CN106375583B - Intelligent incoming call shielding method and device of mobile terminal - Google Patents

Intelligent incoming call shielding method and device of mobile terminal Download PDF

Info

Publication number
CN106375583B
CN106375583B CN201610820165.2A CN201610820165A CN106375583B CN 106375583 B CN106375583 B CN 106375583B CN 201610820165 A CN201610820165 A CN 201610820165A CN 106375583 B CN106375583 B CN 106375583B
Authority
CN
China
Prior art keywords
shielding
suspicious
list
numbers
incoming call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610820165.2A
Other languages
Chinese (zh)
Other versions
CN106375583A (en
Inventor
陈健强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Reliable Intellectual Property Service Co ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201610820165.2A priority Critical patent/CN106375583B/en
Publication of CN106375583A publication Critical patent/CN106375583A/en
Application granted granted Critical
Publication of CN106375583B publication Critical patent/CN106375583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Library & Information Science (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an intelligent incoming call shielding method and device of a mobile terminal, wherein the intelligent incoming call shielding method comprises the following steps: A. scanning the incoming call record once every scanning time, and extracting suspicious numbers and number information; B. c, searching whether a number identical to the suspicious number exists in a pre-stored list, if so, marking the suspicious number as a shielding number or a tracking number according to the list attribute correspondingly, and not executing the step C; C. judging the attribute of the suspicious number according to the number information, marking the suspicious number as a shielding number or a tracking number, and sending the suspicious number into a corresponding list for storage; D. and judging whether the incoming call number is a shielding number or not when the call comes, and shielding the incoming call number if the incoming call number is the shielding number. The invention classifies and selectively shields the suspicious numbers according to the list and the number information, realizes the shielding function aiming at the personal condition of the user and reduces the misunderstanding rate of useless calls; the problem that the existing mobile terminal cannot automatically shield the harassing calls or the calls which the user does not want to answer is solved.

Description

Intelligent incoming call shielding method and device of mobile terminal
Technical Field
The invention relates to a mobile terminal technology, in particular to an intelligent incoming call shielding method and device of a mobile terminal.
Background
With the popularization of mobile terminals, mobile terminals are becoming important communication and entertainment tools in life and work of people. Due to the leakage of the telephone number, strange calls, or harassing calls, or fraudulent calls, or advertising promotions can be frequently received; thereby bringing adverse effects to life and work.
The existing intelligent mobile terminal provides a function of intercepting crank calls, but most of the existing intelligent mobile terminals can only intercept and shield clearly marked crank calls on the network or directly display the crank calls marked as crank calls when the calls come. Automatic screening cannot be realized for newly appeared crank calls or numbers which are not wanted for personal reasons of users.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
In view of the above disadvantages of the prior art, an object of the present invention is to provide an intelligent incoming call shielding method and apparatus for a mobile terminal, so as to solve the problem that the existing mobile terminal cannot automatically shield a harassing call or a call that a user does not want to answer.
In order to achieve the purpose, the invention adopts the following technical scheme:
an intelligent incoming call shielding method of a mobile terminal comprises the following steps:
step A, scanning incoming call records once every scanning time, and extracting suspicious numbers and number information;
b, searching whether a number identical to the suspicious number exists in a pre-stored list, if so, marking the suspicious number as a shielding number or a tracking number according to the list attribute correspondingly, and not executing the step C;
step C, judging the attribute of the suspicious number according to the number information, marking the suspicious number as a shielding number or a tracking number, and sending the suspicious number into a corresponding list for storage;
and D, judging whether the incoming call number is a shielding number or not in the incoming call, and shielding the incoming call number if the incoming call number is the shielding number.
In the intelligent incoming call shielding method of the mobile terminal,
in the step A, the extracted suspicious number and number information are sent to a problem list for storage;
in step B, C, reading each suspicious number from the question list in sequence for marking; and correspondingly deleting the suspicious number from the question list every time the suspicious number is marked.
In the intelligent incoming call shielding method for a mobile terminal, the step B specifically includes:
step B1, searching whether a number same as the suspicious number exists in a pre-stored shielding list, if so, keeping the current mark, reading the next suspicious number and continuously searching in the shielding list; step B2 is not performed;
step B2, searching whether a number same as the suspicious number exists in a prestored tracking list, if so, keeping the current mark, adding 1 to the tracking frequency, reading the next suspicious number and returning to the step B1; step C is not performed.
In the intelligent incoming call shielding method for a mobile terminal, the step C specifically includes:
step C1, judging whether the suspicious number is a short-time call, if so, executing step C2, otherwise, executing step C3;
step C2, judging whether the number of times of the short-time call is more than or equal to a first preset number, if so, marking the suspicious number as a shielding number, and sending the shielding number into a shielding list; otherwise, the suspicious number is correspondingly marked according to the answering condition;
step C3, judging whether the suspicious number is refused, if yes, marking the suspicious number according to the total incoming call number and the refusing times; otherwise, the number is marked as the tracking number and sent into a tracking list.
In the intelligent incoming call shielding method of the mobile terminal, in the step C2, the step of correspondingly marking the suspicious number according to the answering situation specifically includes:
if the suspicious number is rejected or not answered, marking the suspicious number as a shielding number and sending the suspicious number into a shielding list;
if the suspicious number does not belong to the refused or not answered, the suspicious number is marked as a tracking number and sent into a tracking list.
In the intelligent incoming call shielding method of the mobile terminal, in the step C3, the step of marking the suspicious number according to the total incoming call number and the reject number specifically includes: when the total number of calls is less than or equal to a first preset number of times and the number of times of refusing is greater than or equal to a second preset number of times, marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
when the total number of the incoming points is less than or equal to a first preset number and the reject number is less than a second preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list;
when the total number of calls is larger than a first preset number, and the number of refuses and the number of missed calls are larger than or equal to the first preset number, marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
and when the total number of calls is larger than a first preset number, and the number of refuses plus the number of missed calls is smaller than the first preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list.
The intelligent incoming call shielding method of the mobile terminal further comprises the following steps: and when the secondary reminding time is up, sending all the numbers in the shielding list to a user for confirmation, and correspondingly marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user.
A device for realizing the intelligent incoming call shielding method of the mobile terminal comprises a setting module, a storage module, a scanning module, a matching module, a judging module and a shielding module;
the setting module is used for setting scanning time, and the storage module is used for storing each list and the number of the corresponding mark;
the scanning module scans the incoming call records once every scanning time to extract suspicious numbers and number information; the matching module searches whether a number same as the suspicious number exists in a prestored list, if so, the suspicious number is marked as a shielding number or a tracking number according to the list attribute, and a judging module is not started; the judging module marks the suspicious number as a shielding number or a tracking number according to the number information and sends the suspicious number into a corresponding list for storage; the shielding module judges whether the incoming call number is a shielding number when the incoming call is received, and if so, the incoming call number is shielded.
In the device, the scanning module is internally provided with a problem list and is used for storing the extracted suspicious numbers and number information;
the matching module and the judging module are also used for reading each suspicious number from the problem list in sequence for marking; and correspondingly deleting the suspicious number from the question list every time the suspicious number is marked.
In the device, the setting module is also used for setting secondary reminding time;
the device also comprises a secondary confirmation module which is used for sending all the numbers in the shielding list to a user for confirmation when the secondary reminding time is up, and correspondingly marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user.
Compared with the prior art, the intelligent incoming call shielding method and the intelligent incoming call shielding device for the mobile terminal provided by the invention have the advantages that incoming call records are scanned once every scanning time, and suspicious numbers and number information are extracted; searching whether a number same as the suspicious number exists in a prestored list, if so, correspondingly marking the suspicious number as a shielding number or a tracking number according to the list attribute, and if not, judging the attribute of the suspicious number according to the number information, marking the suspicious number as the shielding number or the tracking number, and sending the suspicious number into the corresponding list for storage; and judging whether the incoming call number is a shielding number or not when the call comes, and shielding the incoming call number if the incoming call number is the shielding number. The suspicious numbers are classified and selectively shielded according to the list and the number information, so that the shielding function aiming at the personal condition of the user is realized, and the misunderstanding rate of useless calls is reduced. The problem that the existing mobile terminal cannot automatically shield the harassing calls or the calls which the user does not want to answer is solved.
Drawings
Fig. 1 is a flowchart of an intelligent incoming call shielding method for a mobile terminal according to the present invention.
Fig. 2 is a block diagram of an intelligent incoming call shielding apparatus of a mobile terminal according to the present invention.
Fig. 3 is a schematic interface diagram of a setting module in the intelligent call screening apparatus of the mobile terminal according to the present invention.
Detailed Description
The invention provides an intelligent incoming call shielding method and device of a mobile terminal, which classify and selectively shield telephone numbers according to the actual call answering state of a user on the basis of not influencing the original general intercepting function, thereby realizing the shielding function aiming at the personal condition of the user and reducing the misunderstanding rate of useless calls. In order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, the intelligent incoming call shielding method of the mobile terminal provided by the present invention includes:
s100, scanning the incoming call record once every scanning time, and extracting suspicious numbers and number information;
s200, searching whether a number identical to the suspicious number exists in a pre-stored list, if so, marking the suspicious number as a shielding number or a tracking number according to the list attribute correspondingly, and not executing the step S300;
s300, judging the attribute of the suspicious number according to the number information, marking the suspicious number as a shielding number or a tracking number, and sending the suspicious number into a corresponding list for storage;
s400, judging whether the incoming call number is a shielding number or not in the incoming call, and shielding the incoming call number if the incoming call number is the shielding number.
In this embodiment, relevant settings, such as setting a scanning time, are performed in the mobile terminal in advance and stored. The scanning rules can be diversified, such as timing scanning, 6-point, 12-point, 18-point and 22-point scanning every day; the scanning may be performed periodically, for example, every 4 hours between 6 to 22 points, or the scanning interval is extended, and the scanning is not performed when the device is turned off. The time for executing scanning each time is called a scanning point, the scanning range is from the last scanning point to the current scanning point, and the scanning objects are all incoming call records in the scanning range. When the time reaches the scanning time after the start-up, the incoming call record is scanned once. For example, in the regular scanning, when the point 10 is reached, all incoming records between the point 6 and the point 10 are scanned, and when the point 2 is reached, all incoming records between the point 10 and the point 2 are scanned.
When the scanning time is up, the incoming call record is scanned, and the suspicious number and the number information are extracted and stored in a problem list. And extracting the suspicious number and the number information from the current incoming record. The suspicious number is the number in any one or more of the three conditions of short-time call (call receiving with the call duration less than or equal to 12S), refusal of call, or non-call. The number information includes the incoming call time of the suspicious numbers, the answering condition (answering is not short-time call, answering is short-time call, refusing, not answering, ringing for a long time, etc.), the call duration, etc. Other numbers in the incoming call record are directly discarded without participating in subsequent analysis processing.
The suspicious numbers are numbers that need to be judged and analyzed in this embodiment, each suspicious number has only one processing result, and the suspicious number is either shielded or tracked or rejected and needs to be sent to a problem list for storage. The problem list receives and stores the suspicious numbers in real time, and after all the suspicious numbers are sent, step S200 is executed to determine which kind of processing the suspicious numbers need to be performed, which specifically includes:
step 201, searching whether a number identical to a suspicious number exists in a pre-stored shielding list, if so, keeping a current mark, reading the next suspicious number and continuously searching in the shielding list; step 202 is not performed;
step 202, searching whether a number identical to the suspicious number exists in a prestored tracking list, if so, keeping the current mark, adding 1 to the tracking frequency, reading the next suspicious number and returning to step 201; step S300 is not performed.
In this embodiment, the pre-stored list includes a mask list, a tracking list, and a rejected list. The mask list is used to receive and store marked mask numbers, where the numbers are directly masked. And reading suspicious numbers one by one from the problem list, searching one by one in the shielding list, if the same numbers exist, indicating that the suspicious numbers are marked as shielding, and after the first suspicious number is marked, continuously judging whether the next suspicious number is in the shielding list.
If not, looking up in the tracking list. The tracking list is used for receiving and storing the marked tracking number and marking the tracking times; if the number is the same as the suspicious number in the tracking list, adding 1 to the tracking times; the next suspect number is then read and returns to step 201. When the number of tracking times is 3 or more, the number is transferred to the mask list and deleted from the tracking list. If a certain number is marked as a tracking number, the tracking times are directly set to 1. Each suspicious number needs to be searched in a shielding list and a tracking list. If neither list is found, step S300 is executed to further determine the attribution of the suspicious number.
The suspicious number has three conditions of short-time call, refusal or non-answering, and the suspicious number is judged to be correspondingly marked and sent into a corresponding list according to the three conditions: the step S300 specifically includes:
step 310, determining whether the suspicious number is a short-time call, if so, executing step 320, otherwise, executing step 330;
step 320, judging whether the number of times of the short-time call is greater than or equal to a first preset number, if so, marking the suspicious number as a shielding number, and sending the shielding number into a shielding list; otherwise, the suspicious number is marked correspondingly according to the answering condition.
Wherein the first preset number of times is 3. The number of the short-time calls is more, which indicates that the user does not want to answer, possibly the opposite party dials for many times, and the short-time calls can be directly shielded. The number of short-time calls is small, which may be that the user is not convenient to answer or other situations, and further judgment is needed according to the refusal of answering or answering situation of the suspicious phone, and the step of marking the suspicious number according to the answering situation specifically includes: if the suspicious number is rejected or not answered, marking the suspicious number as a shielding number and sending the suspicious number into a shielding list; if the suspicious number does not belong to either the refusal or the non-answering situation, the suspicious number is marked as a tracking number and sent into a tracking list. The number of times the tracking number is first entered into the tracking list is set directly to 1.
Step 330, judging whether the suspicious number is rejected, if yes, marking the suspicious number according to the total incoming call number and the rejection times; otherwise, the number is marked as the tracking number and sent into a tracking list.
If the short-time call does not exist but the refusal condition exists, reading the total incoming call number, the refusal number and the unanswered number. The steps of marking the suspicious number according to the total incoming call number and the rejection number are as follows:
when the total number of calls is less than or equal to a first preset number of times and the number of times of refusing is greater than or equal to a second preset number of times (2 times), marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
when the total number of the incoming points is less than or equal to a first preset number and the reject number is less than a second preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list;
when the total number of calls is larger than a first preset number, and the number of refuses and the number of missed calls are larger than or equal to the first preset number, marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
and when the total number of calls is larger than a first preset number, and the number of refuses plus the number of missed calls is smaller than the first preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list.
Short-time conversation does not exist, and refusing does not exist, namely, only the situation of not answering exists. The fact that the user forgets the mobile phone, or does not hear the ring tone/vibration of the incoming call, or the answering is inconvenient, and the like, the user cannot directly declare that the user really does not want to answer, so that the suspicious number cannot be directly marked as a shielding number, and only can be a tracking number and sent into a tracking list.
It should be understood that after a suspicious number is marked, the suspicious number can be deleted from the question list, and the next suspicious number is read to perform steps S200 to S300 until it is marked. And by analogy, the problem list is emptied after all suspicious numbers are marked, the scanning is finished, and a new number is acquired in the next scanning.
After the processing, whether the shielding number identical to the incoming call number exists or not can be searched in the shielding list during the incoming call, if yes, the incoming call number is shielded, and if not, the normal incoming call is processed.
In the implementation, the user can directly and manually add the number to be shielded, and the number can be directly shielded as soon as the number comes. Setting secondary reminding time in the mobile terminal in advance, wherein the setting mode can be the same as the scanning time. The intelligent incoming call shielding method further includes step S500, when the secondary reminding time is up, sending all numbers in the shielding list to the user for confirmation, and marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user. The method specifically comprises the following steps:
step 510, when the set secondary reminding time is up, collecting all numbers in the shielding list and sending the numbers to a user for secondary confirmation;
and the user can check the number to be shielded according to the requirement, and the number which is not to be shielded is not checked directly.
Step 520, marking the checked number as a shielding number and sending the shielding number to a shielding list for storage; and marking the numbers which are not checked as rejected numbers and sending the rejected numbers to a rejected list for storage.
Step 530, if the rejected number exists in the rejected list, adding 1 to the rejected number; if the rejected number does not exist in the rejected list, the number of times of rejection is set to 1. At this point, the secondary confirmation of the mask number is completed in one round.
The rejected list is used for receiving and storing the numbers rejected by the user (i.e. rejected numbers) and marking the rejected times. If the number exists in the rejected list, the number of times of rejection is added by 1; otherwise, if the first time appears, the rejected times are directly set to 1. When the rejected times are more than or equal to 3, the number is recovered to be a normal number and deleted from the rejected list.
When the next secondary reminding time is up, the steps 410-430 are repeated, and so on, so that the second round of shielding reminding, the third shielding reminding, … … and the nth shielding reminding are sequentially executed.
Based on the above intelligent incoming call shielding method of the mobile terminal, an embodiment of the present invention further provides an intelligent incoming call shielding apparatus, please refer to fig. 2, where the apparatus includes a setting module 10, a storage module 20, a scanning module 30, a matching module 40, a determining module 50, and a shielding module 60;
the setting module 10 is used for setting scanning time, interval period, etc. The storage module 20 is configured to store each list and the number of the corresponding mark thereof, and add 1 to or set 1 to the corresponding number of times. The list includes a mask list, a tracking list, and a rejected list. The suspect number may only exist on one of the three lists at any one time and may not appear on two or more lists at the same time.
The scanning module 30 scans the incoming record once every scanning time to extract the suspicious number and the number information. In this embodiment, the scanning module 30 is provided with a problem list for storing the extracted suspicious numbers and number information, and other numbers are directly discarded.
The matching module 40 and the judging module 50 read each suspicious number from the problem list in sequence for marking; and correspondingly deleting the suspicious number from the question list every time the suspicious number is marked.
The matching module 40 reads the suspicious number, searches whether a number identical to the suspicious number exists in a pre-stored list, and if so, correspondingly marks the suspicious number as a shielding number or a tracking number according to the list attribute. If the number is not found in both lists, the judging module is started. Specifically, the steps 201 to 202 are described above.
The determining module 50 receives the suspicious number sent by the matching module 40, marks the suspicious number as a shielding number or a tracking number according to the number information in the problem list, and sends the suspicious number into a corresponding list for storage. Specifically, the steps 310 to 330 are described above.
The shielding module 60 determines whether the incoming call number is a shielding number when the incoming call is received, and shields the incoming call number if the incoming call number is the shielding number.
The setting module 10 is further configured to set a secondary reminding time. The device further comprises a secondary confirmation module 70, which is used for sending all numbers in the shielding list to a user for confirmation when the secondary reminding time is up, and correspondingly marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user. Specifically, the steps 510 to 530 are described above.
In a further embodiment, the user may also directly and manually add the number to be masked through the setting module 10, and the number is directly marked as a masked number and sent to the masked list for storage. The number is directly shielded upon incoming calls. The interface to the setup module 10 is shown in fig. 3.
In conclusion, the invention classifies and marks suspicious numbers according to the three lists and the number information, can automatically shield the acknowledged social rubbish numbers, automatically judges whether to shield according to the actual answering condition of the user, and provides secondary confirmation, thereby not only realizing the automatic intelligent shielding function aiming at the personal condition of the user, but also avoiding certain misjudgment and reducing the misjudgment rate of useless calls.
The division of the functional modules is only used for illustration, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the functions may be divided into different functional modules to complete all or part of the functions described above.
It will be understood by those skilled in the art that all or part of the processes in the methods of the embodiments described above may be implemented by using a computer (mobile terminal) program to instruct related hardware, where the computer (mobile terminal) program may be stored in a computer (mobile terminal) -readable storage medium, and when the computer (mobile terminal) program is executed, the processes may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, etc.
It should be understood that equivalents and modifications of the technical solution and inventive concept thereof may occur to those skilled in the art, and all such modifications and alterations should fall within the scope of the appended claims.

Claims (9)

1. An intelligent incoming call shielding method of a mobile terminal is characterized by comprising the following steps:
step A, scanning incoming call records once every scanning time, and extracting suspicious numbers and number information;
b, searching whether a number identical to the suspicious number exists in a pre-stored list, if so, marking the suspicious number as a shielding number or a tracking number according to the list attribute correspondingly, and not executing the step C;
step C, judging the attribute of the suspicious number according to the number information, marking the suspicious number as a shielding number or a tracking number, and sending the suspicious number into a corresponding list for storage;
d, judging whether the incoming call number is a shielding number or not in the incoming call, and shielding the incoming call number if the incoming call number is the shielding number;
in the step A, the extracted suspicious number and number information are sent to a problem list for storage;
in step B, C, reading each suspicious number from the question list in sequence for marking; correspondingly deleting the suspicious number from the problem list every time one suspicious number is marked, emptying the problem list after all the suspicious numbers are marked, and finishing the scanning; when the set secondary reminding time is up, collecting all numbers in the shielding list and sending the numbers to a user for secondary confirmation, marking the checked numbers as shielding numbers and sending the shielding numbers to the shielding list for storage, marking the numbers which are not checked as rejected numbers and sending the rejected numbers to a rejected list for storage, marking the rejected times, and when the rejected times are more than or equal to a first preset time, recovering the numbers as normal numbers and deleting the numbers from the rejected list; the rejected list is used for receiving and storing the numbers rejected by the user for shielding, and when the next secondary reminding time is up, the next shielding reminding is executed.
2. The intelligent incoming call shielding method of the mobile terminal according to claim 1, wherein the step B specifically comprises:
step B1, searching whether a number same as the suspicious number exists in a pre-stored shielding list, if so, keeping the current mark, reading the next suspicious number and continuously searching in the shielding list; step B2 is not performed;
step B2, searching whether a number same as the suspicious number exists in a prestored tracking list, if so, keeping the current mark, adding 1 to the tracking frequency, reading the next suspicious number and returning to the step B1; step C is not performed.
3. The intelligent incoming call shielding method of the mobile terminal according to claim 1, wherein the step C specifically comprises:
step C1, judging whether the suspicious number is a short-time call, if so, executing step C2, otherwise, executing step C3;
step C2, judging whether the number of times of the short-time call is more than or equal to a first preset number, if so, marking the suspicious number as a shielding number, and sending the shielding number into a shielding list; otherwise, the suspicious number is correspondingly marked according to the answering condition;
step C3, judging whether the suspicious number is refused, if yes, marking the suspicious number according to the total incoming call number and the refusing times; otherwise, the number is marked as the tracking number and sent into a tracking list.
4. The intelligent call shielding method of claim 3, wherein in the step C2, the step of correspondingly marking the suspicious number according to the answering situation specifically comprises:
if the suspicious number is rejected or not answered, marking the suspicious number as a shielding number and sending the suspicious number into a shielding list;
if the suspicious number does not belong to the refused or not answered, the suspicious number is marked as a tracking number and sent into a tracking list.
5. The intelligent call shielding method of claim 3, wherein in the step C3, the step of marking the suspicious number according to the total number of calls and the number of refusals specifically comprises: when the total number of calls is less than or equal to a first preset number of times and the number of times of refusing is greater than or equal to a second preset number of times, marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
when the total number of calls is less than or equal to a first preset number and the number of refusal times is less than a second preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list;
when the total number of calls is larger than a first preset number, and the number of refuses and the number of missed calls are larger than or equal to the first preset number, marking the suspicious number as a shielding number and sending the shielding number into a shielding list;
and when the total number of calls is larger than a first preset number, and the number of refuses plus the number of missed calls is smaller than the first preset number, marking the suspicious number as a tracking number and sending the tracking number into a tracking list.
6. The intelligent incoming call shielding method of the mobile terminal according to claim 1, further comprising: and when the secondary reminding time is up, sending all the numbers in the shielding list to a user for confirmation, and correspondingly marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user.
7. An apparatus for implementing the intelligent incoming call shielding method of the mobile terminal according to claim 1, comprising a setting module, a storage module, a scanning module, a matching module, a judging module and a shielding module;
the setting module is used for setting scanning time, and the storage module is used for storing each list and the number of the corresponding mark;
the scanning module scans the incoming call records once every scanning time to extract suspicious numbers and number information; the matching module searches whether a number same as the suspicious number exists in a prestored list, if so, the suspicious number is marked as a shielding number or a tracking number according to the list attribute, and a judging module is not started; the judging module marks the suspicious number as a shielding number or a tracking number according to the number information and sends the suspicious number into a corresponding list for storage; the shielding module judges whether the incoming call number is a shielding number when the incoming call is received, and if so, the incoming call number is shielded.
8. The apparatus of claim 7, wherein the scanning module is configured to store the extracted suspicious number and the number information in a question list;
the matching module and the judging module are also used for reading each suspicious number from the problem list in sequence for marking; and correspondingly deleting the suspicious number from the question list every time the suspicious number is marked.
9. The device of claim 7, wherein the setting module is further configured to set a secondary reminder time;
the device also comprises a secondary confirmation module which is used for sending all the numbers in the shielding list to a user for confirmation when the secondary reminding time is up, and correspondingly marking the numbers as shielding numbers or rejected numbers according to the checking operation of the user.
CN201610820165.2A 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal Active CN106375583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610820165.2A CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610820165.2A CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Publications (2)

Publication Number Publication Date
CN106375583A CN106375583A (en) 2017-02-01
CN106375583B true CN106375583B (en) 2020-11-13

Family

ID=57896894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610820165.2A Active CN106375583B (en) 2016-09-13 2016-09-13 Intelligent incoming call shielding method and device of mobile terminal

Country Status (1)

Country Link
CN (1) CN106375583B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599794A (en) * 2018-04-23 2018-09-28 Oppo广东移动通信有限公司 Harassing and wrecking intercept control method and Related product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
CN104702765A (en) * 2013-12-06 2015-06-10 无锡韩光电器有限公司 Crank call shielding method and crank call shielding system
CN105100366A (en) * 2015-07-13 2015-11-25 小米科技有限责任公司 Method, device and system for confirming harassment telephone number
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN105721248A (en) * 2016-02-26 2016-06-29 上海卓易科技股份有限公司 Call monitoring method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510908B (en) * 2009-03-12 2012-01-11 中兴通讯股份有限公司 Method and apparatus for implementing terminal calling firewall

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
CN104702765A (en) * 2013-12-06 2015-06-10 无锡韩光电器有限公司 Crank call shielding method and crank call shielding system
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN105100366A (en) * 2015-07-13 2015-11-25 小米科技有限责任公司 Method, device and system for confirming harassment telephone number
CN105721248A (en) * 2016-02-26 2016-06-29 上海卓易科技股份有限公司 Call monitoring method and system

Also Published As

Publication number Publication date
CN106375583A (en) 2017-02-01

Similar Documents

Publication Publication Date Title
JP5027288B2 (en) Automatic handling of incoming communications on wireless devices
US7895154B2 (en) Communication reputation
US7146163B2 (en) Sender-address-based telecommunications operator callback system and method
CN101753674A (en) Incoming call processing method and device of a communication terminal
CN103037062A (en) Method and terminal and server used for intercepting crank calls
US11973898B2 (en) Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks
US20050164720A1 (en) Method of filtering messages with receiving telephone apparatus
CN102055848A (en) Incoming call processing method of mobile communication terminal
CN106375583B (en) Intelligent incoming call shielding method and device of mobile terminal
JP6438197B2 (en) Portable terminal device and portable terminal program
CN1084688A (en) Telecommunication system
CN113596260B (en) Abnormal telephone number detection method and electronic equipment
CN109600744B (en) Voice processing method and system
KR101633861B1 (en) Apparatus for guiding suspecious spam call based on analysis of call traffic and method thereof
JP2012129869A (en) Apparatus, system, and method for surveying self-supporting phone number
CN111314539B (en) Harassment-prevention communication method and terminal for important contact persons and important strangers
RU2021128732A (en) Method and system for tracking unwanted calls
CN110602304B (en) Information processing method, device and storage medium
US10757250B1 (en) System and method for using public registry to enhance caller information and determine call handling for called parties
KR100805739B1 (en) Call setup controlling method
CN115733924A (en) Call center telephone interception data recognition system
JP2014033474A (en) Autonomous type telephone number investigation device and method
CN113890942A (en) Method, device and storage medium for identifying call rejection type
CN114244956A (en) Terminal authorized call method and device, electronic equipment and storage medium
TWI221069B (en) Equipment and method to shield/screen out the incoming call interference automatically

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230414

Address after: Room 501, 85 Xiaguang Dongli, Haicang District, Xiamen City, Fujian Province, 361000

Patentee after: Xiamen reliable intellectual property service Co.,Ltd.

Address before: 516006 Zhongkai hi tech Zone, Huizhou, Guangdong, 86 Chang seven Road West

Patentee before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.