WO2020063771A1 - 来电处理方法、移动终端和计算机可读存储介质 - Google Patents

来电处理方法、移动终端和计算机可读存储介质 Download PDF

Info

Publication number
WO2020063771A1
WO2020063771A1 PCT/CN2019/108226 CN2019108226W WO2020063771A1 WO 2020063771 A1 WO2020063771 A1 WO 2020063771A1 CN 2019108226 W CN2019108226 W CN 2019108226W WO 2020063771 A1 WO2020063771 A1 WO 2020063771A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
incoming call
biometric information
information
verification result
Prior art date
Application number
PCT/CN2019/108226
Other languages
English (en)
French (fr)
Inventor
李春林
燕立杰
Original Assignee
奇酷互联网络科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 奇酷互联网络科技(深圳)有限公司 filed Critical 奇酷互联网络科技(深圳)有限公司
Publication of WO2020063771A1 publication Critical patent/WO2020063771A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • H04M19/047Vibrating means for incoming calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Definitions

  • the present application relates to the field of communication technologies, and in particular, to an incoming call processing method, a mobile terminal, and a computer-readable storage medium.
  • smart devices can be described as a contemporary boom. Due to their portability and the basic communication functions of answering and making calls, smart devices have facilitated people's lives.
  • the answering interface for answering a call will pop up in the current display screen, and the user can perform a sliding operation or a tap operation on the answering interface to answer the call.
  • answering a call can be achieved by directly operating the smart device, once the smart device is lost, the user who is not a smart device can also answer the call. There may be a significant loss of important calls or information leakage.
  • the privacy of the user is leaked
  • the risk is that the current use of smart devices to answer incoming calls has low security.
  • the user's hands are busy when receiving a call, the user needs to perform a sliding operation or a tap operation on the answering interface of the smart device to Answering a call will cause great inconvenience to the user.
  • the existing use of smart devices to answer incoming calls also relies on the user's manual operation, which has low intelligence.
  • the main purpose of this application is to provide an incoming call processing method, a mobile terminal, and a computer-readable storage medium, which are intended to solve the problems of low security and low intelligence when using an intelligent device to answer incoming calls.
  • this application provides a method for processing incoming calls, including:
  • the first mobile terminal determines whether an incoming call is received
  • the method before the step of collecting the first biometric information of the current user, the method includes:
  • Determining whether the heart rate data is within a range of standard heart rate data in a normal sleep state wherein the first mobile terminal stores in advance standard heart rate data in a normal sleep state;
  • the function of rejecting an incoming call is turned on, and a corresponding information reply is sent to the incoming call number corresponding to the incoming call, otherwise a first collection instruction for collecting the first biometric information of the current user is generated.
  • the method further comprises:
  • the method includes:
  • Obtaining personal information of a specified user wherein the personal information includes gender information and age information;
  • the method before the step of collecting the first biometric information of the current user, the method includes:
  • Judging attributes of an incoming call number corresponding to the incoming call wherein the attributes include a black list and a white list;
  • the rejected call function is automatically enabled
  • a second collection instruction for collecting the first biometric information of the current user is generated.
  • the step of verifying the first biometric information to obtain a first verification result includes:
  • the designated biometric information includes at least one of biometric information of a user to which the first mobile terminal belongs and biometric information of a user authorized by the user to which the first mobile terminal belongs.
  • the method further includes:
  • the method further includes:
  • the first verification result is a verification pass
  • the step of performing an operation corresponding to the first verification result on the incoming call according to the first verification result includes:
  • the step of sending the answering AT command to a pre-bound connection second mobile terminal includes:
  • the first verification result is that the verification fails
  • the step of performing an operation corresponding to the first verification result on the incoming call according to the first verification result includes:
  • the method before the step of collecting the first biometric information of the current user, the method includes:
  • the process of the incoming call is intercepted by a hook technology.
  • the present application also provides a mobile terminal, which includes a memory and a processor.
  • the memory stores a computer program
  • the processor implements the steps of the foregoing method when the processor executes the computer program.
  • the mobile terminal is provided with a Bluetooth communication circuit connected to the processor, and the processor is configured to control the Bluetooth communication circuit to establish a binding connection with another mobile terminal having an automatic answering call function.
  • the present application also provides a computer-readable computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the foregoing method are implemented.
  • the call processing method, mobile terminal, and computer-readable storage medium provided in this application.
  • the first mobile terminal determines whether an incoming call is received; if so, collects first biometric information of the current user; and verifies the first biometric information, To obtain a first verification result; and perform an operation corresponding to the first verification result on the incoming call according to the first verification result.
  • Performing operations corresponding to the first verification result intelligently according to the first verification result ensures the security and privacy of user information, simplifies the user's operation, and improves the user experience.
  • FIG. 1 is a schematic flowchart of an incoming call processing method according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of an incoming call processing method according to another embodiment of the present application.
  • FIG. 3 is a schematic flowchart of an incoming call processing method according to another embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
  • an incoming call processing method includes:
  • S1 The first mobile terminal determines whether an incoming call is received
  • S4 Perform an operation corresponding to the first verification result on the incoming call according to the first verification result.
  • the first mobile terminal when an incoming call is monitored, the first mobile terminal first intercepts the incoming call, so that the first mobile terminal does not perform the original process of answering the incoming call, but enters the collection of the current user.
  • the first mobile terminal intercepts the incoming call by using a hook technology, which is a mechanism for implementing a similar interruption under the Windows platform. Hook technology allows applications to intercept and process Windows messages or specified events. After a specified message is sent out, it can be captured by the hook technology before it reaches the target window, thereby gaining control of the message, which can then be performed on the message. Process or modify, add required features.
  • the hook technology used in this embodiment refers to intercepting a system or process call to an API function, so that the execution flow of the API is transferred to a specified code segment, thereby realizing the required function.
  • the hook technology is used for the above-mentioned
  • the process of the received incoming call is intercepted, so as to implement the process of receiving or hanging up the original call of the first mobile terminal to the designated process of collecting the first biometric information of the current user.
  • the step of verifying the first biometric information is specifically to perform a one-to-one analysis on the collected first biometric information of the user and the designated biometric information stored in the first mobile terminal in advance.
  • the pre-stored designated biometric information may be biometric information of a user to which the first mobile terminal belongs, or biometric information of a user authorized by the user to which the first mobile terminal belongs, and the number may be one or more.
  • the aforementioned first biometric feature characteristics are the same as any of the aforementioned biometric information features, it indicates that the user's first biometric information has passed verification ;
  • the first biometric information of the user is different from all the biometric information in all the specified biometric information, it indicates that the first biometric information of the user has not passed verification.
  • the first verification result may be verified, that is, the first biometric information of the user is verified, indicating that the user has the authority to operate the first mobile terminal, so that the first mobile terminal may
  • the incoming call automatically performs the corresponding operation, that is, the incoming call is automatically answered, and the above-mentioned user is not required to perform a related telephone operation instruction, for example, the user clicks the answer call button.
  • the method for the first terminal to automatically answer the incoming call may include: if the first mobile terminal is a mobile terminal with an automatic answering function, such as a smartphone, after the first mobile terminal successfully enables the automatic answering function When it is determined that the first verification result is that the verification is passed, the first mobile terminal will perform an automatic answering action on the incoming call; or if the first mobile terminal itself is a mobile terminal that does not have the function of automatically answering incoming calls, and the first mobile A binding connection is established between the terminal and a second mobile terminal having the function of automatically answering incoming calls.
  • the first mobile terminal is a smart watch and the second mobile terminal is a smart phone.
  • the first A mobile terminal When it is determined that the first verification result is passed, the first A mobile terminal first calls the answering AT command in the standard AT instruction set, and then sends the answering AT command to the second mobile terminal to control the second mobile terminal to automatically answer the incoming call, thereby indirectly implementing the first mobile terminal. Answer the call automatically.
  • the first verification result is that the verification fails, that is, the first biometric information of the user fails to pass the verification, it indicates that the user does not have permission to operate the first mobile terminal, so the first mobile terminal will not respond to the incoming call. Carry out corresponding processing or response to avoid the leakage of the privacy of the user of the first mobile terminal, such as important calls or information, if the user is not the user of the first mobile terminal or a user authorized by the user of the first mobile terminal.
  • the first mobile terminal may display that the user's identity verification has failed, so please re-verify the interface information reminder.
  • the first mobile terminal determines whether a call is received; if so, collects the first biometric information of the user; verifies the first biometric information to obtain a first verification result; according to the A first verification result, an operation corresponding to the first verification result is performed on the incoming call. The corresponding operation is performed intelligently according to the first verification result, ensuring the security and privacy of user information, simplifying the user's operation, and improving the user experience.
  • step S2 the method includes:
  • S201 Determine whether the heart rate data is within a range of standard heart rate data in a normal sleep state, wherein the first mobile terminal stores pre-stored standard heart rate data in a normal sleep state;
  • the first mobile terminal in this embodiment is a smart device with information processing capabilities, such as a smart watch.
  • the first mobile terminal also has reminders, navigation, calibration, and monitoring (such as monitoring One or more functions of the user's heart rate), interaction, etc.
  • the user can record real-time data such as exercise, sleep, part and diet in daily life, and use these data with mobile phones and tablets Synchronization of ipodtouch plays a role in guiding healthy life through data.
  • the invention can detect the user's heart rate data in real time through the first mobile terminal with a heart rate monitoring function, and store and analyze the heart rate data.
  • the first mobile terminal stores standard heart rate data in a normal sleep state in advance, and can compare whether the user's heart rate data obtained in real-time detection with the above standard heart rate data can determine whether the user is Sleeping.
  • the heart rate of a person in sleep is significantly lower than that of a non-sleep state.
  • the heart rate of a normal person at rest is about 60-80 beats / min for an adult male; about 70-90 beats / min for an adult female. The heart rate decreases when falling asleep.
  • the first mobile terminal Information and age information to determine the above-mentioned standard heart rate data; assuming the preset duration is 10 minutes, the above-mentioned standard heart rate data is 60-80 times / min, and the first mobile terminal detects that the user's heart rate data is 70 times / min, and is receiving Within the next 10 minutes, the value of the heart rate data is in the range of 60-80 times / min, the first mobile terminal determines that the user enters the sleep state, and automatically turns on the rejection of the incoming call function to prevent the user from being affected by the incoming call during the sleep process.
  • the first mobile terminal After determining that the user is in a sleep state, after the first mobile terminal rejects an incoming call, the first mobile terminal will send a corresponding message reply to the incoming call number corresponding to the incoming call, such as "I am sleeping and rest, please contact me later if there is something."
  • the specific content of the message is not limited, the purpose is to make the caller understand the reason for the rejection, to prevent the situation where the family calls and cannot be connected, causing the family to worry.
  • the first mobile terminal determines that the user is in a non-sleep state (active state or working state, etc.), then Automatically turn off the function of rejecting incoming calls to prevent users from missing important calls, and generate a collection instruction to collect the first biometric information of the current user to complete the identity verification of the user, and the first mobile terminal will then according to the identity verification result To automatically perform the corresponding action on the incoming call.
  • a non-sleep state active state or working state, etc.
  • the method before step S200, the method includes:
  • S2000 Obtain personal information of a specified user, where the personal information includes gender information and age information;
  • S2001 determine the standard heart rate data in a normal sleep state corresponding to the gender information and age information according to the gender information and age information;
  • the first mobile terminal first obtains personal information of a designated user, where the designated user refers to a user to which the first mobile terminal belongs, and the personal information includes gender information and age information, and can be obtained in the following manner: Enter the gender information and age information into the first mobile terminal by itself, or the first mobile terminal directly queries the application program that records the user's gender information and age information to obtain it.
  • the first mobile terminal may determine the standard heart rate data in a normal sleep state corresponding to the gender information and age information through a network query. For example, if the user ’s gender As a male, aged 30, the standard heart rate data of a 30-year-old male under normal sleep conditions can be determined to be 50-70 beats / min.
  • the first mobile terminal downloads the standard heart rate data and stores the standard heart rate data in the first mobile terminal to facilitate The subsequent comparison is to determine whether the current user is in a sleep state by comparing the heart rate data of the user obtained in real time with the above standard heart rate data. If the current user is in a sleep state, the first mobile terminal will intelligently turn on the rejection. The function of answering an incoming call, and sending a corresponding information reply to the incoming call number corresponding to the incoming call, so that the caller understands that the reason why the incoming call is rejected is that the user is currently in a sleep state. By intelligently turning on the function of rejecting a call when the current user is in a sleep state, the user is effectively prevented from being disturbed by the call during the sleep process, affecting the rest of the user, and ensuring the user experience.
  • step S2 the method includes:
  • S210 Determine the attributes of the incoming call number corresponding to the incoming call, where the attributes include a black list and a white list;
  • all the phone numbers in the first mobile terminal are divided into attributes in advance, and are divided into two categories: blacklist and whitelist.
  • blacklist the user can set a blacklist according to his needs, such as harassing some people. Calls, scam calls, stranger calls are set to blacklist, and the remaining phone numbers that are not in the blacklist are automatically classified as whitelists, or the blacklist can also be obtained from the server, such as harassing calls and scam calls counted by the server Waiting for a call can be added to the blacklist.
  • the first mobile terminal determines that the special incoming call is the aforementioned harassing or fraudulent call through its own number recognition function, The special call is classified as a blacklist; if the special call is not among the harassing or fraudulent calls described above, the special call is classified as a whitelist.
  • the first mobile terminal receives an incoming call, it will first determine the attributes of the incoming call number corresponding to the incoming call, that is, determine whether the above-mentioned phone number belongs to the white list or the black list.
  • the phone number belongs to the white list, it will generate a collection current The user's biometric information collection instruction, so that the current user enters his first biometric information into the first mobile terminal; if the phone number belongs to a blacklist, the first mobile terminal will automatically turn on the function of rejecting incoming calls, Reject the call to avoid interference with the incoming call numbers belonging to the blacklist to the user, ensure the user experience, and prevent the user from being deceived, resulting in property damage.
  • step S3 includes:
  • S301 Determine whether there is the specified biometric information with a similarity with the first biometric information greater than a preset threshold
  • the user's designated biometric information is stored in the first mobile terminal in advance, and the category of the designated biometric information may include: fingerprint feature information, human eye iris feature information, Voiceprint feature information.
  • a similarity threshold is set in advance for judging the degree of similarity, and the similarity comparison between the collected first biometric information of the user and the specified biometric information stored in the first mobile terminal in advance is performed.
  • the similarity of the biometric information is greater than the specified biometric information of the preset threshold, it can be determined that the collected first biometric information and the designated biometric information belong to the same user, that is, the first verification result is verified, and the current user Has the authority to operate the first mobile terminal; if there is no specified biometric information with a similarity to the first biometric information greater than a preset threshold, the first verification result is that the verification fails, and the current user does not have the ability to operate the first Mobile terminal permissions.
  • the categories of the specified biometric information include: fingerprint feature information, human eye iris feature information, and voiceprint feature information. Further, different pre-stored categories of the specified biometric information are respectively set with different similarity thresholds.
  • a first similarity threshold corresponding to the fingerprint characteristic information is set; if specified
  • the biometric information is human eye iris feature information, and a second similarity threshold value corresponding to the human eye iris feature information is set; if the biometric information is designated as voiceprint feature information, a third corresponding to the voiceprint feature information is set.
  • Three similarity thresholds For example, the collected first biometric information A is the human eye iris feature information, and the second similarity threshold is 0.95. If there is a designated human eye iris with a similarity to A of 0.96 in the first mobile terminal, Feature information B, then A and B can be regarded as human eye iris feature information of the same user.
  • the first verification result is that the verification is successful
  • the above step S4 includes:
  • S401 Send the answer AT command to a second mobile terminal that is pre-bound, so that the second mobile terminal performs automatic answering of the incoming call.
  • AT is Attention
  • the AT instruction set is sent from a terminal equipment (Terminal Equipment, TE) or a data terminal equipment (DataTerminal Equipment, DTE) to a terminal adapter (TA) or a data circuit terminal equipment AT (DataCircuitTerminalEquipment, DCE) of.
  • TA terminal adapter
  • AT DataCircuitTerminalEquipment
  • MS MobileStation
  • the first mobile terminal itself is a mobile terminal that does not have a function to automatically answer incoming calls.
  • the first mobile terminal may be a smart watch, and the first mobile terminal and a second mobile terminal that has a function to automatically answer incoming calls A binding connection is established between them, and the second mobile terminal is a smartphone.
  • the first mobile terminal verifies the collected first biometric information of the current user, it is found that the first biometric information matches the specified biometric information stored in the first mobile terminal in advance, that is, the verification is passed.
  • the first verification result the first mobile terminal will call the answer AT command in the standard AT instruction set.
  • the answer AT command may also be called an ATA command, and sends the ATA command to the first mobile terminal bound to the first mobile terminal.
  • the binding connection between the first mobile terminal and the second mobile terminal means that the first mobile terminal and the mobile terminal have established a Bluetooth pairing connection, that is, the above-mentioned second mobile terminal will perform a Bluetooth search after enabling the Bluetooth function, and click the pairing required The first mobile terminal to complete the pairing connection.
  • the first mobile terminal can synchronously receive an incoming call from the mobile terminal.
  • the specific second mobile terminal opens the voice channel to automatically answer the current incoming call, which can be implemented in the prior art, and will not be repeated here.
  • the first mobile terminal After the collected first biometrics of the current user pass the verification, that is, after confirming that the current user has the authority to operate the first mobile terminal, by calling the standard AT instruction set to answer the AT command, the first mobile terminal responds to the incoming call.
  • Automatic answering that is, by controlling the second mobile terminal to automatically answer the incoming call, it is helpful to intelligently help the user answer the call, and
  • the user does not need to perform related answering operations, for example, the user does not need to click the answering call button, which improves the user experience.
  • step S401 the method includes:
  • S402 Determine whether the second biometric information of the current user is obtained
  • S405 Send the hang up AT command to the second mobile terminal, so that the second mobile terminal performs automatic hang up on the incoming call.
  • the first mobile terminal when the first mobile terminal sends an answering AT command to the mobile terminal to which the connection is connected to realize automatic answering of the incoming call, it indicates that the user is currently in a call process.
  • the first mobile terminal if the first mobile terminal obtains the user's current second biometric information, the first mobile terminal will verify the second biometric information to obtain a second verification result, and according to the second verification result To identify whether the user currently needs to hang up the call.
  • the verification of the second biometric information is specifically a one-to-one matching comparison between the second biometric information and the specified biometric information stored in the first mobile terminal in advance.
  • the first mobile The terminal will call the hang up AT command in the standard AT instruction set.
  • the hang up AT command may also be referred to as the ATH command, and sends the ATH command to the mobile terminal bound to the first mobile terminal.
  • the ATH command performs parsing and closes the voice channel based on the parsing result to perform automatic hangup on the current call.
  • the mobile terminal After the collected second biometrics of the current user pass the verification, that is, after confirming that the current user has the authority to operate the first mobile terminal, by calling the standard AT instruction set to hang up the AT command, the mobile terminal automatically triggers the incoming call.
  • Hang up intelligently help users hang up the phone without requiring the user to perform related hang up operations, for example, the user does not need to click the hang up button, which improves the user experience.
  • the first verification result is that the verification fails
  • the above step S4 includes:
  • S411 Determine whether the number of times that the verification fails is greater than a preset number
  • the first mobile terminal collects the user's biometric information multiple times within a certain period of time and correspondingly performs multiple verification operations, but the verification results obtained are all verification failures, set one in advance
  • the preset number of times is obtained by comparing the number of failed verifications obtained with the preset number of times. If the number of failed verifications is greater than the preset number of times, the first mobile terminal determines that the user is not the user to which the first mobile terminal belongs or Not a user authorized by the user to which the first mobile terminal belongs.
  • the first mobile terminal is in the hands of a stranger. The first mobile terminal may be stolen by a thief, and the call information may be leaked.
  • the first mobile terminal may An alarm reminder message is sent to the third mobile terminal that is paired with Bluetooth.
  • the third mobile terminal in this embodiment may be the same terminal as the second mobile terminal described above, or may not be the same terminal.
  • the above alert reminder information carries the current geographic location information of the first mobile terminal, so that the user to which the third mobile terminal belongs knows that the first mobile terminal is being used by a stranger, and the first mobile terminal may be lost. The user to which the third mobile terminal belongs can quickly retrieve the first mobile terminal with the help of the police through the current geographic location information of the first mobile terminal.
  • an embodiment of the present application further provides a mobile terminal.
  • the mobile terminal may be a server, and its internal structure may be as shown in FIG. 4.
  • the mobile terminal includes a processor, a memory, a network interface, and a database connected through a system bus.
  • the processor designed by the mobile terminal is used to provide computing and control capabilities.
  • the memory of the mobile terminal includes a non-volatile computer-readable storage medium and an internal memory.
  • the non-volatile computer-readable storage medium stores an operating system, a computer program, and a database.
  • the internal memory provides an environment for running an operating system and computer programs in a non-volatile computer-readable storage medium.
  • the database of the mobile terminal is used to store data such as call processing.
  • the network interface of the mobile terminal is used to communicate with an external terminal through a network connection.
  • the computer program is executed by a processor to implement an application program accelerated startup method.
  • the above processor executes the steps of the above incoming call processing method:
  • the first mobile terminal determines whether an incoming call is received
  • FIG. 4 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the mobile terminal to which the solution of the present application is applied.
  • An embodiment of the present application further provides a computer-readable storage medium having a computer program stored thereon. When the computer program is executed by a processor, a method for processing an incoming call is specifically provided:
  • the first mobile terminal determines whether an incoming call is received
  • the first mobile terminal determines whether an incoming call is received; if so, collects first biometric information of the current user; The feature information is verified to obtain a first verification result. According to the first verification result, an operation corresponding to the first verification result is performed on the incoming call. Performing operations corresponding to the first verification result intelligently according to the first verification result guarantees the security and privacy of user information, simplifies user operations, and improves user experience.
  • the computer program can be stored with a non-volatile computer-readable storage.
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM is available in various forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual-speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • SDRAM dual-speed data rate SDRAM
  • SSRSDRAM dual-speed data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous Link (Synchlink) DRAM
  • SLDRAM synchronous Link (Synchlink) DRAM
  • Rambus direct RAM
  • DRAM direct memory bus dynamic RAM
  • RDRAM memory bus dynamic RAM

Abstract

本申请揭示了一种来电处理方法、移动终端和计算机可读存储介质,其中方法包括:第一移动终端判断是否接收到来电;若是,采集当前用户的第一生物特征信息;对所述第一生物特征信息进行验证,以得到第一验证结果;根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。根据第一验证结果来智能地执行与第一验证结果相对应的操作,保证了用户信息的安全性和隐私性,也简化了用户的操作,提高了用户体验。

Description

来电处理方法、移动终端和计算机可读存储介质 【技术领域】
本申请涉及通信技术领域,具体涉及一种来电处理方法、移动终端和计算机可读存储介质。
【背景技术】
随着科技的发展,智能设备可谓是当代的一股热潮,智能设备由于其便携性,以及具有的接听电话、拨打电话的基本通信功能,方便了人们的生活。
在实际应用中,当智能设备接收到来电时,会在当前显示屏幕中弹出接听电话的接听界面,用户可以在接听界面进行滑动操作或点击操作以接听电话。由于接听电话可以通过直接操作智能设备来实现,一旦出现智能设备丢失的情况,非智能设备所属用户也可接听来电,可能出现重要来电或信息泄漏而导致重大损失的情况,用户的隐私存在泄露的风险,现有的使用智能设备接听来电的安全性低,另外,假如在接收到来电时,用户的双手都处于忙碌状态时,而用户却需要在智能设备的接听界面进行滑动操作或点击操作以接听电话,这样会对用户造成极大的不便,现有的使用智能设备接听来电还比较依赖用户的手动操作,智能性低。
可见,现有技术中,使用智能设备接听来电存在安全性低以及智能性低的问题。
【发明内容】
本申请的主要目的为提供一种来电处理方法、移动终端和计算机可读存储介质,旨在解决使用智能设备接听来电存在安全性低以及智能性低的问题。
为实现上述目的,本申请提供了一种来电处理方法,包括:
第一移动终端判断是否接收到来电;
若是,采集当前用户的第一生物特征信息;
对所述第一生物特征信息进行验证,以得到第一验证结果;
根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。
优选地,所述采集当前用户的第一生物特征信息的步骤之前,包括:
实时检测所述当前用户的心率数据;
判断所述心率数据是否处于正常睡眠状态下的标准心率数据的范围之内,其中所述第一移动终端内预先存储有正常睡眠状态下的标准心率数据;
若处于正常睡眠状态下的标准心率数据的范围之内,判断所述心率数据处于正常睡眠状态下的标准心率数据的范围之内的持续时间长度是否超过预设时长;
若超过预设时长,开启拒接来电功能,并向与所述来电对应的来电号码发送相应的信息回复,否则生成采集当前用户的所述第一生物特征信息的第一采集指令。
优选地,所述方法还包括:
在所述开启拒接来电功能后的预设时间内,若检测到所述当前用户的心率数据均不在所述标准心率数据的范围之内,则关闭拒接来电功能。优选地,所述实时检测所述当前用户的心率数据的步骤之前,包括:
获取指定用户的个人信息,其中所述个人信息包括性别信息与年龄信息;
根据所述性别信息与年龄信息,确定出与所述性别信息与年龄信息相对应的正常睡眠状态下的所述标准心率数据;
下载并存储所述标准心率数据。
优选地,所述采集当前用户的第一生物特征信息的步骤之前,包括:
判断与所述来电对应的来电号码的属性,其中所述属性包括黑名单和白名单;
若所述来电号码为黑名单,则自动开启拒接来电功能;
若所述来电号码为白名单,则生成采集当前用户的所述第一生物特征信息的第二采集指令。
优选地,所述对所述第一生物特征信息进行验证,以得到第一验证结果的 步骤,包括:
将所述第一生物特征信息分别与预先存储的指定生物特征信息进行相似度比较;
判断是否存在与所述第一生物特征信息的相似度大于预设阈值的所述指定生物特征信息;
若是,则得到所述第一验证结果为验证通过;若否,则得到所述第一验证结果为验证不通过。
优选地,所述指定生物特征信息包括所述第一移动终端所属用户的生物特征信息和所述第一移动终端所属用户授权的用户的生物特征信息中的至少一个。
优选地,所述得到所述第一验证结果为验证不通过之后,还包括:
在所述第一移动终端显示界面信息提醒。
优选地,不同类别的所述指定生物特征信息设置不同的所述预设阈值;在所述判断是否存在与所述第一生物特征信息的相似度大于预设阈值的所述指定生物特征信息之前,所述方法还包括:
获取与所述指定生物特征信息的类别对应的所述预设阈值。
优选地,所述第一验证结果为验证通过,所述根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作的步骤,包括:
调用标准AT指令集中的接听AT命令;
将所述接听AT命令发送至与预绑定连接的第二移动终端,以使得所述第二移动终端对所述来电执行自动接听。
优选地,所述将所述接听AT命令发送至预绑定连接的第二移动终端,以使得所述第二移动终端对所述来电执行自动接听的步骤之后,包括:
判断是否获取到所述当前用户的第二生物特征信息;
若是,对所述第二生物特征信息进行验证,以得到第二验证结果;
若所述第二验证结果为验证通过,调用所述标准AT指令集中的挂断AT命令;
将所述挂断AT命令发送至所述第二移动终端,以使得所述第二移动终端对 所述来电执行自动挂断。
优选地,所述第一验证结果为验证不通过,所述根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作的步骤,包括:
获取在一段预设时间内的验证不通过的次数;
判断所述验证不通过的次数是否大于预设次数;
若是,向预绑定连接的第三移动终端发出警报提醒信息,其中所述警报提醒信息携带有所述第一移动终端当前的地理位置信息
优选地,所述采集当前用户的第一生物特征信息的步骤之前,包括:
通过钩子技术对所述来电的进程进行拦截。
本申请还提供一种移动终端,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器执行所述计算机程序时实现上述方法的步骤。
优选地,所述移动终端设有与所述处理器连接的蓝牙通信电路,所述处理器用于控制所述蓝牙通信电路以与具有自动接听来电功能的另一移动终端建立绑定连接。本申请还提供一种计算机可读计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述方法的步骤。
本申请提供的来电处理方法、移动终端和计算机可读存储介质,第一移动终端判断是否接收到来电;若是,采集当前用户的第一生物特征信息;对所述第一生物特征信息进行验证,以得到第一验证结果;根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。根据第一验证结果来智能地执行与第一验证结果相对应的操作,保证了用户信息的安全性和隐私性,也简化了用户的操作,提高了用户体验。
【附图说明】
图1是本申请一实施例的来电处理方法的流程示意图;
图2是本申请另一实施例的来电处理方法的流程示意图;
图3是本申请又一实施例的来电处理方法的流程示意图;
图4是本申请一实施例的移动终端的结构示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
【具体实施方式】
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明,本申请实施例中所有方向性指示(诸如上、下、左、右、前、后……)仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变,所述的连接可以是直接连接,也可以是间接连接。
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
参照图1,本申请一实施例的来电处理方法,包括:
S1:第一移动终端判断是否接收到来电;
S2:若是,采集当前用户的第一生物特征信息;
S3:对所述第一生物特征信息进行验证,以得到第一验证结果;
S4:根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。
如上述步骤S1和S2所述,当监听到有来电接入时,第一移动终端先会对该来电进行拦截,使得第一移动终端不执行原始的接听来电的流程,而进入采集当前用户的第一生物特征信息的流程。其中,第一移动终端是通过钩子技术对该来电进行拦截的,钩子技术是一种实现Windows平台下类似于中断的机制。钩子技术允许应用程序拦截并处理Windows消息或指定事件,当指定的消息发出后,通过钩子技术就可以在消息到达目标窗口之前将其捕获,从而得到对消息的控制权,进而可以对该消息进行处理或修改,加入所需的功能。在本实施 例采用到的钩子技术,是指截获系统或进程对某个API函数的调用,使得API的执行流程转向指定的代码段,从而实现所需的功能,具体地,通过钩子技术对上述接收到的来电进程进行拦截,以实现将第一移动终端原本的接听或挂断来电的进程转向采集当前用户的第一生物特征信息的指定流程。
如上述步骤S3所述,对所述第一生物特征信息进行验证的步骤,具体为将采集得到的用户的第一生物特征信息与预先存储在第一移动终端内的指定生物特征信息进行一一匹配比对,预先存储的指定生物特征信息可以为第一移动终端所属用户的生物特征信息,也可以为第一移动终端所属用户授权的用户的生物特征信息,数量可以为一个或多个。当预先存储的指定生物特征信息特征为多个时,只要上述第一生物特征信息特征特征与上述指定生物特征信息中的任一生物特征信息特征相同,则表明用户的第一生物特征信息通过验证;当用户的第一生物特征信息与所有的指定生物特征信息内的所有生物特征信息均不相同,则表明用户的第一生物特征信息未通过验证。
如上述步骤S4所述,第一验证结果可为验证通过,即上述用户的第一生物特征信息通过验证,表明上述用户具有对第一移动终端进行操作的权限,从而第一移动终端会对所述来电自动执行相对应的操作,即自动接听该来电,且不需要上述用户进行相关的电话操作指令,例如用户点击接听电话按键。其中,第一终端对该来电执行自动接听的方式可包括:如果第一移动终端为具有自动接听来电的功能的移动终端,例如智能手机,在第一移动终端成功开启了自动接听来电的功能后,当判定第一验证结果为验证通过后,第一移动终端就会对该来电执行自动接听的动作;或者如果第一移动终端本身为不具有自动接听来电的功能的移动终端,且第一移动终端与具有自动接听来电的功能的第二移动终端之间建立了绑定连接,例如第一移动终端为智能手表,第二移动终端为智能手机,当判定第一验证结果为验证通过后,第一移动终端会先对标准AT指令集中的接听AT命令进行调用,然后将该接听AT命令发送到第二移动终端,来控制第二移动终端对该来电执行自动接听,从而间接实现第一移动终端对该来电的自动接听。另外,当第一验证结果为验证不通过,即上述用户的第一生物 特征信息没有通过验证,表明上述用户不具有对第一移动终端进行操作的权限,从而第一移动终端不会对上述来电进行对应的处理或响应,避免出现若该用户不是第一移动终端所属用户或者不是第一移动终端所属用户授权的用户,而导致重要来电或信息等第一移动终端所属用户的隐私发生泄漏第一移动终端的情况,提高了用户信息安全性和隐私性。此外,为了提供友好界面,第一移动终端可以显示用户的身份验证未通过,请重新进行验证的界面信息提醒。在本发明实施例中,第一移动终端通过判断是否接收到来电;若是,采集用户的第一生物特征信息;对所述第一生物特征信息进行验证,以得到第一验证结果;根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。根据第一验证结果来智能地执行相对应的操作,保证了用户信息的安全性和隐私性,也简化了用户的操作,提高了用户体验。
进一步地,本申请一实施例中,上述步骤S2之前,包括:
S200:实时检测所述当前用户的心率数据;
S201:判断所述心率数据是否处于正常睡眠状态下的标准心率数据的范围之内,其中所述第一移动终端内预先存储有正常睡眠状态下的标准心率数据;
S202:若处于正常睡眠状态下的标准心率数据的范围之内,判断所述心率数据处于正常睡眠状态下的标准心率数据的范围之内的持续时间长度是否超过预设时长;
S203:若超过预设时长,开启拒接来电功能,并向与所述来电对应的来电号码发送相应的信息回复,否则生成采集所述当前用户的所述第一生物特征信息的第一采集指令。
如上述步骤S200所述,本实施例的第一移动终端是具有信息处理能力的智能设备,例如智能手表,第一移动终端除指示时间之外,还具有提醒、导航、校准、监测(比如监测用户的心率)、交互等其中一种或者多种功能,例如,通过第一移动终端,用户可以记录日常生活中的锻炼、睡眠、部分还有饮食等实时数据,并将这些数据与手机、平板、ipodtouch同步,起到通过数据指导健康生活的作用。本发明通过带心率监测功能的第一移动终端,能实时检测用户的 心率数据,并对上述心率数据进行存储和分析。
如上述步骤S201至S203所述,第一移动终端会预先存储有处于正常睡眠状态下的标准心率数据,通过将实时检测得到的用户的心率数据和上述标准心率数据进行比较,可判断出用户是否处于睡眠状态。人在睡眠状态下的心率会明显低于非睡眠状态,正常人安静时的心率,成年男性约为60-80次/min;成年女性约为70-90次/min,入睡状态时心率减少,男性为50-70次/min;女性为60-70次/min;有的人可低达45-50次/min;婴儿为120-140次/min,可根据第一移动终端所属用户的性别信息和年龄信息来确定出上述标准心率数据;假设预设时长为10min,上述标准心率数据为60-80次/min,第一移动终端检测出用户的心率数据为70次/min,且在接下来的10min内,该心率数据的数值都在60-80次/min的范围之内,则第一移动终端判定用户进入睡眠状态,自动开启拒接来电功能,避免用户在睡眠过程中被来电所打扰,影响用户的休息。并且,当判定用户处于睡眠状态后,第一移动终端在拒接来电后,会向与所述来电对应的来电号码发送相应的信息回复,例如“我正在睡觉休息,有事请迟点再联系”,信息的具体内容不进行限制,目的是使来电者了解到被拒接的原因,防止出现家人打来电话而无法接通,造成家人担心的情况。
进一步地,若在一段预设时间内,检测到的用户的心率数据都不在上述标准心率数据的范围之内,则第一移动终端判定用户处于非睡眠状态(活动状态或者工作状态等),那么自动关闭拒接来电功能,避免用户漏接重要的来电,并且生成采集当前用户的所述第一生物特征信息的采集指令,以完成对用户的身份验证,之后第一移动终端会根据身份验证结果来对来电自动执行相对应的操作。
进一步地,本申请一实施例中,上述步骤S200之前,包括:
S2000:获取指定用户的个人信息,其中所述个人信息包括性别信息与年龄信息;
S2001:根据所述性别信息与年龄信息,确定出与所述性别信息与年龄信息相对应的正常睡眠状态下的所述标准心率数据;
S2002:下载并存储所述标准心率数据。
本实施例中,第一移动终端会先获取指定用户的个人信息,其中,上述指定用户是指第一移动终端所属用户,上述个人信息包括性别信息与年龄信息,获取的方式可为:由用户自行向第一移动终端输入自身的性别信息与年龄信息,或者第一移动终端直接查询记录有用户的性别信息与年龄信息的应用程序来进行获取。根据上述性别信息与年龄信息,第一移动终端可通过网络查询的方式,确定出与所述性别信息与年龄信息相对应的正常睡眠状态下的所述标准心率数据,举例地,若用户的性别为男,年龄为30岁,则可确定出30岁男性在正常睡眠状态下的标准心率数据为50-70次/min。最后,在通过访问网络资源查询出第一移动终端所属用户在正常睡眠状态下的标准心率数据后,第一移动终端会对上述标准心率数据进行下载,并存储于第一移动终端内,以便于后续的比较,即通过将实时检测得到的用户的心率数据和上述标准心率数据进行比较,来判断出当前用户是否处于睡眠状态,若当前用户处于睡眠状态,则第一移动终端会智能地开启拒接来电的功能,并向与所述来电对应的来电号码发送相应的信息回复,使得来电者了解到来电被拒接的原因是用户当前为睡眠状态。通过在当前用户处于睡眠状态时,智能地开启拒接来电的功能,有效地避免了用户在睡眠过程中被来电所打扰,影响用户的休息,保证了用户的使用体验。
进一步地,本申请一实施例中,上述步骤S2之前,包括:
S210:判断与所述来电对应的来电号码的属性,其中所述属性包括黑名单和白名单;
S211:若所述来电号码为黑名单,则自动开启拒接来电功能;
S212:若所述来电号码为白名单,则生成采集所述当前用户的所述第一生物特征信息的第二采集指令。
本实施例中,预先对第一移动终端内的所有的电话号码进行属性划分,划分为黑名单和白名单两个类别,具体地,用户可根据自己的需求来设置黑名单,例如将一些骚扰电话、诈骗电话、陌生人电话设置为黑名单,剩余的不在黑名单内的电话号码则被自动归类为白名单,或者黑名单还可以从服务器获得,比 如由服务器统计的骚扰电话、诈骗电话等电话可以加入该黑名单,另外,对于第一次向第一移动终端拨入的特殊来电,如果第一移动终端通过自带的号码识别功能判别出该特殊来电为上述骚扰电话或诈骗电话,则将该特殊来电归类为黑名单;而如果该特殊来电并不属于上述骚扰电话或诈骗电话,则将该特殊来电归类为白名单。当第一移动终端接收到来电时,会先对与该来电对应的来电号码进行属性的判别,即判断上述电话号码属于白名单还是黑名单,若上述电话号码属于白名单,则会生成采集当前用户的生物特征信息的采集指令,以便当前用户向第一移动终端输入自己的第一生物特征信息;若上述电话号码属于黑名单,则第一移动终端会自动开启拒接来电功能,对上述来电进行拒接,避免属于黑名单的来电号码的来电对用户造成干扰,保证用户的使用体验,也避免用户受骗,导致财产损失。
进一步地,本申请一实施例中,上述步骤S3,包括:
S300:将所述第一生物特征信息分别与所述第一移动终端内的预先存储的指定生物特征信息进行相似度比较;
S301:判断是否存在与所述第一生物特征信息的相似度大于预设阈值的所述指定生物特征信息;
S302:若是,则得到所述第一验证结果为验证通过;若否,则得到所述第一验证结果为验证不通过。
本实施例中,用户在使用本发明实施例之前,在第一移动终端内预先存储有用户的指定生物特征信息,且指定生物特征信息的类别可包括:指纹特征信息、人眼虹膜特征信息、声纹特征信息。预先设置用于判断相似度程度的相似度阈值,通过将采集到的用户的第一生物特征信息与预先存储在第一移动终端内的指定生物特征信息进行相似度比较,若存在与所述第一生物特征信息的相似度大于预设阈值的指定生物特征信息,则可确定采集得到的第一生物特征信息与上述指定生物特征信息属于同一用户,即第一验证结果为验证通过,且当前用户具有操作第一移动终端的权限;若不存在与所述第一生物特征信息的相似度大于预设阈值的指定生物特征信息,则第一验证结果为验证不通过,当前 用户不具有操作第一移动终端的权限。其中,由于所述指定生物特征信息的类别包括:指纹特征信息、人眼虹膜特征信息、声纹特征信息。进一步地,对预存的所述指定生物特征信息的类别分别设置不同的相似度阈值,若指定生物特征信息为指纹特征信息,设置与所述指纹特征信息相对应的第一相似度阈值;若指定生物特征信息为人眼虹膜特征信息,设置与所述人眼虹膜特征信息相对应的第二相似度阈值;若指定生物特征信息为声纹特征信息,设置与所述声纹特征信息相对应的第三相似度阈值。举例地,采集到的为第一生物特征信息A为用户的人眼虹膜特征信息,且第二相似度阈值为0.95,若第一移动终端内存在与A的相似度为0.96的指定人眼虹膜特征信息B,则可将A和B视为同一个用户的人眼虹膜特征信息。
进一步地,本申请一实施例中,上述第一验证结果为验证通过,上述步骤S4,包括:
S400:调用标准AT指令集中的接听AT命令;
S401:将所述接听AT命令发送至预绑定连接的第二移动终端,以使得所述第二移动终端对所述来电执行自动接听。
本实施例中,AT即Attention,AT指令集是从终端设备(TerminalEquipment,TE)或数据终端设备(DataTerminalEquipment,DTE)向终端适配器(TerminalAdapter,TA)或数据电路终端设备AT(DataCircuitTerminalEquipment,DCE)发送的。通过TA,TE发送AT指令来控制移动台(MobileStation,MS)的功能,与GSM网络业务进行交互。在本实施例,第一移动终端本身为不具有自动接听来电的功能的移动终端,例如第一移动终端可为智能手表,且第一移动终端与具有自动接听来电的功能的第二移动终端之间建立了绑定连接,第二移动终端为智能手机。当第一移动终端对采集得到的当前用户的第一生物特征信息进行验证后,得出上述第一生物特征信息与预先存储在第一移动终端内的指定生物特征信息相匹配,即验证通过的第一验证结果,则第一移动终端会调用标准AT指令集中的接听AT命令,接听AT命令也可称为ATA命令,并将该ATA命令发送至与所述第一移动终端绑定连接的第二移动终端,之后第二移动终端 会对该ATA命令进行解析,通过打开语音通道,来对当前来电执行自动接听。其中,第一移动终端与第二移动终端绑定连接是指第一移动终端与移动终端建立了蓝牙配对连接,即上述第二移动终端在开启了蓝牙功能后会进行蓝牙搜索,并点击需要配对的上述第一移动终端来完成配对连接,配对连接成功之后,上述第一移动终端就能够同步接收到上述移动终端的来电。另外,具体的第二移动终端打开语音通道对当前来电进行自动接听可以采用现有技术的实现方式,此处不再赘述。在采集到的当前用户的第一生物特征通过验证之后,即确认了当前用户具有操作第一移动终端的权限后,通过调用标准AT指令集中的接听AT命令,以触发第一移动终端对来电的自动接听,即通过控制第二移动终端来实现自动接听该来电,有利于智能地帮助用户接听电话,而
不需要用户进行相关的接听电话操作,例如不需要用户点击接听电话按键,提高了用户体验。
进一步地,本申请一实施例中,上述步骤S401之后,包括:
S402:判断是否获取到所述当前用户的第二生物特征信息;
S403:若是,对所述第二生物特征信息进行验证,以得到第二验证结果;
S404:若所述第二验证结果为验证通过,调用所述标准AT指令集中的挂断AT命令;
S405:将所述挂断AT命令发送至所述第二移动终端,以使得所述第二移动终端对所述来电执行自动挂断。
本实施例中,当第一移动终端通过向绑定连接的移动终端发送接听AT命令,以实现了对该来电的自动接听之后,此时表明用户当前处于通话过程中。在通话过程中,如果第一移动终端获取到用户当前的第二生物特征信息,则第一移动终端会对该第二生物特征信息进行验证,来得到第二验证结果,并根据第二验证结果来识别出用户当前是否需要对该来电进行挂断。其中,对该第二生物特征信息进行验证,具体为将该第二生物特征信息与预先存储在第一移动终端内的指定生物特征信息进行一一匹配比对,当匹配成功时,第一移动终端会调用标准AT指令集中的挂断AT命令,挂断AT命令也可称为ATH命令,并将该 ATH命令发送至与所述第一移动终端绑定连接的移动终端,之后移动终端会对该ATH命令进行解析,根据解析结果关闭语音通道,来对当前来电执行自动挂断。在采集到的当前用户的第二生物特征通过验证之后,即确认了当前用户具有操作第一移动终端的权限后,通过调用标准AT指令集中的挂断AT命令,以触发移动终端对来电的自动挂断,智能地帮助用户挂断电话,而不需要用户进行相关的挂断电话操作,例如不需要用户点击挂断电话按键,提高了用户体验。
进一步地,本申请一实施例中,上述第一验证结果为验证不通过,上述步骤S4,包括:
S410:获取在一段预设时间内的验证不通过的次数;
S411:判断所述验证不通过的次数是否大于预设次数;
S412:若是,向预绑定连接的第三移动终端发出警报提醒信息,其中所述警报提醒信息携带有所述第一移动终端当前的地理位置信息。
本实施例中,若在一定时间内,第一移动终端对用户的生物特征信息进行了多次采集,并对应进行了多次验证操作,但得到的验证结果都为验证不通过,预先设置一个预设次数,将获取得到的验证不通过的次数与上述预设次数相比较,如果验证不通过的次数大于上述预设次数,则第一移动终端会判定该用户不是第一移动终端所属用户或者不是第一移动终端所属用户授权的用户,当前存在第一移动终端处于陌生人手中,第一移动终端可能遭到了小偷的盗取,来电信息可能存在被泄露的危险,此时第一移动终端会向蓝牙配对连接的第三移动终端发出警报提醒信息,其中,根据实际应用情况,本实施例的第三移动终端可与上述的第二移动终端为同一个终端,也可以不为同一个终端。另外,上述警报提醒信息携带有所述第一移动终端当前的地理位置信息,以使得第三移动终端所属用户了解第一移动终端正被陌生人使用,且第一移动终端可能出现了丢失的情况,第三移动终端所属用户能通过所述第一移动终端当前的地理位置信息,借助警方的帮助来快速找回第一移动终端。
参照图4,本申请实施例中还提供一种移动终端,该移动终端可以是服务器,其内部结构可以如图4所示。该移动终端包括通过系统总线连接的处理器、存 储器、网络接口和数据库。其中,该移动终端设计的处理器用于提供计算和控制能力。该移动终端的存储器包括非易失性计算机可读存储介质、内存储器。该非易失性计算机可读存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性计算机可读存储介质中的操作系统和计算机程序的运行提供环境。该移动终端的数据库用于存储来电处理等数据。该移动终端的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种应用程序加速启动方法。
上述处理器执行上述来电处理方法的步骤:
第一移动终端判断是否接收到来电;
若是,采集当前用户的第一生物特征信息;
对所述第一生物特征信息进行验证,以得到第一验证结果;
根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。
本领域技术人员可以理解,图4中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的移动终端的限定。本申请一实施例还提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现一种来电处理方法,具体为:
第一移动终端判断是否接收到来电;
若是,采集当前用户的第一生物特征信息;
对所述第一生物特征信息进行验证,以得到第一验证结果;
根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。
综上所述,本申请实施例中提供的来电处理方法、移动终端和存储介质,第一移动终端判断是否接收到来电;若是,采集当前用户的第一生物特征信息;对所述第一生物特征信息进行验证,以得到第一验证结果;根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。根据第一验证结果来智能地执行与第一验证结果相对应的操作,保证了用户信息的安全性和隐私 性,也简化了用户的操作,提高了用户体验。本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储与一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的和实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可以包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM通过多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双速据率SDRAM(SSRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其它变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其它要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、装置、物品或者方法中还存在另外的相同要素。
以上所述仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (16)

  1. 一种来电处理方法,其中,包括:
    第一移动终端判断是否接收到来电;
    若是,采集当前用户的第一生物特征信息;
    对所述第一生物特征信息进行验证,以得到第一验证结果;
    根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作。
  2. 根据权利要求1所述的来电处理方法,其中,所述采集当前用户的第一生物特征信息的步骤之前,包括:
    实时检测所述当前用户的心率数据;
    判断所述心率数据是否处于正常睡眠状态下的标准心率数据的范围之内,其中所述第一移动终端内预先存储有正常睡眠状态下的标准心率数据;
    若处于正常睡眠状态下的标准心率数据的范围之内,判断所述心率数据处于正常睡眠状态下的标准心率数据的范围之内的持续时间长度是否超过预设时长;
    若超过预设时长,开启拒接来电功能,并向与所述来电对应的来电号码发送相应的信息回复,否则生成采集当前用户的所述第一生物特征信息的第一采集指令。
  3. 根据权利要求2所述的来电处理方法,其中,所述方法还包括:
    在所述开启拒接来电功能后的预设时间内,若检测到所述当前用户的心率数据均不在所述标准心率数据的范围之内,则关闭拒接来电功能。
  4. 根据权利要求2所述的来电处理的方法,其中,所述实时检测所述当前用户的心率数据的步骤之前,包括:
    获取指定用户的个人信息,其中所述个人信息包括性别信息与年龄信息;
    根据所述性别信息与年龄信息,确定出与所述性别信息与年龄信息相对应的正常睡眠状态下的所述标准心率数据;
    下载并存储所述标准心率数据。
  5. 根据权利要求1所述的来电处理的方法,其中,所述采集当前用户的第一生物特征信息的步骤之前,包括:
    判断与所述来电对应的来电号码的属性,其中所述属性包括黑名单和白名单;
    若所述来电号码为黑名单,则自动开启拒接来电功能;
    若所述来电号码为白名单,则生成采集当前用户的所述第一生物特征信息的第二采集指令。
  6. 根据权利要求1所述的来电处理的方法,其中,所述对所述第一生物特征信息进行验证,以得到第一验证结果的步骤,包括:
    将所述第一生物特征信息分别与预先存储的指定生物特征信息进行相似度比较;
    判断是否存在与所述第一生物特征信息的相似度大于预设阈值的所述指定生物特征信息;
    若是,则得到所述第一验证结果为验证通过;若否,则得到所述第一验证结果为验证不通过。
  7. 根据权利要求6所述的来电处理方法,其中,所述指定生物特征信息包括所述第一移动终端所属用户的生物特征信息和所述第一移动终端所属用户授权的用户的生物特征信息中的至少一个。
  8. 根据权利要求6所述的来电处理的方法,其中,在所述得到所述第一验证结果为验证不通过之后,还包括:
    所述第一移动终端显示界面信息提醒。
  9. 根据权利要求6所述的来电处理的方法,其中,不同类别的所述指定生物特征信息设置不同的所述预设阈值;在所述判断是否存在与所述第一生物特征信息的相似度大于预设阈值的所述指定生物特征信息之前,所述方法还包括:
    获取与所述指定生物特征信息的类别对应的所述预设阈值。
  10. 根据权利要求6所述的来电处理方法,其中,所述第一验证结果为验证通过,所述根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作的步骤,包括:
    调用标准AT指令集中的接听AT命令;
    将所述接听AT命令发送至预绑定连接的第二移动终端,以使得所述第二移动终端对所述来电执行自动接听。
  11. 根据权利要求10所述的来电处理方法,其中,所述将所述接听AT命令发送至预绑定连接的第二移动终端,以使得所述第二移动终端对所述来电执行自动接听的步骤之后,包括:
    判断是否获取到所述当前用户的第二生物特征信息;
    若是,对所述第二生物特征信息进行验证,以得到第二验证结果;
    若所述第二验证结果为验证通过,调用所述标准AT指令集中的挂断AT命令;
    将所述挂断AT命令发送至所述第二移动终端,以使得所述第二移动终端对所述来电执行自动挂断。
  12. 根据权利要求1所述的来电处理方法,其中,所述第一验证结果为验证不通过,所述根据所述第一验证结果,对所述来电执行与所述第一验证结果相对应的操作的步骤,包括:
    获取在一段预设时间内的验证不通过的次数;
    判断所述验证不通过的次数是否大于预设次数;
    若是,向预绑定连接的第三移动终端发出警报提醒信息,其中所述警报提醒信息携带有所述第一移动终端当前的地理位置信息。
  13. 根据权利要求1所述的来电处理方法,其中,所述采集当前用户的第一生物特征信息的步骤之前,所述方法还包括:
    通过钩子技术对所述来电的进程进行拦截。
  14. 一种移动终端,包括存储器和处理器,所述存储器中存储有计算机程序,其中,所述处理器执行所述计算机程序时实现权利要求1至13中任一项所述方法的步骤。
  15. 根据权利要求14所述的移动终端,其中,所述移动终端设有与所述处理器连接的蓝牙通信电路,所述处理器用于控制所述蓝牙通信电路以与具有自动接听来电功能的另一移动终端建立绑定连接。
  16. 一种计算机可读计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1至13中任一项所述的方法的步骤。
PCT/CN2019/108226 2018-09-30 2019-09-26 来电处理方法、移动终端和计算机可读存储介质 WO2020063771A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811159416.2 2018-09-30
CN201811159416.2A CN109040469A (zh) 2018-09-30 2018-09-30 来电处理方法、移动终端和计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2020063771A1 true WO2020063771A1 (zh) 2020-04-02

Family

ID=64615452

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/108226 WO2020063771A1 (zh) 2018-09-30 2019-09-26 来电处理方法、移动终端和计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN109040469A (zh)
WO (1) WO2020063771A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645346A (zh) * 2021-08-11 2021-11-12 中国联合网络通信集团有限公司 功能触发方法、装置、服务器及计算机可读存储介质
CN113779572A (zh) * 2021-01-14 2021-12-10 中国南方电网有限责任公司 一种基于多计数器的休眠式计算机病毒发现方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040469A (zh) * 2018-09-30 2018-12-18 奇酷互联网络科技(深圳)有限公司 来电处理方法、移动终端和计算机可读存储介质
CN111372252B (zh) * 2020-02-27 2023-01-10 闻泰通讯股份有限公司 安全联网的方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683581A (zh) * 2015-03-04 2015-06-03 广东欧珀移动通信有限公司 一种智能终端通信提醒方法和装置
CN105450851A (zh) * 2015-10-28 2016-03-30 东莞酷派软件技术有限公司 虚拟来电的控制方法、控制装置及移动终端
CN106101410A (zh) * 2016-06-08 2016-11-09 北京奇虎科技有限公司 一种通话处理方法、装置和设备
CN107784234A (zh) * 2016-08-29 2018-03-09 中兴通讯股份有限公司 基于耳纹的隐私识别方法及装置
CN109040469A (zh) * 2018-09-30 2018-12-18 奇酷互联网络科技(深圳)有限公司 来电处理方法、移动终端和计算机可读存储介质

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014036359A2 (en) * 2012-08-30 2014-03-06 Interactive Intelligence, Inc. Method and system for learning call analysis
CN104038612B (zh) * 2013-03-06 2016-12-28 腾讯科技(深圳)有限公司 来电呼叫拦截方法及装置
CN104767883B (zh) * 2015-03-25 2018-03-27 广东欧珀移动通信有限公司 一种终端提示的方法及终端
CN105100461B (zh) * 2015-07-08 2020-05-15 惠州Tcl移动通信有限公司 一种移动终端及其实现自动接听的方法
CN105245742B (zh) * 2015-09-30 2018-07-17 上海斐讯数据通信技术有限公司 一种基于可穿戴设备的电话转接方法及系统
CN105187672A (zh) * 2015-10-30 2015-12-23 宁波萨瑞通讯有限公司 一种来电接听的方法及移动终端
CN105636051B (zh) * 2015-12-18 2019-03-01 北京奇虎科技有限公司 用于智能设备的消息拦截方法及系统
CN106101385B (zh) * 2016-05-27 2019-08-02 宇龙计算机通信科技(深圳)有限公司 通话请求的接入方法、装置及终端
CN107516028B (zh) * 2016-06-15 2021-07-02 原相科技股份有限公司 便携式电子装置及其运作方法
CN106254626A (zh) * 2016-07-18 2016-12-21 深圳市金立通信设备有限公司 一种来电显示方法及终端
CN106302939A (zh) * 2016-07-22 2017-01-04 珠海格力电器股份有限公司 来电接听方法和装置
CN106603817A (zh) * 2016-11-14 2017-04-26 乐视控股(北京)有限公司 来电处理方法、来电处理装置和电子设备
CN107911527A (zh) * 2017-10-11 2018-04-13 深圳市金立通信设备有限公司 一种信息保护方法、终端设备及计算机可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683581A (zh) * 2015-03-04 2015-06-03 广东欧珀移动通信有限公司 一种智能终端通信提醒方法和装置
CN105450851A (zh) * 2015-10-28 2016-03-30 东莞酷派软件技术有限公司 虚拟来电的控制方法、控制装置及移动终端
CN106101410A (zh) * 2016-06-08 2016-11-09 北京奇虎科技有限公司 一种通话处理方法、装置和设备
CN107784234A (zh) * 2016-08-29 2018-03-09 中兴通讯股份有限公司 基于耳纹的隐私识别方法及装置
CN109040469A (zh) * 2018-09-30 2018-12-18 奇酷互联网络科技(深圳)有限公司 来电处理方法、移动终端和计算机可读存储介质

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779572A (zh) * 2021-01-14 2021-12-10 中国南方电网有限责任公司 一种基于多计数器的休眠式计算机病毒发现方法
CN113779572B (zh) * 2021-01-14 2022-12-20 中国南方电网有限责任公司 一种基于多计数器的休眠式计算机病毒发现方法
CN113645346A (zh) * 2021-08-11 2021-11-12 中国联合网络通信集团有限公司 功能触发方法、装置、服务器及计算机可读存储介质

Also Published As

Publication number Publication date
CN109040469A (zh) 2018-12-18

Similar Documents

Publication Publication Date Title
WO2020063771A1 (zh) 来电处理方法、移动终端和计算机可读存储介质
US10313516B2 (en) Dynamic user interface to reduce impact of unwanted calls
CN104850827B (zh) 指纹识别方法及装置
EP3528481A1 (en) Emergency call-for-help method and system based on fingerprint identification for mobile terminal, and mobile terminal
WO2019024603A1 (zh) 终端及儿童模式实现方法、计算机可读存储介质
US8295448B2 (en) Communication system and method
CN108600504B (zh) 一种电子设备和报警控制方法
EP2728918B1 (en) Method for detecting interception behaviour and terminal device
CN109219036B (zh) 解绑设备的方法及装置、电子设备
CN107861773A (zh) 关联启动的管控方法、装置、存储介质及移动终端
KR20180058140A (ko) 도어락제어시스템 및 그 방법
CN105512532A (zh) 一种基于虹膜识别的移动终端屏幕控制处理方法及系统
CN106211164A (zh) 终端网络切换方法、终端网络切换装置及终端
CN113168484A (zh) 鉴权方法、装置及存储介质
CN108052822A (zh) 终端控制方法、装置及系统
CN104580652B (zh) 移动终端及其基于dtmf的会话认证方法
CN106303015A (zh) 一种通信消息的处理方法及装置、终端设备
CN108769366B (zh) 权限管理方法、装置、移动终端及存储介质
CN111107093B (zh) 一种应用登录方法、装置、终端及存储介质
CN113672294A (zh) 工作模式的智能切换方法、装置和计算机设备
WO2018166142A1 (zh) 验证处理方法及装置
CN105554325B (zh) 黑名单号码处理方法及移动终端
CN111554013A (zh) 门禁通行方法、装置、设备和存储介质
CN105577949B (zh) 一种通信方法及通信设备
CN105451233B (zh) 一种反监听的方法、系统及移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19865444

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19865444

Country of ref document: EP

Kind code of ref document: A1