KR20140066465A - Method of intercepting spam voice message and apparatus performing the same - Google Patents

Method of intercepting spam voice message and apparatus performing the same Download PDF

Info

Publication number
KR20140066465A
KR20140066465A KR1020120133722A KR20120133722A KR20140066465A KR 20140066465 A KR20140066465 A KR 20140066465A KR 1020120133722 A KR1020120133722 A KR 1020120133722A KR 20120133722 A KR20120133722 A KR 20120133722A KR 20140066465 A KR20140066465 A KR 20140066465A
Authority
KR
South Korea
Prior art keywords
spam
message
voice message
word
voice
Prior art date
Application number
KR1020120133722A
Other languages
Korean (ko)
Inventor
박용신
서승연
정진수
Original Assignee
주식회사 우리은행
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 우리은행 filed Critical 주식회사 우리은행
Priority to KR1020120133722A priority Critical patent/KR20140066465A/en
Publication of KR20140066465A publication Critical patent/KR20140066465A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/184Messaging devices, e.g. message centre

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for intercepting a spam voice message according to one embodiment of the present invention is performed in a spam voice message intercepting apparatus connected to a caller terminal. The method for intercepting the spam voice message includes the steps of: generating a message character string by analyzing a voice message received from the caller terminal; generating a plurality of spam candidate words by dividing the message character string with specific charger numbers and determining the corresponding candidate word as a spam word if the spam candidate words are in a previously constructed spam information database; and determining the voice message as the spam message according to an occupation ratio of the spam word among the spam candidate words.

Description

TECHNICAL FIELD [0001] The present invention relates to a method for blocking a spam voice message,

Embodiments of the present invention are directed to a method for blocking spam voicemail and an apparatus for implementing the method.

The mobile communication terminal may be a personal mobile communication terminal, a personal digital assistant (PDA), a smart phone, an International Mobile Telecommunication 2000 (IMT 2000) LAN terminal and the like, and is capable of implementing various functions using an application program including wireless communication.

The mobile communication terminal has not only been reduced in size and weight due to steady development, but it is being reborn as a complex communication terminal having various functions such as mp3, camera and navigation, and is already becoming a necessity of modern people.

Such mobile communication terminals are also used as media for promoting advertisements through calls or voice messages. To this end, the sender of the advertisement message transmits the customer management and product advertisement message with the consent of the receiver to advertise the desired contents.

However, a spam-based advertisement message sent to an unspecified number of recipients is often received without the consent of the recipient. Therefore, a method for protecting recipients from such harmful messages is required.

An embodiment of the present invention is to provide a spam voicemail blocking method and a device for executing the spam voicemail blocking method that can determine a spam word as a spam message if the spam word is included in the voice message.

An embodiment of the present invention is to provide a spam voicemail blocking method and a device for executing the spam voicemail blocking method capable of processing a corresponding voice message as a spam message according to the ratio of spam words in a voice message.

The problems to be solved by the present invention are not limited to the above-mentioned problem (s), and another problem (s) not mentioned can be clearly understood by those skilled in the art from the following description.

In embodiments, a method for blocking spam voicemail messages is implemented in a spam voicemail interceptor associated with a sender terminal. The spam voice message blocking method includes generating a message string by analyzing a voice message received from the sender terminal, generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters, Determining a candidate word as a spam word if the plurality of spam candidate words exist in the plurality of spam candidate words; and determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words .

In one embodiment, the method for blocking spam voicemessage comprises: determining whether a phone number of the calling terminal exists in a pre-stored contact; and if the phone number of the calling terminal is present, It may further include a step of deciding that it is not.

In one embodiment, the step of analyzing the voice message to generate a message string may further include generating a message string by controlling a corresponding interval when a pause, which is a silence period, is detected in the voice of the voice message have.

In one embodiment, the step of generating a plurality of spam candidate words by dividing the message string into a specific number of characters may further include generating a plurality of message strings by dividing the message string by character type.

In one embodiment, if the plurality of spam candidate words are present in the pre-established spam information database, the step of determining the candidate word as a spam word may include, in a social network, a list of spam phone numbers, And constructing a spam information database by receiving at least one of a URL (Uniform Resource Locator) list.

In one embodiment, the step of determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words may include determining a ratio of the spam word among the plurality of spam candidate words to a specific ratio Determining that the voice message is a spam message.

In one embodiment, determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words may include extracting a telephone number of a sender terminal that has transmitted the voice message determined as the spam message And updating the spam phone number list in the social network if the phone number does not exist in the pre-established spam information database.

In one embodiment, the spam voicemail blocking method may further include sending a warning message to the user when the voice message is determined as a spam message.

In an exemplary embodiment, a spam voice message blocking device connected to a sender terminal may include a voice message manager for analyzing a voice message received from the caller terminal to generate a message string, and a plurality of spam candidate words Determines a candidate word as a spam word if the plurality of spam candidate words exist in a pre-established spam information database, and determines the candidate word as a spam word based on a ratio of the spam word occupied by the plurality of spam candidate words, As a spam message.

In one embodiment, the spam determining unit may determine whether the phone number of the calling terminal is present in the pre-stored contact, and may determine that the voice message is not a spam message if the phone number of the calling terminal exists .

In one embodiment, when a pause, which is a silence period, is detected in the voice of the voice message, the voice message management unit may control the corresponding period to generate a message string.

In one embodiment, the voice message management unit may further include generating a plurality of message strings by dividing the message string into a plurality of character types.

In one embodiment, the spam voice message blocking device further includes a spam information database constructed by receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network can do.

In one embodiment, the spam determining unit may determine the voice message as a spam message if the percentage of the spam words among the plurality of spam candidate words is greater than a specific ratio.

In one embodiment, the spam voice message blocking device extracts a telephone number of a caller terminal that has transmitted a voice message determined as the spam message, and if the telephone number does not exist in the spam information database, And a spam voicemail blocking control unit for updating the list.

In one embodiment, the spam voicemail blocking control unit may display a warning message to the user when the voice message is determined as a spam message.

The details of other embodiments are included in the detailed description and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS The advantages and / or features of the present invention, and how to accomplish them, will become apparent with reference to the embodiments described in detail below with reference to the accompanying drawings. It should be understood, however, that the invention is not limited to the disclosed embodiments, but is capable of many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, To fully disclose the scope of the invention to those skilled in the art, and the invention is only defined by the scope of the claims. Like reference numerals refer to like elements throughout the specification.

According to an embodiment of the present invention, if the spam word is included in the voice message, the voice message can be determined as a spam message.

According to an embodiment of the present invention, the voice message may be processed as a spam message according to the ratio of the spam word in the voice message.

FIG. 1 is a network diagram illustrating a spam voice message blocking system according to an embodiment of the present invention. Referring to FIG.
FIG. 2 is a block diagram illustrating a spam voice message blocking apparatus according to an exemplary embodiment of the present invention. Referring to FIG.
3 is a block diagram illustrating a spam voice message blocking apparatus according to another embodiment of the present invention.
4 is a flowchart illustrating a method of blocking a spam voice message according to an embodiment of the present invention.
5 is a flow chart for explaining another embodiment of a spam voice message blocking method according to the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

The spam voice message blocking device according to an embodiment of the present invention is included in a mobile communication terminal. The mobile communication terminal can be a mobile communication terminal such as a personal digital assistant (PCS), a personal digital assistant Lt; / RTI >

FIG. 1 is a network diagram illustrating a spam voice message blocking system according to an embodiment of the present invention. Referring to FIG.

Referring to FIG. 1, a spam voice message blocking system includes a spam voice message blocking apparatus 100 and a caller terminal 200. Here, the spam voice message blocking device 100 and the caller terminal 200 may be connected through a communication network.

The spam voice message blocking device 100 may determine whether the voice message received from the calling terminal 200 is a spam message and display a warning about the voice message. Such a spam voice message blocking device 100 will be described in more detail below with reference to FIGS. 2 to 3. FIG.

The calling terminal 200 is a terminal capable of transmitting a voice message. The sender terminal 200 is a terminal having a central processing unit and a memory device such as a PC, a tablet PC, a smart phone, and the like.

FIG. 2 is a block diagram illustrating a spam voice message blocking apparatus according to an exemplary embodiment of the present invention. Referring to FIG.

Referring to FIG. 2, the spam voice message blocking apparatus 100 includes a communication unit 110, a voice message management unit 120, a spam determination unit 130, and a spam voice message blocking control unit 140, And may further include a voice message storage unit 150.

The communication unit 110 may set or maintain a communication environment for receiving a voice message from the calling terminal 200 under the control of the spam voice message blocking control unit 140. [

The voice message management unit 120 may analyze the voice message received from the caller terminal 200 to generate a message string. The voice message management unit 120 may provide the generated message string to the spam voice message blocking control unit 140. [

In one embodiment, the voice message management unit 120 may convert a voice message into a text message to generate a message string. For example, when the voice message is " the possible limit for the customer is one million won ", the voice message management unit 120 converts the voice message into a text message, and the message string " Can be generated. For example, if the voice message is " 10 million won loanable access http://spam.co.kr ", the voice message management unit 120 converts the voice message into a text message and transmits a message string " http://spam.co.kr "can be created.

In another embodiment, the voice message manager 120 may generate a message string by removing a pause, which is a silence interval, from the voice of the voice message. For example, if a pause is found during the process of generating a message string, the voice message management unit 120 may temporarily stop the conversion into a text message and restart the generation of the message string when the voice is restarted.

The spam determining unit 130 may determine the voice message as a spam message by using the information of the voice message received from the calling terminal 200. [ The spam determination unit 130 may provide information on the determined voice message to the spam voice message blocking control unit 140. For example, the voice message includes " loan ", and the spam determiner 130 may provide the spam message blocking controller 140 with information that the voice message is a spam message.

The spam determination unit 130 may determine the voice message as a spam message by using the sender information of the voice message.

In one embodiment, the spam determiner 130 may determine that the voice message is a spam message if the telephone number of the voice message sender exists in the pre-established spam information database. For example, if the telephone number 070-1234-5678 of the voice message sender exists in the established spam information database, the spam judgment unit 130 can determine the voice message as a spam message.

The spam determining unit 130 may determine the voice message as a spam message by using words in the message string under the control of the spam voice message blocking controller 140. [

In one embodiment, the spam determining unit 130 may divide the message string into a specific number of characters, and if the spam word is included, determine that the voice message is a spam message.

For example, when the message string is " your creditable amount is 1 million won ", the spam determination unit 130 divides the message string by two characters to calculate the spam candidate words " customer ", " "," Possible "," limit "... And if the spam candidate word exists in the established spam information database, the voice message can be determined as a spam message. For example, if the message string is " loan is available for one million won ", the spam judging unit 130 divides the message string by two characters to generate spam candidate words " And if the spam candidate word exists in the established spam information database, the voice message can be determined as a spam message.

In another embodiment, the spam determining unit 130 may divide the message string into character types and determine the voice message as a spam message if the spam word is included. For example, when the message string is " 10 million won loanable access http://spam.co.kr ", the spam determination unit 130 sets 1000, quot; // spam.co.kr " and if the spam word is included in each message string, the voice message can be determined as a spam message.

The spam determination unit 130 may determine the voice message as a spam message according to the proportion of the spam word in the message string.

In one embodiment, the spam determination unit 130 generates a plurality of spam candidate words using a message string, and if the ratio of the spam word occupation among the plurality of spam candidate words is greater than or equal to a certain ratio, the voice message is determined as a spam message can do. For example, if the message string is " a loan finance consultant with no fee ", and the spam words are "commission", "loan", "finance", "consultation" Message. ≪ / RTI >

In another embodiment, the spam determination unit 130 generates a plurality of spam candidate words using a message string, and if the percentage of the spam candidate words among the plurality of spam candidate words is less than a specific ratio, It can be determined that it is not. For example, when the message string is " a call has been made to a manor call customer " and the spam word is " customer ", the spam judgment unit 130 can determine that the voice message is not a spam message.

The spam determining unit 130 may determine that the voice message is not a spam message if the telephone number of the voice message sender exists in the pre-stored contact.

The spam voice message blocking control unit 140 may control other components of the spam voice message blocking apparatus 100 to block the spam voice message.

The spam voice message blocking control unit 140 may control the spam determination unit 130 to store a voice message received from the caller terminal 200 in the voice message storage unit 150. [ For example, if the voice message includes a spam word, the spam voice message blocking control unit 140 controls the spam voice message blocking unit 140 to transmit the voice message to the spam storage unit of the voice message storage unit 150 Can be controlled to be stored. For example, if the telephone number of the voice message sender exists in the pre-stored contact, the voice message may be stored in the general storage of the voice message storage unit 150 according to the result determined by the spam determination unit 130 have.

The spam voice message blocking control unit 140 can notify the user that the voice message received from the calling terminal 200 is a spam message by using the spam determination unit 130. [ For example, if the voice message includes a spam word, the spam voice message blocking control unit 140 may control the user to display a warning message according to the result determined by the spam determination unit 130. [

The spam voice message blocking control unit 140 can update the list in the social network using the spam judgment unit 130. [

In one embodiment, the spam voice message blocking control 140 may update the spam phone number list in the social network. For example, if the phone number of the sender of the spam voice message does not exist in the pre-established spam information database according to the result of the determination by the spam judging unit 130, the spam voice message blocking control unit 140 displays the spam phone number list . ≪ / RTI >

In another embodiment, the spam voice message blocking control unit 140 may update the spam word list in the social network. For example, the spam voicemail blocking control unit 140 determines that the spam word is determined as a spam message by the spam determination unit 130. If the spam word referenced in the spam information database does not exist in the established spam information database, . ≪ / RTI >

In yet another embodiment, the spam voice message blocking control 140 may update the spam URL list in the social network. For example, the spam voicemail blocking control unit 140 determines that the spam message is determined as a spam message by the spam determination unit 130. If the spam URL referenced in the spam information database does not exist in the established spam information database, You can update it.

3 is a block diagram illustrating a spam voice message blocking apparatus according to another embodiment of the present invention. 3, the same or corresponding contents as those described above with reference to FIG. 2 will be omitted and the person skilled in the art will be able to understand the structure and operation of another embodiment of the spam voice message blocking device disclosed in FIG. Will be fully understood.

The spam voice message blocking device 100 disclosed in FIG. 3 may further include a spam information database 160.

The spam information database 160 may store the spam information by the reference frequency.

In one embodiment, the spam information database 160 may receive and store at least one of a spam phone list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network. In another embodiment, the spam information database 160 may receive and store at least one of at least one spam phone number, at least one spam word, and at least one spam URL from a user.

Hereinafter, a spam voice message blocking method will be described with reference to FIGS. 4 and 5. FIG. Since the spam voice message blocking method to be described later is performed in the above-described spam voice message blocking apparatus 100, corresponding contents will not be duplicated, but those skilled in the art will appreciate from the foregoing description that the spam voice message blocking method One embodiment may be understood.

4 is a flowchart illustrating a method of blocking a spam voice message according to an embodiment of the present invention. The embodiment of FIG. 4 relates to an embodiment in which whether a voice message received from a sender terminal is a spam message or not can be confirmed.

4, the spam voice message blocking device 100 converts a voice message received from the caller terminal 200 into a text message and generates a message string (Step S410). The spam voice message blocking device 100 generates a plurality of spam candidate words using the message string (step S420). The spam voicemail blocking apparatus 100 determines whether a plurality of spam candidate words are present in the established spam information database (step S430). If a plurality of spam candidate words exist in the established spam information database, the spam voice message blocking device 100 determines the candidate word as a spam word (step S440). The spam voice message blocking device 100 determines the voice message as a spam message according to the proportion of spam words among the plurality of spam candidate words (step S450).

5 is a flowchart for explaining another embodiment of the spam voice message blocking method according to the present invention. An embodiment of FIG. 5 relates to an embodiment wherein the voice message received from the sender terminal is a spam message and the corresponding information can be provided to a server in the social network.

5, the spam voice message blocking device 100 analyzes a voice message received from the calling terminal 200 and determines whether the voice message is a spam message (Step S510). If it is determined that the voice message is a spam message (step S520), the spam voice message blocking apparatus 100 extracts the telephone number of the sender terminal that transmitted the voice message (step S530). If the telephone number does not exist in the established spam information database (step S540), the spam voice message blocking device 100 updates the spam phone number list in the social network (step S550).

Embodiments of the present invention include computer readable media including program instructions for performing various computer implemented operations. The computer-readable medium may include program instructions, local data files, local data structures, etc., alone or in combination. The media may be those specially designed and constructed for the present invention or may be those known to those skilled in the computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs and DVDs, magneto-optical media such as floppy disks, and ROMs, And hardware devices specifically configured to store and execute the same program instructions. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like.

While the present invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the scope of the appended claims and equivalents thereof.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, Modification is possible. Accordingly, the spirit of the present invention should be understood only in accordance with the following claims, and all equivalents or equivalent variations thereof are included in the scope of the present invention.

100: Spam Voice Message Blocker
110:
120: voice message management unit
130: Spam judgment unit
140: Spam voice message blocking control unit
150: Message storage unit
160: Spam information database
200: caller terminal

Claims (16)

A spam voicemail blocking method executed on a spam voicemail blocking device connected to a sender terminal,
Analyzing a voice message received from the caller terminal to generate a message string;
Generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters and determining the candidate word as a spam word if the plurality of spam candidate words exist in the pre-established spam information database; And
And determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words.
The method according to claim 1,
Determining whether a telephone number of the calling terminal exists in a pre-stored contact; And
And determining that the voice message is not a spam message if the phone number of the sender terminal exists as a result of the determination.
The method of claim 1, wherein the step of analyzing the voice message to generate a message string
Further comprising the step of generating a message string by controlling a corresponding interval when a pause that is a silence period is detected in the voice of the voice message.
The method of claim 1, wherein generating the plurality of spam candidate words by dividing the message string into a predetermined number of characters
Further comprising generating a plurality of message strings by dividing the message string by a character type.
The method according to claim 1, wherein, when the plurality of spam candidate words exist in the pre-established spam information database, the step of determining the candidate word as a spam word
Further comprising the step of receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network to construct a spam information database .
The method of claim 1, wherein the step of determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words
And determining the voice message as a spam message if the ratio of the spam word among the plurality of spam candidate words is greater than a specific ratio.
The method as claimed in any one of claims 5 and 6, wherein the step of determining the voice message as a spam message according to a ratio of the spam word among the plurality of spam candidate words
Extracting a telephone number of a caller terminal that has transmitted a voice message determined as the spam message; And
And updating the spam phone number list in the social network if the phone number does not exist in the pre-established spam information database.
The method according to claim 1,
And sending a warning message to the user if the voice message is determined as a spam message.
1. A spam voicemail interceptor connected to a sender terminal,
A voice message manager for analyzing a voice message received from the caller terminal and generating a message string; And
The method comprising: generating a plurality of spam candidate words by dividing the message string into a predetermined number of characters; determining the candidate word as a spam word if the plurality of spam candidate words exist in the pre-established spam information database; And a spam determining unit determining the voice message as a spam message according to a ratio of the spam word among the words.
10. The system according to claim 9, wherein the spam determining unit
Wherein the controller determines whether a phone number of the calling terminal exists in a pre-stored contact, and determines that the voice message is not a spam message if the phone number of the calling terminal exists.
The apparatus of claim 9, wherein the voice message management unit
Wherein when a pause that is a silence period is detected in the voice of the voice message, the control unit controls the corresponding period to generate a message string.
The apparatus of claim 9, wherein the voice message management unit
Further comprising generating a plurality of message strings by dividing the message string by a character type.
10. The method of claim 9,
Further comprising a spam information database constructed by receiving at least one of a spam phone number list, a spam word list, and a spam URL (Uniform Resource Locator) list in a social network.
10. The system according to claim 9, wherein the spam determining unit
And the voice message is determined to be a spam message if the ratio of the spam words among the plurality of spam candidate words is greater than a specific ratio.
15. The method according to any one of claims 13 to 14,
Further comprising a spam voice message blocking control unit for extracting a telephone number of a caller terminal that has transmitted a voice message determined as the spam message and updating the spam phone number list in the social network if the telephone number does not exist in the spam information database Wherein the spam voicemail message blocking device comprises:
16. The apparatus of claim 15, wherein the spam voicemail blocking control unit
And displays a warning message to the user when the voice message is determined as a spam message.
KR1020120133722A 2012-11-23 2012-11-23 Method of intercepting spam voice message and apparatus performing the same KR20140066465A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020120133722A KR20140066465A (en) 2012-11-23 2012-11-23 Method of intercepting spam voice message and apparatus performing the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020120133722A KR20140066465A (en) 2012-11-23 2012-11-23 Method of intercepting spam voice message and apparatus performing the same

Publications (1)

Publication Number Publication Date
KR20140066465A true KR20140066465A (en) 2014-06-02

Family

ID=51123180

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120133722A KR20140066465A (en) 2012-11-23 2012-11-23 Method of intercepting spam voice message and apparatus performing the same

Country Status (1)

Country Link
KR (1) KR20140066465A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113919337A (en) * 2021-11-02 2022-01-11 湖南快乐阳光互动娱乐传媒有限公司 Short message interception method and device, storage medium and electronic equipment
KR102392950B1 (en) * 2022-03-04 2022-04-29 한양대학교 산학협력단 Voice phishing/smishing detection method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113919337A (en) * 2021-11-02 2022-01-11 湖南快乐阳光互动娱乐传媒有限公司 Short message interception method and device, storage medium and electronic equipment
KR102392950B1 (en) * 2022-03-04 2022-04-29 한양대학교 산학협력단 Voice phishing/smishing detection method

Similar Documents

Publication Publication Date Title
CN109725975B (en) Method and device for prompting read state of message and electronic equipment
US20150334118A1 (en) Method and apparatus for clearing notification icon, and storage medium
CN101983501A (en) User interface with voice message summary
JP2003244317A (en) Voice and circumstance-dependent notification
US8331268B2 (en) Methods, systems, and computer-readable media for providing an event alert
JP5633086B2 (en) Method and apparatus for quickly adding recipients, and portable terminal using the same
CN101243679A (en) Voice communicator to provide a voice communication
EP3247095A1 (en) Method, apparatus, and portable electronic device
CN104125136A (en) Message prompt method, client and terminal equipment
JP2019153961A (en) Information processing system, information processing apparatus, information processing method, and program
KR101426616B1 (en) Method of intercepting spam message and apparatus performing the same
CN105262881A (en) Communication control method and electronic equipment
US10652388B2 (en) Communication systems and methods for causing display of visual content on a screen associated with a calling device
CN112995422A (en) Call control method and device, electronic equipment and storage medium
KR20140066465A (en) Method of intercepting spam voice message and apparatus performing the same
KR101153019B1 (en) Method and Apparatus for setting string for filtering spam messages in mobile device
CN108924840B (en) Blacklist management method and device and terminal
US20050207390A1 (en) Method and system for sending text-based communications to a network access device for an application with video or audio output
US8223947B2 (en) Method and system for remote call forwarding set-up and modification
CN105704003A (en) Instant communication interaction method and terminal
KR101339101B1 (en) Method of providing alarm searvice using address book of smart device
KR20130133595A (en) Method for blocking a spam call or a spam message
CN110688490A (en) Method and device for configuring knowledge graph
KR101418577B1 (en) Method of providing alarm searvice using address book of smart device
Stamm et al. Mobile intelligent interruptions management (MIIM) a context aware unavailability system

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application