CN108881648A - A kind of number hold-up interception method and terminal - Google Patents

A kind of number hold-up interception method and terminal Download PDF

Info

Publication number
CN108881648A
CN108881648A CN201810526064.3A CN201810526064A CN108881648A CN 108881648 A CN108881648 A CN 108881648A CN 201810526064 A CN201810526064 A CN 201810526064A CN 108881648 A CN108881648 A CN 108881648A
Authority
CN
China
Prior art keywords
communicating
terminal
service
destinations traffic
module
Prior art date
Application number
CN201810526064.3A
Other languages
Chinese (zh)
Inventor
陈立
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to CN201810526064.3A priority Critical patent/CN108881648A/en
Publication of CN108881648A publication Critical patent/CN108881648A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Abstract

The embodiment of the present invention provides a kind of number hold-up interception method and terminal, is related to field of communication technology, and the accuracy to solve the problems, such as current harassing and wrecking hold-up interception method is poor.This method includes:Receive the destinations traffic message that destinations traffic number is sent;If the destinations traffic number is identical as the first number of first identifier is carried in the number library of the terminal, and at the time of receiving the destinations traffic message in the first preset time period, the destinations traffic message is then prompted the user with, which is used to indicate the terminal and does not intercept to the communication information that the corresponding number of the first identifier is sent in first preset time period;Communicating number in the number library is labeled communicating number.

Description

A kind of number hold-up interception method and terminal

Technical field

The present embodiments relate to field of communication technology more particularly to a kind of number hold-up interception method and terminals.

Background technique

With the development of communication technology, the communications such as telemarketing or telephone fraud harassing and wrecking are more and more frequent.

The frequency that current harassing and wrecking hold-up interception method, mainly server are marked by counting a number by different user, And judge whether the labeled frequency of the number is more than threshold value, and if the labeled frequency of the number is more than threshold value, service The number is added in harassing and wrecking number library by device, and server can be with the harassing and wrecking number in instruction terminal synchronized update terminal Library.In this way, terminal can be intercepted to come from and is somebody's turn to do when terminal receives the incoming call or short message of the number in harassing and wrecking number library The incoming call or short message or terminal of number can show the number for harassing and wrecking number to user.

However, if user needs triggering terminal and some numbers (such as the electricity of some house property medium within certain time Talk about number) communication, and the number is exactly the number in the harassing and wrecking number library in terminal, then according to current harassing and wrecking interception side Method, due to terminal carry out harassing and wrecking intercept when can to from the number short message or incoming call permanently intercepted, lead Family of applying can not receive short message or incoming call from the number at all, i.e., the accuracy of current harassing and wrecking hold-up interception method compared with Difference.

Summary of the invention

The embodiment of the present invention provides a kind of number hold-up interception method and terminal, to solve the accurate of current harassing and wrecking hold-up interception method The poor problem of property.

In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:

In a first aspect, being applied to terminal the embodiment of the invention also provides a kind of number hold-up interception method, this method includes: Receive the destinations traffic message that destinations traffic number is sent;If carrying first in the number library of the destinations traffic number and the terminal First number of mark is identical, and is then prompted the user at the time of receive the destinations traffic message in the first preset time period The destinations traffic message, it is not corresponding to the first identifier in first preset time period which is used to indicate the terminal Number send communication information intercept;Communicating number in the number library is labeled communicating number.

Second aspect, the embodiment of the present invention provide a kind of number hold-up interception method, are applied to server, and this method includes:It connects Communication information is received, which is the communication information that the first communicating number is sent to the second communicating number, first messenger Code is virtual communication number;According to the communication information, the first host address of first communicating number is obtained;Determine this first In the case that host address is harassing and wrecking address, indicate first communicating number for harassing and wrecking number to terminal.

The third aspect, the embodiment of the invention provides a kind of terminal, which includes:Receiving module and cue module;It should Receiving module, for receiving the destinations traffic message of destinations traffic number transmission;The cue module, if being used for the destinations traffic number Code is identical as carrying the first number of first identifier in the number library of the terminal, and the at the time of receive the destinations traffic message In one preset time period, then the destinations traffic message is prompted the user with, it is first pre- at this which is used to indicate the terminal If not intercepted to the communication information that the corresponding number of the first identifier is sent in the period;Communicating number in the number library is quilt The communicating number of label.

Fourth aspect, the embodiment of the invention provides a kind of server, which includes:Receiving module obtains module And indicating module;The receiving module, for receiving communication information, which is that the first communicating number is sent to the second communication The communication information of number, first communicating number are virtual communication number;The acquisition module, for being received according to the receiving module The communication information, obtain the first host address of first communicating number;The indicating module, for determining first host In the case that address is harassing and wrecking address, indicate first communicating number for harassing and wrecking number to terminal.

5th aspect the embodiment of the invention provides a kind of terminal, including processor, memory and is stored in the memory Computer program that is upper and can running on the processor, realizes such as first aspect when which is executed by the processor The step of described number hold-up interception method.

6th aspect the embodiment of the invention provides a kind of server, including processor, memory and is stored in the storage On device and the computer program that can run on the processor, such as second party is realized when which is executed by the processor Described in face the step of number hold-up interception method.

7th aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, and number as described in first aspect or second aspect is realized when which is executed by processor The step of code hold-up interception method.

In embodiments of the present invention, terminal is after receiving the destinations traffic message that destinations traffic number is sent, if target is logical Signal code is identical as the first number of first identifier is carried in the number library of terminal, and the at the time of receive destinations traffic message In one preset time period, then terminal prompts the user with destinations traffic message, since it is pre- first that first identifier is used to indicate terminal If not intercepting to the communication information that the corresponding number of first identifier is sent in the period, therefore terminal can be made according in terminal Number library in the first identifier of carrying determine and determine whether labeled number needs to prompt the user with by server Whether destinations traffic message, the practical application scene flexible choice that terminal is used according to different users need to be implemented Harassing and wrecking intercept, to improve the accuracy that harassing and wrecking intercept.

Detailed description of the invention

Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;

Fig. 2 is a kind of flow diagram one of number hold-up interception method provided in an embodiment of the present invention;

Fig. 3 is a kind of flow diagram two of number hold-up interception method provided in an embodiment of the present invention;

Fig. 4 is a kind of flow diagram three of number hold-up interception method provided in an embodiment of the present invention;

Fig. 5 is a kind of possible structural schematic diagram one of server provided in an embodiment of the present invention;

Fig. 6 is a kind of possible structural schematic diagram two of server provided in an embodiment of the present invention;

Fig. 7 is a kind of possible structural schematic diagram one of terminal provided in an embodiment of the present invention;

Fig. 8 is a kind of possible structural schematic diagram two of terminal provided in an embodiment of the present invention;

Fig. 9 is a kind of possible structural schematic diagram three of terminal provided in an embodiment of the present invention;

Figure 10 is a kind of possible structural schematic diagram four of terminal provided in an embodiment of the present invention;

Figure 11 is a kind of hardware structural diagram of terminal of each embodiment of the present invention.

Specific embodiment

Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.

It should be noted that "/" herein indicate or the meaning, for example, A/B can indicate A or B;Herein "and/or" is only a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, it can To indicate:Individualism A exists simultaneously A and B, these three situations of individualism B." multiple " refer to two or more.

It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used Such as " word is intended to that related notion is presented in specific ways.

Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android (Android) operating system can be ios operating system, can also be other possible operating systems, the embodiment of the present invention is not Make specific limit.

Below by taking Android operation system as an example, introduce applied by number hold-up interception method provided in an embodiment of the present invention Software environment.

As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system Runtime Library layer and Inner nuclear layer (is specifically as follows Linux inner core).

Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).

Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program In the case where principle, some application programs are developed based on application framework layer.

System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system Border.

Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.

By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The software program of number hold-up interception method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that The number hold-up interception method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can lead to It crosses and runs software program realization number hold-up interception method provided in an embodiment of the present invention in Android operation system.

For ease of description, the number library in the number library of the server in the embodiment of the present invention and in terminal is to include Labeled number library, the communicating number in number library can be for by the communicating number of user's mark, or server mark The communicating number of note, communicating number can be marked as harassing and wrecking, business distribution, swindle, express delivery, take-away, house property medium etc., this hair In bright embodiment, it is illustrated so that the above-mentioned type of user's mark is harassing and wrecking number as an example, repeats no more below.

Embodiment one

The number hold-up interception method in the embodiment of the present invention is illustrated below with reference to Fig. 2, Fig. 2 mentions for the embodiment of the present invention A kind of number hold-up interception method flow diagram supplied, as shown in Fig. 2, the number hold-up interception method process includes step 201- step 203:

Step 201, server receive communication information.

Wherein, which is the communication information that the first communicating number is sent to the second communicating number, the first messenger Code is virtual communication number.

It should be noted that the communication information in the embodiment of the present invention includes that the first communicating number is sent out to the second communicating number The request message of foundation communication connection when caller is played, also may include the first communicating number sends short message to the second communicating number Or the forwarding message of multimedia message.

In general, some service sides generate virtual communication number using virtual-number generator, different users is received The harassing and wrecking number from the same service side arrived is different.

Step 202, server obtain the first host address of the first communicating number according to communication information.

Optionally, the host address in the embodiment of the present invention can be physical address, Internet protocol (Internet Protocol Address, IP) address or operator be the access device that virtual calling side provides ID, wherein physical address Also referred to as the address MAC layer (Media Access Control, MAC), the embodiment of the present invention do not limit this specifically It is fixed.

Step 203, determine the first host address for harassing and wrecking address in the case where, server to terminal instruction first communication Number is harassing and wrecking number.

Number hold-up interception method provided in an embodiment of the present invention, server receive the first communicating number and are sent to the second messenger The communication information of code, wherein the first communicating number is virtual communication number, since server obtains first according to communication information First host address of communicating number, in the case where determining the first host address to harass address, server is indicated to terminal First communicating number is harassing and wrecking number, and it is harassing and wrecking number that server instruction terminal can be made, which to prompt the user with the virtual-number, Code, improves the accuracy of number interception, and improves the accuracy that harassing and wrecking intercept.

In a kind of possible implementation, above-mentioned number hold-up interception method further includes step 204- step before step 201 206:

The second communicating number that step 204, server receiving terminal are sent, the second communicating number are virtual communication number.

It should be noted that the second communicating number is the number of labeled user's mark.

Step 205, server obtain the second host address of the second communicating number.

Specifically, server can determine that this is logical according to a communicating number and the corresponding communication connection of the communicating number The host address of signal code.

Step 206, in the case where meeting target preset condition, server determine the second host address for harassing and wrecking address.

Optionally, host address can be added to destination address after determining the second host address for harassing and wrecking address by server In library, server can determine whether a contact number is the corresponding contact number of host address in destination address library.

Wherein, target preset condition includes following one kind:Second communicating number meets the first preset condition, server The corresponding virtual communication number of the second host address meets the second preset condition and the second communicating number and target in number library Virtual communication number meets third preset condition, and destination virtual communicating number is all virtual communications in the number library of server Number.

Specifically, the second communicating number meets the first preset condition, including:First time number is greater than or equal to the first default threshold Value, first number are the number that the second communicating number is labeled.

It should be noted that the first preset threshold can choose the threshold value that harassing and wrecking are judged whether it is with common number, it can also To determine a value according to other judgment rules, the present invention is not especially limit this.

Specifically, the corresponding virtual communication number of the second host address meets the second default item in the number library of server Part, including:Second number is greater than or equal to the second preset threshold, second number in the number library of server with the second host Labeled the sum of the number of the corresponding each virtual communication number in location.

It is understood that multiple virtual-numbers can be generated in a host address, although different virtual-numbers is each Labeled number may not be able to be greater than the first preset threshold, but all labeled virtual-number of a host address Number and can exceed that and can be determined as after certain threshold value harassing host.

Specifically, the second communicating number and destination virtual communicating number meet third preset condition, including:Second messenger The call features of code meet the first sub- preset condition, and the similarity between the second communicating number and destination virtual communicating number is full The second sub- preset condition of foot.

Wherein, the first sub- preset condition includes that the caller frequency (i.e. calling frequency) of the second communicating number in the unit time is big In or equal to call threshold, the duration of call mean value (i.e. call duration) of each caller of the second communicating number less than or equal to call Duration threshold value and the ring duration mean value of each caller of the second communicating number are less than or equal to ring duration threshold value.Second son is pre- If condition includes that the first quantity is greater than or equal to third predetermined threshold value or the second quantity more than or equal to the 4th preset threshold.

First quantity is in destination virtual communicating number, and number length destination virtual identical with the second communicating number communicates In number, the communicating number similarity between destination virtual communicating number and the second communicating number is greater than or equal to number similarity The quantity of the virtual communication number of threshold value;Second quantity is the region in destination virtual communicating number between the second communicating number Similarity is greater than or equal to the quantity of region similarity threshold.

Illustratively, for calling frequency, call duration, ring duration, following parameter can be calculated separately:Most probable value (tM), the most probable number of calls, most probable call duration, most probable ring duration.Maximum value (t0), maximum calling Number, longest call duration, longest ring duration.The smallest value (tp), minimum number of calls, most short call duration, most short vibration Bell duration.Further calculate mean valueAnd standard deviationIt is established by mean value and standard deviation Normal distribution model, when new digit calling frequency, call duration, ring duration in normal distribution for the sum of probability> 250%, then it is judged to harassing number.When new digit calling frequency, call duration, ring duration in normal distribution for it is general The sum of rate>200%, and number similarity>90%, or/and in the multiple spot TOP50 is harassed, then be judged to harassing number.

In practical application, optionally, in order to simplify practical application terminal treatment process, above-mentioned condition can be arranged Certain sequence, it is assumed that communicating number 1 is a harassing and wrecking number, such as flow chart as shown in Figure 3, be can include but is not limited to Following steps:

Terminal detects that the first operation of user, the first operation are that communicating number (being denoted as number 1) is labeled as disturbing by user Disturb number.Terminal to server sends labeled number 1.

Step 301, server receiving number 1 judge whether number 1 is virtual communication number.

It should be noted that being determined whether to meet harassing and wrecking according to existing method if number 1 is common communicating number The feature of number.

Step 302, server determine that number 1 is that virtual-number then obtains host address 1 (i.e. the first host address), then really It is fixed whether to meet target preset condition:

T1:The first object number of number 1 is obtained, if first object number is greater than or equal to the first preset threshold, is taken Business device determines that host address 1 meets default feature.

T2:If first object number obtains the second targeted number, if the second targeted number is greater than less than the first preset threshold Or being equal to the second preset threshold, then server determines that host address 1 meets default feature.

T3:If the second targeted number is less than the second preset threshold, if the second communicating number and destination virtual communicating number are full Sufficient third preset condition, then server determines that host address 1 meets default feature.

Step 303, server determination meet preset condition, it is determined that host address 1 is harassing and wrecking host address.

Optionally, after step 303, the above method further includes step 304.

Host address 1 is added in harassing and wrecking host address library by step 304, server.

Number 1 is added in harassing and wrecking number library by server, and updates the harassing and wrecking number library in each terminal.Server connects Receive communication information after according to harassing and wrecking one number of address base prompt terminal whether be harassing and wrecking number.Terminal is true according to harassing and wrecking number library Whether fixed incoming call or short message need to intercept.

Based on the program, server determines the first host address according to the first communicating number first, and can be according to above-mentioned The condition of appointing judges whether the first host address of the first communicating number is harassing and wrecking address.

Embodiment two:

Fig. 4 is a kind of number hold-up interception method flow diagram provided in an embodiment of the present invention, below with reference to Fig. 4 to the present invention Number hold-up interception method in embodiment two is illustrated, including step 401- step 402:

Step 401, terminal receive the destinations traffic message that destinations traffic number is sent.

It should be noted that destinations traffic number can may be common communicating number for virtual communication number, this Inventive embodiments are not especially limited this.

Communicating number transmission short message that optionally, destinations traffic message can bind to terminal for destinations traffic number, The communication information that caller is formed can be issued for the communicating number of destinations traffic number and terminal binding, the embodiment of the present invention is to this It is not especially limited.

If step 402, destinations traffic number are identical as the first number of first identifier is carried in the number library of terminal, and connect At the time of receiving destinations traffic message in the first preset time period, then terminal prompts the user with destinations traffic message.

Wherein, first identifier is used to indicate terminal and does not send to the corresponding number of first identifier in the first preset time period Communication information intercept;Communicating number in number library is labeled communicating number.

Based on the program, terminal is after receiving the destinations traffic message that destinations traffic number is sent, if destinations traffic number It is identical as the first number of first identifier is carried in the number library of terminal, and receive default first at the time of destinations traffic message In period, then terminal prompts the user with destinations traffic message, since first identifier is used to indicate terminal in the first preset time The communication information that the corresponding number of first identifier is sent is not intercepted in section, therefore terminal can be made according to the number in terminal The first identifier of carrying in library determines that determining whether labeled number needs to prompt the user with target by server leads to Believe message, whether the practical application scene flexible choice that terminal is used according to different users, which needs to be implemented harassing and wrecking, is blocked It cuts, to improve the accuracy that harassing and wrecking intercept.

Optionally, number hold-up interception method provided in an embodiment of the present invention, step further includes step 403 after step 402:

If first terminal is according to pre- at the time of step 403, reception destinations traffic message not in the first preset time period If interception rule interception target communication information.

It should be noted that if the destinations traffic message that destinations traffic number is sent is the corresponding communication information of short message, then Preset rules in terminal can be to intercept short message, and intercepting short message can be to be stored in short message in the interface that harassing and wrecking intercept, It can be and do not receive short message;If the destinations traffic message that destinations traffic number is sent is the communication that destinations traffic number corresponds to caller Message, then preset rules, which can be, shows that the number is marked as harassing and wrecking number, this number of rejection in destinations traffic number incoming call Code, the number incoming call prompting sound are directly hung up for mute, number incoming call, and the present invention is not especially limit this.

Based on the program, if at the time of terminal judgement receives destinations traffic message not in the first preset time period, really The communicating number that sets the goal needs to be intercepted, and terminal is according to the regular interception target communication information of preset interception.

Optionally, number hold-up interception method provided in an embodiment of the present invention, before step 401, step further includes step 404- step 406:

Step 404, terminal obtain historical behavior information.

Wherein, historical behavior information indicates the historical behavior of user's using terminal in the second preset time period.

It should be noted that the second history preset time period can be the period of any one time span, when starting Between point can start the time point used for terminal, can also be the time point of recent months most started, the present invention is implemented Example is not especially limited this.

Step 405, terminal determine at least a kind of event according to historical behavior information.

Wherein, at least a kind of event provides service by N number of service side, and N is positive integer.

It should be noted that terminal can determine that user whithin a period of time may be used according to the historical behavior of user's using terminal Which behavior can be done, may thereby determine which service side user needs provide service.

For example, at least a kind of event that terminal determines is looked for for user and being rented a house, then terminal can determine that multiple house property mediums are Above-mentioned N number of service side, if at least a kind of time that terminal determines is that user wishes purchase insurance, terminal can determine multiple guarantors Dangerous company is above-mentioned N number of service side.

Step 406, terminal are to belong to the communicating number of each service side in N number of service side in number library to add the respectively One mark.

It should be noted that for ease of operation, for terminal in N number of service side that same batch determines, first identifier can To select identical mark, i.e. the first preset time period can be identical, it is of course also possible to empirically determined different service side The first identifier of corresponding communicating number addition is not identical, and the present invention is not especially limit this.

Optionally, the communicating number of each service side belonged in N number of service side can also be removed number library by terminal, single Solely it is stored in other memory spaces of terminal.

Based on the program, terminal can determine some possible events occurred, terminal according to the historical behavior information of user The communicating number addition first identifier of the service side of service will be provided in number library for these events that may occur, can be made Terminal changes the interception mode of harassing and wrecking number, the reality that terminal is used according to different users according to the needs of users Whether application scenarios flexible choice, which needs to be implemented harassing and wrecking, intercepts, the user experience of accuracy and user that the harassing and wrecking of raising intercept.

Optionally, number hold-up interception method provided in an embodiment of the present invention further includes after step 406 step 407:

Step 407 adds first identifier in the communicating number that terminal is each service side belonged in N number of service side respectively In third preset time period later, if terminal is not communicated with the communicating number for belonging to destination service side, terminal deletion is to belong to The first identifier that communicating number in destination service side adds respectively.

Wherein, destination service side is at least one service side in N number of service side.

Optionally, after the first preset time period, terminal deletion is to belong to the communicating number of destination service side to add respectively The first identifier added.

Optionally, if terminal will belong to after the communicating number removal number library of each service side in N number of service side After the first segment time, terminal can also move into the communicating number of removal in number library again.Terminal, which can continue to intercept, to be moved into Harassing and wrecking number.

Based on the program, terminal adds first in the communicating number of each service side to belong in N number of service side respectively In third preset time period after mark, if terminal is not communicated with the communicating number for belonging to destination service side, then it represents that user It may not be needed the service of destination service side, then terminal deletion is first for belonging to the communicating number of destination service side and adding respectively It identifies, so that terminal can determine the mode for intercepting harassing and wrecking number according to user behavior, increases the accurate of harassing and wrecking interception Property.

Fig. 5 is a kind of possible structural schematic diagram of server provided in an embodiment of the present invention, as shown in figure 5, server 50 Including:Receiving module 501 obtains module 502 and indicating module 503;Receiving module 501, for receiving communication information, communication disappears Breath is the communication information that the first communicating number is sent to the second communicating number, and the first communicating number is virtual communication number;It obtains Module 502, for obtaining the first host address of the first communicating number according to the received communication information of receiving module 501;Instruction Module 503, for being indicated to terminal in the case where determining that obtaining the first host address that module 502 obtains is harassing and wrecking address First communicating number is harassing and wrecking number.

Optionally, in conjunction with Fig. 5, as shown in fig. 6, server 50 further includes determining module 504;Receiving module 501, is also used to The second communicating number that terminal is sent is received, the second communicating number is virtual communication number;Module 502 is obtained, is also used to obtain Second host address of the second communicating number;Determining module 504, in the case where meeting target preset condition, determination to be obtained The second host address that modulus block 502 obtains is harassing and wrecking address, and target preset condition includes following one kind:Second communicating number Meet the first preset condition, it is default to meet second for the corresponding virtual communication number of second host address in the number library of server 50 Condition and the second communicating number and destination virtual communicating number meet third preset condition, and destination virtual communicating number is service All virtual communication numbers in the number library of device 50.

Optionally, the second communicating number meets the first preset condition, including:First time number is greater than or equal to the first default threshold Value, first number are the number that the second communicating number is labeled;The corresponding void of second host address in the number library of server 50 Quasi- communicating number meets the second preset condition, including:Second number is greater than or equal to the second preset threshold, and second number is service Labeled the sum of the number of each virtual communication number corresponding with the second host address in the number library of device 50;Second messenger Code and destination virtual communicating number meet third preset condition, including:It is pre- that the call features of second communicating number meet the first son If condition, and the similarity between the second communicating number and destination virtual communicating number meets the second sub- preset condition.

Server 50 provided in an embodiment of the present invention can be realized each mistake that server is realized in above method embodiment Journey, to avoid repeating, which is not described herein again.

Fig. 7 is a kind of possible structural schematic diagram of terminal provided in an embodiment of the present invention, as shown in fig. 7, terminal 70 includes: Receiving module 701 and cue module 702;Receiving module 701, for receiving the destinations traffic message of destinations traffic number transmission; Cue module 702, if it is identical as the first number of first identifier is carried in the number library of terminal for destinations traffic number, and connect At the time of receiving the reception destinations traffic message of module 701 in the first preset time period, then destinations traffic message is prompted the user with, the One mark is used to indicate the communication information that terminal 70 does not send the corresponding number of first identifier in the first preset time period and blocks It cuts;Communicating number in number library is labeled communicating number.

Optionally, in conjunction with Fig. 7, as shown in figure 8, terminal 70 further includes blocking module 703;Blocking module 703, if for connecing It receives at the time of module 701 receives destinations traffic message not in the first preset time period, is then intercepted according to preset interception rule Destinations traffic message.

Optionally, in conjunction with Fig. 7, as shown in figure 9, terminal 70 further includes obtaining module 704, determining module 705 and addition mould Block 706;Module 704 is obtained, for obtaining historical behavior information, historical behavior information indicates that user makes in the second preset time period With the historical behavior of terminal 70;Determining module 705, for determining at least according to the historical behavior information that module 704 obtains is obtained A kind of event, at least a kind of event provide service by N number of service side, and N is positive integer;Adding module 706, for in number library The communicating number of each service side belonged in N number of service side adds first identifier respectively.

Optionally, in conjunction with Fig. 8, as shown in Figure 10, terminal 70 further includes removing module 707;Removing module 707 is used for Adding module 706 is that the communicating number of each service side belonged in N number of service side adds third after first identifier respectively In preset time period, if not communicating with the communicating number for belonging to destination service side, deleting is the communication for belonging to destination service side The first identifier that number adds respectively, destination service side are at least one service side in N number of service side.

Terminal 70 provided in an embodiment of the present invention can be realized each process that terminal is realized in above method embodiment, be It avoids repeating, which is not described herein again.

A kind of hardware structural diagram of Figure 11 terminal of each embodiment to realize the present invention, terminal 100 include but not It is limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, the components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.This field Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Figure 11, and terminal may include than diagram More or fewer components perhaps combine certain components or different component layouts.In embodiments of the present invention, terminal packet Include but be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..

Wherein, radio frequency unit 101, for receiving the destinations traffic message of destinations traffic number transmission;Processor 110 is used If it is identical to carry the first number of first identifier in the number library of destinations traffic number and terminal, and receives destinations traffic message At the time of in the first preset time period, then prompt the user with destinations traffic message, first identifier is used to indicate terminal first The communication information that the corresponding number of first identifier is sent is not intercepted in preset time period;Communicating number in number library is to be marked The communicating number of note.

Terminal provided in an embodiment of the present invention, terminal receive destinations traffic number send destinations traffic message after, if Destinations traffic number in the number library of terminal carry the first number of first identifier it is identical, and receive destinations traffic message when It is engraved in the first preset time period, then terminal prompts the user with destinations traffic message, since first identifier is used to indicate terminal and exists In first preset time period not to the corresponding number of first identifier send communication information intercept, therefore can make terminal according to The first identifier of the carrying in number library in terminal determine by server determine labeled number whether need to Family prompts destinations traffic message, the practical application scene flexible choice that terminal is used according to different users whether need It executes harassing and wrecking to intercept, to improve the accuracy that harassing and wrecking intercept.

It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set Standby communication.

Terminal provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..

Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound Frequency output unit 103 includes loudspeaker, buzzer and receiver etc..

Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.

Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.

Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.

User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or nearby touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071 Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072. Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Key etc.), trace ball, mouse, operating stick, details are not described herein.

Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 11, touch panel 1071 and aobvious Show that panel 1061 is the function that outputs and inputs of realizing terminal as two independent components, but in certain embodiments, The function that outputs and inputs that touch panel 1071 and display panel 1061 can be integrated and be realized terminal, does not limit specifically herein It is fixed.

Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it Between transmit data.

Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.

Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 110.

Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, thus by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.

In addition, terminal 100 includes some unshowned functional modules, details are not described herein.

Preferably, the embodiment of the present invention also provides a kind of terminal, and in conjunction with Figure 11, including processor 110, memory 109 is deposited The computer program that can be run on memory 109 and on processor 110 is stored up, which is executed by processor 110 Each process of the above-mentioned number hold-up interception method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here It repeats no more.

The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned number hold-up interception method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk Or CD etc..

It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.

Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.

The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of number hold-up interception method is applied to terminal, which is characterized in that the method includes:
Receive the destinations traffic message that destinations traffic number is sent;
If the destinations traffic number is identical as the first number of first identifier is carried in the number library of the terminal, and receives institute At the time of stating destinations traffic message in the first preset time period, then the destinations traffic message is prompted the user with, described first Mark is used to indicate the terminal and does not lead to the corresponding number transmission of the first identifier in first preset time period Believe message block;Communicating number in the number library is labeled communicating number.
2. the method according to claim 1, wherein the method also includes:
If at the time of receiving the destinations traffic message not in first preset time period, according to preset interception rule Intercept the destinations traffic message.
3. the method according to claim 1, wherein the method is also wrapped before receiving destinations traffic message It includes:
Historical behavior information is obtained, the historical behavior information indicates the history row of user's using terminal in the second preset time period For;
Determine that at least a kind of event, at least a kind of event provide service by N number of service side according to the historical behavior information, N is positive integer;
First mark is added respectively to belong to the communicating number of each service side in N number of service side in the number library Know.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
After the first identifier is added respectively in the communicating number of each service side to belong in N number of service side In three preset time periods, if not communicated with the communicating number for belonging to destination service side, delete to belong to the destination service side The first identifier added respectively of communicating number, the destination service side is at least one of described N number of service side clothes Business side.
5. a kind of number hold-up interception method is applied to server, which is characterized in that the method includes:
Communication information is received, the communication information is the communication information that the first communicating number is sent to the second communicating number, described First communicating number is virtual communication number;
According to the communication information, the first host address of first communicating number is obtained;
In the case where determining first host address to harass address, indicate that first communicating number is harassing and wrecking to terminal Number.
6. according to the method described in claim 5, it is characterized in that, before the reception communication information, the method also includes:
The second communicating number that terminal is sent is received, second communicating number is virtual communication number;
Obtain the second host address of second communicating number;
In the case where meeting target preset condition, second host address is determined as harassing and wrecking address, the target presets item Part includes following one kind:Second communicating number meets the first preset condition, the described in the number library of the server The corresponding virtual communication number of two host address meets the second preset condition and second communicating number and destination virtual is logical Signal code meets third preset condition, and the destination virtual communicating number is all virtual logical in the number library of the server Signal code.
7. according to the method described in claim 5, it is characterized in that, second communicating number meets the first preset condition, packet It includes:
First number is greater than or equal to the first preset threshold, and first number is time that second communicating number is labeled Number;
The corresponding virtual communication number of second host address described in the number library of the server meets the second preset condition, packet It includes:
Second number is greater than or equal to the second preset threshold, second number in the number library of the server with described the Labeled the sum of the number of the corresponding each virtual communication number of two host address;
Second communicating number and destination virtual communicating number meet third preset condition, including:
The call features of second communicating number meet the first sub- preset condition, and second communicating number and the target Similarity between virtual communication number meets the second sub- preset condition.
8. a kind of terminal, which is characterized in that the terminal includes:Receiving module and cue module;
The receiving module, for receiving the destinations traffic message of destinations traffic number transmission;
The cue module, if first for carrying first identifier in the number library of the destinations traffic number and the terminal Number is identical, and at the time of the receiving module reception destinations traffic message in the first preset time period, then to user The destinations traffic message is prompted, the first identifier is used to indicate the terminal in first preset time period not to institute The communication information that the corresponding number of first identifier is sent is stated to intercept;Communicating number in the number library is labeled messenger Code.
9. terminal according to claim 8, which is characterized in that the terminal further includes blocking module;
The blocking module, if default not described first at the time of receiving the destinations traffic message for the receiving module In period, then the destinations traffic message is intercepted according to preset interception rule.
10. terminal according to claim 8, which is characterized in that the terminal further includes obtaining module, determining module and adding Add module;
The acquisition module, for obtaining historical behavior information, the historical behavior information indicates to use in the second preset time period The historical behavior of family using terminal;
The determining module, the historical behavior information for being obtained according to the acquisition module determine at least a kind of event, At least a kind of event provides service by N number of service side, and N is positive integer;
The adding module, for for the communicating number of each service side belonged in N number of service side in the number library The first identifier is added respectively.
11. terminal according to claim 10, which is characterized in that the terminal further includes removing module;
The removing module, in the messenger that the adding module is each service side belonged in N number of service side Code is added respectively in the third preset time period after the first identifier, if illogical with the communicating number that belongs to destination service side Letter is then deleted to belong to the first identifier that the communicating number of the destination service side adds respectively, the destination service side For at least one service side in N number of service side.
12. a kind of terminal, which is characterized in that the terminal includes processor, memory and is stored on the memory and can The computer program run on the processor realizes such as claim when the computer program is executed by the processor Described in any one of 1-4 the step of number hold-up interception method.
CN201810526064.3A 2018-05-29 2018-05-29 A kind of number hold-up interception method and terminal CN108881648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810526064.3A CN108881648A (en) 2018-05-29 2018-05-29 A kind of number hold-up interception method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810526064.3A CN108881648A (en) 2018-05-29 2018-05-29 A kind of number hold-up interception method and terminal

Publications (1)

Publication Number Publication Date
CN108881648A true CN108881648A (en) 2018-11-23

Family

ID=64335326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810526064.3A CN108881648A (en) 2018-05-29 2018-05-29 A kind of number hold-up interception method and terminal

Country Status (1)

Country Link
CN (1) CN108881648A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075639A (en) * 2009-11-24 2011-05-25 中国移动通信集团上海有限公司 Method and device for intercepting malicious call in international service communication network
CN102438243A (en) * 2010-09-29 2012-05-02 上海粱江通信系统股份有限公司 Method for identifying harassing phone call by analyzing frequency of phone call
US8817960B2 (en) * 2012-11-12 2014-08-26 Nvideon, Inc. Automated attendant for a private telephone system
CN104284031A (en) * 2014-11-05 2015-01-14 格科微电子(上海)有限公司 Speech communication method, communication terminal and server
CN104349324A (en) * 2013-11-15 2015-02-11 上海触乐信息科技有限公司 Mobile terminal number intelligent protection system and method
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
EP3091717A1 (en) * 2015-05-08 2016-11-09 Harry Sykes Telephone call control system and method
CN106385693A (en) * 2016-09-22 2017-02-08 长沙创客软件有限公司 Telecommunication fraud method for virtual number segments
CN107018504A (en) * 2017-02-21 2017-08-04 阿里巴巴集团控股有限公司 Communication means, blacklist collocation method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075639A (en) * 2009-11-24 2011-05-25 中国移动通信集团上海有限公司 Method and device for intercepting malicious call in international service communication network
CN102438243A (en) * 2010-09-29 2012-05-02 上海粱江通信系统股份有限公司 Method for identifying harassing phone call by analyzing frequency of phone call
US8817960B2 (en) * 2012-11-12 2014-08-26 Nvideon, Inc. Automated attendant for a private telephone system
CN104349324A (en) * 2013-11-15 2015-02-11 上海触乐信息科技有限公司 Mobile terminal number intelligent protection system and method
CN104284031A (en) * 2014-11-05 2015-01-14 格科微电子(上海)有限公司 Speech communication method, communication terminal and server
EP3091717A1 (en) * 2015-05-08 2016-11-09 Harry Sykes Telephone call control system and method
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
CN106385693A (en) * 2016-09-22 2017-02-08 长沙创客软件有限公司 Telecommunication fraud method for virtual number segments
CN107018504A (en) * 2017-02-21 2017-08-04 阿里巴巴集团控股有限公司 Communication means, blacklist collocation method and device

Similar Documents

Publication Publication Date Title
CN108111675A (en) Processing method, device and the mobile terminal of notification message
CN105897917B (en) Multi-medium data sharing method and device
CN107566661A (en) The reminding method and mobile terminal of a kind of notification message
CN108845853A (en) A kind of application program launching method and mobile terminal
CN109918930A (en) A kind of information protecting method and terminal device
CN108111678B (en) A kind of information cuing method and mobile terminal
CN109379484A (en) A kind of information processing method and terminal
CN109525704A (en) A kind of control method and mobile terminal
CN108897486A (en) A kind of display methods and terminal device
CN108628521A (en) A kind of screen operating method and mobile terminal
CN109189298A (en) A kind of language switching method and terminal
CN108197934A (en) A kind of method of payment and terminal device
CN108540645A (en) A kind of operating method and mobile terminal of mobile terminal
CN108347512A (en) A kind of personal identification method and mobile terminal
CN108595237A (en) A kind of method and terminal of display content
CN108540655A (en) A kind of caller identification processing method and mobile terminal
CN108334265A (en) A kind of document handling method and mobile terminal
CN108897482A (en) A kind of information display method and terminal device
CN107808107A (en) A kind of application message display methods and mobile terminal
CN107835495A (en) A kind of message prompt method, device and mobile terminal
US10298590B2 (en) Application-based service providing method, apparatus, and system
CN110474841A (en) The route processing method and terminal device of service request
CN110177296A (en) A kind of video broadcasting method and mobile terminal
CN110170170A (en) A kind of information display method and terminal device
CN110007821A (en) A kind of operating method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination