WO2016119419A1 - 一种呼叫处理方法和装置 - Google Patents

一种呼叫处理方法和装置 Download PDF

Info

Publication number
WO2016119419A1
WO2016119419A1 PCT/CN2015/085275 CN2015085275W WO2016119419A1 WO 2016119419 A1 WO2016119419 A1 WO 2016119419A1 CN 2015085275 W CN2015085275 W CN 2015085275W WO 2016119419 A1 WO2016119419 A1 WO 2016119419A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
call
eye
information
user
Prior art date
Application number
PCT/CN2015/085275
Other languages
English (en)
French (fr)
Inventor
王宇航
叶青
房新凯
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016119419A1 publication Critical patent/WO2016119419A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the invention relates to the field of mobile terminals, in particular to a call processing method and device.
  • Every mobile phone user may have one or more sensitive contacts, especially for some business people. For calls made by these sensitive contacts, they may not want to be answered by others, or even want other people. Know your connection with certain sensitive contacts.
  • the embodiments of the present invention desirably provide a call processing method and device.
  • the embodiment of the present invention provides a call processing method, and the method includes:
  • the second terminal executes the disguise display process and the human eye recognition process; when the human eye recognition fails and the call is established, the call disguise process is executed; or,
  • the second terminal executes the disguised display process, To Human eye recognition process and call rejection process; when human eye recognition is successful, the call rejection process is terminated and the normal call process is entered.
  • the first terminal refers to a terminal included in a preset list of second terminals; the preset list is used to store identification information of sensitive contacts.
  • the disguised display process includes:
  • the identity information of the first terminal user is concealed, and the identity of the first terminal user is disguised as a prompt.
  • the execution of the human eye recognition process includes:
  • the second terminal starts the front camera to collect the first eye information of the user who answers the second terminal;
  • the unsuccessful comparison includes the following two situations:
  • the first case after the second terminal normally collects the first eye information, it cannot find the second eye information that matches the first eye information in the local eye information database;
  • the second situation the second terminal cannot normally collect the first eye information.
  • the first eye information includes at least one of the following information:
  • Eyeball color Eyeball color, eye pattern shape, eye pattern vein thickness, eye blood vessel shape and eye blood vessel color.
  • the call disguise process includes: shielding the sound in the earpiece of the second terminal, and returning a disguise prompt tone in the earpiece of the second terminal;
  • the call rejection process includes: disabling the keys for answering the call and hanging up the call.
  • the embodiment of the present invention provides a call processing device, which is located on a second terminal, the device includes: a control module, a disguise display module, a human eye recognition module, a call disguise module and a call rejection module; wherein, To
  • the control module is configured to, when receiving a call request initiated by the first terminal, trigger the disguised display module to execute the disguised display process, trigger the human eye recognition module to execute the human eye recognition process, and when the human eye recognition fails and the first terminal and the first terminal 2.
  • trigger the call disguise module to execute the call disguise process; or,
  • It is configured to trigger the disguise display module to execute the disguise display process, the eye recognition module to execute the eye recognition process, the call rejection module to execute the call rejection process when the call request initiated by the first terminal is received, and when the human eye recognition is successful, The call rejection module is triggered to terminate the call rejection process.
  • the second terminal further includes a storage module configured to store a preset list, and the preset list is used to store identification information of sensitive contacts.
  • the first terminal refers to a terminal included in a preset list.
  • the disguised display module is configured to execute the disguised display process in the following ways:
  • the identity information of the first terminal user is concealed, and the identity of the first terminal user is disguised as a prompt.
  • the human eye recognition module is configured to execute the human eye recognition process in the following manner:
  • the unsuccessful comparison includes the following two situations:
  • the first situation after the human eye recognition module normally collects the first eye information, the second eye information that matches the first eye information cannot be found in the local eye information database;
  • the second case the human eye recognition module cannot normally collect the first eye information.
  • the first eye information includes at least one of the following information:
  • Eyeball color Eyeball color, eye pattern shape, eye pattern vein thickness, eye blood vessel shape and eye blood vessel color.
  • the call disguise module is configured to execute the call disguise process in the following manner: shield the sound in the earpiece of the second terminal, and return a disguised prompt tone in the earpiece of the second terminal.
  • the call rejection module is configured to execute the call rejection process in the following way: invalidate the buttons for answering the call and hanging up the call.
  • the control module, the disguise display module, the storage module, the human eye recognition module, the call disguise module, and the call rejection module may use a central processing unit (CPU, Central Processing Unit), a digital signal processor (DSP, Digital Signal Processor) when performing processing. Singnal Processor) or Programmable Logic Array (FPGA, Field-Programmable Gate Array) implementation.
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • FPGA Field-Programmable Gate Array
  • the second terminal executes a disguised display process and a human eye recognition process; when human eye recognition fails and the call is established, Perform the call disguise process; or, when receiving the call request initiated by the first terminal, the second terminal performs the disguised display process, the human eye recognition process, and the call rejection process; when the human eye recognition is successful, the call rejection process is terminated and enters normal
  • the identity of the receiver can be judged by human eye recognition, and the identity information of the sensitive contact (the first terminal user) can be disguised well when the receiver cannot be clearly identified as the owner himself. And avoid the leak of the owner's private information.
  • Fig. 1 is a first flowchart of a call processing method provided by an embodiment of the present invention
  • FIG. 2 is a second flowchart of a call processing method provided by an embodiment of the present invention.
  • FIG. 3 is a basic structural diagram of a call processing device provided by an embodiment of the present invention.
  • FIG. 4 is an exemplary schematic diagram of an edit menu of sensitive contact information provided by an embodiment of the present invention.
  • Figure 5 is a terminal call interface 1 provided by an embodiment of the present invention.
  • Fig. 6 is a second terminal call interface provided by an embodiment of the present invention.
  • the second terminal when the call request initiated by the first terminal is received, the second terminal executes the disguised display process and the human eye recognition process; when the human eye recognition fails and the call is established, the call disguise process is executed; or, when the call is received
  • the second terminal executes a disguised display process, a human eye recognition process, and a call rejection process; when the human eye recognition is successful, the call rejection process is terminated and the normal call process is entered.
  • the first embodiment of the present invention provides a call processing method. As shown in FIG. 1, the method includes the following steps:
  • Step 101 When receiving a call request initiated by the first terminal, the second terminal executes a disguised display process and a human eye identification process;
  • the first terminal refers to the terminal included in the preset list of the second terminal; the preset list is used to store sensitive contact information, and the information may be identification information used to identify a contact; for example, , Phone number, contact name, etc.; therefore, before this step, the second terminal needs to set a preset list in advance.
  • the second terminal user can set one or more contacts in the second terminal as needed Is a sensitive contact. Therefore, the first terminal is also the sensitive contact set by the user of the second terminal.
  • the second terminal When receiving a call request initiated by the first terminal, that is, when the second terminal detects that the current call is from the first terminal included in the preset list, the second terminal directly executes the disguised display process;
  • the disguised display process refers to: when the incoming call information is displayed on the screen of the second terminal, the identity information stored locally by the first terminal user, such as name or remarks, etc., is hidden; therefore, in this step, only Displaying the phone number of the first terminal on the screen of the second terminal, but not displaying the locally stored information such as the contact name of the user of the first terminal on the screen of the second terminal;
  • the calling user the first terminal user
  • the second terminal screen is displayed as express delivery, real estate agency, sales promotion, etc.; in this way, the purpose of not exposing the identity of the first terminal user is achieved.
  • the execution of the human eye recognition process includes:
  • the second terminal starts the front camera to collect the first eye information of the user who answers the second terminal;
  • the first eye information includes at least one of the following information: eyeball color, eye pattern shape, eye pattern vein thickness, eye Blood vessel shape and eye blood vessel color;
  • the normal call process is executed, and the first terminal user's information is normally displayed on the terminal interface; that is, the first terminal user and the second terminal user have a normal call process ;
  • the user who answers the second terminal is determined to be an illegal user; specifically, the first collected first
  • the unsuccessful comparison between the eye information and the second eye information in the local eye information database can include two cases: In the first case, the second terminal normally collects the first eye information, but the local eye information The second eye information that matches the first eye information cannot be found in the library; in the second case, the second terminal cannot normally collect the first eye information, including: no eye information is collected, or Failure to collect eye information caused by problems such as front camera failure; in the second case, it is directly determined that the comparison between the first eye information and the second eye information is unsuccessful; that is, the user who answers the second terminal is illegal User; In the actual implementation process, when the user who answers the second terminal adopts hands-free mode or wears sunglasses, the second situation will occur. At this time, the user who answers the second terminal is determined to be an illegal user.
  • the second terminal user Before this step, the second terminal user needs to collect his own eye information in advance, and To The collected eye information is stored in the local eye information database. This information is used to compare the identity of the user answering the second terminal when a sensitive contact calls; that is, to determine whether the user answering the second terminal is a legitimate user .
  • Step 102 When the human eye recognition fails, execute the call masquerading process
  • the human eye recognition failure means that when the human eye recognition process is executed in step 101, the first eye information collected is unsuccessfully compared with the second eye information in the local eye information database.
  • the call disguise process is executed.
  • the call disguise process includes: shielding the sound in the earpiece of the second terminal, and returning a disguised prompt tone in the second terminal earpiece;
  • the disguised prompt tone here can be the on-hook sound "beep beep" or a preset voice Promotional information;
  • the second terminal can also perform the following processing: do not return the call sound to the first terminal, so that when the user answering the second terminal is an illegal user, even if the call is connected, the answer to the second terminal For the first end user, only the disguised prompt tone can be heard, and no sound can be heard for the first terminal user.
  • the second embodiment of the present invention provides a call processing method. As shown in FIG. 2, the method includes the following steps:
  • Step 201 When receiving a call request initiated by the first terminal, the second terminal executes a disguised display process, a human eye recognition process, and a call rejection process;
  • the first terminal refers to a terminal included in the preset list of the second terminal; the preset list is used to store sensitive contact information, and the information may be identification information used to identify a contact; For example, phone numbers, contact names, etc.; therefore, before this step, the second terminal needs to set a preset list in advance. For example, the second terminal user can add one or more contacts in the second terminal as needed. Set as a sensitive contact. Therefore, the first terminal is also the sensitive contact set by the user of the second terminal.
  • the second terminal detects the current call To When the call comes from the first terminal included in the preset list, the second terminal directly executes the disguised display process;
  • the disguised display process refers to: when the incoming call information is displayed on the second terminal screen, the first terminal user’s locally stored name or remark name is concealed; therefore, in this step, it can only be displayed on the second terminal screen
  • the phone number of the first terminal is displayed, and the locally stored information such as the contact name of the first terminal user is not displayed on the screen of the second terminal; further, in order to better achieve the purpose of disguising, display the second terminal number in the
  • the caller (the first terminal user) can also be disguised promptly; for example, when the first terminal user calls, it will be displayed on the second terminal screen as express delivery, real estate agency, sales promotion, etc.; this way to achieve The purpose of not exposing the identity of the first end user.
  • the second terminal also needs to execute a human eye recognition process, and the executing human eye recognition process includes:
  • the second terminal starts the front camera to collect the first eye information of the user who answers the second terminal;
  • the first eye information includes at least one of the following information: eyeball color, eye pattern shape, eye pattern vein thickness, eye Blood vessel shape and eye blood vessel color;
  • the normal call process is executed, and the first terminal user's information is normally displayed on the terminal interface; that is, the first terminal user and the second terminal user have a normal call process ;
  • the user who answers the second terminal is determined to be an illegal user; specifically, the first collected first
  • the unsuccessful comparison between the eye information and the second eye information in the local eye information database can include two cases: In the first case, the second terminal normally collects the first eye information, but the local eye information The second eye information that matches the first eye information is not found in the library; the second situation To In this case, the second terminal cannot normally collect the first eye information, including: no eye information is collected, or the eye information collection fails due to problems such as the front camera failure; in the second case, you can directly It is determined that the comparison between the first eye information and the second eye information is unsuccessful; that is, the user who answers the second terminal is an illegal user; in the actual implementation process, when the user who answers the second terminal adopts hands-free mode or wears sunglasses At this time, the second situation will occur. At this time, the user who answers the second terminal is determined to be an illegal user.
  • the second terminal user Before this step, the second terminal user needs to collect his own eye information in advance, and save the collected eye information in the local eye information database. This information is used to compare and answer when a sensitive contact calls.
  • the identity of the user of the second terminal that is, it is determined whether the user who answers the second terminal is a legitimate user.
  • the second terminal also executes the call rejection process, which includes: invalidating the buttons for answering and hanging up the call; this step can be implemented in the following way in actual implementation: not responding to the answering request sent by the user through the button or Reject the call request; or, directly set the answer button and the reject button to an inoperable state (make the button gray and cannot be clicked).
  • Step 202 When the human eye recognition is successful, terminate the call rejection process and enter the normal call process;
  • the successful human eye recognition means that when the human eye recognition process is executed in step 201, the first eye information collected is successfully compared with the second eye information in the local eye information database. , Terminate the call rejection process and enter the normal call process, that is, set the button for answering or rejecting the call on the terminal to be valid. At this time, the user can answer the call normally and communicate with the calling user (the first terminal user) Call, or the user can directly hang up the call.
  • the third embodiment of the present invention provides a call processing device located on a second terminal, as shown in FIG. 3, the device includes: a control module 31, a disguise display module 32, a human eye recognition module 33, and a call disguise module 34 and Call rejection module 35; among them,
  • the control module 31 is configured to trigger masquerading when receiving a call request initiated by the first terminal To
  • the display module 32 executes the disguise display process, triggers the eye recognition module 33 to execute the eye recognition process, and triggers the call disguise module 34 to execute the call disguise process when the eye recognition fails and the call between the first terminal and the second terminal is established; or,
  • the control module 31 is configured to trigger the disguise display module 32 to execute the disguise display process, the eye recognition module 33 to execute the eye recognition process, and the call rejection module 35 to execute the call rejection process when the call request initiated by the first terminal is received. , And when the human eye recognition is successful, the call rejection module 35 is triggered to terminate the call rejection process.
  • control module 31 when the control module 31 receives the call request initiated by the first terminal, it selects to trigger the camouflage display module 32 and the human eye recognition module 33; or triggers the camouflage display module 32, the human eye recognition module 33, and the call rejection module 35.
  • the preset condition may be preset by the user, or executed in a default manner.
  • the second terminal further includes a storage module 36 configured to store a preset list, and the preset list is used to store identification information of sensitive contacts.
  • the second terminal further includes a setting module 37 configured to set a preset list, that is, set identification information of sensitive contacts, and generate the preset list according to the identification information of the sensitive contacts; and also configured to control module 31
  • a setting module 37 configured to set a preset list, that is, set identification information of sensitive contacts, and generate the preset list according to the identification information of the sensitive contacts; and also configured to control module 31
  • the camouflage display module 32 and the human eye recognition module 33 are selected to be triggered; or, the camouflage display module 32, the human eye recognition module 33 and the call rejection module 35 are triggered to be set.
  • the first terminal refers to a terminal included in a preset list.
  • the disguised display module 32 is configured to execute the disguised display process in the following manner:
  • the incoming call information is displayed on the screen of the second terminal, the name of the first terminal user is hidden, and the first terminal user is given a disguised prompt.
  • the human eye recognition module 33 is configured to execute the human eye recognition process in the following manner: To
  • the unsuccessful comparison includes the following two situations:
  • the first situation after the human eye recognition module normally collects the first eye information, the second eye information that matches the first eye information cannot be found in the local eye information database;
  • the second case the human eye recognition module cannot normally collect the first eye information.
  • the first eye information includes at least one of the following information:
  • Eyeball color Eyeball color, eye pattern shape, eye pattern vein thickness, eye blood vessel shape and eye blood vessel color.
  • the above-mentioned local eye information database is located in the storage module 36.
  • the call disguise module 34 is configured to perform a call disguise process in the following manner: shield the sound in the earpiece of the second terminal, and return a disguised prompt tone in the earpiece of the second terminal.
  • the call rejection module 35 is configured to execute the call rejection process in the following manner: invalidate the buttons for answering the call and hanging up the call.
  • the example includes the following steps:
  • S301 The user sets the contact in the mobile phone as a sensitive contact
  • the method for the user to set a sensitive contact may be: the user directly selects a specific contact in the address book and enters the edit menu of the sensitive contact information, as shown in the figure As shown in 4, select a high security level option in this menu, and this option is a sensitive contact setting option. After selecting this option, the corresponding contact is set as a sensitive contact.
  • the user enters the corresponding setting interface, puts the ear close to the handset of the mobile phone as instructed, and the mobile phone activates the front camera to collect the user's eye information and record it in the local eye information database.
  • the user sets the processing mode for incoming calls to sensitive contacts to mode one.
  • S304 The mobile phone automatically executes the disguise display process and the human eye recognition process
  • the mobile phone When a sensitive contact calls, the mobile phone automatically executes the disguise display process and the human eye recognition process according to the preset mode 1.
  • the disguise display process the mobile phone automatically hides the name of the sensitive contact stored locally and only displays the phone number. And mark the phone number as a real estate agency; at the same time, the mobile phone automatically turns on the front camera and collects eye information to perform the human eye recognition process;
  • the mobile phone Before the mobile phone collects any eye information, or when the collected eye information is different from the eye information pre-stored in the local eye information database, it is determined that the human eye recognition has failed; at this time, it is determined that the person who answered the phone is not the owner of the phone. , If the call between the two parties has been established, return the disguised promotional information in the receiver of the called phone and stop returning the sound received in the microphone to the sensitive contact’s phone;
  • the call interface on the mobile phone is shown in Figure 5; after the human eye information is successfully recognized, the mobile phone exits the disguised display process and displays the caller’s local storage in the correct display mode.
  • the name, the display interface is shown in Figure 6;
  • the example includes the following steps:
  • the method for the user (the user here refers to the owner of the mobile phone) to set a sensitive contact can be: the user directly selects a specific contact in the address book and enters the edit menu for the contact information, as shown in the figure below. As shown in 4, the user selects an option with a high security level in the menu, and this option is a sensitive contact setting option. After selecting this option, the corresponding contact is set as a sensitive contact.
  • the user enters the corresponding setting interface, puts the ear close to the handset of the mobile phone as instructed, and the mobile phone activates the front camera to collect the user's eye information and record it in the local eye information database.
  • S403 Set a processing mode for incoming calls from sensitive contacts
  • the user sets the processing mode for the incoming call of the sensitive contact to mode two.
  • S404 The mobile phone automatically executes the disguise display process, the human eye recognition process, and the call rejection process;
  • the mobile phone When a sensitive contact calls, the mobile phone automatically executes the disguise display process and the human eye recognition process according to the preset mode 2.
  • the disguise display process the mobile phone automatically hides the name of the sensitive contact stored locally and only displays the phone number. And mark the phone number as a real estate agency; at the same time, the phone automatically turns on the front camera and collects eye information to perform the eye recognition process; in the call rejection process, the phone sets the answer key and hang up key on its own screen Is invalid, these two buttons are grayed out on the screen and cannot be operated;
  • the mobile phone Before the mobile phone collects any eye information, or when the collected eye information is not the same as the eye information pre-stored in the local eye information database, it is determined that the human eye recognition fails; at this time, the call is answered or rejected on the phone screen The key is still invalid;
  • control module 31, the disguise display module 32, the human eye recognition module 33, the call disguise module 34, the call rejection module 35, the storage module 36 and the setting module 37 can be controlled by the central processing unit (CPU, Central Processing Unit, microprocessor (MPU, Micro Processing Unit), digital signal processor (DSP, Digital Signal Processor), or programmable logic array (FPGA, Field-Programmable Gate Array).
  • CPU Central Processing Unit
  • MPU Micro Processing Unit
  • DSP Digital Signal Processor
  • FPGA Field-Programmable Gate Array
  • the embodiments of the present invention can be provided as a method, a system, or a computer program product. Therefore, the present invention may adopt the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware. Moreover, the present invention may be in the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the computer-readable memory can be stored in the computer-readable memory.
  • the instruction generation in the storage includes the manufactured product of the instruction device, which implements the function specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the second terminal executes a disguised display process and a human eye recognition process; when human eye recognition fails and the call is established, Perform the call disguise process; or, when receiving the call request initiated by the first terminal, the second terminal performs the disguised display process, the human eye recognition process, and the call rejection process; when the human eye recognition is successful, the call rejection process is terminated and enters normal
  • the identity of the receiver can be judged by human eye recognition, and the identity information of the sensitive contact (the first terminal user) can be disguised well when the receiver cannot be clearly identified as the owner himself. And avoid the leak of the owner's private information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开了一种呼叫处理方法,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程。本发明同时还公开了一种呼叫处理装置。

Description

一种呼叫处理方法和装置 技术领域
本发明涉及移动终端领域,具体涉及一种呼叫处理方法和装置。
背景技术
随着通信技术的发展,手机等移动终端已经成为人们日常生活中必不可少的工具。
每个手机用户可能都会有一个或者多个敏感的联系人存在,特别是针对一些商务人士来说,针对这些敏感联系人打来的电话,他们可能不希望被其他人接听,甚至不希望其他人知道自身与某些敏感联系人的联系。但是,生活中经常会出现一些情况,使手机不在机主身边,例如,当某个手机机主突然忙着去开会,或者什么紧急事情的时候,常常会把手机落在办公室的桌上,或者落在朋友那。这时候如果有一个比较重要敏感的来电人来电的话,往往手机会被其他人接听,而此时,就有可能导致机主的个人隐私信息暴漏。
发明内容
为了解决现有存在的技术问题,本发明实施例期望提供一种呼叫处理方法和装置。
本发明实施例提供了一种呼叫处理方法,所述方法包括:
当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,
当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、 人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程。
上述方案中,所述第一终端是指包含在第二终端预设名单中的终端;所述预设名单用于存储敏感联系人的标识信息。
上述方案中,所述伪装显示流程,包括:
在第二终端屏幕上显示来电信息时,隐去第一终端用户的身份信息,并对第一终端用户身份进行伪装提示。
上述方案中,所述执行人眼识别流程,包括:
第二终端启动前置摄像头,采集接听第二终端的用户的第一眼部信息;
将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果比对成功,确定接听第二终端的用户为合法用户,执行正常的通话流程;
如果比对不成功,确定接听第二终端的用户为非法用户。
上述方案中,所述比对不成功包括以下两种情况:
第一种情况:第二终端正常采集到第一眼部信息后,在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;
第二种情况:第二终端无法正常采集到第一眼部信息。
上述方案中,所述第一眼部信息包括以下信息中至少其中一种:
眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色。
上述方案中,所述通话伪装流程包括:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音;
所述通话拒绝流程包括:使接听通话和挂断电话的按键失效。
本发明实施例提供了一种呼叫处理装置,位于第二终端上,所述装置包括:控制模块、伪装显示模块、人眼识别模块及通话伪装模块及通话拒绝模块;其中,
所述控制模块,配置为接收到第一终端发起的呼叫请求时,触发伪装显示模块执行伪装显示流程、触发人眼识别模块执行人眼识别流程,并在人眼识别失败且第一终端和第二终端通话建立时,触发通话伪装模块执行通话伪装流程;或者,
配置为接收到第一终端发起的呼叫请求时,触发伪装显示模块执行伪装显示流程、触发人眼识别模块执行人眼识别流程、触发通话拒绝模块执行通话拒绝流程,并在人眼识别成功时,触发通话拒绝模块终止通话拒绝流程。
上述方案中,所述第二终端还包括存储模块,配置为存储预设名单,所述预设名单用于存储敏感联系人的标识信息。
所述第一终端是指包含在预设名单中的终端。
上述方案中,所述伪装显示模块,配置为通过以下方式执行伪装显示流程:
在第二终端屏幕上显示来电信息时,隐去第一终端用户身份信息,并对第一终端用户身份进行伪装提示。
上述方案中,所述人眼识别模块,配置为通过以下方式执行人眼识别流程:
启动前置摄像头,采集接听第二终端的用户的第一眼部信息;
将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果比对成功,确定接听第二终端的用户为合法用户;
如果比对不成功,确定接听第二终端的用户为非法用户。
上述方案中,所述比对不成功包括以下两种情况:
第一种情况:人眼识别模块正常采集到第一眼部信息后,在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;
第二种情况:人眼识别模块无法正常采集到第一眼部信息。
上述方案中,所述第一眼部信息包括以下信息中至少其中一种:
眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色。
上述方案中,所述通话伪装模块,配置为通过以下方式执行通话伪装流程:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音。
上述方案中,所述通话拒绝模块,配置为通过以下方式执行通话拒绝流程:使接听通话和挂断电话的按键失效。
所述控制模块、伪装显示模块、存储模块、人眼识别模块及通话伪装模块及通话拒绝模块在执行处理时,可以采用中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Singnal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)实现。
本发明实施例所提供的一种呼叫处理方法和装置,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程,这样可以通过人眼识别的方式对接听者的身份进行判断,并在不能明确接听者为机主本人时,对敏感联系人(第一终端用户)的身份信息进行很好的伪装,并避免了机主的隐私信息暴漏。
附图说明
图1为本发明实施例提供的呼叫处理方法流程图一;
图2为本发明实施例提供的呼叫处理方法流程图二;
图3为本发明实施例提供的呼叫处理装置的基本结构图;
图4为本发明实施例提供的敏感联系人信息的编辑菜单示例性示意图;
图5为本发明实施例提供的终端通话界面一;
图6为本发明实施例提供的终端通话界面二。
具体实施方式
本发明实施例中,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程。
下面通过附图及具体实施例对本发明做进一步的详细说明。
实施例一
本发明实施例一提供了一种呼叫处理方法,如图1所示,该方法包括以下步骤:
步骤101:当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;
这一步骤中,第一终端是指包含在第二终端预设名单中的终端;该预设名单用于存储敏感联系人的信息,该信息可以是用于标识一个联系人的标识信息;例如,电话号码、联系人名称等等;因此,在这一步骤之前,第二终端需要预先设置预设名单,例如,第二终端用户可以根据需要将第二终端中的一个或多个联系人设置为敏感联系人。因此,第一终端也就是即为第二终端用户所设置的敏感联系人。
当接收到第一终端发起的呼叫请求时,也即,第二终端检测到当前呼叫来自于包含在预设名单中的第一终端时,第二终端直接执行伪装显示流程;
其中,伪装显示流程是指:在第二终端屏幕上显示来电信息时,隐去第一终端用户在本地存储的身份信息,如,姓名或备注名等信息;因此,这一步骤中,可以仅在第二终端屏幕上显示第一终端电话号码,而将本地存储的第一终端用户的联系人姓名等信息不在第二终端屏幕上进行显示; 进一步的,为了更好的达到伪装的目的,在显示第二终端号码的同时,还可以对主叫用户(第一终端用户)进行伪装提示;例如,当第一终端用户来电时,在第二终端屏幕上显示为快递、房产中介、推销等等;以此方式来达到不使第一终端用户身份暴露的目的。
具体的,所述执行人眼识别流程,包括:
第二终端启动前置摄像头,采集接听第二终端的用户的第一眼部信息;该第一眼部信息包括以下信息中至少其中一种:眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色;
将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对成功,确定接听第二终端的用户为合法用户,此时,执行正常的通话流程,终端界面上正常显示第一终端用户的信息;即,第一终端用户与第二终端用户进行正常的通话流程;
如果采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对不成功,确定接听第二终端的用户为非法用户;具体的,这里所说的采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对不成功可以包括两种情况:第一种情况中,第二终端正常采集到第一眼部信息,但在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;第二种情况中,第二终端无法正常采集到第一眼部信息,包括:采集不到任何眼部信息,或前置摄像头故障等问题引起的眼部信息采集失败;在第二种情况下,直接认定第一眼部信息与第二眼部信息比对不成功;也即,接听第二终端的用户为非法用户;在实际实现过程中,当接听第二终端的用户采用免提模式或者戴墨镜时,都会产生第二种情况,此时,将接听第二终端的用户确定为非法用户。
在这一步骤之前,第二终端用户需要预先采集自身的眼部信息,并将 采集到的眼部信息保存在本地的眼部信息库,这些信息用于在敏感联系人来电时,比对接听第二终端的用户的身份;即,判断接听第二终端的用户是否为合法用户。
步骤102:当人眼识别失败时,执行通话伪装流程;
具体的,所述人眼识别失败是指:在步骤101中执行人眼识别流程时,采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对不成功,此时,执行通话伪装流程。
所述通话伪装流程包括:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音;这里的伪装提示音可以为挂机声音“嘟嘟嘟”,也可以为预先设置的语音推销信息;进一步的,第二终端还可以执行以下处理:不向第一终端返回通话声音,这样,当接听第二终端的用户为非法用户时,即使电话接通,对于第二终端的接听者来说只能听到伪装的提示音,对于第一终端用户则不能听到任何声音。
实施例二
本发明实施例二提供了一种呼叫处理方法,如图2所示,该方法包括以下步骤:
步骤201:当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;
这一步骤中,第一终端是指包含在第二终端预设名单中的终端;所述预设名单用于存储敏感联系人的信息,该信息可以是用于标识一个联系人的标识信息;例如,电话号码、联系人名称等等;因此,在这一步骤之前,第二终端需要预先设置预设名单,例如,第二终端用户可以根据需要将第二终端中的一个或多个联系人设置为敏感联系人。因此,第一终端也就是即为第二终端用户所设置的敏感联系人。
当接收到第一终端发起的呼叫请求时,也即,第二终端检测到当前呼 叫来自于包含在预设名单中的第一终端时,第二终端直接执行伪装显示流程;
其中,伪装显示流程是指:在第二终端屏幕上显示来电信息时,隐去第一终端用户的在本地存储的姓名或备注名;因此,这一步骤中,可以仅在第二终端屏幕上显示第一终端电话号码,而将本地存储的第一终端用户的联系人姓名等信息不在第二终端屏幕上进行显示;进一步的,为了更好的达到伪装的目的,在显示第二终端号码的同时,还可以对主叫用户(第一终端用户)进行伪装提示;例如,当第一终端用户来电时,在第二终端屏幕上显示为快递、房产中介、推销等等;以此方式来达到不使第一终端用户身份暴露的目的。
具体的,第二终端还需要执行人眼识别流程,所述执行人眼识别流程,包括:
第二终端启动前置摄像头,采集接听第二终端的用户的第一眼部信息;该第一眼部信息包括以下信息中至少其中一种:眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色;
将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对成功,确定接听第二终端的用户为合法用户,此时,执行正常的通话流程,终端界面上正常显示第一终端用户的信息;即,第一终端用户与第二终端用户进行正常的通话流程;
如果采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对不成功,确定接听第二终端的用户为非法用户;具体的,这里所说的采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对不成功可以包括两种情况:第一种情况中,第二终端正常采集到第一眼部信息,但在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;第二种情 况中,第二终端无法正常采集到第一眼部信息,包括:采集不到任何眼部信息,或前置摄像头故障等问题引起的眼部信息采集失败;在第二种情况下,可以直接认定第一眼部信息与第二眼部信息比对不成功;也即,接听第二终端的用户为非法用户;在实际实现过程中,当接听第二终端的用户采用免提模式或者戴墨镜时,都会产生第二种情况,此时,将接听第二终端的用户确定为非法用户。
在这一步骤之前,第二终端用户需要预先采集自身的眼部信息,并将采集到的眼部信息保存在本地的眼部信息库,这些信息用于在敏感联系人来电时,比对接听第二终端的用户的身份;即,判断接听第二终端的用户是否为合法用户。
第二终端还会执行通话拒绝流程,所述通话拒绝流程包括:使接听通话和挂断电话的按键失效;该步骤在实际实现中可以通过以下方式实现:不响应用户通过按键发送的接听请求或拒绝通话请求;或者,直接将接听按键和拒绝按键设置为不可操作状态(使按键呈现为灰色,无法点击)。
步骤202:当人眼识别成功时,终止通话拒绝流程并进入正常通话流程;
具体的,所述人眼识别成功是指:在步骤201中执行人眼识别流程时,采集到的第一眼部信息与本地眼部信息库中的第二眼部信息比对成功,此时,终止通话拒绝流程并进入正常的通话流程,也就是说,将终端上用于接听或拒绝通话的按键设置为有效,此时,用户可以正常接听电话并与主叫用户(第一终端用户)通话,或者用户也可以直接挂断电话。
实施例三
本发明实施例三提供了一种呼叫处理装置,位于第二终端上,如图3所示,所述装置包括:控制模块31、伪装显示模块32、人眼识别模块33及通话伪装模块34及通话拒绝模块35;其中,
所述控制模31,配置为接收到第一终端发起的呼叫请求时,触发伪装 显示模块32执行伪装显示流程、触发人眼识别模块33执行人眼识别流程,并在人眼识别失败且第一终端和第二终端通话建立时,触发通话伪装模块34执行通话伪装流程;或者,
所述控制模块31,配置为接收到第一终端发起的呼叫请求时,触发伪装显示模块32执行伪装显示流程、触发人眼识别模块33执行人眼识别流程、触发通话拒绝模块35执行通话拒绝流程,并在人眼识别成功时,触发通话拒绝模块35终止通话拒绝流程。
具体的,控制模块31在接收到第一终端发起的呼叫请求时,选择触发伪装显示模块32及人眼识别模块33;或者,触发伪装显示模块32、人眼识别模块33及通话拒绝模块35是根据预设条件确定的,该预设条件可以是由用户预先设置的,或者采用默认方式执行。
具体的,所述第二终端还包括存储模块36,配置为存储预设名单,所述预设名单用于存储敏感联系人的标识信息。
进一步的,所述第二终端还包括设置模块37,配置为设置预设名单,即设置敏感联系人的标识信息,并根据敏感联系人的标识信息生成预设名单;还配置为对控制模块31在接收到第一终端发起的呼叫请求时,选择触发伪装显示模块32及人眼识别模块33;或者,触发伪装显示模块32、人眼识别模块33及通话拒绝模块35进行设置。
所述第一终端是指包含在预设名单中的终端。
具体的,所述伪装显示模块32,配置为通过以下方式执行伪装显示流程:
在第二终端屏幕上显示来电信息时,隐去第一终端用户名称,并对第一终端用户进行伪装提示。
具体的,所述人眼识别模块33,配置为通过以下方式执行人眼识别流程:
启动前置摄像头,采集接听第二终端的用户的第一眼部信息;
将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果比对成功,确定接听第二终端的用户为合法用户;
如果比对不成功,确定接听第二终端的用户为非法用户。
具体的,所述比对不成功包括以下两种情况:
第一种情况:人眼识别模块正常采集到第一眼部信息后,在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;
第二种情况:人眼识别模块无法正常采集到第一眼部信息。
具体的,所述第一眼部信息包括以下信息中至少其中一种:
眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色。
需要说明的是,上述本地眼部信息库位于存储模块36中。
具体的,所述通话伪装模块34,配置为通过以下方式执行通话伪装流程:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音。
具体的,所述通话拒绝模块35,配置为通过以下方式执行通话拒绝流程:使接听通话和挂断电话的按键失效。
下面通过两个具体示例,对本发明实施例所述方法作以下详细介绍。
示例一
该示例包括以下步骤:
S301:用户设置手机中联系人为敏感联系人;
示例性的,用户(这里的用户是指手机的机主)设置敏感联系人的方法可以为:用户直接在通讯录中选中特定联系人,并进入对该敏感联系人信息的编辑菜单,如图4所示,在该菜单中选中高安全等级的选项,该选项即为敏感联系人设置选项,选中该选项之后,相应联系人即被设为敏感联系人。
S302:眼部信息生成;
用户进入相应设置界面,按照指示将耳朵靠近手机听筒,手机启动前置摄像头对该用户的眼部信息进行采集,并记录在本地的眼部信息库中。
S303:设置针对敏感联系人来电的处理模式;
该步骤中,用户将针对敏感联系人来电的处理模式设置为模式一。
S304:手机自动执行伪装显示流程和人眼识别流程;
敏感联系人打来电话,手机根据预先设置的模式一,自动执行伪装显示流程和人眼识别流程;在伪装显示流程中,手机自动隐去敏感联系人在本地存储的姓名,仅显示电话号码,并将该电话号码标注为房地产中介;与此同时,手机自动打开前置摄像头并采集眼部信息以执行人眼识别流程;
S305:当人眼识别失败时,执行通话伪装流程;
手机采集到任何眼部信息之前,或者采集到的眼部信息与本地眼部信息库中预先存储的眼部信息不相同时,确定人眼识别失败;此时,确定接听电话的非机主本人,如果双方通话已建立,则在被叫手机听筒内返回伪装的推销信息,并停止向敏感联系人手机返回话筒中接收到的声音;
当采集到的眼部信息与本地眼部信息库中预先存储的眼部信息相同时,确定接听来电的用户为手机机主本人,此时,通话双方按照正常方式进行通话;需要说明的是,该示例中,在人眼信息识别成功之前,手机上的通话界面如图5所示;在人眼信息识别成功后,手机退出伪装显示流程,并按照正确的显示方式显示主叫用户在本地存储的姓名,其显示界面如图6所示;
本领域技术人员能够理解的是,上述步骤S301-S303在实际执行时,并没有严格的先后顺序。
示例二
该示例包括以下步骤:
S401:用户设置手机中联系人为敏感联系人;
示例性的,用户(这里的用户是指手机的机主)设置敏感联系人的方法可以为:用户直接在通讯录中选中特定联系人,并进入对该联系人信息的编辑菜单,依然如图4所示,用户在该菜单中选中高安全等级的选项,该选项即为敏感联系人设置选项,选中该选项之后,相应联系人即被设为敏感联系人。
S402:眼部信息生成;
用户进入相应设置界面,按照指示将耳朵靠近手机听筒,手机启动前置摄像头对该用户的眼部信息进行采集,并记录在本地的眼部信息库中。
S403:设置针对敏感联系人来电的处理模式;
该步骤中,用户将针对敏感联系人来电的处理模式设置为模式二。
S404:手机自动执行伪装显示流程、人眼识别流程和通话拒绝流程;
敏感联系人打来电话,手机根据预先设置的模式二,自动执行伪装显示流程和人眼识别流程;在伪装显示流程中,手机自动隐去敏感联系人在本地存储的姓名,仅显示电话号码,并将该电话号码标注为房地产中介;与此同时,手机自动打开前置摄像头并采集眼部信息以执行人眼识别流程;在通话拒绝流程中,手机将自身屏幕上的接听键和挂机键设置为无效,这两个按键在屏幕上显示为灰色,无法被操作;
S405:当人眼识别成功时,终止通话拒绝流程;
手机采集到任何眼部信息之前,或者采集到的眼部信息与本地眼部信息库中预先存储的眼部信息不相同时,确定人眼识别失败;此时,手机屏幕上接听或拒绝通话的按键依然无效;
当采集到的眼部信息与本地眼部信息库中预先存储的眼部信息相同时,确定接听来电的用户为手机机主本人,此时,手机屏幕上用于接听和拒绝通话的按键可以被正常操作,通话双方可以按照正常方式进行通话;需要说明的是,该示例中,在人眼信息识别成功之前,手机上的通话界面 如图5所示;在人眼信息识别成功后,手机退出伪装显示流程,并按照正确的显示方式显示主叫用户在本地存储的姓名,其显示界面如图6所示;
本领域技术人员能够理解的是,上述步骤S401-S403在实际执行时,并没有严格的先后顺序。
在具体实施过程中,上述控制模块31、伪装显示模块32、人眼识别模块33及通话伪装模块34、通话拒绝模块35、存储模块36及设置模块37可以由终端内的中央处理器(CPU,Central Processing Unit)、微处理器(MPU,Micro Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)来实现。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存 储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。
工业实用性
本发明实施例所提供的一种呼叫处理方法和装置,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程,这样可以通过人眼识别的方式对接听者的身份进行判断,并在不能明确接听者为机主本人时,对敏感联系人(第一终端用户)的身份信息进行很好的伪装,并避免了机主的隐私信息暴漏。

Claims (15)

  1. 一种呼叫处理方法,所述方法包括:
    当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程和人眼识别流程;当人眼识别失败且通话建立时,执行通话伪装流程;或者,
    当接收到第一终端发起的呼叫请求时,第二终端执行伪装显示流程、人眼识别流程及通话拒绝流程;当人眼识别成功时,终止通话拒绝流程并进入正常通话流程。
  2. 根据权利要求1所述的方法,其中,所述第一终端是指包含在第二终端预设名单中的终端;所述预设名单配置为存储敏感联系人的标识信息。
  3. 根据权利要求1或2所述的方法,其中,所述伪装显示流程,包括:
    在第二终端屏幕上显示来电信息时,隐去第一终端用户的身份信息,并对第一终端用户身份进行伪装提示。
  4. 根据权利要求3所述的方法,其中,所述执行人眼识别流程,包括:
    第二终端启动前置摄像头,采集接听第二终端的用户的第一眼部信息;
    将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果比对成功,确定接听第二终端的用户为合法用户,执行正常的通话流程;
    如果比对不成功,确定接听第二终端的用户为非法用户。
  5. 根据权利要求4所述的方法,其中,所述比对不成功包括以下两种情况:
    第一种情况:第二终端正常采集到第一眼部信息后,在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;
    第二种情况:第二终端无法正常采集到第一眼部信息。
  6. 根据权利要求5所述的方法,其中,所述第一眼部信息包括以下信息中至少其中一种:
    眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色。
  7. 根据权利要求4、或5、或6所述的方法,其中,所述通话伪装流程包括:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音;
    所述通话拒绝流程包括:使接听通话和挂断电话的按键失效。
  8. 一种呼叫处理装置,位于第二终端上,所述装置包括:控制模块、伪装显示模块、人眼识别模块及通话伪装模块及通话拒绝模块;其中,
    所述控制模块,配置为接收到第一终端发起的呼叫请求时,触发伪装显示模块执行伪装显示流程、触发人眼识别模块执行人眼识别流程,并在人眼识别失败且第一终端和第二终端通话建立时,触发通话伪装模块执行通话伪装流程;或者,
    配置为接收到第一终端发起的呼叫请求时,触发伪装显示模块执行伪装显示流程、触发人眼识别模块执行人眼识别流程、触发通话拒绝模块执行通话拒绝流程,并在人眼识别成功时,触发通话拒绝模块终止通话拒绝流程。
  9. 根据权利要求8所述的装置,其中,所述第二终端还包括存储模块,配置为存储预设名单,所述预设名单用于存储敏感联系人的标识信息。
    所述第一终端是指包含在预设名单中的终端。
  10. 根据权利要求8或9所述的装置,其中,所述伪装显示模块,配置为通过以下方式执行伪装显示流程:
    在第二终端屏幕上显示来电信息时,隐去第一终端用户身份信息,并对第一终端用户身份进行伪装提示。
  11. 根据权利要求10所述的装置,其中,所述人眼识别模块,配置为通过以下方式执行人眼识别流程:
    启动前置摄像头,采集接听第二终端的用户的第一眼部信息;
    将采集到的第一眼部信息与本地眼部信息库中的第二眼部信息进行比对,如果比对成功,确定接听第二终端的用户为合法用户;
    如果比对不成功,确定接听第二终端的用户为非法用户。
  12. 根据权利要求11所述的装置,其中,所述比对不成功包括以下两种情况:
    第一种情况:人眼识别模块正常采集到第一眼部信息后,在本地眼部信息库中找不到与第一眼部信息相匹配的第二眼部信息;
    第二种情况:人眼识别模块无法正常采集到第一眼部信息。
  13. 根据权利要求11所述的装置,其中,所述第一眼部信息包括以下信息中至少其中一种:
    眼球颜色、眼纹形状、眼纹脉络粗细、眼部血管形状及眼部血管颜色。
  14. 根据权利要求11、或12、或13所述的装置,其中,所述通话伪装模块,配置为通过以下方式执行通话伪装流程:屏蔽第二终端听筒中的声音,并在第二终端听筒中返回伪装提示音。
  15. 根据权利要求11、或12、或13所述的装置,其中,所述通话拒绝模块,配置为通过以下方式执行通话拒绝流程:使接听通话和挂断电话的按键失效。
PCT/CN2015/085275 2015-01-28 2015-07-28 一种呼叫处理方法和装置 WO2016119419A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510043060.6A CN105991813A (zh) 2015-01-28 2015-01-28 一种呼叫处理方法和装置
CN201510043060.6 2015-01-28

Publications (1)

Publication Number Publication Date
WO2016119419A1 true WO2016119419A1 (zh) 2016-08-04

Family

ID=56542295

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085275 WO2016119419A1 (zh) 2015-01-28 2015-07-28 一种呼叫处理方法和装置

Country Status (2)

Country Link
CN (1) CN105991813A (zh)
WO (1) WO2016119419A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534586A (zh) * 2016-12-19 2017-03-22 北京奇虎科技有限公司 移动终端及其联系人信息处理方法和装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895609A (zh) * 2010-07-22 2010-11-24 宇龙计算机通信科技(深圳)有限公司 一种显示私密联系人来电的方法及装置
CN102843472A (zh) * 2012-08-23 2012-12-26 百度在线网络技术(北京)有限公司 移动终端及用于其的来电锁屏方法
CN102946601A (zh) * 2012-11-27 2013-02-27 广东欧珀移动通信有限公司 一种手机及其私密通信管理方法
CN103167092A (zh) * 2013-03-06 2013-06-19 广东欧珀移动通信有限公司 一种通过指纹识别技术选择手机接听人的模块及方法
CN103455737A (zh) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 用户信息的保护方法及装置
CN104333662A (zh) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 一种移动终端及其电话接听的加密方法和装置
CN104468988A (zh) * 2014-11-20 2015-03-25 深圳市中兴移动通信有限公司 一种移动终端及其在非安全模式下的电话接听方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005022462A1 (ja) * 2003-09-01 2005-03-10 Matsushita Electric Industrial Co., Ltd. 使用者認証機能付き電子機器
CN103401987B (zh) * 2013-08-13 2016-06-08 广东欧珀移动通信有限公司 一种移动终端来电接听隐私保护方法及系统
CN104268455A (zh) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 一种移动终端及其信息保护的方法和装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895609A (zh) * 2010-07-22 2010-11-24 宇龙计算机通信科技(深圳)有限公司 一种显示私密联系人来电的方法及装置
CN103455737A (zh) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 用户信息的保护方法及装置
CN102843472A (zh) * 2012-08-23 2012-12-26 百度在线网络技术(北京)有限公司 移动终端及用于其的来电锁屏方法
CN102946601A (zh) * 2012-11-27 2013-02-27 广东欧珀移动通信有限公司 一种手机及其私密通信管理方法
CN103167092A (zh) * 2013-03-06 2013-06-19 广东欧珀移动通信有限公司 一种通过指纹识别技术选择手机接听人的模块及方法
CN104333662A (zh) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 一种移动终端及其电话接听的加密方法和装置
CN104468988A (zh) * 2014-11-20 2015-03-25 深圳市中兴移动通信有限公司 一种移动终端及其在非安全模式下的电话接听方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534586A (zh) * 2016-12-19 2017-03-22 北京奇虎科技有限公司 移动终端及其联系人信息处理方法和装置
CN106534586B (zh) * 2016-12-19 2019-05-31 北京安云世纪科技有限公司 移动终端及其联系人信息处理方法和装置

Also Published As

Publication number Publication date
CN105991813A (zh) 2016-10-05

Similar Documents

Publication Publication Date Title
CN104580646B (zh) 一种语音留言的传输方法及终端
CN105472126B (zh) 通话保密控制方法和装置及移动终端
TW200826624A (en) Methods and systems for screening incoming calls, and machine readable medium thereof
CN105554223B (zh) 一种建立连接的方法及移动终端
CN106101410A (zh) 一种通话处理方法、装置和设备
CN108696641B (zh) 通话提示方法、装置、存储介质及移动终端
WO2019184312A1 (zh) 一种隐蔽式手机指纹识别报警系统和报警方法
WO2017008378A1 (zh) 信息提示方法、装置及终端
CN103647882B (zh) 针对通信中陌生号码的处理方法、系统以及设备
WO2016145890A1 (zh) 终端来电的处理方法及装置
CN105472093B (zh) 移动终端通话接听鉴权方法及移动终端
CN106657547A (zh) 一种防止骚扰电话的方法及系统
CN102547616A (zh) 礼貌挂机业务系统及挂机方法
CN104320529A (zh) 一种信息接收处理方法及语音通信设备
CN107864270A (zh) 一种处理来电的方法、终端及计算机可读存储介质
CN106936969A (zh) 智能来电处理方法及系统
JP2009502101A (ja) 音声呼のワーピングを行うための方法およびシステム
WO2016119419A1 (zh) 一种呼叫处理方法和装置
WO2021164314A1 (zh) 通知提示方法、服务器及存储介质
JP2010212860A (ja) メッセージ送信システム
JP7349281B2 (ja) 制御装置および制御装置の制御方法
CN107911527A (zh) 一种信息保护方法、终端设备及计算机可读存储介质
CN106034295A (zh) 通信业务处理方法、系统和支持可穿戴设备通信的系统
CN104902107B (zh) 将来电伪装成去电的方法及装置
JP2014150375A (ja) 通信端末

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15879618

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15879618

Country of ref document: EP

Kind code of ref document: A1