CN108924840B - Blacklist management method and device and terminal - Google Patents

Blacklist management method and device and terminal Download PDF

Info

Publication number
CN108924840B
CN108924840B CN201810671684.6A CN201810671684A CN108924840B CN 108924840 B CN108924840 B CN 108924840B CN 201810671684 A CN201810671684 A CN 201810671684A CN 108924840 B CN108924840 B CN 108924840B
Authority
CN
China
Prior art keywords
numbers
blacklist
segment
call
marked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810671684.6A
Other languages
Chinese (zh)
Other versions
CN108924840A (en
Inventor
杨开敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810671684.6A priority Critical patent/CN108924840B/en
Publication of CN108924840A publication Critical patent/CN108924840A/en
Application granted granted Critical
Publication of CN108924840B publication Critical patent/CN108924840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a blacklist management method, a device and a terminal, wherein the method comprises the following steps: analyzing the number in the blacklist database, and extracting the characteristic information of the number; the characteristic information includes: the location of the home, the number segment; classifying the numbers with the same characteristic information to obtain a target number segment; and setting the number conforming to the target number segment as a blacklist number. Therefore, the suspicious telephone numbers can be checked in advance, the probability of harassment by the numbers with the same characteristics is reduced, and the user experience is good.

Description

Blacklist management method and device and terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a terminal for blacklist management.
Background
With the development of communication technology, the number of users communicating using terminals is increasing. With the increase of the number of users, many lawbreakers can carry out advertisement promotion in the modes of telephone, short message and the like, and bring much trouble to the life and work of people. Therefore, a blacklist management function is arranged in many terminals to shield crank calls and spam messages.
Currently, there are two main ways to implement blacklist management: one is to download blacklist management software, such as 360 mobile phone guards, hundred mobile phone guards, Tencent mobile phone steward, etc., in which a number label library is set, some known numbers are labeled as harassing calls (such as types of express delivery, etc.), and when the calling number received by the user is the number in the label library, the corresponding number feature is displayed, so that the user can decide whether to answer the call according to the displayed feature. The other is that the number in the call record is marked through the self-carried function of the mobile phone, for example, the function of 'preventing the incoming call number' is set, and when the user answers the call and finds that the calling number is a harassing call, the number can be set to prevent the incoming call.
However, this first approach requires constant updates to the installed software and it relies on the accuracy of the software markup library; the second approach requires the user to make manual settings after answering the call. The efficiency of updating the harassing telephone numbers in the two modes is low, the use is inconvenient, and the user experience is poor.
Disclosure of Invention
The invention provides a blacklist management method, a blacklist management device and a blacklist management terminal, which are used for realizing the pre-investigation of suspicious telephone numbers, reducing the probability of harassment by numbers with the same characteristics and achieving good user experience.
In a first aspect, an embodiment of the present invention provides a blacklist management method, including:
analyzing the number in the blacklist database, and extracting the characteristic information of the number; the characteristic information includes: the location of the home, the number segment;
classifying the numbers with the same characteristic information to obtain a target number segment;
and setting the number conforming to the target number segment as a blacklist number.
Optionally, before setting the number conforming to the target number segment as a blacklist number, the method further includes:
and pushing the target number segment to a user, and setting the number conforming to the target number segment as a blacklist number after receiving the confirmation information of the user.
Optionally, after classifying the numbers with the same feature information to obtain the target number segment, the method further includes:
and when the user receives the number conforming to the target number segment, generating prompt information on a display interface of the terminal or directly shielding the call of the corresponding number.
Optionally, the method further comprises:
acquiring a calling number in a call record of a user;
screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
Optionally, the classifying the numbers with the same feature information to obtain the target number segment includes:
classifying the numbers in the blacklist database according to the attribution to obtain number subsets belonging to different attributions;
analyzing the numbers in the number subset, and screening out the numbers with the same number segment;
and if the number with the same number segment is greater than a preset threshold value, taking the number segment as a target number segment.
In a second aspect, an embodiment of the present invention provides a blacklist management apparatus, including:
the analysis module is used for analyzing the numbers in the blacklist database and extracting the characteristic information of the numbers; the characteristic information includes: the location of the home, the number segment;
the classification module is used for classifying the numbers with the same characteristic information to obtain a target number segment;
and the setting module is used for setting the number conforming to the target number segment as a blacklist number.
Optionally, the method further comprises:
and the confirmation module is used for pushing the target number segment to the user before setting the number conforming to the target number segment as the blacklist number, and setting the number conforming to the target number segment as the blacklist number after receiving the confirmation information of the user.
Optionally, the method further comprises:
and the processing module is used for generating prompt information or directly shielding the call of the corresponding number on a display interface of the terminal when a user receives the number conforming to the target number segment after classifying the numbers with the same characteristic information to obtain the target number segment.
Optionally, the method further comprises:
the acquisition module is used for acquiring a calling number in the call record of the user;
screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
Optionally, the classification module is specifically configured to:
classifying the numbers in the blacklist database according to the attribution to obtain number subsets belonging to different attributions;
analyzing the numbers in the number subset, and screening out the numbers with the same number segment;
and if the number with the same number segment is greater than a preset threshold value, taking the number segment as a target number segment.
In a third aspect, an embodiment of the present invention provides a terminal, including:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being configured to perform the method of any of the first aspects when the program is executed.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, including: computer program, which, when run on a computer, causes the computer to perform the method of any of the first aspects.
According to the blacklist management method, the blacklist management device and the terminal, the number in the blacklist database is analyzed, and the feature information of the number is extracted; the characteristic information includes: the location of the home, the number segment; classifying the numbers with the same characteristic information to obtain a target number segment; and setting the number conforming to the target number segment as a blacklist number. Therefore, the suspicious telephone numbers can be checked in advance, the probability of harassment by the numbers with the same characteristics is reduced, and the user experience is good.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of an application scenario of the present invention;
fig. 2 is a flowchart of a blacklist management method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a blacklist management apparatus according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a blacklist management apparatus according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
In the following, some terms in the present application are explained to facilitate understanding by those skilled in the art:
1) a Terminal (Terminal), also called a Terminal device, is a device located at the outermost periphery of a network in a computer network, and is mainly used for inputting user information and outputting a processing result. With the development of communication technology, the variety of terminal devices is increasing, and the terminal is no longer limited to computer networks, but may also be mobile networks, such as portable communication terminals, including: smart phones, smart watches, and the like.
2) The number segment refers to continuous N-digit numbers in the mobile phone number, for example, the mobile phone number used in China is 11 digits, wherein each segment has different coding directions: the first 3 bits are network identification numbers; the 4 th to 7 th bits are regional codes; digits 8-11 are the subscriber number.
Fig. 1 is a schematic structural diagram of an application scenario of the present invention, and as shown in fig. 1, a blacklist database is stored in a local memory of a terminal 1, and a mobile phone number marked as a harassing call is stored in the blacklist database. Specifically, the terminal 1 may screen out the numbers that have been marked as the blacklist from the calling numbers and add these numbers to the blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application. Analyzing the number in the blacklist database, and extracting the characteristic information of the number; and classifying the numbers with the same characteristic information to obtain a target number segment. In one embodiment, when the terminal is called, the terminal 1 displays a calling number, and if the number segment of the calling number is the same as a certain target number segment analyzed in the blacklist database, a prompt message is generated on a display interface. The prompt message may be a text prompt or a voice prompt. Specifically, as shown in fig. 1, a calling number and a corresponding text reminder "number segment repetition number is N, suspected harassing call" are displayed on a display interface of the terminal 1 at the same time, N is a natural number greater than 1, and a value of N may be adjusted according to an actual application situation. It should be noted that the present embodiment does not limit the specific form of the prompting message, and the specific content of the prompting message is set.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a blacklist management method according to an embodiment of the present invention, and as shown in fig. 2, the method in this embodiment may include:
s101, analyzing the numbers in the blacklist database, and extracting the feature information of the numbers.
Optionally, the calling number in the call record of the user may be acquired; screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
In this embodiment, the blacklist database refers to a local memory in the terminal for storing a blacklist, where the characteristic information includes: the location and size. It should be noted that the blacklist database of this embodiment is in a dynamic update state, and when the terminal is in a networking state, the number marked as a harassing call may be acquired from the cloud-end marking library of the interception application (e.g., a 360-security guard, a hundred-degree mobile phone guard, an Tencent mobile phone manager, etc.) according to a preset period or in real time. When the terminal is in an off-line state, the blacklist database can be updated according to the manual marking result of the user every time.
And S102, classifying the numbers with the same characteristic information to obtain a target number segment.
Optionally, classifying the numbers in the blacklist database according to attribution to obtain number subsets belonging to different attributions;
analyzing the numbers in the number subset, and screening out the numbers with the same number segment;
and if the number with the same number segment is greater than a preset threshold value, taking the number segment as a target number segment.
In this embodiment, the numbers in the blacklist database may be classified according to the 4 th to 7 th digits of the mobile phone number, that is, the mobile phone numbers with the same 4 th to 7 th digits of the mobile phone number are divided into a number subset. Each number subset contains at least 2 mobile phone numbers. And analyzing the numbers in each number subset, and screening out the numbers with the same number segment. The number section can be selected from any continuous N-bit number, wherein N is a natural number greater than 1. The value of N may be adjusted according to practical applications, and the value is not limited in this embodiment.
In one embodiment, if the number of the numbers with the same number segment is greater than a preset threshold, the number segment is taken as the target number segment. Specifically, assuming that the preset threshold is 5, when 5 numbers having the same number segment appear in the number subset, the number segment is regarded as the target number segment. The preset threshold value is set, so that misjudgment of the target number segment can be reduced, and error prompt caused to a user is avoided, so that the user misses a call.
Specifically, each segment of number in the mobile phone number contains different information, the mobile phone number in China generally contains 11 digits, and the first 3 digits are network identification numbers; the 4 th to 7 th bits are regional codes; digits 8-11 are the subscriber number. Therefore, the attribution information of the number can be directly known from the mobile phone number. Specifically, when a user answers a number with a calling number of 15513000021, the number is found to be a crank call after answering, and the number is manually marked as a blacklist number; then the user answers a number with the calling number of 15513000534, finds that the number is a crank call after answering, and manually marks the number as a blacklist number; the numbers 15513000021 and 15513000534 in the blacklist are found to have some similarities through number analysis, namely, they both belong to the 1551300XXXX number segment, so that the number of the 1551300 XXXXXX number segment is highly likely to be a marketing telephone uniformly handled by a certain marketing group. Therefore, segment No. 1551300XXXX can be considered as a target segment.
S103, setting the number conforming to the target number segment as a blacklist number.
In this embodiment, the number conforming to the target number segment may be set as a blacklist number. Taking the embodiment in step S102 as an example, after the terminal sets segment No. 1551300XXXX as a target number segment, all numbers that are the same as the top 7 digits of segment No. 1551300XXXX may be set as blacklist numbers.
Optionally, before setting the number conforming to the target number segment as a blacklist number, the method further includes:
and pushing the target number segment to a user, and setting the number conforming to the target number segment as a blacklist number after receiving the confirmation information of the user.
In one embodiment, after determining the target number segment, the terminal first prompts the user whether to set the number conforming to the target number segment as a blacklist number. Taking the embodiment in step S102 as an example, segment 1551300XXXX is used as the target segment after the user agrees, and the number meeting segment 1551300XXXX is added to the blacklist database. The terminal takes all numbers of the number section conforming to 1551300XXXX as blacklist numbers, and the user is not disturbed by the number of the number section; namely, when the user receives the number conforming to the target number segment, the call of the corresponding number is directly shielded.
In another embodiment, when the user receives the number corresponding to the target number segment, a prompt message is generated on a display interface of the terminal. Referring to fig. 1, a text reminding mode or a voice reminding mode may be used to remind the user that the incoming call number is a suspected harassing call.
In this embodiment, the numbers in the blacklist database are analyzed to extract the feature information of the numbers; the characteristic information includes: the location of the home, the number segment; classifying the numbers with the same characteristic information to obtain a target number segment; and setting the number conforming to the target number segment as a blacklist number. Therefore, the suspicious telephone numbers can be checked in advance, the probability of harassment by the numbers with the same characteristics is reduced, and the user experience is good.
Fig. 3 is a schematic structural diagram of a blacklist management apparatus according to a second embodiment of the present invention, and as shown in fig. 3, the apparatus in this embodiment may include:
the analysis module 10 is used for analyzing the numbers in the blacklist database and extracting the feature information of the numbers; the characteristic information includes: the location of the home, the number segment;
the classification module 20 is configured to classify numbers with the same characteristic information to obtain a target number segment;
and the setting module 30 is configured to set the number meeting the target number segment as a blacklist number.
Optionally, the classifying module 20 is specifically configured to:
classifying the numbers in the blacklist database according to the attribution to obtain number subsets belonging to different attributions;
analyzing the numbers in the number subset, and screening out the numbers with the same number segment;
and if the number with the same number segment is greater than a preset threshold value, taking the number segment as a target number segment.
The embodiment may execute the technical solution in the method shown in fig. 2, and the implementation process and the technical effect are similar to those of the method, which are not described herein again.
Fig. 4 is a schematic structural diagram of a blacklist management apparatus according to a third embodiment of the present invention, and as shown in fig. 4, the apparatus in this embodiment may further include, on the basis of the apparatus shown in fig. 3:
and the confirmation module 40 is configured to push the target number segment to the user before setting the number conforming to the target number segment as the blacklist number, and set the number conforming to the target number segment as the blacklist number after receiving confirmation information of the user.
Optionally, the method further comprises:
the processing module 50 is configured to, after the numbers with the same characteristic information are classified to obtain the target number segment, generate a prompt message on a display interface of the terminal or directly shield a call of the corresponding number when the user receives the number conforming to the target number segment.
Optionally, the method further comprises:
an obtaining module 60, configured to obtain a calling number in a call record of a user;
screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
The embodiment may execute the technical solution in the method shown in fig. 2, and the implementation process and the technical effect are similar to those of the method, which are not described herein again.
Fig. 5 is a schematic structural diagram of a terminal according to a fourth embodiment of the present invention, and as shown in fig. 5, the terminal 70 in this embodiment includes: a processor 71 and a memory 72;
the Memory 72 may include a volatile Memory (RAM), such as a Static Random Access Memory (SRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (DDR SDRAM), and the like; the memory may also include a non-volatile memory (english: flash memory), such as a Hard Disk Drive (HDD) or a solid-state drive (SSD); the memory may also comprise a combination of memories of the kind described above. The memory 72 is used to store computer programs (e.g., application programs, functional modules, etc. that implement the above-described blacklist management methods), computer instructions, etc., which may be stored in one or more of the memories 72 in a partitioned manner. And the above-mentioned computer program, computer instructions, data, etc. can be called by the processor 71.
A processor 71, configured to execute the computer program stored in the memory 72 to implement the steps in the method according to the above-mentioned embodiments. Reference may be made in particular to the description relating to the preceding method embodiment. The memory 72 and the processor 71 may be coupled by a bus 73. The processor 71 may be one or a combination of a Central Processing Unit (CPU), a Network Processor (NP), a data processor, an image processor, and a task processor. The processor 71 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof. Of course, the processor may also include hardware devices such as a single chip.
The embodiment may execute the technical solution in the method shown in fig. 2, and the implementation process and the technical effect are similar to those of the method, which are not described herein again.
In addition, embodiments of the present application further provide a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment performs the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A blacklist management method, comprising:
analyzing the number in the blacklist database, and extracting the characteristic information of the number; the characteristic information includes: the location of the home, the number segment; the blacklist database is in a dynamic updating state, and when the terminal is in a networking state, the number marked as a crank call can be acquired from a cloud marking library of the intercepting application according to a preset period or in real time;
classifying the numbers in the blacklist database according to the attribution to obtain number subsets belonging to different attributions;
analyzing the numbers in the number subset, and screening out the numbers with the same number segment; the number segment is any continuous N digits in the number, and N is a natural number greater than 1;
if the number of the number sections with the same number is larger than a preset threshold value, taking the number sections as target number sections;
and pushing the target number segment to a user, and setting the number conforming to the target number segment as a blacklist number after receiving the confirmation information of the user.
2. The method of claim 1, further comprising, after classifying numbers with the same feature information to obtain a target number segment:
and when the user receives the number conforming to the target number segment, generating prompt information on a display interface of the terminal or directly shielding the call of the corresponding number.
3. The method of claim 1, further comprising:
acquiring a calling number in a call record of a user;
screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
4. A blacklist management apparatus, comprising:
the analysis module is used for analyzing the numbers in the blacklist database and extracting the characteristic information of the numbers; the characteristic information includes: the location of the home, the number segment; the blacklist database is in a dynamic updating state, and when the terminal is in a networking state, the number marked as a crank call can be acquired from a cloud marking library of the intercepting application according to a preset period or in real time;
the classification module is used for classifying the numbers in the blacklist database according to attributions to obtain number subsets belonging to different attributions; analyzing the numbers in the number subset, and screening out the numbers with the same number segment; the number segment is any continuous N digits in the number, and N is a natural number greater than 1; if the number of the number sections with the same number is larger than a preset threshold value, taking the number sections as target number sections;
and the setting module is used for pushing the target number segment to a user and setting the number conforming to the target number segment as a blacklist number after receiving the confirmation information of the user.
5. The apparatus of claim 4, further comprising:
and the processing module is used for generating prompt information or directly shielding the call of the corresponding number on a display interface of the terminal when a user receives the number conforming to the target number segment after classifying the numbers with the same characteristic information to obtain the target number segment.
6. The apparatus of claim 4, further comprising:
the acquisition module is used for acquiring a calling number in the call record of the user;
screening out numbers which are marked as a blacklist from the calling numbers, and adding the numbers to a blacklist database; the number marked as the blacklist refers to a number which is judged as a crank call and marked after the user answers the call, and/or a number marked as a crank call in a mark library of the interception application.
7. A terminal for blacklist management, comprising:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being configured to perform the method of any of claims 1-3 when the program is executed.
CN201810671684.6A 2018-06-26 2018-06-26 Blacklist management method and device and terminal Active CN108924840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810671684.6A CN108924840B (en) 2018-06-26 2018-06-26 Blacklist management method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810671684.6A CN108924840B (en) 2018-06-26 2018-06-26 Blacklist management method and device and terminal

Publications (2)

Publication Number Publication Date
CN108924840A CN108924840A (en) 2018-11-30
CN108924840B true CN108924840B (en) 2022-02-01

Family

ID=64422616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810671684.6A Active CN108924840B (en) 2018-06-26 2018-06-26 Blacklist management method and device and terminal

Country Status (1)

Country Link
CN (1) CN108924840B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233943B (en) * 2019-06-18 2021-07-09 深圳市珍爱云信息技术有限公司 Method and device for acquiring number mark, computer equipment and storage medium
CN110602304B (en) * 2019-09-17 2021-06-11 卓尔智联(武汉)研究院有限公司 Information processing method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
US8971859B2 (en) * 2011-06-01 2015-03-03 Netqin Mobile (Beijing) Co., Ltd Method for blocking crank calls by using cloud computing and a system thereof
CN104869262A (en) * 2014-02-26 2015-08-26 北京搜狗科技发展有限公司 Method and device for intercepting terminal blacklist

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106954218B (en) * 2017-03-15 2019-08-30 中国联合网络通信集团有限公司 A kind of number sorted methods, devices and systems of harassing and wrecking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8971859B2 (en) * 2011-06-01 2015-03-03 Netqin Mobile (Beijing) Co., Ltd Method for blocking crank calls by using cloud computing and a system thereof
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN104869262A (en) * 2014-02-26 2015-08-26 北京搜狗科技发展有限公司 Method and device for intercepting terminal blacklist

Also Published As

Publication number Publication date
CN108924840A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN107566358B (en) Risk early warning prompting method, device, medium and equipment
CN106294105B (en) Brushing amount tool detection method and device
CN103763690A (en) Method and device for sending short messages to mobile terminal from detection fake base station
CN106911556B (en) Message reminding management method and terminal
US9596202B1 (en) Methods and apparatus for throttling electronic communications based on unique recipient count using probabilistic data structures
CN107426079A (en) A kind of processing method and processing device of informing message
CN104717674A (en) Number attribute recognition method and device, terminal and server
CN105718534A (en) Information pushing apparatus, information pushing method and client
CN108966158A (en) Note transmission method, system, computer equipment and storage medium
CN110611929A (en) Abnormal user identification method and device
CN108924840B (en) Blacklist management method and device and terminal
CN109858250A (en) A kind of Android Malicious Code Detection model method based on cascade classifier
CN106453062A (en) Application notification management method and terminal
CN101389085A (en) Rubbish short message recognition system and method based on sending behavior
CN110011898B (en) Reply method and device of e-mail, storage medium and computer equipment
US11622245B2 (en) Multi-channel caller ID database updates
CN107360331B (en) Short message display method
CN109168138A (en) The recognition methods for the number of changing, device and equipment in net
KR101426616B1 (en) Method of intercepting spam message and apparatus performing the same
CN112073308A (en) Information pushing method, device, equipment and computer readable storage medium
CN113727351B (en) Communication fraud identification method and device and electronic equipment
CN105681523A (en) Method and apparatus for sending birthday blessing short message automatically
CN113595884B (en) Message reminding method and application terminal
CN115905280A (en) Mobile phone number attribution operator query method, device, storage medium and equipment
CN109587353B (en) Method, device and storage medium for identifying short message number attribution information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant