WO2016091075A1 - Method for intercepting harassment communications via mobile communication terminal, and mobile communication terminal - Google Patents

Method for intercepting harassment communications via mobile communication terminal, and mobile communication terminal Download PDF

Info

Publication number
WO2016091075A1
WO2016091075A1 PCT/CN2015/095598 CN2015095598W WO2016091075A1 WO 2016091075 A1 WO2016091075 A1 WO 2016091075A1 CN 2015095598 W CN2015095598 W CN 2015095598W WO 2016091075 A1 WO2016091075 A1 WO 2016091075A1
Authority
WO
WIPO (PCT)
Prior art keywords
harassment
address
contact
communication access
communication
Prior art date
Application number
PCT/CN2015/095598
Other languages
French (fr)
Chinese (zh)
Inventor
宋郅鹏
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2016091075A1 publication Critical patent/WO2016091075A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Definitions

  • the present invention relates to the field of computers, and in particular to a method for mobile communication terminal to perform interception communication interception and a mobile communication terminal.
  • the present invention has been made in order to provide a method and mobile communication terminal for performing a disturbance communication interception by a mobile communication terminal that overcomes the above problems or at least partially solves the above problems.
  • a method for a mobile communication terminal to perform a disturbance communication interception including:
  • the mobile communication terminal performs type identification on a plurality of harassment addresses included in the harassment address library
  • the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact, intercepting the communication access; And responding to the communication access if the network address of the communication access initiator is a harassment address in the harassment address library and the network address is a communication mode in the second designated contact.
  • a mobile communication terminal comprising:
  • An identification module configured to perform type identification on multiple harassment addresses included in the harassment address library
  • a saving module configured to save the harassment address in the harassment address library as the new communication mode of the first designated contact in the local address book, where the first designated contact is set as a contact that restricts communication access; Saving a new communication method in the harassment address library for the release type harassment address as the second designated contact in the local address book, the second designated contact being set as a contact that allows communication access;
  • a processing module configured to: when there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the first designated contact, intercepting The communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
  • a computer program comprising computer readable code, when the computer readable code is run on a terminal device, causing the terminal device to perform any of the mobile communication terminals described above The method of harassing communication interception.
  • a computer readable medium storing a computer program for performing a method of performing a disturbance communication interception by any of the above mobile communication terminals is provided.
  • the technical solution provided by the embodiment of the present invention has at least the following advantages:
  • the technical solution provided by the embodiment of the present invention saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address.
  • the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted;
  • the network address of the letter access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the second designated contact, and the part of the harassment address is implemented in response to the communication access Interception, so that the harassment address of some harassment behaviors that are not very bad can be intercepted, solve the problems existing in the prior art, and provide users with a better anti-harassment experience.
  • FIG. 1 is a schematic flowchart of a first implementation of a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention
  • FIG. 2 is a diagram showing an example of the harassment address and the harassment identifier label set by the designated contact in the method for performing the harassment communication interception by the mobile communication terminal according to the first embodiment of the present invention
  • FIG. 3 is a diagram showing an example of an incoming call prompt page when a communication access is an incoming call in a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention
  • FIG. 4 is a diagram showing an example of a contact that has been intercepted in a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention
  • FIG. 5 is a diagram showing an example of a contact that is not intercepted in a method for performing a harassment communication interception by a mobile communication terminal according to Embodiment 1 of the present invention
  • FIG. 6 is a schematic flowchart diagram showing a second implementation of a method for performing interference communication interception by a mobile communication terminal according to Embodiment 1 of the present invention
  • FIG. 7 is a schematic structural diagram of a mobile communication terminal according to Embodiment 2 of the present invention.
  • Figure 8 shows a block diagram of a terminal device for performing the method according to the invention
  • Figure 9 shows a storage unit for holding or carrying program code implementing the method according to the invention.
  • FIG. 1 a schematic flowchart of a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention is shown.
  • the execution body of the method provided by this embodiment may be a mobile communication terminal.
  • the method includes:
  • Step 101 The mobile communication terminal performs type identification on the plurality of harassment addresses included in the harassment address database.
  • the harassment address library can be obtained from a network side device.
  • the network side device may be a cloud device. That is, the mobile communication terminal can download the harassment address library from the network side device through a wired or wireless network.
  • the mobile communication terminal can download the harassment address library from the network side device through the 2G, 3G, and 4G networks; or access the Internet through a local area network access method such as Wi-Fi to download the harassment from the network side device.
  • the address; the harassment address can also be downloaded from the network side device by accessing the internet through a wired manner.
  • the mobile communication terminal may acquire the harassment address library that has been downloaded in the computing device by performing data synchronization with the computing device, wherein the computing device first downloads the network device from the network side device through the network. Harassing the address library.
  • the mobile communication terminal may download the harassment address library from the network side device by using the following method, the method includes:
  • the mobile communication terminal can send a download request to the network side device through the client interface.
  • the download request carries the identifier of the mobile communication terminal.
  • the network side device may send the harassment address library to the mobile communication terminal according to the download request.
  • the above-mentioned download request may further include the location information of the mobile communication terminal, so that the network side device determines the region to which the mobile communication terminal belongs according to the location information, and issues the region for the mobile communication terminal.
  • Corresponding harassment address library may be used
  • the harassment address library can contain harassment addresses in addition to harassment addresses.
  • Disturbance tag corresponding to the address.
  • the harassment mark may include: "insurance management”, “real estate agency”, “advertising sales”, “fast delivery meal”, “harassment call”, “sound” and “scam phone” and the like. Therefore, this step can be implemented as follows:
  • the harassment flag corresponding to each harassment address is obtained in the harassment address database.
  • the type of each of the harassment addresses is identified according to the harassment flag corresponding to each of the harassment addresses.
  • the type of the harassment address may be an intercept type
  • the interception type of the harassment address may be a release type.
  • Step 102 Save the harassment address in the harassment address library as the interception type of the harassment address as the new communication mode of the first designated contact in the local address book, where the first designated contact is set as the contact that restricts the communication access.
  • Step 103 Save the new communication mode in the harassment address library as the release type harassment address as the second designated contact in the local address book, and the second designated contact is set as a contact that allows communication access.
  • the method provided in this embodiment may further include the following steps:
  • the harassment identifier label set for the second designated contact may be a picture or a text or the like.
  • the harassment identification tag set for the second designated contact may be a harassment identification avatar and/or a harassment identification name.
  • the harassment identification avatar shown in FIG. 2 and the harassment identification name “harassment contact” are set for the second designated contact, so that the caller number is the harassment address included in the second designated contact.
  • the mobile communication terminal displays the harassment identification avatar while displaying the harassment address and the harassment identification label, so as to provide a significant prompting function for the mobile communication terminal user.
  • the Insured Banking 1 call as shown in Figure 3 presents the harassment logo avatar, the contact harassment logo name "harassment contact", and the harassment address on the incoming call prompt page.
  • the harassment logo label "Insurance Banking 1".
  • the harassment tag identifier set for the harassment address may also be a picture or a text or the like.
  • the mobile communication terminal may perform the setting of the harassment identification tag on the harassment address added to the designated contact according to the harassment flag corresponding to each harassment address. For example, if the type of the harassment address is "sound", the mobile communication terminal can set a "sound" harassment identification tag for the harassment address. Therefore, corresponding to the above types, the harassment identification label set by the mobile communication terminal for each harassment address may be: “insurance management”, “real estate agency”, “advertising sales”, “fast delivery meal”, “harassing phone”, “ringing” One and “scam calls” and so on.
  • the harassment address of the interception type can be harassed without being harassed after being saved in the local address book. Settings.
  • Step 104 When there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the first designated contact, intercepting the And a communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
  • intercepting the communication access that is, the mobile communication terminal directly intercepts the communication access, and the communication access is not displayed on the display screen of the mobile communication terminal by means of communication accessing the page.
  • the mobile communication terminal presents the communication access on the display screen of the mobile communication terminal in a communication access interface in response to an operation that the user answers or views.
  • intercepting the communication access is specifically: intercepting the communication access according to the setting of the first designated contact.
  • Responding to the communication access specifically: allowing the communication mode to be responded according to the setting of the second designated contact.
  • the response to the communication access may be specifically:
  • the presenting the harassment identifier label may be specifically:
  • the harassment identification tag is presented on an incoming call prompt page, and a manipulation key responsive to the user hang up and turning on the incoming call.
  • the harassment logo avatar, the contact harassment identifier name “harassment contact”, the harassment identifier label “insurance management 1” of the harassment address, and the hang up and connection for the corresponding user are simultaneously presented on the call access prompt page.
  • the “Remind Me” control button and the “Information” control button are also displayed on the call access prompt page.
  • the technical solution provided in this embodiment saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address.
  • the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted; if the network address of the communication access initiator is in the harassment address database Harassing the address, and the network address is a communication mode in the second designated contact, and in response to the communication access, partial interception of the harassment address is implemented, so as to initiate harassment of some harassment behaviors that are not very bad in nature
  • the address can be intercepted, solves the problems existing in the prior art, and provides a better anti-harassment experience for the user.
  • the mobile communication terminal mentioned in the embodiments of the present invention may be a mobile communication terminal installed with a non-jail IOS operating system.
  • the first designated contact in the foregoing embodiment may be a newly created contact, or may be a contact existing in the local address book. That is, the method provided by the foregoing embodiment further includes:
  • a contact existing in the local address book and set to restrict communication access is designated as the first designated contact.
  • the first new contact can be set by the touch operation of the user or the automatic setting of the mobile communication terminal. After being set to restrict contacts for communication access, the The first contact is added to the blacklist. For the mobile communication system of the IOS system, the contact set to restrict communication access is the contact in the area 1 of FIG. 4 which is displayed as "unblock this caller number".
  • the second designated contact in the foregoing embodiment may be a newly created contact, or may be a contact existing in the local address book. That is, the method provided by the foregoing embodiment further includes:
  • a contact existing in the local address book and set to allow communication access is designated as the second designated contact.
  • the contact set to allow communication access is the contact whose area 1 in FIG. 5 is displayed as "block this caller number”.
  • the first designated contact in the above embodiment may be one or multiple.
  • the second designated contact may be one or more.
  • harassment addresses marked as “sound”, “harassing phone”, and “suspected scam” may all be added to this first designated contact; or harassment may be marked as "sound” according to the harassment tag
  • the harassment address is added to the first first designated contact, and the harassment address marked as "harassing call” by harassment is added to the second first designated contact, and the harassment address marked as "suspicious scam” by harassment Add to the third first specified contact.
  • harassment addresses marked as “Advertising”, “Property Agent”, “Insurance Banking” and “Fast Delivery Meal” can all be added to this second designated contact; harassment can also be harassed according to the harassment mark
  • Add the harassment address labeled "Advertising” to the first second designated contact add the harassment address marked as "Property Intermediary” to the second second designated contact, and mark the harassment as "insurance”
  • the harassment address of the "finance” is added to the third second designated contact; the harassment address marked as "fast delivery meal” by the harassment is added to the fourth second designated contact.
  • the user may not want to intercept for a period of time, after the time when the user does not need it, I hope to be able to intercept it. And for the "fast delivery meal” In terms of the address, it is better, and such harassment addresses should not be intercepted. If the harassment addresses marked as “Advertising”, “Property Agent”, “Insurance Banking” and “Fast Delivery Meal” are all added to this second designated contact, there is no way to "advertise”, " The harassment address such as the real estate agent or the "insurance management” is partially blocked. Therefore, the type of the harassment address in the above embodiment may be increased by one type, that is, the user-defined type. Specifically, the method provided by the foregoing embodiment, as shown in FIG. 6, further includes:
  • Step 105 Save the harassment address of the user-defined type in the harassment address library as the new communication mode of the third designated contact in the local address book, where the third designated contact is a user-defined contact.
  • the network address of the communication access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the third designated contact, according to the current third Specifies the user settings of the contact, intercepting or responding to the communication access.
  • step 104 of the foregoing embodiment when there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact And intercepting the communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication Access can be specifically as follows:
  • Step 104 ′ when there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact, the intercepting station The communication access; if the network address of the communication access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the second designated contact, responding to the communication access; The network address of the access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the third designated contact, and the interception is performed according to the current user setting of the third designated contact. Or responding to the communication access.
  • the third designated contact may be a newly created one, or may be a contact existing in the local address book, that is, the method provided by the foregoing embodiment further includes the following steps:
  • the third designated contact may intercept the setting according to the user's own needs or cancel the interception setting.
  • the type identification of at least one harassment address included in the harassment address database includes:
  • the harassment flag corresponding to each harassment address included in the harassment address library is obtained.
  • the type of each of the harassment addresses is identified according to the harassment flag corresponding to each of the harassment addresses.
  • the step of “identifying each type of the harassment address according to the harassment mark corresponding to each of the harassment addresses” may be implemented as follows:
  • the type of the harassment address is identified as an intercept type
  • the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
  • the interception type of the harassment address is identified as the release type.
  • the user also customizes some harassment addresses in the local address book during daily use.
  • Some user-defined tags have the harassment address set to "block this caller number", and some user-defined tags.
  • the harassment call was not set.
  • Two contacts can be created for the harassment address of such user-defined tags: the first one that can be blocked for user-defined tags, and the second one that can be customized and blocked for users.
  • the harassment address of the user-defined tag can be saved as the communication method in the corresponding contact according to the actual usage requirement.
  • some harassment addresses may disappear, some harassment addresses are newly appearing, or the mobile communication terminal replaces the use area, so the mobile communication terminal needs to constantly update the local address book.
  • the saved harassment address The mobile communication terminal may send an update request to the network side device periodically or irregularly, so that the network side device delivers the updated harassment address library.
  • the first designated contact, the second designation specified by the mobile communication terminal In order to not affect the harassment address of the user-defined tag during the process of harassing the address database update (such as replacing or deleting the harassment address of the user-defined tag), the first designated contact, the second designation specified by the mobile communication terminal The harassment address of the user-defined tag may not be added to the contact and the third designated contact.
  • User-defined tag harassment address can be added In other contacts than the first designated contact, the second designated contact, and the third designated contact.
  • FIG. 7 is a schematic structural diagram of a mobile communication terminal according to Embodiment 2 of the present invention. As shown in the figure, the mobile communication terminal provided in this embodiment includes:
  • the identification module 1 is configured to perform type identification on a plurality of harassment addresses included in the harassment address library;
  • the saving module 2 is configured to save the harassment address in the harassment address library as the new communication mode of the first designated contact in the local address book, and the first designated contact is set as a contact that restricts the communication access. And storing, in the local address book, a new communication mode in the harassment address library for the release type harassment address as the second designated contact, the second designated contact being set as a contact that allows communication access;
  • the processing module 3 is configured to: when there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the first designated contact, Intersecting the communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
  • the mobile communication terminal provided in the second embodiment can implement the method provided by the foregoing embodiment 1.
  • the specific implementation principle and implementation process refer to the corresponding content described in the foregoing embodiment 1. Narration.
  • the technical solution provided in this embodiment saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address.
  • the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted; if the network address of the communication access initiator is in the harassment address database Harassing the address, and the network address is a communication mode in the second designated contact, and in response to the communication access, partial interception of the harassment address is implemented, so as to initiate harassment of some harassment behaviors that are not very bad in nature
  • the address can be intercepted, solves the problems existing in the prior art, and provides a better anti-harassment experience for the user.
  • the mobile communication terminal provided in the second embodiment may further include:
  • a setting module configured to set a harassment identification label for the harassment address that has been saved in the communication mode of the second designated contact, and/or set a harassment identification label for the second designated contact;
  • processing module is specifically configured to:
  • processing module is specifically configured to:
  • the communication access is an incoming call and the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact
  • the mobile communication terminal provided in the second embodiment may further include:
  • a first creating module configured to create a first new contact in the local address book, set the first new contact to set a contact to restrict communication access, and set the first new contact As the first designated contact;
  • a first specifying module configured to specify, as the first designated contact, a contact that is already in the local address book and is set to restrict communication access.
  • the mobile communication terminal provided in the second embodiment may further include:
  • a second creating module configured to create a second new contact in the local address book, set the second new contact to be set as a contact that allows communication access, and use the second new contact as The second designated contact;
  • a second specifying module configured to specify, as the second designated contact, a contact that is already in the local address book and is set to allow communication access.
  • the saving module described in this embodiment is further used to harass the address library.
  • the new communication mode for the user-defined type of harassment address is saved in the local address book as the third designated contact, and the third designated contact is a user-defined contact.
  • the processing module is further configured to: if there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the third designated contact And intercepting or responding to the communication access according to the user setting of the currently specified third designated contact.
  • the mobile communication terminal provided in the second embodiment may further include:
  • a third creating module configured to create a third new contact in the local address book, and set the third new contact according to a setting event triggered by the user to set a contact to allow communication access or restrict communication access a contact, the third new contact as the third designated contact;
  • a third specifying module configured to specify an existing contact in the local address book as the third designated contact.
  • the identification module described in this embodiment may be implemented by the following structure. Specifically, the identification module includes:
  • An obtaining unit configured to obtain a harassment flag corresponding to each harassment address included in the harassment address library
  • the identification unit is configured to identify the type of each of the harassment addresses according to the harassment mark corresponding to each of the harassment addresses.
  • the harassment mark includes: “fast delivery meal”, “advertising promotion”, “real estate agency”, “insurance financing”, “sounding”, “harassing phone call” and “suspected fraudulent phone call”;
  • the identification unit is specifically configured to:
  • the type of the harassment address is identified as an intercept type
  • the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
  • the interception type of the harassment address is identified as the release type.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and so disclosed Any method or unit of any method or unit of the device is combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the mobile communication terminal provided in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • FIG. 8 shows a terminal device that can implement a disturbance communication interception by a mobile communication terminal according to the present invention.
  • the terminal device conventionally includes a processor 810 and a computer program product or computer readable medium in the form of a memory 820.
  • the memory 820 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 820 has a memory space 830 for program code 831 for performing any of the method steps described above.
  • storage space 830 for program code may include various program code 831 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 820 in the terminal device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 831' Code read by a processor, such as 810, that when executed by a terminal device causes the terminal device to perform various steps in the methods described above.

Abstract

The present invention relates to a method for intercepting harassment communications via a mobile communication terminal, and a mobile communication terminal. The method comprises: a mobile communication terminal performing type identification on a plurality of harassment addresses included in a harassment address base; saving a harassment address of an interception type in a local address book as a newly added communication mode of a first designated contact person; saving a harassment address of a release type in the local address book as a newly added communication mode of a second designated contact person; when there is communication access, if a network address of a communication access initiator is a harassment address in the harassment address base and the network address is a communication mode in the first designated contact person, intercepting the communication access; and if the network address of the communication access initiator is a harassment address in the harassment address base and the network address is a communication mode in the second designated contact person, responding to the communication access. The embodiments of the present invention achieve partial interception of the harassment addresses.

Description

移动通信终端进行骚扰通信拦截的方法及移动通信终端Method for mobile communication terminal to perform disturbance communication interception and mobile communication terminal 技术领域Technical field
本发明涉及一种计算机领域,特别是涉及一种移动通信终端进行骚扰通信拦截的方法及移动通信终端。The present invention relates to the field of computers, and in particular to a method for mobile communication terminal to perform interception communication interception and a mobile communication terminal.
背景技术Background technique
随着科技的不断发展,获取大批用户手机号码变得越来越容易。这些被获取到的电话号码被一些人员利用来进行骚扰、推销、诈骗等,致使人们在日常生活中经常被各种各样的骚扰电话所打扰。如何拦截这些骚扰电话已变的非常重要。With the continuous development of technology, it has become easier to obtain a large number of mobile phone numbers for users. These acquired phone numbers are used by some people to harass, sell, swindle, etc., causing people to be constantly disturbed by various harassing calls in their daily lives. How to intercept these harassing calls has become very important.
目前市面上出现了一些用于拦截骚扰电话的应用(App)。若用户设置了对骚扰电话进行拦截,则被App识别出来的骚扰电话就会全部被拦截。可对于“广告推销”、“房产中介”或“保险理财”等这类的骚扰电话来说,在有些时候,用户还是希望能够接听来电,或接收推送的短信或网络消息的。现有的这种全部拦截的方式就无法满足用户上述的需求了。There are some applications (Apps) on the market for intercepting harassing calls. If the user sets up to block the harassing call, the harassing calls identified by the App will be blocked. For harassing calls such as "advertising", "real estate agency" or "insurance management", in some cases, users still want to be able to answer calls or receive push messages or web messages. The existing all-intervention method can not meet the above needs of users.
发明内容Summary of the invention
鉴于上述问题,提出了本发明以便于提供一种克服上述问题或者至少部分地解决上述问题的移动通信终端进行骚扰通信拦截的方法及移动通信终端。In view of the above problems, the present invention has been made in order to provide a method and mobile communication terminal for performing a disturbance communication interception by a mobile communication terminal that overcomes the above problems or at least partially solves the above problems.
依据本发明的第一个方面,提供了一种移动通信终端进行骚扰通信拦截的方法,包括:According to a first aspect of the present invention, a method for a mobile communication terminal to perform a disturbance communication interception is provided, including:
移动通信终端对骚扰地址库中包含的多个骚扰地址进行类型识别;The mobile communication terminal performs type identification on a plurality of harassment addresses included in the harassment address library;
将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人; Saving the harassment address in the harassment address library as the interception type of the harassment address as the first designated contact in the local address book, the first designated contact being set as the contact restricting the communication access;
将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人;Saving a new communication method in the harassment address library for the release type harassment address as the second designated contact in the local address book, the second designated contact being set as a contact that allows communication access;
当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。When there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact, intercepting the communication access; And responding to the communication access if the network address of the communication access initiator is a harassment address in the harassment address library and the network address is a communication mode in the second designated contact.
依据本发明的第二个方面,提供了一种移动通信终端,包括:According to a second aspect of the present invention, a mobile communication terminal is provided, comprising:
识别模块,用于对骚扰地址库中包含的多个骚扰地址进行类型识别;An identification module, configured to perform type identification on multiple harassment addresses included in the harassment address library;
保存模块,用于将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人;将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人;a saving module, configured to save the harassment address in the harassment address library as the new communication mode of the first designated contact in the local address book, where the first designated contact is set as a contact that restricts communication access; Saving a new communication method in the harassment address library for the release type harassment address as the second designated contact in the local address book, the second designated contact being set as a contact that allows communication access;
处理模块,用于当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。a processing module, configured to: when there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the first designated contact, intercepting The communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在终端设备上运行时,导致所述终端设备执行上述的任一个移动通信终端进行骚扰通信拦截的方法。According to still another aspect of the present invention, a computer program is provided, comprising computer readable code, when the computer readable code is run on a terminal device, causing the terminal device to perform any of the mobile communication terminals described above The method of harassing communication interception.
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了执行上述的任一个移动通信终端进行骚扰通信拦截的方法的计算机程序。According to still another aspect of the present invention, a computer readable medium storing a computer program for performing a method of performing a disturbance communication interception by any of the above mobile communication terminals is provided.
借由上述技术方案,本发明实施例提供的技术方案至少具有下列优点:With the above technical solution, the technical solution provided by the embodiment of the present invention has at least the following advantages:
本发明实施例提供的技术方案根据骚扰地址的类型,将各骚扰地址作为不同指定联系人的新增通信方式保存在本地通讯录中,当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通 信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问,实现了对骚扰地址的部分拦截,这样对于发起一些性质不是很恶劣的骚扰行为的骚扰地址可不进行拦截,解决了现有技术中存在的问题,为用户提供了更好的防骚扰体验。The technical solution provided by the embodiment of the present invention saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address. When there is communication access, if the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted; The network address of the letter access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the second designated contact, and the part of the harassment address is implemented in response to the communication access Interception, so that the harassment address of some harassment behaviors that are not very bad can be intercepted, solve the problems existing in the prior art, and provide users with a better anti-harassment experience.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,并可依照说明书的内容予以实施,以下以本发明的较佳实施例并配合附图详细说明如后。The above description is only an overview of the technical solutions of the present invention, and the technical means of the present invention can be more clearly understood and can be implemented in accordance with the contents of the specification. Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法的第一种实现的流程示意图;1 is a schematic flowchart of a first implementation of a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention;
图2示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法中各所述骚扰地址及指定联系人设置的骚扰标识标签的示例图;FIG. 2 is a diagram showing an example of the harassment address and the harassment identifier label set by the designated contact in the method for performing the harassment communication interception by the mobile communication terminal according to the first embodiment of the present invention;
图3示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法中当通信访问为来电访问时来电访问提示页面的示例图;FIG. 3 is a diagram showing an example of an incoming call prompt page when a communication access is an incoming call in a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention; FIG.
图4示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法中已进行拦截设置的联系人的实例图;4 is a diagram showing an example of a contact that has been intercepted in a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention;
图5示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法中未进行拦截设置的联系人的实例图;FIG. 5 is a diagram showing an example of a contact that is not intercepted in a method for performing a harassment communication interception by a mobile communication terminal according to Embodiment 1 of the present invention;
图6示出了本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法的第二种实现的流程示意图;FIG. 6 is a schematic flowchart diagram showing a second implementation of a method for performing interference communication interception by a mobile communication terminal according to Embodiment 1 of the present invention;
图7示出了本发明实施例二提供的移动通信终端的结构示意图;FIG. 7 is a schematic structural diagram of a mobile communication terminal according to Embodiment 2 of the present invention;
图8示出了用于执行根据本发明的方法的终端设备的框图;Figure 8 shows a block diagram of a terminal device for performing the method according to the invention;
图9示出了用于保持或者携带实现根据本发明的方法的程序代码的存储单元。 Figure 9 shows a storage unit for holding or carrying program code implementing the method according to the invention.
具体实施方式detailed description
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described in conjunction with the drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
如图1所示,本发明实施例一提供的移动通信终端进行骚扰通信拦截的方法的流程示意图。本实施例提供的所述方法的执行主体可以是移动通信终端。具体的,所述方法包括:As shown in FIG. 1, a schematic flowchart of a method for performing a communication communication interception by a mobile communication terminal according to Embodiment 1 of the present invention is shown. The execution body of the method provided by this embodiment may be a mobile communication terminal. Specifically, the method includes:
步骤101、移动通信终端对骚扰地址库中包含的多个骚扰地址进行类型识别。Step 101: The mobile communication terminal performs type identification on the plurality of harassment addresses included in the harassment address database.
其中,所述骚扰地址库可以从网络侧设备中获得。该网络侧设备可以是云端设备。即移动通信终端可通过有线或无线网络从网络侧设备下载所述骚扰地址库。例如,移动通信终端可通过2G、3G和4G网络从网络侧设备下载所述骚扰地址库;也可通过Wi-Fi等局域网络接入方式接入互联网中以实现从网络侧设备下载所述骚扰地址;还可以通过有线的方式接入互联网络实现从网络侧设备下载所述骚扰地址。当然,移动通信终端通过与计算设备进行数据同步的方式获取已下载在计算设备中的所述骚扰地址库的方式也是可行的,其中,所述计算设备是先通过网络从网络侧设备下载所述骚扰地址库的。The harassment address library can be obtained from a network side device. The network side device may be a cloud device. That is, the mobile communication terminal can download the harassment address library from the network side device through a wired or wireless network. For example, the mobile communication terminal can download the harassment address library from the network side device through the 2G, 3G, and 4G networks; or access the Internet through a local area network access method such as Wi-Fi to download the harassment from the network side device. The address; the harassment address can also be downloaded from the network side device by accessing the internet through a wired manner. Of course, it is also feasible for the mobile communication terminal to acquire the harassment address library that has been downloaded in the computing device by performing data synchronization with the computing device, wherein the computing device first downloads the network device from the network side device through the network. Harassing the address library.
在本实施例中,移动通信终端可采用如下方法从所述网络侧设备下载所述骚扰地址库,该方法包括:In this embodiment, the mobile communication terminal may download the harassment address library from the network side device by using the following method, the method includes:
首先,移动通信终端可通过客户端界面向网络侧设备发送下载请求。First, the mobile communication terminal can send a download request to the network side device through the client interface.
其中,该下载请求中携带有移动通信终端的标识。The download request carries the identifier of the mobile communication terminal.
然后,所述网络侧设备可根据所述下载请求,将骚扰地址库发送至移动通信终端。Then, the network side device may send the harassment address library to the mobile communication terminal according to the download request.
这里需要补充的是:上述的下载请求中还可包含有移动通信终端的位置信息,以便所述网络侧设备根据所述位置信息,确定移动通信终端所属的地域,并为其下发所述地域对应的骚扰地址库。It is to be noted that the above-mentioned download request may further include the location information of the mobile communication terminal, so that the network side device determines the region to which the mobile communication terminal belongs according to the location information, and issues the region for the mobile communication terminal. Corresponding harassment address library.
在实际应用中,骚扰地址库中除包含有骚扰地址外,还可包含有各骚 扰地址对应的骚扰标记。骚扰标记可包括:“保险理财”、“房产中介”、“广告推销”、“快递送餐”、“骚扰电话”、“响一声”和“诈骗电话”等等。因此,本步骤可采用如下方法实现:In practical applications, the harassment address library can contain harassment addresses in addition to harassment addresses. Disturbance tag corresponding to the address. The harassment mark may include: "insurance management", "real estate agency", "advertising sales", "fast delivery meal", "harassment call", "sound" and "scam phone" and the like. Therefore, this step can be implemented as follows:
首先、获取所述骚扰地址库中包含各骚扰地址对应的骚扰标记。First, the harassment flag corresponding to each harassment address is obtained in the harassment address database.
然后,根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型。Then, the type of each of the harassment addresses is identified according to the harassment flag corresponding to each of the harassment addresses.
例如,当所述骚扰地址的骚扰标记为“响一声”、“骚扰电话”或“疑似诈骗电话”时,所述骚扰地址的类型可以为拦截类型;For example, when the harassment of the harassment address is marked as "sound", "harassing call" or "suspected scam", the type of the harassment address may be an intercept type;
当所述骚扰地址的骚扰标记为“快递送餐”、“广告推销”、“房产中介”或“保险理财”时,所述骚扰地址的拦截类型可以为放行类型。When the harassment of the harassment address is marked as "fast delivery meal", "advertising promotion", "real estate agency" or "insurance financing", the interception type of the harassment address may be a release type.
步骤102、将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人。Step 102: Save the harassment address in the harassment address library as the interception type of the harassment address as the new communication mode of the first designated contact in the local address book, where the first designated contact is set as the contact that restricts the communication access.
步骤103、将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人。Step 103: Save the new communication mode in the harassment address library as the release type harassment address as the second designated contact in the local address book, and the second designated contact is set as a contact that allows communication access.
这里需要补充的是:对于放行类型的骚扰地址,当该骚扰地址发起通信访问时,为了能在通信访问页面上展现骚扰提醒信息,以起到提醒用户的作用,在将所述骚扰地址保存在所述本地通讯录中之后,本实施例提供的所述方法还可包括以下步骤:What needs to be added here is that, for the harassment address of the release type, when the harassment address initiates a communication access, in order to display the harassment reminding information on the communication access page, to remind the user, the harassment address is saved in the After the local address book, the method provided in this embodiment may further include the following steps:
为已保存在所述第二指定联系人的通信方式中的所述骚扰地址设置骚扰标识标签和/或为所述第二指定联系人设置骚扰标识标签。Setting a harassment identification tag for the harassment address that has been saved in the communication mode of the second designated contact and/or setting a harassment identification tag for the second designated contact.
其中,为所述第二指定联系人设置的骚扰标识标签可以是图片或文字等。例如,为所述第二指定联系人设置的骚扰标识标签可以是骚扰标识头像和/或骚扰标识名称。图2所示,为所述第二指定联系人设置如图2所示的骚扰标识头像,以及骚扰标识名称“骚扰联系人”,这样只要来电号码是该第二指定联系人中包含的骚扰地址,移动通信终端在显示骚扰地址和骚扰标识标签的同时,还显示骚扰标识头像,以为移动通信终端使用者提供显著的提示作用。假设保险理财1来电,如图3所示,在来电访问提示页面上同时呈现骚扰标识头像、联系人骚扰标识名称“骚扰联系人”以及骚扰地址 的骚扰标识标签“保险理财1”。The harassment identifier label set for the second designated contact may be a picture or a text or the like. For example, the harassment identification tag set for the second designated contact may be a harassment identification avatar and/or a harassment identification name. As shown in FIG. 2, the harassment identification avatar shown in FIG. 2 and the harassment identification name “harassment contact” are set for the second designated contact, so that the caller number is the harassment address included in the second designated contact. The mobile communication terminal displays the harassment identification avatar while displaying the harassment address and the harassment identification label, so as to provide a significant prompting function for the mobile communication terminal user. Assume that the Insured Banking 1 call, as shown in Figure 3, presents the harassment logo avatar, the contact harassment logo name "harassment contact", and the harassment address on the incoming call prompt page. The harassment logo label "Insurance Banking 1".
同样的,为所述骚扰地址设置的骚扰标签标识也可以是图片或文字等。移动通信终端可根据各骚扰地址对应的骚扰标记对添加到指定联系人中的骚扰地址进行骚扰标识标签的设置。例如,骚扰地址的类型为“响一声”,则移动通信终端可为该骚扰地址设置“响一声”的骚扰标识标签。因此,对应上述各类型,移动通信终端为各骚扰地址设置的骚扰标识标签可以是:“保险理财”、“房产中介”、“广告推销”、“快递送餐”、“骚扰电话”、“响一声”和“诈骗电话”等等。Similarly, the harassment tag identifier set for the harassment address may also be a picture or a text or the like. The mobile communication terminal may perform the setting of the harassment identification tag on the harassment address added to the designated contact according to the harassment flag corresponding to each harassment address. For example, if the type of the harassment address is "sound", the mobile communication terminal can set a "sound" harassment identification tag for the harassment address. Therefore, corresponding to the above types, the harassment identification label set by the mobile communication terminal for each harassment address may be: “insurance management”, “real estate agency”, “advertising sales”, “fast delivery meal”, “harassing phone”, “ringing” One and "scam calls" and so on.
这里需要说明的是:对于拦截类型的骚扰地址,因为其发起的通信访问被移动通信终端所拦截了,因此在拦截类型的骚扰地址保存到本地通讯录中后可以不用对其进行骚扰标识标签的设置。当然,对拦截类型的骚扰地址进行骚扰标识标签的设置,对第一指定联系人进行骚扰标识标签的设置也是可以的。It should be noted here that for the interception type of the harassment address, since the communication access initiated by the interception type is intercepted by the mobile communication terminal, the harassment address of the interception type can be harassed without being harassed after being saved in the local address book. Settings. Of course, it is also possible to set the harassment identification tag for the interception type of the harassment address, and to set the harassment identification tag for the first designated contact.
步骤104、当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。Step 104: When there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the first designated contact, intercepting the And a communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
具体的,拦截所述通信访问即移动通信终端直接将通信访问拦截,通信访问是不会以通信访问页面的方式展现在移动通信终端显示屏上的。响应所述通信访问即移动通信终端以通信访问界面将通信访问展现在移动通信终端显示屏上的,以响应用户接听或查看的操作。实质上,拦截所述通信访问,具体为:根据对所述第一指定联系人的设置拦截所述通信访问。响应所述通信访问,具体为:根据对所述第二指定联系人的设置允许响应所述通信方式。Specifically, intercepting the communication access, that is, the mobile communication terminal directly intercepts the communication access, and the communication access is not displayed on the display screen of the mobile communication terminal by means of communication accessing the page. In response to the communication access, the mobile communication terminal presents the communication access on the display screen of the mobile communication terminal in a communication access interface in response to an operation that the user answers or views. In essence, intercepting the communication access is specifically: intercepting the communication access according to the setting of the first designated contact. Responding to the communication access, specifically: allowing the communication mode to be responded according to the setting of the second designated contact.
当保存在通讯录中的骚扰地址设置有骚扰标识标签,和/或所述包含有骚扰地址的指定联系人设有骚扰标识标签时,所述响应所述通信访问,可具体为:When the harassment address stored in the address book is set with the harassment identification label, and/or the specified contact including the harassment address is provided with the harassment identification label, the response to the communication access may be specifically:
从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并呈现所述骚扰标识标签。 Acquiring the harassment identifier label corresponding to the network address and/or the harassment identifier label of the second designated contact from the local address book, and presenting the harassment identifier label.
当所述通信访问为来电访问时,所述呈现所述骚扰标识标签,可具体为:When the communication access is an incoming call, the presenting the harassment identifier label may be specifically:
在来电访问提示页面上呈现所述骚扰标识标签,以及用于响应用户挂断和接通所述来电访问的操控键。The harassment identification tag is presented on an incoming call prompt page, and a manipulation key responsive to the user hang up and turning on the incoming call.
如图3所示,在来电访问提示页面上同时呈现骚扰标识头像、联系人骚扰标识名称“骚扰联系人”,骚扰地址的骚扰标识标签“保险理财1”;以及用于相应用户挂断和接通所述来电访问的操控键,“拒绝”操控键和“接听”操控键。当然,在来电访问提示页面上还呈现有“提醒我”操控键和“信息”操控键。As shown in FIG. 3, the harassment logo avatar, the contact harassment identifier name “harassment contact”, the harassment identifier label “insurance management 1” of the harassment address, and the hang up and connection for the corresponding user are simultaneously presented on the call access prompt page. The control button for the incoming call access, the "reject" control button and the "answer" control button. Of course, the “Remind Me” control button and the “Information” control button are also displayed on the call access prompt page.
本实施例提供的技术方案根据骚扰地址的类型,将各骚扰地址作为不同指定联系人的新增通信方式保存在本地通讯录中,当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问,实现了对骚扰地址的部分拦截,这样对于发起一些性质不是很恶劣的骚扰行为的骚扰地址可不进行拦截,解决了现有技术中存在的问题,为用户提供了更好的防骚扰体验。The technical solution provided in this embodiment saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address. When there is communication access, if the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted; if the network address of the communication access initiator is in the harassment address database Harassing the address, and the network address is a communication mode in the second designated contact, and in response to the communication access, partial interception of the harassment address is implemented, so as to initiate harassment of some harassment behaviors that are not very bad in nature The address can be intercepted, solves the problems existing in the prior art, and provides a better anti-harassment experience for the user.
这里需要补充的是:本发明各实施例提到的所述移动通信终端可以是安装有未越狱IOS操作系统的移动通信终端。It should be added here that the mobile communication terminal mentioned in the embodiments of the present invention may be a mobile communication terminal installed with a non-jail IOS operating system.
进一步的,上述实施例中所述的第一指定联系人可以是新建的联系人,也可以是本地通讯录中已有的联系人。即上述实施例提供的所述方法,还包括:Further, the first designated contact in the foregoing embodiment may be a newly created contact, or may be a contact existing in the local address book. That is, the method provided by the foregoing embodiment further includes:
在所述本地通讯录中创建第一新联系人,对所述第一新联系人进行设置以设置为限制通信访问的联系人,并将所述第一新联系人作为所述第一指定联系人;或者Creating a first new contact in the local address book, setting the first new contact to set a contact that restricts communication access, and contacting the first new contact as the first designated contact Person; or
指定所述本地通讯录中已有的且设置为限制通信访问的联系人作为所述第一指定联系人。A contact existing in the local address book and set to restrict communication access is designated as the first designated contact.
其中,可通过用户的触控操作或移动通信终端的自动设置,即可实现对所述第一新联系人进行设置。被设置为限制通信访问的联系人后,所述 第一联系人即被加入到黑名单中。对于IOS系统的移动通信系统来说,被设置为限制通信访问的联系人就是图4中的区域1显示为“取消阻止此来电号码”的联系人。The first new contact can be set by the touch operation of the user or the automatic setting of the mobile communication terminal. After being set to restrict contacts for communication access, the The first contact is added to the blacklist. For the mobile communication system of the IOS system, the contact set to restrict communication access is the contact in the area 1 of FIG. 4 which is displayed as "unblock this caller number".
同样的,上述实施例中所述第二指定联系人可以是新建的联系人,也可以是本地通讯录中已有的联系人。即上述实施例提供的所述方法,还包括:Similarly, the second designated contact in the foregoing embodiment may be a newly created contact, or may be a contact existing in the local address book. That is, the method provided by the foregoing embodiment further includes:
在所述本地通讯录中创建第二新联系人,对所述第二新联系人进行设置以设置为允许通信访问的联系人,将所述第二新联系人作为所述第二指定联系人;或者Creating a second new contact in the local address book, setting the second new contact to be set as a contact allowing communication access, and using the second new contact as the second designated contact ;or
指定所述本地通讯录中已有的且设置为允许通信访问的联系人作为所述第二指定联系人。A contact existing in the local address book and set to allow communication access is designated as the second designated contact.
其中,对于IOS系统的移动通信系统来说,设置为允许通信访问的联系人是图5中的区域1显示为“阻止此来电号码”的联系人。Among them, for the mobile communication system of the IOS system, the contact set to allow communication access is the contact whose area 1 in FIG. 5 is displayed as "block this caller number".
这里需要补充的是:上述实施例中所述第一指定联系人可以是一个,也可以是多个。同样的,所述第二指定联系人可以是一个,也可以是多个。例如,骚扰标记为“响一声”、“骚扰电话”和“疑似诈骗电话”的骚扰地址可以全部添加到这一个第一指定联系人中;也可以按照骚扰标记,将骚扰标记为“响一声”的骚扰地址添加到第一个第一指定联系人中,将骚扰标记为“骚扰电话”的骚扰地址添加到第二个第一指定联系人中,将骚扰标记为“疑似诈骗电话”的骚扰地址添加到第三个第一指定联系人中。同样的,骚扰标记为“广告推销”、“房产中介”、“保险理财”和“快递送餐”的骚扰地址可以全部添加到这一个第二指定联系人中;也可以按照骚扰标记,将骚扰标记为“广告推销”的骚扰地址添加到第一个第二指定联系人中,将骚扰标记为“房产中介”的骚扰地址添加到第二个第二指定联系人中,将骚扰标记为“保险理财”的骚扰地址添加到第三个第二指定联系人中;将骚扰标记为“快递送餐”的骚扰地址添加到第四个第二指定联系人中。It should be added here that the first designated contact in the above embodiment may be one or multiple. Similarly, the second designated contact may be one or more. For example, harassment addresses marked as "sound", "harassing phone", and "suspected scam" may all be added to this first designated contact; or harassment may be marked as "sound" according to the harassment tag The harassment address is added to the first first designated contact, and the harassment address marked as "harassing call" by harassment is added to the second first designated contact, and the harassment address marked as "suspicious scam" by harassment Add to the third first specified contact. Similarly, harassment addresses marked as "Advertising", "Property Agent", "Insurance Banking" and "Fast Delivery Meal" can all be added to this second designated contact; harassment can also be harassed according to the harassment mark Add the harassment address labeled "Advertising" to the first second designated contact, add the harassment address marked as "Property Intermediary" to the second second designated contact, and mark the harassment as "insurance" The harassment address of the "finance" is added to the third second designated contact; the harassment address marked as "fast delivery meal" by the harassment is added to the fourth second designated contact.
进一步的,对于“广告推销”、“房产中介”或“保险理财”等这类的骚扰地址来说,用户可能只是在一段时间内不想拦截,过了这段时间在用户不需要的时候,就希望能够对其进行拦截。而对于“快递送餐”这类骚 扰地址来说,它是较为优质的,这类骚扰地址就不该被拦截。若将骚扰标记为“广告推销”、“房产中介”、“保险理财”和“快递送餐”的骚扰地址全部添加到这一个第二指定联系人中,就没有办法对“广告推销”、“房产中介”或“保险理财”等这类的骚扰地址进行部分拦截了,因此,上述实施例中的骚扰地址的类型还可增加一种类型,即用户自定义类型。具体的,上述实施例提供的所述方法,如图6所示,还包括:Further, for harassment addresses such as "advertising sales", "real estate agency" or "insurance management", the user may not want to intercept for a period of time, after the time when the user does not need it, I hope to be able to intercept it. And for the "fast delivery meal" In terms of the address, it is better, and such harassment addresses should not be intercepted. If the harassment addresses marked as "Advertising", "Property Agent", "Insurance Banking" and "Fast Delivery Meal" are all added to this second designated contact, there is no way to "advertise", " The harassment address such as the real estate agent or the "insurance management" is partially blocked. Therefore, the type of the harassment address in the above embodiment may be increased by one type, that is, the user-defined type. Specifically, the method provided by the foregoing embodiment, as shown in FIG. 6, further includes:
步骤105、将骚扰地址库中为用户自定义类型的骚扰地址作为第三指定联系人的新增通信方式保存在所述本地通讯录中,所述第三指定联系人为用户自定义设置的联系人。Step 105: Save the harassment address of the user-defined type in the harassment address library as the new communication mode of the third designated contact in the local address book, where the third designated contact is a user-defined contact. .
当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第三指定联系人中的通信方式,则根据当前所述第三指定联系人的用户设置,拦截或响应所述通信访问。When there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the third designated contact, according to the current third Specifies the user settings of the contact, intercepting or responding to the communication access.
即上述实施例中步骤104、当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问,可具体为:That is, in step 104 of the foregoing embodiment, when there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact And intercepting the communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication Access can be specifically as follows:
步骤104’、当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第三指定联系人中的通信方式,则根据当前所述第三指定联系人的用户设置,拦截或响应所述通信访问。Step 104 ′, when there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact, the intercepting station The communication access; if the network address of the communication access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the second designated contact, responding to the communication access; The network address of the access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the third designated contact, and the interception is performed according to the current user setting of the third designated contact. Or responding to the communication access.
其中,所述第三指定联系人可以是新创建的,也可以是本地通讯录中已有的联系人,即上述实施例提供的所述方法还包括如下步骤:The third designated contact may be a newly created one, or may be a contact existing in the local address book, that is, the method provided by the foregoing embodiment further includes the following steps:
在所述本地通讯录中创建第三新联系人,根据用户触发的设置事件对所述第三新联系人进行设置以设置为允许通信访问的联系人或限制通信访问的联系人,将所述第三新联系人作为所述第三指定联系人;或者Creating a third new contact in the local address book, and setting the third new contact according to a setting event triggered by the user to set a contact that allows communication access or a contact that restricts communication access, a third new contact as the third designated contact; or
指定所述本地通讯录中已有联系人作为所述第三指定联系人。 Specifying an existing contact in the local address book as the third designated contact.
所述第三指定联系人可根据用户自己的需要随时对其进行拦截设置,或取消拦截设置。The third designated contact may intercept the setting according to the user's own needs or cancel the interception setting.
上述实施例一中提到的:步骤101、对骚扰地址库中包含的至少一个骚扰地址进行类型识别,包括:As mentioned in the foregoing first embodiment, in step 101, the type identification of at least one harassment address included in the harassment address database includes:
首先,获取所述骚扰地址库中包含的各骚扰地址对应的骚扰标记。First, the harassment flag corresponding to each harassment address included in the harassment address library is obtained.
然后,根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型。Then, the type of each of the harassment addresses is identified according to the harassment flag corresponding to each of the harassment addresses.
其中,步骤“根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型”,可采用如下方式实现:The step of “identifying each type of the harassment address according to the harassment mark corresponding to each of the harassment addresses” may be implemented as follows:
若所述骚扰地址的骚扰标记为“响一声”、“骚扰电话”或“疑似诈骗电话”,则识别出所述骚扰地址的类型为拦截类型;If the harassment address of the harassment address is marked as "sound", "harassing call" or "suspicious scam", the type of the harassment address is identified as an intercept type;
若所述骚扰地址的骚扰标记为“广告推销”、“房产中介”或“保险理财”,则识别出所述骚扰地址的类型为用户自定义类型;If the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
若所述骚扰地址的骚扰标记为“快递送餐”,则识别出所述骚扰地址的拦截类型为放行类型。If the harassment of the harassment address is marked as "fast delivery meal", then the interception type of the harassment address is identified as the release type.
在实际应用中,用户也会在日常使用过程中自定义的在本地通讯录中标记出一些骚扰地址,有些用户自定义标记的骚扰地址被设置为“阻止此来电号码”,有些用户自定义标记的骚扰电话没有被设置。对于这类用户自定义标记的骚扰地址可创建两个联系人:第一个可以为用户自定义标记不拦截的联系人,第二个可以为用户自定义标记并拦截的联系人。将用户自定义标记的骚扰地址可根据实际的使用需求,分别作为对应联系人中的通信方式进行保存。In practical applications, the user also customizes some harassment addresses in the local address book during daily use. Some user-defined tags have the harassment address set to "block this caller number", and some user-defined tags. The harassment call was not set. Two contacts can be created for the harassment address of such user-defined tags: the first one that can be blocked for user-defined tags, and the second one that can be customized and blocked for users. The harassment address of the user-defined tag can be saved as the communication method in the corresponding contact according to the actual usage requirement.
这里还需要说明的是:在实际应用中,有些骚扰地址可能就消失了,有些骚扰地址是新出现的,或者,移动通信终端更换的使用地域,因此移动通信终端需不断的更新本地通讯录中保存的骚扰地址。移动通信终端可定期或不定期向网络侧设备发送更新请求,以使所述网络侧设备下发更新后的骚扰地址库。为了在骚扰地址库更新的过程中,不对用户自定义标记的骚扰地址造成影响(如替换或删除用户自定义标记的骚扰地址),移动通信终端指定的所述第一指定联系人、第二指定联系人和第三指定联系人中可不添加用户自定义标记的骚扰地址。用户自定义标记的骚扰地址可添加 在除第一指定联系人、第二指定联系人和第三指定联系人之外的其他联系人中。It should also be noted here that in actual applications, some harassment addresses may disappear, some harassment addresses are newly appearing, or the mobile communication terminal replaces the use area, so the mobile communication terminal needs to constantly update the local address book. The saved harassment address. The mobile communication terminal may send an update request to the network side device periodically or irregularly, so that the network side device delivers the updated harassment address library. In order to not affect the harassment address of the user-defined tag during the process of harassing the address database update (such as replacing or deleting the harassment address of the user-defined tag), the first designated contact, the second designation specified by the mobile communication terminal The harassment address of the user-defined tag may not be added to the contact and the third designated contact. User-defined tag harassment address can be added In other contacts than the first designated contact, the second designated contact, and the third designated contact.
需要说明的是:对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence. Because certain steps may be performed in other sequences or concurrently in accordance with the present invention. In addition, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.
如图7所示,本发明实施例二提供的移动通信终端的结构示意图。如图所示,本实施例提供的所述移动通信终端包括:FIG. 7 is a schematic structural diagram of a mobile communication terminal according to Embodiment 2 of the present invention. As shown in the figure, the mobile communication terminal provided in this embodiment includes:
识别模块1,用于对骚扰地址库中包含的多个骚扰地址进行类型识别;The identification module 1 is configured to perform type identification on a plurality of harassment addresses included in the harassment address library;
保存模块2,用于将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人;将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人;The saving module 2 is configured to save the harassment address in the harassment address library as the new communication mode of the first designated contact in the local address book, and the first designated contact is set as a contact that restricts the communication access. And storing, in the local address book, a new communication mode in the harassment address library for the release type harassment address as the second designated contact, the second designated contact being set as a contact that allows communication access;
处理模块3,用于当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。The processing module 3 is configured to: when there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the first designated contact, Intersecting the communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
这里需要说明的是:本实施例二提供的移动通信终端可实现上述实施例一提供的所述方法,具体的实现原理和实现过程可参见上述实施例一中描述的相应内容,此处不再赘述。It should be noted that the mobile communication terminal provided in the second embodiment can implement the method provided by the foregoing embodiment 1. For the specific implementation principle and implementation process, refer to the corresponding content described in the foregoing embodiment 1. Narration.
本实施例提供的技术方案根据骚扰地址的类型,将各骚扰地址作为不同指定联系人的新增通信方式保存在本地通讯录中,当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问,实现了对骚扰地址的部分拦截,这样对于发起一些性质不是很恶劣的骚扰行为的骚扰 地址可不进行拦截,解决了现有技术中存在的问题,为用户提供了更好的防骚扰体验。The technical solution provided in this embodiment saves each harassment address as a new communication mode of different designated contacts in the local address book according to the type of the harassment address. When there is communication access, if the network address of the communication access initiator is The harassment address in the address library is harassed, and the network address is a communication mode in the first designated contact, and the communication access is intercepted; if the network address of the communication access initiator is in the harassment address database Harassing the address, and the network address is a communication mode in the second designated contact, and in response to the communication access, partial interception of the harassment address is implemented, so as to initiate harassment of some harassment behaviors that are not very bad in nature The address can be intercepted, solves the problems existing in the prior art, and provides a better anti-harassment experience for the user.
进一步的,本实施例二提供的移动通信终端还可包括:Further, the mobile communication terminal provided in the second embodiment may further include:
设置模块,用于为已保存在所述第二指定联系人的通信方式中的所述骚扰地址设置骚扰标识标签和/或为所述第二指定联系人设置骚扰标识标签;a setting module, configured to set a harassment identification label for the harassment address that has been saved in the communication mode of the second designated contact, and/or set a harassment identification label for the second designated contact;
相应的,所述处理模块,具体用于:Correspondingly, the processing module is specifically configured to:
当通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式时,从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并呈现所述骚扰标识标签。Obtaining the network address from the local address book when a network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact Corresponding harassment identification tag and/or harassment identification tag of the second designated contact, and presenting the harassment identification tag.
进一步地,所述处理模块,具体用于:Further, the processing module is specifically configured to:
当所述通信访问为来电访问,且通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式时,从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并在来电访问提示页面上呈现所述骚扰标识标签,以及用于响应用户挂断和接通所述来电访问的操控键。When the communication access is an incoming call and the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, Obtaining, in the local address book, the harassment identifier label corresponding to the network address and/or the harassment identifier label of the second designated contact, and presenting the harassment identifier label on the call arrival prompt page, and responsive to the user hang up And the control button for turning on the incoming call.
进一步的,本实施例二提供的移动通信终端还可包括:Further, the mobile communication terminal provided in the second embodiment may further include:
第一创建模块,用于在所述本地通讯录中创建第一新联系人,对所述第一新联系人进行设置以设置为限制通信访问的联系人,并将所述第一新联系人作为所述第一指定联系人;或者a first creating module, configured to create a first new contact in the local address book, set the first new contact to set a contact to restrict communication access, and set the first new contact As the first designated contact; or
第一指定模块,用于指定所述本地通讯录中已有的且设置为限制通信访问的联系人作为所述第一指定联系人。And a first specifying module, configured to specify, as the first designated contact, a contact that is already in the local address book and is set to restrict communication access.
进一步的,本实施例二提供的移动通信终端还可包括:Further, the mobile communication terminal provided in the second embodiment may further include:
第二创建模块,用于在所述本地通讯录中创建第二新联系人,对所述第二新联系人进行设置以设置为允许通信访问的联系人,将所述第二新联系人作为所述第二指定联系人;或者a second creating module, configured to create a second new contact in the local address book, set the second new contact to be set as a contact that allows communication access, and use the second new contact as The second designated contact; or
第二指定模块,用于指定所述本地通讯录中已有的且设置为允许通信访问的联系人作为所述第二指定联系人。And a second specifying module, configured to specify, as the second designated contact, a contact that is already in the local address book and is set to allow communication access.
进一步的,本实施例中所述的所述保存模块,还用于将骚扰地址库中 为用户自定义类型的骚扰地址作为第三指定联系人的新增通信方式保存在所述本地通讯录中,所述第三指定联系人为用户自定义设置的联系人。Further, the saving module described in this embodiment is further used to harass the address library. The new communication mode for the user-defined type of harassment address is saved in the local address book as the third designated contact, and the third designated contact is a user-defined contact.
所述处理模块,还用于当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第三指定联系人中的通信方式,则根据当前所述第三指定联系人的用户设置,拦截或响应所述通信访问。The processing module is further configured to: if there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the third designated contact And intercepting or responding to the communication access according to the user setting of the currently specified third designated contact.
进一步的,本实施例二提供的移动通信终端还可包括:Further, the mobile communication terminal provided in the second embodiment may further include:
第三创建模块,用于在所述本地通讯录中创建第三新联系人,根据用户触发的设置事件对所述第三新联系人进行设置以设置为允许通信访问的联系人或限制通信访问的联系人,将所述第三新联系人作为所述第三指定联系人;或者a third creating module, configured to create a third new contact in the local address book, and set the third new contact according to a setting event triggered by the user to set a contact to allow communication access or restrict communication access a contact, the third new contact as the third designated contact; or
第三指定模块,用于指定所述本地通讯录中已有联系人作为所述第三指定联系人。And a third specifying module, configured to specify an existing contact in the local address book as the third designated contact.
进一步的,本实施例中所述的识别模块可采用如下结构实现。具体的,所述识别模块,包括:Further, the identification module described in this embodiment may be implemented by the following structure. Specifically, the identification module includes:
获取单元,用于获取所述骚扰地址库中包含的各骚扰地址对应的骚扰标记;An obtaining unit, configured to obtain a harassment flag corresponding to each harassment address included in the harassment address library;
识别单元,用于根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型。The identification unit is configured to identify the type of each of the harassment addresses according to the harassment mark corresponding to each of the harassment addresses.
进一步的,所述骚扰标记包括:“快递送餐”、“广告推销”、“房产中介”、“保险理财”、“响一声”、“骚扰电话”及“疑似诈骗电话”;Further, the harassment mark includes: “fast delivery meal”, “advertising promotion”, “real estate agency”, “insurance financing”, “sounding”, “harassing phone call” and “suspected fraudulent phone call”;
相应的,corresponding,
所述识别单元,具体用于:The identification unit is specifically configured to:
若所述骚扰地址的骚扰标记为“响一声”、“骚扰电话”或“疑似诈骗电话”,则识别出所述骚扰地址的类型为拦截类型;If the harassment address of the harassment address is marked as "sound", "harassing call" or "suspicious scam", the type of the harassment address is identified as an intercept type;
若所述骚扰地址的骚扰标记为“广告推销”、“房产中介”或“保险理财”,则识别出所述骚扰地址的类型为用户自定义类型;If the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
若所述骚扰地址的骚扰标记为“快递送餐”,则识别出所述骚扰地址的拦截类型为放行类型。If the harassment of the harassment address is marked as "fast delivery meal", then the interception type of the harassment address is identified as the release type.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没 有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments have different emphasis, and in some embodiments, For a detailed description, refer to the related description of other embodiments.
可以理解的是,上述方法及交换机中的相关特征可以相互参考。另外,上述实施例中的“第一”、“第二”等是用于区分各实施例,而并不代表各实施例的优劣。It can be understood that the above methods and related features in the switch can be referred to each other. In addition, "first", "second", and the like in the above embodiments are used to distinguish the embodiments, and do not represent the advantages and disadvantages of the embodiments.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开 的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and so disclosed Any method or unit of any method or unit of the device is combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例提供的移动通信终端中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components of the mobile communication terminal provided in accordance with embodiments of the present invention. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
例如,图8示出了可以实现根据本发明的一种移动通信终端进行骚扰通信拦截的终端设备。该终端设备传统上包括处理器810和以存储器820形式的计算机程序产品或者计算机可读介质。存储器820可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器820具有用于执行上述方法中的任何方法步骤的程序代码831的存储空间830。例如,用于程序代码的存储空间830可以包括分别用于实现上面的方法中的各种步骤的各个程序代码831。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图9所述的便携式或者固定存储单元。该存储单元可以具有与图8的终端设备中的存储器820类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码831’,即可以 由例如诸如810之类的处理器读取的代码,这些代码当由终端设备运行时,导致该终端设备执行上面所描述的方法中的各个步骤。For example, FIG. 8 shows a terminal device that can implement a disturbance communication interception by a mobile communication terminal according to the present invention. The terminal device conventionally includes a processor 810 and a computer program product or computer readable medium in the form of a memory 820. The memory 820 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. Memory 820 has a memory space 830 for program code 831 for performing any of the method steps described above. For example, storage space 830 for program code may include various program code 831 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 820 in the terminal device of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit includes computer readable code 831' Code read by a processor, such as 810, that when executed by a terminal device causes the terminal device to perform various steps in the methods described above.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。 In addition, it should be noted that the language used in the specification has been selected for the purpose of readability and teaching, and is not intended to be construed or limited. Therefore, many modifications and changes will be apparent to those skilled in the art without departing from the scope of the invention. The disclosure of the present invention is intended to be illustrative, and not restrictive, and the scope of the invention is defined by the appended claims.

Claims (24)

  1. 一种移动通信终端进行骚扰通信拦截的方法,包括:A method for harassing communication interception by a mobile communication terminal, comprising:
    移动通信终端对骚扰地址库中包含的多个骚扰地址进行类型识别;The mobile communication terminal performs type identification on a plurality of harassment addresses included in the harassment address library;
    将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人;Saving the harassment address in the harassment address library as the interception type of the harassment address as the first designated contact in the local address book, the first designated contact being set as the contact restricting the communication access;
    将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人;Saving a new communication method in the harassment address library for the release type harassment address as the second designated contact in the local address book, the second designated contact being set as a contact that allows communication access;
    当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。When there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address database, and the network address is the communication mode in the first designated contact, intercepting the communication access; And responding to the communication access if the network address of the communication access initiator is a harassment address in the harassment address library and the network address is a communication mode in the second designated contact.
  2. 根据权利要求1所述的方法,其特征在于,所述的拦截所述通信访问,具体为:The method according to claim 1, wherein said intercepting said communication access is specifically:
    根据对所述第一指定联系人的设置拦截所述通信访问。The communication access is intercepted according to settings for the first designated contact.
  3. 根据权利要求2所述的方法,其特征在于,所述的响应所述通信访问,具体为:The method according to claim 2, wherein said responding to said communication access is:
    根据对所述第二指定联系人的设置允许响应所述通信方式。The communication mode is allowed to respond according to the setting of the second designated contact.
  4. 根据权利要求1~3中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 3, further comprising:
    为已保存在所述第二指定联系人的通信方式中的所述骚扰地址设置骚扰标识标签和/或为所述第二指定联系人设置骚扰标识标签;Setting a harassment identification tag for the harassment address that has been saved in the communication mode of the second designated contact and/or setting a harassment identification tag for the second designated contact;
    相应的,响应所述通信访问,具体为:Correspondingly, in response to the communication access, specifically:
    从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并呈现所述骚扰标识标签。Acquiring the harassment identifier label corresponding to the network address and/or the harassment identifier label of the second designated contact from the local address book, and presenting the harassment identifier label.
  5. 根据权利要求4所述的方法,其特征在于,The method of claim 4 wherein:
    当所述通信访问为来电访问时,所述呈现所述骚扰标识标签,具体为:When the communication access is an incoming call, the presenting the harassment identifier label is specifically:
    在来电访问提示页面上呈现所述骚扰标识标签,以及用于响应用户挂 断和接通所述来电访问的操控键。Presenting the harassment identification tag on the incoming call prompt page, and responsive to the user hangs Break and turn on the control button for the incoming call.
  6. 根据权利要求1~3中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 3, further comprising:
    在所述本地通讯录中创建第一新联系人,对所述第一新联系人进行设置以设置为限制通信访问的联系人,并将所述第一新联系人作为所述第一指定联系人;或者Creating a first new contact in the local address book, setting the first new contact to set a contact that restricts communication access, and contacting the first new contact as the first designated contact Person; or
    指定所述本地通讯录中已有的且设置为限制通信访问的联系人作为所述第一指定联系人。A contact existing in the local address book and set to restrict communication access is designated as the first designated contact.
  7. 根据权利要求1~3中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 3, further comprising:
    在所述本地通讯录中创建第二新联系人,对所述第二新联系人进行设置以设置为允许通信访问的联系人,将所述第二新联系人作为所述第二指定联系人;或者Creating a second new contact in the local address book, setting the second new contact to be set as a contact allowing communication access, and using the second new contact as the second designated contact ;or
    指定所述本地通讯录中已有的且设置为允许通信访问的联系人作为所述第二指定联系人。A contact existing in the local address book and set to allow communication access is designated as the second designated contact.
  8. 根据权利要求1~3中任一项所述的方法,其特征在于,The method according to any one of claims 1 to 3, characterized in that
    当所述通信访问为来电访问时,所述通信访问发起方的网络地址为网络电话号码、移动电话号码或固定电话号码;When the communication access is an incoming call, the network address of the communication access initiator is a network phone number, a mobile phone number or a fixed phone number;
    当所述通信访问为短信或网络消息访问时,所述通信访问发起方的网络地址为移动电话号码、邮箱用户名或短信平台号码。When the communication access is a short message or a network message access, the network address of the communication access initiator is a mobile phone number, a mailbox user name or a short message platform number.
  9. 根据权利要求1~3中任一项所述的方法,其特征在于,所述移动通信终端为安装有未越狱IOS操作系统的移动通信终端。The method according to any one of claims 1 to 3, wherein the mobile communication terminal is a mobile communication terminal installed with a non-jail IOS operating system.
  10. 根据权利要求1~3中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 3, further comprising:
    将骚扰地址库中为用户自定义类型的骚扰地址作为第三指定联系人的新增通信方式保存在所述本地通讯录中,所述第三指定联系人为用户自定义设置的联系人;The harassment address of the user-defined type in the harassment address library is saved in the local address book as a new communication mode of the third designated contact, and the third designated contact is a user-defined contact;
    当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第三指定联系人中的通信方式,则根据当前所述第三指定联系人的用户设置,拦截或响应所述通信访问。When there is a communication access, if the network address of the communication access initiator is the harassment address in the harassment address library, and the network address is the communication mode in the third designated contact, according to the current third Specifies the user settings of the contact, intercepting or responding to the communication access.
  11. 根据权利要求10所述的方法,其特征在于,还包括:The method of claim 10, further comprising:
    在所述本地通讯录中创建第三新联系人,根据用户触发的设置事件对所述第三新联系人进行设置以设置为允许通信访问的联系人或限制通信访 问的联系人,将所述第三新联系人作为所述第三指定联系人;或者Creating a third new contact in the local address book, setting the third new contact according to a setting event triggered by the user to set a contact to allow communication access or restrict communication access Asking the contact, using the third new contact as the third designated contact; or
    指定所述本地通讯录中已有联系人作为所述第三指定联系人。Specifying an existing contact in the local address book as the third designated contact.
  12. 根据权利要求10所述的方法,其特征在于,所述对骚扰地址库中包含的多个骚扰地址进行类型识别,包括:The method according to claim 10, wherein the identifying the plurality of harassment addresses included in the harassment address database comprises:
    获取所述骚扰地址库中包含的各骚扰地址对应的骚扰标记;Obtaining a harassment flag corresponding to each harassment address included in the harassment address library;
    根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型。Identifying the type of each of the harassment addresses according to the harassment flag corresponding to each of the harassment addresses.
  13. 根据权利要求12所述的方法,其特征在于,所述骚扰标记包括:“快递送餐”、“广告推销”、“房产中介”、“保险理财”、“响一声”、“骚扰电话”及“疑似诈骗电话”;The method according to claim 12, wherein the harassment mark comprises: "fast delivery meal", "advertising promotion", "real estate agency", "insurance management", "sound", "harassment call" and "Suspected fraudulent phone call";
    相应的,corresponding,
    所述根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型,包括:Identifying, according to the harassment flag corresponding to each of the harassment addresses, a type of each of the harassment addresses, including:
    若所述骚扰地址的骚扰标记为“响一声”、“骚扰电话”或“疑似诈骗电话”,则识别出所述骚扰地址的类型为拦截类型;If the harassment address of the harassment address is marked as "sound", "harassing call" or "suspicious scam", the type of the harassment address is identified as an intercept type;
    若所述骚扰地址的骚扰标记为“广告推销”、“房产中介”或“保险理财”,则识别出所述骚扰地址的类型为用户自定义类型;If the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
    若所述骚扰地址的骚扰标记为“快递送餐”,则识别出所述骚扰地址的拦截类型为放行类型。If the harassment of the harassment address is marked as "fast delivery meal", then the interception type of the harassment address is identified as the release type.
  14. 一种移动通信终端,包括:A mobile communication terminal includes:
    识别模块,用于对骚扰地址库中包含的多个骚扰地址进行类型识别;An identification module, configured to perform type identification on multiple harassment addresses included in the harassment address library;
    保存模块,用于将骚扰地址库中为拦截类型的骚扰地址作为第一指定联系人的新增通信方式保存在本地通讯录中,所述第一指定联系人设置为限制通信访问的联系人;将骚扰地址库中为放行类型骚扰地址作为第二指定联系人的新增通信方式保存在所述本地通讯录中,所述第二指定联系人设置为允许通信访问的联系人;a saving module, configured to save the harassment address in the harassment address library as the new communication mode of the first designated contact in the local address book, where the first designated contact is set as a contact that restricts communication access; Saving a new communication method in the harassment address library for the release type harassment address as the second designated contact in the local address book, the second designated contact being set as a contact that allows communication access;
    处理模块,用于当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第一指定联系人中的通信方式,则拦截所述通信访问;若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式,则响应所述通信访问。 a processing module, configured to: when there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the first designated contact, intercepting The communication access; if the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, responding to the communication access.
  15. 根据权利要求14所述的移动通信终端,其特征在于,还包括:The mobile communication terminal according to claim 14, further comprising:
    设置模块,用于为已保存在所述第二指定联系人的通信方式中的所述骚扰地址设置骚扰标识标签和/或为所述第二指定联系人设置骚扰标识标签;a setting module, configured to set a harassment identification label for the harassment address that has been saved in the communication mode of the second designated contact, and/or set a harassment identification label for the second designated contact;
    相应的,所述处理模块,具体用于:Correspondingly, the processing module is specifically configured to:
    当通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式时,从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并呈现所述骚扰标识标签。Obtaining the network address from the local address book when a network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact Corresponding harassment identification tag and/or harassment identification tag of the second designated contact, and presenting the harassment identification tag.
  16. 根据权利要求15所述的移动通信终端,其特征在于,所述处理模块,具体用于:The mobile communication terminal according to claim 15, wherein the processing module is specifically configured to:
    当所述通信访问为来电访问,且通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第二指定联系人中的通信方式时,从所述本地通讯录中获取所述网络地址对应的骚扰标识标签和/或所述第二指定联系人的骚扰标识标签,并在来电访问提示页面上呈现所述骚扰标识标签,以及用于响应用户挂断和接通所述来电访问的操控键。When the communication access is an incoming call and the network address of the communication access initiator is a harassment address in the harassment address library, and the network address is a communication mode in the second designated contact, Obtaining, in the local address book, the harassment identifier label corresponding to the network address and/or the harassment identifier label of the second designated contact, and presenting the harassment identifier label on the call arrival prompt page, and responsive to the user hang up And the control button for turning on the incoming call.
  17. 根据权利要求14所述的移动通信终端,其特征在于,还包括:The mobile communication terminal according to claim 14, further comprising:
    第一创建模块,用于在所述本地通讯录中创建第一新联系人,对所述第一新联系人进行设置以设置为限制通信访问的联系人,并将所述第一新联系人作为所述第一指定联系人;或者a first creating module, configured to create a first new contact in the local address book, set the first new contact to set a contact to restrict communication access, and set the first new contact As the first designated contact; or
    第一指定模块,用于指定所述本地通讯录中已有的且设置为限制通信访问的联系人作为所述第一指定联系人。And a first specifying module, configured to specify, as the first designated contact, a contact that is already in the local address book and is set to restrict communication access.
  18. 根据权利要求14所述的移动通信终端,其特征在于,还包括:The mobile communication terminal according to claim 14, further comprising:
    第二创建模块,用于在所述本地通讯录中创建第二新联系人,对所述第二新联系人进行设置以设置为允许通信访问的联系人,将所述第二新联系人作为所述第二指定联系人;或者a second creating module, configured to create a second new contact in the local address book, set the second new contact to be set as a contact that allows communication access, and use the second new contact as The second designated contact; or
    第二指定模块,用于指定所述本地通讯录中已有的且设置为允许通信访问的联系人作为所述第二指定联系人。And a second specifying module, configured to specify, as the second designated contact, a contact that is already in the local address book and is set to allow communication access.
  19. 根据权利要求14~18中任一项所述的移动通信终端,其特征在于,A mobile communication terminal according to any one of claims 14 to 18, characterized in that
    所述保存模块,还用于将骚扰地址库中为用户自定义类型的骚扰地址 作为第三指定联系人的新增通信方式保存在所述本地通讯录中,所述第三指定联系人为用户自定义设置的联系人;The saving module is further configured to use a harassment address of a user-defined type in the address library The new communication mode as the third designated contact is saved in the local address book, and the third designated contact is a user-defined contact;
    所述处理模块,还用于当有通信访问时,若通信访问发起方的网络地址为所述骚扰地址库中的骚扰地址,且所述网络地址是所述第三指定联系人中的通信方式,则根据当前所述第三指定联系人的用户设置,拦截或响应所述通信访问。The processing module is further configured to: if there is a communication access, if the network address of the communication access initiator is a harassment address in the harassment address database, and the network address is a communication mode in the third designated contact And intercepting or responding to the communication access according to the user setting of the currently specified third designated contact.
  20. 根据权利要求19所述的移动通信终端,其特征在于,还包括:The mobile communication terminal according to claim 19, further comprising:
    第三创建模块,用于在所述本地通讯录中创建第三新联系人,根据用户触发的设置事件对所述第三新联系人进行设置以设置为允许通信访问的联系人或限制通信访问的联系人,将所述第三新联系人作为所述第三指定联系人;或者a third creating module, configured to create a third new contact in the local address book, and set the third new contact according to a setting event triggered by the user to set a contact to allow communication access or restrict communication access a contact, the third new contact as the third designated contact; or
    第三指定模块,用于指定所述本地通讯录中已有联系人作为所述第三指定联系人。And a third specifying module, configured to specify an existing contact in the local address book as the third designated contact.
  21. 根据权利要求19所述的移动通信终端,其特征在于,所述识别模块,包括:The mobile communication terminal according to claim 19, wherein the identification module comprises:
    获取单元,用于获取所述骚扰地址库中包含的各骚扰地址对应的骚扰标记;An obtaining unit, configured to obtain a harassment flag corresponding to each harassment address included in the harassment address library;
    识别单元,用于根据各所述骚扰地址对应的骚扰标记,识别各所述骚扰地址的类型。The identification unit is configured to identify the type of each of the harassment addresses according to the harassment mark corresponding to each of the harassment addresses.
  22. 根据权利要求21所述的移动通信终端,其特征在于,所述骚扰标记包括:“快递送餐”、“广告推销”、“房产中介”、“保险理财”、“响一声”、“骚扰电话”及“疑似诈骗电话”;The mobile communication terminal according to claim 21, wherein said disturbance flag comprises: "fast delivery meal", "advertising promotion", "real estate agency", "insurance management", "sound", "harassing call" And "suspected fraudulent calls";
    相应的,corresponding,
    所述识别单元,具体用于:The identification unit is specifically configured to:
    若所述骚扰地址的骚扰标记为“响一声”、“骚扰电话”或“疑似诈骗电话”,则识别出所述骚扰地址的类型为拦截类型;If the harassment address of the harassment address is marked as "sound", "harassing call" or "suspicious scam", the type of the harassment address is identified as an intercept type;
    若所述骚扰地址的骚扰标记为“广告推销”、“房产中介”或“保险理财”,则识别出所述骚扰地址的类型为用户自定义类型;If the harassment address of the harassment address is marked as “advertising sales”, “real estate agency” or “insurance financing”, the type of the harassment address is identified as a user-defined type;
    若所述骚扰地址的骚扰标记为“快递送餐”,则识别出所述骚扰地址的拦截类型为放行类型。 If the harassment of the harassment address is marked as "fast delivery meal", then the interception type of the harassment address is identified as the release type.
  23. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在终端设备上运行时,导致所述终端设备执行根据权利要求1-13中的任一个所述的移动通信终端进行骚扰通信拦截的方法。A computer program comprising computer readable code, when the computer readable code is run on a terminal device, causing the terminal device to perform a harassment communication by the mobile communication terminal according to any one of claims 1-13 The method of interception.
  24. 一种计算机可读介质,其中存储了如权利要求23所述的计算机程序。 A computer readable medium storing the computer program of claim 23.
PCT/CN2015/095598 2014-12-08 2015-11-26 Method for intercepting harassment communications via mobile communication terminal, and mobile communication terminal WO2016091075A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410745742.7A CN105744035B (en) 2014-12-08 2014-12-08 Mobile communication terminal carries out the method and mobile communication terminal that harassing and wrecking communication intercepts
CN2014107457427 2014-12-08

Publications (1)

Publication Number Publication Date
WO2016091075A1 true WO2016091075A1 (en) 2016-06-16

Family

ID=56106676

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095598 WO2016091075A1 (en) 2014-12-08 2015-11-26 Method for intercepting harassment communications via mobile communication terminal, and mobile communication terminal

Country Status (2)

Country Link
CN (1) CN105744035B (en)
WO (1) WO2016091075A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559542A (en) * 2016-11-30 2017-04-05 努比亚技术有限公司 A kind of terminal and harassing and wrecking hold-up interception method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660676B (en) * 2018-10-11 2021-03-19 创新先进技术有限公司 Abnormal object identification method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN203416421U (en) * 2013-03-28 2014-01-29 四川长虹电器股份有限公司 Apparatus for filtering junk message and junk call
CN104052852A (en) * 2014-06-20 2014-09-17 许昌学院 Communication method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4020576B2 (en) * 2000-09-14 2007-12-12 株式会社東芝 Packet transfer method, mobile terminal device and router device
CN101296429B (en) * 2007-04-25 2013-03-20 华为技术有限公司 Video terminal and incoming call processing method
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN103813018A (en) * 2014-02-28 2014-05-21 上海斐讯数据通信技术有限公司 Incoming call marking method for mobile terminal and marking system adopted by method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415161A (en) * 2008-11-26 2009-04-22 深圳华为通信技术有限公司 Method and apparatus for filtrating rubbish short message
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN203416421U (en) * 2013-03-28 2014-01-29 四川长虹电器股份有限公司 Apparatus for filtering junk message and junk call
CN104052852A (en) * 2014-06-20 2014-09-17 许昌学院 Communication method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559542A (en) * 2016-11-30 2017-04-05 努比亚技术有限公司 A kind of terminal and harassing and wrecking hold-up interception method

Also Published As

Publication number Publication date
CN105744035B (en) 2019-04-19
CN105744035A (en) 2016-07-06

Similar Documents

Publication Publication Date Title
US9973506B2 (en) Method and apparatus for clearing notification icon, and storage medium
US10469646B2 (en) Method and apparatus for providing communication-related information
US9860372B2 (en) Device and method for displaying information relevant to unknown incoming/outgoing phone number
CN110336735B (en) Method and equipment for sending reminding message
US10911565B2 (en) Method, device and system for associating a service account
US10481752B2 (en) Method and device for a guided application to enhance a user interface
CN108804194B (en) Notification bar message processing method and device, user terminal and readable storage medium
US11513753B2 (en) Data processing method and electronic terminal
US10033850B2 (en) Method for real time displaying information and mobile communication terminal
CN108605226B (en) Incoming call reminding method, terminal equipment and graphical user interface
KR20200041903A (en) Application-independent messaging system
CN105260671A (en) Control method and device for notification bar of mobile terminal and mobile equipment
WO2017201965A1 (en) Notification message display method and device, and terminal
CN104683591A (en) Message disturbance-free method based on mobile terminal and mobile terminal using method
WO2016202074A1 (en) Method and apparatus for setting state of contact in address book
CN109656440A (en) Application icon display methods, equipment and medium
WO2016091075A1 (en) Method for intercepting harassment communications via mobile communication terminal, and mobile communication terminal
CN108874479B (en) Notification bar message display method and device, user terminal and readable storage medium
CN108241515B (en) Application shortcut establishing method and terminal
WO2016091074A1 (en) Method, device and system for identifying harassment communications via mobile communication terminal
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
EP3001652B1 (en) Method for providing information and an electronic device thereof
WO2017190447A1 (en) Method and device for controlling number blacklist
CN107545413A (en) Event-handling method and device
WO2017020665A1 (en) Wallpaper switching method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15866410

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15866410

Country of ref document: EP

Kind code of ref document: A1