CN106375583A - Smart incoming call shielding method and apparatus of mobile terminal - Google Patents

Smart incoming call shielding method and apparatus of mobile terminal Download PDF

Info

Publication number
CN106375583A
CN106375583A CN201610820165.2A CN201610820165A CN106375583A CN 106375583 A CN106375583 A CN 106375583A CN 201610820165 A CN201610820165 A CN 201610820165A CN 106375583 A CN106375583 A CN 106375583A
Authority
CN
China
Prior art keywords
suspicious
list
incoming call
shielding
tracks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610820165.2A
Other languages
Chinese (zh)
Other versions
CN106375583B (en
Inventor
陈健强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Reliable Intellectual Property Service Co ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201610820165.2A priority Critical patent/CN106375583B/en
Publication of CN106375583A publication Critical patent/CN106375583A/en
Application granted granted Critical
Publication of CN106375583B publication Critical patent/CN106375583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Abstract

The present invention discloses a smart incoming call shielding method and apparatus of a mobile terminal. The smart incoming call shielding method comprises a first step of scanning an incoming call record every scanning time period, and extracting suspicious phone numbers and phone number information; a second step of searching whether a pre-storage list has phone numbers identical with the suspicious phone numbers, if yes, marking the suspicious phone numbers as shielded phone numbers or tracked phone numbers according to list attributes, and if not, performing a third step; the third step of determining attributes of the suspicious phone numbers according to the phone number information, marking the suspicious phone numbers as the shield phone numbers or tracked phone numbers, and sending the suspicious phone numbers to corresponding lists to be stored; and a fourth step of when an incoming call comes, determining whether the phone number of the incoming call is the shielded phone number, if yes, shielding the phone number of the incoming call. In the method, the suspicious phone numbers are classified and selectively shielded according to the list and the phone number information, so that a user condition-based shielding function is realized, and misunderstanding rate of useless calls is lowered. The existing mobile terminal cannot automatically shield prank calls or calls that the user does not want to answer. The method solves the problem of the existing mobile terminal.

Description

A kind of intelligence incoming call screen method of mobile terminal and its device
Technical field
The present invention relates to mobile terminal technology, the intelligence incoming call screen method particularly to a kind of mobile terminal and its dress Put.
Background technology
With the popularization of mobile terminal, mobile terminal be increasingly becoming people life, work in important communication converter tools. Due to the leakage of telephone number, often it is connected to Stranger Calls or harassing call or fraudulent call or ad promotions; Thus people bring detrimental effect to life, work.
What existing intelligent mobile terminal had provide, and harassing call intercepts function, but majority can only be to clearly marking on the net The carrying out of note intercepts shielding, or directly displays it and be marked as harassing call during incoming call.For emerging harassing call, or It is not desired to the number connecing for individual subscriber reason, automatic shield cannot be realized.
Thus prior art could be improved and improves.
Content of the invention
A kind of in view of in place of above-mentioned the deficiencies in the prior art, it is an object of the invention to provide the intelligence incoming call of mobile terminal Screen method and its device, the phone that harassing call or user can not be not desired to answer to solve existing mobile terminal is carried out certainly The problem of dynamic shielding.
In order to achieve the above object, this invention takes technical scheme below:
A kind of intelligence incoming call screen method of mobile terminal, comprising:
Step a, every run-down incoming calls record sweep time, extract suspicious number and number information;
Step b, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step c;
Step c, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number, And send into corresponding list storage;
Judge when step d, incoming call whether caller ID is shielding number, be then to shield caller ID.
In the intelligence incoming call screen method of described mobile terminal,
In described step a, the suspicious number extracting and number information send and are stored to issue list;
In described step b, c, sequentially read each suspicious number from issue list and be marked;Every one suspicious number of labelling Then corresponding this suspicious number of deletion from issue list.
In the intelligence incoming call screen method of described mobile terminal, described step b specifically includes:
Step b1, search whether and suspicious number identical number to there is then holding current markers in the masked list prestoring, Read next suspicious number to continue to search in masked list;It is not carried out step b2;
Step b2, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring And number of times will be followed the tracks of add 1, read next suspicious number return to step b1;It is not carried out step c.
In the intelligence incoming call screen method of described mobile terminal, described step c specifically includes:
Step c1, judge whether suspicious number is to converse in short-term, if execution step c2, otherwise execution step c3;
Whether the number of times that step c2, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings;
Step c3, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters rower to suspicious number according to total Note;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
In the intelligence incoming call screen method of described mobile terminal, in described step c2, according to the corresponding mark of situation of answering Remember that the step of this suspicious number specifically includes:
If suspicious number by rejection or is not answered, it is labeled as shielding number, sends into masked list;
If suspicious number is not belonging to rejection or does not answer, it is labeled as following the tracks of number, sends into and follow the tracks of list.
In the intelligence incoming call screen method of described mobile terminal, in described step c3, according to total incoming call number and rejection The step that number of times is marked to suspicious number specifically includes: when total incoming call number≤the first preset times, rejection number of times >=the second During preset times, the suspicious number of labelling is shielding number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number, Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling For following the tracks of number, send into and follow the tracks of list.
Described mobile terminal intelligence incoming call screen method in, also include: secondary reminder time then, send shielding In list, all numbers confirm to user, and number correspondence markings are to shield number or by the number of refusing by the operation of choosing according to user Code.
A kind of device of the intelligence incoming call screen method realizing described mobile terminal, it includes setting module, storage mould Block, scan module, matching module, judge module and shroud module;
Setting module is used for setting sweep time, and memory module is used for storing the number of each list and its correspondence markings;
Scan module, every run-down incoming calls record sweep time, extracts suspicious number and number information;Matching module exists Search whether and suspicious number identical number have then according to this suspicious number of list attribute correspondence markings in the list prestoring For shielding number or tracking number, do not start judge module;Judge module according to number information by suspicious number mark be screen Cover number or follow the tracks of number, and send into corresponding list storage;In incoming call, shroud module judges whether caller ID is shielding Number, is then to shield caller ID.
In described device, the built-in issue list of described scan module, for storing the suspicious number extracting and number Information;
Described matching module and judge module are additionally operable to from issue list sequentially to read each suspicious number and are marked;Every labelling One suspicious number then corresponding this suspicious number of deletion from issue list.
In described device, described setting module is additionally operable to set secondary reminder time;
Described device also includes secondary-confirmation module, for secondary reminder time then, send masked list in all numbers Confirm to user, be shielding number by number correspondence markings or refused number according to the operation of choosing of user.
Compared to prior art, the intelligence incoming call screen method of the mobile terminal that the present invention provides and its device, every sweeping Retouch incoming calls record of time sweep, extract suspicious number and number information;The list prestoring has searched whether with can Doubtful number identical number, has and then for shielding number or follows the tracks of number according to this suspicious number of list attribute correspondence markings, do not have Then judge the attribute of suspicious number according to number information, by suspicious number mark be shielding number or follow the tracks of number, and send into right The list storage answered;Judge during incoming call whether caller ID is shielding number, be then to shield caller ID.According to list and number Information carries out classifying to suspicious number, selectively shields, it is achieved thereby that for the function of shielding of individual subscriber situation, reducing The misunderstanding rate of unwanted telephone call.Solve the phone that existing mobile terminal can not be not desired to answer to harassing call or user to carry out The problem of automatic shield.
Brief description
The intelligence incoming call screen method flow chart of the mobile terminal that Fig. 1 provides for the present invention.
The intelligence of the mobile terminal that Fig. 2 provides for the present invention carrys out the structured flowchart of the device of electric screen.
The intelligence of the mobile terminal that Fig. 3 provides for the present invention carrys out the interface schematic diagram of setting module in the device of electric screen.
Specific embodiment
The present invention provides a kind of intelligence incoming call screen method and its device of mobile terminal, is not affecting original general blocking Suspend the coaching on the basis of energy, according to the actual state receiving calls of user, telephone number is carried out classifying, selectively shields, from And achieve the function of shielding for individual subscriber situation, reduce the misunderstanding rate of unwanted telephone call.For making the purpose of the present invention, skill Art scheme and effect are clearer, clear and definite, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.Should manage Solution, specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The intelligence incoming call screen method of the mobile terminal providing please refer to Fig. 1, the present invention includes:
S100, every run-down incoming calls record sweep time, extract suspicious number and number information;
S200, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step s300;
S300, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number, and Send into corresponding list storage;
Judge when s400, incoming call whether caller ID is shielding number, be then to shield caller ID.
In the present embodiment, carry out correlation in advance in the terminal and arrange and store, sweep time is such as set.Scanning rule Can be diversified, such as timing scan, daily 6 points, 12 points, 18 points, 22 spot scans;Can also be periodic scanning, such as 6 points ~ 22 points Between every 4 hours run-downs, or sweep spacing elongate etc., do not scan during shutdown.The time of execution scanning is referred to as scanning every time Point, sweep limitss are last scan point to present scan point, and sweep object is all incoming calls records in sweep limitss.After start Reach and be scanned for an incoming calls record sweep time.As periodic scanning, during to 10 points, between 6 points to 10 points of scanning all come Electrographic recording, all incoming calls records during to 2 points, between 10 points to 2 points of scanning.
Sweep time arrives, and scanning incoming calls record simultaneously extracts suspicious number and number information to issue list storage.From this Incoming calls record in extract suspicious number and number information.Described suspicious number is call in short-term (when answering and conversing The long call less than or equal to 12s) or rejection or the number not answering any one or more situation in three kinds of situations.Described number Information includes the incoming call time of these suspicious numbers, and situation of answering (is answered and non-conversed in short-term, answers as call in short-term, rejection, not Answer, how long jingle bell is picked up), the information such as duration of call.Other numbers in incoming calls record directly abandon, and are not involved in follow-up Analyzing and processing.
Suspicious number is current embodiment require that carrying out the number of discriminatory analysis, and each suspicious number only has a kind of process to tie Really, or shielding, or following the tracks of, or being refused, it need to send and be stored to issue list.Issue list real-time reception and depositing Store up suspicious number, just execution step s200 to judge which kind of suspicious number need to carry out and process after all suspicious numbers have sent, It specifically includes:
Step 201, search whether and suspicious number identical number to have and then to keep current and mark in the masked list prestoring Note, reads next suspicious number and continues to search in masked list;It is not carried out step 202;
Step 202, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring And number of times will be followed the tracks of add 1, read next suspicious number return to step 201;It is not carried out step s300.
In the present embodiment, the list prestoring includes masked list, follows the tracks of list and refused list.Masked list is used for receiving With the shielding number of storage labelling, number therein directly shields.Sequentially read suspicious number one by one from issue list, first exist Search one by one in masked list, if there being identical number, represent this suspicious number marked for shielding, first is suspicious After number mark finishes, continue to judge next suspicious number whether in masked list.
If not having in masked list, search in following the tracks of list.Follow the tracks of list to be used for receiving and store the tracking of labelling Number, and labelling follows the tracks of number of times;Number therein belongs to shielding number undetermined, if finding and suspicious number in following the tracks of list Identical number, then followed the tracks of number of times and added 1;Then next suspicious number return to step 201 are read.When following the tracks of, number of times is big When equal to 3, this number is transferred to masked list and is deleted from following the tracks of list.If certain number is marked as following the tracks of number, Follow the tracks of number of times and be directly set to 1.Each suspicious number need to make a look up in masked list, tracking list.If in two lists All do not have, then need execution step s300 to determine whether the ownership of suspicious number.
There is call, rejection in short-term or do not answer three kinds of situations in suspicious number, judged to suspicious number according to these three situations Code is made respective markers and is sent into respective list: then described step s300 specifically includes:
Step 310, judge whether suspicious number is to converse in short-term, if execution step 320, otherwise execution step 330;
Whether the number of times that step 320, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings.
Wherein, the first preset times are 3 times.The number of times conversed in short-term is more, illustrates that user is not desired to answer it may be possible to other side Repeatedly dial, can directly shield.In short-term talk times less it may be possible to user is currently inconvenient to answer or other situations, also need Determined whether according to this suspicious call rejection or the situation of answering, then according to the step answering this suspicious number of situation correspondence markings Specifically include: if suspicious number by rejection or is not answered, be labeled as shielding number, send into masked list;If suspicious number is not Belong to rejection or any situation do not answered, be then labeled as following the tracks of number, send into and follow the tracks of list.It is admitted to tracking for the first time The tracking number of times of the tracking number of list is directly set to 1.
Step 330, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters to suspicious number according to total Line flag;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
If do not exist conversing in short-term, but there is the situation of rejection, then read total number of sending a telegram here, rejection number and do not answer number.Root The step suspicious number being marked according to total incoming call number and rejection number of times is specific as follows:
When total incoming call number≤the first preset times, during rejection number of times >=the second preset times (2 times), the suspicious number of labelling is shielding Number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number, Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling For following the tracks of number, send into and follow the tracks of list.
Do not exist and converse in short-term, also there is not rejection, that is, only exist situation about not answering.Do not answer possibly user to leave behind Mobile phone, or do not hear incoming ring tone/vibration, or answer the fact that the reasons such as inconvenience cause situation, can not directly be asserted as User is really not desired to answer, therefore such suspicious number can not be directly labeled as shielding number, can only be to follow the tracks of number, send into and follow the tracks of List.
It is to be appreciated that after a suspicious number is labeled, you can delete this suspicious number from issue list, read Next suspicious number execution step s200 ~ s300, until it is labeled.By that analogy, after all suspicious numbers are all labeled Issue list empties, and present scan terminates, obtain during scanning next time new can be with number.
After above-mentioned process, can search whether in masked list during incoming call and the shielding number of caller ID identical Code, has then shielding caller ID, not then according to normal incoming call handling.
In the specific implementation, user directly can also add the number wanting to shield manually, then as soon as this number is sent a telegram here, Can directly be shielded.Secondary reminder time is set in advance in the terminal, and set-up mode can be identical with sweep time.Then described Intelligence incoming call screen method also include step s500, secondary reminder time then, send masked list in all numbers to Family confirms, is shielding number by number correspondence markings or is refused number according to the operation of choosing of user.This step specifically includes:
Step 510, when set secondary reminder time then, collection masked list in all numbers and issue user carry out secondary Confirm;
User chooses the number wanting to shield as needed, is not desired to directly not hooking of shielding.
Step 520, by the number mark being checked be shielding number and deliver to masked list storage;By be not checked number Code labeling is to be refused number delivering to be refused list storage.
If step 530 is refused, and this is refused number in list, number of times will be refused and be added 1;If being refused should not in list Refused number, then will be refused number of times and put 1.So far, secondary-confirmation one wheel of shielding number completes.
Wherein, refused list for receive and store the number (being refused number) being shielded by user's refusal, and labelling quilt Refuse number of times.If this number exists being refused list, refused number of times and added 1;If otherwise occur for the first time, refused number of times and directly put 1.When being refused number of times >=3, recover this number be right number and from refused list delete.
When next secondary reminder time then, repeat step 410 ~ 430, by that analogy, thus successively execution second wheel Shielding remind, third time shielding remind ..., n-th shielding remind.
Intelligence incoming call screen method based on above-mentioned mobile terminal, the embodiment of the present invention also provides a kind of intelligence to carry out electric screen The device covering, refers to Fig. 2, described device includes setting module 10, memory module 20, scan module 30, matching module 40, sentence Disconnected module 50 and shroud module 60;
Described setting module 10 is used for setting sweep time, gap periods etc..Memory module 20 is used for storing each list and its right Answer the number of labelling, corresponding number of times is added 1 or puts 1.List includes masked list, follows the tracks of list and refused list.Suspicious number Any instant exists only in one of three lists it is impossible to simultaneously appear in two or more lists.
Scan module 30, every run-down incoming calls record sweep time, extracts suspicious number and number information.This reality Apply in example, the built-in issue list of described scan module 30, for storing the suspicious number extracting and number information, other numbers Directly abandon.
Described matching module 40 and judge module 50 sequentially read each suspicious number from issue list and are marked;Often mark One suspicious number of note is then corresponding from issue list to delete this suspicious number.
Matching module 40 reads suspicious number, has searched whether and suspicious number identical number in the list prestoring, Have and then number for shielding number or is followed the tracks of according to this suspicious number of list attribute correspondence markings.All do not find this in two lists Number, then start judge module.Specifically as shown in above-mentioned steps 201 ~ 202.
Judge module 50 receives the suspicious number that matching module 40 is sent, will be suspicious according to the number information in issue list Number mark is shielding number or follows the tracks of number, and sends into corresponding list storage.Specifically as shown in above-mentioned steps 310 ~ 330.
Shroud module 60 judges in incoming call whether caller ID is shielding number, is then to shield caller ID.
Described setting module 10 is additionally operable to set secondary reminder time.Described device also includes secondary-confirmation module 70, uses In secondary reminder time then, send masked list in all numbers to user confirm, according to user choose operation will number Code correspondence markings are shielding number or are refused number.Specifically as shown in above-mentioned steps 510 ~ 530.
In further embodiment, user also directly can add the number wanting to shield by setting module 10 manually, then should Number is directly labeled as shielding number and sending to masked list storage.This number one is sent a telegram here, and will directly be shielded.Set The interface of module 10 is as shown in Figure 3.
In sum, the present invention carries out key words sorting according to three lists and number information to suspicious number, except energy certainly Outside the dregs of society number that dynamic shielding is generally acknowledged, answer whether situation automatic decision shields according to user is actual, and provide secondary really Recognize, both achieved the automated intelligent function of shielding for individual subscriber situation, turn avoid certain erroneous judgement, reduced no electricity consumption The misunderstanding rate of words.
The division of above-mentioned functions module only in order to illustrate, in actual applications, can be as needed by above-mentioned functions Distribution to be completed by different functional modules, that is, be divided into different functional modules, to complete all or part of foregoing description Function.
One of ordinary skill in the art will appreciate that all or part of flow process in above-described embodiment method, can be by Computer (mobile terminal) program completes come the hardware to instruct correlation, and described computer (mobile terminal) program can be stored in one In computer (mobile terminal) read/write memory medium, program is upon execution, it may include the flow process of the embodiment of above-mentioned each method. Storage medium therein can be magnetic disc, CD etc..
It is understood that for those of ordinary skills, with technology according to the present invention scheme and its can send out Bright design in addition equivalent or change, and all these change or replace the guarantor that all should belong to appended claims of the invention Shield scope.

Claims (10)

1. a kind of intelligence incoming call screen method of mobile terminal is it is characterised in that include:
Step a, every run-down incoming calls record sweep time, extract suspicious number and number information;
Step b, search whether and suspicious number identical number to have then according to the corresponding mark of list attribute in the list prestoring Remember that this suspicious number is shielding number or follows the tracks of number, be not carried out step c;
Step c, judge the attribute of suspicious number according to number information, suspicious number mark is shielding number or follows the tracks of number, And send into corresponding list storage;
Judge when step d, incoming call whether caller ID is shielding number, be then to shield caller ID.
2. mobile terminal according to claim 1 intelligence incoming call screen method it is characterised in that
In described step a, the suspicious number extracting and number information send and are stored to issue list;
In described step b, c, sequentially read each suspicious number from issue list and be marked;Every one suspicious number of labelling Then corresponding this suspicious number of deletion from issue list.
3. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that described step b is concrete Including:
Step b1, search whether and suspicious number identical number to there is then holding current markers in the masked list prestoring, Read next suspicious number to continue to search in masked list;It is not carried out step b2;
Step b2, search whether and suspicious number identical number to there is then holding current markers in the tracking list prestoring And number of times will be followed the tracks of add 1, read next suspicious number return to step b1;It is not carried out step c.
4. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that described step c is concrete Including:
Step c1, judge whether suspicious number is to converse in short-term, if execution step c2, otherwise execution step c3;
Whether the number of times that step c2, judgement are conversed in short-term is more than or equal to the first preset times, is that then this suspicious number of labelling is screen Cover number, send into masked list;Otherwise, according to answering this suspicious number of situation correspondence markings;
Step c3, judge that suspicious number, whether by rejection, is, send a telegram here number and rejection number of times enters rower to suspicious number according to total Note;Otherwise, it is labeled as following the tracks of number, send into and follow the tracks of list.
5. the intelligence incoming call screen method of mobile terminal according to claim 4 is it is characterised in that in described step c2 In, the step according to answering this suspicious number of situation correspondence markings specifically includes:
If suspicious number by rejection or is not answered, it is labeled as shielding number, sends into masked list;
If suspicious number is not belonging to rejection or does not answer, it is labeled as following the tracks of number, sends into and follow the tracks of list.
6. the intelligence incoming call screen method of mobile terminal according to claim 4 is it is characterised in that in described step c3 In, specifically included according to the step that total incoming call number and rejection number of times are marked to suspicious number: when total incoming call number≤the first is pre- If number of times, during rejection number of times >=the second preset times, the suspicious number of labelling is shielding number, sends into masked list;
Count when always≤the first preset times, during rejection number of times < the second preset times, the suspicious number of labelling is to follow the tracks of number, Send into and follow the tracks of list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times >=the first preset times, the suspicious number of labelling For shielding number, send into masked list;
When total incoming call number > first preset times, during rejection number of times+do not answer number of times < the first preset times, the suspicious number of labelling For following the tracks of number, send into and follow the tracks of list.
7. the intelligence incoming call screen method of mobile terminal according to claim 1 is it is characterised in that also include: secondary Reminder time then, sends all numbers in masked list and confirms to user, is marked corresponding for number according to the operation of choosing of user It is designated as shielding number or refused number.
8. a kind of device of the intelligence incoming call screen method of mobile terminal realized described in claim 1 is it is characterised in that include Setting module, memory module, scan module, matching module, judge module and shroud module;
Setting module is used for setting sweep time, and memory module is used for storing the number of each list and its correspondence markings;
Scan module, every run-down incoming calls record sweep time, extracts suspicious number and number information;Matching module exists Search whether and suspicious number identical number have then according to this suspicious number of list attribute correspondence markings in the list prestoring For shielding number or tracking number, do not start judge module;Judge module according to number information by suspicious number mark be screen Cover number or follow the tracks of number, and send into corresponding list storage;In incoming call, shroud module judges whether caller ID is shielding Number, is then to shield caller ID.
9. device according to claim 8, it is characterised in that the built-in issue list of described scan module, carries for storage The suspicious number taking out and number information;
Described matching module and judge module are additionally operable to from issue list sequentially to read each suspicious number and are marked;Every labelling One suspicious number then corresponding this suspicious number of deletion from issue list.
10. device according to claim 8 is it is characterised in that described setting module is additionally operable to set secondary reminder time;
Described device also includes secondary-confirmation module, for secondary reminder time then, send masked list in all numbers Confirm to user, be shielding number by number correspondence markings or refused number according to the operation of choosing of user.
CN201610820165.2A 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal Active CN106375583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610820165.2A CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610820165.2A CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Publications (2)

Publication Number Publication Date
CN106375583A true CN106375583A (en) 2017-02-01
CN106375583B CN106375583B (en) 2020-11-13

Family

ID=57896894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610820165.2A Active CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Country Status (1)

Country Link
CN (1) CN106375583B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599794A (en) * 2018-04-23 2018-09-28 Oppo广东移动通信有限公司 Harassing and wrecking intercept control method and Related product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
US20110283349A1 (en) * 2009-03-12 2011-11-17 Zte Corporation Implement method and device of terminal call firewall
CN104702765A (en) * 2013-12-06 2015-06-10 无锡韩光电器有限公司 Crank call shielding method and crank call shielding system
CN105100366A (en) * 2015-07-13 2015-11-25 小米科技有限责任公司 Method, device and system for confirming harassment telephone number
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN105721248A (en) * 2016-02-26 2016-06-29 上海卓易科技股份有限公司 Call monitoring method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110283349A1 (en) * 2009-03-12 2011-11-17 Zte Corporation Implement method and device of terminal call firewall
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
CN104702765A (en) * 2013-12-06 2015-06-10 无锡韩光电器有限公司 Crank call shielding method and crank call shielding system
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN105100366A (en) * 2015-07-13 2015-11-25 小米科技有限责任公司 Method, device and system for confirming harassment telephone number
CN105721248A (en) * 2016-02-26 2016-06-29 上海卓易科技股份有限公司 Call monitoring method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599794A (en) * 2018-04-23 2018-09-28 Oppo广东移动通信有限公司 Harassing and wrecking intercept control method and Related product

Also Published As

Publication number Publication date
CN106375583B (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN103037062A (en) Method and terminal and server used for intercepting crank calls
US7983398B2 (en) Emergency contact system
CN104092810A (en) Disturbance control method and device and mobile terminal
CN102055826A (en) Method and system for maintaining multi-dimensional related information related to contacts in address list
CN106789550A (en) Information processing method and device
CN101984642B (en) Method for automatically deleting short messages and device thereof
CN107920154A (en) The processing method and terminal of Stranger Calls
CN101674557B (en) Method and device for detecting whether missed calls are valid or not
CN107302757A (en) The method of calling and device of emergency numbers
CN100340131C (en) Method for determining and reminding the location for cell-phone user
CN105812536A (en) Incoming call management method and mobile terminal
CN102148887A (en) Method for displaying region and weather of cellphone incoming call contacter
CN102572074A (en) Method for automatically selecting matched card for multi-card mobile phone and implementation device thereof
CN104506704A (en) Fax machine and/or fixed telephone with disturbance intercepting function
CN101389085A (en) Rubbish short message recognition system and method based on sending behavior
CN101351000A (en) Method for showing information and communication terminal
CN107404580A (en) A kind of method, storage medium and equipment for intercepting harassing call number and short message
CN100450300C (en) Method for tracing dialed-line condition
CN106375583A (en) Smart incoming call shielding method and apparatus of mobile terminal
CN103873698B (en) Terminal association device and terminal association method
CN101873553B (en) Expansion method of short message service calling number information
CN104780251A (en) Telephone dialing automatic conversion device and telephone dialing automatic conversion method
CN103259910B (en) terminal and missed call management method
CN101730108B (en) System and method for detecting lost position of communication device
CN1084688A (en) Telecommunication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230414

Address after: Room 501, 85 Xiaguang Dongli, Haicang District, Xiamen City, Fujian Province, 361000

Patentee after: Xiamen reliable intellectual property service Co.,Ltd.

Address before: 516006 Zhongkai hi tech Zone, Huizhou, Guangdong, 86 Chang seven Road West

Patentee before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.

TR01 Transfer of patent right