CN104869262A - Method and device for intercepting terminal blacklist - Google Patents

Method and device for intercepting terminal blacklist Download PDF

Info

Publication number
CN104869262A
CN104869262A CN201410067321.3A CN201410067321A CN104869262A CN 104869262 A CN104869262 A CN 104869262A CN 201410067321 A CN201410067321 A CN 201410067321A CN 104869262 A CN104869262 A CN 104869262A
Authority
CN
China
Prior art keywords
calling
blacklist
note
data
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410067321.3A
Other languages
Chinese (zh)
Other versions
CN104869262B (en
Inventor
周春波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201410067321.3A priority Critical patent/CN104869262B/en
Publication of CN104869262A publication Critical patent/CN104869262A/en
Application granted granted Critical
Publication of CN104869262B publication Critical patent/CN104869262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method and a device for intercepting a terminal blacklist. The method comprises the steps of: delaying calling or short message sending when a calling terminal initiates calling or short message sending to a called terminal; judging whether a calling number is in a set blacklist according to pre-obtained blacklist data in the delay period; and ending the delay after acquiring the blacklist judging result, and determining whether to permit the calling or short message sending to the called terminal according to the judgment result. Thus, the method and the device for intercepting the terminal blacklist delay the calling or short message sending before actual execution of initiating calling or short message sending to the called terminal by the calling terminal, carries out blacklist judgment and determines whether to permit the calling or short message sending according to the judgment result. Therefore, the harassing calls made or short messages sent by a number in the blacklist cannot be permitted to the called terminal, thereby avoiding the problem in the prior art that the shielding is not thorough since the harassing calls or short messages are hidden after arriving at the called terminal.

Description

The hold-up interception method of terminal blacklist and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of hold-up interception method and device of terminal blacklist.
Background technology
Mobile phone blacklist function, refers to that cellphone subscriber is by certain operations, shields the note that some numbers are sent or the phone made, and allows the harassing and wrecking of user's these blacklist numbers imperceptible.Current existing interception mode mainly contains following several:
On the mobile phone carrying blacklist function, user is arranging after some numbers are blacklist number, and mobile phone can record this blacklist number.After blacklist number is called, system can be notified.After judgement is blacklist number, system can call corresponding interface to hang up this incoming call.Strictly, the blacklist that mobile phone carries not is real blacklist, and it is only stored on mobile phone, not on the server of operator (such as, China Mobile).When a user makes a phone call to this mobile phone, if this user is in the blacklist of mobile phone, mobile phone will give a mobile information, and mobile phone is being conversed or other information.When black list user makes a phone call, operator does not process, and does not want the phone of answering this user although called, and it can call out called as usual, and the China Mobile that has been only called mobile phone " deception ", to the information of the busy of the other side one camouflage or ring unanswered.This realizes blacklist mode and mainly contains two shortcomings: one is that a lot of mobile phone does not have blacklist function; Two is on the mobile phone having blacklist function, because be receive blacklist number call-in reporting at called mobile phone, hang up the telephone, just causes: 1. calling party can hear short wait sound, and phone is just hung up subsequently by program.2. the mobile phone of callee also has the missed call record of this number.So this blacklist interception scheme can not make callee break away from harassing and wrecking completely.
Another kind of mode is on mobile phone, install the software of the third party with interception function, and user edits blacklist number by this type of software, realizes advoiding harassing and wrecking.It is similar that this implementation arranges blacklist with above-mentioned mobile phone, only blacklist number storage, judge blacklist phone, hanging up the telephone realizes by software of the third party.The blacklist that this technology realizes, also belongs to passive interception, namely after called party cell phone receives call-in reporting, could realize phone and hang up.Electrographic recording can be stayed in called party cell phone, can not callee be made completely to break away from harassing and wrecking.
A kind of mode is also had to be that the interception being realized incoming call by mobile phone operation code reaches the object of advoiding harassing and wrecking.Particularly, by mobile phone, can call forwarding be set, a spacing be set to the destination Mobile Station International ISDN Number of call forwarding, then can realizes interception function.If be provided with interception function by the method, then all incoming calls all can be transferred to above spacing by unconditional.Useful phone is probably missed by such user.Such setting does not have selectivity.
Last a kind of mode is, callee reports this number to operator receiving the rear of phone.After receiving phone, if user feels that calling party promotes in swindle, want this number to report, can report to operator.According to some evidences such as chat records, operator can judge whether this number is malice number.If so, then this number is stopped using.This number just can not be sent short messages to others or make a phone call again.This scheme has two shortcomings: if 1. callee thinks report number, at least will connect this phone once.Can not avoid being harassed.If 2. because individual reason, want a blacklist number non-malicious number being arranged to oneself, even if report to operator by this number, operator's end also can not process, and loses the selectivity arranging blacklist.
To sum up, the technical scheme of selectivity active interception is not also realized at present.
Summary of the invention
The invention provides a kind of hold-up interception method and device of terminal blacklist, shield halfway problem to solve existing blacklist.
The invention provides following scheme:
A hold-up interception method for terminal blacklist, comprising: when calling terminal makes a call to terminal called or sends note, delayed call or short message sending; At timing period, according to the blacklist data obtained in advance, judge calling number whether in the blacklist arranged; After obtaining blacklist judged result, terminate to postpone, and determine whether calling or note to let pass to described terminal called according to judged result.
Preferably, the operation by cancelling calling system communication interface realizes described delayed call or short message sending.
Preferably, the building mode of described blacklist data is: collect the black list information that user is arranged, and number is keyword to harass, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword is formed blacklist data, and the blacklist data after arrangement is supplied to client and/or switch.
Preferably, the blacklist data that described basis obtains in advance, judge that whether calling number comprises at the blacklist arranged: the client of described calling terminal extracts called number, and inquire about described blacklist data, judge that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
Preferably, the blacklist data that described basis obtains in advance, judge that whether calling number comprises at the blacklist arranged: after described switch takes over described calling or note from calling terminal, extract called number, and inquire about described blacklist data, judge that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
Preferably, in described blacklist data, also comprise mask pattern parameter, in order to indicate the communication type of shielding; Only corresponding to mask pattern parameter communication type shields.
Preferably, the building mode of described blacklist data is: the mode that server is labeled as blacklist by Internet resources or the user that is exceeded some threshold values obtains acquiescence black list information, and formed blacklist data with the form of harassing set of numbers, and the blacklist data after arranging is supplied to client and/or switch.
Preferably, the blacklist data that described basis obtains in advance, judge that the blacklist whether calling number is arranged at called number comprises: blacklist data described in the client query of described calling terminal, judge described calling number whether in harassing and wrecking set of numbers.
Preferably, the blacklist data that described basis obtains in advance, judge that whether calling number comprises at the blacklist arranged: after described switch takes over described calling or note from calling terminal, extract calling number, and inquire about described blacklist data, judge whether described call number is harassing in set of numbers.
Preferably, all shield from all communication types of number in harassing and wrecking set of numbers, or arrange according to user particular type is shielded.
Preferably, data structure used by outbound calling is taken out by the client that the described switch process of taking over described calling or note from caller is: described caller, then these data structures are modified, and the destination address of calling or note is revised as described switch, the related data of calling or note is sent to described switch.
Preferably, described blacklist data after arranging is supplied to client and comprises: the relevant blacklist data only client place termination number being set as blacklist number is supplied to client.
Preferably, describedly determine whether calling or note to let pass to described calledly to comprise according to judged result: if calling number is in the blacklist arranged, calling or note are mail to spacing by calling terminal or switch, and not on terminal called call accepted or receive note, wherein, before calling or note are mail to spacing by switch, described switch is from calling terminal receipt of call or note and relevant data; If calling number is not in the blacklist arranged, calling or note are mail to called by calling terminal or switch.
Preferably, described blacklist data also comprises blacklist prompt tone; After spacing is mail in calling, also comprise: play described blacklist prompt tone by calling terminal.
A blocking apparatus for terminal blacklist, comprising: acquiring unit, for obtaining blacklist data; Postpone and extraction unit, for postponing the calling of calling terminal to terminal called or the note of transmission, and from calling or note data structure extract calling number and called number; Judging unit, for according to described blacklist data, judges in the blacklist whether calling number is arranged at called number; Performance element, for according to blacklist judged result, determines whether calling or note to let pass to described terminal called.
Preferably, described delay and extraction unit, realize described delayed call or short message sending by the operation cancelling calling system communication interface.
Preferably, the organizational form of described blacklist data is: to harass, number is keyword, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword arranges described black list information, forms blacklist data.
Preferably, described judging unit extracts called number, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
Preferably, described device also comprises: adapter unit, for taking over described calling or note from calling terminal; Described judging unit, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
Preferably, in described blacklist data, also comprise mask pattern parameter, in order to indicate the communication type of shielding; The communication type that described performance element is only corresponding to mask pattern parameter shields.
Preferably, the building mode of described blacklist data is: the mode being labeled as blacklist by Internet resources or the user that is exceeded some threshold values obtains acquiescence black list information, and is formed blacklist data with the form of harassing set of numbers.
Preferably, described judging unit inquires about described blacklist data, judges whether described calling number is harassing in set of numbers.
Preferably, described device also comprises: adapter unit, for taking over described calling or note from calling terminal; Described judging unit, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges whether described calling number is harassing in set of numbers.
Preferably, described performance element all shields from all communication types of number in harassing and wrecking set of numbers, or arranges according to user and shield particular type.
Preferably, the calling of address for the purpose of described device that receives that described calling terminal sends of described adapter unit and note and the data through amendment.
Preferably, described acquiring unit only obtains the relevant blacklist data its place calling terminal being set to blacklist number.
Preferably, if in the blacklist that calling number is arranged at called number, calling or note are mail to spacing by described performance element, and not on terminal called call accepted or receive note, wherein, before by switch calling or note being mail to spacing, described switch is from calling terminal receipt of call or note and relevant data; If calling number is not in the blacklist of called number setting, calling or note are mail to called by described performance element.
Preferably, described blacklist data also comprises blacklist prompt tone; After spacing is mail in calling, play described blacklist prompt tone by calling terminal.
Visible, the present invention caller to called make a call or send note after, is just postponed immediately, is carried out the judgement of blacklist, and whether let pass according to judged result decision.Thus, if the harassing call of number call or the note of transmission in blacklist, then can not by clearance to called, thus avoid harassing call in prior art or harassing and wrecking note arrive called after be just hidden and the halfway problem of shielding that exists.
The present invention supports that user oneself edits blacklist number, has selectivity very flexibly; Once after being provided with blacklist, no matter whether receiving the harassing and wrecking of this number before, and can harassing and wrecking be received scarcely afterwards; Because the judgement of blacklist and switch logic carry out calling party's (or the number of adapter calling party leads to switch), called party cell phone does not have any by the vestige of harassing, really achieve and advoid harassing and wrecking.
In the present invention, any number optionally can be set to blacklist by the user of number client terminal, solves in prior art and does not have the function that selectivity adds blacklist; Rang no matter whether to before a number the general family of number, as long as this number is set to blacklist by user, the harassing and wrecking of this number would not be subject to later, solve in prior art the problem first must received phone and could report; If a calling number is set to blacklist by called number, as caller calls callee, exhalation can be diverted spacing code calling party, which solves in prior art the problem having incoming call vestige.In addition, conventional harassing and wrecking number can also be obtained by Internet resources and build blacklist data, can all shield for the incoming call of these blacklist numbers or note, or can arrange according to user particular type is shielded.
The blacklist function realized in the present invention is that exhalation is transferred to spacing.In addition, according to the custom of user, when allowing User Defined blacklist send a telegram here, the prompt tone of calling party can also be played to.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the hold-up interception method of the terminal blacklist that the embodiment of the present invention provides;
Fig. 2 is the flow chart of the hold-up interception method example one of the terminal blacklist that the embodiment of the present invention provides;
Fig. 3 is the flow chart of the hold-up interception method example two of the terminal blacklist that the embodiment of the present invention provides;
Fig. 4 is the structural representation of the blocking apparatus of the terminal blacklist that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain, all belongs to the scope of protection of the invention.
See Fig. 1, the flow chart of the hold-up interception method of the terminal blacklist provided for the embodiment of the present invention.The method comprises the following steps:
S101: when calling terminal makes a call to terminal called or sends note, delayed call or short message sending;
S102: at timing period, according to the blacklist data obtained in advance, judges calling number whether in the blacklist arranged;
S103: after obtaining blacklist judged result, terminates to postpone, and determines whether calling or note to let pass to described called according to judged result.
Terminal in the present invention includes, but are not limited to mobile phone, and such as future is probably applied to ip phone, belongs to base.For convenience of description, the following describes for mobile phone.
Visible, the present invention caller to called make a call or send this action of note time, when also namely also there is no actual bid or short message sending, is just postponed immediately, is carried out the judgement of blacklist, and whether let pass according to judged result decision.Thus, if the harassing call of number call or the note of transmission in blacklist, then can not by clearance to called, thus avoid harassing call in prior art or harassing and wrecking note arrive called after be just hidden and the halfway problem of shielding that exists.
For convenience, the application program with blacklist processing capacity of the present invention is called number client terminal, such as, calling terminal and terminal called have all installed number client terminal, are appreciated that this number client terminal is a kind of interception software.Coordinate the server of serving to be called that number leads to server by with number client terminal, it is server in the Internet that this number leads to server, for collecting the black list information that number client terminal sends over.Should be appreciated that, it can be a station server that this number leads to server, also can be cluster server, also can be functional module.The switch realizing function of the present invention is called that number leads to switch, and this number leads to switch frame to be located between calling terminal and provider backbone, and its effect is the whereabouts of collecting blacklist data and controlling from caller outbound calling.
For calling, the present invention will be described below.
The idiographic flow of the hold-up interception method of terminal blacklist of the present invention comprises:
1. blacklist data is collected and is issued: when the user terminal of each installation number client terminal arranges blacklist number, these black list information can be uploaded to number and lead to server by number client terminal; Number leads to collation server and goes out blacklist data and be handed down to number client terminal or number leads to switch;
2. the outbound calling of calling party is postponed: judge that the logic of blacklist needs some times, determine whether revise called number according to judged result.In these operation implementations, ensure that phone is not breathed out.
3. judge blacklist: according to the blacklist data collected, judge whether called number has been arranged to blacklist by calling number.
4. postpone to terminate, outbound calling: if calling party is not arranged in blacklist, then let pass outbound calling, realize normal talking; Otherwise, outgoing call is modified as a spacing, then breathes out.
In addition, above-mentioned steps 1 also substitutes by following step a:
A. blacklist data is collected and inquiry: when the user terminal of each installation number client terminal arranges blacklist number, these black list information can be uploaded to number and lead to server by number client terminal; Number client terminal or number lead to switch and lead to this blacklist data arranged out of server lookup to number; Concrete query script is: number client terminal or number lead to switch and lead to server transmission blacklist inquiry request to number; Number leads to server and sends to number client terminal or number to lead to switch blacklist data after carrying out necessary operation (such as verifying that number client terminal or number lead to the identity of switch).
In above-mentioned steps 1 or step a, number leads to server can be supplied to number client terminal by the whole blacklist data arranged out, only the blacklist data relevant with number client terminal can also be supplied to number client terminal.Such as, for certain mobile phone, be only that the related data of blacklist is sent in the client of this mobile phone by this phone number.For harassing and wrecking number 1, the blacklist data of harassing and wrecking number 1 correspondence is only handed down to harassing and wrecking number 1 by server, for harassing and wrecking number 2, only the blacklist data of harassing and wrecking number 2 correspondence is handed down to harassing and wrecking number 2, and data distributing that can not be corresponding by the number (such as, harassing number 2) beyond harassing and wrecking number 1 is to harassing and wrecking number 1.Thus can speeding up data transmission speed and occupied terminal storage resources less of trying one's best.
Below in conjunction with two examples, the embodiment of the present invention is described in detail.
Example one
See Fig. 2, it is hold-up interception method example one flow chart of terminal blacklist of the present invention.Omit the entity of the routine in mobile communication in figure, and illustrate only the tight entity with the present invention program, but this can not be understood to limitation of the present invention or constraint.
Fig. 2 shows caller, called and number leads to server.Wherein, calling terminal and terminal called have all installed number client terminal, and they and number lead to server and coordinate.
S201: blacklist data upgrades;
When the terminal use having installed number client terminal arranges blacklist data, this user mobile phone number and these blacklist data can be uploaded to number and lead to server by number client terminal.Number leads to server, and to harass, number is keyword, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword arranges described black list information, forms blacklist data.
These data process by server end, and the form after process is a dictionary.Each Key of dictionary is a number, and Value is the set of a number.Represent that the number of Key has been arranged to blacklist by the number in this set.
Such as, phone number MSR1, MSR2 ..., the user of MSRn does not want to answer the phone from phone number SR, then they are set to blacklist, and the blacklist data of formation is:
SR - > MSR 1 MSR 2 . . . MSRn
Be understandable that, in the ordinary course of things, black list information is set by harassing and wrecking user, and initiatively the side of harassing and wrecking not necessarily can be arranged.Be harassing and wrecking side, called by the side of harassing and wrecking for caller, the black list information of setting can be uploaded to number and lead to server by the number client terminal of callee, and calling party then may not have this to operate.But because calling party is also number client terminal, possess this function completely, therefore also mark out the step that black list information is uploaded in caller in fig. 2.
For the set-up mode of blacklist data, mainly comprise system default arrange and user initiatively arrange two kinds.For system default set-up mode, be the blacklist number obtained by Internet resources, such as, by mode determination group of black name single numbers such as web crawlers technology, masses make marks, can lead at number the blacklist data that server generates acquiescence.Wherein, the masses mode of making marks refer to, if the user that some numbers are exceeded some threshold values is labeled as blacklist, then think that these numbers are numbers masses being formed to harassing and wrecking.For user's initiatively set-up mode, user can be arranged and dynamic conditioning according to self needing to carry out active, such as, the number of certain specific distribution or personal enemy and so on is set to black list information, black list information is uploaded to number and leads to server and then generate blacklist data.It will be understood by those skilled in the art that above-mentioned two kinds of modes can be used alone one, preferably the two is combined.
Such as, for system default set-up mode, by web crawlers technology, get a collection of harassing and wrecking number SR1, SR2,, SRn, number lead to Server Default form form blacklist data form example be:
[SR1,SR2,,,SRn]
Visible, in this system default set-up mode, give tacit consent to for all called subscribers all shield these SR1, SR2,, the phone of SRn or note, therefore only comprise the set that harassing and wrecking number is formed in blacklist data, and without the need to arranging number information of advoiding harassing and wrecking.
For user's initiatively set-up mode, such as, certain two number SR1 and SR2 is set to black list information by certain user MSR1, and so, the black list information example of formation is:
SR1->(MSR1)
SR2->(MSR1)
Above-mentioned black list information is uploaded to server by the client of this user MSR1.
Suppose now also have another user MSR2 that certain two number SR1 and SR3 is set to black list information, so, the black list information example of formation is:
SR1->(MSR2)
SR3->(MSR2)
The black list information of formation is also uploaded to server by the client of this user MSR2.
Now, server, by integrating, forms following blacklist data:
SR 1 - > MSR 1 MSR 2
SR2->(MSR1)
SR3->(MSR2)
The above-mentioned example by means of only these two users' active settings of MSR1 and MSR2 is described, namely, user initiatively arranges black list information and after reporting server, server can be integrated information, namely the black list information for same harassing and wrecking number is integrated, and finally forms blacklist data.
It should be noted that in addition, for the blacklist number that system default set-up mode is formed, generally that all communication types (i.e. incoming call and note) are all masked, certainly also arrange according to user and particular type is shielded, and for the mode that user is initiatively arranged, can be only partly shield certain communication type selectively, such as, for certain user, former boyfriend's number is set to blacklist number by her, but she does not only want the incoming call of answering him, but be ready to receive his note, now, user is when initiatively arranging black list information, mask pattern parameter can be carried, which other mode is this parameter accept in order to indicate which kind of mode of shielding, server can using shielding parameter as a part when building relevant blacklist data.
Such as number SR1 is set to blacklist by above-mentioned user MSR1, but does not only think incoming call answering and be ready to receive the note from number SR1, and the blacklist data example so formed is:
SR1->(MSR1,MOD0)
Above MOD0 indicate " only do not think incoming call answering and be ready receive note " mask pattern.
After above-mentioned black list information is reported server by MSR1, server construction comprises the blacklist data of mask pattern parameter, and is supplied to SR1 number client.Rear extended meeting carries out selectively masking according to MOD0, that is, when SR1 number client makes a call to MSR1, fallen by call visor, and when SR1 number client sends note to MSR1, can normally transmit.
S202: blacklist data issues;
Number client terminal can lead to server to number termly initiates request, obtains blacklist data, number can certainly be taked to lead to server regularly initiatively issues mode from blacklist data to number client terminal, the Value that to obtain with this phone number be Key.So just can judge that certain phone number has been arranged to blacklist by the cellphone subscriber of which number at mobile phone terminal.
S203: delayed call;
When caller cellphone subscriber presses exhalation key, number client terminal can change the default behavior of exhalation process, by originally should the operation of calling system outgoing call, allow instead current system what do not do, until the operation of enquiry number label information completes.
S204: blacklist judges;
Called number takes out by the number client terminal of caller from the phone of breathing out, and then judges that whether called number is taking calling number as the advoiding harassing and wrecking in set of numbers of key.
S205: normal call;
If called number in the set of numbers taking calling number as key, does not illustrate that calling number is not set to blacklist by called number, then exhalation is let pass by number client terminal, allows caller mobile phone complete normal communication process;
S206: calling spacing.
If called number, in the set of numbers taking calling number as key, illustrates that calling number is set to blacklist by called number, then a number client terminal spacing replaces called number.Then exhalation is let pass.The performance done like this is exactly, and calling party calls to a spacing, and callee confiscates the phone of calling party at all, thus achieves the function of blacklist.
Example two
Example two and example one difference are, set up number and lead to switch between caller and operator core network, and the storage of blacklist data and decision logic are transferred to number to lead to switch to complete.
See Fig. 3, it is hold-up interception method example two flow chart of terminal blacklist of the present invention.Omit the entity of the routine in mobile communication in figure, and illustrate only the tight entity with the present invention program, but this can not be understood to limitation of the present invention or constraint.
Fig. 3 shows caller, called, number leads to server and number leads to switch.Wherein, calling terminal and terminal called have all installed number client terminal, and they and number lead to server and coordinate.
S301: blacklist data upgrades;
When the terminal use having installed number client terminal arranges blacklist data, this user mobile phone number and these blacklist data can be uploaded to number and lead to server by number client terminal.Number leads to server, and to harass, number is keyword, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword arranges described black list information, forms blacklist data.
The set-up mode of blacklist data and associated exemplary can describe see in embodiment one, do not repeat herein.
S302: blacklist data issues;
Number leads to exchange opportunity and leads to server to number termly and initiate request, obtains blacklist data, number can certainly be taked to lead to server and regularly initiatively lead to number the mode that switch issues blacklist data, the Value that to obtain with this phone number be Key.So just can lead to switch at number and judge that certain phone number has been arranged to blacklist by the cellphone subscriber of which number.
S303: calling adapter;
When caller mobile phone transfers to a number to call out, data structure used by outbound calling can first be taken out by number client terminal, then these data structures are made some amendments, make the destination of this exhalation change number into by original called number and lead to switch, original called number is saved in related data structures simultaneously and is transferred to number together and leads to switch.
S304: blacklist judges;
Number leads to switch and is taken out from the phone of breathing out by called number, then judges that whether called number is taking calling number as the advoiding harassing and wrecking in set of numbers of key.
S305: normal call;
If called number in the set of numbers taking calling number as key, does not illustrate that calling number is not set to blacklist by called number, then number leads to switch by exhalation clearance, allows caller mobile phone complete normal communication process;
S306: calling spacing.
If called number, in the set of numbers taking calling number as key, illustrates that calling number is set to blacklist by called number, then number leads to a switch spacing replacement called number.Then exhalation is let pass.The performance done like this is exactly, and calling party calls to a spacing, and callee confiscates the phone of calling party at all, thus achieves the function of blacklist.
Visible, the present invention supports that user oneself edits blacklist number, has selectivity very flexibly; Once after being provided with blacklist, no matter whether receiving the harassing and wrecking of this number before, and can harassing and wrecking be received scarcely afterwards; Because the judgement of blacklist and switch logic carry out calling party's (or the number of adapter calling party leads to switch), called party cell phone does not have any by the vestige of harassing, really achieve and advoid harassing and wrecking.
In the present invention, any number optionally can be set to blacklist by the user of number client terminal, solves in prior art and does not have the function that selectivity adds blacklist; Rang no matter whether to before a number the general family of number, as long as this number is set to blacklist by user, the harassing and wrecking of this number would not be subject to later, solve in prior art the problem first must received phone and could report; If a calling number is set to blacklist by called number, as caller calls callee, exhalation can be diverted spacing code calling party, which solves in prior art the problem having incoming call vestige.In addition, conventional harassing and wrecking number can also be obtained by Internet resources and build blacklist data, the incoming call of these blacklist numbers or note all be shielded, certainly also arranges according to user and particular type is shielded.
The blacklist function realized in the present invention is that exhalation is transferred to spacing.In addition, according to the custom of user, when allowing User Defined blacklist send a telegram here, the prompt tone of calling party can also be played to.Namely, when determining that caller drops in called blacklist, except transferring to except spacing by calling, can also play to caller the particular hint sound pre-set.Such as, concrete practical method is: when B number is arranged to blacklist by number general family A, if specify the blacklist prompt tone oneself made simultaneously, then when uploading blacklist data, the number client terminal in user A mobile phone can be named to audio file with a unique character string sequence.This filename can be recorded in blacklist data simultaneously.Prompt tone audio file can be transferred to number client terminal together with blacklist data.When user B makes a phone call to user A, this call goes in spacing by the number client terminal in user B mobile phone, simultaneously user B mobile phone plays blacklist prompt tone according to the audio file name recorded in blacklist data, the spacing prompt tone namely utilizing the blacklist prompt tone of setting to replace traditional common carrier to issue.For traditional spacing prompt tone, terminal itself comprises various prompt tone file, and so under the present invention preferably provides blacklist prompt tone situation, terminal does not just play original system spacing prompt tone, but changes broadcasting blacklist prompt tone into.
Corresponding with said method, the present invention also provides a kind of blocking apparatus of terminal blacklist.It will be understood by those skilled in the art that this device can be realized by hardware, software or software and hardware combining.Concrete, the functional entity in number client terminal place terminal or number client terminal place terminal can be referred to, also can refer to that number leads to switch or number and leads to functional entity in switch.
See Fig. 4, it is the structural representation of the blocking apparatus of terminal blacklist of the present invention.This device comprises acquiring unit 401, postpones and extraction unit 402, judging unit 403 and performance element 404.
Acquiring unit 401, for obtaining blacklist data.
Postpone and extraction unit 402, for postponing the calling of calling terminal to terminal called or the note of transmission, and from calling or note data structure extract calling number and called number.Particularly, described delay and extraction unit 402, realize described delayed call or short message sending by the operation cancelling calling system communication interface.
Judging unit 403, for according to described blacklist data, judges in the blacklist whether calling number is arranged at called number.
Performance element 404, for according to blacklist judged result, determines whether calling or note to let pass to described terminal called.
A kind of implementation is that the organizational form of described blacklist data is: to harass, number is keyword, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword arranges described black list information, forms blacklist data.Described judging unit 403 extracts called number, and inquires about described blacklist data, judge described called number whether with calling number be keyword advoid harassing and wrecking in set of numbers; Or described device also comprises: adapter unit 405, for taking over described calling or note from calling terminal; Described judging unit 403, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.Preferably, in described blacklist data, also comprise mask pattern parameter, in order to indicate the communication type of shielding; The communication type that described performance element 404 is only corresponding to mask pattern parameter shields.
Another kind of implementation is, the building mode of described blacklist data is: the mode being labeled as blacklist by Internet resources or the user that is exceeded some threshold values obtains acquiescence black list information, and is formed blacklist data with the form of harassing set of numbers.Described judging unit 403 inquires about described blacklist data, judges whether described calling number is harassing in set of numbers; Or described device also comprises: adapter unit 405, for taking over described calling or note from calling terminal; Described judging unit 403, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges whether described calling number is harassing in set of numbers.Preferably, described performance element 403 all shields from all communication types of number in harassing and wrecking set of numbers, or arranges according to user and shield particular type.
Preferably, the calling of address for the purpose of described device that receives that described calling terminal sends of described adapter unit 405 and note and the data through amendment.
Preferably, described acquiring unit 401 only obtains the relevant blacklist data number of described device being set as blacklist number.
Preferably, if in the blacklist that calling number is arranged at called number, calling or note are mail to spacing by described performance element 404, and not on terminal called call accepted or receive note, wherein, before by switch calling or note being mail to spacing, described switch is from calling terminal receipt of call or note and relevant data; If calling number is not in the blacklist of called number setting, calling or note are mail to called by described performance element 404.In the case, preferably, described blacklist data also comprises blacklist prompt tone; After spacing is mail in calling, described performance element 404 also plays described blacklist prompt tone to caller.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the present invention or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for device or system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.Apparatus and system embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
Above information operation method provided by the present invention and device are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications.In sum, this description should not be construed as limitation of the present invention.

Claims (28)

1. a hold-up interception method for terminal blacklist, is characterized in that, comprising:
When calling terminal makes a call to terminal called or sends note, delayed call or short message sending;
At timing period, according to the blacklist data obtained in advance, judge calling number whether in the blacklist arranged;
After obtaining blacklist judged result, terminate to postpone, and determine whether calling or note to let pass to described terminal called according to judged result.
2. method according to claim 1, is characterized in that, realizes described delayed call or short message sending by the operation cancelling calling system communication interface.
3. method according to claim 2, it is characterized in that, the building mode of described blacklist data is: collect the black list information that user is arranged, and number is keyword to harass, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword is formed blacklist data, and the blacklist data after arrangement is supplied to client and/or switch.
4. method according to claim 3, is characterized in that, the blacklist data that described basis obtains in advance, judges that whether calling number comprises at the blacklist arranged:
The client of described calling terminal extracts called number, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
5. method according to claim 3, is characterized in that, the blacklist data that described basis obtains in advance, judges that whether calling number comprises at the blacklist arranged:
Described switch extracts called number after taking over described calling or note from calling terminal, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
6. method according to claim 3, is characterized in that, also comprises mask pattern parameter in described blacklist data, in order to indicate the communication type of shielding; Only corresponding to mask pattern parameter communication type shields.
7. method according to claim 2, it is characterized in that, the building mode of described blacklist data is: the mode that server is labeled as blacklist by Internet resources or the user that is exceeded some threshold values obtains acquiescence black list information, and formed blacklist data with the form of harassing set of numbers, and the blacklist data after arranging is supplied to client and/or switch.
8. method according to claim 7, is characterized in that, the blacklist data that described basis obtains in advance, judges that the blacklist whether calling number is arranged at called number comprises:
Blacklist data described in the client query of described calling terminal, judges whether described calling number is harassing in set of numbers.
9. method according to claim 7, is characterized in that, the blacklist data that described basis obtains in advance, judges that whether calling number comprises at the blacklist arranged:
Described switch extracts calling number after taking over described calling or note from calling terminal, and inquires about described blacklist data, judges whether described call number is harassing in set of numbers.
10. method according to claim 7, is characterized in that, all shields from all communication types of number in harassing and wrecking set of numbers, or arranges according to user and shield particular type.
11. methods according to claim 5 or 9, it is characterized in that, the process that described switch takes over described calling or note from caller is:
Data structure used by outbound calling is taken out by the client of described caller, then these data structures is modified, and the destination address of calling or note is revised as described switch, the related data of calling or note is sent to described switch.
12. methods according to any one of claim 3 to 10, is characterized in that, describedly blacklist data after arranging is supplied to client comprises: the relevant blacklist data only client place termination number being set as blacklist number is supplied to client.
13. methods according to any one of claim 1 to 10, is characterized in that, described determine whether calling or note to let pass to described according to judged result calledly to comprise:
If calling number is in the blacklist arranged, calling or note are mail to spacing by calling terminal or switch, and not on terminal called call accepted or receive note, wherein, before calling or note are mail to spacing by switch, described switch is from calling terminal receipt of call or note and relevant data;
If calling number is not in the blacklist arranged, calling or note are mail to called by calling terminal or switch.
14. methods according to claim 13, is characterized in that, described blacklist data also comprises blacklist prompt tone; After spacing is mail in calling, also comprise: play described blacklist prompt tone by calling terminal.
The blocking apparatus of 15. 1 kinds of terminal blacklists, is characterized in that, comprising:
Acquiring unit, for obtaining blacklist data;
Postpone and extraction unit, for postponing the calling of calling terminal to terminal called or the note of transmission, and from calling or note data structure extract calling number and called number;
Judging unit, for according to described blacklist data, judges in the blacklist whether calling number is arranged at called number;
Performance element, for according to blacklist judged result, determines whether calling or note to let pass to described terminal called.
16. devices according to claim 15, is characterized in that, described delay and extraction unit, realize described delayed call or short message sending by the operation cancelling calling system communication interface.
17. devices according to claim 15, is characterized in that, the organizational form of described blacklist data is: to harass, number is keyword, arrange the form of set of numbers of advoiding harassing and wrecking under this keyword arranges described black list information, forms blacklist data.
18. devices according to claim 17, is characterized in that, described judging unit extracts called number, and inquire about described blacklist data, judge that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
19. devices according to claim 17, is characterized in that, described device also comprises: adapter unit, for taking over described calling or note from calling terminal; Described judging unit, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges that whether described called number is taking calling number as the advoiding harassing and wrecking in set of numbers of keyword.
20. devices according to claim 17, is characterized in that, also comprise mask pattern parameter in described blacklist data, in order to indicate the communication type of shielding; The communication type that described performance element is only corresponding to mask pattern parameter shields.
21. devices according to claim 15, it is characterized in that, the building mode of described blacklist data is: the mode being labeled as blacklist by Internet resources or the user that is exceeded some threshold values obtains acquiescence black list information, and is formed blacklist data with the form of harassing set of numbers.
22. devices according to claim 21, is characterized in that, described judging unit inquires about described blacklist data, judge whether described calling number is harassing in set of numbers.
23. devices according to claim 21, is characterized in that, described device also comprises: adapter unit, for taking over described calling or note from calling terminal; Described judging unit, after described adapter unit takes over described calling or note from caller, extracts called number, and inquires about described blacklist data, judges whether described calling number is harassing in set of numbers.
24. devices according to claim 21, is characterized in that, described performance element all shields from all communication types of number in harassing and wrecking set of numbers, or arrange according to user and shield particular type.
25. devices according to claim 19 or 23, is characterized in that, the calling of address for the purpose of described device that described adapter unit receives that described calling terminal sends and note and the data through amendment.
26., according to claim 15 to the method described in 24 any one, is characterized in that, described acquiring unit only obtains the relevant blacklist data its place calling terminal being set to blacklist number.
27. according to claim 15 to the device described in 24 any one, it is characterized in that, if in the blacklist that calling number is arranged at called number, calling or note are mail to spacing by described performance element, and not on terminal called call accepted or receive note, wherein, before by switch calling or note being mail to spacing, described switch is from calling terminal receipt of call or note and relevant data; If calling number is not in the blacklist of called number setting, calling or note are mail to called by described performance element.
28. devices according to claim 27, is characterized in that, described blacklist data also comprises blacklist prompt tone; After spacing is mail in calling, play described blacklist prompt tone by calling terminal.
CN201410067321.3A 2014-02-26 2014-02-26 The hold-up interception method and device of terminal blacklist Active CN104869262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410067321.3A CN104869262B (en) 2014-02-26 2014-02-26 The hold-up interception method and device of terminal blacklist

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410067321.3A CN104869262B (en) 2014-02-26 2014-02-26 The hold-up interception method and device of terminal blacklist

Publications (2)

Publication Number Publication Date
CN104869262A true CN104869262A (en) 2015-08-26
CN104869262B CN104869262B (en) 2018-07-31

Family

ID=53914768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410067321.3A Active CN104869262B (en) 2014-02-26 2014-02-26 The hold-up interception method and device of terminal blacklist

Country Status (1)

Country Link
CN (1) CN104869262B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105677877A (en) * 2016-01-11 2016-06-15 常州大学 Directional information shielding method based on user behaviors
CN107580357A (en) * 2017-10-27 2018-01-12 努比亚技术有限公司 Limitation communication means, equipment and the computer-readable storage medium of a kind of black list user
CN108924840A (en) * 2018-06-26 2018-11-30 中国联合网络通信集团有限公司 Method for managing black list, device and terminal
CN111510925A (en) * 2020-03-13 2020-08-07 叶兵 System and method for preventing telecommunication fraud, junk calls and junk information
CN112528098A (en) * 2020-12-16 2021-03-19 浙江百应科技有限公司 Data query method, system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859502A (en) * 2006-03-01 2006-11-08 华为技术有限公司 Main call shielding method, device and its use
CN101106745A (en) * 2006-07-14 2008-01-16 中兴通讯股份有限公司 A method for filtering user calls via mobile intelligent network
CN101453520A (en) * 2007-11-30 2009-06-10 上海粱江通信系统有限公司 System and method for detecting and blocking disturbance call
CN101472281A (en) * 2007-12-29 2009-07-01 上海粱江通信系统有限公司 Device concatenated in signaling link for implementing call limitation
CN101472007A (en) * 2007-12-28 2009-07-01 中国移动通信集团公司 Method and system for determining disturbance telephone
US20110211682A1 (en) * 2008-07-21 2011-09-01 F-Secure Oyj Telephony fraud prevention

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859502A (en) * 2006-03-01 2006-11-08 华为技术有限公司 Main call shielding method, device and its use
CN101106745A (en) * 2006-07-14 2008-01-16 中兴通讯股份有限公司 A method for filtering user calls via mobile intelligent network
CN101453520A (en) * 2007-11-30 2009-06-10 上海粱江通信系统有限公司 System and method for detecting and blocking disturbance call
CN101472007A (en) * 2007-12-28 2009-07-01 中国移动通信集团公司 Method and system for determining disturbance telephone
CN101472281A (en) * 2007-12-29 2009-07-01 上海粱江通信系统有限公司 Device concatenated in signaling link for implementing call limitation
US20110211682A1 (en) * 2008-07-21 2011-09-01 F-Secure Oyj Telephony fraud prevention

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105677877A (en) * 2016-01-11 2016-06-15 常州大学 Directional information shielding method based on user behaviors
CN107580357A (en) * 2017-10-27 2018-01-12 努比亚技术有限公司 Limitation communication means, equipment and the computer-readable storage medium of a kind of black list user
CN108924840A (en) * 2018-06-26 2018-11-30 中国联合网络通信集团有限公司 Method for managing black list, device and terminal
CN108924840B (en) * 2018-06-26 2022-02-01 中国联合网络通信集团有限公司 Blacklist management method and device and terminal
CN111510925A (en) * 2020-03-13 2020-08-07 叶兵 System and method for preventing telecommunication fraud, junk calls and junk information
CN112528098A (en) * 2020-12-16 2021-03-19 浙江百应科技有限公司 Data query method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN104869262B (en) 2018-07-31

Similar Documents

Publication Publication Date Title
CN103167500B (en) A kind of realize the method and system that call-in of mobile telephone set is uniformly processed
US7797379B2 (en) System and method for shared spam call blocking
CN102611805B (en) Communication information notifying method, information uploading method, server and communication terminal
CN102624995B (en) Be applicable to virtual-number application process, the Apparatus and system of the Internet
CN104869262A (en) Method and device for intercepting terminal blacklist
CN105657131A (en) Method and device for preventing nuisance calls
CN113596262A (en) Method for increasing efficiency and ensuring full coverage of call based on logistics industry and service platform
GB2431819A (en) Method of realizing call connection in intelligent network system
CN100499722C (en) Device and method for realizing transmitting information to computer network real-time communication terminal by telephone
CN108366075B (en) Security privacy number protection platform based on core network security protection strategy
CN1288874C (en) PHS system authentication method
CN101925027A (en) Called user subscription information-based telephone disturbance-free method
CN102422656A (en) Method for performing ussd services in a telecommunications network
CN103037113B (en) A kind of multimedia ring service system based on converged communication and implementation method
CN101815338A (en) Device and method for controlling concurrent call volume
CN104104803A (en) Call service method and system, system side and calling terminal
CN108696832A (en) Call handling method, device and equipment, computer readable storage medium
CN101316441B (en) Method for universal call management platform implementing unconditional forward shifting user connection
CN103458374B (en) The implementation method of a kind of value-added service, Apparatus and system
CN104639774A (en) Queuing machine management method and device
CN103179286B (en) Call control method and system
CN101001394A (en) Intelligent network service control point equipment
CN108900721A (en) Intimacy protection system and method during a kind of telephone outbound call
CN104717372B (en) A kind of call service processing method and equipment
US20080095342A1 (en) Interception Of Cashless Calling Service Subscription

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant