CN106375583A - Smart incoming call shielding method and apparatus of mobile terminal - Google Patents
Smart incoming call shielding method and apparatus of mobile terminal Download PDFInfo
- Publication number
- CN106375583A CN106375583A CN201610820165.2A CN201610820165A CN106375583A CN 106375583 A CN106375583 A CN 106375583A CN 201610820165 A CN201610820165 A CN 201610820165A CN 106375583 A CN106375583 A CN 106375583A
- Authority
- CN
- China
- Prior art keywords
- suspicious
- list
- incoming call
- shielding
- tracks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Abstract
The present invention discloses a smart incoming call shielding method and apparatus of a mobile terminal. The smart incoming call shielding method comprises a first step of scanning an incoming call record every scanning time period, and extracting suspicious phone numbers and phone number information; a second step of searching whether a pre-storage list has phone numbers identical with the suspicious phone numbers, if yes, marking the suspicious phone numbers as shielded phone numbers or tracked phone numbers according to list attributes, and if not, performing a third step; the third step of determining attributes of the suspicious phone numbers according to the phone number information, marking the suspicious phone numbers as the shield phone numbers or tracked phone numbers, and sending the suspicious phone numbers to corresponding lists to be stored; and a fourth step of when an incoming call comes, determining whether the phone number of the incoming call is the shielded phone number, if yes, shielding the phone number of the incoming call. In the method, the suspicious phone numbers are classified and selectively shielded according to the list and the phone number information, so that a user condition-based shielding function is realized, and misunderstanding rate of useless calls is lowered. The existing mobile terminal cannot automatically shield prank calls or calls that the user does not want to answer. The method solves the problem of the existing mobile terminal.
Description
Technical field
The present invention relates to mobile terminal technology, the intelligence incoming call screen method particularly to a kind of mobile terminal and its dress
Put.
Background technology
With the popularization of mobile terminal, mobile terminal be increasingly becoming people life, work in important communication converter tools.
Due to the leakage of telephone number, often it is connected to Stranger Calls or harassing call or fraudulent call or ad promotions;
Thus people bring detrimental effect to life, work.
What existing intelligent mobile terminal had provide, and harassing call intercepts function, but majority can only be to clearly marking on the net
The carrying out of note intercepts shielding, or directly displays it and be marked as harassing call during incoming call.For emerging harassing call, or
It is not desired to the number connecing for individual subscriber reason, automatic shield cannot be realized.
Thus prior art could be improved and improves.
Content of the invention
A kind of in view of in place of above-mentioned the deficiencies in the prior art, it is an object of the invention to provide the intelligence incoming call of mobile terminal
Screen method and its device, the phone that harassing call or user can not be not desired to answer to solve existing mobile terminal is carried out certainly
The problem of dynamic shielding.
In order to achieve the above object, this invention takes technical scheme below:
A kind of intelligence incoming call screen method of mobile terminal, comprising:
Step a, every run-down incoming calls record sweep time, extract suspicious number and number information;
Step b, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring
Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step c;
Step c, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number,
And send into corresponding list storage;
Judge when step d, incoming call whether caller ID is shielding number, be then to shield caller ID.
In the intelligence incoming call screen method of described mobile terminal,
In described step a, the suspicious number extracting and number information send and are stored to issue list;
In described step b, c, sequentially read each suspicious number from issue list and be marked;Every one suspicious number of labelling
Then corresponding this suspicious number of deletion from issue list.
In the intelligence incoming call screen method of described mobile terminal, described step b specifically includes:
Step b1, search whether and suspicious number identical number to there is then holding current markers in the masked list prestoring,
Read next suspicious number to continue to search in masked list;It is not carried out step b2;
Step b2, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring
And number of times will be followed the tracks of add 1, read next suspicious number return to step b1;It is not carried out step c.
In the intelligence incoming call screen method of described mobile terminal, described step c specifically includes:
Step c1, judge whether suspicious number is to converse in short-term, if execution step c2, otherwise execution step c3;
Whether the number of times that step c2, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen
Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings;
Step c3, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters rower to suspicious number according to total
Note;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
In the intelligence incoming call screen method of described mobile terminal, in described step c2, according to the corresponding mark of situation of answering
Remember that the step of this suspicious number specifically includes:
If suspicious number by rejection or is not answered, it is labeled as shielding number, sends into masked list;
If suspicious number is not belonging to rejection or does not answer, it is labeled as following the tracks of number, sends into and follow the tracks of list.
In the intelligence incoming call screen method of described mobile terminal, in described step c3, according to total incoming call number and rejection
The step that number of times is marked to suspicious number specifically includes: when total incoming call number≤the first preset times, rejection number of times >=the second
During preset times, the suspicious number of labelling is shielding number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number,
Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling
For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling
For following the tracks of number, send into and follow the tracks of list.
Described mobile terminal intelligence incoming call screen method in, also include: secondary reminder time then, send shielding
In list, all numbers confirm to user, and number correspondence markings are to shield number or by the number of refusing by the operation of choosing according to user
Code.
A kind of device of the intelligence incoming call screen method realizing described mobile terminal, it includes setting module, storage mould
Block, scan module, matching module, judge module and shroud module;
Setting module is used for setting sweep time, and memory module is used for storing the number of each list and its correspondence markings;
Scan module, every run-down incoming calls record sweep time, extracts suspicious number and number information;Matching module exists
Search whether and suspicious number identical number have then according to this suspicious number of list attribute correspondence markings in the list prestoring
For shielding number or tracking number, do not start judge module;Judge module according to number information by suspicious number mark be screen
Cover number or follow the tracks of number, and send into corresponding list storage;In incoming call, shroud module judges whether caller ID is shielding
Number, is then to shield caller ID.
In described device, the built-in issue list of described scan module, for storing the suspicious number extracting and number
Information;
Described matching module and judge module are additionally operable to from issue list sequentially to read each suspicious number and are marked;Every labelling
One suspicious number then corresponding this suspicious number of deletion from issue list.
In described device, described setting module is additionally operable to set secondary reminder time;
Described device also includes secondary-confirmation module, for secondary reminder time then, send masked list in all numbers
Confirm to user, be shielding number by number correspondence markings or refused number according to the operation of choosing of user.
Compared to prior art, the intelligence incoming call screen method of the mobile terminal that the present invention provides and its device, every sweeping
Retouch incoming calls record of time sweep, extract suspicious number and number information;The list prestoring has searched whether with can
Doubtful number identical number, has and then for shielding number or follows the tracks of number according to this suspicious number of list attribute correspondence markings, do not have
Then judge the attribute of suspicious number according to number information, by suspicious number mark be shielding number or follow the tracks of number, and send into right
The list storage answered;Judge during incoming call whether caller ID is shielding number, be then to shield caller ID.According to list and number
Information carries out classifying to suspicious number, selectively shields, it is achieved thereby that for the function of shielding of individual subscriber situation, reducing
The misunderstanding rate of unwanted telephone call.Solve the phone that existing mobile terminal can not be not desired to answer to harassing call or user to carry out
The problem of automatic shield.
Brief description
The intelligence incoming call screen method flow chart of the mobile terminal that Fig. 1 provides for the present invention.
The intelligence of the mobile terminal that Fig. 2 provides for the present invention carrys out the structured flowchart of the device of electric screen.
The intelligence of the mobile terminal that Fig. 3 provides for the present invention carrys out the interface schematic diagram of setting module in the device of electric screen.
Specific embodiment
The present invention provides a kind of intelligence incoming call screen method and its device of mobile terminal, is not affecting original general blocking
Suspend the coaching on the basis of energy, according to the actual state receiving calls of user, telephone number is carried out classifying, selectively shields, from
And achieve the function of shielding for individual subscriber situation, reduce the misunderstanding rate of unwanted telephone call.For making the purpose of the present invention, skill
Art scheme and effect are clearer, clear and definite, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.Should manage
Solution, specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The intelligence incoming call screen method of the mobile terminal providing please refer to Fig. 1, the present invention includes:
S100, every run-down incoming calls record sweep time, extract suspicious number and number information;
S200, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring
Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step s300;
S300, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number, and
Send into corresponding list storage;
Judge when s400, incoming call whether caller ID is shielding number, be then to shield caller ID.
In the present embodiment, carry out correlation in advance in the terminal and arrange and store, sweep time is such as set.Scanning rule
Can be diversified, such as timing scan, daily 6 points, 12 points, 18 points, 22 spot scans;Can also be periodic scanning, such as 6 points ~ 22 points
Between every 4 hours run-downs, or sweep spacing elongate etc., do not scan during shutdown.The time of execution scanning is referred to as scanning every time
Point, sweep limitss are last scan point to present scan point, and sweep object is all incoming calls records in sweep limitss.After start
Reach and be scanned for an incoming calls record sweep time.As periodic scanning, during to 10 points, between 6 points to 10 points of scanning all come
Electrographic recording, all incoming calls records during to 2 points, between 10 points to 2 points of scanning.
Sweep time arrives, and scanning incoming calls record simultaneously extracts suspicious number and number information to issue list storage.From this
Incoming calls record in extract suspicious number and number information.Described suspicious number is call in short-term (when answering and conversing
The long call less than or equal to 12s) or rejection or the number not answering any one or more situation in three kinds of situations.Described number
Information includes the incoming call time of these suspicious numbers, and situation of answering (is answered and non-conversed in short-term, answers as call in short-term, rejection, not
Answer, how long jingle bell is picked up), the information such as duration of call.Other numbers in incoming calls record directly abandon, and are not involved in follow-up
Analyzing and processing.
Suspicious number is current embodiment require that carrying out the number of discriminatory analysis, and each suspicious number only has a kind of process to tie
Really, or shielding, or following the tracks of, or being refused, it need to send and be stored to issue list.Issue list real-time reception and depositing
Store up suspicious number, just execution step s200 to judge which kind of suspicious number need to carry out and process after all suspicious numbers have sent,
It specifically includes:
Step 201, search whether and suspicious number identical number to have and then to keep current and mark in the masked list prestoring
Note, reads next suspicious number and continues to search in masked list;It is not carried out step 202;
Step 202, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring
And number of times will be followed the tracks of add 1, read next suspicious number return to step 201;It is not carried out step s300.
In the present embodiment, the list prestoring includes masked list, follows the tracks of list and refused list.Masked list is used for receiving
With the shielding number of storage labelling, number therein directly shields.Sequentially read suspicious number one by one from issue list, first exist
Search one by one in masked list, if there being identical number, represent this suspicious number marked for shielding, first is suspicious
After number mark finishes, continue to judge next suspicious number whether in masked list.
If not having in masked list, search in following the tracks of list.Follow the tracks of list to be used for receiving and store the tracking of labelling
Number, and labelling follows the tracks of number of times;Number therein belongs to shielding number undetermined, if finding and suspicious number in following the tracks of list
Identical number, then followed the tracks of number of times and added 1;Then next suspicious number return to step 201 are read.When following the tracks of, number of times is big
When equal to 3, this number is transferred to masked list and is deleted from following the tracks of list.If certain number is marked as following the tracks of number,
Follow the tracks of number of times and be directly set to 1.Each suspicious number need to make a look up in masked list, tracking list.If in two lists
All do not have, then need execution step s300 to determine whether the ownership of suspicious number.
There is call, rejection in short-term or do not answer three kinds of situations in suspicious number, judged to suspicious number according to these three situations
Code is made respective markers and is sent into respective list: then described step s300 specifically includes:
Step 310, judge whether suspicious number is to converse in short-term, if execution step 320, otherwise execution step 330;
Whether the number of times that step 320, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen
Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings.
Wherein, the first preset times are 3 times.The number of times conversed in short-term is more, illustrates that user is not desired to answer it may be possible to other side
Repeatedly dial, can directly shield.In short-term talk times less it may be possible to user is currently inconvenient to answer or other situations, also need
Determined whether according to this suspicious call rejection or the situation of answering, then according to the step answering this suspicious number of situation correspondence markings
Specifically include: if suspicious number by rejection or is not answered, be labeled as shielding number, send into masked list;If suspicious number is not
Belong to rejection or any situation do not answered, be then labeled as following the tracks of number, send into and follow the tracks of list.It is admitted to tracking for the first time
The tracking number of times of the tracking number of list is directly set to 1.
Step 330, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters to suspicious number according to total
Line flag;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
If do not exist conversing in short-term, but there is the situation of rejection, then read total number of sending a telegram here, rejection number and do not answer number.Root
The step suspicious number being marked according to total incoming call number and rejection number of times is specific as follows:
When total incoming call number≤the first preset times, during rejection number of times >=the second preset times (2 times), the suspicious number of labelling is shielding
Number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number,
Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling
For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling
For following the tracks of number, send into and follow the tracks of list.
Do not exist and converse in short-term, also there is not rejection, that is, only exist situation about not answering.Do not answer possibly user to leave behind
Mobile phone, or do not hear incoming ring tone/vibration, or answer the fact that the reasons such as inconvenience cause situation, can not directly be asserted as
User is really not desired to answer, therefore such suspicious number can not be directly labeled as shielding number, can only be to follow the tracks of number, send into and follow the tracks of
List.
It is to be appreciated that after a suspicious number is labeled, you can delete this suspicious number from issue list, read
Next suspicious number execution step s200 ~ s300, until it is labeled.By that analogy, after all suspicious numbers are all labeled
Issue list empties, and present scan terminates, obtain during scanning next time new can be with number.
After above-mentioned process, can search whether in masked list during incoming call and the shielding number of caller ID identical
Code, has then shielding caller ID, not then according to normal incoming call handling.
In the specific implementation, user directly can also add the number wanting to shield manually, then as soon as this number is sent a telegram here,
Can directly be shielded.Secondary reminder time is set in advance in the terminal, and set-up mode can be identical with sweep time.Then described
Intelligence incoming call screen method also include step s500, secondary reminder time then, send masked list in all numbers to
Family confirms, is shielding number by number correspondence markings or is refused number according to the operation of choosing of user.This step specifically includes:
Step 510, when set secondary reminder time then, collection masked list in all numbers and issue user carry out secondary
Confirm;
User chooses the number wanting to shield as needed, is not desired to directly not hooking of shielding.
Step 520, by the number mark being checked be shielding number and deliver to masked list storage;By be not checked number
Code labeling is to be refused number delivering to be refused list storage.
If step 530 is refused, and this is refused number in list, number of times will be refused and be added 1;If being refused should not in list
Refused number, then will be refused number of times and put 1.So far, secondary-confirmation one wheel of shielding number completes.
Wherein, refused list for receive and store the number (being refused number) being shielded by user's refusal, and labelling quilt
Refuse number of times.If this number exists being refused list, refused number of times and added 1;If otherwise occur for the first time, refused number of times and directly put
1.When being refused number of times >=3, recover this number be right number and from refused list delete.
When next secondary reminder time then, repeat step 410 ~ 430, by that analogy, thus successively execution second wheel
Shielding remind, third time shielding remind ..., n-th shielding remind.
Intelligence incoming call screen method based on above-mentioned mobile terminal, the embodiment of the present invention also provides a kind of intelligence to carry out electric screen
The device covering, refers to Fig. 2, described device includes setting module 10, memory module 20, scan module 30, matching module 40, sentence
Disconnected module 50 and shroud module 60;
Described setting module 10 is used for setting sweep time, gap periods etc..Memory module 20 is used for storing each list and its right
Answer the number of labelling, corresponding number of times is added 1 or puts 1.List includes masked list, follows the tracks of list and refused list.Suspicious number
Any instant exists only in one of three lists it is impossible to simultaneously appear in two or more lists.
Scan module 30, every run-down incoming calls record sweep time, extracts suspicious number and number information.This reality
Apply in example, the built-in issue list of described scan module 30, for storing the suspicious number extracting and number information, other numbers
Directly abandon.
Described matching module 40 and judge module 50 sequentially read each suspicious number from issue list and are marked;Often mark
One suspicious number of note is then corresponding from issue list to delete this suspicious number.
Matching module 40 reads suspicious number, has searched whether and suspicious number identical number in the list prestoring,
Have and then number for shielding number or is followed the tracks of according to this suspicious number of list attribute correspondence markings.All do not find this in two lists
Number, then start judge module.Specifically as shown in above-mentioned steps 201 ~ 202.
Judge module 50 receives the suspicious number that matching module 40 is sent, will be suspicious according to the number information in issue list
Number mark is shielding number or follows the tracks of number, and sends into corresponding list storage.Specifically as shown in above-mentioned steps 310 ~ 330.
Shroud module 60 judges in incoming call whether caller ID is shielding number, is then to shield caller ID.
Described setting module 10 is additionally operable to set secondary reminder time.Described device also includes secondary-confirmation module 70, uses
In secondary reminder time then, send masked list in all numbers to user confirm, according to user choose operation will number
Code correspondence markings are shielding number or are refused number.Specifically as shown in above-mentioned steps 510 ~ 530.
In further embodiment, user also directly can add the number wanting to shield by setting module 10 manually, then should
Number is directly labeled as shielding number and sending to masked list storage.This number one is sent a telegram here, and will directly be shielded.Set
The interface of module 10 is as shown in Figure 3.
In sum, the present invention carries out key words sorting according to three lists and number information to suspicious number, except energy certainly
Outside the dregs of society number that dynamic shielding is generally acknowledged, answer whether situation automatic decision shields according to user is actual, and provide secondary really
Recognize, both achieved the automated intelligent function of shielding for individual subscriber situation, turn avoid certain erroneous judgement, reduced no electricity consumption
The misunderstanding rate of words.
The division of above-mentioned functions module only in order to illustrate, in actual applications, can be as needed by above-mentioned functions
Distribution to be completed by different functional modules, that is, be divided into different functional modules, to complete all or part of foregoing description
Function.
One of ordinary skill in the art will appreciate that all or part of flow process in above-described embodiment method, can be by
Computer (mobile terminal) program completes come the hardware to instruct correlation, and described computer (mobile terminal) program can be stored in one
In computer (mobile terminal) read/write memory medium, program is upon execution, it may include the flow process of the embodiment of above-mentioned each method.
Storage medium therein can be magnetic disc, CD etc..
It is understood that for those of ordinary skills, with technology according to the present invention scheme and its can send out
Bright design in addition equivalent or change, and all these change or replace the guarantor that all should belong to appended claims of the invention
Shield scope.
Claims (10)
1. a kind of intelligence incoming call screen method of mobile terminal is it is characterised in that include:
Step a, every run-down incoming calls record sweep time, extract suspicious number and number information;
Step b, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring
Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step c;
Step c, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number,
And send into corresponding list storage;
Judge when step d, incoming call whether caller ID is shielding number, be then to shield caller ID.
2. mobile terminal according to claim 1 intelligence incoming call screen method it is characterised in that
In described step a, the suspicious number extracting and number information send and are stored to issue list;
In described step b, c, sequentially read each suspicious number from issue list and be marked;Every one suspicious number of labelling
Then corresponding this suspicious number of deletion from issue list.
3. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that described step b is concrete
Including:
Step b1, search whether and suspicious number identical number to there is then holding current markers in the masked list prestoring,
Read next suspicious number to continue to search in masked list;It is not carried out step b2;
Step b2, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring
And number of times will be followed the tracks of add 1, read next suspicious number return to step b1;It is not carried out step c.
4. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that described step c is concrete
Including:
Step c1, judge whether suspicious number is to converse in short-term, if execution step c2, otherwise execution step c3;
Whether the number of times that step c2, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen
Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings;
Step c3, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters rower to suspicious number according to total
Note;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
5. the intelligence incoming call screen method of mobile terminal according to claim 4 is it is characterised in that in described step c2
In, the step according to answering this suspicious number of situation correspondence markings specifically includes:
If suspicious number by rejection or is not answered, it is labeled as shielding number, sends into masked list;
If suspicious number is not belonging to rejection or does not answer, it is labeled as following the tracks of number, sends into and follow the tracks of list.
6. the intelligence incoming call screen method of mobile terminal according to claim 4 is it is characterised in that in described step c3
In, specifically included according to the step that total incoming call number and rejection number of times are marked to suspicious number: when total incoming call number≤the first is pre-
If number of times, during rejection number of times >=the second preset times, the suspicious number of labelling is shielding number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number,
Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling
For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling
For following the tracks of number, send into and follow the tracks of list.
7. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that also include: secondary
Reminder time then, sends all numbers in masked list and confirms to user, is marked corresponding for number according to the operation of choosing of user
It is designated as shielding number or refused number.
8. a kind of device of the intelligence incoming call screen method of mobile terminal realized described in claim 1 is it is characterised in that include
Setting module, memory module, scan module, matching module, judge module and shroud module;
Setting module is used for setting sweep time, and memory module is used for storing the number of each list and its correspondence markings;
Scan module, every run-down incoming calls record sweep time, extracts suspicious number and number information;Matching module exists
Search whether and suspicious number identical number have then according to this suspicious number of list attribute correspondence markings in the list prestoring
For shielding number or tracking number, do not start judge module;Judge module according to number information by suspicious number mark be screen
Cover number or follow the tracks of number, and send into corresponding list storage;In incoming call, shroud module judges whether caller ID is shielding
Number, is then to shield caller ID.
9. device according to claim 8, it is characterised in that the built-in issue list of described scan module, carries for storage
The suspicious number taking out and number information;
Described matching module and judge module are additionally operable to from issue list sequentially to read each suspicious number and are marked;Every labelling
One suspicious number then corresponding this suspicious number of deletion from issue list.
10. device according to claim 8 is it is characterised in that described setting module is additionally operable to set secondary reminder time;
Described device also includes secondary-confirmation module, for secondary reminder time then, send masked list in all numbers
Confirm to user, be shielding number by number correspondence markings or refused number according to the operation of choosing of user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610820165.2A CN106375583B (en) | 2016-09-13 | 2016-09-13 | Intelligent incoming call shielding method and device of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610820165.2A CN106375583B (en) | 2016-09-13 | 2016-09-13 | Intelligent incoming call shielding method and device of mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106375583A true CN106375583A (en) | 2017-02-01 |
CN106375583B CN106375583B (en) | 2020-11-13 |
Family
ID=57896894
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610820165.2A Active CN106375583B (en) | 2016-09-13 | 2016-09-13 | Intelligent incoming call shielding method and device of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106375583B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108599794A (en) * | 2018-04-23 | 2018-09-28 | Oppo广东移动通信有限公司 | Harassing and wrecking intercept control method and Related product |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873618A (en) * | 2010-06-21 | 2010-10-27 | 中兴通讯股份有限公司 | Communication monitoring method and device |
US20110283349A1 (en) * | 2009-03-12 | 2011-11-17 | Zte Corporation | Implement method and device of terminal call firewall |
CN104702765A (en) * | 2013-12-06 | 2015-06-10 | 无锡韩光电器有限公司 | Crank call shielding method and crank call shielding system |
CN105100366A (en) * | 2015-07-13 | 2015-11-25 | 小米科技有限责任公司 | Method, device and system for confirming harassment telephone number |
CN105472587A (en) * | 2014-08-26 | 2016-04-06 | 小米科技有限责任公司 | Incoming call processing method and device |
CN105721248A (en) * | 2016-02-26 | 2016-06-29 | 上海卓易科技股份有限公司 | Call monitoring method and system |
-
2016
- 2016-09-13 CN CN201610820165.2A patent/CN106375583B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110283349A1 (en) * | 2009-03-12 | 2011-11-17 | Zte Corporation | Implement method and device of terminal call firewall |
CN101873618A (en) * | 2010-06-21 | 2010-10-27 | 中兴通讯股份有限公司 | Communication monitoring method and device |
CN104702765A (en) * | 2013-12-06 | 2015-06-10 | 无锡韩光电器有限公司 | Crank call shielding method and crank call shielding system |
CN105472587A (en) * | 2014-08-26 | 2016-04-06 | 小米科技有限责任公司 | Incoming call processing method and device |
CN105100366A (en) * | 2015-07-13 | 2015-11-25 | 小米科技有限责任公司 | Method, device and system for confirming harassment telephone number |
CN105721248A (en) * | 2016-02-26 | 2016-06-29 | 上海卓易科技股份有限公司 | Call monitoring method and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108599794A (en) * | 2018-04-23 | 2018-09-28 | Oppo广东移动通信有限公司 | Harassing and wrecking intercept control method and Related product |
Also Published As
Publication number | Publication date |
---|---|
CN106375583B (en) | 2020-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103037062A (en) | Method and terminal and server used for intercepting crank calls | |
US7983398B2 (en) | Emergency contact system | |
CN104092810A (en) | Disturbance control method and device and mobile terminal | |
CN102055826A (en) | Method and system for maintaining multi-dimensional related information related to contacts in address list | |
CN106789550A (en) | Information processing method and device | |
CN101984642B (en) | Method for automatically deleting short messages and device thereof | |
CN107920154A (en) | The processing method and terminal of Stranger Calls | |
CN101674557B (en) | Method and device for detecting whether missed calls are valid or not | |
CN107302757A (en) | The method of calling and device of emergency numbers | |
CN100340131C (en) | Method for determining and reminding the location for cell-phone user | |
CN105812536A (en) | Incoming call management method and mobile terminal | |
CN102148887A (en) | Method for displaying region and weather of cellphone incoming call contacter | |
CN102572074A (en) | Method for automatically selecting matched card for multi-card mobile phone and implementation device thereof | |
CN104506704A (en) | Fax machine and/or fixed telephone with disturbance intercepting function | |
CN101389085A (en) | Rubbish short message recognition system and method based on sending behavior | |
CN101351000A (en) | Method for showing information and communication terminal | |
CN107404580A (en) | A kind of method, storage medium and equipment for intercepting harassing call number and short message | |
CN100450300C (en) | Method for tracing dialed-line condition | |
CN106375583A (en) | Smart incoming call shielding method and apparatus of mobile terminal | |
CN103873698B (en) | Terminal association device and terminal association method | |
CN101873553B (en) | Expansion method of short message service calling number information | |
CN104780251A (en) | Telephone dialing automatic conversion device and telephone dialing automatic conversion method | |
CN103259910B (en) | terminal and missed call management method | |
CN101730108B (en) | System and method for detecting lost position of communication device | |
CN1084688A (en) | Telecommunication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230414 Address after: Room 501, 85 Xiaguang Dongli, Haicang District, Xiamen City, Fujian Province, 361000 Patentee after: Xiamen reliable intellectual property service Co.,Ltd. Address before: 516006 Zhongkai hi tech Zone, Huizhou, Guangdong, 86 Chang seven Road West Patentee before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd. |
|
TR01 | Transfer of patent right |