CN107580121A - Long-range guard method and device, terminal and storage medium - Google Patents

Long-range guard method and device, terminal and storage medium Download PDF

Info

Publication number
CN107580121A
CN107580121A CN201710763717.5A CN201710763717A CN107580121A CN 107580121 A CN107580121 A CN 107580121A CN 201710763717 A CN201710763717 A CN 201710763717A CN 107580121 A CN107580121 A CN 107580121A
Authority
CN
China
Prior art keywords
terminal
call
long
guard method
telephone number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710763717.5A
Other languages
Chinese (zh)
Inventor
陈文峰
张亚枫
叶振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201710763717.5A priority Critical patent/CN107580121A/en
Publication of CN107580121A publication Critical patent/CN107580121A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of long-range guard method and device, terminal and storage medium, and the long-range guard method, applied to first terminal and the second terminal of being mutually related, methods described includes:The first terminal obtains the administration authority of second terminal;When the incoming call of the second terminal or when going the telephone number of electricity to belong to the swindle number for prestoring or marking in advance, the duration of call of the second terminal and the telephone number is monitored;If the second terminal and the call of the telephone number reach preset duration, prompting message is sent to the second terminal by predetermined manner.Using the inventive method, first terminal can monitor and control the call of second terminal, reduce the probability that user has dust thrown into the eyes.

Description

Long-range guard method and device, terminal and storage medium
Technical field
The present invention relates to electronic technology field, more particularly to a kind of long-range guard method and device, terminal and storage medium.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims and embodiment provide background Or context.Description herein recognizes it is prior art not because not being included in this part.
With the development of the continuous development of the communication technology, especially mobile communication technology, increasing user is using electricity Words are communicated, and telephonic communication brings many convenience to user, enables users to easily and efficiently be communicated.But therewith Also to there are many fraudulent calls, the personal data that these fraudulent calls are generally left using user in use are (such as Name, phone, address etc.), fraudulent act is implemented to user by phone, and then huge economic damage is caused to victim Lose, the especially weaker people of the judgement such as old man and child is easier to have dust thrown into the eyes.
The content of the invention
In consideration of it, it is necessary to provide a kind of long-range guard method and device, terminal and storage medium, to realize remote monitoring Telephone relation, reduce the probability that user has dust thrown into the eyes.
First aspect
The present invention provides a kind of long-range guard method, applied to first terminal and the second terminal of being mutually related, the side Method includes:
The first terminal obtains the administration authority of second terminal;
When the second terminal incoming call or go electricity telephone number belong to the swindle number for prestoring or marking in advance when, prison Survey the duration of call of the second terminal and the telephone number;
If the call of the second terminal and the telephone number reaches preset duration, by predetermined manner to described Second terminal sends prompting message.
Further, the swindle number for prestoring or marking in advance is is stored in advance in the first terminal or described the In the fraudulent call database that one terminal can access.
Further, the predetermined manner includes at least one of following:
Prompting message described in display screen display in the second terminal;
The voice of the prompting message is played using the playing device of institute's second terminal.
Further, by predetermined manner to the second terminal send prompting message the step of after, methods described is also Including:
Interrupt the call of the second terminal and the telephone number.
Further, methods described also include when the second terminal incoming call or go electricity telephone number belong to prestore or During the swindle number marked in advance, whether include presupposed information, if including institute if identifying in the dialog context of the second terminal The duration of call for stating presupposed information and the second terminal exceedes the preset duration, then sends prompting letter to the second terminal Breath.
Further, the presupposed information includes the sensitive vocabulary of swindle property.
Further, the sensitive vocabulary of the swindle property includes bank, remittance, account, personal information, sale or distribution At least one of or combination.
Second aspect
The present invention also provides a kind of long-range guarding device, including:
Administration authority acquisition module, for realizing that a first terminal obtains the administration authority of a second terminal;
Monitoring modular, for the second terminal incoming call or go electricity telephone number belong to what is prestored or mark in advance When swindling number, the duration of call of the second terminal and the telephone number is monitored;And
Prompting module, for when the call of the second terminal and the telephone number reaches preset duration, by pre- If mode sends prompting message to the second terminal.
The third aspect
The present invention also provides a kind of terminal, and the terminal includes processor, and the processor is used to perform in memory to deposit The step of long-range guard method described above is realized during the computer program of storage.
Fourth aspect
The present invention also provides a kind of computer-readable recording medium, is stored thereon with computer program, the computer journey The step of long-range guard method described above is realized when sequence is executed by processor.
Long-range guard method and device, terminal and storage medium provided by the invention, by first terminal to second terminal Incoming call or go electricity to be monitored, when second terminal call telephone number belong to the swindle number for prestoring or marking in advance when, And the duration of call of the second terminal and the telephone number is monitored, sent and carried to the second terminal by predetermined manner Awake information, avoids the weak people of judgement and has dust thrown into the eyes, reduce the probability swindled.
Brief description of the drawings
It is required in being described below to embodiment in order to illustrate more clearly of the technical scheme of embodiment of the present invention The accompanying drawing used is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this For the those of ordinary skill of field, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other Accompanying drawing.
Fig. 1 is the flow chart of the long-range guard method of first embodiment of the invention.
Fig. 2 is the flow chart of the long-range guard method of second embodiment of the invention.
Fig. 3 is the flow chart of the long-range guard method of third embodiment of the invention.
Fig. 4 is the flow chart of the long-range guard method of four embodiment of the invention.
Fig. 5 is the exemplary functional block diagram of the long-range guarding device of an embodiment of the present invention.
Fig. 6 is the exemplary structural representation of the terminal of an embodiment of the present invention.
Main element symbol description
Terminal 1
Processor 10
Memory 20
Long-range guarding device 100
Administration authority acquisition module 11
Memory module 12
Comparison module 13
Monitoring modular 14
Judge module 15
Prompting module 16
Interrupt module 17
Removing module 18
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention will be described in detail.It should be noted that in the case where not conflicting, presently filed embodiment and reality Applying the feature in mode can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, described embodiment Only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area The every other embodiment that those of ordinary skill is obtained under the premise of creative work is not made, belongs to guarantor of the present invention The scope of shield.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Fig. 1 is the flow chart of the long-range guard method of the first embodiment of the present invention, the long-range guard method application In a first terminal and the second terminal of being mutually related.As shown in figure 1, the long-range guard method can include following step Suddenly:
Step 101:One first terminal obtains the administration authority of a second terminal.
In present embodiment, second terminal is a communication device, such as a landline telephone, a mobile phone or a tablet personal computer, energy Enough remove electricity or incoming call answering.Second terminal can carry out telephone relation, first terminal for a kinsfolk (such as old man or child) , can be whole to second for another kinsfolk (guardian of such as old man or child) for an electronic equipment (such as computer, mobile phone) The call at end is monitored.In other embodiments, first terminal can be carried out for call of the third party to second terminal Monitoring.
First terminal is communicated by communication network or wifi with second terminal.
After first terminal obtains the administration authority of the second terminal, first terminal can be carried out remotely to monitor and control (such as dropped calls, deleting message registration).
Electricity or incoming call answering is gone to trigger in the following way:The modes such as physical button, touch controlled key.
It is understood that the unlimited call type of telephone relation, can include normal voice call and telegraphone.
Step 102:Judge the incoming call of second terminal or go whether electricity belongs to the swindle number for prestoring or marking in advance, if It is then to perform step 103;Otherwise, continue executing with step 102 or terminate flow.
The swindle number for prestoring or marking in advance is to be stored in advance in the first terminal or the first terminal energy In the fraudulent call database of access.
The fraudulent call database, it is to be stored in advance in the first terminal.
The fraudulent call database, it is the fraudulent call database that the first terminal can access.
The swindle number that prestores is the telephone number of fraudulent call database purchase, can come from operator, public security The fraudulent call data of relevant department's issue or the fraudulent call data that public's report is obtained by internet.
The swindle number that marks in advance is the telephone number that fraudulent call database is marked, such as " area code+110 " The telephone number of form or the telephone number of 170,171 beginnings.
In one embodiment, be by the incoming call of second terminal or go electricity telephone number and a fraudulent call database in The telephone number to prestore be compared and the telephone number with being marked in advance in fraudulent call database compared with, to judge The incoming call of second terminal goes whether electricity belongs to swindle number.
Step 103:Monitor second terminal and the duration of call of the telephone number.
In one embodiment, be by a timer record converse at the beginning of between and terminate the time and to call carry out Timing.
Step 104:Judge whether the duration of call reaches preset duration, if it is, performing step 105;Otherwise, continue to hold Row step 104 terminates flow.
It is understood that the length of the preset duration of call can be set according to the telephone number in fraudulent call database The features such as the type put, institute possession are set.Such as set shorter to the call threshold value of the telegraphone from xx areas.
It is understood that the call threshold value can be set as any value as needed.
Step 105:Prompting message is sent to the second terminal by predetermined manner.
The predetermined manner includes at least one of following:Prompting described in display screen display in the second terminal Information;The voice of the prompting message is played using the playing device of institute's second terminal.
In one embodiment, reminded by the display screen of second terminal with the alerting pattern of text importing.For example, Show a swindle in the display screen of second terminal and remind window:" the phone XXXXXXX that you answered just now is probably fraudulent call, Other side is probably swindle one's share of expenses for a joint undertaking, it is noted that ".Word is reminded to be shown in second terminal in communication process.
In another embodiment, user is reminded with voice mode by the playing device of second terminal, for example, can broadcast Put one section of prompting recording material:" please note that the phone XXXXXXX that you are conversing is probably fraudulent call, other side is probably swindleness Deceive one's share of expenses for a joint undertaking ".
It is understood that voice reminder can be implemented by audio-frequency assembly, for example, audio-frequency assembly includes a Mike Wind (MIC), microphone are configured as receiving external audio signal (voice reminder).In certain embodiments, audio-frequency assembly also wraps A loudspeaker is included, for exports audio signal.
In other embodiments, text importing and speech play are used by the display screen and player of second terminal simultaneously Mode reminded.
Long-range guard method provided by the invention, to the incoming call of second terminal or electricity is gone to be monitored first terminal, when When the telephone number of second terminal call belongs to the swindle number for prestoring or marking in advance, and monitor the second terminal and institute The duration of call of telephone number is stated, prompting message is sent to the second terminal by predetermined manner, it is weak to avoid judgement People have dust thrown into the eyes, reduce the probability swindled.
Fig. 2 is the flow chart of the long-range guard method of second embodiment of the present invention, with the first embodiment party shown in Fig. 1 The main distinction of formula is:Also include interrupting the call of second terminal and delete the steps such as the message registration of second terminal.Such as Fig. 2 It is shown, the long-range guard method, it can also comprise the following steps:
Step 106:Interrupt the call of second terminal.
In one embodiment, the call can be interrupted.
In another embodiment, can be with the remote interrupt call.
In another embodiment, after voice message (such as " your call will be interrupted, and please hang up ") can be sent, then in The disconnected call.
Answer the telephone number in the user of second terminal and exceed preset duration, in addition also the behavior of active clawback when, Interrupt the call of second terminal.
Step 107:Delete the message registration of second terminal.
In order to prevent the user of second terminal from dialing the telephone number again, the message registration of second terminal can be carried out Delete.
It should be noted that in present embodiment, the order of above-mentioned step 106 and step 107 can be exchanged mutually, and be adjusted Step order after changing has no effect on the purpose and its effect of the invention to be reached.
It is understood that above-mentioned step 105, step 106 and step 107 can be carried out simultaneously, similarly, carry out simultaneously The step of have no effect on the of the invention purpose and its effect to be reached.
Fig. 3 is the flow chart of the long-range guard method of third embodiment of the present invention, with the first embodiment party shown in Fig. 1 The main distinction of formula is:Also include judging dialog context whether comprising steps such as presupposed informations.It is as shown in figure 3, described long-range Guard method, it may include steps of:
Step 1041:Judge whether dialog context includes presupposed information.
Whether identify in the dialog context of the second terminal includes presupposed information.
The presupposed information includes the sensitive vocabulary of swindle property, and sensitive vocabulary includes bank, remittance, account, personal letter At least one of breath, sale or distribution or combination.
In present embodiment, by speech recognition engine by telephone relation Content Transformation into text information;According to the text Whether telephone relation incoming call content includes the sensitive vocabulary of swindle property described in word information searching;If the incoming call content includes swindleness The sensitive vocabulary of property is deceived, then is fraudulent call.
In another embodiment, the sensitive vocabulary with swindle property can be prestored, speech recognition engine can be It is identified in communication process.
The long-range guard method of 3rd embodiment judges the step of whether dialog context includes presupposed information, further Improve the degree of accuracy of identification telephone fraud.
Fig. 4 is the flow chart of the long-range guard method of the 4th embodiment of the present invention, with the 3rd embodiment party shown in Fig. 3 The main distinction of formula is:Also include interrupting the call of second terminal and delete the steps such as the message registration of second terminal.Such as Fig. 4 It is shown, the long-range guard method, it may include steps of:
Step 106:Interrupt the call of second terminal.
In one embodiment, the call can be interrupted.
In another embodiment, can be with the remote interrupt call.
In another embodiment, after voice message (such as " your call will be interrupted, and please hang up ") can be sent, then in The disconnected call.
Answer the telephone number in the user of second terminal and exceed preset duration, in addition also the behavior of active clawback when, Interrupt the call of second terminal.
Step 107:Delete the message registration of second terminal.
In order to prevent the user of second terminal from dialing the telephone number again, the message registration of second terminal can be carried out Delete.
It should be noted that in present embodiment, the order of above-mentioned step 106 and step 107 can be exchanged mutually, and be adjusted Step order after changing has no effect on the purpose and its effect of the invention to be reached.
It is understood that above-mentioned step 105, step 106 and step 107 can be carried out simultaneously, similarly, carry out simultaneously The step of have no effect on the of the invention purpose and its effect to be reached.
Using the long-range guard method of the present invention, following scene can be achieved:
1), the user of second terminal receives swindle number or doubtful swindle number telephone dials and the duration of call is more than one Fix time, first terminal automatic identification and remind may other side be probably swindle one's share of expenses for a joint undertaking, so as to reduce user's quilt of second terminal Swindle probability.
2), when the user of second terminal actively dials swindle number or doubtful swindle number telephone dials and the duration of call surpasses Spend certain time, first terminal automatic identification and remind may other side be probably swindle one's share of expenses for a joint undertaking, so as to reduce the use of second terminal Probability is swindled at family.
3), when the user of second terminal does not answer or hung soon swindle number or doubtful swindle number telephone, First terminal judges that the risk that the user of second terminal is swindled is smaller, does not deal with.
4), when the user of second terminal answer swindle number or it is doubtful swindle number telephone exceed the regular hour, even The also behavior of active clawback, first terminal judge that the user of second terminal is very big by fraud risk, and long-range guarding device is sent Remind, even forced interruption is conversed.
It is understood that more scenes are applied also for using the long-range guard method of the present invention, it is no longer excessive herein Narration.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart The execution sequence of square can change, and some squares can omit.
Fig. 5 is the exemplary functional block diagram of the long-range guarding device of an embodiment of the present invention.It is as shown in figure 5, remote Journey guarding device 100 includes administration authority acquisition module 11, memory module 12, comparison module 13, monitoring modular 14, judge module 15th, prompting module 16, interrupt module 17 and removing module 18.To the incoming call of second terminal or electricity is gone to supervise by first terminal Control, when the telephone number of second terminal call belongs to the swindle number for prestoring or marking in advance, and monitor described second eventually End and the duration of call of the telephone number, prompting message is sent by predetermined manner to the second terminal.It is achieved in:Far The telephone relation of range monitoring second terminal, to accurately identify fraudulent call, the people for avoiding judgement weak has dust thrown into the eyes.
It is understood that long-range guarding device 100 may also include display module and playing module, to realize corresponding work( Energy.
Terminal provided by the present invention is described below.
Fig. 6 is the schematic diagram for the terminal that an embodiment of the present invention provides.The terminal 1 of the embodiment includes:Processor 10th, memory 20 and the computer program that can be run in the memory 20 and on the processor 10 is stored in, such as The long-range guard method program of the present invention.The processor 10 realizes above-mentioned each embodiment when performing the computer program Long-range guard method in step, such as step 101 shown in Fig. 1 to Fig. 4 is to step 107.Or the processor 10 is held Realize that the function of each module in said apparatus embodiment, such as first terminal are come to second terminal during the row computer program Electricity goes electricity to be monitored, and when the telephone number of second terminal call belongs to the swindle number for prestoring or marking in advance, and supervises The duration of call of the second terminal and the telephone number is measured, prompting message is sent to second terminal by predetermined manner; Interrupt the call and delete message registration.
Exemplary, the computer program can be divided into one or more modules, one or more of moulds Block is stored in the memory, and by the computing device, to complete the present invention.One or more of modules can be with It is the series of computation machine programmed instruction section that can complete specific function, the instruction segment is used to describe the computer program in institute State the implementation procedure in terminal.For example, the computer program can be divided into administration authority acquisition module 11, memory module 12nd, comparison module 13, monitoring modular 14, judge module 15, prompting module 16, interrupt module 17 and removing module 18, each module Concrete function is as follows:
Administration authority acquisition module 11, available for the administration authority for realizing a first terminal one second terminal of acquisition;
Memory module 12, a fraudulent call database is stored, for prestoring the swindle for prestoring or marking in advance Number.
Comparison module 13, available for the second terminal incoming call or go electricity telephone number whether belong to prestore or The swindle number marked in advance;
Monitoring modular 14, available for the second terminal incoming call or go the telephone number of electricity to belong to and prestore or mark in advance During the swindle number of note, the duration of call of the second terminal and the telephone number is monitored;
Judge module 15, available for judging it is default whether the duration of call of the second terminal with the telephone number reaches Duration;
Prompting module 16, available for when the call of the second terminal and the telephone number reaches preset duration, lead to Cross predetermined manner and send prompting message to the second terminal.
Interrupt module 17, available for dropped calls.
Removing module 18, available for deleting message registration.
The terminal 1 can be mobile phone, landline telephone, tablet personal computer, palm PC etc. computing device.The end End 1 may include, but be not limited only to, processor 10, memory 20.It will be understood by those skilled in the art that the schematic diagram is only It is the restriction of the example of terminal, not structure paired terminal, parts more more or less than diagram can be included, or combine some Part, or different parts, such as the terminal 1 can also include input-output equipment, network access equipment, bus etc..
Alleged processor 10 can be CPU (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng the processor is the control centre of the terminal, utilizes various interfaces and the various pieces of the whole terminal of connection.
The memory 20 can be used for storing the computer program and/or module, the processor 10 by operation or The computer program and/or module being stored in the memory 20 are performed, and calls the data being stored in memory 20, Realize the various functions of the terminal 1.The memory 20 can mainly include storing program area and storage data field, wherein, deposit Storing up program area can storage program area, application program (such as sound-playing function, image player work(needed at least one function Can etc.) etc.;Storage data field can store uses created data (such as voice data, phone directory etc.) etc. according to mobile phone. In addition, memory 20 can include high-speed random access memory, nonvolatile memory can also be included, for example, it is hard disk, interior Deposit, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, Flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
If the integrated module of the terminal 1 realized in the form of SFU software functional unit and as independent production marketing or In use, it can be stored in a computer read/write memory medium.Based on such understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being performed by processor 10 The step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer program Code can be source code form, object identification code form, executable file or some intermediate forms etc..Computer-readable Jie Matter can include:Can carry any entity or device of the computer program code, recording medium, USB flash disk, mobile hard disk, Magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice Subtract, such as in some jurisdictions, electric carrier signal and electricity are not included according to legislation and patent practice, computer-readable medium Believe signal.
Embodiment of above is merely illustrative of the technical solution of the present invention and unrestricted, although the preferable embodiment party with reference to more than The present invention is described in detail formula, it will be understood by those within the art that, can be to technical scheme Modify or equivalent substitution should not all depart from the spirit and scope of technical solution of the present invention.

Claims (10)

  1. A kind of 1. long-range guard method, applied to first terminal and the second terminal of being mutually related, it is characterised in that methods described Including:
    The first terminal obtains the administration authority of second terminal;
    When the second terminal incoming call or go electricity telephone number belong to the swindle number for prestoring or marking in advance when, monitor institute State the duration of call of second terminal and the telephone number;
    If the call of the second terminal and the telephone number reaches preset duration, by predetermined manner to described second Terminal sends prompting message.
  2. 2. long-range guard method as claimed in claim 1, it is characterised in that the swindle number that prestores or mark in advance is It is stored in advance in the fraudulent call database that the first terminal or the first terminal can access.
  3. 3. long-range guard method as claimed in claim 1, it is characterised in that the predetermined manner include it is following at least one Kind:
    Prompting message described in display screen display in the second terminal;
    The voice of the prompting message is played using the playing device of institute's second terminal.
  4. 4. long-range guard method as claimed in claim 1, it is characterised in that sent by predetermined manner to the second terminal After the step of prompting message, methods described also includes:
    Interrupt the call of the second terminal and the telephone number.
  5. 5. long-range guard method as claimed in claim 1, it is characterised in that methods described is also included when the second terminal When sending a telegram here or go the telephone number of electricity to belong to the swindle number for prestoring or marking in advance, the dialog context of the second terminal is identified In whether include presupposed information, if the duration of call including the presupposed information and the second terminal exceed it is described default It is long, then send prompting message to the second terminal.
  6. 6. long-range guard method as claimed in claim 5, it is characterised in that the presupposed information includes the sensitivity of swindle property Vocabulary.
  7. 7. long-range guard method as claimed in claim 6, it is characterised in that the sensitive vocabulary of the swindle property includes silver At least one of row, remittance, account, personal information, sale or distribution or combination.
  8. A kind of 8. long-range guarding device, it is characterised in that including:
    Administration authority acquisition module, for realizing that a first terminal obtains the administration authority of a second terminal;
    Monitoring modular, for the second terminal incoming call or go electricity telephone number belong to the swindle for prestoring or marking in advance During number, the duration of call of the second terminal and the telephone number is monitored;And
    Prompting module, for when the call of the second terminal and the telephone number reaches preset duration, passing through default side Formula sends prompting message to the second terminal.
  9. 9. a kind of terminal, it is characterised in that the terminal includes processor, and the processor is used to perform what is stored in memory The step of long-range guard method as claimed in any of claims 1 to 7 in one of claims is realized during computer program.
  10. 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program The step of long-range guard method as claimed in any of claims 1 to 7 in one of claims is realized when being executed by processor.
CN201710763717.5A 2017-08-30 2017-08-30 Long-range guard method and device, terminal and storage medium Pending CN107580121A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710763717.5A CN107580121A (en) 2017-08-30 2017-08-30 Long-range guard method and device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710763717.5A CN107580121A (en) 2017-08-30 2017-08-30 Long-range guard method and device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN107580121A true CN107580121A (en) 2018-01-12

Family

ID=61030587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710763717.5A Pending CN107580121A (en) 2017-08-30 2017-08-30 Long-range guard method and device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107580121A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868501A (en) * 2019-11-13 2020-03-06 刘峰刚 Fraud prevention method based on voice recognition and fraud prevention hearing aid
CN112615967A (en) * 2020-12-18 2021-04-06 深圳市安络科技有限公司 Method, device and equipment for prompting fraud call
CN113067945A (en) * 2021-03-12 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for dissuading fraud calls

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004043051A1 (en) * 2002-11-06 2004-05-21 Telkom Sa Limited A telephone fraud prevention system
CN104010065A (en) * 2014-04-30 2014-08-27 小米科技有限责任公司 Telephone processing method and device
CN104602242A (en) * 2015-01-22 2015-05-06 北京瑞思明科技有限公司 Method and device for preventing voice phishing
CN104602240A (en) * 2014-12-19 2015-05-06 百度在线网络技术(北京)有限公司 Phone fraud prevention method and device
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004043051A1 (en) * 2002-11-06 2004-05-21 Telkom Sa Limited A telephone fraud prevention system
CN104010065A (en) * 2014-04-30 2014-08-27 小米科技有限责任公司 Telephone processing method and device
CN104602240A (en) * 2014-12-19 2015-05-06 百度在线网络技术(北京)有限公司 Phone fraud prevention method and device
CN104602242A (en) * 2015-01-22 2015-05-06 北京瑞思明科技有限公司 Method and device for preventing voice phishing
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868501A (en) * 2019-11-13 2020-03-06 刘峰刚 Fraud prevention method based on voice recognition and fraud prevention hearing aid
CN112615967A (en) * 2020-12-18 2021-04-06 深圳市安络科技有限公司 Method, device and equipment for prompting fraud call
CN113067945A (en) * 2021-03-12 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for dissuading fraud calls

Similar Documents

Publication Publication Date Title
CN104380254B (en) The quick method and terminal for starting application service
CN102316203B (en) Based on the harassing call prevention method of cloud computing, device and mobile terminal
CN103888581B (en) A kind of communication terminal and its method for recording call-information
US20140192965A1 (en) Method for blocking illegal prerecord messages (robocalls)
CN106161749B (en) Malicious telephone identification method and device
CN102131143A (en) Method and mobile terminal for sending distress message
CN107580121A (en) Long-range guard method and device, terminal and storage medium
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN105263126B (en) Short-message verification method, apparatus and system
CN104660806A (en) Information reminding method and device
CN105100363A (en) Information processing method, information processing device and terminal
CN103428328B (en) A kind of method and system of Lookup protocol mobile terminal loudness
CN104023110A (en) Voiceprint recognition-based caller management method and mobile terminal
CN103052044A (en) Unknown incoming call processing method and mobile terminal
CN108021932A (en) Data detection method, device and electronic equipment
US20170034330A1 (en) Method and Device to Operate Phone with a Single Key
CN108632437A (en) A kind of information processing method and device, a kind of device for information processing
CN108777749B (en) Fraud call identification method and device
CN105554325B (en) Blacklist number processing method and mobile terminal
CN105635414A (en) Method and device for screening incoming calls
CN110010135A (en) A kind of voice-based personal identification method, device and electronic equipment
JP2006279506A (en) Radio communication system, management server, mobile radio terminal, and alarm mode control method
TWI548256B (en) Contact identification system and method
CN107040547A (en) Method, device and the terminal device of administrator password
CN104427091A (en) Phone fraud prevention system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180112

RJ01 Rejection of invention patent application after publication