, then server can be stored in this incoming information in the described harassing call database by memory module 64.

Wherein, the user send report information step can for: the user sends to server by the report key in the menu with this incoming information find this message registration in the nearest call catalog of terminal after, to finish the transmission of report information.And judge whether the second receiver module 61 receives the report information of setting the above terminal transmission of quantity and can be finished by processing module 65, its concrete deterministic process is: after receiving the report information for same incoming information that satisfies the different user terminals transmission of setting more than the quantity when the second receiver module 61, this incoming information is stored in the local harassing call database.Wherein, this setting quantity can according to circumstances be set by operator.For example, receive N(N when server and equal 2) individual above different user terminals send for same incoming information report information the time, just this incoming information is stored in the harassing call database of this locality.

The server that the embodiment of the invention provides can be by searching incoming information in the harassing call database of this locality and judge, and inform that by the mode of information the received incoming information of terminal is harassing call; Report information that can also receiving terminal upgrades the harassing call database of this locality, thereby the Effective Raise user is to the prevention and control ability of harassing and wrecking, fraudulent call.

One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can be finished by the relevant hardware of program command.Aforesaid program can be stored in the computer read/write memory medium.This program is carried out the step that comprises above-mentioned each embodiment of the method when carrying out; And aforesaid storage medium comprises: the various media that can be program code stored such as ROM, RAM, magnetic disc or CD.

It should be noted that at last: above each embodiment is not intended to limit only in order to technical scheme of the present invention to be described; Although with reference to aforementioned each embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment puts down in writing, and perhaps some or all of technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the scope of various embodiments of the present invention technical scheme.

Claims (12)

1. a harassing call hold-up interception method is characterized in that, comprising:
Obtain incoming information;
Described incoming information is sent to server, so that whether the harassing call database lookup described incoming information of described server in this locality is harassing call;
Receive the information that described server sends, whether described information is used to indicate described incoming information is harassing call;
If it is harassing call that described information is indicated described incoming information, then described incoming information is tackled.
2. harassing call hold-up interception method according to claim 1 is characterized in that, described described incoming information is sent to server before, also comprise:
Determine whether described incoming information is present in the Local Black list; If described incoming information is present in the described Local Black list, then described incoming information is tackled.
3. harassing call hold-up interception method according to claim 1 and 2 is characterized in that, after the information that the described server of described reception sends, also comprises:
If it is not harassing call in the harassing call database of described this locality that described information is indicated described incoming information, determine that behind incoming call answering described incoming information is harassing call;
Send report information to described server, it is harassing call that described report information is used to indicate described incoming information, so that described server is stored in described harassing call in the harassing call database of described this locality.
4. a harassing call hold-up interception method is characterized in that, comprising:
The incoming information that receiving terminal sends;
In the harassing call database of this locality, search described incoming information, to judge that whether described incoming information is as harassing call;
Send information to described terminal, whether described information is used to indicate described incoming information is harassing call, so that described terminal is tackled harassing call.
5. harassing call hold-up interception method according to claim 4 is characterized in that, described method also comprises:
Receive the report information that described terminal sends, it is harassing call that described report information is used to indicate described incoming information;
Described incoming information is stored in the harassing call database of described this locality.
6. harassing call hold-up interception method according to claim 5 is characterized in that, in the described harassing call database that described incoming information is stored in described this locality, comprising:
Judge whether to receive the described report information for same described incoming information of setting the above different terminals transmission of quantity;
Set the described report information for same described incoming information that the above different terminals of quantity sends if receive, then described incoming information is stored in the harassing call database of described this locality.
7. a terminal is characterized in that, comprising:
Acquisition module is used for obtaining incoming information;
The first sending module is used for described incoming information is sent to server, so that whether the harassing call database lookup described incoming information of described server in this locality is harassing call;
The first receiver module is used for receiving the information that described server sends, and whether described information is used to indicate described incoming information is harassing call;
Processing module is used for when described information indicates described incoming information to be harassing call described incoming information being tackled.
8. terminal according to claim 7 is characterized in that, also comprises: determination module is used for determining whether described incoming information is present in the Local Black list;
Described processing module also is used for: be present in described Local Black list if described determination module is determined described incoming information, then described incoming information tackled.
9. according to claim 7 or 8 described terminals, it is characterized in that also comprise: described the first sending module also is used for
If it is not harassing call in the harassing call database of described this locality that described information is indicated described incoming information, determine that behind incoming call answering described incoming information is harassing call; Then send report information to described server, it is harassing call that described report information is used to indicate described incoming information, so that described server is stored in described harassing call in the harassing call database of described this locality.
10. a server is characterized in that, comprising:
The second receiver module is used for the incoming information that receiving terminal sends;
Search module, be used for searching described incoming information at the harassing call database of this locality, to judge that whether described incoming information is as harassing call;
The second sending module is used for sending information to described terminal, and whether described information is used to indicate described incoming information is harassing call, so that described terminal is tackled harassing call.
11. server according to claim 10 is characterized in that, described the second receiver module also is used for: receive the report information that described terminal sends, it is harassing call that described report information is used to indicate described incoming information;
Memory module is for the harassing call database that described incoming information is stored in described this locality.
12. server according to claim 11 is characterized in that, also comprises:
Processing module is used for judging whether described the second receiver module receives the described report information for same described incoming information of setting the above different terminals transmission of quantity;
Described memory module receives the described report information for same described incoming information of setting the above different terminals transmission of quantity if specifically be used for described the second receiver module, then described incoming information is stored in the harassing call database of described this locality.
CN2012105260487A 2012-12-07 2012-12-07 Method and terminal and server used for intercepting crank calls CN103037062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105260487A CN103037062A (en) 2012-12-07 2012-12-07 Method and terminal and server used for intercepting crank calls

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105260487A CN103037062A (en) 2012-12-07 2012-12-07 Method and terminal and server used for intercepting crank calls

Publications (1)

Publication Number Publication Date
CN103037062A true CN103037062A (en) 2013-04-10

Family

ID=48023525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105260487A CN103037062A (en) 2012-12-07 2012-12-07 Method and terminal and server used for intercepting crank calls

Country Status (1)

Country Link
CN (1) CN103037062A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701989A (en) * 2013-12-18 2014-04-02 北京奇虎科技有限公司 Mobile terminal calling protection method, client, server and system
CN104023324A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Method and device of processing strange call number
CN104104772A (en) * 2014-07-15 2014-10-15 中国联合网络通信集团有限公司 Fraudulent phone call prompting method, service and system
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
WO2014187411A1 (en) * 2013-10-24 2014-11-27 中兴通讯股份有限公司 Terminal call processing method and apparatus
CN104219265A (en) * 2013-05-31 2014-12-17 腾讯科技(深圳)有限公司 Label information updating method, apparatus and system
CN104270521A (en) * 2014-09-26 2015-01-07 北京奇虎科技有限公司 Method for processing incoming call number and mobile terminal
CN104301495A (en) * 2014-10-23 2015-01-21 合肥星服信息科技有限责任公司 Fixed line harassment interceptor based on network tag library
CN104348947A (en) * 2013-07-30 2015-02-11 腾讯科技(深圳)有限公司 Method and device of managing incoming call of mobile terminal
CN104601781A (en) * 2014-12-08 2015-05-06 深圳市广和通实业发展有限公司 Harassment-preventing method and system for fixed-line telephone
CN104602240A (en) * 2014-12-19 2015-05-06 百度在线网络技术(北京)有限公司 Phone fraud prevention method and device
CN104639739A (en) * 2014-12-31 2015-05-20 小米科技有限责任公司 Call intercepting method and device
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
CN104853342A (en) * 2015-04-21 2015-08-19 小米科技有限责任公司 User identification method and user identification device
CN105357673A (en) * 2015-11-27 2016-02-24 上海斐讯数据通信技术有限公司 Mobile terminal and method of preventing fraud for mobile terminal
CN105516988A (en) * 2015-11-23 2016-04-20 北京金山安全软件有限公司 Method, device, electronic device and server for filtering telephone call
CN105611088A (en) * 2015-12-24 2016-05-25 号百信息服务有限公司 Method and system for using multimedia to perform incoming call identification
WO2016150221A1 (en) * 2015-03-25 2016-09-29 北京奇虎科技有限公司 Nuisance contact information releasing method and apparatus
CN106161715A (en) * 2015-04-20 2016-11-23 北京搜狗科技发展有限公司 A kind of communication control method, the webserver and electronic equipment
WO2016188246A1 (en) * 2015-05-22 2016-12-01 腾讯科技(深圳)有限公司 Method and apparatus for processing communication event
WO2018099105A1 (en) * 2016-12-02 2018-06-07 深圳市中兴微电子技术有限公司 Communication number processing method, device, terminal, and data storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232735A (en) * 2008-02-21 2008-07-30 中兴通讯股份有限公司 Method for report number in black list
CN101304552A (en) * 2008-06-20 2008-11-12 Tcl天一移动通信(深圳)有限公司 Method and communication terminal capable of automatically matching incoming call number or note number
CN101409740A (en) * 2008-11-28 2009-04-15 中国电信股份有限公司 Method, system, telephone terminal and console for processing telephone incoming call

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232735A (en) * 2008-02-21 2008-07-30 中兴通讯股份有限公司 Method for report number in black list
CN101304552A (en) * 2008-06-20 2008-11-12 Tcl天一移动通信(深圳)有限公司 Method and communication terminal capable of automatically matching incoming call number or note number
CN101409740A (en) * 2008-11-28 2009-04-15 中国电信股份有限公司 Method, system, telephone terminal and console for processing telephone incoming call

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
WO2014169688A1 (en) * 2013-04-17 2014-10-23 Tencent Technology (Shenzhen) Company Limited Method and system for identifying prank call, client, server, and storage medium
CN104219265B (en) * 2013-05-31 2018-09-25 腾讯科技(深圳)有限公司 Label information update method, equipment and system
CN104219265A (en) * 2013-05-31 2014-12-17 腾讯科技(深圳)有限公司 Label information updating method, apparatus and system
CN104348947A (en) * 2013-07-30 2015-02-11 腾讯科技(深圳)有限公司 Method and device of managing incoming call of mobile terminal
WO2014187411A1 (en) * 2013-10-24 2014-11-27 中兴通讯股份有限公司 Terminal call processing method and apparatus
CN103701989A (en) * 2013-12-18 2014-04-02 北京奇虎科技有限公司 Mobile terminal calling protection method, client, server and system
CN103701989B (en) * 2013-12-18 2017-01-18 北京奇虎科技有限公司 Mobile terminal calling protection method, client, server and system
CN104023324A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Method and device of processing strange call number
CN104104772B (en) * 2014-07-15 2017-06-27 中国联合网络通信集团有限公司 One kind fraud telephone prompts method, server and system
CN104104772A (en) * 2014-07-15 2014-10-15 中国联合网络通信集团有限公司 Fraudulent phone call prompting method, service and system
CN104270521A (en) * 2014-09-26 2015-01-07 北京奇虎科技有限公司 Method for processing incoming call number and mobile terminal
CN104301495A (en) * 2014-10-23 2015-01-21 合肥星服信息科技有限责任公司 Fixed line harassment interceptor based on network tag library
CN104301495B (en) * 2014-10-23 2017-09-12 合肥星服信息科技有限责任公司 A kind of fixed harassment interceptor based on network identity storehouse
CN104601781A (en) * 2014-12-08 2015-05-06 深圳市广和通实业发展有限公司 Harassment-preventing method and system for fixed-line telephone
CN104602240A (en) * 2014-12-19 2015-05-06 百度在线网络技术(北京)有限公司 Phone fraud prevention method and device
CN104639739B (en) * 2014-12-31 2017-07-04 小米科技有限责任公司 Call block method and device
CN104639739A (en) * 2014-12-31 2015-05-20 小米科技有限责任公司 Call intercepting method and device
CN104735671B (en) * 2015-02-27 2018-11-09 腾讯科技(深圳)有限公司 A kind of method and apparatus of identification malicious call
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
WO2016150221A1 (en) * 2015-03-25 2016-09-29 北京奇虎科技有限公司 Nuisance contact information releasing method and apparatus
CN106161715A (en) * 2015-04-20 2016-11-23 北京搜狗科技发展有限公司 A kind of communication control method, the webserver and electronic equipment
CN106161715B (en) * 2015-04-20 2019-10-29 北京搜狗科技发展有限公司 A kind of communication control method, network server and electronic equipment
CN104853342B (en) * 2015-04-21 2019-06-11 小米科技有限责任公司 User identification method and device
CN104853342A (en) * 2015-04-21 2015-08-19 小米科技有限责任公司 User identification method and user identification device
US10587741B2 (en) 2015-05-22 2020-03-10 Tencent Technology (Shenzhen) Company Limited Communication event processing method and apparatus
WO2016188246A1 (en) * 2015-05-22 2016-12-01 腾讯科技(深圳)有限公司 Method and apparatus for processing communication event
CN105516988A (en) * 2015-11-23 2016-04-20 北京金山安全软件有限公司 Method, device, electronic device and server for filtering telephone call
CN105357673A (en) * 2015-11-27 2016-02-24 上海斐讯数据通信技术有限公司 Mobile terminal and method of preventing fraud for mobile terminal
CN105611088A (en) * 2015-12-24 2016-05-25 号百信息服务有限公司 Method and system for using multimedia to perform incoming call identification
WO2018099105A1 (en) * 2016-12-02 2018-06-07 深圳市中兴微电子技术有限公司 Communication number processing method, device, terminal, and data storage medium

Similar Documents

Publication Publication Date Title
CN103763690B (en) Detect the method and apparatus that pseudo-base station sends short message to mobile terminal
US20180324289A1 (en) Identifying caller name for output on mobile phone devices
CN103595850B (en) The method replying the computer execution reminded is provided
JP5496634B2 (en) Incoming call processing method and apparatus for communication terminal
EP2461549B1 (en) Mobile phone internet flow counting and displaying method, device, and mobile phone
US8755794B2 (en) System and method of sharing information between wireless devices
US20150334679A1 (en) System and method for detecting mutually supported capabilities between mobile devices
CN102821380B (en) For realizing method and the mobile terminal of one-card multi-number of mobile terminal
CN104066065B (en) The mobile terminal of a kind of preventing disturbance incoming call/information and method
CA2629928C (en) System and method for communication record logging
CN101141721B (en) Safety mobile telephone based communication custom
CN101577761B (en) Mobile terminal and method for inquiring and adding information of telephone number in short message thereof
AU2007298724B2 (en) Fraud detection system
EP2499808B1 (en) Communication device and method for a mobile communication network
US20030022697A1 (en) Dialing method for effecting international call in intelligent cellular phone
CN102055826B (en) Method and system for maintaining multi-dimensional related information related to contacts in address list
WO2017054572A1 (en) Communication method and device for dual sim, dual standby and single-pass terminal
US20100299757A1 (en) Mobile terminal for information security and information security method of mobile terminal
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
EP1610510A1 (en) Wireless access control to telematics and voice services
CN1983843B (en) Communication method and apparatus
AU2004229945B2 (en) System and method of notifying unpublished subscribers of requests for contact information
CN101350852B (en) Dialing method, system and mobile terminal
CN101815262A (en) Method and device for shielding spam short messages of mobile terminal
CN100556052C (en) Telephone number change notification method and telephone number change notification system

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130410