CN105376387A - Processing method of strange call, device, system and terminal - Google Patents
Processing method of strange call, device, system and terminal Download PDFInfo
- Publication number
- CN105376387A CN105376387A CN201410423111.3A CN201410423111A CN105376387A CN 105376387 A CN105376387 A CN 105376387A CN 201410423111 A CN201410423111 A CN 201410423111A CN 105376387 A CN105376387 A CN 105376387A
- Authority
- CN
- China
- Prior art keywords
- stranger calls
- authentication
- incoming call
- response
- stranger
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a processing method of a strange call. The method is characterized by comprises the steps of setting a stranger call authentication rule, determining whether a call is a strange call, carrying out authentication on the strange call when the call is judged as the strange call and detecting whether answer of the strange call is matched with the authentication rule, if so, connecting the call, and if not, refusing the connection of the call. The invention also provides a processing device of a strange call, a system and a terminal correspondingly. According to the processing method of a strange call, the device, the system and the terminal, the authentication of the strange call can be carried out, and the connection of the strange call which is not authenticated to a user terminal is prevented.
Description
Technical field
The present invention relates to the communications field, particularly relate to a kind of processing method and terminal of Stranger Calls.
Background technology
Caller identification mode is now more is the associated person information stored in inquiry mobile phone address list, and extracting from the information inquired needs the project being shown to user, is presented on electric interface, as the name of contact person or picture etc.But, if caller ID is Stranger Calls, then only show caller ID.For Stranger Calls, after only answering, adopt the identity judging incoming person.Now, larger ratio in Stranger Calls, is had to be harassing call, more or even fraudulent call.
General old man is due to older, and identification capability is poor, easily causes due to credulous fraudulent call and roughly has dust thrown into the eyes, and causes any property loss and body and mind injury.
Therefore, be necessary processing method and terminal that a kind of Stranger Calls is provided, the problem can not screened Stranger Calls in prior art can be solved.
Summary of the invention
Given this, the invention provides a kind of processing method of Stranger Calls, device, system and terminal, authentication can be carried out to Stranger Calls, prevent from not being connected to user terminal through the Stranger Calls of authentication.
A processing method for Stranger Calls, comprising:
Stranger Calls authentication rules is set;
Judge whether incoming call is Stranger Calls;
When judging that described incoming call is Stranger Calls, carry out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if so, then accesses described incoming call, if not, then and the described incoming call of refusal access.
Wherein, described authentication rules comprises answer corresponding to the problem of the problem of authentication and described authentication.
Wherein, carry out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, comprising:
The problem of described authentication is play to described Stranger Calls side;
Whether the answer corresponding with the problem of described authentication matches to judge the response of described Stranger Calls side.
Wherein, by described called terminal, described authentication rules is set, whether described called terminal is present in the associated person information of described called terminal according to described incoming call judges whether described incoming call is Stranger Calls, described called terminal carries out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if, then described called terminal enters electric interface, if not, called terminal terminates the calling of described Stranger Calls, and does not show described Stranger Calls information.
Wherein, by called terminal, described authentication rules is set, associated person information in described authentication rules and described called terminal is sent to server by described called terminal, whether described server is present in the associated person information of described called terminal according to described incoming call judges whether described incoming call is Stranger Calls, described server carries out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if, then described Stranger Calls is connected to called terminal, if not, described Stranger Calls is then refused to be connected to described called terminal.
Wherein, the response of described Stranger Calls side is that voice mode response or Text Input mode are replied.
A processing unit for Stranger Calls, it comprises:
Module is set, for arranging Stranger Calls authentication problem;
Judge module, for judging whether incoming call is Stranger Calls;
Authentication module, for when judging that described incoming call is Stranger Calls, carries out authentication to described Stranger Calls side, and whether the response detecting described Stranger Calls matches with described authentication rules; And
Processing module, when response and described authentication rules for detecting described Stranger Calls at described authentication module match, then access described incoming call, if when described authentication module detects the response of described Stranger Calls and described authentication rules does not match, if not, then refusal accesses described incoming call.
Wherein, described authentication rules comprises answer corresponding to the problem of the problem of authentication and described authentication, described authentication module is used for the problem playing described authentication to described Stranger Calls side, and whether the answer corresponding with the problem of described authentication matches to judge the response of described Stranger Calls side.
A treatment system for Stranger Calls, comprising:
Terminal, for arranging the authentication rules of Stranger Calls, and is sent to described server by described authentication rules and associated person information;
Server, associated person information for sending according to described terminal judges whether incoming call is Stranger Calls, and when judging incoming call as Stranger Calls, according to described authentication rules, authentication is carried out to Stranger Calls side, judge whether the response of Stranger Calls side matches with authentication rules, if when the response of Stranger Calls side and authentication rules match, then accesses described incoming call, if when the response of Stranger Calls side and authentication rules do not match, then the described incoming call of refusal access.
A kind of terminal, described terminal comprises the processing unit of described Stranger Calls.
In sum, the processing method of the Stranger Calls that the technical program provides, device, system and terminal, by arranging authentication rules, and when judging incoming call as Stranger Calls, authentication is carried out to Stranger Calls side, whether the response of checking Stranger Calls side matches with authentication rules, the response of Stranger Calls side and authentication rules are matched, then show that the identity of Stranger Calls side can be trusted, then called terminal demonstration can be carried out electric interface, described Stranger Calls can be switched on.For the response of Stranger Calls side and authentication rules unmatched, then the identity of surperficial Stranger Calls side exists suspicious, then refuse Stranger Calls, and called terminal can not show to come electric interface, and described Stranger Calls information can not be presented at called terminal.The processing method of the Stranger Calls that the technical program provides, effectively can avoid the lower user of the identification capabilities such as old man to touch swindle or harassing call, ensure that the fail safe of call.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the embodiment of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the processing method of a kind of Stranger Calls provided by the invention;
Fig. 2 is the structured flowchart of the treatment system of Stranger Calls provided by the invention.
embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, remove the technical scheme in the embodiment of the present invention, intactly describe, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under the prerequisite not making creative work, all belongs to the scope of protection of the invention.
Refer to Fig. 1, the technical program first execution mode provides a kind of processing method of Stranger Calls, the processing method of described Stranger Calls can be the method that the communicating terminals such as mobile phone process incoming call, for older mobile phone to the method that process of sending a telegram here, can comprise step especially:
S101, arranges Stranger Calls authentication rules.
Described authentication rules can set as required.As arrange authentication problem and as described in answer etc. corresponding to the problem of authentication.The problem of described authentication can for the recording of problem pre-set, and the answer of described problem can be the answer can selected by button, and also can be needs answerer to adopt voice to carry out the answer of answering.Be understandable that, the problem of described authentication also can be set to multiple, can determine incoming person's identity more accurately.Described incoming call authentication rules can also be the form etc. of user's setting.
The terminal (called terminal) that described authentication rules also can be used by user is arranged, and then described authentication rules is sent to server to make described server to perform described authentication rules.Described authentication rules also directly can arrange and be stored in called terminal, to make described called terminal to perform described authentication rules.
S102, judges whether incoming call is Stranger Calls.
In present embodiment, according to the information not recording caller ID in the associated person information of the address list record of called terminal, then can be judged to be Stranger Calls number.Judge whether incoming call is that Stranger Calls can be judged by server, and terminal also can be adopted directly to judge.
Concrete, when adopting server to judge, the information of the contact person stored in called terminal can send and be stored to server, and carry out real-time update, namely, when the information of the contact person in called terminal carries out increasing newly or revising, information that is newly-increased or change is also upgraded in the server.When connecting user terminal when sending a telegram here by server, described server is according to associated person information corresponding in the number of described incoming call and call number, judge whether the number of described incoming call is stored in the associated person information of described calling terminal, if no, then judge that described incoming call is Stranger Calls.
When adopting called terminal directly to judge, then when called terminal receives incoming call, whether be first that Stranger Calls judges to incoming call.Concrete, can mate with the associated person information stored in called terminal according to by caller ID, described caller ID is not present in the associated person information stored in called terminal, then judge that incoming call is as Stranger Calls.Be understandable that, when called terminal receives Stranger Calls, do not enter electric interface.When the incoming call that called terminal receives is judged as non-Stranger Calls, enter electric interface.
S103, carries out authentication to described Stranger Calls, and whether the response detecting described Stranger Calls matches with described authentication rules, and if so, then described called terminal enters electric interface, if not, then refuses the calling of described Stranger Calls.
In this step, namely by carrying out authentication to Stranger Calls according to the authentication rules of setting, whether the response of checking Stranger Calls matches with the authentication rules arranged.Be specifically as follows: the problem playing described authentication to described Stranger Calls side; Whether the answer corresponding with the problem of described authentication matches to judge the response of described Stranger Calls side.If Stranger Calls response matches with the authentication rules arranged, then judge that described Stranger Calls is by authentication, called terminal enters electric interface.If Stranger Calls response does not match with the authentication rules arranged, then judge that described Stranger Calls is not by authentication, refuses the calling of described Stranger Calls.
Whether the response that this step can detect described Stranger Calls side by server matches with described authentication rules.When server judges that caller ID is not stored in the associated person information of called party, server plays in authentication rules the problem arranging authentication to caller, and whether the answer corresponding with the problem of authentication matches to judge the response of caller.
The response of Stranger Calls side can adopt the mode of voice to answer a question for caller, also can, according to the needs of problem, adopt the terminal of caller to be replied by the mode of Text Input.Described server can according to different response modes, and whether the response adopting different detection methods to carry out detecting caller matches with the authentication rules arranged.As adopted caller to adopt the mode of input to reply, then whether whether the content detecting described caller input mate with the answer of this problem set in authentication rules.As adopted voice mode to reply, then the voice promised are identified, thus judge whether whether the content of caller's voice answering mate with the answer of this problem set in authentication rules.
When the answer that the response and described authentication rules that judge Stranger Calls side set matches, described server can by the call connection of Stranger Calls to described called terminal, and described called terminal can show to come electric interface, and user can connecting incoming call.When the answer that the response and described authentication rules that judge Stranger Calls side set does not match, described server refusal is by the call connection of described Stranger Calls extremely described called terminal, thus described called terminal can not show incoming call, more can not show the information of described Stranger Calls.
Whether the response that this step also can detect described Stranger Calls by called terminal matches with described authentication rules.When called terminal judges incoming call is for Stranger Calls, Stranger Calls can connect on called terminal backstage, described called terminal can play to caller the problem arranged in authentication rules, and judges whether the response of caller matches with predetermined authentication rules.The response of caller can adopt the mode of voice to answer a question for caller, also can, according to the needs of problem, adopt the terminal of caller to be replied by the mode of input.Described called terminal can according to different response modes, and whether the response adopting different detection methods to carry out detecting caller matches with the authentication rules arranged.As adopted caller to adopt the mode of input to reply, then whether whether the content detecting described caller input mate with the answer of this problem set in authentication rules.As adopted voice mode to reply, then the voice promised are identified, thus judge whether whether the content of caller's voice answering mate with the answer of this problem set in authentication rules.When the answer that the response and described authentication rules that judge Stranger Calls side set matches, described called terminal can show to come electric interface, and user can connecting incoming call.When the answer that the response and described authentication rules that judge Stranger Calls side set does not match, called terminal directly can terminate the call with Stranger Calls, and described called terminal can not show incoming call, more can not show the information of described Stranger Calls.
The processing method of the Stranger Calls that the technical program provides, by arranging authentication rules, and when judging incoming call as Stranger Calls, authentication is carried out to Stranger Calls side, whether the response of checking Stranger Calls side matches with authentication rules, matches, then show that the identity of Stranger Calls side can be trusted for the response of Stranger Calls side and authentication rules, then called terminal demonstration can be carried out electric interface, described Stranger Calls can be switched on.For the response of Stranger Calls side and authentication rules unmatched, then the identity of surperficial Stranger Calls side exists suspicious, then refuse Stranger Calls, and called terminal can not show to come electric interface, and described Stranger Calls information can not be presented at called terminal.The processing method of the Stranger Calls that the technical program provides, effectively can avoid the lower user of the identification capabilities such as old man to touch swindle or harassing call, ensure that the fail safe of call.
The technical program second execution mode is the corresponding processing unit providing a kind of Stranger Calls also, and the processing unit of described Stranger Calls comprises and arranges module, judge module, authentication module and control module.
The described module that arranges is for arranging Stranger Calls authentication rules.
Described authentication rules can set as required.As the answer etc. of the problem and correspondence that arrange authentication.The problem of described authentication can for the recording of problem pre-set, and the answer of described problem can be the answer can selected by button, and also can be needs answerer to adopt voice to carry out the answer of answering.Be understandable that, the problem of described authentication also can be set to multiple, can determine incoming person's identity more accurately.Described incoming call authentication rules can also be the form etc. of user's setting.
Described judge module is for judging whether incoming call is Stranger Calls.
Described judge module according to the information not recording caller ID in the associated person information of the address list record of communicating terminal, then can be judged to be Stranger Calls number.Concrete, described judge module can mate with the associated person information stored in terminal according to by caller ID, and described caller ID is not present in the associated person information stored in terminal, then judge that incoming call is as Stranger Calls.
Described authentication module is used for carrying out authentication to described Stranger Calls side, and whether the response detecting described Stranger Calls matches with described authentication rules.
In this step, authentication module is by carrying out authentication to Stranger Calls according to the authentication rules of setting, namely verify whether the response of Stranger Calls matches with the authentication rules arranged, if Stranger Calls response matches with the authentication rules arranged, then judge that described Stranger Calls is by authentication, called terminal enters electric interface.If Stranger Calls response does not match with the authentication rules arranged, then judge that described Stranger Calls is not by authentication, refuses the calling of described Stranger Calls.When the answer that the response and described authentication rules that judge Stranger Calls side set matches, described server can by the call connection of Stranger Calls to described called terminal, and described called terminal can show to come electric interface, and user can connecting incoming call.When the answer that the response and described authentication rules that judge Stranger Calls side set does not match, described server refusal is by the call connection of described Stranger Calls extremely described called terminal, thus described called terminal can not show incoming call, more can not show the information of described Stranger Calls.
Whether the response that this step also can detect described Stranger Calls by called terminal matches with described authentication rules.When called terminal judges incoming call is for Stranger Calls, called terminal and Stranger Calls can be connected on backstage, described called terminal can play to caller the problem arranged in authentication rules, and judges whether the response of caller matches with predetermined authentication rules.The response of caller can adopt the mode of voice to answer a question for caller, also can, according to the needs of problem, adopt the terminal of caller to be replied by the mode of input.Authentication module can according to different response modes, and whether the response adopting different detection methods to carry out detecting caller matches with the authentication rules arranged.As adopted caller to adopt the mode of input to reply, then whether whether the content detecting described caller input mate with the answer of this problem set in authentication rules.As adopted voice mode to reply, then the voice promised are identified, thus judge whether whether the content of caller's voice answering mate with the answer of this problem set in authentication rules.
Described processing module is used for when described authentication module detects the response of described Stranger Calls and described authentication rules matches, control described called terminal and enter electric interface, if when described authentication module detects the response of described Stranger Calls and described authentication rules does not match, control the calling of the described Stranger Calls of refusal.
Described authentication module is when the answer that the response and described authentication rules that judge Stranger Calls side set matches, and described processing module controls described called terminal can show to come electric interface, and user can connecting incoming call.When authentication module judges that the answer that the response of Stranger Calls side and described authentication rules set does not match, described processing module controls called terminal directly can terminate the call with Stranger Calls, described called terminal can not show incoming call, more can not show the information of described Stranger Calls.
The processing unit of the Stranger Calls that the technical program provides, by to arranging module installation authentication rules, and when judge module judges incoming call as Stranger Calls, authentication module carries out authentication to Stranger Calls side, whether the response of checking Stranger Calls side matches with authentication rules, matches, then show that the identity of Stranger Calls side can be trusted for the response of Stranger Calls side and authentication rules, then called terminal demonstration can be carried out electric interface, described Stranger Calls can be switched on.For the response of Stranger Calls side and authentication rules unmatched, then the identity of surperficial Stranger Calls side exists suspicious, then refuse Stranger Calls, and called terminal can not show to come electric interface, and described Stranger Calls information can not be presented at called terminal.The processing method of the Stranger Calls that the technical program provides, effectively can avoid the lower user of the identification capabilities such as old man to touch swindle or harassing call, ensure that the fail safe of call.
The technical program the 3rd execution mode provides a kind of terminal, and described terminal comprises described Stranger Calls processing unit.
Refer to Fig. 2, the technical program the 4th execution mode provides the treatment system 200 of Stranger Calls in, and the treatment system 200 of described Stranger Calls comprises terminal 210 and server 220.
Described authentication rules and associated person information for arranging the authentication rules of Stranger Calls, and are sent to described server 220 by described terminal 210.
For the associated person information sent according to described terminal, described server 220 judges whether incoming call is Stranger Calls, and when sending a telegram here as Stranger Calls, described authentication rules carries out authentication to Stranger Calls side, judge whether the response of Stranger Calls side matches with authentication rules, if when the response of Stranger Calls side and authentication rules match, Stranger Calls is connected to described terminal, if when the response of Stranger Calls side and authentication rules do not match, refuses Stranger Calls to be connected to described terminal.
Concrete, described terminal 210 can comprise and arranges module 211 and sending module 212.The described module 211 that arranges is for arranging authentication rules.Described sending module 212 is for being sent to described server 220 by described authentication rules and associated person information.
Described server 220 can comprise judge module 221, authentication module 222 and processing module 223.Described judge module 221 by not recording the information of caller ID in described associated person information, then can be judged to be Stranger Calls number.Concrete, described judge module 221 can mate with associated person information according to by caller ID, and described caller ID is not present in associated person information, then judge that incoming call is as Stranger Calls.Whether described authentication module 222 matches with described authentication rules for the response detecting described Stranger Calls.Described processing module 223 matches with the authentication rules arranged for Stranger Calls response, and described Stranger Calls is connected to described terminal 210, if Stranger Calls response does not match with the authentication rules arranged, refuses the calling of described Stranger Calls.
The treatment system of the Stranger Calls that the technical program provides, by terminal, authentication rules is set, and when server judges incoming call as Stranger Calls, authentication module carries out authentication to Stranger Calls side, whether the response of checking Stranger Calls side matches with authentication rules, matches, then show that the identity of Stranger Calls side can be trusted for the response of Stranger Calls side and authentication rules, then called terminal demonstration can be carried out electric interface, described Stranger Calls can be switched on.For the response of Stranger Calls side and authentication rules unmatched, then the identity of surperficial Stranger Calls side exists suspicious, then refuse Stranger Calls, and called terminal can not show to come electric interface, and described Stranger Calls information can not be presented at called terminal.The processing method of the Stranger Calls that the technical program provides, effectively can avoid the lower user of the identification capabilities such as old man to touch swindle or harassing call, ensure that the fail safe of call.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is that the hardware that can carry out instruction relevant by program has come, this program can be stored in a computer-readable recording medium, storage medium can comprise: flash disk, read-only memory (Read-OnlyMemory, ROM), random access device (RandomAccessMemory, RAM), disk or CD etc.
The call processing method provided the embodiment of the present invention above and terminal are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.
Claims (10)
1. a processing method for Stranger Calls, is characterized in that, comprising:
Stranger Calls authentication rules is set;
Judge whether incoming call is Stranger Calls;
When judging that described incoming call is Stranger Calls, carry out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if so, then accesses described incoming call, if not, then and the described incoming call of refusal access.
2. the processing method of Stranger Calls as claimed in claim 1, is characterized in that, described authentication rules comprises answer corresponding to the problem of the problem of authentication and described authentication.
3. the processing method of Stranger Calls as claimed in claim 2, it is characterized in that, carry out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, comprising:
The problem of described authentication is play to described Stranger Calls side;
Whether the answer corresponding with the problem of described authentication matches to judge the response of described Stranger Calls side.
4. the processing method of Stranger Calls as claimed in claim 3, it is characterized in that, by described called terminal, described authentication rules is set, whether described called terminal is present in the associated person information of described called terminal according to described incoming call judges whether described incoming call is Stranger Calls, described called terminal carries out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if, then described called terminal enters electric interface, if not, called terminal terminates the calling of described Stranger Calls, and do not show described Stranger Calls information.
5. the processing method of Stranger Calls as claimed in claim 3, it is characterized in that, by called terminal, described authentication rules is set, associated person information in described authentication rules and described called terminal is sent to server by described called terminal, whether described server is present in the associated person information of described called terminal according to described incoming call judges whether described incoming call is Stranger Calls, described server carries out authentication to described Stranger Calls, whether the response detecting described Stranger Calls matches with described authentication rules, if, then described Stranger Calls is connected to called terminal, if not, described Stranger Calls is then refused to be connected to described called terminal.
6. the processing method of Stranger Calls as claimed in claim 3, is characterized in that, the response of described Stranger Calls side is that voice mode response or Text Input mode are replied.
7. a processing unit for Stranger Calls, it comprises:
Module is set, for arranging Stranger Calls authentication problem;
Judge module, for judging whether incoming call is Stranger Calls;
Authentication module, for when judging that described incoming call is Stranger Calls, carries out authentication to described Stranger Calls side, and whether the response detecting described Stranger Calls matches with described authentication rules; And
Processing module, when response and described authentication rules for detecting described Stranger Calls at described authentication module match, then access described incoming call, if when described authentication module detects the response of described Stranger Calls and described authentication rules does not match, if not, then refusal accesses described incoming call.
8. the processing unit of Stranger Calls as claimed in claim 7, it is characterized in that, described authentication rules comprises answer corresponding to the problem of the problem of authentication and described authentication, described authentication module is used for the problem playing described authentication to described Stranger Calls side, and whether the answer corresponding with the problem of described authentication matches to judge the response of described Stranger Calls side.
9. a treatment system for Stranger Calls, comprising:
Terminal, for arranging the authentication rules of Stranger Calls, and is sent to described server by described authentication rules and associated person information;
Server, associated person information for sending according to described terminal judges whether incoming call is Stranger Calls, and when judging incoming call as Stranger Calls, according to described authentication rules, authentication is carried out to Stranger Calls side, judge whether the response of Stranger Calls side matches with authentication rules, if when the response of Stranger Calls side and authentication rules match, then accesses described incoming call, if when the response of Stranger Calls side and authentication rules do not match, then the described incoming call of refusal access.
10. a terminal, is characterized in that, described terminal comprises the processing unit of Stranger Calls as claimed in claim 7 or 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410423111.3A CN105376387A (en) | 2014-08-25 | 2014-08-25 | Processing method of strange call, device, system and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410423111.3A CN105376387A (en) | 2014-08-25 | 2014-08-25 | Processing method of strange call, device, system and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105376387A true CN105376387A (en) | 2016-03-02 |
Family
ID=55378179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410423111.3A Pending CN105376387A (en) | 2014-08-25 | 2014-08-25 | Processing method of strange call, device, system and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105376387A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534535A (en) * | 2016-11-10 | 2017-03-22 | 捷开通讯(深圳)有限公司 | Incoming call processing method and mobile terminal |
WO2018121649A1 (en) * | 2016-12-29 | 2018-07-05 | Zhejiang Geely Holding Group Co., Ltd. | Incoming call management method and apparatus |
CN108377302A (en) * | 2016-10-31 | 2018-08-07 | 北京小米移动软件有限公司 | Shield the method and device of harassing call |
CN108574940A (en) * | 2017-03-07 | 2018-09-25 | 腾讯科技(深圳)有限公司 | A kind for the treatment of method and apparatus of incoming call |
CN109889647A (en) * | 2019-03-21 | 2019-06-14 | 深圳市趣创科技有限公司 | A kind of harassing call processing method and processing device |
WO2022253339A1 (en) * | 2021-06-03 | 2022-12-08 | 汪震坤 | Method, system and device capable of automatically blocking spam calls |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794759A (en) * | 2006-01-05 | 2006-06-28 | 倚天资讯股份有限公司 | Communication device, server possessing telephone antiinterference function and its method |
US20070201660A1 (en) * | 2006-01-26 | 2007-08-30 | International Business Machines Corporation | Method and apparatus for blocking voice call spam |
CN101207837A (en) * | 2007-12-12 | 2008-06-25 | 华为技术有限公司 | Apparatus and method for preventing telephone harassment |
CN101729512A (en) * | 2008-10-27 | 2010-06-09 | 成都市华为赛门铁克科技有限公司 | Method, device, proxy server and terminal for filtering junk telephones |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
-
2014
- 2014-08-25 CN CN201410423111.3A patent/CN105376387A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794759A (en) * | 2006-01-05 | 2006-06-28 | 倚天资讯股份有限公司 | Communication device, server possessing telephone antiinterference function and its method |
US20070201660A1 (en) * | 2006-01-26 | 2007-08-30 | International Business Machines Corporation | Method and apparatus for blocking voice call spam |
CN101207837A (en) * | 2007-12-12 | 2008-06-25 | 华为技术有限公司 | Apparatus and method for preventing telephone harassment |
CN101729512A (en) * | 2008-10-27 | 2010-06-09 | 成都市华为赛门铁克科技有限公司 | Method, device, proxy server and terminal for filtering junk telephones |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108377302A (en) * | 2016-10-31 | 2018-08-07 | 北京小米移动软件有限公司 | Shield the method and device of harassing call |
CN106534535A (en) * | 2016-11-10 | 2017-03-22 | 捷开通讯(深圳)有限公司 | Incoming call processing method and mobile terminal |
WO2018121649A1 (en) * | 2016-12-29 | 2018-07-05 | Zhejiang Geely Holding Group Co., Ltd. | Incoming call management method and apparatus |
US10659587B2 (en) | 2016-12-29 | 2020-05-19 | Zhejiang Geely Holding Group Co., Ltd. | Incoming call management method and apparatus |
CN108574940A (en) * | 2017-03-07 | 2018-09-25 | 腾讯科技(深圳)有限公司 | A kind for the treatment of method and apparatus of incoming call |
CN108574940B (en) * | 2017-03-07 | 2021-08-24 | 腾讯科技(深圳)有限公司 | Incoming call processing method and device |
CN109889647A (en) * | 2019-03-21 | 2019-06-14 | 深圳市趣创科技有限公司 | A kind of harassing call processing method and processing device |
WO2022253339A1 (en) * | 2021-06-03 | 2022-12-08 | 汪震坤 | Method, system and device capable of automatically blocking spam calls |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105376387A (en) | Processing method of strange call, device, system and terminal | |
CN105072564B (en) | A kind of audio frequency playing method and device based on bluetooth connection | |
CN104767713B (en) | Account binding method, server and system | |
CN106789851A (en) | Auth method, system, service server and authentication server | |
CN104917749A (en) | Account registration method and device | |
CN104468611A (en) | Data security processing method and device based on dual-system switching | |
CN104092542A (en) | Account login method, device and system | |
CN105635084A (en) | Apparatus and method for authenticating terminal | |
CN107710725B (en) | Method and system for authenticating a user by a telephone number | |
CN107104979B (en) | Method and system for realizing voice callback verification service | |
CN105392137A (en) | Household WIFI embezzlement preventing method, wireless router and terminal equipment | |
US10553040B2 (en) | Method and apparatus for enhanced telematics security through secondary channel | |
Young et al. | BadVoice: Soundless voice-control replay attack on modern smartphones | |
CN104283851A (en) | Illegal automatic call shielding method and system and voice authentication equipment | |
CN110730446A (en) | Login method, terminal and computer storage medium | |
CN104168361A (en) | Communication method, communication device, server and communication system | |
CN105722084A (en) | Authentication method based on embedded subscriber identity module, and terminal | |
CN107872446B (en) | Communication account management method and device and server | |
CN101217399B (en) | A data card background system and the corresponding operating method | |
CN105828322B (en) | A kind of method, mobile terminal and security centre that user logs in | |
CN108777749B (en) | Fraud call identification method and device | |
CN106911727A (en) | Application program log-in control method, device and intelligent terminal | |
CN104202462B (en) | Communication control method and system | |
CN105516057B (en) | Data processing method, device and system | |
WO2020007250A1 (en) | Pseudo base station identification on-off control method and device, mobile terminal, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160302 |
|
RJ01 | Rejection of invention patent application after publication |