CN107566596A - A kind of call blocking method and apparatus - Google Patents
A kind of call blocking method and apparatus Download PDFInfo
- Publication number
- CN107566596A CN107566596A CN201610513222.2A CN201610513222A CN107566596A CN 107566596 A CN107566596 A CN 107566596A CN 201610513222 A CN201610513222 A CN 201610513222A CN 107566596 A CN107566596 A CN 107566596A
- Authority
- CN
- China
- Prior art keywords
- user
- call
- type information
- information
- demand information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
It is an object of the invention to provide a kind of method and apparatus for call blocking.Wherein, when detecting the calling event of number in blacklist, the type information belonging to the number is determined;If the call demand information of the type information and user belonging to the number matches, the incoming call of the number is connected for the user.Compared with prior art, the present invention is not indifference to the unified incoming call for intercepting number in blacklist, but let pass according to the call demand information of user for each user and meet the incoming call of its demand information of conversing, even if the number that the caller ID belongs in blacklist, so as to which the present invention has provided the user a kind of personalized call blocking so that user obtains preferably call experience.
Description
Technical field
The present invention relates to verbal system technical field, more particularly to a kind of technology of call blocking.
Background technology
Current call blocking technology generally use blacklist intercepts, such as according to the address list and message registration of a large number of users
Or user reports to harassing call, generation includes the blacklist of harassing call.When user has calling event generation, if
The number that the caller ID belongs in blacklist, then the incoming call is intercepted for user, otherwise the incoming call is let pass.
The content of the invention
It is an object of the invention to provide a kind of method and apparatus for call blocking.
According to an aspect of the invention, there is provided a kind of call blocking method, wherein, this method comprises the following steps:
- when detecting the calling event of number in blacklist, determine the type information belonging to the number;
If the call demand information of the type information and user belonging to-the number matches, connect for the user
Lead to the incoming call of the number.
According to another aspect of the present invention, a kind of call blocking device is additionally provided, wherein, the device includes:
- be used for when detecting the calling event of number in blacklist, determine the dress of the type information belonging to the number
Put;
If-match for the type information belonging to the number and the call demand information of user, for the use
The device of the incoming call of the number is connected at family.
Compared with prior art, the present invention is not incoming call of the indifference to number in unified interception blacklist, but according to
The call demand information of user is the incoming call that each user clearance meets its demand information of conversing, even if the caller ID belongs to black name
Number in list, so as to which the present invention has provided the user a kind of personalized call blocking so that user obtains preferably call
Experience.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the method flow diagram according to an embodiment of the invention for call blocking;
Fig. 2 shows the schematic device according to an embodiment of the invention for call blocking.
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although operations are described as the processing of order by flow chart, therein to be permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be rearranged.When it
The processing can be terminated when operation is completed, it is also possible to the additional step being not included in accompanying drawing.The processing
It can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", referring to can be by running preset program or referring to
Order performs the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the programmed instruction to be prestored in memory by computing device perform predetermined process process, or by ASIC,
The hardware such as FPGA, DSP perform predetermined process process, or are realized by said two devices combination.Computer equipment includes but unlimited
In server, PC, notebook computer, tablet personal computer, smart mobile phone etc..
The computer equipment is for example including mobile terminal and the network equipment.Wherein, the mobile terminal includes but unlimited
In smart mobile phone, PDA etc.;The network equipment includes but is not limited to single network server, multiple webservers form
Server group or the cloud being made up of a large amount of computers or the webserver based on cloud computing (Cloud Computing), wherein,
Cloud computing is one kind of Distributed Calculation, a super virtual computer being made up of the computer collection of a group loose couplings.Its
In, the computer equipment can isolated operation realize the present invention, also can access network and by with other calculating in network
The present invention is realized in the interactive operation of machine equipment.Wherein, the network residing for the computer equipment include but is not limited to internet,
Wide area network, Metropolitan Area Network (MAN), LAN, VPN etc..
It should be noted that the mobile terminal, the network equipment and network etc. are only for example, other are existing or from now on may be used
The computer equipment or network that can occur such as are applicable to the present invention, should also be included within the scope of the present invention, and to draw
It is incorporated herein with mode.
The method (some of them illustrated by flow) discussed herein below can by hardware, software, firmware, in
Between part, microcode, hardware description language or its any combination implement.When with software, firmware, middleware or microcode come real
Shi Shi, to implement the program code of necessary task or code segment can be stored in machine or computer-readable medium (such as
Storage medium) in.(one or more) processor can implement necessary task.
Concrete structure and function detail disclosed herein are only representational, and are for describing showing for the present invention
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and it is not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. herein to describe unit,
But these units should not be limited by these terms.It is used for the purpose of using these terms by a unit and another unit
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Member, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
It should be appreciated that when a unit is referred to as " connecting " or during " coupled " to another unit, it can directly connect
Connect or be coupled to another unit, or there may be temporary location.On the other hand, when a unit is referred to as " directly connecting
Connect " or " direct-coupling " when arriving another unit, then in the absence of temporary location.It should in a comparable manner explain and be used to retouch
State the relation between unit other words (such as " between being in ... " compared to " between being directly in ... ", " and with ... it is adjacent
Closely " compared to " with ... be directly adjacent to " etc.).
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, otherwise singulative used herein above "one", " one " also attempt to include plural number.Should also
When understanding, term " comprising " and/or "comprising" used herein above provide stated feature, integer, step, operation,
The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be according to different from attached
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures shown in succession actually may be used
Substantially simultaneously to perform or can perform in a reverse order sometimes.
The present invention can be realized by user equipment.More specifically, user equipment of the invention is logical with call function
Equipment is talked about, it is typically such as mobile phone.Specifically, when detecting the calling event of number in blacklist, user equipment determines should
Type information belonging to caller ID;If type information and the call demand information phase of user belonging to the caller ID
Match somebody with somebody, user equipment then connects the incoming call of the number for user.
Preferably, the solution of the present invention can be realized by a kind of APP for installing and running in user equipment, such as respectively
The APP, such as various mobile phone safe class APP of call event can be monitored, intercepted to kind.Further, the solution of the present invention can be with
It is integrated in as One function module in foregoing mobile phone safe class APP.
The present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 shows method flow diagram according to an embodiment of the invention, and it specifically illustrates a kind of call blocking process.Such as
Shown in Fig. 1, in step sl, when detecting the calling event of number in blacklist, user equipment is determined belonging to the number
Type information;In step s 2, if the call demand information of the type information and user belonging to the number matches, use
Family equipment then connects the incoming call of the number for the user.
Specifically, in step sl, when detecting the calling event of number in blacklist, user equipment determines the incoming call
Type information belonging to number.
Calling event on user equipment monitors current device, when there is the calling event of number in blacklist, Yong Hushe
The type information for future reference ask belonging to the caller ID.Here, harassing call number and doubtful harassing and wrecking electricity can be included in blacklist
Number is talked about, wherein at least portion numbers are marked with each affiliated type information, such as house property medium, financing, insurance, hunter
Deng.Blacklist can be stored in user equipment local, be stored in the network equipment, so that multiple user equipmenies are looked into
Ask.Also, the blacklist local for being stored in user equipment, the network equipment can be also updated to it.Alternately, black name
Can also only have harassing call number in list, without including doubtful harassing call number.
Then, in step s 2, if type information and the call demand information phase of user belonging to blacklist number
Match somebody with somebody, user equipment then connects the incoming call of the number for user.
According to a preferred embodiment, user equipment only needs to know without specifically determining the call demand information of user
Whether the call demand information of type information and user belonging to caller ID matches.
One example can be also marked with foregoing blacklist between type information and the call demand information of user
Corresponding relation, the user to match is such as marked in the record of respective type information.
For example, record of the caller ID in blacklist is as follows:Harassing call (135xxxxxxxx), type information (room
Produce intermediary), user 1.Therefore, when user equipment inquire about blacklist when, you can know the caller ID type information whether with
Active user 1 is associated, if the type information belonging to the number is marked as the call demand information of user 1, is judged as
Matching, and then connect the incoming call for user.
Another example can be, if user answered the incoming call of the similar number of the caller ID and call before this
Length exceedes scheduled duration threshold value, then judges that the call demand information of corresponding type information and user match.
For example, the type information of current call number is house property medium, if user equally answered house property medium before this
Incoming call, and with its duration of call more than a scheduled duration threshold value, such as 1 minute, then it is considered that " house property medium " this
Type information and the call demand information of user match.
According to another preferred embodiment, the specific call demand information for determining user is also needed, also, determination operation can
To be performed by user equipment, can also be performed by the network equipment.
List to following exemplary several determination modes:
1) if the quantity for the same type of application that active user is installed on its verbal system is more than predetermined quantity
Threshold value, then the call demand information using corresponding type information as the user.
For example, the type for each APP that counting user is installed on mobile phone, if belonging to same type of APP more than 2,
Call demand information that then can be using the type information as the user.Specifically such as, if user installation hunt engage, Boss is directly engaged
Class APP are recruited with pull hook for this 3, then using the type information " recruitment (or hunter) " as the call demand information of the user.
Preferably, when detecting the application variation event in user's communication equipment, the number of the application under detection is all types of
Amount, to update the call demand information of user accordingly.
The APP that user installs on mobile phone also can often change, such as install the new APP or mounted APP of unloading,
Therefore, user equipment can be when detecting the installation of user or unloading behavior, or the APP that is installed of periodic scanning is obtained
Using the event of variation, and then all types of lower APP quantity is counted, to determine current installation APP type information, so as to update
The call demand information of user.For example, run-down has installed APP to user equipment weekly, this week financing class APP quantity is found
2 are increased from 1, and recruits class APP and has all been deleted, accordingly, the call demand information of user is updated to manage money matters
Class.
2) by user answered in preset time period before and the duration of call exceed scheduled duration threshold value incoming call number
Call demand information of the type information as user belonging to code.
For example, in a preset time period before, such as in one month or in one week, user answered multiple incoming calls,
Type information belonging to these caller IDs includes house property medium, financing, recruitment, wherein user and the duration of call of two incoming calls
More than a scheduled duration threshold value, such as 1 minute, the type information of the two caller IDs was house property medium and financing, accordingly by class
The call demand information of type information " house property medium " and " financing " as the user.
3) if user answered the incoming call of the similar number of current call number before this and the duration of call exceedes pre- timing
Long threshold value, then the call demand information using corresponding type information as user.
Here, the determination mode can be used for the call demand information for determining user in real time.For example, when there is incoming call, such as
Type belonging to the caller ID is house property medium, if user also answered the incoming call that other belong to house property medium and logical before this
Words are more than a scheduled duration threshold value, such as 1 minute, then call demand that can be using the type information " house property medium " as the user
Information.
It should be noted that those skilled in the art will be understood that the above-mentioned various call demand informations for determining user
Mode is not mutually exclusive, still can combine to determine the mode of the call demand information of user.
It should be noted that those skilled in the art will be understood that the above-mentioned various call demand informations for determining user
Mode is merely illustrative, for illustrating the purpose of the present invention, and is understood not to any limitation of the invention, and other are existing
Determination mode have or future such as can be applied to the present invention, then should equally be included into the scope of patent protection of the present invention.
It is determined that after the call demand information of user, if type information and user belonging to current call number is logical
Words demand information matches, and user equipment then connects the incoming call of the number for user.
In addition, for identified user's communication demand information, it can be stored in blacklist, can also be stored
It is local in user equipment, it can be set according to specific application demand.
Based on this, compared with prior art in simple enter one using blacklist come the scheme sent a telegram here for user filtering, the present invention
Step has provided the user a kind of personalized incoming call filter scheme.Wherein, the present invention is not shielded in blacklist simple and crudely
Incoming call, but according to the call demand information of the actual demand of user, i.e. user, let pass for each particular user for it
Certain types of incoming call, even if the caller ID belongs to blacklist.Obviously, the present invention is a kind of higher level, more meets user's need
Will, so as to more humane secondary filter scheme.For the different call demand informations of each particular user, for example, user 1 has
The demand for class of managing money matters, user 2 have the demand of recruitment class, and more even the call demand of user 1 in the month before still recruits the need of class
Ask, the present invention can be the medium size that is put on the blacklist under its clearance respective type well according to the current talking demand of user
The incoming call of code.It ensure that user will not miss its desired incoming call, also will not be by its undesirable incoming call disturbance.
Also, the present invention can effectively utilize various existing blacklist storehouses, two modelings be carried out to it, with wherein
Mark the type information of each number, or even the call demand information of each user.
Fig. 2 shows an apparatus in accordance with one embodiment of the invention schematic diagram, and it specifically illustrates a kind of call blocking device.Such as
Shown in Fig. 2, the call blocking device 20 is installed in a mobile phone safe APP200, and specifically includes the He of type determination device 21
Incoming call clearance device 22.
Wherein, when detecting the calling event of number in blacklist, type determination device 21 is determined belonging to the number
Type information;If the call demand information of the type information and user belonging to the number matches, clearance device of sending a telegram here
22 incoming calls that the number is connected for the user.
Specifically, when detecting the calling event of number in blacklist, type determination device 21 determines the caller ID
Affiliated type information.
Type determination device 21 monitors the calling event on current device, when there is the calling event of number in blacklist,
Type determination device 21 inquires about the type information belonging to the caller ID.Here, harassing call number can be included in blacklist
With doubtful harassing call number, wherein at least portion numbers are marked with each affiliated type information, such as house property medium, reason
Wealth, insurance, hunter etc..Blacklist can be stored in user equipment local, be stored in the network equipment, for multiple use
Family equipment is inquired about.Also, the blacklist local for being stored in user equipment, the network equipment can be also updated to it.
Alternately, can also only have harassing call number in blacklist, without including doubtful harassing call number.
Then, if the call demand information of the type information and user belonging to blacklist number matches, incoming call is let pass
Device 22 then connects the incoming call of the number for user.
According to a preferred embodiment, incoming call clearance device 22 need not specifically determine the call demand information of user, and only
It need to know whether the call demand information of the type information belonging to caller ID and user match.
One example can be also marked with foregoing blacklist between type information and the call demand information of user
Corresponding relation, the user to match is such as marked in the record of respective type information.
For example, record of the caller ID in blacklist is as follows:Harassing call (135xxxxxxxx), type information (room
Produce intermediary), user 1.Therefore, when type determination device 21 inquires about blacklist, you can know the type information of the caller ID
It is whether associated with active user 1, if the type information belonging to the number is marked as the call demand information of user 1,
Incoming call clearance device 22 is judged as matching, and then connects the incoming call for user.
Another example can be, if user answered the incoming call of the similar number of the caller ID and call before this
Length exceedes scheduled duration threshold value, then clearance device 22 of sending a telegram here judges corresponding type information and the call demand information phase of user
Match somebody with somebody.
For example, the type information of current call number is house property medium, if user equally answered house property medium before this
Incoming call, and with its duration of call more than a scheduled duration threshold value, such as 1 minute, then it is considered that " house property medium " this
Type information and the call demand information of user match.
According to another preferred embodiment, the specific call demand information for determining user is also needed, also, determination operation can
To be performed by user equipment, can also be performed by the network equipment.
For purposes of illustration only, following exemplary list several determinations that each device in origin electricity blocking apparatus 20 is realized
Mode:
1) the first determining device (Fig. 2 is not shown) can also be included in call blocking device 20, first determining device is used
, will if the quantity for the same type of application installed in active user on its verbal system is more than predetermined quantity threshold value
Corresponding call demand information of the type information as the user.
For example, the type for each APP that counting user is installed on mobile phone, if belonging to same type of APP more than 2,
The call demand information that then the first determining device can be using the type information as the user.Specifically such as, if user installation has
Hunt engage, Boss directly engage with the recruitment class APP of pull hook this 3, then using the type information " recruitment (or hunter) " leading to as the user
Talk about demand information.
Preferably, when detecting the application variation event in user's communication equipment, the detection of the first determining device is all types of
Under application quantity, to update the call demand information of user accordingly.
The APP that user installs on mobile phone also can often change, such as install the new APP or mounted APP of unloading,
Therefore, the first determining device can be when detecting the installation of user or unloading behavior, or the APP that periodic scanning is installed comes
Variation event apply in acquisition, and then counts all types of lower APP quantity, to determine current installation APP type information, so that
Update the call demand information of user.For example, run-down has installed APP to user equipment weekly, find this week financing class APP's
Quantity increases 2 from 1, and recruits class APP and be all deleted, and accordingly, the call demand information of user is updated to
Financing class.
2) the second determining device (Fig. 2 is not shown) can also be included in call blocking device 20, second determining device is used
In by user answered in preset time period before and the duration of call exceed scheduled duration threshold value caller ID belonging to
Call demand information of the type information as user.
For example, in a preset time period before, such as in one month or in one week, user answered multiple incoming calls,
Type information belonging to these caller IDs includes house property medium, financing, recruitment, wherein user and the duration of call of two incoming calls
More than a scheduled duration threshold value, such as 1 minute, the type informations of the two caller IDs was house property medium and financing, accordingly second
Call demand information of the determining device using type information " house property medium " and " financing " as the user.
3) the 3rd determining device (Fig. 2 is not shown) can also be included in call blocking device 20, the 3rd determining device is used
If answering the incoming call of the similar number of current call number before this in user and the duration of call exceeding scheduled duration threshold value,
Call demand information using corresponding type information as user.
Here, the determination mode can be used for the call demand information for determining user in real time.For example, when there is incoming call, such as
Type belonging to the caller ID is house property medium, if user also answered the incoming call that other belong to house property medium and logical before this
Words were more than a scheduled duration threshold value, such as 1 minute, then the 3rd determining device can be using the type information " house property medium " as the use
The call demand information at family.
It should be noted that those skilled in the art will be understood that the above-mentioned various call demand informations for determining user
Mode is not mutually exclusive, still can combine to determine the mode of the call demand information of user.Therefore, above-mentioned
At least two devices in one determining device, the second determining device and the 3rd determining device can integrate.
It should be noted that those skilled in the art will be understood that the above-mentioned various call demand informations for determining user
Mode is merely illustrative, for illustrating the purpose of the present invention, and is understood not to any limitation of the invention, and other are existing
Determination mode have or future such as can be applied to the present invention, then should equally be included into the scope of patent protection of the present invention.
It is determined that after the call demand information of user, if type information and user belonging to current call number is logical
Words demand information matches, and incoming call clearance device 22 then connects the incoming call of the number for user.
In addition, for identified user's communication demand information, it can be stored in blacklist, can also be stored
It is local in user equipment, it can be set according to specific application demand.
It should be noted that the present invention can be carried out in the assembly of software and/or software and hardware, for example, this hair
Bright each device can using application specific integrated circuit (ASIC) or any other realized similar to hardware device.In one embodiment
In, software program of the invention can realize steps described above or function by computing device.Similarly, it is of the invention
Software program (including related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory,
Magnetically or optically driver or floppy disc and similar devices.In addition, some steps or function of the present invention can employ hardware to realize, example
Such as, coordinate as with processor so as to perform the circuit of each step or function.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in system claims is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table
Show title, and be not offered as any specific order.
Claims (16)
1. a kind of call blocking method, wherein, this method comprises the following steps:
- when detecting the calling event of number in blacklist, determine the type information belonging to the number;
If the call demand information of the type information and user belonging to-the number matches, institute is connected for the user
State the incoming call of number.
2. according to the method for claim 1, wherein, the determination step of the call demand information of the user specifically includes:
If the quantity for the same type of application that-the user is installed on its verbal system is more than predetermined quantity threshold value,
The then call demand information using corresponding type information as the user.
3. according to the method for claim 2, wherein, this method also includes:
- when detecting the application variation event on the verbal system, the quantity of the application under detection is all types of, with accordingly more
The call demand information of the new user.
4. according to the method in any one of claims 1 to 3, wherein, the determination of the call demand information of the user walks
Suddenly specifically include:
- by the user answered in preset time period before and the duration of call exceed scheduled duration threshold value caller ID
Call demand information of the affiliated type information as the user.
5. method according to any one of claim 1 to 4, wherein, the determination step of the call demand information of the user
Suddenly specifically include:
If-the user answered the incoming call of the similar number of the number before this and the duration of call exceedes scheduled duration threshold
It is worth, then the call demand information using corresponding type information as the user.
6. method according to any one of claim 1 to 5, wherein, the determination step of the type information belonging to the number
Suddenly specifically include:
- according to the number inquiry blacklist, to determine the type information belonging to the number, wherein, the blacklist is at least
Including one or more harassing and wrecking numbers and its each affiliated type information.
7. according to the method for claim 6, wherein, the call of type information and user is also marked with the blacklist to be needed
Seek the corresponding relation between information;
Wherein, the judgment step that the type information belonging to the number and the call demand information of the user match specifically is wrapped
Include:
If the type information belonging to-the number is marked as the call demand information of the user, it is judged as matching.
8. the method according to claim 11, wherein, type information and the call demand of the user belonging to the number
The judgment step of information match specifically includes:
If-the user answered the incoming call of the similar number of the number before this and the duration of call exceedes scheduled duration threshold
Value, then judge that corresponding type information and the call demand information of the user match.
9. a kind of call blocking device, wherein, the device includes:
- be used for when detecting the calling event of number in blacklist, determine the device of the type information belonging to the number;
If-match for the type information belonging to the number and the call demand information of user, connect for the user
Lead to the device of the incoming call of the number.
10. device according to claim 9, wherein, the device also includes:
If the quantity of-same type of application installed for the user on its verbal system is more than predetermined quantity threshold
It is worth, then the device using corresponding type information as the call demand information of the user.
11. device according to claim 10, wherein, the determination operation of the call demand information of the user also includes:
- be used for when detecting the application variation event on the verbal system, the quantity of the application under detection is all types of, with evidence
This updates the call demand information of the user.
12. the device according to any one of claim 8 to 11, wherein, the device also includes:
- be used for by the user answered in preset time period before and the duration of call exceed scheduled duration threshold value incoming call
Device of the type information as the call demand information of the user belonging to number.
13. the device according to any one of claim 8 to 12, wherein, the device also includes:
If-be used for the user answered before this number similar number incoming call and the duration of call exceed scheduled duration
Threshold value, then using corresponding type information as the user call demand information device.
14. the device according to any one of claim 8 to 13, wherein, the determination of the type information belonging to the number
Operation specifically includes:
- according to the number inquiry blacklist, to determine the type information belonging to the number, wherein, the blacklist is at least
Including one or more harassing and wrecking numbers and its each affiliated type information.
15. device according to claim 14, wherein, type information and the call of user are also marked with the blacklist
Corresponding relation between demand information;
Wherein, the specific bag of judgement operation that the type information belonging to the number and the call demand information of the user match
Include:
If the type information belonging to-the number is marked as the call demand information of the user, the number is judged
Affiliated type information and the call demand information of the user match.
16. device according to claim 8, wherein, type information and the call of the user belonging to the number need
Ask the judgement of information match to operate to specifically include:
If-the user answered the incoming call of the similar number of the number before this and the duration of call exceedes scheduled duration threshold
Value, then judge that corresponding type information and the call demand information of the user match.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513222.2A CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513222.2A CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107566596A true CN107566596A (en) | 2018-01-09 |
CN107566596B CN107566596B (en) | 2020-06-23 |
Family
ID=60969967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610513222.2A Active CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107566596B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110336925A (en) * | 2019-06-25 | 2019-10-15 | 维沃移动通信有限公司 | Phone incoming call processing method and terminal device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2033401A1 (en) * | 2006-06-23 | 2009-03-11 | Sony Ericsson Mobile Communications AB | Method and system for triggering activation of ims applications on a mobile radio terminal |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103886103A (en) * | 2014-04-10 | 2014-06-25 | 广东欧珀移动通信有限公司 | Recommendation method and system for application programs |
CN104135424A (en) * | 2014-02-14 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Application information push method, application server, application terminal and application information push system |
CN104506743A (en) * | 2014-12-17 | 2015-04-08 | 百度在线网络技术(北京)有限公司 | Method and device for dynamically intercepting call |
CN104836883A (en) * | 2015-04-20 | 2015-08-12 | 北京奇虎科技有限公司 | Method, equipment and system for processing incoming call |
CN104866526A (en) * | 2015-04-21 | 2015-08-26 | 惠州Tcl移动通信有限公司 | Intelligent terminal and method for recommending applications thereof |
CN105162937A (en) * | 2015-08-31 | 2015-12-16 | 小米科技有限责任公司 | Incoming call information processing method and device |
CN105354196A (en) * | 2014-08-19 | 2016-02-24 | 北京羽扇智信息科技有限公司 | Information pushing method and information pushing apparatus |
CN105391855A (en) * | 2015-10-29 | 2016-03-09 | 小米科技有限责任公司 | Incoming call processing method and device |
US9338196B2 (en) * | 2009-04-30 | 2016-05-10 | Nec Corporation | Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls |
-
2016
- 2016-06-30 CN CN201610513222.2A patent/CN107566596B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2033401A1 (en) * | 2006-06-23 | 2009-03-11 | Sony Ericsson Mobile Communications AB | Method and system for triggering activation of ims applications on a mobile radio terminal |
US9338196B2 (en) * | 2009-04-30 | 2016-05-10 | Nec Corporation | Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls |
CN103095889A (en) * | 2013-01-07 | 2013-05-08 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN104135424A (en) * | 2014-02-14 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Application information push method, application server, application terminal and application information push system |
CN103886103A (en) * | 2014-04-10 | 2014-06-25 | 广东欧珀移动通信有限公司 | Recommendation method and system for application programs |
CN105354196A (en) * | 2014-08-19 | 2016-02-24 | 北京羽扇智信息科技有限公司 | Information pushing method and information pushing apparatus |
CN104506743A (en) * | 2014-12-17 | 2015-04-08 | 百度在线网络技术(北京)有限公司 | Method and device for dynamically intercepting call |
CN104836883A (en) * | 2015-04-20 | 2015-08-12 | 北京奇虎科技有限公司 | Method, equipment and system for processing incoming call |
CN104866526A (en) * | 2015-04-21 | 2015-08-26 | 惠州Tcl移动通信有限公司 | Intelligent terminal and method for recommending applications thereof |
CN105162937A (en) * | 2015-08-31 | 2015-12-16 | 小米科技有限责任公司 | Incoming call information processing method and device |
CN105391855A (en) * | 2015-10-29 | 2016-03-09 | 小米科技有限责任公司 | Incoming call processing method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110336925A (en) * | 2019-06-25 | 2019-10-15 | 维沃移动通信有限公司 | Phone incoming call processing method and terminal device |
Also Published As
Publication number | Publication date |
---|---|
CN107566596B (en) | 2020-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104680060A (en) | Procedure self-starting management method and procedure self-starting management device | |
KR100998307B1 (en) | Distributed rule processing for ubiquitous computing environments | |
CN102087615A (en) | Automated merger of logically associated messages in a message queue | |
CN104331488B (en) | File clean-up method, apparatus and equipment based on suspended window | |
CN103218564A (en) | Mobile terminal protection method and mobile terminal protection device | |
CN106168902A (en) | Awakening control method, device and equipment | |
CN105933497B (en) | A kind of call blocking method and apparatus of multi-mode | |
CN109472656B (en) | Virtual article display method and device and storage medium | |
WO2020019482A1 (en) | Function hook detection method, function hook detection device, and computer-readable medium | |
CN109740083A (en) | A kind of method and device of page jump | |
CN107911565A (en) | Calling-control method, terminal, equipment and computer-readable recording medium | |
CN104049983B (en) | A kind of prompt message update method, device and electronic equipment | |
CN107566596A (en) | A kind of call blocking method and apparatus | |
CN106126011A (en) | The resource occupation method for information display of a kind of application program and mobile terminal | |
CN109784634A (en) | Coverage division methods, electronic device and readable storage medium storing program for executing | |
CN105447384B (en) | A kind of anti-method monitored, system and mobile terminal | |
CN106022102A (en) | Method and apparatus for preventing third-party pushing platform from starting application in background | |
CN106022110A (en) | Method and device for identifying application of pushing platform | |
CN107292614A (en) | Pay class application management method, device and mobile terminal | |
CN107566597A (en) | A kind of method and apparatus for being used to mark harassing and wrecking number | |
CN111753191A (en) | Advertisement popup intercepting method and device, electronic equipment and storage medium | |
CN105607953B (en) | The method and device of process recovery processing is carried out in the application | |
CN115424390A (en) | Queuing number management method and device, electronic equipment and readable medium | |
CN108229978B (en) | Customer satisfaction return visit method, equipment and storage medium | |
CN108762826B (en) | Process hiding method and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |