CN111010481B - Incoming call monitoring method, incoming call monitoring device and computer storage medium - Google Patents

Incoming call monitoring method, incoming call monitoring device and computer storage medium Download PDF

Info

Publication number
CN111010481B
CN111010481B CN201911294505.2A CN201911294505A CN111010481B CN 111010481 B CN111010481 B CN 111010481B CN 201911294505 A CN201911294505 A CN 201911294505A CN 111010481 B CN111010481 B CN 111010481B
Authority
CN
China
Prior art keywords
incoming call
terminal
answering
working mode
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911294505.2A
Other languages
Chinese (zh)
Other versions
CN111010481A (en
Inventor
罗占伟
米思远
范林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201911294505.2A priority Critical patent/CN111010481B/en
Publication of CN111010481A publication Critical patent/CN111010481A/en
Application granted granted Critical
Publication of CN111010481B publication Critical patent/CN111010481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to an incoming call monitoring method, an incoming call monitoring device and a computer storage medium. The incoming call monitoring method is applied to a terminal, the terminal is provided with a first working mode, and the incoming call monitoring method comprises the following steps: monitoring an incoming call in a first working mode; confirming that the incoming call is monitored in the first working mode, and prompting to input identity authentication information for answering the incoming call; and answering the incoming call in response to the passing of the authentication of the incoming call. By the incoming call monitoring method, when the terminal operates in different working modes, the terminal can answer the incoming call after identity confirmation according to the monitored incoming call, and unnecessary troubles caused by false answering can be reduced.

Description

Incoming call monitoring method, incoming call monitoring device and computer storage medium
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to an incoming call monitoring method, an incoming call monitoring apparatus, and a computer storage medium.
Background
With the continuous development of science and technology, terminals such as smart phones and the like become necessities of daily life of people. More and more children are also beginning to touch the terminals.
The child mode is a terminal working mode based on Andriod primary multi-user system development. And a child mode is set in the terminal, so that the use of part of application software in the terminal by children can be effectively limited. However, in the child mode, when the terminal receives a call, a child misconnection phenomenon is easily generated, which causes unnecessary trouble to parents.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides an incoming call monitoring method, an incoming call monitoring apparatus, and a computer storage medium.
According to a first aspect of the embodiments of the present disclosure, there is provided an incoming call monitoring method applied to a terminal, where the terminal is provided with a first working mode, and the incoming call monitoring method includes: and monitoring the incoming call in the first working mode. And determining that the incoming call is monitored in the first working mode, and prompting to input authentication information for answering the incoming call. And answering the incoming call in response to the passing of the authentication for answering the incoming call.
In one embodiment, a specific application is running in the first operating mode, and the method further includes: and when the incoming call is monitored, suspending the running of the application.
In another embodiment, the incoming call monitoring method further includes resuming running of the application after the completion of the incoming call listening is monitored.
In an embodiment, the prompting to input the authentication information for answering the incoming call includes: and displaying an identity verification interface, wherein the identity verification interface is used for a user to input identity verification information for answering the incoming call.
In another embodiment, the terminal is further provided with a second working mode, and the authentication information is authentication information for controlling the terminal to work in the second working mode.
In an embodiment, the incoming call monitoring method further includes: and sending an answering prompt for prompting to answer the incoming call through audio and/or video playing.
In an embodiment, the incoming call monitoring method further includes: and responding to the failure of the authentication for answering the incoming call, and keeping prompting to input the authentication information for answering the incoming call.
In one embodiment, the first operation mode is a child mode.
According to a second aspect of the embodiments of the present disclosure, there is provided an incoming call monitoring device applied to a terminal, where the terminal is provided with a first working mode, the incoming call monitoring device includes: and the monitoring module is used for monitoring the incoming call in the first working mode. And the prompting module is used for determining that the incoming call is monitored in the first working mode and prompting to input the authentication information for answering the incoming call. And the verification module is used for responding to the passing of the authentication of the incoming call and answering the incoming call.
In an embodiment, a designated application runs in the first operating mode, and the listening module is further configured to: and when the incoming call is monitored, suspending the running of the application.
In another embodiment, the listening module is further configured to: and after the call answering is monitored to be finished, the application is resumed to run.
In an embodiment, the prompting module prompts to input the authentication information for answering the incoming call in the following manner: and displaying an identity verification interface, wherein the identity verification interface is used for a user to input identity verification information for answering the incoming call.
In another embodiment, the terminal is further provided with a second working mode, and the authentication information is authentication information for controlling the terminal to work in the second working mode.
In one embodiment, the prompt module is further configured to: and sending an answering prompt for prompting to answer the incoming call through audio and/or video playing.
In an embodiment, the verification module is further configured to: and responding to the failure of the authentication for answering the incoming call, and keeping prompting to input the authentication information for answering the incoming call.
In one embodiment, the first operation mode is a child mode.
According to a third aspect of the embodiments of the present disclosure, there is provided an incoming call monitoring apparatus, including: a memory to store instructions; and the processor is used for calling the instruction stored in the memory to execute any one of the incoming call monitoring methods.
According to a fourth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium comprising: a non-transitory computer readable storage medium stores computer executable instructions that, when executed by a processor, perform any of the above-described incoming call listening methods.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the incoming call of the monitoring terminal in the first working mode is answered after identity confirmation according to the monitored incoming call, and unnecessary troubles caused by false connection can be reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flow chart illustrating a method of incoming call listening according to an example embodiment.
Fig. 2 is a flow chart illustrating another method of incoming call listening according to an example embodiment.
Fig. 3 is a flow chart illustrating yet another incoming call listening method in accordance with an exemplary embodiment.
Fig. 4 is a block diagram illustrating an incoming call listening device according to an example embodiment.
FIG. 5 is a block diagram illustrating an apparatus in accordance with an example embodiment.
FIG. 6 is a block diagram illustrating an apparatus in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
It should be noted that although the expressions "first", "second", etc. are used herein to describe different modules, steps, data, etc. of the embodiments of the present invention, the expressions "first", "second", etc. are merely used to distinguish between different modules, steps, data, etc. and do not indicate a particular order or degree of importance. Indeed, the terms "first," "second," etc. are used interchangeably throughout.
In the related art, a plurality of operation modes are set in the terminal, for example, a child mode and a normal mode are set. The terminal is matched with different users in different working modes, for example, the terminal is matched with children in a child mode for use. When the terminal is set with a plurality of working modes, the phenomenon that the incoming call is received by mistake is easily caused because whether a user receiving the incoming call is a correct receiver cannot be distinguished.
The present disclosure provides a method for monitoring incoming call, which monitors the incoming call of a terminal, and confirms the identity of a user using the terminal according to the working mode of the terminal, so that a correct receiver can answer the incoming call. The phenomenon of false answering can be effectively avoided, and unnecessary troubles are reduced.
In the present disclosure, a terminal may include: any one or more terminals capable of answering incoming calls, such as a mobile phone and a tablet, are not limited in the disclosure. The terminal comprises a plurality of working modes, such as: at least two working modes such as a master mode, a visitor mode and a child mode are required to be switched through working mode verification when the working modes are switched. The operation mode verification is, for example: the input of the correct authentication password, the input of the user fingerprint corresponding to the working mode, and the like are not limited in this disclosure. Different working modes aim at different terminal users, and different applications and the open authority of the terminal are displayed in different working modes. For example: if the current working mode of the terminal is the master mode, displaying all the applications added in the terminal; if the current working mode of the terminal is the visitor mode or the child mode, only part of applications which are set to be open by the user corresponding to the current working mode and part of application permissions which are set to be open are displayed in the terminal, for example: applications such as photo albums, WeChat, etc. cannot be accessed.
Fig. 1 is a flow chart illustrating a method of incoming call listening according to an example embodiment. As shown in fig. 1, the incoming call monitoring method 10 is applied to a terminal provided with a first operation mode, and includes the following steps S11 to S13.
In step S11, an incoming call is intercepted in the first operating mode.
In this embodiment of the present disclosure, the first operating mode is any one of a plurality of operating modes in the terminal, for example: a child mode. The first working mode is a working mode used by the current terminal, and the incoming call is monitored in the first working mode, so that whether a receiver answering the incoming call in the first working mode has the right of answering the incoming call or not can be distinguished conveniently. And when the receiver answering the incoming call in the first working mode does not have the right to answer the incoming call, the identity authentication is carried out through the identity authentication information, so that the correct receiver with the right to answer the incoming call can answer the incoming call, and the incoming call is prevented from being mistakenly answered.
In step S12, it is determined that the incoming call is heard in the first operation mode, and input of authentication information for answering the incoming call is prompted.
In the embodiment of the disclosure, after the terminal monitors the incoming call in the first working mode, the terminal prompts to input the authentication information for confirming the identity of the caller. The inputting of the authentication information for answering the incoming call may include: the input of the fingerprint of the user, the input of the terminal screen locking password, the input of the working mode switching password or the gesture input is not limited in the present disclosure.
In one embodiment, the authentication interface is displayed through a terminal screen, and the authentication information for inputting the incoming call is provided for the receiver in the authentication interface, so that the receiver can clearly input the authentication information and can quickly perform authentication. In an implementation scenario, the identity verification interface is overlaid on the incoming call display interface, and after the identity verification of the receiver passes, the receiver can autonomously select to answer the incoming call or refuse to answer the incoming call.
In another embodiment, the terminal is further provided with a second mode of operation. The identity authentication information can be used for confirming whether the current caller answering person has the answering authority or not, can also be used for controlling the working mode of the terminal, switching the current working mode into the second working mode and can also be used for controlling the screen locking of the terminal. The same authentication information is used for controlling multiple authorities of the terminal, which is beneficial to reducing the burden of terminal users for setting authentication and is convenient for easily controlling the terminal.
In step S13, the incoming call is answered in response to the authentication of the answered incoming call being passed.
In the embodiment of the present disclosure, based on the authentication information input by the recipient, after the authentication passes, the recipient can autonomously select to put through the incoming call or hang up the incoming call according to the response of the terminal. And if the identity authentication is passed, the user of the current terminal is the correct listener with the answering authority. Through the authentication, the phenomenon of misconnection of the incoming call can be effectively prevented.
In another embodiment, if the identity authentication of the received call is not passed, the prompt for inputting the identity authentication information is kept until the correct identity authentication information is input; or the incoming call is terminated, and the prompt of inputting the incoming call authentication information is cancelled, so that the phenomenon of mistaken receiving of the incoming call is avoided.
By the embodiment, the incoming call of the terminal in the first working mode is monitored, and the correct receiver with the receiving authority can answer the incoming call after the identity is confirmed according to the monitored incoming call, so that the situation that a terminal user mistakenly receives incoming calls of users in other working modes when the terminal operates in different working modes can be effectively prevented, the phenomenon of mistaken receiving of incoming calls is favorably reduced, and unnecessary troubles caused by mistaken receiving are reduced.
Fig. 2 is a flowchart illustrating another incoming call monitoring method according to an exemplary embodiment, and as shown in fig. 2, the incoming call monitoring method 20 includes the following steps S21 to S24.
In the embodiment of the present disclosure, the implementation manners of step S21, step S22, and step S24 are respectively the same as the implementation manners of step S11 to step S13 in the incoming call monitoring method 10, and are not described again here.
In step S21, an incoming call is intercepted in the first operating mode.
In step S22, it is determined that the incoming call is heard in the first operation mode, and input of authentication information for answering the incoming call is prompted.
In step S23, upon listening for incoming calls, the application in the first operating mode is suspended from running.
In the embodiment of the disclosure, when the terminal monitors an incoming call, the application running in the first working mode is suspended, and other applications in the first working mode cannot be used continuously. By suspending the application in the first operating mode, the operating space of the memory of the terminal is saved. In an implementation scenario, when the incoming call is monitored, the application running in the first working mode is paused and cached, so that after the incoming call is ended, when the user in the first working mode returns to the first working mode again, the application before the incoming call can be continuously used, and the user experience is favorably improved.
In step S24, the incoming call is answered in response to the authentication of the answered incoming call being passed.
By the embodiment, after the incoming call is monitored, the input of the authentication information is prompted, and meanwhile, the application running in the current working mode is suspended, so that the terminal memory is saved and the call quality is improved when a correct receiver answers the incoming call.
Fig. 3 is a flowchart illustrating still another incoming call monitoring method according to an exemplary embodiment, where, as shown in fig. 3, the incoming call monitoring method 30 is applied to a terminal, and the terminal is provided with a first operation mode, the incoming call monitoring method 30 includes the following steps S31 to S35.
In the embodiment of the present disclosure, the implementation manners of step S31, step S32, step S33, and step S34 are respectively the same as the implementation manners of step S21 to step S24 in the incoming call monitoring method 20, and are not described again here.
In step S31, an incoming call is intercepted in the first operating mode.
In step S32, it is determined that the incoming call is heard in the first operation mode, and the input of authentication information for answering the incoming call is prompted.
In step S33, upon listening for incoming calls, the application in the first operating mode is suspended from running.
In step S34, the incoming call is answered in response to the authentication of the answered incoming call being passed.
In step S35, after the end of the listening of the incoming call, the running application is resumed.
In the embodiment of the present disclosure, the ending of the incoming call includes: the incoming call stops or the recipient who passes the authentication hangs up the incoming call. After the incoming call is ended, the application which is suspended in the first working mode is recovered, so that the user corresponding to the first working mode can continue to use, the time for switching the working mode of the terminal is saved, the use of the user corresponding to the first working mode is facilitated, and the use experience of the incoming call on the first working mode used by the user of the first working mode is favorably reduced.
Through the embodiment, after the incoming call is monitored in the current working mode, the application running in the current working mode is suspended. And after the incoming call is authenticated and ended, the operation of the application in the current working mode is recovered, which is beneficial to avoiding the user corresponding to the current working mode from receiving the incoming call by mistake. Meanwhile, the influence of the incoming call on the application running in the current working mode can be reduced, and the user corresponding to the current working mode can continue to use the application after the incoming call is ended.
In any of the above incoming call monitoring methods, when an incoming call is monitored, an answer prompt may be played through an audio or video for prompting that the terminal is delivered to a correct recipient to answer, which is helpful for prompting a current user to deliver the terminal to the correct recipient, thereby avoiding an effect that the current user does not specify authentication information. The audio may include: a section of alert ring or a section of alert voice, which is not limited in this disclosure.
In any of the above incoming call monitoring methods, when monitoring an incoming call, a prompt is also made in a manner of combining audio and video for prompting the current user to submit the terminal to the correct receiver for answering, so that the current user can definitely submit the terminal to the correct receiver for answering.
In one implementation scenario, the first operation mode is a child mode, and the user is a child. The terminal is a mobile phone. When listening to an incoming call in the child mode, through popping up the animation and broadcasting the pronunciation, for example the pronunciation is: "get call, give mobile phone to dad and mom soon". At the same time, the application being used in the child mode is paused and other applications cannot continue to be used. In the interface of the mobile phone, only the prompt of inputting the authentication information is provided. After the parents take the mobile phone and the identity authentication is passed, the parents can complete the incoming call answering. And restoring the application running in the child mode after the answering is finished.
Fig. 4 is a block diagram illustrating an incoming call listening device according to an example embodiment. Referring to fig. 4, the incoming call monitoring apparatus 100 is applied to a terminal, the terminal is provided with a first working mode, and the incoming call monitoring apparatus 100 includes: a listening module 110, a prompting module 120 and a verification module 130.
The monitoring module 110 is configured to monitor an incoming call in the first operating mode.
The prompting module 120 is configured to determine that the incoming call is heard in the first operating mode, and prompt to input authentication information for answering the incoming call.
The verification module 130 is configured to answer the incoming call in response to the passing of the authentication of the incoming call.
In an embodiment, the designated application runs in the first operating mode, and the listening module 110 is further configured to: and when the incoming call is monitored, the running of the application is suspended.
In another embodiment, the listening module 110 is further configured to: and after the monitoring of the incoming call is finished, the running of the application is recovered.
In an embodiment, the prompting module 120 prompts to input the authentication information for answering the incoming call in the following manner: and displaying an identity verification interface for a user to input identity verification information of the incoming call.
In another embodiment, the terminal is further provided with a second working mode, and the authentication information is authentication information for controlling the terminal to work in the second working mode.
In one embodiment, the prompt module 120 is further configured to: and sending an answering prompt for prompting to answer the incoming call through audio and/or video playing.
In one embodiment, the verification module 130 is further configured to: and responding to the failure of the authentication of the answering call, and keeping prompting to input the authentication information for the answering call.
In one embodiment, the first mode of operation is a pediatric mode.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating an apparatus 200 for incoming call listening according to an example embodiment. For example, the apparatus 200 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, the apparatus 200 may include one or more of the following components: a processing component 202, a memory 204, a power component 206, a multimedia component 208, an audio component 210, an input/output (I/O) interface 212, a sensor component 214, and a communication component 216.
The processing component 202 generally controls overall operation of the device 200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 202 may include one or more processors 220 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 202 can include one or more modules that facilitate interaction between the processing component 202 and other components. For example, the processing component 202 may include a multimedia module to facilitate interaction between the multimedia component 208 and the processing component 202.
Memory 204 is configured to store various types of data to support operation at device 200. Examples of such data include instructions for any application or method operating on the device 200, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 204 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 206 provide power to the various components of the device 200. Power components 206 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 200.
The multimedia component 208 includes a screen that provides an output interface between the device 200 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 208 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 200 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 210 is configured to output and/or input audio signals. For example, audio component 210 includes a Microphone (MIC) configured to receive external audio signals when apparatus 200 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 204 or transmitted via the communication component 216. In some embodiments, audio component 210 also includes a speaker for outputting audio signals.
The I/O interface 212 provides an interface between the processing component 202 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 214 includes one or more sensors for providing various aspects of status assessment for the device 200. For example, the sensor component 214 may detect an open/closed state of the device 200, the relative positioning of components, such as a display and keypad of the apparatus 200, the sensor component 214 may also detect a change in position of the apparatus 200 or a component of the apparatus 200, the presence or absence of user contact with the apparatus 200, orientation or acceleration/deceleration of the apparatus 200, and a change in temperature of the apparatus 200. The sensor assembly 214 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 214 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 214 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 216 is configured to facilitate wired or wireless communication between the apparatus 200 and other devices. The device 200 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 216 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 216 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 200 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as memory 204, comprising instructions executable by processor 220 of device 200 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, wherein instructions of the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform any one of the above-mentioned incoming call monitoring methods.
Fig. 6 is a block diagram illustrating an apparatus 300 for incoming call listening according to an example embodiment. For example, the apparatus 300 may be provided as a server. Referring to FIG. 6, apparatus 300 includes a processing component 322 that further includes one or more processors and memory resources, represented by memory 332, for storing instructions, such as applications, that are executable by processing component 322. The application programs stored in memory 332 may include one or more modules that each correspond to a set of instructions. In addition, the processing component 322 is configured to execute the instructions to perform any of the above-mentioned incoming call monitoring methods
The apparatus 300 may also include a power component 326 configured to perform power management of the apparatus 300, a wired or wireless network interface 350 configured to connect the apparatus 300 to a network, and an input/output (I/O) interface 358. The apparatus 300 may operate based on an operating system stored in the memory 332, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (12)

1. A method for monitoring incoming calls is characterized by being applied to a terminal, wherein the terminal is provided with a first working mode and a second working mode, and the method for monitoring incoming calls comprises the following steps:
monitoring an incoming call in the first working mode;
confirming that the incoming call is monitored in the first working mode, displaying an identity verification interface, and prompting to input identity verification information, wherein the identity verification interface covers the incoming call display interface, and the identity verification information is used for controlling the terminal to switch between the first working mode and the second working mode and controlling the screen locking of the terminal;
answering or rejecting the incoming call in response to passing of the identity authentication; or
Responding to the failure of the identity authentication, and keeping prompting to input the identity authentication information until correct identity authentication information is input;
and sending an answering prompt for prompting to answer the incoming call through audio and/or video playing.
2. The incoming call listening method according to claim 1, wherein a specified application is running in the first operating mode, the method further comprising:
and when the incoming call is monitored, suspending the running of the application.
3. The incoming call monitoring method according to claim 2, further comprising:
and after the call answering is monitored to be finished, the application is resumed to run.
4. The incoming call monitoring method according to claim 1, further comprising:
and responding to the failure of the authentication for answering the incoming call, and keeping prompting to input the authentication information for answering the incoming call.
5. The incoming call monitoring method according to claim 1, wherein the first operation mode is a child mode.
6. The incoming call monitoring device is applied to a terminal, the terminal is provided with a first working mode and a second working mode, and the incoming call monitoring device comprises:
the monitoring module is used for monitoring an incoming call in the first working mode;
the prompting module is used for determining that an incoming call is monitored in the first working mode, displaying an identity verification interface and prompting to input identity verification information, wherein the identity verification interface covers the incoming call display interface, and the identity verification information is used for controlling the terminal to switch between the first working mode and the second working mode and controlling the screen locking of the terminal;
the verification module is used for answering or rejecting the incoming call in response to passing of the identity verification; or responding to the failure of the identity authentication, and keeping prompting to input the identity authentication information until correct identity authentication information is input;
the prompt module is further configured to: and sending an answering prompt for prompting to answer the incoming call through audio and/or video playing.
7. The incoming call monitoring device according to claim 6, wherein a designated application runs in the first operating mode, and the monitoring module is further configured to:
and when the incoming call is monitored, suspending the running of the application.
8. The incoming call monitoring device according to claim 7, wherein the monitoring module is further configured to:
and after the call answering is monitored to be finished, the application is resumed to run.
9. The incoming call monitoring device according to claim 6, wherein the verification module is further configured to:
and responding to the failure of the authentication for answering the incoming call, and keeping prompting to input the authentication information for answering the incoming call.
10. The incoming call monitoring device according to claim 6, wherein the first operation mode is a child mode.
11. An incoming call monitoring device, wherein the incoming call monitoring device comprises:
a memory to store instructions; and
a processor for calling the instructions stored in the memory to execute the incoming call listening method according to any one of claims 1 to 5.
12. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by a processor, perform the incoming call listening method of any one of claims 1-5.
CN201911294505.2A 2019-12-16 2019-12-16 Incoming call monitoring method, incoming call monitoring device and computer storage medium Active CN111010481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911294505.2A CN111010481B (en) 2019-12-16 2019-12-16 Incoming call monitoring method, incoming call monitoring device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911294505.2A CN111010481B (en) 2019-12-16 2019-12-16 Incoming call monitoring method, incoming call monitoring device and computer storage medium

Publications (2)

Publication Number Publication Date
CN111010481A CN111010481A (en) 2020-04-14
CN111010481B true CN111010481B (en) 2022-06-24

Family

ID=70114853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911294505.2A Active CN111010481B (en) 2019-12-16 2019-12-16 Incoming call monitoring method, incoming call monitoring device and computer storage medium

Country Status (1)

Country Link
CN (1) CN111010481B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
CN107026935A (en) * 2016-10-28 2017-08-08 珠海格力电器股份有限公司 The authority control method and device of mobile device and mobile device
CN107241656A (en) * 2017-06-30 2017-10-10 广东欧珀移动通信有限公司 A kind of call processing method, device, storage medium and terminal
WO2018006591A1 (en) * 2016-07-07 2018-01-11 中兴通讯股份有限公司 Multi-user terminal service processing method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187672A (en) * 2015-10-30 2015-12-23 宁波萨瑞通讯有限公司 Incoming call answering method and mobile terminal
CN107894907A (en) * 2017-10-10 2018-04-10 深圳市金立通信设备有限公司 A kind of operating mode control method of terminal, terminal and computer-readable medium
CN108882032A (en) * 2018-06-08 2018-11-23 百度在线网络技术(北京)有限公司 Method and apparatus for output information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
WO2018006591A1 (en) * 2016-07-07 2018-01-11 中兴通讯股份有限公司 Multi-user terminal service processing method and device
CN107026935A (en) * 2016-10-28 2017-08-08 珠海格力电器股份有限公司 The authority control method and device of mobile device and mobile device
CN107241656A (en) * 2017-06-30 2017-10-10 广东欧珀移动通信有限公司 A kind of call processing method, device, storage medium and terminal

Also Published As

Publication number Publication date
CN111010481A (en) 2020-04-14

Similar Documents

Publication Publication Date Title
US10123196B2 (en) Method and device for alarm triggering
US9800666B2 (en) Method and client terminal for remote assistance
CN106453052B (en) Message interaction method and device
CN107204883B (en) Network fault processing method and device
US20170034336A1 (en) Event prompting method and device
EP3024211B1 (en) Method and device for announcing voice call
CN105915521B (en) Multi-party call management method, device and terminal
EP3322227B1 (en) Methods and apparatuses for controlling wireless connection, computer program and recording medium
KR20170005783A (en) Method and apparatus for displaying conversation interface
CN105704766A (en) Control method and device of double-card mobile terminal
US20180035154A1 (en) Method, Apparatus, and Storage Medium for Sharing Video
CN106792937A (en) The processing method and processing device of call request
US20170126888A1 (en) Method and device for making call
CN107911380B (en) Identity verification method and device
CN108600503B (en) Voice call control method and device
CN111541922B (en) Method, device and storage medium for displaying interface input information
CN106550482B (en) Communication connection establishing method and device and electronic equipment
US20190037169A1 (en) Video call method, apparatus and system
CN111010481B (en) Incoming call monitoring method, incoming call monitoring device and computer storage medium
CN114615647A (en) Call control method, device and storage medium
CN110913055B (en) Terminal device searching method and device and electronic device
CN108551459B (en) Method and device for communication between devices and readable storage medium
CN108696914B (en) Method and device for scanning intelligent equipment and storage medium
CN106170038B (en) Recording method and device
CN113114863B (en) Voice communication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant