CN114979378B - Incoming call processing method and device - Google Patents

Incoming call processing method and device Download PDF

Info

Publication number
CN114979378B
CN114979378B CN202210493649.6A CN202210493649A CN114979378B CN 114979378 B CN114979378 B CN 114979378B CN 202210493649 A CN202210493649 A CN 202210493649A CN 114979378 B CN114979378 B CN 114979378B
Authority
CN
China
Prior art keywords
intelligent contract
incoming call
telephone number
call
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210493649.6A
Other languages
Chinese (zh)
Other versions
CN114979378A (en
Inventor
王宝辉
罗晓斌
余东辉
解应俊
张�杰
张云
谢天铎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210493649.6A priority Critical patent/CN114979378B/en
Publication of CN114979378A publication Critical patent/CN114979378A/en
Application granted granted Critical
Publication of CN114979378B publication Critical patent/CN114979378B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method and a device for processing incoming calls, which belong to the technical field of internet information and are used for improving the processing efficiency of the incoming calls, wherein the method comprises the following steps: if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, generating a key pair corresponding to the second telephone number, wherein the key pair comprises a first public key and a first private key; transmitting the second telephone number and the first public key to a blockchain network; sending the first private key to the blockchain network, and calling the second intelligent contract in the blockchain network through the first private key; and if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, executing an operation corresponding to the operation instruction for the telephone call.

Description

Incoming call processing method and device
Technical Field
The application belongs to the technical field of Internet information, and particularly relates to a method and a device for processing incoming calls.
Background
In the current society, mobile phones become an indispensable tool in daily life of people, however, as a result, more and more harassment calls are received, which causes great trouble to people and even brings great economic loss to people. Against the threat of harassment calls, the prior art is to set up a number mark database to give corresponding prompts to the user when the user answers the call, and the processing method and key flow of the prior call incoming call are as follows:
(1) The user receives the harassment call to mark and returns the harassment call to the platform;
(2) The platform stores the harassment telephone number marked by the user into a database;
(3) The user marked as a nuisance call communicates with other users again, and the platform feeds the marking information of the user back to the target user.
However, because of different operators and terminal developers, the marked data of the harassing calls cannot be unified, so that the marked data in the existing harassing call resisting technology is scattered, and the problem that the harassing calls cannot be processed efficiently exists.
Disclosure of Invention
The embodiment of the application provides a method and a device for processing an incoming call, which can solve the problem that harassment calls cannot be processed efficiently.
In a first aspect, an embodiment of the present application provides a method for processing an incoming call, where the method includes: if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, generating a key pair corresponding to the second telephone number, wherein the key pair comprises a first public key and a first private key; the second telephone number and the first public key are sent to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user; sending the first private key to the blockchain network, and calling the second intelligent contract in the blockchain network through the first private key; and if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, executing an operation corresponding to the operation instruction for the telephone call, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and the second intelligent contract.
In a second aspect, an embodiment of the present application provides a method for processing an incoming call, where the method includes determining a first smart contract corresponding to a second phone number when a first public key and the second phone number sent by a terminal of a target user are received, where the first public key corresponds to the second phone number; updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy; if a third telephone number corresponding to the telephone call sent by the terminal is received, determining an operation instruction aiming at the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal, wherein the operation instruction is used for the terminal to execute the operation corresponding to the operation instruction aiming at the telephone call.
In a third aspect, an embodiment of the present application provides an apparatus for processing an incoming call, where the apparatus includes: the generation module is used for generating a key pair corresponding to a second telephone number if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, wherein the key pair comprises a first public key and a first private key; the sending module is used for sending the second telephone number and the first public key to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user; the calling module is used for sending the first private key to the blockchain network and calling the second intelligent contract in the blockchain network through the first private key; and the execution module is used for executing the operation corresponding to the operation instruction for the telephone call if the telephone call is received and the operation instruction for the telephone call sent by the blockchain network is received, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and the second intelligent contract.
In a fourth aspect, an embodiment of the present application provides an apparatus for processing an incoming call, where the apparatus includes: a receiving module, configured to determine a first smart contract corresponding to a second phone number if a first public key and the second phone number sent by a terminal of a target user are received, where the first public key corresponds to the second phone number; the updating module is used for updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy; the determining module is configured to determine an operation instruction for the phone call according to the second intelligent contract and the third phone number if the third phone number corresponding to the phone call sent by the terminal is received, and send the operation instruction to the terminal, where the operation instruction is used for the terminal to execute an operation corresponding to the operation instruction for the phone call.
In a fifth aspect, an embodiment of the present application provides an electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, the program or instruction when executed by the processor implementing the steps of the method according to the first aspect or implementing the steps of the method according to the second aspect.
In a sixth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor, implement the steps of the method as described in the first aspect, or implement the steps of the method as described in the second aspect.
In the embodiment of the application, if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, a key pair corresponding to the second telephone number is generated, wherein the key pair comprises a first public key and a first private key; sending a second telephone number and a first public key to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by a target user; the first private key is sent to the blockchain network, and a second intelligent contract in the blockchain network is called through the first private key; if a call is received and an operation instruction for the call sent by the blockchain network is received, an operation corresponding to the operation instruction is executed for the call, wherein the operation instruction is determined by the blockchain network according to a third phone number and a second intelligent contract corresponding to the call, so that a target user can still call a preset call interception policy in the blockchain network under the condition of terminal replacement or phone number replacement, the call interception policy can be deployed and modified, and the operation instruction for the call sent by the blockchain network according to the call interception policy can be received, so that the terminal can efficiently process the call according to the operation instruction, and the interception efficiency of the harassment call is improved.
Drawings
Fig. 1 is a flow chart of a method for processing an incoming call according to an embodiment of the present application;
fig. 2 is a flow chart of another incoming call processing method according to an embodiment of the application;
fig. 3 is a schematic flow chart of user account generation according to an embodiment of the present application;
fig. 4 is a schematic diagram of a method architecture for handling incoming calls according to an embodiment of the present application;
fig. 5 is a flowchart of another incoming call processing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an incoming call processing device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another incoming call processing device according to an embodiment of the present application;
fig. 8 is a schematic structural view of an electronic device according to another embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The method and the device for processing the incoming call provided by the embodiment of the application are described in detail through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Fig. 1 illustrates a method for processing an incoming call according to an embodiment of the present application, where the method may be performed by an electronic device, and the electronic device may include: a server and/or a terminal device, wherein the terminal device may be, for example, a vehicle terminal or a mobile phone terminal, etc. In other words, the method may be performed by software or hardware installed in an electronic device, the method comprising the steps of:
Step 102: if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, a key pair corresponding to the second telephone number is generated.
Wherein the key pair includes a first public key and a first private key.
Specifically, the terminal device of the target user may obtain the international mobile subscriber identity (International Mobile Subscriber Identity, IMSI) by reading a subscriber identity module (Subscriber Identity Module, SIM) card, if the IMSI is changed, it indicates that the phone number corresponding to the terminal of the target user is changed, and the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number, specifically, the terminal may be replaced by the target user, for the terminal of the target user, the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number, or the phone number corresponding to the terminal of the target user is replaced by the target user, and the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number.
Step 104: the second telephone number and the first public key are sent to a blockchain network.
The second phone number is used for searching a first intelligent contract corresponding to the second phone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user.
Specifically, after the key pair is generated, the second phone number and the first public key are sent to the blockchain network, so that the blockchain network can find the first intelligent contract corresponding to the second phone number according to the second phone number, and the blockchain network can update the second public key in the first intelligent contract to the first public key to generate the second intelligent contract.
Step 106: and sending the first private key to the blockchain network, and calling the second intelligent contract in the blockchain network through the first private key.
Specifically, after the second phone number and the first public key are sent to the blockchain network, the blockchain network can find the first intelligent contract corresponding to the second phone number according to the second phone number, the blockchain network can update the second public key in the first intelligent contract to the first public key, the terminal of the target user can send the first private key to the blockchain network, find the second intelligent contract where the first public key corresponding to the first private key is located through the first private key, and call the second intelligent contract.
Therefore, the target user can use the first private key to continuously call the first incoming call interception policy of the second telephone number under the condition of changing the terminal setting or the telephone number, the problem that the incoming call interception policy needs to be reset under the condition of changing the terminal setting or the telephone number by the target user is prevented, and the incoming call processing efficiency is improved.
Step 108: and if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, executing an operation corresponding to the operation instruction for the telephone call.
The operation instruction is determined by the blockchain network according to a third phone number corresponding to the phone call and the second intelligent contract.
Specifically, if a terminal of a target user receives a call, it may first determine whether a third phone number corresponding to the call is in a local blacklist of the terminal or in a local whitelist, if the third phone number is in the local blacklist, then automatically hang up the call, if the third phone number is in the local whitelist, then automatically connect the call, if the third phone number is neither in the local blacklist nor in the local whitelist, then determine whether the third phone number is in a bloom filter set in advance locally, the bloom filter stores data of a whitelist number library in the bloom filter, if the third phone number is not in the bloom filter, then send the third phone number to the blockchain network, determine an operation for the call through the blockchain network, and receive an operation instruction for the call sent by the blockchain network, and execute a corresponding operation on the call according to the operation instruction, wherein the operation instruction is determined by the blockchain network according to the third phone number corresponding to the call and the second intelligent bloom filter, and the invention is not limited by the bloom filter.
The embodiment of the invention provides a processing method of incoming calls, which is characterized in that if a telephone number corresponding to a terminal of a target user is updated from a first telephone number to a second telephone number, a key pair corresponding to the second telephone number is generated, wherein the key pair comprises a first public key and a first private key; sending a second telephone number and a first public key to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by a target user; the first private key is sent to the blockchain network, and a second intelligent contract in the blockchain network is called through the first private key; if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, an operation corresponding to the operation instruction is executed for the telephone call, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and a second intelligent contract, so that after a target user changes a terminal or changes a mobile phone number, the target user can continuously call the intelligent contract by using a first private key on the terminal, the problem that the target user needs to reset an incoming call interception strategy under the condition of changing the terminal setting or the telephone number can be solved, the third telephone number corresponding to the telephone call can be sent to the blockchain network under the condition of receiving the telephone call, the operation instruction for the telephone call obtained by the blockchain network through the second intelligent contract is received, and corresponding operation is executed for the telephone call according to the operation instruction, the unified data to the blockchain network is realized, and the processing judgment is performed, and the processing or interception efficiency of harassment telephone is improved.
In one implementation, the method further comprises:
if the operation of modifying the first incoming call interception policy by the target user is received; and in response to the operation, updating the first incoming call interception policy to a second incoming call interception policy, generating a third intelligent contract, and sending the third intelligent contract to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
Specifically, if the terminal of the target user receives the operation of the target user for calling the second intelligent contract, the second intelligent contract is called from the blockchain network through the first private key, if the terminal of the target user receives the operation of the target user for modifying the first incoming call interception policy in the second intelligent contract, the first incoming call interception policy is updated to the second incoming call interception policy according to the modification of the target user, so as to generate a third intelligent contract, and the third intelligent contract is sent to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
Therefore, the target user can continuously call the second intelligent contract through the first private key, and modify the first incoming call interception strategy in the second intelligent contract to generate the third intelligent contract, so that the problem that the incoming call interception strategy needs to be reset after the user changes the terminal is solved, and the efficiency of setting and deploying the incoming call interception of the harassment call is improved.
Fig. 2 shows a method for processing an incoming call, applied to a blockchain network, according to an embodiment of the present invention, the method includes the following steps:
step 202: and determining a first intelligent contract corresponding to the second telephone number under the condition that the first public key and the second telephone number sent by the terminal of the target user are received.
Wherein the first public key corresponds to the second telephone number;
the first public key is a first public key in a key pair generated at the terminal of the target user according to the second telephone number;
specifically, the blockchain network determines a first intelligent contract corresponding to a second phone number by searching for the intelligent contract matched with the second phone number under the condition that the first public key and the second phone number sent by the terminal of the target user are received, wherein the first intelligent contract is stored in an intelligent contract module in the blockchain network.
Step 204: and updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract.
The first intelligent contract comprises a second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy.
Specifically, after determining the first intelligent contract corresponding to the second phone number, a second public key in the first intelligent contract may be updated to the first public key to generate a second intelligent contract, where the first intelligent contract includes the second public key and the first incoming call interception policy, and the second intelligent contract includes the first public key and the first incoming call interception policy.
In this way, the second public key in the first intelligent contract is updated to be the first public key, and the second intelligent contract is generated, so that the blockchain network can determine the second intelligent contract comprising the first public key corresponding to the first private key in the blockchain network according to the first private key sent by the terminal of the target user, and the target user can still call the second intelligent contract corresponding to the second telephone number through the first public key when the terminal is replaced, thereby continuing to perform deployment setting on the second intelligent contract.
Step 206: if a third telephone number corresponding to the telephone call sent by the terminal is received, determining an operation instruction aiming at the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal.
The operation instruction is used for the terminal to execute the operation corresponding to the operation instruction for the telephone incoming call.
Specifically, if the third phone number sent by the terminal of the target user is received, whether the third phone number is in a white list number library in the blockchain network can be judged first, if the third phone number is in the white list number library in the blockchain network, an operation instruction for making the call is returned to the terminal of the target user, if the third phone number is not in the white list number library in the blockchain network, the third phone number is sent to a second intelligent contract, the operation instruction for the call is determined through the second intelligent contract, and the operation instruction is sent to the terminal of the target user.
The embodiment of the invention provides a processing method of an incoming call, which is characterized in that under the condition that a first public key and a second telephone number sent by a terminal of a target user are received, a first intelligent contract corresponding to the second telephone number is determined, wherein the first public key corresponds to the second telephone number; updating a second public key in the first intelligent contract to a first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy; if a third telephone number corresponding to a telephone call sent by the terminal is received, determining an operation instruction for the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal, wherein the operation instruction is used for the terminal to execute operation corresponding to the operation instruction for the telephone call, so that a target user can continuously call the second intelligent contract through the first secret key to deploy and set the second intelligent contract, the blockchain network can judge the third telephone number according to the second intelligent contract, the operation instruction for the telephone call is determined according to a judging result, and the operation instruction is sent to the terminal of the target user, so that the terminal can process the telephone call with high efficiency, and the processing efficiency of harassment calls is improved.
In one implementation, the method further comprises:
under the condition that a terminal of the target user invokes a second intelligent contract through a first private key, receiving the first private key sent by the terminal, verifying the first private key through the first public key, and if verification is successful, sending the second intelligent contract to the terminal of the target user; and receiving a third intelligent contract sent by the terminal of the target user, wherein the third intelligent contract is generated by updating the first incoming call interception policy to a second incoming call interception policy at the terminal of the target user, and the third intelligent contract comprises the first public key and the second incoming call interception policy.
Specifically, under the condition that the terminal of the target user calls the second intelligent contract through the first private key, the first private key sent by the terminal of the target user is received, the blockchain network searches the first public key corresponding to the first private key, the first private key is verified through the first public key, and under the condition that verification is successful, the second intelligent contract corresponding to the first public key is sent to the terminal corresponding to the target user.
After the target user updates the first incoming call interception policy to the second incoming call interception policy and generates a third intelligent contract, the blockchain network receives the third intelligent contract sent by the terminal of the target user and stores the third intelligent contract to the intelligent contract module, wherein the third intelligent contract comprises the first public key and the second incoming call interception policy.
In this way, under the condition that the terminal of the target user calls the second intelligent contract through the first private key, the first private key sent by the terminal is received, the first private key is verified through the first public key, if verification is successful, the second intelligent contract is sent to the terminal of the target user, and the third intelligent contract sent by the terminal of the target user is received, so that the intelligent contract corresponding to the second telephone number can be called through the generated first private key after the user changes the terminal, the problems that the user needs to reset an incoming call interception strategy and generate the intelligent contract after changing equipment are solved, the deployment modification efficiency of incoming call interception is improved, and the interception efficiency of a harassment circuit is improved.
In one implementation, the determining the operation instruction for the incoming call according to the second smart contract and the third phone number includes:
if the third telephone number is not registered on the blockchain network, determining an operation instruction for the telephone incoming call according to the second intelligent contract;
if the third telephone number is registered on the blockchain network, acquiring a first trust factor corresponding to the third telephone number;
Determining an operation instruction for the telephone call according to the first trust factor and the second intelligent contract; the first trust factor corresponds to a user account corresponding to the third telephone number, and the user account is obtained by combining the third telephone number and user information corresponding to the third telephone number when the third telephone number is registered, and the first trust factor is used for indicating the credibility of a user corresponding to the third telephone number.
Specifically, after the blockchain network receives the third telephone number, if the third telephone number is not in the white list number library, judging whether the third telephone number is registered on the blockchain network, if the third telephone number is not registered on the blockchain network, determining an operation instruction for a telephone incoming call corresponding to the third telephone number according to a second intelligent contract; if the third telephone number is registered on the blockchain network, a first trust factor corresponding to the third telephone number is obtained, and an operation instruction for the telephone incoming call corresponding to the third telephone number is determined according to the first trust factor and according to a second intelligent contract, wherein the first trust factor corresponds to a user account corresponding to the third telephone number, the user account is obtained through combination of the third telephone number and user information corresponding to the third telephone number when the third telephone number is registered, and the first trust factor is used for indicating the credibility of a user corresponding to the third telephone number.
For example, as shown in fig. 3, the telephone numbers registered in the blockchain network all have corresponding user account numbers, and when a user applies for a new telephone number, an operator terminal in the blockchain network signs the telephone number by using a private key of the operator terminal to generate a signature number, and verifies real name information of the user in the following way: at the operator end, signature information is obtained by signing the real name information of the user through the public key of the national official personal real name information authentication mechanism, broadcast is carried out through the blockchain network, the field is sent to other nodes on the blockchain network, after receiving the signature information, the other nodes send the signature information to the national official personal real name information authentication mechanism for authentication, after all the nodes receive information of successful authentication, the authentication success is indicated, after the authentication success, the signature number and the signature information can be encrypted to obtain a user account, encryption can be carried out through a hash algorithm, and mapping of the telephone number and the user account is established.
By creating the user account in the blockchain network, if the telephone number of the user is replayed, a new user account and a trust factor corresponding to the user account are generated in the blockchain network, and the replay record of the telephone number is recorded in the blockchain network, so that the situation that the trust factor is not reset after the number is replayed is prevented.
In this way, by judging whether the third number is registered on the blockchain network and judging the operation instruction for the telephone call corresponding to the third telephone number according to the judging result by the second intelligent contract, the operation instruction for the telephone call corresponding to the third telephone number can be accurately and efficiently obtained, the harassment call can be efficiently judged, and the harassment call interception efficiency is improved.
In one implementation, the determining, according to the second smart contract, an operation instruction for the incoming call includes:
acquiring a first total number of calls of the third telephone number;
if the total number of the first incoming calls is less than or equal to N, determining that the operation instruction is to automatically disconnect the incoming call;
if the total number of the first calls is equal to the sum of N and 1, determining that the operation instruction is to automatically disconnect the call, and the blockchain network sends a first notification message to the terminal, wherein the first notification message is used for notifying the terminal that the call of the third telephone number has been received;
if the first incoming call total number is greater than or equal to the sum of N and 2, determining that the operation instruction is to make the incoming call;
And setting the first incoming call interception policy by the target user when setting the first incoming call interception policy, wherein N is a positive integer.
Specifically, the blockchain network obtains a first total number of calls of the third phone number, and the blockchain network determines an operation instruction for the phone call corresponding to the third phone number according to the first call interception policy and the first total number of calls in the second intelligent contract.
If the total number of the first calls is less than or equal to N, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, and sending the operation instruction to the terminal of the target user.
If the total number of the first calls is equal to the sum of N and 1, that is, the total number of the first calls is equal to N+1, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, sending the operation instruction to the terminal of the target user, and sending a first notification message to the terminal of the target user, wherein the first notification message is used for notifying that the terminal of the target user has received the call of the third phone number.
If the total number of the first incoming calls is greater than or equal to the sum of N and 2, that is, if the total number of the first incoming calls is greater than or equal to n+2, determining that the operation instruction for the telephone call corresponding to the third telephone number is a call incoming call, and sending the operation instruction to the terminal of the target user.
When the target user sets the first incoming call interception policy, setting N in the first incoming call interception policy, wherein N is a positive integer.
In this way, if the third telephone number is not registered in the blockchain network, the operation instruction of the telephone call corresponding to the third telephone number is determined by judging the relation between the total number of the first calls of the third telephone number and N set in the first call interception policy, so that the harassment success rate of harassment calls is effectively reduced, and the telephone call can be switched on only after the total number of the telephone calls reaches the call number set by a user, thereby avoiding the interception error under the characteristic condition.
In one implementation, the determining the operation instruction for the incoming call according to the first trust factor and the second smart contract includes:
if the first trust factor is greater than or equal to a preset trust threshold, determining that the operation instruction is to make the telephone call;
if the first trust factor is smaller than the preset trust threshold, acquiring a second total number of calls of the third telephone number;
if the second incoming call total number is less than or equal to M, determining that the operation instruction for the telephone incoming call is automatic disconnection of the telephone incoming call;
If the total number of the second calls is equal to the sum of M and 1, determining that the operation instruction for the call is to automatically disconnect the call, and the blockchain network sends a second notification message to the terminal of the target user, wherein the second notification message is used for notifying the target user that the terminal of the target user has received the call of the third phone number;
if the second incoming call total number is greater than or equal to the sum of M and 2, determining that the operation instruction for the telephone incoming call is to put through the telephone incoming call;
and setting the M and the preset trust threshold in the first incoming call interception policy by the target user when the first incoming call interception policy is set, wherein M is a positive integer.
Specifically, if the third phone number is registered in the blockchain network, the third phone number has a corresponding first trust factor, and the blockchain network will first determine a relationship between the first trust factor of the third phone number and a preset trust threshold.
If the first trust factor is larger than or equal to a preset trust threshold, determining that the operation instruction is a call, and sending the operation instruction to a terminal of a target user, and if the first trust factor is smaller than the preset trust threshold, acquiring the total number of second calls of a third phone number;
If the total number of the second calls is less than or equal to M, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, and sending the operation instruction to the terminal of the target user.
If the total number of the second calls is equal to the sum of M and 1, that is, the total number of the second calls is equal to M+1, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, sending the operation instruction to the terminal of the target user, and sending a first notification message to the terminal of the target user, wherein the first notification message is used for notifying that the terminal of the target user has received the call of the third phone number.
If the total number of the second calls is greater than or equal to the sum of M and 2, that is, if the total number of the second calls is greater than or equal to M+2, determining that the operation instruction for the phone call corresponding to the third phone number is a call, and sending the operation instruction to the terminal of the target user.
When a target user sets a first incoming call interception policy, setting M and a preset trust threshold in the first incoming call interception policy, wherein M is a positive integer.
Therefore, the trust degree of the third telephone number can be judged through the first trust factor, the telephone incoming call of the third telephone number with low trust factor value can be limited by combining with the second intelligent contract, the harassment success rate of harassment calls is effectively reduced, the third telephone number with low trust factor value can be connected only after the total number of the second telephone number reaches the preset call times of the target user, the false interception under the characteristic condition is avoided, and the harassment call interception efficiency is improved.
In one implementation manner, the obtaining the first trust factor corresponding to the third phone number includes:
wherein, T represents the first trust factor, T represents the using time of the third telephone number, a and c represent the calling number of times of the user corresponding to the third telephone number, k and d represent the number of times that the third telephone number is marked as a harassment call by the user x, T x And the second trust factor of the user x is represented, when the e and the y represent the times of marking the calling user by the user corresponding to the third telephone number when the third telephone number is called, the j represents the validity of marking the calling user by the user corresponding to the third telephone number, if the validity is valid, the j is 0, and if the validity is invalid, the j is 1.
Wherein ln (t) The longer the length of time indicated as registered and used by the third telephone number means that the greater the probability that the user account to which the third telephone number corresponds is a normal user account, the correspondingly higher the third telephone number credit level has a positive effect on its credit factor, whereas most nuisance calls are new telephone numbers and will not be used for a long time, and therefore the life cycle of the nuisance call is relatively short.
In the above formulaA credit record representing the calling behaviour of this third telephone number, whose first trust factor is reduced if the third telephone number is marked as a nuisance call, can be derived from the formula. And if the corresponding second trust factor of the victim is large, the higher the mark reliability thereof, the more reliable the third telephone numberThe greater the impact of the first trust factor.
In the above formulaWhen the third telephone number is called, the user corresponding to the third telephone number carries out marking data statistics on the harassment behaviors of the caller, if the blockchain network judges that the marking behaviors of the user corresponding to the third telephone number are valid, the first trust factor of the user corresponding to the third telephone number can be rewarded relatively, and if the marking of the user corresponding to the third telephone number is invalid, the first trust factor of the user corresponding to the third telephone number can be reduced correspondingly. In this way, the user can be encouraged to effectively mark, while preventing malicious marking actions by the user.
Therefore, the credit degree of one user is evaluated by setting the trust factor, the user can punish the harassment call user, the trust factor is reduced, the user is given greater authority and operation space, and the user experience and the enthusiasm for harassment call marking are improved.
An embodiment of the present application provides an incoming call processing method, for example, as shown in fig. 4, and an application embodiment provides an architecture schematic diagram of an incoming call processing method, which is described in detail below with reference to fig. 4 and 5:
terminal of target user: the target subscriber accesses the terminal of the telecommunications network and also acts as a subscriber on the blockchain network, typically the terminal locally providing a blacklist and whitelist of telephone numbers.
Operator side: is a provider of the user's mobile phone number.
Terminal manufacturer: is the producer of the terminal of the target user.
Bloom filters, which are placed in the target user's terminal, are used to quickly filter common official mobile phone numbers, such as national government authorities, large companies, etc., reducing queries to blockchains.
White list number base, which is placed in block chain network and stores the official mobile phone number, such as the number of national government agency and large-scale company.
Block chain network: and storing the user trust factor, the registration behavior of the telephone number and the user call behavior data by taking the relational database as a bottom layer.
Harassing call verification module: the intelligent recognition and judgment method is deployed in a blockchain network node and used for intelligently recognizing and judging the evidence of the harassment call.
And a certificate storage module: and the file identified as the nuisance call is desensitized and stored in the blockchain network node.
An intelligent contract module: and storing and running the interception policy intelligent contract set by the user.
The embodiment of the application provides an incoming call processing method, which comprises the following steps:
1) If the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, generating a key pair corresponding to the second telephone number, wherein the key pair comprises a first public key and a first private key, and transmitting the second telephone number and the first public key to the blockchain network.
Specifically, the terminal device of the target user may obtain the international mobile subscriber identity (International Mobile Subscriber Identity, IMSI) by reading a subscriber identity module (Subscriber Identity Module, SIM) card, if the IMSI is changed, it indicates that the phone number corresponding to the terminal of the target user is changed, and the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number, specifically, the terminal may be replaced by the target user, for the terminal of the target user, the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number, or the phone number corresponding to the terminal of the target user is replaced by the target user, and the phone number corresponding to the terminal of the target user is updated from the first phone number to the second phone number, so that the blockchain network may find the first intelligent contract corresponding to the second phone number according to the second phone number, and the blockchain network may update the second public key in the first intelligent contract to the first public key to generate the second intelligent contract.
Therefore, after the target user changes the terminal, the first public key can be still sent to the blockchain network to update the second public key in the first intelligent contract to generate the second intelligent contract through generating the first public key and the first private key, and the second intelligent contract can be called through the first private key, so that the problem that the terminal of the target user needs to reset an incoming call interception policy after the terminal is changed is solved, and the setting deployment efficiency of the interception policy is improved.
2) And under the condition that the first public key and the second telephone number sent by the terminal of the target user are received, the blockchain network determines a first intelligent contract corresponding to the second telephone number, updates the second public key in the first intelligent contract to the first public key and generates a second intelligent contract.
Specifically, under the condition that a first public key and a second telephone number sent by a terminal of a target user are received, the blockchain network determines a first intelligent contract corresponding to the second telephone number by searching an intelligent contract matched with the second telephone number, wherein the first intelligent contract is stored in an intelligent contract module in the blockchain network, after the first intelligent contract corresponding to the second telephone number is determined, a second public key in the first intelligent contract can be updated to be the first public key, the second intelligent contract is generated, the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy.
The second public key in the first intelligent contract is updated to be the first public key, and the second intelligent contract is generated, so that the blockchain network can determine the second intelligent contract comprising the first public key corresponding to the first private key in the blockchain network according to the first private key sent by the terminal of the target user, and the target user can still call the second intelligent contract corresponding to the second telephone number through the first private key when the terminal is replaced, and therefore deployment setting can be continued on the second intelligent contract.
3) The terminal of the target user sends the first private key to the blockchain network, a second intelligent contract in the blockchain network is called through the first private key, and if the operation of modifying the first incoming call interception strategy by the target user is received; in response to the operation, updating the first incoming call interception policy to a second incoming call interception policy, generating a third intelligent contract, and sending the third intelligent contract to the blockchain network.
Specifically, after the second phone number and the first public key are sent to the blockchain network, the blockchain network can find the first intelligent contract corresponding to the second phone number according to the second phone number, the blockchain network can update the second public key in the first intelligent contract to the first public key, the terminal of the target user can send the first private key to the blockchain network, find the second intelligent contract where the first public key corresponding to the first private key is located through the first private key, and call the second intelligent contract.
Therefore, the target user can use the first private key to continuously call the first incoming call interception policy of the second telephone number under the condition of changing the terminal setting or the telephone number, the problem that the incoming call interception policy needs to be reset under the condition of changing the terminal setting or the telephone number by the target user is solved, and the incoming call interception efficiency is improved.
If the operation of modifying the first incoming call interception policy in the second intelligent contract by the target user is received, updating the first incoming call interception policy to the second incoming call interception policy according to the modification of the target user so as to generate a third intelligent contract, and sending the third intelligent contract to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
4) If the terminal of the target user receives the call, the terminal cannot determine whether the call is a harassment call, and then sends a third number corresponding to the call to the blockchain network.
As shown in fig. 5, if a terminal of a target user receives a call, it may first determine whether a third phone number corresponding to the call is in a local blacklist of the terminal or in a local whitelist, if the third phone number is in the local blacklist, the call is automatically suspended, if the third phone number is in the local whitelist, the call is automatically connected, if the third phone number is neither in the local blacklist nor in the local whitelist, it is determined whether the third phone number is in a bloom filter preset locally, the bloom filter stores data of a whitelist number library in a blockchain network, and if the third phone number is not in the bloom filter, the third phone number is sent to the blockchain network.
5) And if the blockchain network receives a third telephone number corresponding to the telephone call sent by the terminal, determining an operation instruction aiming at the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal.
As shown in fig. 5, if the third phone number sent by the terminal of the target user is received, it may be first determined whether the third phone number is in a white list number bank in the blockchain network, if the third phone number is in the white list number bank in the blockchain network, an operation instruction for completing the call is returned to the terminal of the target user, if the third phone number is not in the white list number bank in the blockchain network, it is determined whether the third phone number is already registered in the blockchain network, if the third phone number is not registered in the blockchain network, the blockchain network sends the third phone number to the second intelligent contract, the first total number of calls of the third phone number is obtained, if the first total number of calls is less than or equal to N, it is determined that the operation instruction for completing the call corresponding to the third phone number is an automatic disconnection call, and the operation instruction is sent to the terminal of the target user.
If the total number of the first calls is equal to the sum of N and 1, that is, the total number of the first calls is equal to N+1, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, sending the operation instruction to the terminal of the target user, and sending a first notification message to the terminal of the target user, wherein the first notification message is used for notifying that the terminal of the target user has received the call of the third phone number.
If the total number of the first incoming calls is greater than or equal to the sum of N and 2, that is, if the total number of the first incoming calls is greater than or equal to n+2, determining that the operation instruction for the telephone call corresponding to the third telephone number is a call incoming call, and sending the operation instruction to the terminal of the target user.
When the target user sets the first incoming call interception policy, setting N in the first incoming call interception policy, wherein N is a positive integer.
In this way, if the third telephone number is not registered in the blockchain network, the operation instruction of the telephone call corresponding to the third telephone number is determined by judging the relation between the total number of the first calls of the third telephone number and N set in the first call interception policy, so that the harassment success rate of harassment calls is effectively reduced, and the telephone call can be switched on only after the total number of the telephone calls reaches the call number set by a user, thereby avoiding the interception error under the characteristic condition.
If the third telephone number is registered on the blockchain network, a first trust factor corresponding to the third telephone number is obtained, and the blockchain network firstly judges the relation between the first trust factor of the third telephone number and a preset trust threshold.
If the first trust factor is larger than or equal to a preset trust threshold, determining that the operation instruction is a call, and sending the operation instruction to a terminal of a target user, and if the first trust factor is smaller than the preset trust threshold, acquiring the total number of second calls of a third phone number;
if the total number of the second calls is less than or equal to M, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, and sending the operation instruction to the terminal of the target user.
If the total number of the second calls is equal to the sum of M and 1, that is, the total number of the second calls is equal to M+1, determining that the operation instruction for the call corresponding to the third phone number is automatic disconnection of the call, sending the operation instruction to the terminal of the target user, and sending a first notification message to the terminal of the target user, wherein the first notification message is used for notifying that the terminal of the target user has received the call of the third phone number.
If the total number of the second calls is greater than or equal to the sum of M and 2, namely, the total number of the second calls is greater than or equal to M+2, determining that the operation instruction for the call corresponding to the third phone number is a call, and sending the operation instruction to the terminal of the target user.
When a target user sets a first incoming call interception policy, setting M and a preset trust threshold in the first incoming call interception policy, wherein M is a positive integer.
Therefore, the trust degree of the third telephone number can be judged through the first trust factor, the telephone incoming call of the third telephone number with low trust factor value can be limited by combining with the second intelligent contract, the harassment success rate of harassment calls is effectively reduced, the third telephone number with low trust factor value can be connected only after the total number of the second telephone number reaches the preset call times of the target user, the false interception under the characteristic condition is avoided, and the harassment call interception efficiency is improved.
6) The blockchain network sends an operation instruction for the telephone call corresponding to the third telephone number to the terminal of the target user, and the terminal of the target user executes corresponding operation for the telephone call corresponding to the third telephone number according to the operation instruction.
7) The target user can mark the harassment call, the second telephone number, the user account number and the call data need to be uploaded when the harassment call is marked, and after the harassment call verification module verifies the call data, the target user is desensitized and stores the data if the harassment call is determined to be the harassment call.
It should be noted that, in the method for processing an incoming call according to the embodiment of the present application, the execution body may be an incoming call processing device, or a control module for executing the method for processing an incoming call in the incoming call processing device. In the embodiment of the application, the incoming call processing device is taken as an example to describe the incoming call processing device provided by the embodiment of the application.
Fig. 6 is a schematic structural diagram of an incoming call processing device according to an embodiment of the application. As shown in fig. 6, the incoming call processing apparatus 600 includes: a generation module 610, a transmission module 620, a calling module 630 and an execution module 640.
A generating module 610, configured to generate a key pair corresponding to a second phone number if a phone number corresponding to a terminal of a target user is updated from the first phone number to the second phone number, where the key pair includes a first public key and a first private key; a sending module 620, configured to send the second phone number and the first public key to a blockchain network, where the second phone number is used to find a first smart contract corresponding to the second phone number, the first public key is used to update a second public key in the first smart contract to generate a second smart contract, and both the first smart contract and the second smart contract include a first incoming call interception policy preset by the target user; a calling module 630, configured to send the first private key to the blockchain network, and call the second smart contract in the blockchain network through the first private key; and an execution module 640, configured to execute, for the incoming call, an operation corresponding to the operation instruction if a call is received and an operation instruction for the incoming call sent by the blockchain network is received, where the operation instruction is determined by the blockchain network according to a third phone number corresponding to the incoming call and the second smart contract.
In one implementation, the incoming call processing apparatus 600 further includes a modification module 650 configured to: if the operation of modifying the first incoming call interception policy by the target user is received; and in response to the operation, updating the first incoming call interception policy to a second incoming call interception policy, generating a third intelligent contract, and sending the third intelligent contract to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
The incoming call processing device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and embodiments of the present application are not limited in particular.
The incoming call processing device in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The incoming call processing device provided by the embodiment of the present application can implement each process implemented in the method embodiment of fig. 1, and in order to avoid repetition, details are not repeated here.
It should be noted that, in the method for processing an incoming call according to the embodiment of the present application, the execution body may be an incoming call processing device, or a control module for executing the method for processing an incoming call in the incoming call processing device. In the embodiment of the application, the incoming call processing device is taken as an example to describe the incoming call processing device provided by the embodiment of the application.
Fig. 7 is a schematic structural diagram of an incoming call processing device according to an embodiment of the present application. As shown in fig. 7, the incoming call processing apparatus 700 includes: a receiving module 710, an updating module 720, a determining module 730.
A receiving module 710, configured to determine, when a first public key and a second phone number sent by a terminal of a target user are received, a first smart contract corresponding to the second phone number, where the first public key corresponds to the second phone number; an updating module 720, configured to update a second public key in the first smart contract to the first public key, and generate a second smart contract, where the first smart contract includes a second public key and a first incoming call interception policy, and the second smart contract includes the first public key and the first incoming call interception policy; and the determining module 730 is configured to determine an operation instruction for the incoming call according to the second smart contract and the third phone number if the third phone number corresponding to the incoming call sent by the terminal is received, and send the operation instruction to the terminal, where the operation instruction is used for the terminal to execute an operation corresponding to the operation instruction for the incoming call.
In one implementation manner, the updating module 720 is further configured to receive a first private key sent by the terminal when the terminal of the target user invokes a second smart contract through the first private key, verify the first private key through the first public key, and if verification is successful, send the second smart contract to the terminal of the target user; and receiving a third intelligent contract sent by the terminal of the target user, wherein the third intelligent contract is generated by updating the first incoming call interception policy to a second incoming call interception policy at the terminal of the target user, and the third intelligent contract comprises the first public key and the second incoming call interception policy.
In one implementation, the determining module 730 is configured to determine, according to the second intelligent contract, an operation instruction for the incoming call if the third phone number is not registered on the blockchain network; if the third telephone number is registered on the blockchain network, acquiring a first trust factor corresponding to the third telephone number; determining an operation instruction for the telephone call according to the first trust factor and the second intelligent contract; the first trust factor corresponds to a user account corresponding to the third telephone number, and the user account is obtained by combining the third telephone number and user information corresponding to the third telephone number when the third telephone number is registered, and the first trust factor is used for indicating the credibility of a user corresponding to the third telephone number.
In one implementation, the determining module 730 is configured to obtain a first total number of calls of the third phone number; if the total number of the first incoming calls is less than or equal to N, determining that the operation instruction is to automatically disconnect the incoming call; if the total number of the first calls is equal to the sum of N and 1, determining that the operation instruction is to automatically disconnect the call, and the blockchain network sends a first notification message to the terminal, wherein the first notification message is used for notifying the terminal that the call of the third telephone number has been received; if the first incoming call total number is greater than or equal to the sum of N and 2, determining that the operation instruction is to make the incoming call; and setting the first incoming call interception policy by the target user when setting the first incoming call interception policy, wherein N is a positive integer.
In one implementation, the determining module 730 is configured to determine that the operation instruction is to make the incoming call if the first trust factor is greater than or equal to a preset trust threshold; if the first trust factor is smaller than the preset trust threshold, acquiring a second total number of calls of the third telephone number; if the second incoming call total number is less than or equal to M, determining that the operation instruction for the telephone incoming call is automatic disconnection of the telephone incoming call; if the total number of the second calls is equal to the sum of M and 1, determining that the operation instruction for the call is to automatically disconnect the call, and the blockchain network sends a second notification message to the terminal of the target user, wherein the second notification message is used for notifying the target user that the terminal of the target user has received the call of the third phone number; if the second incoming call total number is greater than or equal to the sum of M and 2, determining that the operation instruction for the telephone incoming call is to put through the telephone incoming call; and setting the M and the preset trust threshold in the first incoming call interception policy by the target user when the first incoming call interception policy is set, wherein M is a positive integer.
In one implementation manner, the obtaining the first trust factor corresponding to the third phone number includes:
wherein T represents the first trust factor, and T represents the first trust factorThe using time of three telephone numbers, wherein a and c represent the number of times of user calling connection corresponding to the third telephone number, k and d represent the number of times of marking the third telephone number as a harassing call by a user x, and T is as follows x And the second trust factor of the user x is represented, when the e and the y represent the times of marking the calling user by the user corresponding to the third telephone number when the third telephone number is called, the j represents the validity of marking the calling user by the user corresponding to the third telephone number, if the validity is valid, the j is 0, and if the validity is invalid, the j is 1.
The incoming call processing device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and embodiments of the present application are not limited in particular.
The incoming call processing device in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The incoming call processing device provided by the embodiment of the present application can implement each process implemented in the method embodiment of fig. 2, and in order to avoid repetition, details are not repeated here.
Optionally, as shown in fig. 8, an electronic device 800 is further provided according to an embodiment of the present application, including a processor 801 and a memory 802, where the memory 802 stores a program or instructions executable on the processor 801, and the program or instructions are implemented when executed by the processor 801: if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, generating a key pair corresponding to the second telephone number, wherein the key pair comprises a first public key and a first private key; the second telephone number and the first public key are sent to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user; sending the first private key to the blockchain network, and calling the second intelligent contract in the blockchain network through the first private key; and if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, executing an operation corresponding to the operation instruction for the telephone call, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and the second intelligent contract.
In one implementation, if an operation of modifying the first incoming call interception policy by the target user is received; and in response to the operation, updating the first incoming call interception policy to a second incoming call interception policy, generating a third intelligent contract, and sending the third intelligent contract to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
Alternatively, the program or instructions may be implemented when executed by the processor 801: determining a first intelligent contract corresponding to a second telephone number under the condition that a first public key and the second telephone number sent by a terminal of a target user are received, wherein the first public key corresponds to the second telephone number; updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy; if a third telephone number corresponding to the telephone call sent by the terminal is received, determining an operation instruction aiming at the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal, wherein the operation instruction is used for the terminal to execute the operation corresponding to the operation instruction aiming at the telephone call.
In one implementation, under the condition that a terminal of the target user invokes a second intelligent contract through a first private key, the first private key sent by the terminal is received, the first private key is verified through the first public key, and if verification is successful, the second intelligent contract is sent to the terminal of the target user; and receiving a third intelligent contract sent by the terminal of the target user, wherein the third intelligent contract is generated by updating the first incoming call interception policy to a second incoming call interception policy at the terminal of the target user, and the third intelligent contract comprises the first public key and the second incoming call interception policy.
In one implementation, if the third phone number is not registered on the blockchain network, determining an operation instruction for the phone call according to the second smart contract; if the third telephone number is registered on the blockchain network, acquiring a first trust factor corresponding to the third telephone number; determining an operation instruction for the telephone call according to the first trust factor and the second intelligent contract; the first trust factor corresponds to a user account corresponding to the third telephone number, and the user account is obtained by combining the third telephone number and user information corresponding to the third telephone number when the third telephone number is registered, and the first trust factor is used for indicating the credibility of a user corresponding to the third telephone number.
In one implementation, obtaining a first total number of calls for the third telephone number; if the total number of the first incoming calls is less than or equal to N, determining that the operation instruction is to automatically disconnect the incoming call; if the total number of the first calls is equal to the sum of N and 1, determining that the operation instruction is to automatically disconnect the call, and the blockchain network sends a first notification message to the terminal, wherein the first notification message is used for notifying the terminal that the call of the third telephone number has been received; if the first incoming call total number is greater than or equal to the sum of N and 2, determining that the operation instruction is to make the incoming call; and setting the first incoming call interception policy by the target user when setting the first incoming call interception policy, wherein N is a positive integer.
In one implementation, if the first trust factor is greater than or equal to a preset trust threshold, determining that the operation instruction is to make the incoming call; if the first trust factor is smaller than the preset trust threshold, acquiring a second total number of calls of the third telephone number; if the second incoming call total number is less than or equal to M, determining that the operation instruction for the telephone incoming call is automatic disconnection of the telephone incoming call; if the total number of the second calls is equal to the sum of M and 1, determining that the operation instruction for the call is to automatically disconnect the call, and the blockchain network sends a second notification message to the terminal of the target user, wherein the second notification message is used for notifying the target user that the terminal of the target user has received the call of the third phone number; if the second incoming call total number is greater than or equal to the sum of M and 2, determining that the operation instruction for the telephone incoming call is to put through the telephone incoming call; and setting the M and the preset trust threshold in the first incoming call interception policy by the target user when the first incoming call interception policy is set, wherein M is a positive integer.
In one implementation manner, the obtaining the first trust factor corresponding to the third phone number includes:
wherein said T represents said firstA trust factor, wherein T represents the use duration of the third telephone number, a and c represent the number of times of calling the user corresponding to the third telephone number, k and d represent the number of times that the third telephone number is marked as a harassing call by a user x, and T x And the second trust factor of the user x is represented, when the e and the y represent the times of marking the calling user by the user corresponding to the third telephone number when the third telephone number is called, the j represents the validity of marking the calling user by the user corresponding to the third telephone number, if the validity is valid, the j is 0, and if the validity is invalid, the j is 1.
The specific execution steps can refer to the steps of the incoming call processing method embodiment, and the same technical effects can be achieved, so that repetition is avoided, and the description is omitted here.
It should be noted that, the electronic device in the embodiment of the present application includes: a server, a terminal, or other devices besides a terminal.
The above electronic device structure does not constitute a limitation of the electronic device, and the electronic device may include more or less components than illustrated, or may combine some components, or may be different in arrangement of components, for example, an input unit, may include a graphics processor (Graphics Processing Unit, GPU) and a microphone, and a display unit may configure a display panel in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit includes at least one of a touch panel and other input devices. Touch panels are also known as touch screens. Other input devices may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
The memory may be used to store software programs as well as various data. The memory may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory may include volatile memory or nonvolatile memory, or the memory may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM).
The processor may include one or more processing units; optionally, the processor integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, and the like, and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor.
The embodiment of the application also provides a readable storage medium, wherein the readable storage medium stores a program or an instruction, and the program or the instruction realizes each process of the incoming call processing method embodiment or each process of the incoming call processing method embodiment when being executed by a processor, and can achieve the same technical effect, so that repetition is avoided and redundant description is omitted.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes computer readable storage medium such as ROM, RAM, magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (9)

1. The incoming call processing method is characterized by being applied to a terminal and comprising the following steps:
if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, generating a key pair corresponding to the second telephone number, wherein the key pair comprises a first public key and a first private key;
the second telephone number and the first public key are sent to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user;
sending the first private key to the blockchain network, and calling the second intelligent contract in the blockchain network through the first private key;
and if a telephone call is received and an operation instruction for the telephone call sent by the blockchain network is received, executing an operation corresponding to the operation instruction for the telephone call, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and the second intelligent contract.
2. The method for handling incoming calls according to claim 1, said method further comprising:
if the operation of modifying the first incoming call interception policy by the target user is received;
and in response to the operation, updating the first incoming call interception policy to a second incoming call interception policy, generating a third intelligent contract, and sending the third intelligent contract to the blockchain network, wherein the third intelligent contract comprises the second incoming call interception policy and the first public key.
3. The incoming call processing method is characterized by being applied to a blockchain network and comprising the following steps of:
determining a first intelligent contract corresponding to a second telephone number under the condition that a first public key and the second telephone number sent by a terminal of a target user are received, wherein the first public key corresponds to the second telephone number;
updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy;
If a third telephone number corresponding to the telephone call sent by the terminal is received, determining an operation instruction aiming at the telephone call according to the second intelligent contract and the third telephone number, and sending the operation instruction to the terminal, wherein the operation instruction is used for the terminal to execute the operation corresponding to the operation instruction aiming at the telephone call.
4. A method of handling an incoming call as recited in claim 3, further comprising:
under the condition that a terminal of the target user invokes a second intelligent contract through a first private key, receiving the first private key sent by the terminal, verifying the first private key through the first public key, and if verification is successful, sending the second intelligent contract to the terminal of the target user;
and receiving a third intelligent contract sent by the terminal of the target user, wherein the third intelligent contract is generated by updating the first incoming call interception policy to a second incoming call interception policy at the terminal of the target user, and the third intelligent contract comprises the first public key and the second incoming call interception policy.
5. The method of claim 3, wherein the determining the operational instructions for the telephone call based on the second smart contract and the third telephone number comprises:
If the third telephone number is not registered on the blockchain network, determining an operation instruction for the telephone incoming call according to the second intelligent contract;
if the third telephone number is registered on the blockchain network, acquiring a first trust factor corresponding to the third telephone number;
determining an operation instruction for the telephone call according to the first trust factor and the second intelligent contract; the first trust factor corresponds to a user account corresponding to the third telephone number, and the user account is obtained by combining the third telephone number and user information corresponding to the third telephone number when the third telephone number is registered, and the first trust factor is used for indicating the credibility of a user corresponding to the third telephone number.
6. The method of claim 5, wherein determining the operational instructions for the telephone call according to the second smart contract comprises:
acquiring a first total number of calls of the third telephone number;
if the total number of the first incoming calls is less than or equal to N, determining that the operation instruction is to automatically disconnect the incoming call;
If the total number of the first calls is equal to the sum of N and 1, determining that the operation instruction is to automatically disconnect the call, and the blockchain network sends a first notification message to the terminal, wherein the first notification message is used for notifying the terminal that the call of the third telephone number has been received;
if the first incoming call total number is greater than or equal to the sum of N and 2, determining that the operation instruction is to make the incoming call;
and setting the first incoming call interception policy by the target user when setting the first incoming call interception policy, wherein N is a positive integer.
7. The method of claim 5, wherein determining the operational instructions for the telephone call based on the first trust factor and the second smart contract comprises:
if the first trust factor is greater than or equal to a preset trust threshold, determining that the operation instruction is to make the telephone call;
if the first trust factor is smaller than the preset trust threshold, acquiring a second total number of calls of the third telephone number;
if the second incoming call total number is less than or equal to M, determining that the operation instruction for the telephone incoming call is automatic disconnection of the telephone incoming call;
If the total number of the second calls is equal to the sum of M and 1, determining that the operation instruction for the call is to automatically disconnect the call, and the blockchain network sends a second notification message to the terminal of the target user, wherein the second notification message is used for notifying the target user that the terminal of the target user has received the call of the third phone number;
if the second incoming call total number is greater than or equal to the sum of M and 2, determining that the operation instruction for the telephone incoming call is to put through the telephone incoming call;
and setting the first incoming call interception policy by the target user when setting the first incoming call interception policy, wherein M is a positive integer.
8. An incoming call processing device is characterized by being applied to a terminal and comprising:
the generation module is used for generating a key pair corresponding to a second telephone number if the telephone number corresponding to the terminal of the target user is updated from the first telephone number to the second telephone number, wherein the key pair comprises a first public key and a first private key;
the sending module is used for sending the second telephone number and the first public key to a blockchain network, wherein the second telephone number is used for searching a first intelligent contract corresponding to the second telephone number, the first public key is used for updating a second public key in the first intelligent contract to generate a second intelligent contract, and the first intelligent contract and the second intelligent contract both comprise a first incoming call interception strategy preset by the target user;
The calling module is used for sending the first private key to the blockchain network and calling the second intelligent contract in the blockchain network through the first private key;
and the execution module is used for executing the operation corresponding to the operation instruction for the telephone call if the telephone call is received and the operation instruction for the telephone call sent by the blockchain network is received, wherein the operation instruction is determined by the blockchain network according to a third telephone number corresponding to the telephone call and the second intelligent contract.
9. An incoming call processing device, applied to a blockchain network, comprising:
a receiving module, configured to determine a first smart contract corresponding to a second phone number if a first public key and the second phone number sent by a terminal of a target user are received, where the first public key corresponds to the second phone number;
the updating module is used for updating a second public key in the first intelligent contract to the first public key to generate a second intelligent contract, wherein the first intelligent contract comprises the second public key and a first incoming call interception policy, and the second intelligent contract comprises the first public key and the first incoming call interception policy;
The determining module is configured to determine an operation instruction for the phone call according to the second intelligent contract and the third phone number if the third phone number corresponding to the phone call sent by the terminal is received, and send the operation instruction to the terminal, where the operation instruction is used for the terminal to execute an operation corresponding to the operation instruction for the phone call.
CN202210493649.6A 2022-05-07 2022-05-07 Incoming call processing method and device Active CN114979378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210493649.6A CN114979378B (en) 2022-05-07 2022-05-07 Incoming call processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210493649.6A CN114979378B (en) 2022-05-07 2022-05-07 Incoming call processing method and device

Publications (2)

Publication Number Publication Date
CN114979378A CN114979378A (en) 2022-08-30
CN114979378B true CN114979378B (en) 2023-11-10

Family

ID=82980450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210493649.6A Active CN114979378B (en) 2022-05-07 2022-05-07 Incoming call processing method and device

Country Status (1)

Country Link
CN (1) CN114979378B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194633A (en) * 2018-08-21 2019-01-11 山东智慧云链网络科技有限公司 Address book backup method and system
CN111371941A (en) * 2018-12-26 2020-07-03 中兴通讯股份有限公司 Method and device for preventing harassing call, terminal and storage medium
CN111786994A (en) * 2020-06-30 2020-10-16 腾讯科技(深圳)有限公司 Data processing method based on block chain and related equipment
CN114172995A (en) * 2021-11-11 2022-03-11 微位(深圳)网络科技有限公司 Incoming call processing method and device, electronic equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194633A (en) * 2018-08-21 2019-01-11 山东智慧云链网络科技有限公司 Address book backup method and system
CN111371941A (en) * 2018-12-26 2020-07-03 中兴通讯股份有限公司 Method and device for preventing harassing call, terminal and storage medium
CN111786994A (en) * 2020-06-30 2020-10-16 腾讯科技(深圳)有限公司 Data processing method based on block chain and related equipment
CN114172995A (en) * 2021-11-11 2022-03-11 微位(深圳)网络科技有限公司 Incoming call processing method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN114979378A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
US8549594B2 (en) Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN104376263B (en) The method and apparatus that application behavior intercepts
Dunham Mobile malware attacks and defense
Lee et al. An empirical study of wireless carrier authentication for {SIM} swaps
Androulidakis Mobile phone security and forensics
CN104462961A (en) Mobile terminal and privacy permission optimizing method thereof
RU2007139592A (en) ORGANIC ACCESS TO FUNCTIONAL SETTINGS OF MOBILE PHONE
US11706336B2 (en) Managing spoofed calls to mobile devices
Srivastava et al. Smartphone triggered security challenges—Issues, case studies and prevention
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
US8938805B1 (en) Detection of tampering with software installed on a processing device
KR101033973B1 (en) System and method for preventing voice phishing with white list
KR101306074B1 (en) Method and system to prevent phishing
CN114979378B (en) Incoming call processing method and device
CN108694329A (en) A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method
CN112260983A (en) Identity authentication method, device, equipment and computer readable storage medium
CN108718369B (en) Gateway access method, device and computer storage medium
CN115065562A (en) Block chain-based injection determination method, device, equipment and storage medium
US8380165B1 (en) Identifying a cloned mobile device in a communications network
Yang et al. Research on detection and prevention of mobile device botnet in cloud service systems
CN111405107B (en) Call control method, device, equipment and storage medium
CN1060006C (en) Anti-theft method for the number code of mobile telephone
CN110472418B (en) Security vulnerability protection method and system and related equipment
TW201112720A (en) Method of communication device recognition code and dynamic code for network identification and telephone fraud certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant