CN116055636B - Strange call display method, mobile terminal and storage medium - Google Patents
Strange call display method, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN116055636B CN116055636B CN202310037017.3A CN202310037017A CN116055636B CN 116055636 B CN116055636 B CN 116055636B CN 202310037017 A CN202310037017 A CN 202310037017A CN 116055636 B CN116055636 B CN 116055636B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- telephone number
- call
- key information
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000004891 communication Methods 0.000 claims description 26
- 230000004044 response Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000009191 jumping Effects 0.000 claims description 6
- 230000005012 migration Effects 0.000 claims description 5
- 238000013508 migration Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 22
- 238000010586 diagram Methods 0.000 description 14
- 238000010295 mobile communication Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 2
- 230000003416 augmentation Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 235000013410 fast food Nutrition 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The application provides a display method of an unfamiliar incoming call and a mobile terminal, which relate to the technical field of terminals and are used for solving the problem that whether a user answers the incoming call of an unfamiliar number is difficult to decide, wherein the method comprises the following steps: the mobile terminal receives a first call from a first telephone number; responding to the first call, and inquiring corresponding first key information from the plurality of target data by the mobile terminal based on the first telephone number; the mobile terminal is used for receiving a short message from the mobile terminal, wherein the plurality of target data are used for indicating the mobile terminal to write into the mobile terminal according to the received short message, each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number, and the key information is used for indicating identity information of a user; the mobile terminal displays the first key information on the caller identification interface.
Description
Technical Field
The application relates to the technical field of terminals, in particular to a strange call display method and a mobile terminal.
Background
With the popularization of mobile terminals (such as mobile phones), the mobile terminals are used as common communication tools, so that great convenience is brought to users, and meanwhile, some trouble is caused to the users. For example, in everyday life, people often receive calls to strange numbers, which may be marketing phones, fraud phones, express phones, or other stranger phones. Because of poor visual recognition of the telephone number by the user, whether the user answers the incoming call of the strange number is difficult to decide.
Disclosure of Invention
The embodiment of the application provides a display method of an unfamiliar call and a mobile terminal, which are used for solving the problem that whether a user answers the call of an unfamiliar number or not is difficult to decide.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical scheme:
in a first aspect, a method for displaying a strange call is provided, and the method is applied to a mobile terminal, and includes: the mobile terminal receives a first call from a first telephone number; responding to the first call, and inquiring corresponding first key information from the plurality of target data by the mobile terminal based on the first telephone number; the mobile terminal is used for receiving a short message from the mobile terminal, wherein the plurality of target data are used for indicating the mobile terminal to write into the mobile terminal according to the received short message, each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number, and the key information is used for indicating identity information of a user; the mobile terminal displays the first key information on the caller identification interface.
Based on the first aspect, since the plurality of target data are stored in the mobile terminal, the plurality of target data are written by the mobile terminal according to the received short message, and each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number, and the key information is used for indicating identity information of a user, when the mobile terminal receives a first call from a first telephone number, the mobile terminal can query corresponding first key information from the plurality of target data based on the first telephone number, and display the first key information on an incoming call display interface, namely, display the identity information of the user corresponding to the first telephone number on the incoming call display interface, so that the user can decide whether to answer the incoming call of the first telephone number.
In a possible implementation manner of the first aspect, the aspect further includes: the mobile terminal receives a first short message; the mobile terminal identifies a first short message and acquires a second telephone number and second key information in the first short message; wherein the second telephone number is different from the first telephone number, and the second key information is the same as the first key information; or the second telephone number is the same as the first telephone number, and the second key information is different from the first key information; the mobile terminal updates a plurality of target data based on the first short message.
In the implementation mode, after receiving a first short message, the mobile terminal identifies the first short message and acquires a second telephone number and second key information in the first short message; since the second telephone number is different from the first telephone number, and the second key information is the same as the first key information; or the second telephone number is the same as the first telephone number, and the second key information is different from the first key information, so that the mobile phone can update a plurality of target data based on the first short message, and the reliability of the target data is improved.
In a possible implementation manner of the first aspect, the caller identification interface includes a first control and a second control; the first control is used for indicating the latest short message record corresponding to the first telephone number, and the second control is used for indicating the latest call record corresponding to the first telephone number; the method further comprises the steps of: responding to the operation of the user on the first control, and jumping the mobile terminal from the incoming call display interface to a short message interface corresponding to the latest short message record; and responding to the operation of the user on the second control, and jumping the mobile terminal from the call display interface to a call record interface corresponding to the latest call record.
In the implementation, since the caller identification interface includes a first control and a second control; the first control is used for indicating the latest short message record corresponding to the first telephone number, and the second control is used for indicating the latest call record corresponding to the first telephone number, so that a user can click the first control, jump to the short message interface corresponding to the latest short message record from the incoming call display interface, or click the second control, jump to the call record interface corresponding to the latest call record from the incoming call display interface, and further decide whether to answer the incoming call of the first telephone.
In a possible implementation manner of the first aspect, the method includes: if the duration of displaying the first key information on the incoming call display interface of the mobile terminal meets the first preset duration, the mobile terminal exits the displayed first key information and displays the number attribution of the first telephone number; or if the mobile terminal displays the first key information and the number attribution of the first telephone number on the caller identification interface.
In the implementation manner, if the duration of displaying the first key information on the caller identification interface of the mobile terminal meets the first preset duration, the mobile terminal exits the displayed first key information and displays the number attribution of the first telephone number; or if the mobile terminal displays the first key information and the number attribution of the first telephone number on the caller identification interface, the problem of incorrect guidance to the user caused by inaccurate information of a plurality of target data included in the mobile terminal can be avoided.
In a possible implementation manner of the first aspect, the caller identification interface includes an answer button and a reject button; the method further comprises the steps of: responding to the operation of a user on an answer button, and establishing a call with a first telephone number by the mobile terminal; after the call is ended, the mobile terminal displays a call record with the first telephone number on a call record interface; the call record interface includes first key information.
In this implementation, the mobile terminal may further display a call record with the first phone number on a call record interface after the call is ended, where the call record interface includes the first key information, so that
In a possible implementation manner of the first aspect, the method includes: if the number of the plurality of target data stored in the mobile terminal is larger than a preset number threshold, the mobile terminal deletes the target data written first; or if the mobile terminal does not establish communication connection with the target telephone number in the preset period, the mobile terminal automatically deletes the target data corresponding to the target telephone number.
In this implementation manner, when the number of the plurality of target data stored in the mobile terminal is greater than a preset number threshold, the mobile terminal may delete the target data written first; or the mobile terminal does not establish communication connection with the target telephone number in a preset period, and the mobile terminal can automatically delete the target data corresponding to the target telephone number, so that a large amount of target data can be prevented from occupying the memory of the mobile terminal.
In a possible implementation manner of the first aspect, each target data in the plurality of target data is data supporting data migration.
In the implementation manner, since each target data in the plurality of target data is data supporting data migration, when a user changes the mobile terminal, the target data on the old mobile terminal can be migrated to the new mobile terminal, and user experience is provided.
In a possible implementation manner of the first aspect, in response to the first call, the mobile terminal queries corresponding first key information from the plurality of target data based on the first phone number, including: responding to the first call, and acquiring corresponding identity information from the system call application by the mobile terminal based on the first telephone number; if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the system call application, the mobile terminal acquires the identity information corresponding to the first telephone number from the server; the server is a third party server for providing identity information corresponding to the telephone number; if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the server, the mobile terminal inquires corresponding first key information from a plurality of target data based on the first telephone number.
In the implementation manner, after the mobile terminal receives the call of the first telephone number, the mobile terminal can firstly acquire corresponding identity information from the system call application, and if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the system call application, the mobile terminal acquires the identity information corresponding to the first telephone number from the server; if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the server, the mobile terminal inquires corresponding first key information from a plurality of target data based on the first telephone number, and accuracy of the acquired identity information of the mobile terminal is ensured.
In a possible implementation manner of the first aspect, the method further includes: if the mobile terminal acquires the identity information corresponding to the first telephone number from the server, the mobile terminal displays the identity information on an incoming call display interface.
In the implementation manner, when the mobile terminal acquires the identity information corresponding to the first telephone number from the server, the mobile terminal displays the identity information on the caller identification interface, so that the accuracy of the identity information displayed by the mobile terminal can be further ensured.
In a possible implementation manner of the first aspect, the first key information includes one or more of a user name, a company in which the user is located, or a occupation of the user corresponding to the first phone number.
In a second aspect, a mobile terminal is provided, which has the functions of implementing the first aspect; the functions can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a third aspect, there is provided a mobile terminal comprising a display screen, a memory and one or more processors, the display screen, the memory coupled to the processors, the memory for storing computer program code, the computer program code comprising computer instructions; the computer instructions, when executed by the processor, cause the mobile terminal to perform the steps of: the mobile terminal receives a first call from a first telephone number; responding to the first call, and inquiring corresponding first key information from the plurality of target data by the mobile terminal based on the first telephone number; the mobile terminal is used for receiving a short message from the mobile terminal, wherein the plurality of target data are used for indicating the mobile terminal to write into the mobile terminal according to the received short message, each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number, and the key information is used for indicating identity information of a user; the mobile terminal displays the first key information on the caller identification interface.
In a possible implementation manner of the third aspect, the processor executes the computer instructions to cause the mobile terminal to further perform the steps of: the mobile terminal receives a first short message; the mobile terminal identifies a first short message and acquires a second telephone number and second key information in the first short message; wherein the second telephone number is different from the first telephone number, and the second key information is the same as the first key information; or the second telephone number is the same as the first telephone number, and the second key information is different from the first key information; the mobile terminal updates a plurality of target data based on the first short message.
In a possible implementation manner of the third aspect, the caller identification interface includes a first control and a second control; the first control is used for indicating the latest short message record corresponding to the first telephone number, and the second control is used for indicating the latest call record corresponding to the first telephone number; the processor, when executing the computer instructions, causes the mobile terminal to further perform the steps of: responding to the operation of the user on the first control, and jumping the mobile terminal from the incoming call display interface to a short message interface corresponding to the latest short message record; and responding to the operation of the user on the second control, and jumping the mobile terminal from the call display interface to a call record interface corresponding to the latest call record.
In a possible implementation manner of the third aspect, the processor executes the computer instructions to cause the mobile terminal to further perform the steps of: if the duration of displaying the first key information on the incoming call display interface of the mobile terminal meets the first preset duration, the mobile terminal exits the displayed first key information and displays the number attribution of the first telephone number; or if the mobile terminal displays the first key information and the number attribution of the first telephone number on the caller identification interface.
In a possible implementation manner of the third aspect, the caller identification interface includes an answer button and a reject button; the processor, when executing the computer instructions, causes the mobile terminal to further perform the steps of: responding to the operation of a user on an answer button, and establishing a call with a first telephone number by the mobile terminal; after the call is ended, the mobile terminal displays a call record with the first telephone number on a call record interface; the call record interface includes first key information.
In a possible implementation manner of the third aspect, the processor executes the computer instructions to cause the mobile terminal to further perform the steps of: if the number of the plurality of target data stored in the mobile terminal is larger than a preset number threshold, the mobile terminal deletes the target data written first; or if the mobile terminal does not establish communication connection with the target telephone number in the preset period, the mobile terminal automatically deletes the target data corresponding to the target telephone number.
In a possible implementation manner of the third aspect, each target data in the plurality of target data is data supporting data migration.
In a possible implementation manner of the third aspect, when the processor executes the computer instructions, the mobile terminal is caused to specifically perform the following steps: responding to the first call, and acquiring corresponding identity information from the system call application by the mobile terminal based on the first telephone number; if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the system call application, the mobile terminal acquires the identity information corresponding to the first telephone number from the server; the server is a third party server for providing identity information corresponding to the telephone number; if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the server, the mobile terminal inquires corresponding first key information from a plurality of target data based on the first telephone number.
In a possible implementation manner of the third aspect, the processor executes the computer instructions to cause the mobile terminal to further perform the steps of: if the mobile terminal acquires the identity information corresponding to the first telephone number from the server, the mobile terminal displays the identity information on an incoming call display interface.
In a possible implementation manner of the third aspect, the first key information includes one or more of a user name, a company in which the user is located, or a occupation of the user corresponding to the first phone number.
In a fourth aspect, a system on a chip is provided, comprising at least one processor and at least one interface circuit; the processor is interconnected with the interface circuit through a circuit; wherein the processor is configured to execute computer instructions to implement the method of the first aspect or any one of the first aspects.
In a fifth aspect, there is provided a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of any of the first aspects above.
In a sixth aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspects above.
The technical effects of any one of the design manners of the second aspect to the sixth aspect may be referred to the technical effects of the different design manners of the first aspect, and will not be repeated here.
Drawings
Fig. 1 is a schematic diagram of a call scenario provided in an embodiment of the present application;
fig. 2 is a schematic diagram of a hardware structure of a mobile phone according to an embodiment of the present application;
fig. 3 is a schematic diagram of a software framework of a mobile phone according to an embodiment of the present application;
fig. 4 is a second schematic diagram of a software framework of a mobile phone according to an embodiment of the present application;
fig. 5 is a flowchart illustrating a method for displaying a strange call according to an embodiment of the present application;
FIG. 6 is a second flow chart of a method for displaying strange incoming calls according to an embodiment of the present application;
FIG. 7 is a schematic diagram of an interface for displaying a strange call according to an embodiment of the present application;
FIG. 8 is a second interface diagram illustrating a display aspect of a strange call according to an embodiment of the present application;
FIG. 9 is a third interface diagram illustrating a display aspect of a strange call according to an embodiment of the present application;
FIG. 10 is a diagram illustrating an interface for displaying a strange call according to an embodiment of the present application;
FIG. 11 is a diagram showing an interface of a display aspect of a strange call according to an embodiment of the present application;
FIG. 12 is a diagram showing a display interface of a strange call according to an embodiment of the present application;
FIG. 13 is a diagram showing a display interface of a strange call according to an embodiment of the present application;
fig. 14 is a flowchart illustrating a method for displaying a strange call according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a chip system according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the solution of the present embodiment of the present application, the technical solution of the present embodiment of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiment of the present application, and it is apparent that the described embodiment is only a part of the embodiment of the present application, not all the embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, shall fall within the scope of the application.
The terms "first" and "second" are used below for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the embodiments of the present application, unless otherwise indicated, the meaning of "a plurality" is two or more.
In some scenarios, when the mobile phone receives a call from a strange number, as shown in fig. 1, the mobile phone may obtain a tag of the strange number from a server in the network, where the tag is used to indicate a type of the strange number, and the tag may be, for example, a fraud phone, an insurance financing phone, an intermediary phone, an express phone, or a meal delivery phone. The server may be a service provider that provides a number tag service for a mobile phone, and the mobile phone may call an interface of the server to obtain a tag of the strange number.
After the server identifies the tag (e.g., a fast food delivery) of the strange number, the tag can be sent to the mobile phone through the wireless network, and the mobile phone displays the tag in the incoming call display interface, the call list interface and the call detail interface of the strange number, so that the user can be helped to identify the tag type of the strange call.
In some embodiments, the labels of the strange numbers stored in the server may be labels manually marked by the user or labels marked by the operator, which is not limited by the present application.
However, for some strange numbers that are not manually marked by the user or marked by the operator, when the phone receives a call from the strange number, the caller id interface of the phone is still displayed as a strange number (a long series of phone number digits are presented to the user) as shown in fig. 1. As such, the user is unaware of the purpose of the strange call, as well as the importance, making it possible for the user to refuse to receive the call.
Based on this, the embodiment of the application provides a method for displaying an unfamiliar incoming call, which can realize that when the mobile terminal receives a phone dialed by an unfamiliar number, the mobile terminal displays user identity information corresponding to the unfamiliar number on an incoming call display interface. Therefore, when a user receives an strange call, the user can know the purpose and importance of the strange call based on the user identity information of the strange number displayed by the mobile terminal, so that whether the strange call is answered or not is selected, and the man-machine interaction efficiency is improved.
Specifically, the application writes the telephone number included in the short message and the user identity information corresponding to the telephone number into the mobile terminal as target data based on the received short message. When the mobile terminal receives an incoming call of a strange number, the mobile terminal inquires corresponding user identity information from target data based on the strange number, and then displays the information in an incoming call display interface for a user to select whether to answer or not.
Note that, in the embodiment of the present application, the short message refers to a message sent and received based on a short message service (short message service, SMS). The short message may include a multimedia message, a 5G message, a short message, and the like.
The method for displaying the strange call provided by the embodiment of the application can be applied to any mobile terminal with a call function, such as a mobile phone, a tablet personal computer, a wearable device, a vehicle-mounted device, an augmented reality (augemented reality, AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a personal digital assistant (personal digital assistant, PDA) and the like. The embodiment of the application does not limit the specific form of the mobile terminal.
As shown in fig. 2, the mobile terminal in the embodiment of the present application may be a mobile phone 100. The following describes embodiments of the mobile phone 100. It should be understood that the illustrated handset 100 is only one example of the above-described terminal, and that the handset 100 may have more or fewer components than shown in fig. 2, may also combine two or more components, or may have a different configuration of components.
Referring to fig. 2, the mobile phone 100 may specifically include: processor 110, external memory interface 120, internal memory 130, universal serial bus (universal serial bus, USB) interface 140, antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, and display 170, among others.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a memory, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The wireless communication function of the mobile phone 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the handset 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied to the handset 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wi-Fi network, wireless fidelity), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc. applied to the mobile phone 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, the antenna 1 and the mobile communication module 150 of the handset 100 are coupled, and the antenna 2 and the wireless communication module 160 are coupled, so that the handset 100 can communicate with a network and other devices through wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The mobile phone 100 realizes a display function through a GPU, a display 170, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 170 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information. In the embodiment of the present application, the display screen 170 may be used to display an caller id interface, a call recording interface, etc.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capabilities of the handset 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions.
The internal memory 130 may be used to store computer executable program code including instructions. The processor 110 executes various functional applications of the handset 100 and data processing by executing instructions stored in the internal memory 130.
Of course, the mobile phone 100 may further include a charging management module, a power management module, a battery, a key, an indicator, one or more SIM card interfaces, and the like, which is not limited in any way by the embodiment of the present application.
The software system of the mobile phone 100 may adopt a layered structure, an event driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. Embodiments of the application are configured in a layered mannerThe system is exemplified by the software architecture of the handset 100.
Fig. 3 is a block diagram of the software architecture of the mobile phone 100 according to an embodiment of the present application.
It will be appreciated that the layered architecture divides the software into several layers, each with a clear role and division. The layers communicate with each other through a software interface. In some embodiments, it willThe system is divided into four layers, from top to bottom, an application layer (APP), an application framework layer (FWK), a hardware abstraction layer (hardware abstraction layer, HAL), and a kernel layer (kernel).
In some embodiments, the application layers may include a User Interface (UI) layer and a logic layer. By way of example, as shown in FIG. 3, a series of application packages may be included on the UI level, such as a conversation application, a short message application, a contact application, a camera application, a gallery application, a calendar application, a map application, and the like. Logic modules for implementing the functions of the above applications, such as an artificial intelligence (artificial intelligence, AI) identification module, a multimedia messaging service (multimedia message service, MMS) module, and a destination database, may be included at the logic level.
The AI identification module is used for monitoring the short message received by the short message application, identifying the received short message and acquiring target data. The target data comprises a telephone number in the short message and user identity information corresponding to the telephone number. The MMS module is a module responsible for receiving and transmitting short message of an operator, such as receiving and transmitting short message, multimedia message or 5G message. The target database is used for storing target data acquired by the AI identification module.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
By way of example, as shown in FIG. 3, the application framework layer may include a window manager, a content provider, a view system, a telephony manager, a resource manager, a notification manager, and the like.
Wherein, the window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like. The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc. The view system described above may be used to build a display interface for an application. Each display interface may be composed of one or more controls. In general, controls may include interface elements such as icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, micro (Widget) items, and the like. The resource manager provides various resources, such as localization strings, icons, pictures, layout files, video files, and the like, to the application program. The notification manager can display notification information in a status bar by using an application program, can be used for conveying a notification type message, can automatically disappear after a short stay, and does not need user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is presented in a status bar, a prompt tone is emitted, vibration is generated, and an indicator light blinks.
In some embodiments, as shown in fig. 3, the application framework layer may further include a message database in Telephony Provider for storing short message messages of the operator.
As shown in fig. 3, the above-mentioned hardware abstraction layer is located at an interface layer between the kernel layer and the hardware, and may be used to abstract the hardware. Illustratively, the hardware abstraction layer includes a camera HAL, an audio HAL, a Wi-Fi HAL, and the like.
The kernel layer is a layer between hardware and software. As shown in fig. 3, the kernel layer at least includes a camera driver, an audio driver, a sensor driver, a display driver, and the like, which is not limited in the present application.
In an embodiment of the present application, with reference to the software architecture diagram shown in fig. 3, as shown in fig. 4, for example, by using a call application, the AI-recognition module and the MMS module may interact with the message database in the application framework layer by calling a preset API interface. For example, the AI-recognition module may be responsible for listening to whether there is a short message write in the message database; when a short message is written in the message database, the AI identification module acquires the short message and carries out AI identification on the short message so as to obtain target data. The target data comprises a telephone number included in the short message and user identity information corresponding to the telephone number.
For example, the MMS module may be responsible for receiving and sending a short message from an operator, and after receiving the short message from the operator, the MMS module writes the short message into the message database. Furthermore, the MMS module may also be responsible for monitoring whether the target data in the AI-recognition module changes; when the target data in the AI identification module changes, the MMS module acquires the target data and writes the target data into a target database.
Based on the method, when the AI identification module monitors each short message written in the message database, the AI identification module can identify the AI of each short message, and target data corresponding to each short message after identification is obtained, so that a plurality of target data can be obtained. And the MMS module acquires the plurality of target data from the AI identification module and writes the plurality of target data into a target database so that the target database stores the target data corresponding to the plurality of short message messages one by one.
Subsequently, when the call application receives the incoming call of the strange number, the call application inquires whether the identity information corresponding to the strange number exists in the target database based on the strange number; if the call application inquires that the identity information corresponding to the strange number exists in the target database, the call application displays the identity information corresponding to the strange number in an incoming call display interface, so that a user can select whether to answer the strange call or not.
The working principle of the method for implementing the embodiment of the application by each software layer in the mobile phone is described herein with reference to fig. 4. For example, as shown in fig. 5, the method may include the following steps.
S1, the MMS module receives the short message.
The MMS module runs an MMS process, and the MMS process is a resident process in general; wherein a "very resident" process refers to: when the short message is not received, the MMS process is in a closed state, and when the MMS module receives the short message, the MMS module firstly needs to start the MMS process.
S2, the MMS module registers an AI identification function with the AI identification module.
The AI identifying function is used for indicating the function of AI identifying the short message.
In some embodiments, during the start-up of the MMS process, the MMS module registers AI-recognition functionality with the AI-recognition module. In other embodiments, the MMS module registers the AI-recognition function with the AI-recognition module during power-up of the handset. In this embodiment, step S2 may be completed before step S1, i.e. before the MMS module receives the sms message, the MMS module has registered the AI-recognition function with the AI-recognition module.
For example, the MMS module may register an AI-recognition function with the AI-recognition module when the mobile phone is first booted; or, when the mobile phone is started each time, the AI identification function is registered to the AI identification module.
In the embodiment of the application, after the MMS module registers the AI identification function with the AI identification module, the AI identification module performs initialization operation and sends a callback to the MMS module for informing the MMS module that the AI identification function is registered successfully.
S3, the AI identification module registers monitoring with the message database.
Wherein, the AI identification module registers with the message database to monitor whether the message used in the message database changes.
In some embodiments, the AI-recognition module registers for interception with the message database after the AI-recognition module completes an initialization operation of the AI-recognition function. In other embodiments, the AI-recognition module registers for interception with the message database during power-up of the handset. In this embodiment, step S3 may be completed before step S1.
S4, the MMS module writes the received short message into a message database.
S5, the information database informs the AI identification module that the information in the information database changes.
S6, the AI identification module sends a first query request to the message database.
The first query request is used for querying the content of the short message which is written in the message database recently.
And S7, responding to the first query request, and returning the content of the short message to the AI identification module by the message database.
And S8, the AI identification module carries out AI identification on the short message based on the content of the short message.
Exemplary, the AI-recognition module performing AI-recognition on the content of the short message includes: identifying telephone numbers in the short message and key information. The key information is used for indicating identity information of the user, such as one or more of a user name, a company where the user is located and a occupation of the user.
And S9, the AI identification module returns the AI identification result to the MMS module.
In some embodiments, the AI recognition module returns the AI recognition result to the MMS module in the form of a key-value. Wherein, key refers to telephone number, value refers to key information corresponding to telephone number.
S10, the MMS module writes the AI identification result into the target database.
Illustratively, the MMS module writes the key-value in the AI identification result as a target data into the target database. Thus, the target data stored in the target database is stored in the form of key-value, i.e., the target data includes a telephone number and key information corresponding to the telephone number.
In the embodiment of the present application, based on the above-mentioned process from step S1 to step S10, the mobile phone may perform AI identification on the received sms, and store the AI identification result in the target database. As such, a plurality of target data may be included in the target database, each target data including a telephone number, and key information corresponding to the telephone number.
In addition, the mobile phone performs AI identification on the short message after receiving the short message every time, and stores the AI identification result in the target database in the form of target data. On the basis, in order to avoid excessive target data stored in the target database, a large amount of memory space of the mobile phone, such as a large amount of ROM storage space, is occupied. In some embodiments, if the number of target data stored in the target database by the mobile phone is greater than a preset number threshold, the mobile phone deletes the data written in the target database first.
The preset number threshold is not specifically limited, and is set in practice. The preset number threshold may be, for example, 2000.
Or if the mobile phone does not establish communication connection with the target telephone number in the preset period, the mobile phone automatically deletes the target data corresponding to the target telephone number. The target telephone number is a telephone number included in any one of the target data. The communication connection may be, for example, a call, a voice, a video, or a short message communication, which is not limited by the present application. In addition, the present application is not particularly limited to the preset period, and is set in practice. The preset period may be, for example, 3 months, 180 days, or the like.
Further, in order to prevent the mobile phone from being changed by the hand user to cause the loss of the target data, in the embodiment of the present application, the plurality of target data stored in the target database may support data migration (i.e. data cloning). When the user changes the mobile phone, a plurality of target data stored on the old mobile phone can be cloned to the new mobile phone.
According to the embodiment, since the mobile phone stores a plurality of target data written into the mobile phone based on the content of the short message in advance, when the mobile phone receives an incoming call with a strange number, the mobile phone can query corresponding key information from the target database based on the strange number and then display the key information on the incoming call display interface. Illustratively, as also shown in FIG. 5, the method may further include the following steps.
S11, the call application receives an incoming call of a strange number.
S12, the call application sends a second query request to the target database.
The second query request is used for querying key information, and comprises strange numbers.
And S13, returning corresponding key information to the call application by the target database.
S14, the call application displays key information on the caller identification display interface.
In summary, in the embodiment of the present application, after receiving a short message, a mobile phone first performs AI identification on the short message to identify the content of the short message, and stores a phone number included in the AI identification result and key information corresponding to the phone number in a key-value form in a target database. And then, when the mobile phone receives an incoming call of the strange number, the mobile phone inquires corresponding key information from the target database based on the strange number, and then displays the key information on an incoming call display interface. Because the key information is used for indicating the identity information of the user, the user can select whether to answer the strange call or not based on the user identity information displayed on the caller identification interface.
The embodiment of the application provides a method for displaying strange calls, which can be applied to a mobile phone, and as shown in fig. 6, the method can comprise the following steps.
S201, the mobile phone receives a first call from a first telephone number.
S202, responding to the first call, and inquiring corresponding first key information from the plurality of target data by the mobile phone based on the first telephone number.
The mobile phone comprises a mobile phone and a plurality of target data, wherein the plurality of target data are used for indicating the mobile phone to write into the mobile phone according to the received short message, and each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number; the key information is used to indicate identity information of the user.
As can be seen by way of example in connection with fig. 4 and 5 and the above embodiments, a plurality of target data are stored in a target database. On the basis, the mobile phone can inquire corresponding first key information from the target database based on the first telephone number.
S203, the mobile phone displays the first key information on the caller ID display interface.
It can be understood that the first phone number stored in the target database and the first key information corresponding to the first phone number are obtained by performing AI identification on the short message based on the content of the short message after the mobile phone receives the short message.
In some embodiments, the sms message received by the mobile phone may be a user number sms message or an enterprise number sms message.
For example, as shown in fig. 7 (1), if the sms message received by the mobile phone is a user number sms message, and the content of the sms message includes the company where the user is located (such as XX company) and the occupation of the user (such as scene planner), the mobile phone uses the user number (such as 135 x 6820) as a key after AI identification of the sms message based on the content of the sms message, and the key information (such as XX company scene planner) is stored as a value in the target database. On this basis, when the sender of the short message calls the mobile phone again, that is, when the first phone number (for example, 135×6820) calls the mobile phone, the mobile phone queries the corresponding first key information from the target database based on the first phone number to be the XX company scene planner, as shown in (2) in fig. 7, and the mobile phone displays the first key information on the caller display interface.
As shown in fig. 8 (1), if the mobile phone receives a short message with an enterprise number, and the content of the short message includes a company (such as post-sending) where the user is located and a user number (such as 176×2827), the mobile phone performs AI identification on the short message based on the content of the short message, and then stores the user number (such as 176×2827) as a key and key information (such as post-sending) as a value in the target database. On this basis, when the sender of the short message calls the mobile phone again, i.e. the first phone number (176 is 2827 is shown), the mobile phone queries the corresponding first key information from the target database based on the first phone number to send and receive the first key information, as shown in (2) in fig. 8, and the mobile phone displays the first key information on the caller display interface.
Therefore, the user can select whether to answer the incoming call of the first telephone number or not based on the first key information displayed on the incoming display interface of the mobile phone.
In order to solve the problem that the mobile phone displays first key information to cause error guidance to a user due to inaccurate identification results caused by AI identification of the short message by the mobile phone, in some embodiments, if the duration of displaying the first key information on the caller identification interface of the mobile phone meets a first preset duration, the mobile phone exits the displayed first key information and displays the number attribution of the first telephone number; or if the duration of displaying the first key information on the caller identification interface of the mobile phone meets the first preset duration, displaying the number attribution of the first telephone number on the mobile phone.
It should be noted that, the present application is not specifically limited to the first preset duration, and is set in practice. The first preset duration may be, for example, 6s or 10 s.
For example, when the first phone number (135-6820) calls the mobile phone, as shown in fig. 9 (1), the mobile phone displays first key information corresponding to the first phone number, such as "XX company scene planner", on the caller id interface. Then, after the duration of displaying the first key information by the mobile phone meets the first preset duration (for example, 6 s), as shown in (2) in fig. 9, the mobile phone exits from displaying the first key information: "XX company scene planner", and displays the number attribution of the first phone number (e.g., beijing mobile).
On the basis, when the duration of the mobile phone displaying the number attribution of the first telephone number meets the second preset duration, the mobile phone exits the displayed number attribution of the first telephone number and continues to display the first key information. That is, when the first phone number calls the mobile phone, the caller id display interface of the mobile phone may cyclically display the first key information and the number attribution of the first phone number until the call of the first phone number is answered or hung up, or the call is ended.
It should be noted that, the second preset duration is not specifically limited in the present application, and the actual setting is in order. The second preset time period may be, for example, 3s.
As another example, when the first phone number (e.g., 135×6820) calls the mobile phone, as shown in fig. 10, the mobile phone displays first key information (e.g., XX scene planner) corresponding to the first phone number and the number attribution (e.g., beijing mobile) of the first phone number on the caller id display interface.
In the above embodiment, after receiving the incoming call of the first phone number, the mobile phone may display not only the first key information corresponding to the first phone number on the incoming call display interface, but also the number attribution of the first phone number, so as to avoid that the mobile phone only displays the first key information to cause error guidance to the user.
In some embodiments, the caller identification interface displayed by the mobile phone further comprises a first control and a second control; the first control is used for indicating the latest short message record corresponding to the first telephone number, and the second control is used for indicating the latest call record corresponding to the first telephone number.
Illustratively, as shown in FIG. 11, the caller ID interface includes a first control 301 and a second control 302; first control 301 may be, for example, "recent information" and second control 302 may be, for example, "recent call". On this basis, in response to the user's operation on the first control 301, the mobile phone jumps from the incoming call display interface to the short message interface corresponding to the latest short message record. Accordingly, in response to the user operating the second control 302, the mobile phone jumps from the incoming call display interface to the call record interface corresponding to the latest call record.
In this embodiment, by setting the first control and the second control, when the mobile phone receives a strange call, the user can check the latest call record or the latest short message record of the first phone number by operating the first control or the second control, so that the user can clearly know the importance and the purpose of the first phone number, thereby selecting whether to answer the call of the first phone number.
It will be appreciated that when the first telephone number calls the handset, the caller id interface of the handset includes an answer button and a reject button. Responding to the operation of the user on the answering button, and answering the incoming call of the first telephone number by the mobile phone; and responding to the operation of the rejection button by the user, and hanging up the incoming call of the first telephone number by the mobile phone. The above operation may be a click operation or a sliding operation, which is not limited in the present application.
In some embodiments, in response to a user operating the answer button, the mobile phone displays a call interface as shown in fig. 12 (1), which is an interface after the mobile phone answers the incoming call of the first phone number. For example, as shown in fig. 12 (1), the first key information is not displayed in the interface, that is, the mobile phone does not display the first key information corresponding to the first phone number during the call. Correspondingly, as shown in (1) of fig. 12, the interface further includes a hang-up button 303, and in response to the user operating the hang-up button 303, the mobile phone hangs up the call with the first phone number, and displays an interface shown in (2) of fig. 12, where the interface is an interface after the call is ended, and includes a "save number" button, a "add blacklist" button, a "mark" button, and the like. Subsequently, the user may choose to save, blacklist or mark the first phone number based on the above-described displayed buttons.
Further, in some embodiments, after the phone call with the first phone number is completed, the phone displays a call record with the first phone number in a call record interface, and the call record interface includes the first key information. The mobile phone displays a call recording interface as shown in fig. 13 (1), which includes first key information corresponding to the first phone number, such as a user name (e.g., korean XX) including the first phone number. Wherein the interface further comprises a detail button 304. On this basis, in response to the user's operation of the detail button 304, the mobile phone displays a detail page as shown in fig. 13 (2), which includes first key information (such as XX company scene planners) corresponding to the first telephone number, call records with the first telephone number, and the like.
In the embodiment, after the call is ended, the mobile phone can display the first key information corresponding to the first telephone number to the user in the call recording interface, so that the user can conveniently contact the first telephone number later, and the user experience is improved.
In some scenarios, mobile phones typically have installed therein system call applications with call functionality that maintain contact information that facilitates user contact. On the basis, when a telephone call is incoming, the mobile phone can acquire corresponding identity information (such as a name, a nickname and the like) based on the contact information stored in the call application. In other scenarios, the third party server is also provided with identity information corresponding to the phone number, and when a phone call is incoming, the mobile phone can acquire the corresponding identity information from the third party server based on the phone number. Wherein the third party server may be (digital office APP), number encyclopedia->Tencement>Etc. and the third party server may provide a number recognition function, i.e. a service providing identity information corresponding to the telephone number.
In some embodiments, the accuracy of the contact information stored in the system call application may be considered to be high because the contact information stored in the system call application is stored by the user himself. In this case, the present application can set the priorities of the system call application, the third party server, and the target database based on the accuracy of the identity information.
In the embodiment of the application, when the first telephone number calls the mobile phone, the mobile phone can also acquire the identity information corresponding to the first telephone number from the system call application or the third party server, and display the corresponding identity information on the caller identification interface. In addition, the mobile phone performs AI recognition based on the short message, so that the accuracy of the plurality of target data stored in the target database is low. Based on this, in some embodiments, the mobile phone may be preset with a target database, a system call application, and an identification priority of the third party server; when the first telephone number calls the mobile phone, the mobile phone can acquire the identity information corresponding to the first telephone number based on the first telephone number and the identification priority.
In some embodiments, as shown in fig. 14, the identifying priorities from high priority to low priority are: the system call application > the third party server > the target database. On the basis, when the first telephone number calls the mobile phone, the mobile phone firstly acquires corresponding identity information from the system call application based on the first telephone number according to the identification priority. If the mobile phone acquires corresponding identity information from the system application, the mobile phone displays the identity information on an incoming call display interface; if the mobile phone does not acquire the corresponding identity information from the system application, the mobile phone acquires the corresponding identity information from the third party server based on the first telephone number. Correspondingly, if the mobile phone acquires corresponding identity information from the third party server, the mobile phone displays the identity information on an incoming call display interface; if the mobile phone does not acquire the corresponding identity information from the third party server, the mobile phone acquires the corresponding identity information (or called first key information) from the target database based on the first phone number. Correspondingly, if the mobile phone acquires the corresponding first key information from the target database, the mobile phone displays the first key information on the caller identification interface.
It will be appreciated that the third party server may includeNumber encyclopedia>Tencement>Etc. On the basis, under the condition that the mobile phone acquires corresponding identity information from the third party server based on the first telephone number, the mobile phone can sequentially acquire the corresponding identity information through the identification priority of the third party server. Reference may be made to the above embodiments for specific implementation procedures, which are not described here in detail.
In the embodiment of the application, for the aboveNumber encyclopedia>Tencement>The identification priority of the server is not particularly limited, and is set in practice. For example, as shown in fig. 14, the identification priority of the third party server may be, for example: />
To prevent the phone number user from changing, or the phone number user's identity information from changing, the phone may also update the destination database in some embodiments. The mobile phone receives the first short message and identifies the content of the first short message to obtain the second phone number and the second key information in the first short message. On the basis, if the second telephone number is different from the first telephone number and the second key information is the same as the first key information, the mobile phone updates the target database based on the first short message. Or if the second telephone number is the same as the first telephone number and the second key information is different from the first key information, the mobile phone updates the target database based on the first short message.
In an exemplary embodiment, when the mobile phone receives a first sms message with a first phone number for the first time, and the occupation of the user with the first phone number is a scene planner in the content of the first sms message, after the mobile phone performs AI identification on the first sms message, the mobile phone writes the first phone number and key information (such as the scene planner) corresponding to the first phone number into a target database as target data. Subsequently, if the mobile phone receives the first sms message of the first phone number again and the occupation of the user of the first phone number changes (for example, becomes a designer) in the content of the first sms message, after the mobile phone performs AI identification on the first sms message, the mobile phone writes the first phone number and key information (for example, the designer) corresponding to the first phone number into the target database as target data, and replaces the target data written before to update the target database.
The content described in each embodiment of the present application can explain and describe the technical solutions in other embodiments of the present application, and the technical features described in each embodiment can also be applied in other embodiments, and form new solutions in combination with the technical features in other embodiments, and the present application is only described by way of example and not by way of limitation.
The embodiment of the application provides a mobile terminal, which comprises a display screen, a memory and one or more processors; the display screen, the memory and the processor are coupled; the memory is used to store computer program code that includes computer instructions that, when executed by the processor, enable the mobile terminal to perform the various functions or steps performed in the handset described above. The structure of the mobile terminal may refer to the structure of the mobile phone 100 shown in fig. 2.
Embodiments of the present application also provide a system on a chip, as shown in FIG. 15, the system on a chip 1800 including at least one processor 1801 and at least one interface circuit 1802. The processor 1801 may be the processor 110 shown in fig. 2 in the above embodiment. Interface circuit 1802 may be, for example, an interface circuit between processor 110 and an external memory; or as interface circuitry between the processor 110 and the internal memory 130.
The processor 1801 and interface circuit 1802 described above may be interconnected by wires. For example, interface circuit 1802 may be used to receive signals from other devices, such as a memory of a mobile terminal. For another example, interface circuit 1802 may be used to send signals to other devices (e.g., processor 1801). The interface circuit 1802 may, for example, read instructions stored in a memory and send the instructions to the processor 1801. The instructions, when executed by the processor 1801, may cause the mobile terminal to perform the steps performed by the handset in the above embodiments. Of course, the system-on-chip may also include other discrete devices, which are not particularly limited in accordance with embodiments of the present application.
It will be apparent to those skilled in the art from this description that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A method for displaying a strange call, which is applied to a mobile terminal, the method comprising:
the multimedia message service MMS module of the mobile terminal receives the short message and writes the received short message into a message database; the artificial intelligent identification AI module of the mobile terminal acquires the content of the short message from the message database and generates target data based on the content of the short message; the AI module of the mobile terminal returns the target data to the MMS module, and the MMS module of the mobile terminal writes the target data into a target database; the target database comprises a plurality of target data, wherein each target data in the plurality of target data comprises a telephone number and key information corresponding to the telephone number, and the key information is used for indicating identity information of a user; each target data in the plurality of target data is data supporting data migration;
The mobile terminal receives a first call from a first telephone number; responding to the first call, and inquiring corresponding first key information from the plurality of target data by the mobile terminal based on the first telephone number; the mobile terminal displays the first key information on an incoming call display interface;
wherein the method further comprises:
the mobile terminal receives a first short message;
the mobile terminal identifies the first short message and acquires a second telephone number and second key information in the first short message; wherein the second telephone number is different from the first telephone number, and the second key information is the same as the first key information; alternatively, the second telephone number is the same as the first telephone number, and the second key information is different from the first key information;
and the mobile terminal updates the plurality of target data based on the first short message.
2. The method of claim 1, wherein the caller identification interface comprises a first control and a second control; the first control is used for indicating the latest short message record corresponding to the first telephone number, and the second control is used for indicating the latest call record corresponding to the first telephone number; the method further comprises the steps of:
Responding to the operation of the user on the first control, and jumping the mobile terminal from the caller identification display interface to a short message interface corresponding to the latest short message record;
and responding to the operation of the user on the second control, and jumping the mobile terminal from the caller ID display interface to a call record interface corresponding to the latest call record.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
if the duration of displaying the first key information on the caller identification display interface of the mobile terminal meets a first preset duration, the mobile terminal exits the displayed first key information and displays the number attribution of the first telephone number; or,
if the duration of displaying the first key information on the caller identification interface by the mobile terminal meets a first preset duration, displaying the first key information and the number attribution of the first telephone number on the caller identification interface by the mobile terminal.
4. The method of claim 1 or 2, wherein the caller identification interface comprises an answer button and a reject button; the method further comprises the steps of:
Responding to the operation of the user on the answer button, and establishing a call with the first telephone number by the mobile terminal;
after the call is ended, the mobile terminal displays a call record with the first telephone number on a call record interface; the call record interface includes the first key information.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
if the number of the plurality of target data stored in the mobile terminal is larger than a preset number threshold, deleting the first written target data by the mobile terminal; or,
if the mobile terminal does not establish communication connection with the target telephone number in the preset period, the mobile terminal automatically deletes the target data corresponding to the target telephone number.
6. The method of claim 1, wherein the mobile terminal querying corresponding first key information from a plurality of target data based on the first phone number in response to the first call comprises:
responding to the first call, and acquiring corresponding identity information from a system call application by the mobile terminal based on the first telephone number;
If the mobile terminal does not acquire the identity information corresponding to the first telephone number from the system call application, the mobile terminal acquires the identity information corresponding to the first telephone number from a server; the server is a third party server for providing identity information corresponding to the telephone number;
and if the mobile terminal does not acquire the identity information corresponding to the first telephone number from the server, the mobile terminal inquires corresponding first key information from the plurality of target data based on the first telephone number.
7. The method of claim 6, wherein the method further comprises:
and if the mobile terminal acquires the identity information corresponding to the first telephone number from the server, the mobile terminal displays the identity information on an incoming call display interface.
8. The method of any one of claim 1, 2, 6 or 7,
the first key information includes one or more of a user name, a company in which the user is located, or a occupation of the user corresponding to the first phone number.
9. A mobile terminal, comprising: a display screen, a memory, and one or more processors, the display screen, the memory coupled with the processors; the memory is used for storing computer program codes, and the computer program codes comprise computer instructions; the computer instructions, when executed by the processor, cause a mobile terminal to perform the method of any of claims 1-8.
10. A computer-readable storage medium comprising computer instructions; the computer instructions, when run on a mobile terminal, cause the mobile terminal to perform the method of any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310037017.3A CN116055636B (en) | 2023-01-10 | 2023-01-10 | Strange call display method, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310037017.3A CN116055636B (en) | 2023-01-10 | 2023-01-10 | Strange call display method, mobile terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116055636A CN116055636A (en) | 2023-05-02 |
CN116055636B true CN116055636B (en) | 2023-11-14 |
Family
ID=86112944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310037017.3A Active CN116055636B (en) | 2023-01-10 | 2023-01-10 | Strange call display method, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116055636B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
KR100877670B1 (en) * | 2007-08-06 | 2009-01-08 | 유상규 | Method for changing telephone number by analyzing message and mobile phone saving its method |
CN101958955A (en) * | 2010-05-28 | 2011-01-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for displaying phone number information and mobile terminal |
CN102868801A (en) * | 2012-08-27 | 2013-01-09 | 百度在线网络技术(北京)有限公司 | Method and device for updating contact person telephone number, and mobile terminal |
CN104168560A (en) * | 2014-08-25 | 2014-11-26 | 北京奇虎科技有限公司 | Method for displaying related information of unfamiliar number, monitoring device and cloud server |
CN104394259A (en) * | 2014-11-27 | 2015-03-04 | 广东欧珀移动通信有限公司 | Method and device for caller identification and mobile terminal |
CN107920154A (en) * | 2017-10-31 | 2018-04-17 | 华勤通讯技术有限公司 | The processing method and terminal of Stranger Calls |
CN108206893A (en) * | 2018-01-23 | 2018-06-26 | 中兴通讯股份有限公司 | call processing method and device |
CN112887488A (en) * | 2021-01-21 | 2021-06-01 | 深圳市艾酷通信软件有限公司 | Caller identification method and device and electronic equipment |
-
2023
- 2023-01-10 CN CN202310037017.3A patent/CN116055636B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100877670B1 (en) * | 2007-08-06 | 2009-01-08 | 유상규 | Method for changing telephone number by analyzing message and mobile phone saving its method |
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN101958955A (en) * | 2010-05-28 | 2011-01-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for displaying phone number information and mobile terminal |
CN102868801A (en) * | 2012-08-27 | 2013-01-09 | 百度在线网络技术(北京)有限公司 | Method and device for updating contact person telephone number, and mobile terminal |
CN104168560A (en) * | 2014-08-25 | 2014-11-26 | 北京奇虎科技有限公司 | Method for displaying related information of unfamiliar number, monitoring device and cloud server |
CN104394259A (en) * | 2014-11-27 | 2015-03-04 | 广东欧珀移动通信有限公司 | Method and device for caller identification and mobile terminal |
CN107920154A (en) * | 2017-10-31 | 2018-04-17 | 华勤通讯技术有限公司 | The processing method and terminal of Stranger Calls |
CN108206893A (en) * | 2018-01-23 | 2018-06-26 | 中兴通讯股份有限公司 | call processing method and device |
CN112887488A (en) * | 2021-01-21 | 2021-06-01 | 深圳市艾酷通信软件有限公司 | Caller identification method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN116055636A (en) | 2023-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11947974B2 (en) | Application start method and electronic device | |
CN114554005B (en) | Notification message management method and electronic equipment | |
CN113170019B (en) | Incoming call display method and terminal equipment based on application | |
US20230054451A1 (en) | Communication Connection Method and Electronic Device | |
CN110225176B (en) | Contact person recommendation method and electronic device | |
WO2020259650A1 (en) | Request response method and electronic device | |
CN114679752A (en) | Method for sharing wireless communication capacity by dual systems and terminal equipment | |
CN116055636B (en) | Strange call display method, mobile terminal and storage medium | |
CN114896097B (en) | Application program non-response processing method and electronic equipment | |
US20230300598A1 (en) | Display method and electronic device | |
CN116346975A (en) | Method for synchronizing call records, electronic equipment and readable storage medium | |
CN114465968A (en) | Cross-application interconnection method between different devices and related device | |
WO2024188032A1 (en) | Communication method, device, and server | |
CN116662024B (en) | Inter-process communication monitoring method and device, electronic equipment and storage medium | |
CN117729561B (en) | System upgrading method, terminal and storage medium | |
CN116055635B (en) | Call state display method and device, electronic equipment and storage medium | |
CN115828227B (en) | Method for identifying advertisement popup, electronic equipment and storage medium | |
CN116055643B (en) | Visual voice mail service starting method and electronic equipment | |
CN116048545B (en) | Processing method of popup advertisement, electronic equipment and readable storage medium | |
KR20160114822A (en) | Server for managing user information | |
CN118734349A (en) | Privacy protection method and electronic equipment | |
CN117971335A (en) | Display method, electronic equipment and medium | |
KR102307526B1 (en) | User information management system | |
CN117827476A (en) | Event processing method, event processing device, electronic equipment and readable storage medium | |
CN113542480A (en) | Terminal equipment and call request processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |