CN113114859A - Number interception method and server - Google Patents

Number interception method and server Download PDF

Info

Publication number
CN113114859A
CN113114859A CN202110349733.6A CN202110349733A CN113114859A CN 113114859 A CN113114859 A CN 113114859A CN 202110349733 A CN202110349733 A CN 202110349733A CN 113114859 A CN113114859 A CN 113114859A
Authority
CN
China
Prior art keywords
communication
communication number
server
terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110349733.6A
Other languages
Chinese (zh)
Inventor
陈立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110349733.6A priority Critical patent/CN113114859A/en
Publication of CN113114859A publication Critical patent/CN113114859A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a number interception method and a terminal, relates to the technical field of communication, and aims to solve the problem that the accuracy of the existing harassment interception method is poor. The method comprises the following steps: receiving a target communication message sent by a target communication number; if the target communication number is the same as a first number carrying a first identification in a number library of the terminal and the moment of receiving the target communication message is within a first preset time period, prompting the target communication message to a user, wherein the first identification is used for indicating that the terminal does not intercept the communication message sent to the number corresponding to the first identification within the first preset time period; the communication numbers in the number library are marked communication numbers.

Description

Number interception method and server
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a number interception method and a server.
Background
With the development of communication technology, communication harassments such as telemarketing or telefraud are more and more frequent.
The existing harassment interception method is mainly characterized in that a server counts the frequency of a number marked by different users, judges whether the marked frequency of the number exceeds a threshold value, adds the number into a harassment number library if the marked frequency of the number exceeds the threshold value, and can indicate a terminal to synchronously update the harassment number library in the terminal. Therefore, when the terminal receives the incoming call or the short message from the number in the harassing number library, the terminal can intercept the incoming call or the short message from the number, or the terminal can display the number as a harassing number to the user.
However, if the user needs to trigger the terminal to communicate with a certain number (for example, a telephone number of a certain house agency) within a certain period of time, and the number is just a number in a harassment number library in the terminal, according to the current harassment interception method, since the terminal permanently intercepts short messages or incoming calls from the number when harassment interception is performed, the user cannot receive the short messages or incoming calls from the number at all, that is, the accuracy of the current harassment interception method is poor.
Disclosure of Invention
The embodiment of the invention provides a number interception method and a server, and aims to solve the problem that the accuracy of the existing harassment interception method is poor.
In order to solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention further provides a number interception method, applied to a terminal, where the method includes: receiving a target communication message sent by a target communication number; if the target communication number is the same as a first number carrying a first identification in a number library of the terminal and the moment of receiving the target communication message is within a first preset time period, prompting the target communication message to a user, wherein the first identification is used for indicating that the terminal does not intercept the communication message sent to the number corresponding to the first identification within the first preset time period; the communication numbers in the number library are marked communication numbers.
In a second aspect, an embodiment of the present invention provides a number interception method, applied to a server, where the method includes: receiving a communication message, wherein the communication message is sent to a second communication number by a first communication number, and the first communication number is a virtual communication number; acquiring a first host address of the first communication number according to the communication message; and under the condition that the first host address is determined to be a harassing address, indicating the first communication number to be a harassing number to the terminal.
In a third aspect, an embodiment of the present invention provides a terminal, where the terminal includes: the device comprises a receiving module and a prompting module; the receiving module is used for receiving a target communication message sent by a target communication number; the prompting module is used for prompting the target communication message to a user if the target communication number is the same as a first number carrying a first identifier in a number library of the terminal and the moment of receiving the target communication message is within a first preset time period, wherein the first identifier is used for indicating that the terminal does not intercept the communication message sent by the number corresponding to the first identifier within the first preset time period; the communication numbers in the number library are marked communication numbers.
In a fourth aspect, an embodiment of the present invention provides a server, where the server includes: the device comprises a receiving module, an obtaining module and an indicating module; the receiving module is used for receiving a communication message, wherein the communication message is sent to a second communication number by a first communication number, and the first communication number is a virtual communication number; the obtaining module is configured to obtain a first host address of the first communication number according to the communication message received by the receiving module; the indicating module is used for indicating the first communication number as a harassing number to the terminal under the condition that the first host address is determined to be a harassing address.
In a fifth aspect, an embodiment of the present invention provides a terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the number interception method according to the second aspect.
In a sixth aspect, an embodiment of the present invention provides a server, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the number interception method according to the first aspect.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the number interception method according to the first aspect or the second aspect.
In the embodiment of the invention, after the terminal receives the target communication message sent by the target communication number, if the target communication number is the same as a first number carrying a first identifier in a number library of the terminal and the moment of receiving the target communication message is within a first preset time period, the terminal prompts the target communication message to the user, and because the first identifier is used for indicating that the terminal does not intercept the communication message sent by the number corresponding to the first identifier within the first preset time period, the terminal can determine whether the marked number needs to be prompted to the user by the server according to the first identifier carried in the number library of the terminal, so that the terminal can flexibly select whether disturbance interception needs to be executed according to different practical application scenes used by the user, and the disturbance interception accuracy is improved.
Drawings
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention;
fig. 2 is a first flowchart illustrating a number interception method according to an embodiment of the present invention;
fig. 3 is a second flowchart illustrating a number interception method according to an embodiment of the present invention;
fig. 4 is a third schematic flowchart of a number interception method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a possible structure of a server according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a possible structure of a server according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a possible structure of a terminal according to a first embodiment of the present invention;
fig. 8 is a schematic diagram of a possible structure of a terminal according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a possible structure of a terminal according to a third embodiment of the present invention;
fig. 10 is a schematic diagram of a possible structure of a terminal according to a fourth embodiment of the present invention;
fig. 11 is a schematic hardware structure diagram of a terminal according to various embodiments of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that "/" in this context means "or", for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. "plurality" means two or more than two.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
The terminal in the embodiment of the present invention may be a terminal having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment applied to the number interception method provided by the embodiment of the present invention, taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the number interception method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the number interception method may operate based on the android operating system shown in fig. 1. Namely, the processor or the terminal device can implement the number interception method provided by the embodiment of the invention by running the software program in the android operating system.
For convenience of description, the number library in the server and the number library in the terminal in the embodiment of the present invention are marked number libraries, the communication numbers in the number libraries may be communication numbers marked by users, and may also be communication numbers marked by the server, and the communication numbers may be marked as harassment, service promotion, fraud, express delivery, takeout, house property intermediary, and the like.
Example one
The number interception method in the embodiment of the present invention is described below with reference to fig. 2, where fig. 2 is a schematic flow chart of the number interception method provided in the embodiment of the present invention, and as shown in fig. 2, the flow of the number interception method includes steps 201 to 203:
step 201, the server receives a communication message.
The communication message is sent to the second communication number by the first communication number, and the first communication number is a virtual communication number.
It should be noted that the communication message in the embodiment of the present invention includes a request message for establishing a communication connection when the first communication number initiates a calling party to the second communication number, and may also include a forwarding message for sending a short message or a multimedia message from the first communication number to the second communication number.
Typically, some of the servant uses a virtual number generator to generate virtual communication numbers that vary from user to user in receiving nuisance numbers from the same servant.
Step 202, the server obtains the first host address of the first communication number according to the communication message.
Optionally, the host Address in the embodiment of the present invention may be a physical Address, an Internet Protocol (IP) Address, or an ID of an Access device provided by an operator for a virtual calling party, where the physical Address is also referred to as a Media Access Control (MAC) Address, and this is not specifically limited in the embodiment of the present invention.
And 203, under the condition that the first host address is determined to be a harassing address, the server indicates the first communication number to the terminal as a harassing number.
According to the signal interception method provided by the embodiment of the invention, the server receives the communication message sent by the first communication number to the second communication number, wherein the first communication number is a virtual communication number, and the server acquires the first host address of the first communication number according to the communication message, and indicates the first communication number as a harassing number to the terminal under the condition that the first host address is determined to be the harassing address, so that the server indicates the terminal to prompt the user that the virtual number is the harassing number, the number interception accuracy is improved, and the harassing interception accuracy is improved.
In a possible implementation manner, before step 201, the number interception method further includes steps 204 to 206:
and step 204, the server receives a second communication number sent by the terminal, wherein the second communication number is a virtual communication number.
The second communication code is a number marked by the marking user.
Step 205, the server acquires the second host address of the second communication code.
Specifically, the server may determine a home address of a communication number according to the communication number and a communication connection corresponding to the communication number.
And step 206, under the condition that the target preset condition is met, the server determines that the second host address is a harassing address.
Optionally, the server may add the home address to the destination address library after determining that the second home address is a harassing address, and the server may determine whether one contact number is a contact number corresponding to the home address in the destination address library.
Wherein the target preset condition comprises one of the following: the second communication number meets the first preset condition, the virtual communication number corresponding to the second host address in the number library of the server meets the second preset condition, the second communication number and the target virtual communication number meet the third preset condition, and the target virtual communication number is all the virtual communication numbers in the number library of the server.
Specifically, the second communication signal code satisfies a first preset condition, including: the first time is greater than or equal to a first preset threshold, and the first time is the marked time of the second communication code.
It should be noted that the first preset threshold may be a threshold that is determined whether the common number is harassment or not, or may determine a value according to other determination rules, which is not specifically limited in this embodiment of the present invention.
Specifically, the virtual communication number corresponding to the second host address in the number library of the server satisfies a second preset condition, which includes: the second number is greater than or equal to a second preset threshold, and the second number is the sum of the number of times that each virtual communication number corresponding to the second host address in the number library of the server is marked.
It is understood that a host address may generate a plurality of virtual numbers, and although the number of times each of different virtual numbers is marked may not be greater than a first preset threshold, the sum of the number of times all virtual numbers are marked of a host address may be determined as a nuisance host after a certain threshold is exceeded.
Specifically, the second communication number and the target virtual communication number satisfy a third preset condition, which includes: the calling feature of the second communication code satisfies the first sub-preset condition, and the similarity between the second communication code and the target virtual communication number satisfies the second sub-preset condition.
The first sub-preset condition includes that the calling frequency (i.e. calling frequency) of the second communication code in unit time is greater than or equal to a calling threshold, the mean value of the call duration (i.e. calling duration) of the second communication code calling each time is less than or equal to a call duration threshold, and the mean value of the ring duration of the second communication code calling each time is less than or equal to a ring duration threshold. The second sub-preset condition includes that the first number is greater than or equal to a third preset threshold, or the second number is greater than or equal to a fourth preset threshold.
The first number is the number of virtual communication numbers, wherein the communication number similarity between the target virtual communication number and the second communication number is greater than or equal to a number similarity threshold value in the target virtual communication numbers with the same number length as the second communication number; the second number is the number that the region similarity between the target virtual communication number and the second communication number is greater than or equal to the region similarity threshold.
For example, the following parameters may be calculated for the call frequency, the call duration, and the ringing duration, respectively: most probable value (tM), most probable number of calls, most probableThe call duration of the energy, the most likely ringing duration. Maximum value (t0), maximum number of calls, maximum call duration, maximum ring duration. Minimum value (tP), minimum number of calls, shortest call duration, shortest ring duration. Further calculate mean
Figure BDA0003002032460000051
And standard deviation of
Figure BDA0003002032460000052
Establishing normal distribution model through mean value and standard deviation, and calculating the sum of probability of new number calling frequency, calling duration and ringing duration in normal distribution>And if the number is 250%, judging the number to be a harassment number. Sum of probabilities of new number calling frequency, calling duration and ringing duration in normal distribution>200% and number similarity>And if the number is 90% or/and the number is in a position where the TOP50 occurs, the number is judged as a harassment number.
In practical application, optionally, in order to simplify the processing procedure of the terminal in practical application, a certain sequence may be set for the above conditions, and assuming that the communication number 1 is a harassing number, for example, as shown in the flowchart shown in fig. 3, the following steps may be included, but are not limited to:
the terminal detects a first operation of a user, wherein the first operation is that the user marks a communication number (marked as number 1) as a harassment number. The terminal sends the marked number 1 to the server.
Step 301, the server receives the number 1 and judges whether the number 1 is a virtual communication number.
It should be noted that if the number 1 is a common communication number, it is determined whether the feature of the harassment number is met according to the existing method.
Step 302, if the server determines that the number 1 is a virtual number, the server obtains a host address 1 (i.e. a first host address), and then determines whether a target preset condition is met:
t1: and acquiring the first target times of the number 1, and if the first target times is greater than or equal to a first preset threshold, determining that the host address 1 meets the preset characteristics.
T2: and if the first target frequency is less than a first preset threshold, acquiring a second target frequency, and if the second target frequency is greater than or equal to a second preset threshold, determining that the host address 1 meets the preset characteristics.
T3: and if the second target frequency is smaller than a second preset threshold value, determining that the host address 1 meets the preset characteristics if the second communication number and the target virtual communication number meet a third preset condition.
Step 303, if the server determines that the preset condition is met, determining that the host address 1 is a harassment host address.
And step 304, the server adds the host address 1 to a harassment host address library.
And the server adds the number 1 to a harassment number library and updates the harassment number library in each terminal. And the server prompts whether one number of the terminal is a harassment number or not according to the harassment address library after receiving the communication message. And the terminal determines whether the incoming call or the short message needs to be intercepted according to the harassment number library.
Based on the scheme, the server firstly determines the first host address according to the first communication number, and can judge whether the first host address of the first communication number is a harassing address according to any condition.
Example two:
fig. 4 is a schematic flow chart of a number interception method according to an embodiment of the present invention, and the following describes, with reference to fig. 4, a number interception method according to a second embodiment of the present invention, which includes steps 401 to 402:
step 401, the terminal receives a target communication message sent by a target communication number.
It should be noted that the target communication number may be a virtual communication number or a general communication number, which is not specifically limited in this embodiment of the present invention.
Optionally, the target communication message may be a short message sent by the target communication number to the communication number bound to the terminal, or a communication message formed by a caller sent by the target communication number and the communication number bound to the terminal, which is not specifically limited in this embodiment of the present invention.
Step 402, if the target communication number is the same as a first number carrying a first identifier in a number library of the terminal, and the time of receiving the target communication message is within a first preset time period, the terminal prompts the target communication message to a user.
The first identifier is used for indicating the terminal not to intercept a communication message sent by a number corresponding to the first identifier within a first preset time period; the communication numbers in the number library are marked communication numbers.
Based on the scheme, after the terminal receives the target communication message sent by the target communication number, if the target communication number is the same as a first number carrying a first identifier in a number library of the terminal, and the moment of receiving the target communication message is within a first preset time period, the terminal prompts the target communication message to the user.
Optionally, in the number intercepting method provided in the embodiment of the present invention, after step 402, the step further includes step 403:
and step 403, if the moment of receiving the target communication message is not within the first preset time period, the first terminal intercepts the target communication message according to a preset interception rule.
It should be noted that, if the target communication message sent by the target communication number is a communication message corresponding to a short message, the preset rule in the terminal may be to intercept the short message, and the intercepted short message may be to store the short message in an interface for intercepting harassment or not to accept the short message; if the target communication message sent by the target communication number is a communication message of a calling party corresponding to the target communication number, the preset rule may be that the number is marked as a harassing number when the target communication number has an incoming call, the number is rejected, an incoming call prompt tone of the number is silent, the number is directly hung up when the incoming call is received, and the like.
Based on the scheme, if the terminal judges that the moment of receiving the target communication message is not within the first preset time period, the terminal determines that the target communication number needs to be intercepted, and the terminal intercepts the target communication message according to a preset interception rule.
Optionally, before step 401, the number interception method provided in the embodiment of the present invention further includes steps 404 to 406:
and step 404, the terminal acquires historical behavior information.
The historical behavior information indicates the historical behavior of the user using the terminal in a second preset time period.
It should be noted that the second historical preset time period may be a time period of any time length, and the starting time point may be a time point when the terminal starts to be used, or may be the latest time point of the last several months.
Step 405, the terminal determines at least one type of event according to the historical behavior information.
At least one type of event is served by N service parties, wherein N is a positive integer.
It should be noted that the terminal may determine what actions the user may do in a period of time according to the historical actions of the user using the terminal, so as to determine which service parties are required by the user to provide services.
For example, if at least one type of event determined by the terminal is a user renting a house, the terminal may determine that a plurality of house property agents are the N service parties, and if at least one type of event determined by the terminal is a user wishing to purchase insurance, the terminal may determine that a plurality of insurance companies are the N service parties.
And step 406, the terminal adds a first identifier to the communication number of each service party in the N service parties in the number library.
It should be noted that, for convenience of operation, when the terminal determines N service parties in the same batch, the first identifier may select the same identifier, that is, the first preset time period may be the same, and of course, it may also be determined according to experience that the first identifiers added to the communication numbers corresponding to different service parties are different, which is not specifically limited in this embodiment of the present invention.
Optionally, the terminal may also move the communication number belonging to each of the N service parties out of the number library, and store the communication number in another storage space of the terminal separately.
Based on the scheme, the terminal can determine some possible events according to the historical behavior information of the user, adds the first identification to the communication number of the server providing service for the possible events in the number library, so that the terminal can change the interception mode of the harassing number according to the needs of the user, flexibly select whether harassment interception needs to be executed according to different practical application scenes used by the user, and improve the accuracy of harassment interception and the user experience of the user.
Optionally, after step 406, the number interception method provided in the embodiment of the present invention further includes step 407:
step 407, in a third preset time period after the terminal adds the first identifier to the communication number of each of the N service parties, if the terminal does not communicate with the communication number belonging to the target service party, the terminal deletes the first identifiers added to the communication numbers belonging to the target service party.
The target service party is at least one service party in the N service parties.
Optionally, after the first preset time period, the terminal deletes the first identifiers respectively added to the communication numbers belonging to the target service party.
Optionally, if the terminal moves the communication number belonging to each of the N service parties out of the number library for a first period of time, the terminal may move the moved communication number into the number library again. The terminal can continue to intercept the moved harassment number.
Based on the scheme, in a third preset time period after the terminal adds the first identifier to the communication number of each service party in the N service parties respectively, if the terminal does not communicate with the communication number of the target service party, the fact that the user probably does not need the service of the target service party is indicated, and the terminal deletes the first identifiers added to the communication numbers of the target service party respectively, so that the terminal can determine a mode of intercepting harassment numbers according to user behaviors, and harassment interception accuracy is improved.
Fig. 5 is a schematic structural diagram of a possible server according to an embodiment of the present invention, and as shown in fig. 5, a server 50 includes: a receiving module 501, an obtaining module 502 and an indicating module 503; a receiving module 501, configured to receive a communication message, where the communication message is a communication message sent by a first communication number to a second communication number, and the first communication number is a virtual communication number; an obtaining module 502, configured to obtain a first host address of the first communication number according to the communication message received by the receiving module 501; an indicating module 503, configured to indicate the first communication number as a harassing number to the terminal when it is determined that the first host address acquired by the acquiring module 502 is a harassing address.
Optionally, in conjunction with fig. 5, as shown in fig. 6, the server 50 further includes a determining module 504; the receiving module 501 is further configured to receive a second communication number sent by the terminal, where the second communication number is a virtual communication number; the obtaining module 502 is further configured to obtain a second host address of the second communication number; a determining module 504, configured to determine that the second host address acquired by the acquiring module 502 is a harassing address when a preset target condition is met, where the preset target condition includes one of the following: the second communication number satisfies the first preset condition, the virtual communication number corresponding to the second host address in the number library of the server 50 satisfies the second preset condition, and the second communication number and the target virtual communication number satisfy the third preset condition, where the target virtual communication number is all the virtual communication numbers in the number library of the server 50.
Optionally, the second communication signal code satisfies a first preset condition, including: the first time is greater than or equal to a first preset threshold, and the first time is the time that the second communication code is marked; the virtual communication number corresponding to the second host address in the number library of the server 50 satisfies a second preset condition, which includes: the second number is greater than or equal to a second preset threshold, and the second number is the sum of the number of times that each virtual communication number corresponding to the second host address is marked in the number library of the server 50; the second communication number and the target virtual communication number satisfy a third preset condition, which includes: the calling feature of the second communication code satisfies the first sub-preset condition, and the similarity between the second communication code and the target virtual communication number satisfies the second sub-preset condition.
The server 50 provided in the embodiment of the present invention can implement each process implemented by the server in the foregoing method embodiments, and is not described here again to avoid repetition.
Fig. 7 is a schematic diagram of a possible structure of a terminal according to an embodiment of the present invention, and as shown in fig. 7, a terminal 70 includes: a receiving module 701 and a prompting module 702; a receiving module 701, configured to receive a target communication message sent by a target communication number; a prompting module 702, configured to prompt a user for a target communication message if the target communication number is the same as a first number that carries a first identifier in a number library of the terminal, and a time when the receiving module 701 receives the target communication message is within a first preset time period, where the first identifier is used to indicate that the terminal 70 does not intercept a communication message that is sent to a number corresponding to the first identifier within the first preset time period; the communication numbers in the number library are marked communication numbers.
Optionally, with reference to fig. 7, as shown in fig. 8, the terminal 70 further includes an intercepting module 703; the intercepting module 703 is configured to intercept the target communication message according to a preset intercepting rule if the time when the receiving module 701 receives the target communication message is not within a first preset time period.
Optionally, with reference to fig. 7, as shown in fig. 9, the terminal 70 further includes an obtaining module 704, a determining module 705, and an adding module 706; an obtaining module 704, configured to obtain historical behavior information, where the historical behavior information indicates historical behaviors of the user using the terminal 70 in a second preset time period; a determining module 705, configured to determine at least one type of event according to the historical behavior information acquired by the acquiring module 704, where the at least one type of event is served by N service providers, and N is a positive integer; an adding module 706, configured to add a first identifier to the communication number of each of the N service parties in the number library.
Optionally, with reference to fig. 8, as shown in fig. 10, the terminal 70 further includes a deletion module 707; a deleting module 707, configured to delete, in a third preset time period after the adding module 706 adds the first identifier to the communication number of each of the N service parties, if the communication number is not communicated with the communication number of the target service party, the first identifier added to the communication number of the target service party, where the target service party is at least one of the N service parties.
The terminal 70 provided in the embodiment of the present invention can implement each process implemented by the terminal in the foregoing method embodiments, and is not described here again to avoid repetition.
Fig. 11 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, where the terminal 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal structure shown in fig. 11 does not constitute a limitation of the terminal, and that the terminal may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The radio frequency unit 101 is configured to receive a target communication message sent by a target communication number; the processor 110 is configured to prompt a user for a target communication message if the target communication number is the same as a first number carrying a first identifier in a number library of the terminal and a time of receiving the target communication message is within a first preset time period, where the first identifier is used to indicate that the terminal does not intercept a communication message sent by a number corresponding to the first identifier within the first preset time period; the communication numbers in the number library are marked communication numbers.
According to the terminal provided by the embodiment of the invention, after the terminal receives the target communication message sent by the target communication number, if the target communication number is the same as the first number carrying the first identifier in the number library of the terminal and the moment of receiving the target communication message is within the first preset time period, the terminal prompts the target communication message to the user, and because the first identifier is used for indicating that the terminal does not intercept the communication message sent by the number corresponding to the first identifier within the first preset time period, the terminal can determine whether the marked number needs to be prompted to the user by the server according to the first identifier carried in the number library of the terminal, so that the terminal can flexibly select whether harassment interception needs to be executed according to different practical application scenes used by the user, and the accuracy of harassment interception is improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse web pages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The terminal 100 also includes at least one sensor 105, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 11, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
The interface unit 108 is an interface for connecting an external device to the terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 100 or may be used to transmit data between the terminal 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the terminal 100 includes some functional modules that are not shown, and thus, the detailed description thereof is omitted.
Preferably, an embodiment of the present invention further provides a terminal, which, with reference to fig. 11, includes a processor 110, a memory 109, and a computer program that is stored in the memory 109 and is executable on the processor 110, where the computer program, when executed by the processor 110, implements each process of the above-mentioned number interception method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned number interception method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. A number interception method is applied to a server, and is characterized by comprising the following steps:
receiving a communication message, wherein the communication message is sent to a second communication number by a first communication number, and the first communication number is a virtual communication number;
acquiring a first host address of the first communication number according to the communication message;
and indicating the first communication number as a harassment number to a terminal under the condition that the first host address is determined to be a harassment address.
2. The method of claim 1, wherein prior to said receiving a communication message, the method further comprises:
receiving a second communication number sent by a terminal, wherein the second communication number is a virtual communication number;
acquiring a second host address of the second communication signal code;
determining the second host address as a harassing address under the condition that a target preset condition is met, wherein the target preset condition comprises one of the following conditions: the second communication number meets a first preset condition, the virtual communication number corresponding to the second host address in the number library of the server meets a second preset condition, the second communication number and the target virtual communication number meet a third preset condition, and the target virtual communication number is all the virtual communication numbers in the number library of the server.
3. The method of claim 2,
the second communication signal code satisfies a first preset condition, including: the first time is greater than or equal to a first preset threshold, and the first time is the marked time of the second communication code;
the virtual communication number corresponding to the second host address in the number library of the server meets a second preset condition, and the method comprises the following steps: the second time is greater than or equal to a second preset threshold value, and the second time is the sum of the times that each virtual communication number corresponding to the second host address in the number library of the server is marked;
the second communication number and the target virtual communication number satisfy a third preset condition, which includes: the calling feature of the second communication code meets a first sub-preset condition, and the similarity between the second communication code and the target virtual communication number meets a second sub-preset condition.
4. A server, characterized in that the server comprises: the device comprises a receiving module, an obtaining module and an indicating module;
the receiving module is used for receiving a communication message, wherein the communication message is sent to a second communication number by a first communication number, and the first communication number is a virtual communication number;
the obtaining module is configured to obtain a first host address of the first communication number according to the communication message received by the receiving module;
the indicating module is configured to indicate the first communication number as a harassment number to a terminal when it is determined that the first host address acquired by the acquiring module is a harassment address.
5. The server of claim 4, wherein the server further comprises a determination module;
the receiving module is further configured to receive a second communication number sent by the terminal, where the second communication number is a virtual communication number;
the obtaining module is further configured to obtain a second host address of the second communication code;
the determining module is configured to determine that the second host address acquired by the acquiring module is a harassing address when a preset target condition is met, where the preset target condition includes any one of: the second communication number meets a first preset condition, the virtual communication number corresponding to the second host address in the number library of the server meets a second preset condition, the second communication number and the target virtual communication number meet a third preset condition, and the target virtual communication number is all the virtual communication numbers in the number library of the server.
6. The server according to claim 5,
the second communication signal code satisfies a first preset condition, including: the first time is greater than or equal to a first preset threshold, and the first time is the marked time of the second communication code;
the virtual communication number corresponding to the second host address in the number library of the server meets a second preset condition, and the method comprises the following steps: the second time is greater than or equal to a second preset threshold value, and the second time is the sum of the times that each virtual communication number corresponding to the second host address in the number library of the server is marked;
the second communication number and the target virtual communication number satisfy a third preset condition, which includes: the calling feature of the second communication code meets a first sub-preset condition, and the similarity between the second communication code and the target virtual communication number meets a second sub-preset condition.
7. A server, characterized in that the server comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the number interception method according to any one of claims 1-3.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the number interception method according to any one of claims 1 to 3.
CN202110349733.6A 2018-05-29 2018-05-29 Number interception method and server Pending CN113114859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110349733.6A CN113114859A (en) 2018-05-29 2018-05-29 Number interception method and server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810526064.3A CN108881648B (en) 2018-05-29 2018-05-29 Number interception method and terminal
CN202110349733.6A CN113114859A (en) 2018-05-29 2018-05-29 Number interception method and server

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810526064.3A Division CN108881648B (en) 2018-05-29 2018-05-29 Number interception method and terminal

Publications (1)

Publication Number Publication Date
CN113114859A true CN113114859A (en) 2021-07-13

Family

ID=64335326

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810526064.3A Active CN108881648B (en) 2018-05-29 2018-05-29 Number interception method and terminal
CN202110349733.6A Pending CN113114859A (en) 2018-05-29 2018-05-29 Number interception method and server

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810526064.3A Active CN108881648B (en) 2018-05-29 2018-05-29 Number interception method and terminal

Country Status (1)

Country Link
CN (2) CN108881648B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898085A (en) * 2016-04-05 2016-08-24 腾讯科技(深圳)有限公司 Harassment communication account identification method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075639A (en) * 2009-11-24 2011-05-25 中国移动通信集团上海有限公司 Method and device for intercepting malicious call in international service communication network
CN102438243A (en) * 2010-09-29 2012-05-02 上海粱江通信系统股份有限公司 Method for identifying harassing phone call by analyzing frequency of phone call
US8817960B2 (en) * 2012-11-12 2014-08-26 Nvideon, Inc. Automated attendant for a private telephone system
CN104349324B (en) * 2013-11-15 2018-12-14 上海触乐信息科技有限公司 Mobile terminal number intelligent protection system and method
CN104284031B (en) * 2014-11-05 2017-05-17 格科微电子(上海)有限公司 Speech communication method, communication terminal and server
EP3091717A1 (en) * 2015-05-08 2016-11-09 Harry Sykes Telephone call control system and method
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
CN106385693B (en) * 2016-09-22 2020-02-07 长沙创客软件有限公司 Telecommunication fraud judgment method aiming at virtual number segment
CN107018504B (en) * 2017-02-21 2020-06-09 阿里巴巴集团控股有限公司 Communication method, blacklist configuration method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898085A (en) * 2016-04-05 2016-08-24 腾讯科技(深圳)有限公司 Harassment communication account identification method and device

Also Published As

Publication number Publication date
CN108881648B (en) 2021-04-13
CN108881648A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN109462885B (en) Network slice registration method and terminal
CN111010332A (en) Group chat method and electronic equipment
CN110062105B (en) Interface display method and terminal equipment
CN111124221B (en) File sending method and terminal equipment
CN109471690B (en) Message display method and terminal equipment
CN109857494B (en) Message prompting method and terminal equipment
CN109219004B (en) Short message unsubscribing method and device, mobile terminal and readable storage medium
CN109976611B (en) Terminal device control method and terminal device
CN109639863B (en) Voice processing method and device
CN108282759B (en) Service processing method and mobile communication terminal
CN107832032B (en) Screen locking display method and mobile terminal
CN110187808B (en) Dynamic wallpaper setting method and device and computer-readable storage medium
CN111107223B (en) Message processing method and electronic equipment
CN110505340B (en) Message sending method, terminal equipment and readable storage medium
CN109639738B (en) Voice data transmission method and terminal equipment
CN111093289A (en) Service transmission method and electronic equipment
CN110856163A (en) Network registration method and electronic equipment
CN112351441B (en) Data processing method and device and electronic equipment
CN109828702B (en) Interface display method and terminal equipment
CN111931155A (en) Verification code input method, verification code input equipment and storage medium
CN108391305B (en) WiFi hotspot selection method and terminal equipment
CN109068276B (en) Message conversion method and terminal
CN111314903A (en) Information sharing method and electronic equipment
CN108040116B (en) Message pushing method, router and computer readable storage medium
CN108881648B (en) Number interception method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210713

RJ01 Rejection of invention patent application after publication