CN115623430A - Method and system for marking telephone number, electronic equipment and server - Google Patents

Method and system for marking telephone number, electronic equipment and server Download PDF

Info

Publication number
CN115623430A
CN115623430A CN202210951777.0A CN202210951777A CN115623430A CN 115623430 A CN115623430 A CN 115623430A CN 202210951777 A CN202210951777 A CN 202210951777A CN 115623430 A CN115623430 A CN 115623430A
Authority
CN
China
Prior art keywords
server
telephone number
voiceprint feature
call
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210951777.0A
Other languages
Chinese (zh)
Other versions
CN115623430B (en
Inventor
杨昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202210951777.0A priority Critical patent/CN115623430B/en
Publication of CN115623430A publication Critical patent/CN115623430A/en
Application granted granted Critical
Publication of CN115623430B publication Critical patent/CN115623430B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a method, a system, electronic equipment and a server for marking a telephone number, and relates to the technical field of communication. The method in the application comprises the following steps: the calling equipment uploads the text information and the voice information corresponding to the calling user to the server, and after the called equipment receives the telephone call, the voice information and the text information corresponding to the calling user can be obtained from the server, so that the called user can decide whether to put through the call. By adopting the method, the called equipment can acquire the identity information of the calling user, so that the probability of answering a fraud call can be reduced when an unfamiliar call is received, and the problem of missing valuable calls is avoided.

Description

Method and system for marking telephone number, electronic equipment and server
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for labeling a phone number, an electronic device, and a server.
Background
At present, junk calls and fraud calls are increased, and users usually refuse to receive strange calls in order to avoid being cheated or save time cost of the users.
Although the rejection of strange calls can reduce the probability of the user being cheated and the time cost of the user in invalid calls, the rejection of strange calls can cause the user to miss valuable calls, such as interview calls, calls dialed by friends using new numbers, and the like.
Disclosure of Invention
In order to solve the technical problems, the application provides a method, a system, an electronic device and a server for telephone number labeling, so that a called device can acquire identity information about a calling user, the probability of answering a fraud call can be reduced when an unfamiliar call is received, and the problem of missing valuable calls is avoided.
In a first aspect, the present application provides a method for labeling a phone number, which is applied to a system for labeling a phone number, and the system includes: the method comprises the following steps that a first electronic device, a second electronic device and a server which is in communication connection with the first electronic device and the second electronic device respectively are included, and the method comprises the following steps: the method comprises the steps that first electronic equipment obtains multimedia information labeled by a calling user, wherein the multimedia information comprises text information and voice information; the first electronic equipment uploads a first telephone number and multimedia information used for the call to a server; the server stores the multimedia information corresponding to the calling user; the first electronic equipment initiates the telephone call to the second electronic equipment by adopting a first telephone number; the second electronic equipment receives the telephone call initiated by the first electronic equipment and initiates an acquisition request to the server; the server responds to the acquisition request, acquires the multimedia information corresponding to the calling party according to the first telephone number, and transmits the multimedia information corresponding to the calling party to the second electronic equipment; and the second electronic equipment receives the multimedia information corresponding to the calling user so that the called user can check the text information corresponding to the calling user and listen to the voice information.
Therefore, the calling user can upload the multimedia information labeled by the calling user to the server before initiating the call, the called device (namely, the second electronic device) can acquire the multimedia information corresponding to the calling user from the server after receiving the call, and the called user can acquire the identity of the calling user based on the text information; meanwhile, the voice of each person is different, so that the called user can verify the identity of the calling user based on the voice information corresponding to the calling user, and the problem that the incoming call is rejected because the incoming call is displayed as a strange user is avoided; for example, the text information is "i am friend a", and the called subscriber can determine whether the calling subscriber is friend a through voice information. Due to the voice information, the information for verifying the identity of the calling user is added, so that the called user can determine the identity of the calling user, and further decide whether to reject an unfamiliar call (such as a fraud call, a product promotion call and the like), the time cost for the called user to answer the call is reduced, and the probability that the called user is cheated is reduced.
According to the first aspect, before the server stores the multimedia information corresponding to the calling subscriber, the method further includes: the server acquires a first voiceprint feature extracted from the voice information; the server detects whether the voice information is legal or not according to the first voiceprint characteristics; and if the server detects that the voice information is legal, executing the operation of storing the multimedia information corresponding to the calling user.
Therefore, the server carries out security verification on the voice information corresponding to the calling user, and the problem that the called user is cheated due to the fact that the calling user disguises the voice can be further avoided.
According to the first aspect, the server detects whether the voice information is legal according to the first voiceprint feature, including: the server acquires a first template voiceprint feature corresponding to the stored first telephone number, wherein the first template voiceprint feature is the voiceprint feature of a user to which the first telephone number belongs; and if the server detects that the first template voiceprint feature matched with the first voiceprint feature exists, determining that the voice information is legal.
Therefore, the server can quickly determine whether the first voiceprint feature belongs to the voiceprint of the user to which the first telephone number belongs by comparing the first voiceprint feature with the first template voiceprint feature, and further determine that the voice message is legal.
According to a first aspect, the method further comprises: and if the server detects that the first template voiceprint feature matched with the first voiceprint feature does not exist, determining that the voice information is illegal. Therefore, the condition that the calling user simulates the sound of the user to which the first telephone number belongs can be avoided, and the probability that the called user is cheated is reduced.
According to the first aspect, the server detects whether the voice information is legal according to the first voiceprint feature, including: the server acquires the stored preset illegal voiceprint characteristics; the server detects whether a preset illegal voiceprint feature matched with the first voiceprint feature exists or not; and if the server detects that the preset illegal voiceprint features matched with the first voiceprint features exist, determining that the voice information is illegal.
Therefore, the server stores the preset illegal voice characteristics, compares the first voiceprint characteristics with the preset illegal voiceprint characteristics, and can quickly and accurately determine the illegal voice information.
According to a first aspect, the method further comprises: if the server detects that the first template voiceprint feature matched with the first voiceprint feature does not exist, the server acquires the stored preset illegal voiceprint feature; the server detects whether a preset illegal voiceprint feature matched with the first voiceprint feature exists or not; and if the server detects that the preset illegal voiceprint matched with the first voiceprint characteristic exists, determining that the voice information is illegal.
Therefore, when the first voiceprint characteristic is not matched with the first template voiceprint characteristic, the first voiceprint characteristic is compared with the stored preset illegal voiceprint characteristic instead of directly judging that the voice information is illegal, so that a user not belonging to the first telephone number can use the first telephone number to call under special conditions, such as the condition that the mobile phone of the user is not electrified and the condition that the user forgets to carry the mobile phone of the user; conditions for judging illegal voice information are increased, and accuracy of judging illegal voice information is further improved.
According to a first aspect, the method further comprises: if the server detects that no preset illegal voiceprint matched with the first voiceprint characteristic exists, acquiring a second telephone number uploaded by the first electronic device; the server acquires a second template voiceprint feature corresponding to the stored second telephone number, wherein the second template voiceprint feature is the voiceprint feature of the user to which the second telephone number belongs; if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, determining that the voice information is legal; and if the server detects that the second template voiceprint feature matched with the first voiceprint feature does not exist, determining that the voice information is illegal.
Therefore, when the first voiceprint feature is not matched with the first template voiceprint feature or the preset illegal voiceprint feature, the first voiceprint feature is compared with the second template voiceprint feature, the problem that telephone number labeling cannot be carried out when a user to which the second telephone number belongs calls by using the first telephone number is avoided, and the accuracy of voice security verification is further improved.
According to a first aspect, the method further comprises: and if the server detects that the second template voiceprint feature matched with the first voiceprint feature does not exist, adding the first voiceprint feature in the stored preset illegal voiceprint features.
Therefore, when the first voiceprint characteristics are not matched with the first template voiceprint characteristics, the preset illegal voiceprint characteristics and the second template voiceprint, the voice information can be judged to be illegal, the first voiceprint characteristics are added into the stored preset illegal voiceprint characteristics, the number of the preset illegal voiceprint characteristics can be increased, and the accuracy of verification of the illegal voiceprint characteristics is improved.
According to a first aspect, the method further comprises: if the server detects that the first template voiceprint feature matched with the first voiceprint feature does not exist, acquiring a second telephone number uploaded by the first electronic device; the server acquires a second template voiceprint feature corresponding to the stored second telephone number, wherein the second template voiceprint feature is the voiceprint feature of the user to which the second telephone number belongs; if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, determining that the voice information is legal; and if the second template voiceprint feature matched with the first voiceprint feature does not exist, determining that the voice information is illegal.
Therefore, when the first voiceprint characteristic is not matched with the first template voiceprint characteristic, the first voiceprint characteristic is compared with the second template voiceprint characteristic, the problem that telephone number labeling cannot be carried out when a user to which the second telephone number belongs uses the first telephone number to call is avoided, and the accuracy of voice security verification is further improved.
According to a first aspect, the method further comprises: the first electronic equipment responds to the operation of inputting the second telephone number triggered by the calling user and displays an input frame; and the first electronic equipment responds to the second telephone number input by the calling user in the input box, acquires the second telephone number and uploads the second telephone number to the server. Therefore, the calling user can trigger and input the second telephone number, the second telephone number is actively reported to the server, the time length for the server to acquire the second telephone number is reduced, and the judgment time length for judging whether the voice information is legal is shortened.
According to the first aspect, before obtaining the second phone number uploaded by the first electronic device, the method further includes: the server sends a first instruction to the first electronic equipment, wherein the first instruction is used for indicating the first electronic equipment to upload a second telephone number; the first electronic equipment receives the first instruction and displays an input box to instruct a user to input a second telephone number; the first electronic equipment responds to a second telephone number input by the user in the input box, acquires the second telephone number and uploads the second telephone number to the server. Therefore, the server can timely inform the first electronic equipment of uploading the second telephone number, and the judgment time length for judging whether the voice information is legal is shortened.
According to a first aspect, the method further comprises: if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, a first label is marked on the first telephone number, and the first label is used for indicating that the first telephone number does not belong to a calling party; the server responds to the acquisition request and issues the first label to the second electronic equipment; the second electronic device displays the first label on the call interface. Therefore, the first label is marked on the first telephone number, so that the called user can conveniently check the information of the calling user, and the problem that the called user directly hangs up a strange telephone is avoided.
According to a first aspect, a server stores multimedia information corresponding to a calling subscriber, comprising: the server stores a first corresponding relation between the first telephone number and the second telephone number; the server takes the second telephone number as the identification information of the calling user and stores the second corresponding relation between the identification information of the calling user and the multimedia information. Therefore, when the first telephone number does not belong to the calling party, the first corresponding relation and the second corresponding relation are stored, so that a subsequent server can conveniently inquire accurate multimedia information corresponding to the calling party.
According to a first aspect, a server responds to an acquisition request and acquires multimedia information corresponding to a calling user according to a first telephone number, and the method comprises the following steps: if the server detects that the label information of the first telephone number is a first label, acquiring a second telephone number corresponding to the first telephone number according to the first telephone number and the first corresponding relation; and the server acquires the multimedia information corresponding to the second telephone number as the multimedia information corresponding to the calling party according to the second telephone number and the second corresponding relation. Therefore, when the first telephone number does not belong to the calling party, the server can accurately acquire the multimedia information corresponding to the calling party according to the first telephone number provided by the second electronic equipment.
According to a first aspect, the method further comprises: if the server detects that the first template voiceprint feature matched with the first voiceprint feature exists, a second label is marked on the first telephone number, and the second label is used for indicating that the first telephone number belongs to a calling party; the server responds to the acquisition request and issues the second label to the second electronic equipment; the second electronic device displays the second label on the call interface. Therefore, the second label is marked on the first telephone number, so that the called user can conveniently check the information of the calling user, and the user to which the first telephone number belongs is determined to be the calling user.
According to a first aspect, the server stores multimedia information corresponding to a calling subscriber, including: and the server takes the first telephone number as the identification information of the calling party and stores the third corresponding relation between the identification information of the calling party and the multimedia information. Therefore, when the first telephone number belongs to the calling party, the third corresponding relation between the first telephone number and the uploaded multimedia information is stored, and the subsequent server can conveniently and quickly find the multimedia information corresponding to the calling party.
According to a first aspect, a server responds to an acquisition request, acquires multimedia information corresponding to a calling user according to a first telephone number, and comprises: and if the server detects that the label information of the first telephone number is the second label, acquiring the multimedia information corresponding to the first telephone number as the multimedia information corresponding to the calling user according to the first telephone number and the third corresponding relation. Therefore, the server can accurately inquire the multimedia information corresponding to the calling subscriber according to the first telephone number.
According to a first aspect, the second electronic device is in a conversation state with the first electronic device, the method further comprising: if the second electronic equipment detects the first hang-up operation of the called user, a forward credit value of the calling user is increased, wherein the forward credit value is used for indicating the number of times that the multimedia information marked by the calling user is matched with the call content before the call; if the second electronic equipment detects a second hang-up operation of the called user, increasing a negative credit value of the calling user, wherein the negative credit value is used for indicating the number of times that the multimedia information marked by the calling user is unmatched before the call; the second electronic equipment uploads the new positive reputation value/the new negative reputation value of the calling user to the server; the server updates the calling user's positive reputation value to a new positive reputation value or updates the calling user's negative reputation value to a new negative reputation value. Therefore, the credit value corresponding to the calling user can be updated in time through the hang-up operation of the called user.
According to a first aspect, the method further comprises: the server responds to the acquisition request and issues a positive credit value and a negative credit value corresponding to the calling user to the second electronic equipment; and the second electronic equipment displays the positive credit value and the negative credit value corresponding to the calling user in a display screen. Therefore, the server stores the credit value corresponding to the calling user, the credit value can reflect the matching degree of the content marked by the calling user before the call and the call content, and the credit value of the calling user can further increase the information for judging whether the multimedia information corresponding to the calling user is accurate, so that the called user can easily decide whether to connect the call.
According to the first aspect, the obtaining, by the first electronic device, the voice information corresponding to the calling party includes: the method comprises the steps that first electronic equipment detects whether recording duration exceeds first preset duration and is smaller than second preset duration; if the first electronic equipment detects that the time length is less than a first preset time length, prompting the calling user to record again; and if the first electronic equipment detects that the recording duration exceeds a first preset duration and is less than a second preset duration, acquiring voice information. Therefore, the capacity of the voice information is not too large, the speed of uploading the voice information to the server is not affected, and the problem that the useful information is little due to too small voice information can be avoided.
According to a first aspect, the method further comprises: and if the server detects that the voice information is illegal, sending a stop instruction to the first electronic equipment, wherein the stop instruction indicates that the first electronic equipment exits the labeling process of the telephone number. Therefore, the user who uploads the illegal voice information is prohibited from continuously marking the telephone number, and the probability that the called user is cheated can be further reduced.
According to a first aspect, the method further comprises: and if the second electronic equipment detects that the negative reputation value of the calling user exceeds a threshold value, hanging up the call. Therefore, the call can be directly hung up without the operation of the called user, and the operation steps of the called user are reduced.
According to a first aspect, the multimedia information further comprises: video information. Therefore, video information can be added to further increase the information for verifying the identity of the calling party and improve the accuracy of the called party in judging the identity of the calling party.
In a second aspect, the present application provides a system for telephone number labeling, comprising: the system comprises a first electronic device, a second electronic device and a server in communication connection with the first electronic device and the second electronic device; the first electronic device is specifically configured to: acquiring multimedia information labeled by a calling user, wherein the multimedia information comprises text information and voice information; uploading a first telephone number and multimedia information for the call to a server; the server is specifically configured to: multimedia information corresponding to the calling subscriber; a first electronic device to: initiating the telephone call to the second electronic equipment by adopting the first telephone number; a second electronic device to: if a telephone call initiated by first electronic equipment is received, initiating an acquisition request to a server; a server to: responding to the acquisition request, acquiring multimedia information corresponding to the calling party according to the first telephone number, and sending the multimedia information corresponding to the calling party to the second electronic equipment; a second electronic device to: and receiving the multimedia information corresponding to the calling user so that the called user can check the text information corresponding to the calling user and listen to the voice information.
Any implementation manner of the second aspect and the second aspect corresponds to any implementation manner of the first aspect and the first aspect, respectively. For technical effects corresponding to any one implementation manner of the second aspect and the second aspect, reference may be made to the technical effects corresponding to any one implementation manner of the first aspect and the first aspect, and details are not repeated here.
In a third aspect, the present application provides an electronic device, comprising: one or more processors; a memory; and one or more computer programs, wherein the one or more computer programs are stored on the memory and when executed by the one or more processors, cause the electronic device to perform the method of telephone number tagging performed by the first electronic device or the second electronic device in the first aspect or any possible implementation manner of the first aspect.
Any one implementation manner of the third aspect corresponds to any one implementation manner of the first aspect. For technical effects corresponding to any one implementation manner of the third aspect and the third aspect, reference may be made to the technical effects corresponding to any one implementation manner of the first aspect and the first aspect, and details are not described here again.
In a fourth aspect, the present application provides a server, comprising: one or more processors; a memory; and one or more computer programs, wherein the one or more computer programs are stored on the memory, which when executed by the one or more processors, cause the server to perform the method of telephone number tagging performed by the server of the first aspect or any possible implementation manner of the first aspect.
Any one implementation manner of the fourth aspect and the fourth aspect corresponds to any one implementation manner of the first aspect and the first aspect, respectively. For technical effects corresponding to any one implementation manner of the fourth aspect and the fourth aspect, reference may be made to the technical effects corresponding to any one implementation manner of the first aspect and the first aspect, and details are not repeated here.
In a fifth aspect, the present application provides a computer-readable medium for storing a computer program, which, when the computer program runs on an electronic device, causes the electronic device to perform the method for labeling a phone number corresponding to the first aspect and any implementation manner of the first aspect.
Any one implementation manner of the fifth aspect and the fifth aspect corresponds to any one implementation manner of the first aspect and the first aspect, respectively. For technical effects corresponding to any one of the implementation manners of the fifth aspect and the fifth aspect, reference may be made to the technical effects corresponding to any one of the implementation manners of the first aspect and the first aspect, and details are not repeated here.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram illustrating a scenario in which a called device receives a telephone call;
FIG. 2 is a schematic diagram of an exemplary illustrated electronic device;
FIG. 3 is a schematic diagram of a software architecture of an exemplary illustrated electronic device;
FIG. 4 is a flow chart illustrating one type of telephone number labeling;
FIG. 5 is a diagram illustrating an exemplary scenario of telephone number labeling;
FIG. 6 is a schematic flow chart illustrating yet another exemplary telephone number labeling;
FIG. 7 is a flow chart illustrating the server detecting whether the voice information of the calling subscriber is legitimate;
FIG. 8 is an exemplary illustration showing the reputation value of the calling user after the second electronic device determines the call;
fig. 9 is a schematic view of an exemplary scenario in which a first electronic device records voice;
fig. 10 is a schematic diagram illustrating a first electronic device obtaining a second phone number;
FIG. 11 is a call interface diagram of an exemplary second electronic device;
FIG. 12 is yet another call interface diagram of the second electronic device that is shown by way of example;
fig. 13 is a schematic diagram illustrating an exemplary scenario in which the second electronic device determines the reputation value of the calling user.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, of the embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
In some embodiments, phone numbers of different contacts are stored in the mobile phone, and when the mobile phone receives a phone call, if the call application detects that a number identical to the phone number of the current call exists in the stored phone numbers, information of the contact (for example, information of the contact stored corresponding to the number) is displayed on a call interface; and if the call application detects that the stored telephone numbers do not have the same number as the telephone number of the current call, displaying prompting information of a stranger on a call interface, and displaying the telephone number of the calling equipment. Referring to fig. 1, fig. 1 is a schematic diagram illustrating an exemplary scenario in which a called device receives a telephone call. The called device displays the call interface 101, and when the call application detects that the telephone number of the calling party is a strange telephone number, a prompt message 102 and the strange telephone number 103 are displayed on the call interface 101. The call interface 101 includes an on control 104 and a hang-up control 105. Usually, the user sees that the call is marked as a strange call, the called user slides in a direction generally shown by a black arrow in fig. 1, and the call application hangs up the call in response to the sliding operation of the called user.
In some embodiments, the called user may start an interception application, the interception application may identify a crank call based on a phone number in a blacklist, and a source of the phone number in the blacklist may be manually added by the user or may be acquired through a network. Telephone numbers in the network blacklist are typically collected by manual addition/tagging of a large number of handset users. However, many unknown calls exist, and the called party either answers the unknown calls or directly sets to reject all the unknown calls, that is, the harassment interception application hangs up the call when detecting that the called telephone number is the unknown telephone number.
Refusing to accept strange calls may result in the user missing some important calls, such as a call dialed by a friend using a new number, an interview call, etc. The call received by the called party can be a problem of fraudulent calls if the strange call is not rejected.
The embodiment of the application provides a method for labeling a telephone number, called equipment can display multimedia information labeled by a calling user on a calling interface, the multimedia information comprises text information and voice information, and the voice information and the text information carry related information of the call, so that the called user can quickly acquire content related to the call from the calling interface and determine the identity of the calling user, and the called user can decide whether to put through the call, so that the called user does not need to answer all strange calls or reject all strange calls, and the flexibility and the safety of answering strange calls are improved.
The electronic device in the embodiment of the present application may be a device with a call function, such as a mobile phone and a wearable device (such as a smart watch and a bracelet). In the present application, the electronic device is described by taking a mobile phone as an example.
Fig. 2 is a schematic structural diagram of an electronic device 100 according to an embodiment of the present application. It should be understood that fig. 2 illustrates electronic device 100 as just one example of an electronic device, and that electronic device 100 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in fig. 1 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The electronic device 100 may include: the mobile terminal includes a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like. Wherein the sensor module 180 may include a pressure sensor, a gyroscope sensor, an air pressure sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, etc.
Fig. 3 is a block diagram of a software structure of the electronic device 100 according to the embodiment of the present application.
The layered architecture of the electronic device 100 divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into three layers, which are an application layer, an application framework layer, and a kernel layer from top to bottom. It is to be understood that the layers in the software architecture of fig. 3, as well as the components included in each layer, do not constitute a specific limitation of the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer layers than those shown, and may include more or fewer components in each layer, which is not limited in this application.
As shown in fig. 3, the application layer may include a series of application packages. The application packages may include telephony applications, voice recording, WLAN, bluetooth, music, games, short messages, galleries, maps, navigation, etc. applications.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 3, the application framework layers may include a window manager, resource manager, content provider, view system, phone manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions for the electronic device 100. Such as management of call status (including on, off, etc.).
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
It is to be understood that the layers in the software structure and the components included in each layer shown in fig. 3 do not constitute a specific limitation to the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer layers than those shown, and may include more or fewer components in each layer, which is not limited in this application.
Fig. 4 is a flow chart illustrating an exemplary telephone number labeling. The method for labeling the telephone number can be applied to a system for labeling the telephone number, and the system can comprise a first electronic device, a second electronic device and a server which is in communication connection with the first electronic device and the second electronic device. Optionally, the first electronic device and the second electronic device may be of different types, for example, the first electronic device is a mobile phone, and the second electronic device is a smart watch. In this example, the first electronic device is exemplified by a mobile phone a, and the second electronic device is exemplified by a mobile phone B. The process of labeling telephone numbers is shown in fig. 4, and includes:
step 401: the mobile phone A acquires text information and voice information for the call.
Specifically, the calling user may enable a call application, in which a text editing function and a voice recording function are provided. The call application displays a text entry box in response to a call editing operation by the calling user. The calling user can input text information in the input box, the text information can be the name of the calling user, such as ' i is XXX ', and the text information can be the type of calling content, such as ' insurance recommendation ', ' recruitment recommendation ', ' hotel ' call for confirming booking information, express delivery, take-out ', and the like.
For example, as shown in 5a of fig. 5, if the call application is first enabled, the caller display interface 501 displays the user name of the caller, such as "user a"; a first phone number 502, a first dial option 503, a video dial option 504, a text messaging option 505, a text annotation option 506, and a voice update control 507. When the caller clicks the first dialing option 503, in response to the caller clicking the first dialing option 503, an editing interface 508 is displayed, where the editing interface 508 includes: a second dialing option 509 and a pre-call editing option 510. The second dialing option 509 is used to trigger the handset a to initiate a telephone call to handset B. The pre-call edit option 510 is used to trigger the telephony application to enter a text message editing mode, i.e., the calling user can make text edits (e.g., enter new information or edit the displayed text). As shown in fig. 5a, the text message currently displayed in the text label option 506 is empty, the calling user may click on the edit before call option 510, and the call application displays a text entry box. The caller may enter "my is XXXX" information in the input box and after the entry is complete, the text information is displayed on the display. As shown in fig. 5b, the text label option 506 displays the text information "i am XXXX" of the call.
In one example, the call application may detect whether the number of characters input exceeds a preset number threshold, and if it is determined that the number exceeds the number threshold, the call application may output a first prompt message to indicate that the number of characters input by the calling user exceeds the number threshold. And if the call application detects that the number of the input characters is less than or equal to the number threshold, acquiring the input characters as text information corresponding to the calling party.
In one example, the call application responds to the recording operation of the calling user, starts a recording function in the mobile phone a, records audio information, and obtains a recording duration. As shown in fig. 5b, the calling user clicks the voice update control 507 and the call application starts recording audio information. And if the call application detects that the recording duration exceeds a first preset duration and is less than a second preset duration, acquiring the recorded audio information as the voice information corresponding to the calling subscriber. Optionally, the first predetermined duration should ensure that the audio information can be recorded, for example, the first predetermined duration may be 2 seconds. The second preset duration may be determined based on the maximum storage capacity of the handset a for allowing the voice message. For example, if the maximum storage capacity of the voice information allowed by the mobile phone a is 938kB, it is determined that the second preset time period may be 10 seconds. If the call application detects that the recording duration is less than the first preset duration or the recording duration exceeds a second preset duration, second prompt information can be output, and the second prompt information is used for prompting the user to record the voice information again. For example, the second prompt message is "record duration is less than 2 seconds, please re-record" and "record duration exceeds 10 seconds, please re-record".
Optionally, the call application may store the text information input by the calling user and the recorded voice information in the mobile phone a. When the call application is started, the call application can acquire the stored text information and voice information of the last call, and take the text information and voice information of the last call as the text information and voice information of the current call of the calling party. Optionally, the call application of the mobile phone a may further display the text information of the call and display a voice update control for triggering update of the voice information on the display interface. If the calling user triggers the voice updating control, the call application starts to record audio information, and detects that the recording duration exceeds a first preset duration and is less than a second preset duration, the re-recorded audio information is used as the voice information corresponding to the calling of the calling user.
For example, if the handset a stores the text information of the last call (e.g. as text _ 1) and the voice information of the last call (e.g. as audio _ 1). After the conversation application is started, the stored text information text _1 and the stored voice information audio _1 corresponding to the last call can be acquired, and the text information text _1 and the voice information audio _1 are used as the text information and the voice information corresponding to the calling party of the current call. As shown in fig. 5b, a text label option 506 is displayed in the calling display interface 501, and the call application may fill the obtained text _1 in the text label option 506 for display. If the calling user clicks the voice update control 507, the audio information can be recorded again.
Step 402: and the mobile phone A uploads the text information and the voice information of the calling party to the server.
Specifically, if the call application of the mobile phone a determines to acquire the text information and the voice information corresponding to the call, the text information and the voice information corresponding to the call may be uploaded. Optionally, the handset a uploads the first phone number for calling handset B at the same time.
Step 403: the server stores text information and voice information corresponding to the calling subscriber.
Specifically, the server may store text information and voice information corresponding to each calling subscriber. Optionally, because the telephone number has uniqueness, the server can accurately inquire text information and voice information corresponding to the calling user by the telephone number of the calling user. Table 1 shows multimedia information corresponding to a calling party stored in the server in this example, as shown in table 1, the server may use a telephone number of the calling party as a Key (i.e., key), and use text information and voice information corresponding to the calling party as a Key value (value) of the Key, as shown in table 1. The storage paths of the text information and the voice information are stored in table 1, the server can acquire the text information according to the storage paths of the text information in table 1, and acquire the corresponding voice information according to the storage paths of the voice information in table 1.
TABLE 1
Telephone number of calling subscriber Text information Voice information
138 9186XXXX /dataset/txt/01.txt /dataset/med/01.dat
Optionally, after storing the text information and the voice information of the calling subscriber, the server may feed back an indication that the storage is successful to the handset a. The handset a, upon receiving the indication that the storage is successful, may perform step 404.
Optionally, before the mobile phone a receives the indication information that the storage is successful, which is fed back by the server, the call permission of the call control 509 is set to be disabled, for example, the background of the call control 509 is set to be gray, and the mobile phone a cannot click. After receiving the indication information of successful storage fed back by the server, the mobile phone a releases the disabling right of the call control 509.
Step 404: the mobile phone A initiates the telephone call to the mobile phone B by adopting the first telephone number.
Specifically, the mobile phone a may initiate the current phone call to the mobile phone B by using the first phone number, and a process of the phone call is similar to a process of the existing phone call, which will not be described herein again.
It should be noted that the first phone number is a phone number of the current handset a for initiating a phone call.
Step 405: and the mobile phone B receives the telephone call and sends an acquisition request to the server.
Specifically, after receiving a telephone call, the handset B can acquire the telephone number of the call initiated by the handset a. The mobile phone B generates an acquisition request, and the acquisition request carries the phone number of the call initiated by the mobile phone A, namely the first phone number.
Step 406: and the server responds to the received acquisition request and acquires the text information and the voice information corresponding to the calling subscriber.
Specifically, after receiving the acquisition request, the server acquires the first telephone number from the acquisition request. The server inquires the text information and the voice information matched with the first telephone number, and takes the inquired text information and the voice information matched with the first telephone number as the text information and the voice information corresponding to the calling party. For example, the server performs an inquiry with a first phone number (e.g., 138 9186XXXX), and the server acquires text information and voice information corresponding to the first phone number according to the storage path of the text information and the storage path of the voice information in table 1, and uses the text information and the voice information corresponding to the first phone number as text information and voice information corresponding to the calling party.
Step 407: the server sends text information and voice information corresponding to the calling subscriber to the mobile phone B.
Step 408: the mobile phone B obtains the on/off operation of the called user.
Specifically, after receiving the text information and the voice information corresponding to the calling party, the mobile phone B may display the text information and the voice information of the calling party on a call interface of the mobile phone B. The called user can check the text information of the calling user and verify the accuracy of the text information of the calling user by playing the voice information of the calling user so as to confirm the identity of the calling user, so that the called user can decide whether to put through the call based on the identity of the calling user.
For example, as shown in fig. 5d, 5d is a schematic diagram illustrating a scenario where the handset B receives a phone call from the handset a. A user tag 521 for identifying the calling number is displayed on the call interface 520, and as shown in fig. 5d, the tag indicates that the user corresponding to the telephone number is a stranger user. Also displayed on the call interface 520 is a calling telephone number 522 (i.e., a first telephone number). A text annotation option 523 and a voice annotation option 524 corresponding to the calling subscriber. The text label option 523 includes text information corresponding to the calling subscriber; the voice tagging option 524 includes a play control 525, and the play control 525 is configured to trigger the call application to play voice information corresponding to the calling user.
If the text information corresponding to the calling user is "i are friend a", the called user clicks the play control 525, and the call application responds to the click operation of the called user to play the voice information corresponding to the calling user. If the called user determines that the played sound of the language information belongs to the friend a, the called user clicks the receiving control in the call interface 520, and the call application acquires a call connection operation input by the user to connect the call. If the called user determines that the sound corresponding to the voice information of the calling user does not belong to the friend a, the called user can click the rejection control in the call interface 520, the call application obtains the hang-up operation input by the called user, and the call is hung up.
In this example, a calling user can edit corresponding text information and voice information before calling, and after receiving the call, a called device can acquire the text information and the voice information corresponding to the calling user from a server, and since voiceprints of each person are different, the information of the identity of the calling user can be enriched through the voice information, so that a called user can determine the identity of the user based on the text information and the voice information of the calling user, and the called user can make a decision whether to reject the call; therefore, the problem that the called user refuses to answer the call because the mobile phone B displays an strange call can be avoided, the problem that the called user answers an unimportant strange call (such as a fraud call, a product promotion call and the like) can also be avoided, and the time cost for the called user to answer the call is reduced.
In some embodiments, in order to reduce the probability of receiving a fraudulent call by a called device, a server of the present application detects whether voice information of a calling user is legal before storing text information and voice information corresponding to the calling user; and if the server detects that the voice information of the calling party is illegal, stopping storing the voice information and the text information of the calling party, and indicating the first electronic equipment to exit the process of marking the telephone number.
Fig. 6 is a schematic diagram illustrating an exemplary process of telephone number labeling, where the process of telephone number labeling includes:
step 601: the mobile phone A acquires text information and voice information used for the call.
And the mobile phone A responds to the recording operation of the calling user to acquire the authority of voiceprint authorization given by the calling user. After receiving the voiceprint authorization authority input by the calling user, the mobile phone A records voice; if the mobile phone A receives the authority of refusing the voiceprint authorization input by the calling user, the mobile phone A exits the labeling process of the telephone number.
It should be noted that, the process of obtaining the text information and the voice information corresponding to the calling user in this step is substantially the same as that in step 401, and reference may be made to the related description in step 401, which will not be described herein again.
For example, as shown in fig. 9, if the call application is enabled, a user name of a calling user, such as "user a", is displayed on the calling display interface 901; a first phone number 902, a first dial option 903, a video dial option 904, a short message option 905, a text label option 906, and a voice update control 907. The calling user may edit the text in the text annotation option (e.g., enter new information or edit the displayed text). As shown in fig. 9, the text information currently displayed in the text labeling option 906 is "i am XXXX", the calling user can click the voice update control 907, the call application of the mobile phone a responds to the operation of the calling user clicking the voice update control 907, and a voiceprint authorization interface 908 is displayed, and an authorization statement, an agreement control 909, and a rejection control 910 are displayed in the voiceprint authorization interface 908. If the calling user clicks the agreement control 909, the call application of the mobile phone a receives the permission given by the calling user for voiceprint authorization, and executes a voice recording process; if the calling user clicks the rejection control 910, the call application of the mobile phone a receives a rejection instruction for the calling user to reject the permission given by the voiceprint authorization, and exits from the voice recording process.
Step 602: the mobile phone A acquires a first voiceprint feature of a calling user.
Specifically, if the mobile phone a has a voiceprint extraction function, the mobile phone a may extract a first voiceprint feature from the voice information of the calling user. The extraction of the voiceprint features by the mobile phone a is similar to that of the prior art, and will not be described again here.
Optionally, if the mobile phone a does not have the voiceprint extraction function, the mobile phone a may upload all the voiceprint authorization permission, the voice information, and the text information to the server, and the server extracts the first voiceprint feature from the voice information corresponding to the calling user after receiving the uploaded voiceprint authorization permission.
In this example, the mobile phone a has a voiceprint extraction function.
Step 603: the mobile phone A uploads the text information, the voice information and the first voiceprint feature of the calling user.
Step 604: and the server detects whether the voice information of the calling party is legal or not according to the first voiceprint characteristic.
In this example, the process of the server detecting whether the voice information of the calling subscriber is legal is shown in fig. 7, and includes the following sub-steps.
Step 6041: the server acquires a first template voiceprint feature corresponding to the stored first telephone number.
Specifically, the server may store the voiceprint feature to which each calling subscriber belongs, and since the telephone number has uniqueness, the server uses the telephone number corresponding to the calling subscriber as the identification of the calling subscriber. The server stores the first template voiceprint feature corresponding to each telephone number, namely the server stores the voiceprint feature to which each calling subscriber belongs. The server searches for a first template voiceprint feature corresponding to the first telephone number according to the first telephone number. Optionally, each phone number may have at least 2 corresponding first template voiceprint features. For example, the mobile phone a uploads the phone number of "138XX1" and the voiceprint feature a corresponding to "138XX1" to the server for the first time; the server stores the telephone number '138 XX 1' and the corresponding voiceprint feature A, namely the voiceprint feature A is used as a first template voiceprint feature corresponding to the first telephone number; the mobile phone uploads the phone number of '138 XX 1' and the voiceprint feature B corresponding to '138 XX 1' to the server for the second time, and if the server detects that the number (for example, 1) of the stored first voiceprint features corresponding to '138 XX 1' is smaller than the preset number (for example, 2), the voiceprint feature B is also used as the first template voiceprint feature of '138 XX 1'. The mobile phone uploads the phone number of "138XX1" and the voiceprint feature C corresponding to "138XX1" to the server for the third time, and if the server detects that the number of the first template voiceprint features of "138XX1" reaches the preset number, the server detects whether the voiceprint feature matching with the voiceprint feature C exists in the first template voiceprint features corresponding to "138XX1", that is, step 6042 is executed.
Optionally, the server may also store the phone number of the server that the handset a uploads for the first time and the corresponding voiceprint feature. For example, the mobile phone a uploads the phone number of "138XX1" and the voiceprint feature a corresponding to "138XX1" to the server for the first time; the server stores the telephone number '138 XX 1' and the corresponding voiceprint characteristic A, namely the voiceprint characteristic A is used as a first template voiceprint characteristic corresponding to the first telephone number; the mobile phone uploads the phone number of '138 XX 1' and the voiceprint feature B corresponding to '138 XX 1' to the server for the second time, and if the server detects that the voiceprint feature B corresponding to the phone number of '138 XX 1' is stored, the server detects whether the voiceprint feature B is matched with the stored voiceprint feature a.
Step 6042: the server detects whether there is a first template voiceprint feature that matches the first voiceprint feature. If the server detects that the first template voiceprint feature matched with the first voiceprint feature exists, executing step 6049; if the server detects that there is no first template voiceprint feature matching the first voiceprint feature, the server performs step 6043.
Step 6043: the server detects whether a preset illegal voiceprint feature matched with the first voiceprint feature exists. If the server detects that the preset illegal voiceprint features matched with the first voiceprint features exist, executing a step 6047; if the server detects that there is no preset illegal voiceprint feature matching the first voiceprint feature, step 6044 is performed.
Specifically, the server and the preset voiceprint features of various fraudsters are stored in advance to serve as the preset illegal voiceprint features, and the server can also add new voiceprint features to the preset illegal voiceprint features periodically or aperiodically so as to enrich the number of the preset illegal voiceprint features.
If the server detects that the preset illegal voiceprint feature matched with the first voiceprint feature exists, it is determined that the voice message is illegal, and the probability (such as 90% probability) that the calling user is a fraud is indicated.
If the server detects that the preset illegal voiceprint feature matched with the first voiceprint feature does not exist, whether the user to which the second telephone number belongs is the calling user can be detected. I.e., steps 6044-6048.
Step 6044: the server acquires the second telephone number.
Specifically, if the server detects that there is no preset illegal voiceprint feature matching the first voiceprint feature, the server may issue a first instruction to the mobile phone a, where the first instruction is used to instruct the mobile phone a to upload the second phone number. The mobile phone A receives the first instruction and can display an input box of the second telephone number on the display interface.
For example, as shown in fig. 10a, the server issues a first instruction to the mobile phone a, the mobile phone a receives the first instruction, and displays a prompt window 1002 on the display interface 1001, where the prompt window 1002 includes prompt information, such as "please input a telephone number commonly used". The prompt window 1002 further includes an input box 1003 for a frequently-used telephone number input by the calling user, the calling user clicks the determination control 1004, and the mobile phone a obtains the frequently-used telephone number (i.e., the second telephone number) obtained by the calling user and uploads the frequently-used telephone number to the server.
Optionally, the handset a may further display an input box of the second telephone number on the display interface in response to an operation of inputting the second telephone number triggered by the calling user. The calling user inputs a second telephone number in the input box, and the mobile phone A responds to the second telephone number input by the calling user, acquires the second telephone number and uploads the second telephone number to the server. The second telephone number is a common telephone number for the calling subscriber.
For example, as shown in 10b of fig. 10, a control 1006 is displayed on the display interface 1005. The control 1006 indicates that the mobile phone a does not belong to the calling party, and the calling party clicks the control 1006 to display a prompt window 1007 on the display interface 1005, wherein the prompt window 1007 contains prompt information, such as "please input a commonly used phone number". The prompt window 1007 further includes an input box 1008 for a commonly used telephone number input by the calling user, and when the calling user clicks the determination control 1009, the mobile phone a obtains the commonly used telephone number (i.e., the second telephone number) obtained by the calling user, and uploads the commonly used telephone number to the server.
Step 6045: and the server acquires a second template voiceprint characteristic corresponding to the stored second telephone number.
Illustratively, the server stores voiceprint features to which different calling users belong, and the server can query a second template voiceprint feature corresponding to the second telephone number according to the second telephone number. The second template voiceprint feature is a voiceprint feature of a user to whom the second telephone number belongs.
Step 6046: the server detects whether a second voiceprint feature matching the first voiceprint feature is present. If it is detected that a second voiceprint feature matching the first voiceprint feature exists, then go to step 6048; if it is detected that there is no second voiceprint feature matching the first voiceprint feature, then step 6047 is performed.
Step 6047: the server determines that the voice information corresponding to the calling user is illegal.
Step 6048: the server generates a first label.
Specifically, if the server detects that a second voiceprint feature matching the first voiceprint feature exists, a first tag may be generated, where the first tag is used to indicate that the first telephone number does not belong to the calling user, for example, the first tag is "non-native" or "non-native user".
The server marks the first label on the first telephone number, and simultaneously, the server also stores the first corresponding relation between the second telephone number and the first telephone number, as shown in table 2.
TABLE 2
Figure BDA0003789754520000141
The server labels the first phone number as "non-native" while storing a correspondence between "186XXX" and "138 XXX".
Step 6049: the server generates a second label.
Specifically, if the server detects that there is a first voiceprint feature matching the first voiceprint feature, a second tag may be generated, where the second tag is used to indicate that the first electronic device belongs to the calling user, and for example, the second tag is "this", "local user", or the like.
The server labels the second label to the first telephone number as shown in table 3.
TABLE 3
Figure BDA0003789754520000142
And the server detects that the first telephone number is marked as the second label, and then determines that the first telephone number does not have a corresponding second telephone number. It should be noted that, the server may clear the multimedia information (i.e., text information and voice information) corresponding to the calling subscriber after the calling subscriber finishes the call or the call each time. Optionally, the server may also store the multimedia information corresponding to the calling subscriber in the last call before the current call. In this example, as shown in table 2 and table 3, the server removes the multimedia information corresponding to the calling party after the calling party finishes the call or the call each time.
Step 6050: the server determines that the voice information corresponding to the calling user is legal.
Specifically, when the first voiceprint feature is matched with the first template voiceprint feature or matched with the second template voiceprint feature, the server determines that the voice information corresponding to the calling user is legal.
The server determines whether the uploaded voice information is legitimate through steps 6041 to 6050.
Step 605: and if the server detects that the voice information of the calling party is legal, storing the corresponding text information and the voice information of the calling party.
Specifically, if the server detects that the voice information of the calling party is legal, the server acquires the tag information corresponding to the first telephone number. And if the server detects that the label information corresponding to the first telephone number is the first label, storing the corresponding relation between the second telephone number and the text information and the voice information corresponding to the calling party, and storing the corresponding relation between the first telephone number and the second telephone number. And if the server detects that the label information corresponding to the first telephone number is the second label, establishing a corresponding relation between the first telephone number and text information and voice information corresponding to the calling party.
For example, the first phone number is "138XXX", and the second phone number is "186XXX"; the first phone number is the phone number used by handset a to call handset B. Text information text _1 and voice information media _1 uploaded by the mobile phone A. If the server detects that the tag information corresponding to the first phone number is the first tag, a second tag (such as a non-local tag) is marked on the 138XXX, and a first corresponding relation between the 138XXX and the 186XXX is stored. The server stores a second correspondence between the identification information of the calling subscriber and the multimedia information (i.e., text information text _1 and voice information media _ 1) with "186XXX" as the identification information of the calling subscriber. Specifically, as shown in table 4 and table 5, table 4 marks a first tag to the first phone number, and table 5 stores multimedia information corresponding to the second phone number and the calling party.
TABLE 4
Figure BDA0003789754520000151
TABLE 5
Figure BDA0003789754520000152
Step 606: the mobile phone A initiates the telephone call to the mobile phone B by adopting the first telephone number.
This step is substantially the same as step 404, and reference may be made to the related description in step 404, which will not be described herein again.
Step 607: the handset B sends an acquisition request to the server in response to the received telephone call.
This step is substantially the same as step 405, and reference may be made to the related description in step 405, which will not be described herein again.
Step 608: the server acquires text information and voice information corresponding to the calling user.
Specifically, the server acquires a first telephone number from the acquisition request, and inquires tag information corresponding to the first telephone number. And if the server detects that the label corresponding to the first telephone number is the first label, inquiring a second telephone number corresponding to the first telephone number. The server inquires text information and voice information corresponding to the second telephone number according to the second telephone number; and the text information and the voice information corresponding to the second telephone number are used as the text information and the voice information corresponding to the calling party. For example, as shown in table 4 and table 5, the first phone number is "138XXX", and the server detects the first tag and obtains the non-local commonly used number (i.e., the second phone number) "186XXX". The server carries out data query with '186 XXX', and queries text information (such as information in storage path/dataset/txt/02. Txt) and voice information (such as information in storage path/dataset/txt/02. Txt) corresponding to the '186 XXX'.
And if the server detects that the label corresponding to the first telephone number is the second label, acquiring text information and voice information corresponding to the first telephone number as text information and voice information corresponding to the calling party.
Optionally, the server may also issue the tag information corresponding to the first phone number to the mobile phone B. For example, if the server detects that the tag corresponding to the first phone number is the first tag, the text information and the voice information corresponding to the second phone number are used as the text information and the voice information corresponding to the calling party; and simultaneously, issuing a first label corresponding to the first telephone number to the mobile phone B.
Step 609: the server sends the text information and the voice information of the calling user to the mobile phone B.
Specifically, the server stores tag information corresponding to each phone number, and the server may issue text information, voice information, and tag information corresponding to the calling party to the mobile phone B.
Step 610: the mobile phone B obtains the operation of the called user and connects/hangs up the telephone call.
Specifically, the mobile phone B receives text information, voice information, and tag information corresponding to the calling party, and displays the text information and the tag information corresponding to the calling party on a call interface of the mobile phone B, and the called party can know the type of the telephone call by checking the text information; whether the dialed telephone number belongs to the calling subscriber is known through the label information. And the mobile phone B responds to the playing operation of the called user and plays the voice information corresponding to the calling user. The called user can further verify the accuracy of the text information through the voice information. In this example, the operation of the called user includes a connection operation and a hang-up operation.
For example, referring to fig. 11, fig. 11 is a schematic view illustrating a scenario in which a mobile phone B receives a phone call. As shown in fig. 11a, a user tag 1102 for identifying the first phone number is displayed on the call interface 1101, and as shown in fig. 11a, the user corresponding to the first phone number is indicated as a stranger user by the tag. The call interface 1101 also displays a telephone number 1103 (i.e., a first telephone number) at which a telephone call is initiated. A text annotation option 1104 and a voice annotation option 1105 corresponding to the calling subscriber. The text label option 1104 includes text information corresponding to the calling subscriber; the voice tagging option 1105 includes a play control 1106 and tag information 1107, where the play control 1106 is used to trigger the call application to play the voice information corresponding to the calling party. And if the labeling information acquired by the mobile phone B and corresponding to the first phone number is the second label, displaying the second label on the display interface, such as 'this' in 11 a.
If the handset B acquires that the tagging information corresponding to the first phone number is the first tag, the first tag is displayed on the display interface 1101, and as shown in fig. 11B, "not" 1108 (i.e., the first tag) is displayed in the voice tagging option 1105 in this example.
It should be noted that the call interface of the handset B displays a first label, which indicates that the telephone number currently initiating the call does not belong to the calling user, i.e. the telephone number "198 7654XXXX" is not the telephone number of the calling user.
Optionally, if the server detects that the tag information corresponding to the first phone number is the first tag information, the server may also issue the second phone number to the mobile phone B, and the mobile phone B clicks the first tag 1108 in response to the called party, and displays the second phone number to which the calling user belongs on the display interface 1101.
Step 611: and the mobile phone B determines the reputation value of the calling user according to the operation of the called user.
Specifically, the reputation value is used to indicate a degree to which a type of a telephone call initiated by a calling user matches information labeled by the calling user, where the information labeled by the calling user includes text information and voice information corresponding to the calling user. Optionally, the reputation value of the calling user comprises a positive reputation value and a negative reputation value, the positive reputation value being used to indicate the number of times the type of telephone call initiated by the calling user matches the information tagged by the calling user. The negative reputation value is used to indicate the number of times the type of telephone call initiated by the calling user does not match the information tagged by the calling user.
Illustratively, the server stores a positive reputation value and a negative reputation value corresponding to each telephone number, and if the telephone number of the calling user makes a telephone call for the first time, the positive reputation value and the negative reputation value of the calling user, which are stored by the server, are both 0. When the server receives the acquisition request sent by the mobile phone B, the server can also send the positive credit value and the negative credit value corresponding to the calling user to the mobile phone B, and the mobile phone B displays the positive credit value and the negative credit value of the calling user on a calling interface. As shown in fig. 12, a user tag 1202 for identifying a calling user is displayed on the call interface 1201 of the handset B, and the tag indicates that the user corresponding to the telephone number is a stranger user. The display interface 1201 also displays a phone number 1203 (i.e., a first phone number) for initiating a call, a text labeling option 1204, a playing control 1205, and label information 1206 corresponding to the first phone number. A positive reputation value 1207 and a negative reputation value 1208 corresponding to the calling user. The calling user corresponds to a positive reputation value of 195 and a negative reputation value of 2.
In this example, the mobile phone B may determine the reputation value of the calling user after the call according to the reputation value corresponding to the calling user and the operation of the called user, which are issued by the server, and the determination process is shown in fig. 8 and includes the following substeps.
Step 6110: the mobile phone B receives the call.
Step 6111: the handset B judges whether the present telephone call is connected. If the mobile phone B detects that the current phone call is connected, step 6112 is executed; if the mobile phone B detects that the present phone call is not connected, step 6115 is executed.
For example, after receiving the telephone call, the mobile phone B may display text information corresponding to the calling party and play voice information corresponding to the calling party. The called user decides whether to put through the telephone call or not according to the text information and the voice information corresponding to the calling user. The scenario that the mobile phone B receives the phone call is shown in fig. 12, and if the called user clicks the reject key, the mobile phone B hangs up the phone call in response to the hang-up operation of the user. Since the call is not connected, that is, the call between the handset a and the handset B is not established, the handset B keeps the current reputation value of the calling user, that is, step 6115 is executed.
Optionally, the not establishing the call between the mobile phone a and the mobile phone B further includes: the mobile phone A actively hangs up, the mobile phone A stops calling the mobile phone B, the mobile phone B does not detect the calling of the mobile phone A, and prompt information of hanging up of the mobile phone A can be output. The mobile phone B does not detect the connection/disconnection operation within a third preset time (for example, 60 seconds), and the mobile phone B automatically disconnects the phone call.
As shown in fig. 12, if the called user clicks the accept button, the mobile phone B responds to the connection operation of the user to connect the current telephone call, that is, the mobile phone a and the mobile phone B establish a call. When the mobile phone a and the mobile phone B establish a call, if the mobile phone B detects the hang-up operation, the mobile phone B detects whether the hang-up operation is normal, that is, step 6112 is executed.
Step 6112: the mobile phone B detects whether the normal hang-up operation is performed. If the mobile phone B determines that the normal hangup operation is detected, then step 6113 is executed; if the mobile phone B detects an abnormal hang-up operation, it determines to execute step 6114.
In this example, the called user may determine the positive reputation value or the negative reputation value of the phone number corresponding to the calling user through different hangup operations. Optionally, the hang-up operation comprises a first hang-up operation and a second hang-up operation. If the mobile phone B detects the first hang-up operation, the forward reputation value of the calling user is increased, and then step 6113 is executed. If the mobile phone B detects the second hang-up operation, the negative reputation value of the calling user is increased, and step 6114 is executed.
For example, as shown in fig. 13, fig. 13 exemplarily shows a scene diagram of different hang-up operations. As shown in fig. 13a of fig. 13, a user tag 1302 for identifying the calling user is displayed on the display interface 1301 of the mobile phone B, and the tag indicates that the user corresponding to the telephone number is a stranger user. The display interface 1301 also displays a phone number 1303 (i.e., a first phone number) for initiating a call, a call duration, and a call operation interface 1304. The call operation interface 1304 includes a first hang-up control 1305 and a second hang-up control 1306. The mobile phone B obtains a positive reputation value (195) and a negative reputation value (2) corresponding to the calling user, which are issued by the server. If the called user clicks on the first hang-up control 1305, the new forward reputation value is equal to the current forward reputation value plus 1, as shown in 13a of fig. 13, and the new forward reputation value is 196. The negative reputation value of the calling user is kept unchanged.
As shown in fig. 13b, if the called user clicks on the second hang-up control 1306, the new positive reputation value equals the current negative reputation value plus 1, and the new negative reputation value is 3. The forward reputation value of the calling user remains unchanged.
Step 6113: handset B determines to increase the forward reputation value of the calling user.
Step 6114: the handset B determines to increase the negative reputation value of the calling user.
Step 6115: handset B maintains the current reputation value of the calling user.
Step 612: and the mobile phone B uploads the reputation value of the calling user to the server.
Illustratively, after the call is ended, the handset B uploads the new reputation value of the calling user to the server.
Step 613: the server updates the reputation value of the calling user.
And the server receives the new credit value of the calling party uploaded by the mobile phone B and updates the credit value corresponding to the calling party into the new credit value. The server takes the telephone number corresponding to the calling user as the identification information of the data. As shown in table 6:
TABLE 6
Figure BDA0003789754520000181
Each phone number in table 6 corresponds to a stored path, a positive reputation value and a negative reputation value for the text message and the multimedia message.
Optionally, after each call is ended, the server may clear information of the tag information field corresponding to each phone number and information corresponding to the field of the non-native common number.
In other embodiments, if the called device detects the first hang-up operation of the user, the called device may obtain an increase value of the forward reputation value (for example, the increase value of the forward reputation value is 1), and after the called device ends the call, the called device uploads the increase value of the forward reputation value to the server, and the server updates the forward reputation value corresponding to the calling user according to the increase value of the forward reputation value. If the called device detects the second hang-up operation of the user, the increment of the negative reputation value can be obtained (if the increment of the negative reputation value is 1), the increment of the negative reputation value is uploaded to the server after the called device finishes the call, and the server updates the negative reputation value corresponding to the calling user according to the increment of the negative reputation value.
In some embodiments, after receiving the positive reputation value and the negative reputation value corresponding to the calling user, the called device may detect whether the negative reputation value of the calling user exceeds a preset threshold, where the preset threshold is 300; when the mobile phone B detects that the negative credit value exceeds the preset threshold value, the call is directly hung up.
In the example, the server judges whether the voice information uploaded to the server at present is legal or not through the stored voiceprint characteristics corresponding to each telephone number, and screens out illegal voice information, so that the problem that a malicious person deceives a called user by adopting simulated human voice is avoided, and the protection and isolation of the security of an unfamiliar telephone in the telephone calling process are improved. In addition, the server can also store the credit value corresponding to the calling user, the credit value can reflect the matching degree of the content marked by the calling user and the call content, and the credit value of the calling user can further increase the information for judging the call content of the calling user, so that a called user can easily decide whether to put through the call.
It will be appreciated that the electronic device, in order to implement the above-described functions, comprises corresponding hardware and/or software modules for performing the respective functions. The present application can be realized in hardware or a combination of hardware and computer software in connection with the exemplary algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, with the embodiment described in connection with the particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The present embodiment also provides a computer storage medium, where computer instructions are stored in the computer storage medium, and when the computer instructions are run on an electronic device, the electronic device is caused to execute the relevant method steps to implement the method for labeling a phone number in the foregoing embodiment. The storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present embodiment also provides a computer program product, which when running on a computer, causes the computer to execute the above related steps to implement the method for labeling a telephone number in the above embodiment.
The electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are all configured to execute the corresponding method provided above, so that the beneficial effects achieved by the electronic device, the computer storage medium, the computer program product, or the chip may refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
The term "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
The terms "first" and "second," and the like in the description and in the claims of the embodiments of the present application, are used for distinguishing between different objects and not for describing a particular order of the objects. For example, the first target object and the second target object, etc. are specific sequences for distinguishing different target objects, rather than describing target objects.
In the embodiments of the present application, the words "exemplary" or "such as" are used herein to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the embodiments of the present application, the meaning of "a plurality" means two or more unless otherwise specified. For example, a plurality of processing units refers to two or more processing units; the plurality of systems refers to two or more systems.
Any contents of the respective embodiments of the present application, and any contents of the same embodiment, can be freely combined. Any combination of the above is within the scope of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (27)

1. A method for labeling telephone numbers is applied to a system for labeling telephone numbers, and the system comprises: a first electronic device, a second electronic device, and a server communicatively coupled to each of the first electronic device and the second electronic device, the method comprising:
the first electronic equipment acquires multimedia information labeled by a calling user, wherein the multimedia information comprises text information and voice information;
the first electronic equipment uploads a first telephone number and multimedia information used for the call to the server;
the server stores the multimedia information corresponding to the calling user;
the first electronic equipment initiates the telephone call to the second electronic equipment by adopting the first telephone number;
the second electronic equipment receives the telephone call initiated by the first electronic equipment and initiates an acquisition request to a server;
the server responds to the acquisition request, acquires the multimedia information corresponding to the calling user according to the first telephone number, and sends the multimedia information corresponding to the calling user to the second electronic equipment;
and the second electronic equipment receives the multimedia information corresponding to the calling user so that the called user can check the text information corresponding to the calling user and listen to the voice information.
2. The method of claim 1, wherein before the server stores the multimedia information corresponding to the calling subscriber, the method further comprises:
the server acquires a first voiceprint feature extracted from the voice information;
the server detects whether the voice information is legal or not according to the first voiceprint characteristic;
and if the server detects that the voice information is legal, executing the operation of storing the multimedia information corresponding to the calling user.
3. The method of claim 2, wherein the server detects whether the voice message is legal according to the first voiceprint feature, comprising:
the server acquires a first template voiceprint feature corresponding to the stored first telephone number, wherein the first template voiceprint feature is the voiceprint feature of a user to which the first telephone number belongs;
and if the server detects that the first template voiceprint feature matched with the first voiceprint feature exists, determining that the voice information is legal.
4. The method of claim 3, further comprising:
and if the server detects that the first template voiceprint feature matched with the first voiceprint feature does not exist, determining that the voice information is illegal.
5. The method of claim 2, wherein the server detects whether the voice message is legal according to the first voiceprint feature, comprising:
the server acquires stored preset illegal voiceprint characteristics;
the server detects whether a preset illegal voiceprint feature matched with the first voiceprint feature exists or not;
and if the server detects that the preset illegal voiceprint features matched with the first voiceprint features exist, determining that the voice information is illegal.
6. The method of claim 3, further comprising:
if the server detects that the first template voiceprint feature matched with the first voiceprint feature does not exist, acquiring a stored preset illegal voiceprint feature;
the server detects whether a preset illegal voiceprint feature matched with the first voiceprint feature exists or not;
and if the server detects that a preset illegal voiceprint matched with the first voiceprint characteristic exists, determining that the voice information is illegal.
7. The method of claim 6, further comprising:
if the server detects that no preset illegal voiceprint matched with the first voiceprint characteristic exists, acquiring a second telephone number uploaded by the first electronic device;
the server acquires a second template voiceprint feature corresponding to the stored second telephone number, wherein the second template voiceprint feature is the voiceprint feature of the user to which the second telephone number belongs;
if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, the server determines that the voice information is legal;
and if the server detects that the second template voiceprint feature matched with the first voiceprint feature does not exist, determining that the voice information is illegal.
8. The method of claim 7, further comprising:
and if the server detects that the second template voiceprint feature matched with the first voiceprint feature does not exist, adding the first voiceprint feature into the stored preset illegal voiceprint features.
9. The method of claim 3, further comprising:
if the server detects that a first template voiceprint feature matched with the first voiceprint feature does not exist, acquiring a second telephone number uploaded by the first electronic device;
the server acquires a second template voiceprint feature corresponding to the stored second telephone number, wherein the second template voiceprint feature is the voiceprint feature of the user to which the second telephone number belongs;
if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, the server determines that the voice information is legal;
and if the second template voiceprint feature matched with the first voiceprint feature is detected to be absent, determining that the voice information is illegal.
10. The method according to claim 7 or 9, characterized in that the method further comprises:
the first electronic equipment responds to the operation of inputting the second telephone number triggered by the calling user and displays an input frame;
and the first electronic equipment responds to a second telephone number input by the calling user in the input box, acquires the second telephone number and uploads the second telephone number to the server.
11. The method of claim 7, wherein prior to obtaining the second phone number uploaded by the first electronic device, the method further comprises:
the server sends a first instruction to the first electronic equipment, wherein the first instruction is used for indicating the first electronic equipment to upload a second telephone number;
the first electronic equipment receives the first instruction and displays an input box to indicate a user to input a second telephone number;
and the first electronic equipment responds to a second telephone number input by the user in the input box, acquires the second telephone number and uploads the second telephone number to the server.
12. The method according to claim 7 or 9, characterized in that the method further comprises:
if the server detects that a second template voiceprint feature matched with the first voiceprint feature exists, a first label is marked on a first telephone number, and the first label is used for indicating that the first telephone number does not belong to the calling party;
the server responds to the acquisition request and issues the first label to the second electronic equipment;
and the second electronic equipment displays the first label on the call interface.
13. The method of claim 12, wherein the server stores the multimedia information corresponding to the calling subscriber, and comprises:
the server stores a first corresponding relation between the first telephone number and the second telephone number;
and the server takes the second telephone number as the identification information of the calling party and stores a second corresponding relation between the identification information of the calling party and the multimedia information.
14. The method of claim 13, wherein the server, in response to the obtaining request, obtains multimedia information corresponding to the calling party according to the first phone number, and comprises:
if the server detects that the label information of the first telephone number is a first label, acquiring a second telephone number corresponding to the first telephone number according to the first telephone number and the first corresponding relation;
and the server acquires multimedia information corresponding to the second telephone number as the multimedia information corresponding to the calling user according to the second telephone number and the second corresponding relation.
15. The method of claim 3, further comprising:
if the server detects that a first template voiceprint feature matched with the first voiceprint feature exists, a second label is marked on the first telephone number, and the second label is used for indicating that the first telephone number belongs to the calling party;
the server responds to the acquisition request and issues the second label to the second electronic equipment;
and the second electronic equipment displays the second label on the call interface.
16. The method of claim 15, wherein the server stores the multimedia information corresponding to the calling subscriber, and comprises:
and the server takes the first telephone number as the identification information of the calling user and stores a third corresponding relation between the identification information of the calling user and the multimedia information.
17. The method of claim 16, wherein the server, in response to the obtaining request, obtains multimedia information corresponding to the calling party according to the first phone number, and comprises:
and if the server detects that the label information of the first telephone number is a second label, acquiring multimedia information corresponding to the first telephone number as the multimedia information corresponding to the calling user according to the first telephone number and the third corresponding relation.
18. The method of claim 1, wherein the second electronic device is in a conversation with the first electronic device, the method further comprising:
if the second electronic equipment detects the first hang-up operation of the called user, increasing a forward credit value of the calling user, wherein the forward credit value is used for indicating the matching times of the multimedia information marked by the calling user and the call content before the call;
if the second electronic equipment detects a second hang-up operation of the called user, increasing a negative reputation value of the calling user, wherein the negative reputation value is used for indicating the number of times that the multimedia information marked by the calling user before the call is unmatched;
the second electronic equipment uploads the new positive reputation value/the new negative reputation value of the calling user to the server;
and the server updates the positive reputation value of the calling user into a new positive reputation value or updates the negative reputation value of the calling user into a new negative reputation value.
19. The method of claim 11, further comprising:
the server responds to the acquisition request and issues a positive reputation value and a negative reputation value corresponding to the calling user to the second electronic equipment;
and the second electronic equipment displays the positive credit value and the negative credit value corresponding to the calling user in a display screen.
20. The method of claim 1, wherein the obtaining, by the first electronic device, the voice information corresponding to the calling user comprises:
the first electronic equipment detects whether the recording time length exceeds a first preset time length and is less than a second preset time length;
if the first electronic equipment detects that the time length is less than a first preset time length, prompting the calling user to record again;
and if the first electronic equipment detects that the recording duration exceeds a first preset duration and is less than a second preset duration, acquiring the voice information.
21. The method of claim 2, further comprising:
and if the server detects that the voice information is illegal, sending a stop instruction to the first electronic equipment, wherein the stop instruction indicates that the first electronic equipment exits the labeling process of the telephone number.
22. The method of claim 15, further comprising:
and if the second electronic equipment detects that the negative reputation value of the calling user exceeds a threshold value, hanging up the call.
23. The method of claim 1, wherein the multimedia information further comprises: video information.
24. A system for labeling telephone numbers, comprising: the system comprises a first electronic device, a second electronic device and a server which is in communication connection with the first electronic device and the second electronic device;
the first electronic device is specifically configured to:
acquiring multimedia information labeled by a calling user, wherein the multimedia information comprises text information and voice information;
uploading a first telephone number and multimedia information used for the call to the server;
the server is specifically configured to:
multimedia information corresponding to the calling subscriber;
the first electronic device to:
initiating the telephone call to the second electronic equipment by adopting the first telephone number;
the second electronic device to:
if a telephone call initiated by the first electronic equipment is received, initiating an acquisition request to a server;
the server is used for:
responding to the acquisition request, acquiring the multimedia information corresponding to the calling user according to the first telephone number, and sending the multimedia information corresponding to the calling user to the second electronic equipment;
the second electronic device to:
and receiving the multimedia information corresponding to the calling user so that the called user can check the text information corresponding to the calling user and listen to the voice information.
25. An electronic device, comprising:
one or more processors;
a memory;
and one or more computer programs, wherein the one or more computer programs are stored on the memory, and when executed by the one or more processors, cause the electronic device to perform the method of telephone number tagging performed by the first electronic device or the second electronic device as recited in any of claims 1-23.
26. A server, comprising:
one or more processors;
a memory;
and one or more computer programs, wherein the one or more computer programs are stored on the memory and when executed by the one or more processors, cause the electronic device to perform the method of telephone number tagging performed by the server of any of claims 1-23.
27. A computer readable storage medium comprising a computer program, which, when run on an electronic device, causes the electronic device to perform a method of telephone number tagging performed by the first electronic device or the second electronic device as claimed in any one of claims 1-23, or a method of telephone number tagging performed by a server as claimed in any one of claims 1-23.
CN202210951777.0A 2022-08-09 2022-08-09 Telephone number labeling method, system, electronic equipment and server Active CN115623430B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210951777.0A CN115623430B (en) 2022-08-09 2022-08-09 Telephone number labeling method, system, electronic equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210951777.0A CN115623430B (en) 2022-08-09 2022-08-09 Telephone number labeling method, system, electronic equipment and server

Publications (2)

Publication Number Publication Date
CN115623430A true CN115623430A (en) 2023-01-17
CN115623430B CN115623430B (en) 2023-11-24

Family

ID=84856784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210951777.0A Active CN115623430B (en) 2022-08-09 2022-08-09 Telephone number labeling method, system, electronic equipment and server

Country Status (1)

Country Link
CN (1) CN115623430B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635495A (en) * 2015-12-31 2016-06-01 北京金山安全软件有限公司 Information display method and device and electronic equipment
CN106101363A (en) * 2016-05-27 2016-11-09 北京小米移动软件有限公司 Income prompting method and device
CN106454783A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Method, calling terminal, called terminal and cloud server for realizing call processing
CN109068014A (en) * 2018-08-21 2018-12-21 平安科技(深圳)有限公司 Call limitation method, device, electronic equipment and computer readable storage medium
CN109587335A (en) * 2018-11-30 2019-04-05 维沃移动通信有限公司 A kind of method of calling and mobile terminal
CN109600506A (en) * 2017-09-30 2019-04-09 华为终端(东莞)有限公司 Calling voice method of calling and terminal
CN109873907A (en) * 2019-03-29 2019-06-11 彭舒婷 Call processing method, device, computer equipment and storage medium
CN110581924A (en) * 2018-06-07 2019-12-17 中国电信股份有限公司 Method and system for prompting risk of fraud
CN111901472A (en) * 2020-09-03 2020-11-06 中国联合网络通信集团有限公司 Incoming call enhanced display method, server and user terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106454783A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Method, calling terminal, called terminal and cloud server for realizing call processing
CN105635495A (en) * 2015-12-31 2016-06-01 北京金山安全软件有限公司 Information display method and device and electronic equipment
CN106101363A (en) * 2016-05-27 2016-11-09 北京小米移动软件有限公司 Income prompting method and device
CN109600506A (en) * 2017-09-30 2019-04-09 华为终端(东莞)有限公司 Calling voice method of calling and terminal
CN110581924A (en) * 2018-06-07 2019-12-17 中国电信股份有限公司 Method and system for prompting risk of fraud
CN109068014A (en) * 2018-08-21 2018-12-21 平安科技(深圳)有限公司 Call limitation method, device, electronic equipment and computer readable storage medium
CN109587335A (en) * 2018-11-30 2019-04-05 维沃移动通信有限公司 A kind of method of calling and mobile terminal
CN109873907A (en) * 2019-03-29 2019-06-11 彭舒婷 Call processing method, device, computer equipment and storage medium
CN111901472A (en) * 2020-09-03 2020-11-06 中国联合网络通信集团有限公司 Incoming call enhanced display method, server and user terminal

Also Published As

Publication number Publication date
CN115623430B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
JP5496634B2 (en) Incoming call processing method and apparatus for communication terminal
US8224304B2 (en) Systems and methods for disambiguating entries in a contacts list database implemented on a mobile device
KR101083863B1 (en) Systems and methods for caller identification customization and remote management of communication devices
CN102572105B (en) A kind of method and terminal for processing associated person information
CN109995929B (en) Operation and account information processing method and device
US10033850B2 (en) Method for real time displaying information and mobile communication terminal
US8649769B2 (en) Method and device for detecting whether missed call is effective
US9148507B2 (en) Identifying information associated with an incoming telephone call
CN106101363A (en) Income prompting method and device
CN105939424B (en) Application switching method and device
US20030233231A1 (en) Apparatus and method for managing privacy using voice recognition and caller identification
WO2019144624A1 (en) Method and device for processing call and storage medium
KR101033870B1 (en) Method and device for processing spam call
CN115623430B (en) Telephone number labeling method, system, electronic equipment and server
CN107018502A (en) Short message recognition methods and device
CN105872230A (en) Phone number translation method and device
CN105515950B (en) The missed call based reminding method and device of communicating terminal
CN113890939A (en) Incoming call reminding method and electronic equipment
CN115529384A (en) Call recording method and device, electronic equipment and storage medium
CN107181850B (en) Number marking method and device
CN107172619B (en) Communication method based on ISIM, intelligent terminal and computer readable storage medium
CN111756910A (en) Incoming call disturbance-free method, system, computer equipment and storage medium
CN112152984A (en) Method for realizing address list, friend adding, stranger adding, call, short message and social communication system
CN111343223B (en) Information pushing method and terminal
CN113596253B (en) Emergency number dialing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant