CN109067994B - Hiding method of abuse number, storage medium and mobile terminal - Google Patents

Hiding method of abuse number, storage medium and mobile terminal Download PDF

Info

Publication number
CN109067994B
CN109067994B CN201810983468.5A CN201810983468A CN109067994B CN 109067994 B CN109067994 B CN 109067994B CN 201810983468 A CN201810983468 A CN 201810983468A CN 109067994 B CN109067994 B CN 109067994B
Authority
CN
China
Prior art keywords
abuse
mobile terminal
abuse number
operator
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810983468.5A
Other languages
Chinese (zh)
Other versions
CN109067994A (en
Inventor
李涛
张锐华
熊菲苇
杜凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201810983468.5A priority Critical patent/CN109067994B/en
Publication of CN109067994A publication Critical patent/CN109067994A/en
Application granted granted Critical
Publication of CN109067994B publication Critical patent/CN109067994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/28Number portability ; Network address portability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a abuse number hiding method, a storage medium and a mobile terminal, wherein the abuse number hiding method comprises the following steps: when the mobile terminal accesses the network, receiving an attachment acceptance message sent by an operator, wherein the attachment acceptance message carries a abuse number; distributing the abuse number to an application program with voice call permission; when an application calls a abuse number, the application controls the application not to add the abuse number to a corresponding database of the abuse number, so that the application does not display a communication record corresponding to the abuse number. The invention can acquire the abuse number of the place where the mobile terminal uses the operator by receiving the abuse number carried by the operator in the attached receiving message, so that the mobile terminal can hide the abuse number in any area, and convenience is brought to the use of a user.

Description

Hiding method of abuse number, storage medium and mobile terminal
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to a abuse number hiding method, a storage medium and a mobile terminal.
Background
Family violence, as a social phenomenon, is not alleviated or reduced as society develops. With the faster pace of life and the greater stress on people, the more and more the family is violent. In response to this situation, many countries have required the use of special numbers to assist victims suffering from family violence. Also, to avoid the perpetrator perceiving that the victim has dialed the special abuse number, it is desirable that the history of that number not be displayed in the call log.
Currently, mobile terminals are customized for specific abuse numbers of known countries when the mobile terminals leave the factory to ensure that call history of these numbers is not displayed in the call log when such numbers are dialed in these countries. And special abuse numbers for countries unknown to mobile terminal manufacturers are not handled. This allows the call log to show the dialing history of a particular abusive number when the user dials the abusive number in an area where the number is unknown. In addition, when dialing special abuse numbers through this application with dialing function when according to the application with dialing function (like the WeChat phonebook) in the mobile terminal, the application with dialing function handles special abuse numbers as ordinary numbers, and the use of giving the user brings inconvenience.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method for hiding a abuse number, a storage medium and a mobile terminal, aiming at the defects of the prior art, so as to solve the problem that the existing abuse number is not completely hidden.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a method of hiding abuse numbers, comprising:
when the mobile terminal accesses the network, receiving an attachment acceptance message sent by an operator, wherein the attachment acceptance message carries a abuse number;
distributing the abuse number to an application program with voice call permission;
when an application calls a abuse number, the application controls the application not to add the abuse number to a corresponding database of the abuse number, so that the application does not display a communication record corresponding to the abuse number.
The method for hiding the abuse number, wherein when the mobile terminal accesses the network, receiving the attachment acceptance message sent by the operator specifically comprises the following steps:
when the mobile terminal accesses the network, the mobile terminal sends an attachment request message to an operator;
acquiring a abuse number of a place where an operator is located through the operator, and sending an attachment acceptance message carrying the abuse number to the mobile terminal;
and receiving an attachment acceptance message sent by the operator.
The hiding method of the abuse number, wherein after receiving the attachment acceptance message sent by the operator, the method further comprises:
and acquiring a region identifier of the operator, and storing the abuse number and the region identifier in association.
The method of hiding of abuse numbers, wherein, it adopts preset format storage to adhere to the acceptance message the abuse numbers, wherein, preset format includes abuse number information element identifier at least, abuse number and abuse number information element length.
The method for hiding the abuse number comprises the step of enabling the last 4bits of the abuse number to be a 16-system number F when the length of the information element of the abuse number is an odd number.
The method for hiding the abuse number, wherein the distributing the abuse number to the application program with the voice call permission specifically comprises the following steps:
searching an application program with voice authority loaded by the mobile terminal;
and sending the abuse number to all searched application programs in a broadcast mode so that the application programs store the abuse number.
The method for hiding the abuse number, wherein when an application calls the abuse number, the application is controlled not to add the abuse number to a corresponding database of the abuse number, so that the application does not display the communication record corresponding to the abuse number and specifically comprises the following steps:
when an application program calls, judging whether a calling number corresponding to the call is a abuse number or not;
when being abuse number, control application does not will abuse number adds to its corresponding database to make the application does not show the communication record that abuse number corresponds.
The method for hiding the abuse number, wherein when an application program calls the abuse number, the application program is controlled not to add the abuse number to a corresponding database of the abuse number, so that the application does not display the corresponding communication record of the abuse number and then further comprises:
when a new application program of a device is monitored, detecting whether the new application program has a call authority;
when having the speech right, the abuse number is released to the new application program in a broadcast form so that the new application stores the abuse number.
A computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to perform the steps of the method for hiding abuse numbers as any one of the above.
A mobile terminal, comprising: the device comprises a processor, a memory and a communication bus, wherein the memory is stored with a computer readable program which can be executed by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the method of hiding abuse numbers as described in any of the above.
Has the advantages that: compared with the prior art, the invention provides a abuse number hiding method, a storage medium and a mobile terminal, wherein the abuse number hiding method comprises the following steps: when the mobile terminal accesses the network, receiving an attachment acceptance message sent by an operator, wherein the attachment acceptance message carries a abuse number; distributing the abuse number to an application program with voice call permission; when an application calls a abuse number, the application controls the application not to add the abuse number to a corresponding database of the abuse number, so that the application does not display a communication record corresponding to the abuse number. The invention can acquire the abuse number of the place where the mobile terminal uses the operator by receiving the abuse number carried by the operator in the attached receiving message, so that the mobile terminal can hide the abuse number in any area, and convenience is brought to the use of a user. Simultaneously, mobile terminal will receive the abuse number and issue to all application programs that have the conversation function, avoids third party dialing application to not know this special abuse number like this, and has exposed the victim and has used this application to dial the condition of special abuse number.
Drawings
Fig. 1 is a flowchart illustrating a method for hiding abuse numbers according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of step S10 in a preferred embodiment of the method for hiding abuse numbers according to the present invention.
Fig. 3 is a flowchart of step S20 in a preferred embodiment of the method for hiding abuse numbers according to the present invention.
Fig. 4 is a schematic structural diagram of a preferred embodiment of the mobile terminal according to the present invention.
Detailed Description
The present invention provides a method for hiding a abuse number, a storage medium and a mobile terminal, and in order to make the object, technical scheme and effect of the present invention clearer and clearer, the present invention will be further described in detail below by referring to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention will be further explained by the description of the embodiments with reference to the drawings.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for hiding abuse numbers according to a preferred embodiment of the present invention. The method comprises the following steps:
and S10, when the mobile terminal accesses the network, receiving an attachment acceptance message sent by the operator, wherein the attachment acceptance message carries a abuse number.
Specifically, the mobile terminal is a device that can access an operator network, for example, a mobile phone, an ipod with a SIM card function, and the like. The mobile terminal network access means that the mobile terminal loads an SIM card and accesses a network corresponding to the SIM, and the mobile terminal network access refers to that the mobile terminal accesses a network of an operator corresponding to the SIM. Attach and accept the message and be mobile terminal attaching in-process network side's attaching acceptance message, the abuse number is saved as the message parameter attach and accept the message to through it carries to attach and accept the message the abuse number. In addition, the abuse number is a telephone number specific to the region where the carrier is located, and the telephone number is used for being dialed by the abuse user to initiate the distress. That is, the operator can acquire a abuse number of a region where the operator is located, so that the abuse number can be added to an attachment acceptance message as a message parameter in a mobile terminal attachment process so that the mobile terminal can acquire the abuse number.
In addition, the abuse number may be actively added to the attachment acceptance message by the operator during the attachment of the mobile terminal, or may be added to the attachment acceptance message by the operator according to a request of the mobile terminal. In the present embodiment, for the configuration of mobile terminals different in adaptability, an operator is adopted to add a abuse number to an attachment acceptance message according to a request of the mobile terminal. Correspondingly, as shown in fig. 2, when the mobile terminal accesses the network, receiving the attach accept message sent by the operator specifically includes:
s11, when the mobile terminal accesses the network, the mobile terminal sends an attachment request message to the operator;
s12, acquiring a abuse number of the operator and sending an attachment acceptance message carrying the abuse number to the mobile terminal;
and S13, receiving the attachment acceptance message sent by the operator.
Specifically, the attachment request message is sent to the operator for the mobile terminal in the attachment process, and the attachment request message can carry a request for acquiring abuse numbers, so that the operator acquires abuse numbers of all regions of the operator according to the request and adds the abuse numbers as message parameters to the attachment acceptance message. That is, the operator acquires a abuse number of a region where the operator is located after receiving the attachment request message, and adds the acquired abuse number to the attachment acceptance message, so that the attachment acceptance message carries the abuse number.
Meanwhile, in the embodiment, the abuse number can be a selectable item in a message body of the attachment acceptance message, and the selectable item stores abuse number information in a preset format. The body of the attach accept message may take the form of Table 8.2.1.1 of 3GPP TS 24.301, the body of the attach accept message, and an option to store abuse numbers is added to the body. Selectable item adopts preset format storage abuse number, promptly abuse number adopts preset format storage, preset format includes abuse number information element identifier, abuse number and abuse number information element length at least. For example, the alternatives are in the format shown in the following table:
Figure DEST_PATH_IMAGE001
wherein, Information Element Identifier represents Information Element Identifier, specific differential Number represents abuse Number, specific differential Number IEI represents abuse Number Information Element Identifier, Length of specific differential Number IE contents represents Special abuse Number Information Element Length, Number digit 1 represents BCD code of first telephone Number, Number digit 2 represents BCD code of second telephone Number; number digit 3 represents the BCD code of the third-digit phone Number; number digit 4 indicates the BCD code of the fourth phone Number.
Number digit encodes according to the rule of predetermineeing for the operator of network side and obtains, wherein, predetermine the rule and can be for when abuse Number information element length is the odd Number, abuse Number 4bits last are 16 system Number F. For explaining the preset rule in detail, taking the IEI as a 16-ary Number 0x35 as an example, the Number digit obtained by encoding several abuse numbers according to the preset rule is explained. For example, if the abuse Number is 016, then Number digit is 350210F 6; the abuse Number is 3919, then Number digit is 35029391; the abuse Number is 1522 and Number digit is 35025122.
In addition, after the mobile terminal receives the attachment acceptance message, the mobile terminal analyzes the optional item configured by the attachment acceptance message and used for storing the abuse number, extracts the abuse number configured by the optional item, and extracts the abuse number which can be one or more. Simultaneously, mobile terminal acquires behind the abuse number can carry out relevance storage with the abuse number rather than the geographical position that corresponds to when calling, can be according to the district sign that geographical position corresponds and the accurate judgement of abuse number whether this call calls the abuse number. Correspondingly, after receiving the attach accept message sent by the operator, the method further includes:
and acquiring a region identifier of the operator, and storing the abuse number and the region identifier in association.
Specifically, the area sign does the area sign that the operator corresponds, mobile terminal can be according to the operator determines the area sign that the abuse number corresponds can make the abuse number correspond with the area that the operator of sending the abuse number corresponds like this, avoids mobile terminal to be in roaming state and the area sign that produces is inconsistent with the area sign that the abuse number was used the place. Simultaneously, after obtaining the region sign, will abuse number with the region sign is correlated with the storage, wherein, the region sign can be the area code in region, will abuse number and the area code of its corresponding region be correlated with the storage to make when calling, whether this call carries the area code can all be accurately confirmed. In addition, in order to avoid mobile terminal to save repeated abuse numbers, storing can also include before the abuse number that detects mobile terminal predetermines whether contain in the abuse number database and receive the abuse number to extract all abuse numbers that do not contain in predetermine the abuse number database, will extract all abuse numbers and store to predetermine the abuse number database to, so that have overlapping abuse numbers in the avoidance of predetermine the abuse number database.
And S20, distributing the abuse number to an application program with voice call permission.
Specifically, the distributing of the abuse number to the application program with the call permission is distributing the abuse number to the application program with the call permission in a broadcasting mode. The abuse number can be current received all abuse numbers, so that the application that has the conversation permission acquires all received abuse numbers, also can be to extract the abuse number that does not belong to preset abuse number database, with the step of reducing application depreciation, can also be according to receiving abuse number newer preset abuse number database, so that the application basis predetermine abuse number database that abuse number database replaces its self-carrying, make the application can acquire all abuse numbers that mobile terminal stored, improve accuracy and the comprehensiveness that the application hidden abuse number communication record.
Illustratively, as shown in fig. 3, the distributing the abuse number to the application with voice call permission specifically includes:
s21, searching an application program with voice authority loaded by the mobile terminal;
and S22, sending the abuse number to all searched application programs in a broadcast mode, so that the application programs store the abuse number.
Specifically, the mobile terminal searches for an application program with voice authority loaded by the mobile terminal, wherein the application program can be an application program configured by a manufacturer of the mobile terminal, such as a telephone; or may be a third party application such as a WeChat phonebook or the like.
S30, when the application calls the abuse number, controlling the application not to add the abuse number to the corresponding database of the abuse number, so that the application does not display the communication record corresponding to the abuse number.
Specifically, the control that the application program does not add the abuse number to the database corresponding to the abuse number means that the application program with the call permission set by the control manufacturer does not add the abuse number to the database corresponding to the abuse number, so that the application program does not display the communication record corresponding to the abuse number. Correspondingly, when application calls abuse numbers, control application will not add abuse numbers to its corresponding database to make the application not show the communication record that abuse numbers correspond specifically includes:
when an application calls a abuse number, detecting application attributes of the application, wherein the application attributes comprise a self-contained application and a third-party application;
when the application program is a self-contained application, controlling the application program not to add the abuse number to a corresponding database of the application program, so that the application does not display a communication record corresponding to the abuse number;
when the application program is the third party application, control according to preset control rule the application program carries out corresponding operation to make the use does not show the communication record that the abuse number corresponds.
Specifically, predetermine processing rule can be for direct control application will the abuse number adds to its corresponding database, also can send prompt information earlier third party application to make third application self-operation will the abuse number does not add to its corresponding database, and it can also produce the communication record of abuse number at third party application, and is automatic or will according to predetermineeing the condition the communication record is deleted to the action of calling abuse number is protected. The preset condition is that the communication record is generated for a preset time, for example, 10 seconds. Of course, in this embodiment, it is preferable that all application programs with conversation permission loaded to mobile terminal dial the abuse number and with the abuse number is not displayed in the conversation process, and after the conversation is finished, the communication record corresponding to the abuse number is not displayed.
In addition, when the application program calls, whether the called number is a abuse number or not needs to be judged, and the application program is controlled to execute corresponding operation only when the called number is the abuse number. Correspondingly, when application calls abuse numbers, control application will not add abuse numbers to its corresponding database to make the application not show the communication record that abuse numbers correspond specifically includes:
s31, when the application program calls, judging whether the calling number corresponding to the call is a abuse number;
s32, when being the abuse number, control application program will not add the abuse number to its corresponding database to make the application not show the communication record that the abuse number corresponds.
Specifically, the fact that the calling number is a abuse number means that the calling number is consistent with the abuse number, or the calling number is a combination of the abuse number and a region code. That is to say, when the calling number is obtained, will calling number carries out the analysis in order to draw the telephone number of not carrying the area code to carry the telephone number of area code for carrying and abuse number and carry out the comparison, with the accuracy that improves abuse number comparison, avoid the influence of area code to the comparison result.
In addition, in the mobile terminal use process, the operation that the terminal equipment loads the application program can be monitored, and whether preset abuse number data need to be synchronized to the application program or not is judged when monitoring. Correspondingly, when application calls abuse numbers, control application will not add the abuse numbers to its corresponding database to make the application not display still include after the communication record that the abuse numbers correspond:
s40, when a new application program of the device is monitored, detecting whether the new application program has the conversation authority;
s50, when having the speech right, issuing the abuse number to the new application in a broadcast form, so that the new application stores the abuse number.
The present invention also provides a mobile terminal, as shown in fig. 4, which includes at least one processor (processor) 20; a display screen 21; and a memory (memory) 22, and may further include a communication Interface (Communications Interface) 23 and a bus 24. The processor 20, the display 21, the memory 22 and the communication interface 23 can communicate with each other through the bus 24. The display screen 21 is configured to display a user guidance interface preset in the initial setting mode. The communication interface 23 may transmit information. The processor 20 may call logic instructions in the memory 22 to perform the methods in the embodiments described above.
Furthermore, the logic instructions in the memory 22 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 22, which is a computer-readable storage medium, may be configured to store a software program, a computer-executable program, such as program instructions or modules corresponding to the methods in the embodiments of the present disclosure. The processor 20 executes the functional application and data processing, i.e. implements the method in the above-described embodiments, by executing the software program, instructions or modules stored in the memory 22.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 22 may include a high speed random access memory and may also include a non-volatile memory. For example, a variety of media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, may also be transient storage media.
In addition, the specific processes loaded and executed by the storage medium and the instruction processors in the mobile terminal are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (7)

1. A method for hiding abuse numbers is characterized by comprising the following steps:
when the mobile terminal accesses the network, receiving an attachment acceptance message sent by an operator, wherein the attachment acceptance message carries a abuse number;
searching an application program with voice authority loaded by the mobile terminal;
sending the abuse number to all searched application programs in a broadcast mode so that the application programs can store the abuse number;
when an application program calls, judging whether a calling number corresponding to the call is a abuse number or not;
when the number is a abuse number, controlling the application program not to add the abuse number to a corresponding database of the abuse number so that the application does not display a communication record corresponding to the abuse number;
when a new application program of a device is monitored, detecting whether the new application program has a call authority;
when having the speech right, the abuse number is released to the new application program in a broadcast form so that the new application stores the abuse number.
2. The method for hiding abuse numbers according to claim 1, wherein the receiving the attachment acceptance message sent by the operator when the mobile terminal enters the network specifically comprises:
when the mobile terminal accesses the network, the mobile terminal sends an attachment request message to an operator;
acquiring a abuse number of a place where an operator is located through the operator, and sending an attachment acceptance message carrying the abuse number to the mobile terminal;
and receiving an attachment acceptance message sent by the operator.
3. The method for hiding abuse numbers according to claim 2, wherein said receiving an attach accept message sent by said operator further comprises:
and acquiring a region identifier of the operator, and storing the abuse number and the region identifier in association.
4. A method of hiding abuse numbers according to any of claims 1-3, wherein said attachment acceptance message stores said abuse numbers in a predetermined format, wherein said predetermined format includes at least abuse number information element identifiers, abuse numbers and abuse number information element lengths.
5. The method of hiding abuse numbers according to claim 4, wherein when the length of the abuse number information element is odd, the abuse number last 4bits is 16F.
6. A computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to perform the steps in the method of hiding abuse numbers according to any of claims 1-5.
7. A mobile terminal, comprising: a processor, a memory, and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the method of hiding abuse numbers according to any of claims 1-5.
CN201810983468.5A 2018-08-27 2018-08-27 Hiding method of abuse number, storage medium and mobile terminal Active CN109067994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810983468.5A CN109067994B (en) 2018-08-27 2018-08-27 Hiding method of abuse number, storage medium and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810983468.5A CN109067994B (en) 2018-08-27 2018-08-27 Hiding method of abuse number, storage medium and mobile terminal

Publications (2)

Publication Number Publication Date
CN109067994A CN109067994A (en) 2018-12-21
CN109067994B true CN109067994B (en) 2020-12-15

Family

ID=64757246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810983468.5A Active CN109067994B (en) 2018-08-27 2018-08-27 Hiding method of abuse number, storage medium and mobile terminal

Country Status (1)

Country Link
CN (1) CN109067994B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577891A (en) * 2008-08-22 2009-11-11 中兴通讯股份有限公司 Method and system for downloading emergency numbers of network side
CN102075903A (en) * 2010-11-25 2011-05-25 中兴通讯股份有限公司 Self-adaptive configuration method and device for mobile phone terminal
CN103002124B (en) * 2012-11-01 2015-09-02 小米科技有限责任公司 A kind of processing method of communication data, device
EP2932781B1 (en) * 2012-12-14 2017-08-09 Huawei Technologies Co., Ltd. Method for improving success rate of reaching emergency caller
CN104486521A (en) * 2014-12-12 2015-04-01 北京元心科技有限公司 Mobile phone alarm method and device

Also Published As

Publication number Publication date
CN109067994A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
US9924337B2 (en) Method and apparatus for processing emergency call of communication terminal
RU2524368C2 (en) Wireless communication device, method of providing access to wireless communication, base station and method of providing crossover to wireless communication network
KR101474881B1 (en) Method and system for displaying user-related information on user's handsets
EP1866792B1 (en) Wireless data exchange
US11134143B2 (en) Call processing method and mobile terminal
EP3096548A1 (en) Cloud identification method, device and system for double-card mobile communications device
WO2017166619A1 (en) Method and apparatus for determining emergency communication numbers, and electronic device
WO2012100454A1 (en) Mobile terminal and parameter setting method thereof
CN110868493A (en) Calling outgoing call control method and device
CN105050045B (en) A kind of control method and terminal of the SOT state of termination
EP2685781A1 (en) Mobile phone and method for processing received information thereof
WO2015117318A1 (en) Dialling method, device and terminal
CN112866984B (en) Call record synchronization method, cloud platform and terminal
CN107466022B (en) SIM card switching method, mobile terminal and storage medium
CN109067994B (en) Hiding method of abuse number, storage medium and mobile terminal
US9936060B2 (en) Apparatuses and methods for provisioning emergency services information
CN105979552B (en) Method and system for using manual PLMN selection mode
EP3210393B1 (en) Provisioning emergency services information using mappings and emergency services types
KR100839120B1 (en) Mobile phone and method for call processing thereof
CN113438352B (en) Dialing processing method, mobile terminal and computer readable storage medium
US10187744B2 (en) Simplified method for placing telephone call and simplified method for requesting location-based service
EP3509283B1 (en) Communication information hiding realization method and realization system
CN107528989B (en) Incoming call ringtone adjusting method, terminal and storage medium
CN111163204A (en) Dialing control method and device
CN104168388B (en) Information cuing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant