WO2020135393A1 - Nuisance call prevention method and device, terminal, and storage medium - Google Patents

Nuisance call prevention method and device, terminal, and storage medium Download PDF

Info

Publication number
WO2020135393A1
WO2020135393A1 PCT/CN2019/127804 CN2019127804W WO2020135393A1 WO 2020135393 A1 WO2020135393 A1 WO 2020135393A1 CN 2019127804 W CN2019127804 W CN 2019127804W WO 2020135393 A1 WO2020135393 A1 WO 2020135393A1
Authority
WO
WIPO (PCT)
Prior art keywords
mark
terminal
marking
data set
node
Prior art date
Application number
PCT/CN2019/127804
Other languages
French (fr)
Chinese (zh)
Inventor
刘建敏
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020135393A1 publication Critical patent/WO2020135393A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • Embodiments of the present disclosure relate to, but are not limited to, the field of communication technology.
  • Blockchain is a way of storing data in cryptocurrencies such as Bitcoin. It is a self-referencing data structure and is used to store large amounts of transaction information. Each record is linked in an orderly manner from back to front, with the characteristics of openness, transparency, tampering, and easy traceability.
  • the concept of blockchain comes from the realization of cryptocurrencies such as Bitcoin. At present, this technology has been gradually applied in various fields.
  • An embodiment of the present disclosure provides a method for preventing harassment calls, which includes: when a terminal receives a strange call, it obtains the address of the node where the data set is located on the blockchain; and according to the address of the node where the data set is located, the Tag information; and when the tag information includes the phone number of the strange call, mark the phone number as a harassing call.
  • An embodiment of the present disclosure provides another method for preventing harassment calls, including: a node where a data set is located receives a mark-up chain instruction sent by a first terminal in a blockchain, wherein the mark-up chain instruction includes mark information; The mark information is saved in a mark list; and the mark list is transmitted to other terminals in the blockchain.
  • An embodiment of the present disclosure provides an anti-harassment phone device, including: a first acquisition unit configured to acquire the address of a node on the blockchain where the data set is located when receiving a strange call; a second acquisition unit configured to The address of the node where the data set is located to obtain the marking information in the data set; and the marking unit is configured to mark the phone number as a harassing call when the marking information includes the phone number of the strange incoming call.
  • An embodiment of the present disclosure provides another device for preventing harassment of a telephone, including: a first receiving unit configured to receive a mark-up instruction sent by a first terminal in a blockchain, wherein the mark-up instruction includes mark information;
  • the saving unit is configured to save the mark information in a mark list; and the first sending unit is configured to transmit the mark list to other terminals in the blockchain.
  • An embodiment of the present disclosure also provides a terminal for preventing harassment calls, which includes a memory and a processor.
  • the memory stores a computer program.
  • the processor implements the method.
  • An embodiment of the present disclosure also provides a computer-readable storage medium on which computer-executable instructions are stored.
  • the processor executes the foregoing anti-harassment call method.
  • FIG. 1 is a schematic flowchart of a method for preventing harassment calls according to an embodiment of the present disclosure
  • FIG. 2 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart of a method for marking a harassing phone call according to an embodiment of the present disclosure
  • FIG. 4 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure
  • FIG. 5 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure
  • FIG. 6 is a schematic structural diagram of an anti-harassment telephone device according to an embodiment of the present disclosure.
  • FIG. 7 is another schematic structural diagram of an anti-harassment telephone device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of a hardware structure of a terminal in an embodiment of the present disclosure.
  • Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and so on.
  • the so-called consensus mechanism is a digital algorithm that realizes the establishment of trust and the acquisition of rights and interests between different nodes in the blockchain system.
  • Blockchain is an important concept of virtual currency, which is essentially a decentralized database and at the same time serves as the underlying technology of virtual currency.
  • a blockchain is a series of data blocks that are generated using cryptographic methods. Each data block contains information about a Bitcoin network transaction to verify the validity of its information (anti-counterfeiting) and generate the next block.
  • Decentralization is a form of social relationship and content generation formed during the development of the Internet, and is a new type of network content production process relative to "centralization".
  • each node has a highly autonomous feature.
  • the nodes can be freely connected to each other to form a new connection unit. Any node can become a phased center, but it does not have a mandatory central control function.
  • the influence between nodes will form a non-linear causality through the network. This open, flat, and equal system phenomenon or structure is called decentralization.
  • Ethereum is an open source public blockchain platform with smart contract functions. It provides a decentralized virtual machine (Ethereum Virtual Machine) through its dedicated cryptocurrency Ether (Ethereum) to handle peer-to-peer contract.
  • EOS Enterprise Operating System, provided by a commercial distributed blockchain operating system
  • EOS is a new blockchain architecture designed to achieve performance expansion of distributed applications.
  • a smart contract is a computer protocol designed to spread, verify, or execute contracts in an informational manner. Smart contracts allow trusted transactions without third parties, which are traceable and irreversible. All users on the blockchain can see the smart contract based on the blockchain.
  • the marking method of harassing calls is usually restricted by the following aspects.
  • yellow page service companies will maintain relevant data based on the user's mark, and mobile phone manufacturers integrate these data to obtain the ability to identify callers.
  • this type of marking method has the same problem as the first aspect. Different mobile phone manufacturers may choose to integrate different yellow page content. As a result, users cannot use the original data after replacing mobile phones of different manufacturers.
  • marking through the application can usually save the data in the cloud, and the user can log in by the mobile phone number, so that the original data can be used even if the user changes the mobile phone.
  • the disadvantage of using the application is that the marked data is completely controlled by the operator of the application.
  • the harassment calls marked by the user can be uploaded to the cloud, other users can obtain the data only if the number of marks reaches a certain level. And this method has a delay in data sharing, and may even be tampered by the operator.
  • data from different applications cannot be shared, and efficient and accurate identification cannot be achieved.
  • An embodiment of the present disclosure provides a method for preventing harassment calls.
  • the method is used in a terminal.
  • the terminal may be a computer or a mobile smart device.
  • the computer or mobile smart device executes the method, it can use blockchain technology to convert The harassing phone number is recognized and is not affected by changing the phone number, changing the phone number, or changing the operator.
  • the functions implemented by this method can be implemented by the processor in the terminal calling the program code.
  • the program code can be stored in the computer readable In the storage medium, it can be seen that the terminal includes at least a processor and a storage medium.
  • FIG. 1 is a schematic flowchart of an anti-harassment call method according to an embodiment of the present disclosure. As shown in FIG. 1, the method includes steps S101 to S103.
  • step S101 when receiving a strange call, the terminal obtains the address of the node on the blockchain where the data set is located.
  • the data set may be a smart contract in the blockchain, and the terminal obtains the address of the smart contract, so that the label of the harassing phone call can be subsequently achieved through the smart contract.
  • the terminal receives a strange call, it is necessary to determine whether the strange call is a harassing call through the blockchain.
  • the smart in the blockchain can also be used first.
  • the tag information of the harassing call recorded in the smart contract is obtained and downloaded locally; when a strange call is received, you can find out whether the call number is a harassing call by searching the local record.
  • step S102 the tag information in the data set is obtained according to the address of the node where the data set is located.
  • the terminal obtains the marked information already recorded in the smart contract according to the smart contract address in the blockchain.
  • the tag information here is used to tag the phone number that has been identified as a harassing call.
  • the tag information includes a phone number.
  • the marking information may also include other characteristic attributes related to the phone number, such as area, type, etc., and may also include the time of marking and the number of times of marking. This information can be provided to the terminal by a smart contract.
  • the terminal receives a strange call, the user can determine whether to answer the call by marking the content in the information.
  • step S103 when the tag information includes the phone number of the strange call, the phone number is marked as a harassing call.
  • the tag information here can include various phone numbers that have been marked as harassing calls.
  • the terminal When the terminal receives a strange call, it can look up the phone number of the strange call in the tag information. When the tag information can find this
  • the terminal marks the phone number as a harassing phone call, and the terminal can also perform corresponding operations on the phone number. For example, directly displaying the number as a harassing phone call on the display interface of the incoming call to remind the user; it can also be set to directly automatically reject the call or automatically block the incoming call, etc.
  • the phone number of this strange call cannot be found in the tag information, it is considered that the phone number is not marked as a harassing call, and the terminal may not perform operations such as reminders.
  • the marking information includes a telephone number and a marking time; according to the address of the node where the data set is located, acquiring the marking information in the data set (ie, step S102) includes: according to where the data set is located The address of the node downloads the mark list in the data set, wherein the mark list includes at least one item of the mark information; and the mark information is obtained from the mark list.
  • the smart contract in the blockchain has recorded all the tag information of the harassing call in the tag list.
  • the terminal first downloads this tag list, and obtains the tag information through the tag list.
  • the marking information here includes the telephone number and the marking time. Since the telephone number recorded in the marking information is the telephone number marked as a harassing call, no other information can be recorded here, only the marked telephone number or the marking can be recorded. Time and other relevant information.
  • the terminal can periodically download the list of marks in the smart contract, or download the list of marks in the smart contract when a strange call is received. After the terminal downloads the mark list, the data that has been downloaded or duplicate data can be deleted to save memory space.
  • An embodiment of the present disclosure provides another method for preventing harassment of a telephone. As shown in FIG. 2, the method includes steps S201 to S204.
  • step S201 when receiving a strange call, the terminal obtains the address of the node on the blockchain where the data set is located.
  • step S202 the terminal obtains the marking information in the data set according to the address of the node where the data set is located.
  • Step S203 when the marking information includes the phone number of the strange call, the terminal marks the phone number as a harassing phone.
  • Step S204 when the terminal determines that the unfamiliar incoming call is a harassing call, according to the address of the node where the data set is located, a mark-up chain instruction is sent to the node where the data set is located, wherein the mark-up chain instruction includes mark information.
  • the terminal determines that the unfamiliar incoming call is a harassing call, which may be that the user determines that it is a harassing call according to the content of the call after receiving the call, or it may be a harassing call according to the recognition results of steps S201 to S203, or it may be based on The user's experience or other means to judge it as harassing the phone. Regardless of the method used to determine the strange call as a harassing call, you can actively mark it as a harassing call here and upload it to the blockchain for other terminals to use.
  • the terminal uploads the phone number and the marked time including the to-be-marked to the blockchain, that is, sends an on-chain instruction to the smart contract address of the blockchain. After receiving the on-chain instruction, the smart contract on the blockchain will The tag information is saved in the tag list of the smart contract. At this point, the terminal has completed a chain of harassment call marks.
  • the terminal of each node in the blockchain can perform the operation of the mark, and realize the sharing of the mark information.
  • the method further includes: the terminal generating account information according to the address of the digital wallet and the account password; and when the terminal sends the markup instruction to the node where the data set is located, according to the address of the digital wallet Pay the tokens in the digital wallet, wherein the mark on chain instruction further includes the account information.
  • the digital currency in the blockchain is used.
  • the user can register an account on the blockchain for using the tag to harass the phone function, and the user can register based on the digital wallet information and the set account password in the blockchain.
  • the terminal generates account information based on the digital wallet information and account password.
  • the terminal When the terminal needs to mark a harassing phone call, it is necessary to upload the account information to the smart contract in the blockchain by marking the chain instruction, and the smart contract deducts a certain amount of tokens based on the account information. That is to say, by paying tokens to limit the marking of harassing calls, it can prevent malicious marking to a certain extent.
  • a certain level of rewards can also be given based on the quality of the user's mark to offset the tokens paid by the user when marking.
  • the corresponding reward can be based on the number of times the marked phone number is marked by others. For example, if a phone number is marked as a harassing call by multiple people, then the first person to mark the phone number can get a reward; for example, When a phone number is marked as a harassing phone call by a terminal, all users who have marked the same phone number before that time can receive corresponding rewards.
  • the method further includes: when the terminal determines that the strange call is not a harassing phone call, according to the address of the node where the data set is located, sending an anti-markup instruction to the node where the data set is located, wherein
  • the anti-marking on-chain instruction includes a phone number, anti-marking mark and marking time.
  • an anti-marking on-chain instruction is sent to the smart contract in the blockchain.
  • the anti-marking on-chain instruction includes, in addition to the phone number and the time of marking, an anti-marking indicator to indicate that the call The number is marked as a non-harassing call.
  • An embodiment of the present disclosure provides yet another method for preventing harassment calls, which is applied to a smart contract of a blockchain. As shown in FIG. 3, the method includes the following steps S301 to S303.
  • step S301 the node where the data set is located receives the tag-on-chain instruction sent by the first terminal in the blockchain, wherein the tag-on-chain instruction includes tag information.
  • step S302 the data set saves the tag information in the tag list.
  • step S303 the mark list is transmitted to other terminals in the blockchain.
  • the node where the data set is located is the node where the smart contract in the blockchain is located.
  • the smart contract records the phone number and the time marked in the chained instruction sent by the first terminal. Generate tag information based on the phone number and tag time, that is, each tag phone number and the corresponding upload tag on-chain instruction time (ie tag time), form a tag message, the smart contract builds a tag list, and each tag The tag information is saved in the tag list. Each time the smart contract receives a new tag message, it will add it to the tag list.
  • the smart contract When the terminal downloads the tag list, or when the tag list is updated, the smart contract sends the tag list to the terminals of each node of the blockchain, so that the terminals on the blockchain share the tag information.
  • the update of the mark list may be a regular update, or it may be updated when the smart contract obtains the newly added mark information.
  • the smart contract sends the updated tag list to the terminal of each node; or when a terminal requests to download the tag list, the smart contract sends the current tag list to the terminal ; You can also periodically send the list of tags to the terminals of each node.
  • the markup on chain instruction also includes the address of the digital wallet of the first terminal
  • the method further includes: the node where the data set is located according to the address of the digital wallet of the first terminal, from the Tokens are deducted from the digital wallet of the first terminal.
  • the node where the data set is located that is, the smart contract on the blockchain can obtain the digital wallet address corresponding to the account information of the first terminal according to the mark-up chain instruction sent by the first terminal.
  • a certain token is deducted based on the address of its digital wallet.
  • the tokens here can be digital currency, real currency, or vouchers, coupons, or other reward and punishment mechanisms.
  • the method further includes: the node where the data set is located determines that the phone number in the mark-on-chain instruction has been marked by the second terminal and is stored in In the tag list; and according to the tag-on-chain instruction sent by the second terminal, send reward tokens to the digital wallet of the second terminal.
  • the reward standard here can be judged by the number of times the phone number is marked again by other terminals after being marked.
  • the smart contract can find out whether the phone number has been marked before the current marking according to the marking time, and if it has been marked by the second terminal, reward the second terminal. In this way, the user with the earliest marked terminal can receive the most rewards.
  • it may also be rewarded only once, for example, when the phone number marked by the second terminal is marked by another terminal after the marked time reaches a certain number of times, the second terminal is rewarded.
  • the form of rewards can still be distributed through digital wallets and smart contracts to the digital wallets corresponding to the terminals being rewarded.
  • they can offset the tokens they spent on marking, avoiding the user’s marking of harassing calls.
  • the method further includes: the node where the data set is located receives an anti-marking on-chain instruction sent by the first terminal, wherein the anti-marking on-chain instruction includes a phone number, an anti-marking identifier, and a marking time; according to the The anti-marking on-chain instruction counts the number N of times the phone number is marked and the number M of times the number is unmarked, where N and M are integers greater than or equal to 0; and when the M is greater than or equal to N At this time, all the tag information with the phone number is deleted from the tag list.
  • the mark-up instruction is used to upload the phone number marked as a harassing phone to the blockchain, and the mark-up instruction is used to upload the non-harassment phone
  • the phone number is uploaded to the blockchain.
  • the anti-marking on-chain instruction can be distinguished from the marking on-chain instruction by carrying an anti-marking identifier. For example, add a 0 to the phone number as a counter mark. It is also possible to add different identifiers to the mark-on-chain instruction and the counter-mark-on-chain instruction. For example, in the mark-on-chain instruction, add a 1 to the phone number as the identifier of the harassing call. Add a 0 to the phone number as an identifier for non-harassing calls.
  • the smart contract When the number of anti-marking of the same phone number is greater than or equal to the number of markings, the smart contract automatically determines the phone number as a non-harassing phone, and deletes all the marking information of the phone number in the current marking list. In this way, the terminal obtains This phone number will not be found in the tag information, so it cannot be identified as a harassing phone. Smart contracts can provide token rewards for terminal accounts that provide anti-marking, to encourage users' anti-marking behavior, and to promote a sufficient amount of data to ensure the accuracy of the mark.
  • the mark information in the mark list may not be deleted.
  • the smart contract records the number of times the same phone number is marked and de-marked, and provides both times of the mark to the terminal.
  • the terminal can use the smart contract The data provided determines how to handle this phone number.
  • An embodiment of the present disclosure provides a method for preventing harassment of a telephone, which is applicable to a smart phone terminal, and the smart phone terminal must have a data connection function such as a wireless network or WIFI. As shown in FIG. 4, the method includes the following steps S401 to S405.
  • step S401 a smart contract is stored on the blockchain network.
  • the smart contract here can be regarded as a data collection, which mainly implements the following three functions: first, it is used to gather all the tag information, and the user's tag information is sent to the contract address of the smart contract; second, it is used to provide queries For services, users can query all tag records and tag number information through the contract address of the smart contract. Third, the smart contract can also contain a digital wallet address to reward users based on the validity of the user tag and tag.
  • the smart contract address can be preset through the terminal factory, or can be published through the official website, manual and other media for users to obtain and use.
  • step S402 a menu is set in the call history of the terminal, including the user's own digital wallet address, password, and smart contract address.
  • the digital wallet address requires the user to apply. If the mobile phone comes with a wallet function, the wallet address on the mobile phone can also be used directly. The wallet address is used for transmission verification to ensure interaction with the smart contract on the blockchain.
  • step S403 the terminal automatically downloads the existing label information from the smart contract address through the network.
  • the marking information here can include the marking number and the marking time. If it has been downloaded, the latest marking information after the last marked marking time can be automatically downloaded and saved in a local specific directory, and the downloaded ones can be merged through statistics. Mark information, delete redundant information, and reduce the occupation of local space.
  • step S404 the terminal records the data of the mark in the mark information according to the mark of the user, and uploads the chain.
  • the on-chain refers to that when the user is successfully marked, the terminal automatically sends an instruction to the smart contract address.
  • the instruction contains information such as the initiation time of the instruction, the smart contract address, the user's digital wallet address, transmission fees, and numbers.
  • step S405 when the terminal receives the incoming call, it queries the local tag information to check whether the number is marked as a harassing call, and if there is a mark, it is displayed as a harassing call.
  • the token is deducted from the user's digital wallet when the marking information is uploaded.
  • the purpose is to prevent users from randomly marking the number on the chain, that is, to prevent malicious marking rules.
  • the token is automatically returned to the user through a smart contract as a reward. For example, when user A marks a number a, user A consumes tokens when marking, and subsequent systems find that user B also marks the same number a. At this time, user B consumes tokens, but user A will be rewarded; when there is a user When C also marks the number a, user C consumes the token to give user A and user B a reward, or, in order to better improve the accuracy of the mark, the reward can also be given when the mark reaches a certain amount.
  • user A has marked number a, and when there are N other users who have marked number a in the future, user A will be given a certain reward. If no one has marked the number a again, user A will not receive a reward. In this way, one is to encourage users to actively participate in tagging collaboration on anti-harassment calls, and the other is to prevent users from maliciously tagging.
  • the terminal in order to prevent users from marking or unmarking arbitrarily, or in order to prevent the marked numbers from being used by harassers and released by operators to normal users, the terminal provides the anti-marking function.
  • the number will also be chained with corresponding information.
  • the number information sent when the chain is sent is 13900000000_1_0, where the first 11 digits are the marked phone number, and the 1 in the middle is marked as a harassing phone; when the number is marked, the chain sends
  • the number information is 13900000000_0_1, and the 1 at the end represents the back mark.
  • the smart contract automatically counts each number in real time, and the terminal can call or download it. When the counted anti-marking times are greater than or equal to the marked times, the terminal side can automatically set this number as a non-harassing call.
  • the terminal when the terminal redraws the version, or replaces the mobile phone, operator, etc., it is only necessary to log in to the smart contract through the account and password to obtain the smart contract address and the digital wallet address.
  • the marked content of the anti-harassment phone will not be restricted by the replacement of the mobile phone, the operator or the application, and the alliance effect of the anti-harassment phone is achieved.
  • An embodiment of the present disclosure provides yet another method for preventing harassment calls. As shown in FIG. 5, the method includes the following steps S501 to S507 and S41 to S44.
  • step S501 the terminal sets the user's own digital wallet address, password, and smart contract address through the call record setting menu.
  • step S502 the terminal downloads all the mark number information associated with the smart contract address to the local directory according to the predefined rules.
  • step S503 the terminal performs merge statistical processing on the downloaded data and deletes redundant information to reduce the occupation of space.
  • step S504 the terminal selects the number in the call log to mark as a harassing call, or performs anti-marking.
  • Anti-marking here means that the terminal selects the number in the call log and marks it as a non-harassing call.
  • step S505 the terminal sends an on-chain instruction to the smart contract address.
  • the instruction contains information such as the time at which the instruction was initiated, the smart contract address, the user's digital wallet address, transmission fee, and number.
  • step S506 the smart contract saves the relevant content in the received uplink instruction to the blockchain network.
  • step S507 the smart contract gives token rewards to the terminal according to the reward rules.
  • step S41 when the terminal receives a strange call, it queries all the tag information in the local directory.
  • step S42 the terminal determines whether there is a record that the strange caller number is marked as a harassing call in the marking information.
  • step S43 if there is a record in the marking information that the strange caller number is marked as a harassing call, the strange caller number is displayed as a harassing call.
  • step S44 if there is no strange caller number record for the number in the tag information, the number is not processed and the caller status is displayed normally.
  • blockchain technology can be used to ensure the identification of the incoming call number, especially for the identification of harassing calls, and it is not affected by factors such as changing the number, changing the number, changing the operator, etc., as long as there is
  • the recorded numbers can be used to obtain the label information of the incoming call on the blockchain at any time and in the presence of a data network to identify whether it is a harassing call, and these data can be used by anyone or institution on the blockchain.
  • the alliance effect is achieved, that is, data sharing.
  • the blockchain network used in the embodiments of the present disclosure may be an existing blockchain network, such as Ethereum or EOS, or a newly constructed blockchain network.
  • An embodiment of the present disclosure also provides a device for preventing harassment of a telephone.
  • the device includes each unit included and each module included in each unit, which can be implemented by a processor in a terminal, and of course, can also be implemented by a logic circuit.
  • the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • FIG. 6 is a schematic structural diagram of a device for preventing harassment calls according to an embodiment of the present disclosure.
  • the device 600 includes: a first acquiring unit 601 configured to acquire the data set on the blockchain when receiving strange calls The address of the node; the second obtaining unit 602 is configured to obtain the marking information in the data set according to the address of the node where the data set is located; and the marking unit 603 is configured to include the strange caller in the marking information Phone number, mark the phone number as a harassing call.
  • the marking information includes a phone number and marking time.
  • the second obtaining unit 602 may include: a download module configured to download a mark list in the data set according to the address of the node where the data set is located, wherein the mark list includes at least one item of the mark information; and The obtaining module is configured to obtain the mark information from the mark list.
  • the device further includes: a first sending unit configured to, when it is determined that the strange call is a harassing call, send a label to the node where the data set is located according to the address of the node where the data set is located Instruction, wherein the mark on chain instruction includes mark information.
  • the apparatus further includes: a generating unit configured to generate account information based on the address and account password of the digital wallet; and a payment unit configured to send the markup instruction to the node where the data set is located , Paying tokens in the digital wallet according to the address of the digital wallet, wherein the instruction to mark on the chain also includes the account information.
  • the apparatus further includes: a second sending unit configured to send an anti-tag to the node where the data set is located according to the address of the node where the data set is located when it is determined that the strange call is not a harassing call
  • the chain instruction wherein the anti-marking on-chain instruction includes a telephone number, an anti-marking mark, and a marking time.
  • the embodiments of the present disclosure also provide another device for preventing harassment of telephones.
  • the units included in the device and the modules included in the units can be implemented by a processor in a terminal, and of course, can also be implemented by a logic circuit.
  • the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • the device 700 includes: a first receiving unit 701 configured to receive a mark-up instruction sent by a first terminal in a blockchain , Wherein the tag on-chain instruction includes tag information; a saving unit 702 configured to store the tag information in a tag list; and a first sending unit 703 configured to transmit the tag list to the block Other terminals in the chain.
  • the mark on chain instruction further includes the address of the digital wallet of the first terminal
  • the device further includes: a deduction unit configured to delete the address from the digital wallet of the first terminal according to the address Deduct tokens from the digital wallet of the first terminal.
  • the apparatus further includes: a determining unit configured to determine that the phone number in the mark-up-chain instruction has been marked by the second terminal before the current mark-up time and is stored in the mark-up-chain instruction In the tag list; and a second sending unit configured to send reward tokens to the digital wallet of the second terminal according to the tag on-chain instruction sent by the second terminal.
  • the device further includes: a second receiving unit configured to receive the anti-marking on-chain instruction sent by the first terminal, wherein the anti-marking on-chain instruction includes a phone number, an anti-marking identifier, and a marking time; A statistical unit configured to count the number of times the phone number is marked N and the number of times it is unmarked M according to the anti-marking on-chain instruction, wherein N and M are integers greater than or equal to 0; and The deleting unit is configured to delete all tag information with the phone number from the tag list when the M is greater than or equal to N.
  • the above anti-harassment telephone method is implemented in the form of a software function module and sold or used as an independent product, it may also be stored in a computer-readable storage medium.
  • the technical solutions of the embodiments of the present disclosure can be embodied in the form of software products, which are stored in a storage medium and include several instructions to make a terminal (which may be a personal computer, mobile terminal, Server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present disclosure.
  • the foregoing storage media include various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read-only memory (Read Only Memory, ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read-only memory (Read Only Memory, ROM), a magnetic disk, or an optical disk.
  • an embodiment of the present disclosure provides a terminal for preventing harassment calls, including a memory and a processor, the memory stores a computer program that can be run on the processor, and the processor implements the program according to the present disclosure. Steps in the anti-harassment call method of the above embodiments.
  • An embodiment of the present disclosure provides a computer-readable storage medium on which a computer program is stored.
  • the processor causes the processor to implement the steps in the anti-harassment telephone method according to the above embodiments of the present disclosure.
  • FIG. 8 is a schematic diagram of a hardware structure of a terminal in an embodiment of the present disclosure.
  • the hardware entity of the terminal 800 includes: a processor 801, a communication interface 802, and a memory 803.
  • the processor 801 generally controls the overall operation of the terminal 800.
  • the communication interface 802 may enable the terminal to communicate with other terminals or servers through the network.
  • the memory 803 is configured to store instructions and applications executable by the processor 801, and may also cache data to be processed or processed by the modules in the processor 801 and the terminal 800 (for example, image data, audio data, voice communication data, and video Communication data) can be achieved through flash memory (FLASH) or random access memory (Random Access Memory, RAM).
  • FLASH flash memory
  • RAM random access memory
  • the blockchain technology is used to identify incoming calls of mobile phones. Especially for the identification of harassing calls, the use of blockchain technology will not be affected by factors such as switching, number change, and operator change. As long as there are recorded numbers on the blockchain, they can be used at any time in the presence of a data network. Get the tag information of the incoming call on the blockchain to identify whether it is a harassing phone call, and because these data can be used by anyone and institutions in the blockchain network, the alliance effect can be finally achieved and the data can be shared.
  • the disclosed device and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a division of logical functions.
  • the displayed or discussed components are coupled to each other, or directly coupled, or the communication connection may be through some interfaces, and the indirect coupling or communication connection of the device or unit may be electrical, mechanical, or other forms of.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units; they may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • the functional units in the embodiments of the present disclosure may all be integrated into one processing unit, or each unit may be separately used as a unit, or two or more units may be integrated into one unit; the above integration
  • the unit can be implemented in the form of hardware, or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer-readable storage medium.
  • the execution includes The steps of the foregoing method embodiments; and the foregoing storage media include various media that can store program codes, such as a mobile storage device, a read-only memory (Read Only Memory, ROM), a magnetic disk, or an optical disk.
  • ROM Read Only Memory
  • the above integrated unit of the present disclosure is implemented in the form of a software function module and sold or used as an independent product, it may also be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium and includes several instructions for A terminal (which may be a personal computer, mobile terminal, server, or network device, etc.) executes all or part of the methods described in the embodiments of the present disclosure.
  • the foregoing storage media include various media that can store program codes, such as mobile storage devices, ROM, magnetic disks, or optical disks.

Abstract

Embodiments of the present disclosure disclose a nuisance call prevention method and device, a terminal, and a storage medium. The method comprises: a terminal, upon receiving an unknown call, obtaining from a blockchain an address of a node where a data set is located; obtaining, according to the address of the node where the data set is located, identifier information in the data set; and if the identifier information comprises a phone number of the unknown call, marking the phone number as a nuisance call.

Description

防骚扰电话的方法及装置、终端、存储介质Anti-harassment telephone method and device, terminal and storage medium 技术领域Technical field
本公开实施例涉及(但不限于)通信技术领域。Embodiments of the present disclosure relate to, but are not limited to, the field of communication technology.
背景技术Background technique
区块链是比特币等加密货币存储数据的一种方式,是一种自引用的数据结构,并且用来存储大量交易信息。每条记录从后向前有序链接起来,具备公开透明、无法篡改、方便追溯的特点。区块链的概念来自于比特币等加密货币的实现,目前,这项技术已经逐渐运用在各个领域。Blockchain is a way of storing data in cryptocurrencies such as Bitcoin. It is a self-referencing data structure and is used to store large amounts of transaction information. Each record is linked in an orderly manner from back to front, with the characteristics of openness, transparency, tampering, and easy traceability. The concept of blockchain comes from the realization of cryptocurrencies such as Bitcoin. At present, this technology has been gradually applied in various fields.
在移动通信领域,用户一直以来受到骚扰电话的困扰。在相关技术中的防骚扰电话的方法,有常用的三种方式进行骚扰电话识别:第一是用户自己手动标记,这种标记仅存在于用户自己的手机中;第二是手机厂商进行标记,这种标记方法限制与一种手机的品牌;第三是利用第三方提供的软件进行云识别,但是需要特定的软件支持。无论上述哪种方式,骚扰电话的识别都会受到换机、换号或换运营商等因素的影响,而给用户带来不便。In the field of mobile communications, users have been troubled by harassing calls. In the related-art anti-harassment call method, there are three commonly used methods for harassment call identification: the first is the user's own manual marking, which is only present in the user's own mobile phone; the second is the mobile phone manufacturer's marking, This labeling method is limited to a mobile phone brand; the third is to use third-party software for cloud recognition, but requires specific software support. Either way, the identification of harassing calls will be affected by factors such as changing the number, changing the number, or changing the operator, which will cause inconvenience to users.
发明内容Summary of the invention
本公开实施例提供一种防骚扰电话的方法,包括:终端接收陌生来电时,获取区块链上数据集合所在节点的地址;根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息;以及当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。An embodiment of the present disclosure provides a method for preventing harassment calls, which includes: when a terminal receives a strange call, it obtains the address of the node where the data set is located on the blockchain; and according to the address of the node where the data set is located, the Tag information; and when the tag information includes the phone number of the strange call, mark the phone number as a harassing call.
本公开实施例提供又一种防骚扰电话的方法,包括:数据集合所在节点接收区块链中第一终端发送的标记上链指令,其中,所述标记上链指令包括标记信息;将所述标记信息保存在标记列表中;以及将所述标记列表传送至所述区块链中的其他终端。An embodiment of the present disclosure provides another method for preventing harassment calls, including: a node where a data set is located receives a mark-up chain instruction sent by a first terminal in a blockchain, wherein the mark-up chain instruction includes mark information; The mark information is saved in a mark list; and the mark list is transmitted to other terminals in the blockchain.
本公开实施例提供一种防骚扰电话的装置,包括:第一获取单 元,配置为在接收陌生来电时,获取区块链上数据集合所在节点的地址;第二获取单元,配置为根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息;以及标记单元,配置为当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。An embodiment of the present disclosure provides an anti-harassment phone device, including: a first acquisition unit configured to acquire the address of a node on the blockchain where the data set is located when receiving a strange call; a second acquisition unit configured to The address of the node where the data set is located to obtain the marking information in the data set; and the marking unit is configured to mark the phone number as a harassing call when the marking information includes the phone number of the strange incoming call.
本公开实施例提供又一种防骚扰电话的装置,包括:第一接收单元,配置为接收区块链中第一终端发送的标记上链指令,其中,所述标记上链指令包括标记信息;保存单元,配置为将所述标记信息保存在标记列表中;以及第一发送单元,配置为将所述标记列表传送至所述区块链中的其他终端。An embodiment of the present disclosure provides another device for preventing harassment of a telephone, including: a first receiving unit configured to receive a mark-up instruction sent by a first terminal in a blockchain, wherein the mark-up instruction includes mark information; The saving unit is configured to save the mark information in a mark list; and the first sending unit is configured to transmit the mark list to other terminals in the blockchain.
本公开实施例还提供一种防骚扰电话的终端,包括存储器和处理器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行时,所述处理器实现上述防骚扰电话的方法。An embodiment of the present disclosure also provides a terminal for preventing harassment calls, which includes a memory and a processor. The memory stores a computer program. When the computer program is executed by the processor, the processor implements the method.
本公开实施例还提供一种计算机可读存储介质,其上存储有计算机可执行指令,该计算机可执行指令被处理器执行时,所述处理器执行上述防骚扰电话的方法。An embodiment of the present disclosure also provides a computer-readable storage medium on which computer-executable instructions are stored. When the computer-executable instructions are executed by a processor, the processor executes the foregoing anti-harassment call method.
附图说明BRIEF DESCRIPTION
图1为本公开实施例的防骚扰电话的方法的流程示意图;FIG. 1 is a schematic flowchart of a method for preventing harassment calls according to an embodiment of the present disclosure;
图2为本公开实施例的防骚扰电话的方法的又一流程示意图;FIG. 2 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure;
图3为本公开实施例的标记骚扰电话的方法的流程示意图;FIG. 3 is a schematic flowchart of a method for marking a harassing phone call according to an embodiment of the present disclosure;
图4为本公开实施例的防骚扰电话的方法的又一流程示意图;FIG. 4 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure;
图5为本公开实施例的防骚扰电话的方法的又一流程示意图;FIG. 5 is another schematic flowchart of the anti-harassment call method according to an embodiment of the present disclosure;
图6为本公开实施例的防骚扰电话的装置的结构示意图;6 is a schematic structural diagram of an anti-harassment telephone device according to an embodiment of the present disclosure;
图7为本公开实施例的防骚扰电话的装置的又一结构示意图;以及7 is another schematic structural diagram of an anti-harassment telephone device according to an embodiment of the present disclosure; and
图8为本公开实施例中终端的硬件结构示意图。8 is a schematic diagram of a hardware structure of a terminal in an embodiment of the present disclosure.
具体实施方式detailed description
为了更好地理解本公开的各实施例,现对以下名词进行做出如下解释。In order to better understand the embodiments of the present disclosure, the following terms are now explained as follows.
区块链是一种分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。所谓共识机制是区块链系统中实现不同节点之间建立信任、获取权益的数字算法。区块链是虚拟货币的一个重要概念,本质上是一个去中心化的数据库,同时作为虚拟货币的底层技术。区块链是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一次比特币网络交易的信息,用于验证其信息的有效性(防伪)以及生成下一个区块。Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and so on. The so-called consensus mechanism is a digital algorithm that realizes the establishment of trust and the acquisition of rights and interests between different nodes in the blockchain system. Blockchain is an important concept of virtual currency, which is essentially a decentralized database and at the same time serves as the underlying technology of virtual currency. A blockchain is a series of data blocks that are generated using cryptographic methods. Each data block contains information about a Bitcoin network transaction to verify the validity of its information (anti-counterfeiting) and generate the next block.
去中心化是互联网发展过程中形成的社会关系形态和内容产生形态,是相对于“中心化”而言的新型网络内容生产过程。在一个分布有众多节点的系统中,每个节点都具有高度自治的特征。节点之间彼此可以自由连接,形成新的连接单元。任何一个节点都可以成为阶段性的中心,但不具备强制性的中心控制功能。节点与节点之间的影响,会通过网络而形成非线性因果关系。这种开放式、扁平化、平等性的系统现象或结构,称为去中心化。Decentralization is a form of social relationship and content generation formed during the development of the Internet, and is a new type of network content production process relative to "centralization". In a system with many nodes distributed, each node has a highly autonomous feature. The nodes can be freely connected to each other to form a new connection unit. Any node can become a phased center, but it does not have a mandatory central control function. The influence between nodes will form a non-linear causality through the network. This open, flat, and equal system phenomenon or structure is called decentralization.
Ethereum(以太坊)是一种开源的具有智能合约功能的公共区块链平台,通过其专用的加密货币Ether(以太币)提供去中心化虚拟机(Ethereum Virtual Machine,以太虚拟机)来处理点对点合约。Ethereum (Ethereum) is an open source public blockchain platform with smart contract functions. It provides a decentralized virtual machine (Ethereum Virtual Machine) through its dedicated cryptocurrency Ether (Ethereum) to handle peer-to-peer contract.
EOS(Enterprise Operation System,商用分布式区块链操作系统提供)是一种新的区块链架构,旨在实现分布式应用的性能扩展。EOS (Enterprise Operating System, provided by a commercial distributed blockchain operating system) is a new blockchain architecture designed to achieve performance expansion of distributed applications.
智能合约是一种旨在以信息化方式传播、验证或执行合同的计算机协议。智能合约允许在没有第三方的情况下进行可信交易,这些交易可追踪且不可逆转。区块链上的所有用户都可以看到基于区块链的智能合约。A smart contract is a computer protocol designed to spread, verify, or execute contracts in an informational manner. Smart contracts allow trusted transactions without third parties, which are traceable and irreversible. All users on the blockchain can see the smart contract based on the blockchain.
相关技术中,骚扰电话的标记手段通常受到以下几个方面的限制。In the related art, the marking method of harassing calls is usually restricted by the following aspects.
第一、受智能手机厂家的限制,不同手机厂家会采用不同的来电防骚扰方案,无论本地存储还是云服务存储,这些数据会保存在厂家自己的数据中,只支持厂家自己的手机使用,用户更换不同厂家的手机后,则无法使用原有的数据。First, due to the restrictions of smart phone manufacturers, different mobile phone manufacturers will use different calls to prevent harassment programs, whether local storage or cloud service storage, these data will be stored in the manufacturer's own data, only support the use of the manufacturer's own mobile phone, users After replacing mobile phones of different manufacturers, the original data cannot be used.
第二、受第三方黄页类服务公司的限制,黄页类服务公司会基 于用户的标记来维护相关的数据,手机厂家对这些数据进行集成以获取来电识别的能力。但这类标记方法与第一方面有着相同的问题,不同的手机厂家可能会选择集成不同的黄页内容,而导致用户更换不同厂家的手机后,无法使用原有的数据。Second, due to the restrictions of third-party yellow page service companies, yellow page service companies will maintain relevant data based on the user's mark, and mobile phone manufacturers integrate these data to obtain the ability to identify callers. However, this type of marking method has the same problem as the first aspect. Different mobile phone manufacturers may choose to integrate different yellow page content. As a result, users cannot use the original data after replacing mobile phones of different manufacturers.
第三、受应用程序的限制,通过应用程序进行标记通常可以将数据保存在云端,用户可以通过手机号码来登录,这样即使用户更换手机也能够使用原数据。但是,使用应用程序的弊端在于,标记的数据完全受控于应用程序的运营商,用户标记的骚扰电话虽然可以上传云端,但是只有标记的数量达到一定程度,其他用户才有可能获取该数据。并且这种方法存在数据分享的延时,甚至可能被运营商篡改。另外,不同的应用程序的数据无法实现共享,无法达到高效精准的识别。Third, due to the limitation of the application, marking through the application can usually save the data in the cloud, and the user can log in by the mobile phone number, so that the original data can be used even if the user changes the mobile phone. However, the disadvantage of using the application is that the marked data is completely controlled by the operator of the application. Although the harassment calls marked by the user can be uploaded to the cloud, other users can obtain the data only if the number of marks reaches a certain level. And this method has a delay in data sharing, and may even be tampered by the operator. In addition, data from different applications cannot be shared, and efficient and accurate identification cannot be achieved.
本公开实施例提供一种防骚扰电话的方法,该方法用于终端中,该终端可以是计算机或移动智能设备,该计算机或移动智能设备在执行该方法的时候能够利用区块链技术,将骚扰电话号码识别出来,并且不受换机、换号或换运营商等的影响,该方法所实现的功能可以通过终端中的处理器调用程序代码来实现,当然程序代码可以保存在计算机可读的存储介质中,可见,该终端至少包括处理器和存储介质。An embodiment of the present disclosure provides a method for preventing harassment calls. The method is used in a terminal. The terminal may be a computer or a mobile smart device. When the computer or mobile smart device executes the method, it can use blockchain technology to convert The harassing phone number is recognized and is not affected by changing the phone number, changing the phone number, or changing the operator. The functions implemented by this method can be implemented by the processor in the terminal calling the program code. Of course, the program code can be stored in the computer readable In the storage medium, it can be seen that the terminal includes at least a processor and a storage medium.
图1为本公开实施例的防骚扰电话的方法的流程示意图,如图1所示,该方法包括步骤S101至S103。FIG. 1 is a schematic flowchart of an anti-harassment call method according to an embodiment of the present disclosure. As shown in FIG. 1, the method includes steps S101 to S103.
在步骤S101,终端接收陌生来电时,获取区块链上数据集合所在节点的地址。In step S101, when receiving a strange call, the terminal obtains the address of the node on the blockchain where the data set is located.
这里在实际应用中,数据集合可以是区块链中的智能合约,终端获取智能合约的地址,以便后续通过智能合约来实现骚扰电话的标记。本实施例中,在终端接收到陌生来电时,要通过区块链判断该陌生来电是否为骚扰电话,实际上,在没有接收到陌生来电的情况下,也可以首先通过区块链中的智能合约,获取到智能合约中所记载的骚扰电话的标记信息,并下载到本地;当接到陌生来电时,通过查找本地记录就可以获知来电号码是否为骚扰电话。In practical applications here, the data set may be a smart contract in the blockchain, and the terminal obtains the address of the smart contract, so that the label of the harassing phone call can be subsequently achieved through the smart contract. In this embodiment, when the terminal receives a strange call, it is necessary to determine whether the strange call is a harassing call through the blockchain. In fact, when no strange call is received, the smart in the blockchain can also be used first. In the contract, the tag information of the harassing call recorded in the smart contract is obtained and downloaded locally; when a strange call is received, you can find out whether the call number is a harassing call by searching the local record.
在步骤S102,根据所述数据集合所在节点的地址,获取所述数 据集合中的标记信息。In step S102, the tag information in the data set is obtained according to the address of the node where the data set is located.
这里终端根据区块链中的智能合约地址,获取到智能合约中已经记录的标记信息。这里的标记信息用于标记已经被识别为骚扰电话的电话号码。标记信息中包括电话号码,当终端接到陌生来电时,如果在标记信息中查找到陌生来电的电话号码,则认为该电话号码为骚扰电话。标记信息中也可以包括电话号码相关的其他特征属性,如地区、类型等,还可以包括标记的时间,以及被标记的次数等。这些信息可以由智能合约提供给终端,在终端接到陌生来电时,用户可以通过标记信息中的内容来确定是否接听。Here, the terminal obtains the marked information already recorded in the smart contract according to the smart contract address in the blockchain. The tag information here is used to tag the phone number that has been identified as a harassing call. The tag information includes a phone number. When the terminal receives a strange call, if the phone number of the strange call is found in the tag information, the phone number is considered to be a harassing call. The marking information may also include other characteristic attributes related to the phone number, such as area, type, etc., and may also include the time of marking and the number of times of marking. This information can be provided to the terminal by a smart contract. When the terminal receives a strange call, the user can determine whether to answer the call by marking the content in the information.
在步骤S103,当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。In step S103, when the tag information includes the phone number of the strange call, the phone number is marked as a harassing call.
这里的标记信息中,可以包含已经被标记为骚扰电话的各种电话号码,当终端接到陌生来电时,可以在标记信息中查找这一陌生来电的电话号码,当标记信息中可以找到这一电话号码时,说明该电话号码已经被标记为骚扰电话,此时终端就将该电话号码标记为骚扰电话,终端还可以对该电话号码作对应的操作。比如,在来电时的显示界面上直接显示该号码为骚扰电话,以提醒用户;也可以设置为直接自动拒接或者自动屏蔽来电等等。而当不能在标记信息中查找到这一陌生来电的电话号码时,认为该电话号码没有被标记为骚扰电话,此时终端可以不进行提醒等操作。The tag information here can include various phone numbers that have been marked as harassing calls. When the terminal receives a strange call, it can look up the phone number of the strange call in the tag information. When the tag information can find this When the phone number indicates that the phone number has been marked as a harassing phone call, the terminal marks the phone number as a harassing phone call, and the terminal can also perform corresponding operations on the phone number. For example, directly displaying the number as a harassing phone call on the display interface of the incoming call to remind the user; it can also be set to directly automatically reject the call or automatically block the incoming call, etc. When the phone number of this strange call cannot be found in the tag information, it is considered that the phone number is not marked as a harassing call, and the terminal may not perform operations such as reminders.
在其他实施例中,所述标记信息包括电话号码和标记时间;根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息(即,步骤S102)包括:根据所述数据集合所在节点的地址,下载所述数据集合中的标记列表,其中,所述标记列表中包括至少一项所述标记信息;以及从所述标记列表中获取所述标记信息。In other embodiments, the marking information includes a telephone number and a marking time; according to the address of the node where the data set is located, acquiring the marking information in the data set (ie, step S102) includes: according to where the data set is located The address of the node downloads the mark list in the data set, wherein the mark list includes at least one item of the mark information; and the mark information is obtained from the mark list.
这里是指区块链中的智能合约已经将标记了骚扰电话的标记信息全部记录在了标记列表中,终端首先下载这一标记列表,通过标记列表来获取到其中的标记信息。这里的标记信息包括电话号码和标记时间,由于被记录在标记信息中的电话号码就是标记为骚扰电话的电话号码,所以这里可以不记录其他信息,只记录被标记的电话号码, 也可以记录标记的时间等其他相关信息。Here, it means that the smart contract in the blockchain has recorded all the tag information of the harassing call in the tag list. The terminal first downloads this tag list, and obtains the tag information through the tag list. The marking information here includes the telephone number and the marking time. Since the telephone number recorded in the marking information is the telephone number marked as a harassing call, no other information can be recorded here, only the marked telephone number or the marking can be recorded. Time and other relevant information.
在实际应用中,终端可以定期下载智能合约中的标记列表,也可以在接到陌生来电时再下载智能合约中的标记列表。终端下载标记列表后,可以将已经下载过的数据或重复的数据删除,以节省内存空间。In practical applications, the terminal can periodically download the list of marks in the smart contract, or download the list of marks in the smart contract when a strange call is received. After the terminal downloads the mark list, the data that has been downloaded or duplicate data can be deleted to save memory space.
本公开实施例提供另一种防骚扰电话的方法,如图2所示,该方法包括步骤S201至S204。An embodiment of the present disclosure provides another method for preventing harassment of a telephone. As shown in FIG. 2, the method includes steps S201 to S204.
在步骤S201,终端接收陌生来电时,获取区块链上数据集合所在节点的地址。In step S201, when receiving a strange call, the terminal obtains the address of the node on the blockchain where the data set is located.
在步骤S202,终端根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息。In step S202, the terminal obtains the marking information in the data set according to the address of the node where the data set is located.
步骤S203,当所述标记信息中包括所述陌生来电的电话号码时,终端将该电话号码标记为骚扰电话。Step S203, when the marking information includes the phone number of the strange call, the terminal marks the phone number as a harassing phone.
步骤S204,当终端确定所述陌生来电为骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送标记上链指令,其中,所述标记上链指令包括标记信息。Step S204, when the terminal determines that the unfamiliar incoming call is a harassing call, according to the address of the node where the data set is located, a mark-up chain instruction is sent to the node where the data set is located, wherein the mark-up chain instruction includes mark information.
这里的终端确定所述陌生来电为骚扰电话,可以是用户根据接听电话后的根据通话内容判断其为骚扰电话,也可以是根据步骤S201至步骤S203的识别结果判断其为骚扰电话,也可以根据用户的经验或其他的方式将其判断为骚扰电话。无论采用何种方式将该陌生来电确定为骚扰电话,这里都可以将其主动标记为骚扰电话,并上传到区块链上以供其他终端来使用。The terminal here determines that the unfamiliar incoming call is a harassing call, which may be that the user determines that it is a harassing call according to the content of the call after receiving the call, or it may be a harassing call according to the recognition results of steps S201 to S203, or it may be based on The user's experience or other means to judge it as harassing the phone. Regardless of the method used to determine the strange call as a harassing call, you can actively mark it as a harassing call here and upload it to the blockchain for other terminals to use.
终端将包括要标记的电话号码和标记的时间上传至区块链,也就是向区块链的智能合约地址发送一个上链指令,区块链上的智能合约收到该上链指令后,将标记信息保存在智能合约的标记列表中。此时,终端就完成了一次骚扰电话标记的上链。区块链中每一节点的终端都可以进行该标记的操作,实现标记信息的共享。The terminal uploads the phone number and the marked time including the to-be-marked to the blockchain, that is, sends an on-chain instruction to the smart contract address of the blockchain. After receiving the on-chain instruction, the smart contract on the blockchain will The tag information is saved in the tag list of the smart contract. At this point, the terminal has completed a chain of harassment call marks. The terminal of each node in the blockchain can perform the operation of the mark, and realize the sharing of the mark information.
在其他实施例中,该方法还包括:终端根据数字钱包的地址和账户密码生成账户信息;以及当终端向所述数据集合所在节点发送所述标记上链指令时,根据所述数字钱包的地址支付所述数字钱包中的 代币,其中,所述标记上链指令还包括所述账户信息。In other embodiments, the method further includes: the terminal generating account information according to the address of the digital wallet and the account password; and when the terminal sends the markup instruction to the node where the data set is located, according to the address of the digital wallet Pay the tokens in the digital wallet, wherein the mark on chain instruction further includes the account information.
为了防止用户恶意标记电话号码,需要引入一个防“作恶”机制。这里,利用区块链中的数字货币来实现。用户可以在区块链上注册一个用于使用标记骚扰电话功能的账户,用户根据在区块链中的数字钱包信息和设置的账户密码来进行注册。这里终端根据数字钱包信息和账户密码来生成账户信息。In order to prevent users from maliciously marking phone numbers, it is necessary to introduce a mechanism to prevent “evil”. Here, the digital currency in the blockchain is used. The user can register an account on the blockchain for using the tag to harass the phone function, and the user can register based on the digital wallet information and the set account password in the blockchain. Here the terminal generates account information based on the digital wallet information and account password.
当终端需要进行骚扰电话的标记时,需要将账户信息通过标记上链指令一并上传至区块链中的智能合约,智能合约根据账户信息扣除一定的代币。也就是,通过付出代币的方式来限制骚扰电话的标记,也就能够在一定程度上防止恶意标记。When the terminal needs to mark a harassing phone call, it is necessary to upload the account information to the smart contract in the blockchain by marking the chain instruction, and the smart contract deducts a certain amount of tokens based on the account information. That is to say, by paying tokens to limit the marking of harassing calls, it can prevent malicious marking to a certain extent.
当然,为了鼓励用户来对真正的骚扰电话进行标记,还可以对根据用户标记的质量来进行一定程度的奖励,以抵消用户标记时所付出的代币。这里可以根据被标记的电话号码被其他人标记的次数来进行相应的奖励,比如,一个电话号码被多个人标记为骚扰电话,那么第一个标记这个电话号码的人可以获得奖励;再如,当一个电话号码被一终端标记为骚扰电话时,在这之前标记了同一电话号码的所有用户,都可以获得相应的奖励。Of course, in order to encourage users to mark real harassment calls, a certain level of rewards can also be given based on the quality of the user's mark to offset the tokens paid by the user when marking. Here, the corresponding reward can be based on the number of times the marked phone number is marked by others. For example, if a phone number is marked as a harassing call by multiple people, then the first person to mark the phone number can get a reward; for example, When a phone number is marked as a harassing phone call by a terminal, all users who have marked the same phone number before that time can receive corresponding rewards.
在其他实施例中,该方法还包括:当终端确定所述陌生来电不是骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送反标记上链指令,其中,所述反标记上链指令包括电话号码、反标记标识和标记时间。In other embodiments, the method further includes: when the terminal determines that the strange call is not a harassing phone call, according to the address of the node where the data set is located, sending an anti-markup instruction to the node where the data set is located, wherein The anti-marking on-chain instruction includes a phone number, anti-marking mark and marking time.
为了防止非骚扰电话号码被标记,或者原来的骚扰电话已被其他人使用而不再是骚扰电话,此时需要在区块链中进行反标记,以将相应的电话号码标记为非骚扰电话。这里通过与标记骚扰电话相似的方法,向区块链中的智能合约发送反标记上链指令,反标记上链指令除了电话号码和标记时间以外,还包括反标记标识,用于表明是将电话号码标记为非骚扰电话。In order to prevent non-harassment phone numbers from being marked, or the original harassment phone has been used by others and is no longer a harassment phone, it is necessary to anti-mark in the blockchain to mark the corresponding phone number as a non-harassment phone. Here, in a similar way to labeling harassing calls, an anti-marking on-chain instruction is sent to the smart contract in the blockchain. The anti-marking on-chain instruction includes, in addition to the phone number and the time of marking, an anti-marking indicator to indicate that the call The number is marked as a non-harassing call.
本公开实施例提供又一种防骚扰电话的方法,该方法应用于区块链的智能合约,如图3所示,该方法包括以下步骤S301至S303。An embodiment of the present disclosure provides yet another method for preventing harassment calls, which is applied to a smart contract of a blockchain. As shown in FIG. 3, the method includes the following steps S301 to S303.
在步骤S301,数据集合所在节点接收区块链中第一终端发送的 标记上链指令,其中,所述标记上链指令包括标记信息。In step S301, the node where the data set is located receives the tag-on-chain instruction sent by the first terminal in the blockchain, wherein the tag-on-chain instruction includes tag information.
在步骤S302,数据集合将所述标记信息保存在标记列表中。In step S302, the data set saves the tag information in the tag list.
在步骤S303,将所述标记列表传送至所述区块链中的其他终端。In step S303, the mark list is transmitted to other terminals in the blockchain.
这里的数据集合所在节点即区块链中的智能合约所在节点。智能合约根据第一终端发送的标记上链指令,将其中标记的电话号码和标记时间记录下来。根据电话号码和标记时间生成标记信息,也就是每一条被标记的电话号码与对应的上传标记上链指令的时间(即标记时间),组成一条标记信息,智能合约建立标记列表,并将每一条标记信息都保存在标记列表中。智能合约每收到一条新的标记信息,就将其添加到标记列表中。The node where the data set is located is the node where the smart contract in the blockchain is located. The smart contract records the phone number and the time marked in the chained instruction sent by the first terminal. Generate tag information based on the phone number and tag time, that is, each tag phone number and the corresponding upload tag on-chain instruction time (ie tag time), form a tag message, the smart contract builds a tag list, and each tag The tag information is saved in the tag list. Each time the smart contract receives a new tag message, it will add it to the tag list.
当终端下载标记列表时,或者当标记列表更新时,智能合约就将标记列表发送至区块链各个节点的终端,使区块链上的终端共享标记信息。这里,标记列表的更新可以是定期更新,也可以是当智能合约获取到新上链的标记信息时更新。当有新的标记信息上链,标记列表进行时,智能合约将更新后的标记列表发送至各个节点的终端;也可以当有终端请求下载标记列表时,智能合约将当前的标记列表发送至终端;还可以定期将标记列表发送至各个节点的终端。When the terminal downloads the tag list, or when the tag list is updated, the smart contract sends the tag list to the terminals of each node of the blockchain, so that the terminals on the blockchain share the tag information. Here, the update of the mark list may be a regular update, or it may be updated when the smart contract obtains the newly added mark information. When there is new tag information on the chain and the tag list is in progress, the smart contract sends the updated tag list to the terminal of each node; or when a terminal requests to download the tag list, the smart contract sends the current tag list to the terminal ; You can also periodically send the list of tags to the terminals of each node.
在其他实施例中,所述标记上链指令还包括所述第一终端的数字钱包的地址,并且该方法还包括:数据集合所在节点根据所述第一终端的数字钱包的地址,从所述第一终端的数字钱包中扣除代币。In other embodiments, the markup on chain instruction also includes the address of the digital wallet of the first terminal, and the method further includes: the node where the data set is located according to the address of the digital wallet of the first terminal, from the Tokens are deducted from the digital wallet of the first terminal.
这里,数据集合所在节点也就是区块链上的智能合约根据所述第一终端发送的标记上链指令,可以获取到第一终端的账户信息所对应的数字钱包地址。为了防止恶意标记骚扰电话,当智能合约接收到新的上链指令时,根据其数字钱包的地址扣除一定的代币。这里的代币可以是数字货币、真实货币也可以是代金券、优惠券,或者通过其他奖惩机制来实现。Here, the node where the data set is located, that is, the smart contract on the blockchain can obtain the digital wallet address corresponding to the account information of the first terminal according to the mark-up chain instruction sent by the first terminal. In order to prevent malicious tags from harassing the phone, when a smart contract receives a new on-chain instruction, a certain token is deducted based on the address of its digital wallet. The tokens here can be digital currency, real currency, or vouchers, coupons, or other reward and punishment mechanisms.
在其他实施例中,该方法还包括:数据集合所在节点根据所述标记上链指令,确定所述标记上链指令中的电话号码在当前标记时间之前,已被第二终端标记且保存在所述标记列表中;以及根据所述第二终端发送的标记上链指令,向所述第二终端的数字钱包发送奖励代 币。In other embodiments, the method further includes: the node where the data set is located determines that the phone number in the mark-on-chain instruction has been marked by the second terminal and is stored in In the tag list; and according to the tag-on-chain instruction sent by the second terminal, send reward tokens to the digital wallet of the second terminal.
为了鼓励用户标记骚扰电话,需要对高质量的标记给予适当的奖励。这里的奖励标准,可以通过电话号码在标记后被其他终端再次标记的次数,来评判标记的质量。当第一终端进行标记时,智能合约可以根据标记时间,查找在本次标记之前,该电话号码是否已被标记过,若已被第二终端标记过,则对第二终端进行奖励。这样,最早标记的终端,其用户可以收到最多的奖励。当然,也可以只奖励一次,例如,当第二终端标记的电话号码在标记时间之后又被其他终端所标记的次数达到一定数量时,对第二终端进行奖励。In order to encourage users to mark harassing calls, it is necessary to give appropriate rewards to high-quality marks. The reward standard here can be judged by the number of times the phone number is marked again by other terminals after being marked. When the first terminal is marked, the smart contract can find out whether the phone number has been marked before the current marking according to the marking time, and if it has been marked by the second terminal, reward the second terminal. In this way, the user with the earliest marked terminal can receive the most rewards. Of course, it may also be rewarded only once, for example, when the phone number marked by the second terminal is marked by another terminal after the marked time reaches a certain number of times, the second terminal is rewarded.
这里奖励的形式依然可以通过数字钱包,智能合约向被奖励的终端对应的数字钱包中发放奖励代币,一方面可以抵消其进行标记时所耗费的代币,避免用户对骚扰电话的标记变得消极;一方面可以获得额外的奖励,对高质量的标记给予奖励。Here, the form of rewards can still be distributed through digital wallets and smart contracts to the digital wallets corresponding to the terminals being rewarded. On the one hand, they can offset the tokens they spent on marking, avoiding the user’s marking of harassing calls. Negative; on the one hand, additional rewards can be obtained for high-quality marks.
在其他实施例中,该方法还包括:数据集合所在节点接收第一终端发送的反标记上链指令,其中,所述反标记上链指令包括电话号码、反标记标识和标记时间;根据所述反标记上链指令,分别统计所述电话号码被标记的次数N和被反标记的次数M,其中,所述N和M分别为大于或等于0的整数;以及当所述M大于或等于N时,将带有所述电话号码的全部标记信息从所述标记列表中删除。In other embodiments, the method further includes: the node where the data set is located receives an anti-marking on-chain instruction sent by the first terminal, wherein the anti-marking on-chain instruction includes a phone number, an anti-marking identifier, and a marking time; according to the The anti-marking on-chain instruction counts the number N of times the phone number is marked and the number M of times the number is unmarked, where N and M are integers greater than or equal to 0; and when the M is greater than or equal to N At this time, all the tag information with the phone number is deleted from the tag list.
为了防止他人恶意标记自己的电话号码,或者曾经被标记为骚扰电话的电话号码已经不再是骚扰电话,例如,运营商已经重新投放给其他用户使用。那么,就不能使该号码一直作为骚扰电话存在于区块链的标记信息中,被永久识别为骚扰电话。这里,提出反标记策略,来防止号码被永久识别为骚扰电话。In order to prevent others from maliciously marking their own phone numbers, or the phone numbers that were once marked as harassing calls are no longer harassing calls, for example, the operator has redistributed them to other users. Then, the number cannot be kept as a harassing call in the tag information of the blockchain, and be permanently recognized as a harassing call. Here, an anti-tagging strategy is proposed to prevent the number from being permanently identified as a harassing call.
在用户通过终端进行标记时,可以分为标记和反标记,标记上链指令用于将标记为骚扰电话的电话号码上传至区块链,而反标记上链指令,用于将非骚扰电话的电话号码上传至区块链。反标记上链指令可以通过携带一个反标记标识来与标记上链指令进行区别。例如,在电话号码后加一位0,作为反标记标识。也可以在标记上链指令和反标记上链指令中分别加入不同的标识,例如标记上链指令中,在电 话号码后加一位1作为骚扰电话的标识,在反标记上链指令中,在电话号码后加一位0作为非骚扰电话的标识。When the user marks through the terminal, it can be divided into mark and anti-mark. The mark-up instruction is used to upload the phone number marked as a harassing phone to the blockchain, and the mark-up instruction is used to upload the non-harassment phone The phone number is uploaded to the blockchain. The anti-marking on-chain instruction can be distinguished from the marking on-chain instruction by carrying an anti-marking identifier. For example, add a 0 to the phone number as a counter mark. It is also possible to add different identifiers to the mark-on-chain instruction and the counter-mark-on-chain instruction. For example, in the mark-on-chain instruction, add a 1 to the phone number as the identifier of the harassing call. Add a 0 to the phone number as an identifier for non-harassing calls.
当同一电话号码的反标记次数大于或等于标记次数时,智能合约自动将该电话号码确定为非骚扰电话,并将当前标记列表中对该电话号码的标记信息全部删除,这样,终端获取到的标记信息中将不能查找到这一电话号码,也就不能被识别为骚扰电话。智能合约可以为提供反标记的终端账户提供代币奖励,以鼓励用户的反标记行为,促进有足够的数据量来保证标记的准确性。When the number of anti-marking of the same phone number is greater than or equal to the number of markings, the smart contract automatically determines the phone number as a non-harassing phone, and deletes all the marking information of the phone number in the current marking list. In this way, the terminal obtains This phone number will not be found in the tag information, so it cannot be identified as a harassing phone. Smart contracts can provide token rewards for terminal accounts that provide anti-marking, to encourage users' anti-marking behavior, and to promote a sufficient amount of data to ensure the accuracy of the mark.
在实际应用中,也可以不删除标记列表中的标记信息,智能合约记录同一电话号码被标记和被反标记的次数,并将这两种标记的次数都提供给终端,终端可以根据智能合约所提供的数据自行决定对这一电话号码做何种处理。In practical applications, the mark information in the mark list may not be deleted. The smart contract records the number of times the same phone number is marked and de-marked, and provides both times of the mark to the terminal. The terminal can use the smart contract The data provided determines how to handle this phone number.
本公开实施例提供一种防骚扰电话的方法,该方法适用于智能手机终端,所述智能手机终端要具备无线网络或WIFI等数据连接功能。如图4所示,该方法包括以下步骤S401至S405。An embodiment of the present disclosure provides a method for preventing harassment of a telephone, which is applicable to a smart phone terminal, and the smart phone terminal must have a data connection function such as a wireless network or WIFI. As shown in FIG. 4, the method includes the following steps S401 to S405.
在步骤S401,在区块链网络上存储智能合约。In step S401, a smart contract is stored on the blockchain network.
这里的智能合约可以看成是一个数据集合,其主要实现以下三个功能:第一、用于集合所有标记信息,用户的标记信息都发送至此智能合约的合约地址;第二、用于提供查询服务,用户可以通过智能合约的合约地址查询所有标记记录和标记号码信息;第三、该智能合约中还可以包含一个数字钱包地址,根据用户标记和标记的有效性对用户进行奖励。The smart contract here can be regarded as a data collection, which mainly implements the following three functions: first, it is used to gather all the tag information, and the user's tag information is sent to the contract address of the smart contract; second, it is used to provide queries For services, users can query all tag records and tag number information through the contract address of the smart contract. Third, the smart contract can also contain a digital wallet address to reward users based on the validity of the user tag and tag.
智能合约地址可以通过终端出厂预置,也可以通过官网、说明书等媒介进行公布,供用户获取并使用。The smart contract address can be preset through the terminal factory, or can be published through the official website, manual and other media for users to obtain and use.
在步骤S402,在终端的通话记录中设置菜单,包括用户自己的数字钱包地址、密码以及智能合约地址。In step S402, a menu is set in the call history of the terminal, including the user's own digital wallet address, password, and smart contract address.
这里,数字钱包地址需要用户进行申请,如果手机自带钱包功能,也可以直接使用手机上的钱包地址,该钱包地址用于传输验证,以保证与区块链上的智能合约进行交互。Here, the digital wallet address requires the user to apply. If the mobile phone comes with a wallet function, the wallet address on the mobile phone can also be used directly. The wallet address is used for transmission verification to ensure interaction with the smart contract on the blockchain.
在步骤S403,终端通过网络自动从智能合约地址下载已有的标 记信息。In step S403, the terminal automatically downloads the existing label information from the smart contract address through the network.
这里的标记信息可以包含标记号码和标记时间,如果已经下载过,则可以自动下载上次标记的标记时间之后最新的标记信息,并保存在本地的特定目录下,并通过统计合并已经下载过的标记信息,删除冗余信息,减少本地空间的占用。The marking information here can include the marking number and the marking time. If it has been downloaded, the latest marking information after the last marked marking time can be automatically downloaded and saved in a local specific directory, and the downloaded ones can be merged through statistics. Mark information, delete redundant information, and reduce the occupation of local space.
在步骤S404,终端根据用户的标记将标记的数据记载在标记信息中上链。In step S404, the terminal records the data of the mark in the mark information according to the mark of the user, and uploads the chain.
这里的上链是指,当用户标记成功后,终端自动向智能合约地址发送指令,指令内包含本次指令的发起时间、智能合约地址、用户的数字钱包地址、传输费用、号码等信息。这里可以选择仅在WIFI网络传输,也可以在WIFI网络和数据网络下均可传输。Here, the on-chain refers to that when the user is successfully marked, the terminal automatically sends an instruction to the smart contract address. The instruction contains information such as the initiation time of the instruction, the smart contract address, the user's digital wallet address, transmission fees, and numbers. Here you can choose to transmit only on the WIFI network, or you can transmit on both the WIFI network and the data network.
在步骤S405,当终端收到来电,查询本地的标记信息,检查号码是否被标记为骚扰电话,如果有标记,则显示为骚扰电话。In step S405, when the terminal receives the incoming call, it queries the local tag information to check whether the number is marked as a harassing call, and if there is a mark, it is displayed as a harassing call.
在其他实施例中,当用户在终端上进行标记后,标记信息上链时扣除用户数字钱包中的特定代币(token)。In other embodiments, after the user marks on the terminal, the token is deducted from the user's digital wallet when the marking information is uploaded.
这里用户每进行一次标记,就需要消耗一定的代币。其目的是防止用户随意标记号码上链,即防止恶意标记的规则。Here every time the user makes a mark, they need to consume a certain amount of tokens. The purpose is to prevent users from randomly marking the number on the chain, that is, to prevent malicious marking rules.
在其他实施例中,当用户在终端上进行标记后,判断之后是否还有其他用户标记相同的号码,若有,则通过智能合约自动返回代币给用户,作为奖励。例如,当用户A标记了一个号码a,标记时用户A消耗代币,后续系统发现用户B也标记了同样的号码a,此时用户B消耗代币,但会给予用户A奖励;当有用户C也标记了号码a时,用户C消耗token,给予用户A和用户B奖励,或者,为了更好地提升标记的准确性,也可以当标记到达一定量时再给予奖励。例如,用户A标记了号码a,当后续有其他共N个用户都标记了号码a,则给予用户A一定的奖励。如果没有人再标记过号码a,则用户A不会再获得奖励。这样做一是鼓励用户积极参与防骚扰电话的标记协作,二是防止用户恶意标记。In other embodiments, after the user marks on the terminal, it is determined whether other users mark the same number afterwards, and if so, the token is automatically returned to the user through a smart contract as a reward. For example, when user A marks a number a, user A consumes tokens when marking, and subsequent systems find that user B also marks the same number a. At this time, user B consumes tokens, but user A will be rewarded; when there is a user When C also marks the number a, user C consumes the token to give user A and user B a reward, or, in order to better improve the accuracy of the mark, the reward can also be given when the mark reaches a certain amount. For example, user A has marked number a, and when there are N other users who have marked number a in the future, user A will be given a certain reward. If no one has marked the number a again, user A will not receive a reward. In this way, one is to encourage users to actively participate in tagging collaboration on anti-harassment calls, and the other is to prevent users from maliciously tagging.
在其他实施例中,为了防止用户随意标记或取消标记,或者为了防止已被标记的号码不再被骚扰者使用且被运营商释放给正常用 户,则通过终端提供反标记功能,被反标记的号码也会上链并带有相应的信息。例如,当标记骚扰电话时,上链时发送的号码信息为13900000000_1_0,其中前11位数字是被标记电话号码,中间的1代表被标记为骚扰电话;当取消该号码标记时,上链发送的号码信息为13900000000_0_1,末位的1代表反标记。智能合约实时对每一号码进行自动统计,终端可以调用或下载使用。当统计后的反标记次数大于或等于被标记的次数时,终端侧可以将这一号码自动设置为非骚扰电话。In other embodiments, in order to prevent users from marking or unmarking arbitrarily, or in order to prevent the marked numbers from being used by harassers and released by operators to normal users, the terminal provides the anti-marking function. The number will also be chained with corresponding information. For example, when marking a harassing call, the number information sent when the chain is sent is 13900000000_1_0, where the first 11 digits are the marked phone number, and the 1 in the middle is marked as a harassing phone; when the number is marked, the chain sends The number information is 13900000000_0_1, and the 1 at the end represents the back mark. The smart contract automatically counts each number in real time, and the terminal can call or download it. When the counted anti-marking times are greater than or equal to the marked times, the terminal side can automatically set this number as a non-harassing call.
通过上述实施例中的方法,当终端重刷版本,或更换手机、运营商等等时,只要通过账户和密码重新登录智能合约,获取智能合约地址、数字钱包地址即可。如此,防骚扰电话的标记内容不会受到更换手机、运营商或者被应用程序所制约,达到了防骚扰电话的联盟效应。According to the method in the above embodiment, when the terminal redraws the version, or replaces the mobile phone, operator, etc., it is only necessary to log in to the smart contract through the account and password to obtain the smart contract address and the digital wallet address. In this way, the marked content of the anti-harassment phone will not be restricted by the replacement of the mobile phone, the operator or the application, and the alliance effect of the anti-harassment phone is achieved.
本公开实施例提供又一种防骚扰电话的方法,如图5所示,该方法包括以下步骤S501至S507以及S41至S44。An embodiment of the present disclosure provides yet another method for preventing harassment calls. As shown in FIG. 5, the method includes the following steps S501 to S507 and S41 to S44.
在步骤S501,终端通过通话记录设置菜单设置用户自己的数字钱包地址、密码以及智能合约地址。In step S501, the terminal sets the user's own digital wallet address, password, and smart contract address through the call record setting menu.
在步骤S502,终端根据预先定义的规则,下载智能合约地址所关联的所有标记号码信息到本地目录。In step S502, the terminal downloads all the mark number information associated with the smart contract address to the local directory according to the predefined rules.
在步骤S503,终端对下载的数据进行合并统计处理,删除冗余信息,以减少空间的占用。In step S503, the terminal performs merge statistical processing on the downloaded data and deletes redundant information to reduce the occupation of space.
在步骤S504,终端选择通话记录中的号码标记为骚扰电话,或进行反标记。In step S504, the terminal selects the number in the call log to mark as a harassing call, or performs anti-marking.
这里的反标记是指,终端选择通话记录中的号码,将其标记为非骚扰电话。Anti-marking here means that the terminal selects the number in the call log and marks it as a non-harassing call.
在步骤S505,终端向智能合约地址发送上链指令,指令中包含本次指令发起时间、智能合约地址、用户数字钱包地址、传输费用、号码等信息。In step S505, the terminal sends an on-chain instruction to the smart contract address. The instruction contains information such as the time at which the instruction was initiated, the smart contract address, the user's digital wallet address, transmission fee, and number.
在步骤S506,智能合约将接收到的上链指令中的相关内容保存到区块链网络中。In step S506, the smart contract saves the relevant content in the received uplink instruction to the blockchain network.
在步骤S507,智能合约根据奖励规则向终端给予代币奖励。In step S507, the smart contract gives token rewards to the terminal according to the reward rules.
在本实施例中,终端侧接收到陌生来电时,需要根据以下步骤S41至S44来实现来电防骚扰。In this embodiment, when a strange call is received on the terminal side, it is necessary to implement anti-harassment of the call according to the following steps S41 to S44.
在步骤S41,当终端收到陌生来电,查询本地目录下所有标记信息。In step S41, when the terminal receives a strange call, it queries all the tag information in the local directory.
在步骤S42,终端判断标记信息中是否存在陌生来电号码被标记为骚扰电话的记录。In step S42, the terminal determines whether there is a record that the strange caller number is marked as a harassing call in the marking information.
在步骤S43,如果标记信息中存在该陌生来电号码被标记为骚扰电话的记录,则显示该陌生来电号码为骚扰电话。In step S43, if there is a record in the marking information that the strange caller number is marked as a harassing call, the strange caller number is displayed as a harassing call.
在步骤S44,如果标记信息中不存在该号码的陌生来电号码记录,则不对该号码进行处理,正常显示来电状态。In step S44, if there is no strange caller number record for the number in the tag information, the number is not processed and the caller status is displayed normally.
通过本公开实施例,可以利用区块链技术来保证来电号码的识别,尤其是针对骚扰电话的识别,可以不受换机、换号、换运营商等因素的影响,只要区块链上有记录的号码,都可以在有数据网络的情况下随时随地获取来电在区块链上的标记信息,以识别是否为骚扰电话,且这些数据可以被区块链上的任何人或者机构所使用,最终达成联盟效应,即数据的共享。本公开实施例所采用的区块链网络可以是已有的区块链网络,如Ethereum或EOS,也可以是重新搭建的新的区块链网络。Through the embodiments of the present disclosure, blockchain technology can be used to ensure the identification of the incoming call number, especially for the identification of harassing calls, and it is not affected by factors such as changing the number, changing the number, changing the operator, etc., as long as there is The recorded numbers can be used to obtain the label information of the incoming call on the blockchain at any time and in the presence of a data network to identify whether it is a harassing call, and these data can be used by anyone or institution on the blockchain. Eventually, the alliance effect is achieved, that is, data sharing. The blockchain network used in the embodiments of the present disclosure may be an existing blockchain network, such as Ethereum or EOS, or a newly constructed blockchain network.
本公开实施例还提供一种防骚扰电话的装置,该装置包括所包括的各单元、以及各单元所包括的各模块,可以通过终端中的处理器来实现,当然也可通过逻辑电路实现。在实施的过程中,处理器可以为中央处理器(CPU)、微处理器(MPU)、数字信号处理器(DSP)或现场可编程门阵列(FPGA)等。An embodiment of the present disclosure also provides a device for preventing harassment of a telephone. The device includes each unit included and each module included in each unit, which can be implemented by a processor in a terminal, and of course, can also be implemented by a logic circuit. In the implementation process, the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
图6为本公开实施例防骚扰电话的装置的组成结构示意图,如图6所示,该装置600包括:第一获取单元601,配置为在接收陌生来电时,获取区块链上数据集合所在节点的地址;第二获取单元602,配置为根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息;以及标记单元603,配置为当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。FIG. 6 is a schematic structural diagram of a device for preventing harassment calls according to an embodiment of the present disclosure. As shown in FIG. 6, the device 600 includes: a first acquiring unit 601 configured to acquire the data set on the blockchain when receiving strange calls The address of the node; the second obtaining unit 602 is configured to obtain the marking information in the data set according to the address of the node where the data set is located; and the marking unit 603 is configured to include the strange caller in the marking information Phone number, mark the phone number as a harassing call.
在其他实施例中,标记信息包括电话号码和标记时间。In other embodiments, the marking information includes a phone number and marking time.
第二获取单元602可以包括:下载模块,配置为根据所述数据集合所在节点的地址,下载所述数据集合中的标记列表,其中,所述标记列表中包括至少一项所述标记信息;以及获取模块,配置为从所述标记列表中获取所述标记信息。The second obtaining unit 602 may include: a download module configured to download a mark list in the data set according to the address of the node where the data set is located, wherein the mark list includes at least one item of the mark information; and The obtaining module is configured to obtain the mark information from the mark list.
在其他实施例中,该装置还包括:第一发送单元,配置为当确定所述陌生来电为骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送标记上链指令,其中,所述标记上链指令包括标记信息。In other embodiments, the device further includes: a first sending unit configured to, when it is determined that the strange call is a harassing call, send a label to the node where the data set is located according to the address of the node where the data set is located Instruction, wherein the mark on chain instruction includes mark information.
在其他实施例中,该装置还包括:生成单元,配置为根据数字钱包的地址和账户密码生成账户信息;以及支付单元,配置为当向所述数据集合所在节点发送所述标记上链指令时,根据所述数字钱包的地址支付所述数字钱包中的代币,其中,所述标记上链指令还包括所述账户信息。In other embodiments, the apparatus further includes: a generating unit configured to generate account information based on the address and account password of the digital wallet; and a payment unit configured to send the markup instruction to the node where the data set is located , Paying tokens in the digital wallet according to the address of the digital wallet, wherein the instruction to mark on the chain also includes the account information.
在其他实施例中,该装置还包括:第二发送单元,配置为当确定所述陌生来电不是骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送反标记上链指令,其中,所述反标记上链指令包括电话号码、反标记标识和标记时间。In other embodiments, the apparatus further includes: a second sending unit configured to send an anti-tag to the node where the data set is located according to the address of the node where the data set is located when it is determined that the strange call is not a harassing call The chain instruction, wherein the anti-marking on-chain instruction includes a telephone number, an anti-marking mark, and a marking time.
本公开实施例还提供另一种防骚扰电话的装置,该装置所包括的各单元、以及各单元所包括的各模块,可以通过终端中的处理器来实现,当然也可通过逻辑电路实现。在实施的过程中,处理器可以为中央处理器(CPU)、微处理器(MPU)、数字信号处理器(DSP)或现场可编程门阵列(FPGA)等。The embodiments of the present disclosure also provide another device for preventing harassment of telephones. The units included in the device and the modules included in the units can be implemented by a processor in a terminal, and of course, can also be implemented by a logic circuit. In the implementation process, the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
图7为本公开实施例防骚扰电话的装置的组成结构示意图,如图7所示,该装置700包括:第一接收单元701,配置为接收区块链中第一终端发送的标记上链指令,其中,所述标记上链指令包括标记信息;保存单元702,配置为将所述标记信息保存在标记列表中;以及第一发送单元703,配置为将所述标记列表传送至所述区块链中的其他终端。7 is a schematic structural diagram of a device for preventing harassment of a telephone according to an embodiment of the present disclosure. As shown in FIG. 7, the device 700 includes: a first receiving unit 701 configured to receive a mark-up instruction sent by a first terminal in a blockchain , Wherein the tag on-chain instruction includes tag information; a saving unit 702 configured to store the tag information in a tag list; and a first sending unit 703 configured to transmit the tag list to the block Other terminals in the chain.
在其他实施例中,所述标记上链指令还包括所述第一终端的数 字钱包的地址,并且该装置还包括:扣除单元,配置为根据所述第一终端的数字钱包的地址,从所述第一终端的数字钱包中扣除代币。In other embodiments, the mark on chain instruction further includes the address of the digital wallet of the first terminal, and the device further includes: a deduction unit configured to delete the address from the digital wallet of the first terminal according to the address Deduct tokens from the digital wallet of the first terminal.
在其他实施例中,该装置还包括:确定单元,配置为根据所述标记上链指令,确定所述标记上链指令中的电话号码在当前标记时间之前,已被第二终端标记且保存在所述标记列表中;以及第二发送单元,配置为根据所述第二终端发送的标记上链指令,向所述第二终端的数字钱包发送奖励代币。In other embodiments, the apparatus further includes: a determining unit configured to determine that the phone number in the mark-up-chain instruction has been marked by the second terminal before the current mark-up time and is stored in the mark-up-chain instruction In the tag list; and a second sending unit configured to send reward tokens to the digital wallet of the second terminal according to the tag on-chain instruction sent by the second terminal.
在其他实施例中,该装置还包括:第二接收单元,配置为接收第一终端发送的反标记上链指令,其中,所述反标记上链指令包括电话号码、反标记标识和标记时间;统计单元,配置为根据所述反标记上链指令,分别统计所述电话号码被标记的次数N和被反标记的次数M,其中,所述N和M分别为大于或等于0的整数;以及删除单元,配置为当所述M大于或等于N时,将带有所述电话号码的全部标记信息从所述标记列表中删除。In other embodiments, the device further includes: a second receiving unit configured to receive the anti-marking on-chain instruction sent by the first terminal, wherein the anti-marking on-chain instruction includes a phone number, an anti-marking identifier, and a marking time; A statistical unit configured to count the number of times the phone number is marked N and the number of times it is unmarked M according to the anti-marking on-chain instruction, wherein N and M are integers greater than or equal to 0; and The deleting unit is configured to delete all tag information with the phone number from the tag list when the M is greater than or equal to N.
以上装置实施例的描述,与上述方法实施例的描述是类似的,具有同方法实施例相似的有益效果。对于本公开装置实施例中未披露的技术细节,请参照本公开方法实施例的描述而理解。The description of the device embodiments above is similar to the description of the above method embodiments, and has similar beneficial effects as the method embodiments. For technical details not disclosed in the device embodiments of the present disclosure, please refer to the description of the method embodiments of the present disclosure for understanding.
需要说明的是,本公开实施例中,如果以软件功能模块的形式实现上述防骚扰电话的方法,并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台终端(可以是个人计算机、移动终端、服务器、或者网络设备等)执行本公开各个实施例所述方法的全部或部分。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read Only Memory,ROM)、磁碟或者光盘等各种可以存储程序代码的介质。这样,本公开实施例不限制于任何特定的硬件和软件结合。It should be noted that, in the embodiments of the present disclosure, if the above anti-harassment telephone method is implemented in the form of a software function module and sold or used as an independent product, it may also be stored in a computer-readable storage medium. Based on this understanding, the technical solutions of the embodiments of the present disclosure can be embodied in the form of software products, which are stored in a storage medium and include several instructions to make a terminal (which may be a personal computer, mobile terminal, Server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present disclosure. The foregoing storage media include various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read-only memory (Read Only Memory, ROM), a magnetic disk, or an optical disk. In this way, the embodiments of the present disclosure are not limited to any specific combination of hardware and software.
对应地,本公开实施例提供一种防骚扰电话的终端,包括存储器和处理器,所述存储器存储有可在处理器上运行的计算机程序,所述处理器执行所述程序时实现根据本公开上述各实施例的防骚扰电 话的方法中的步骤。Correspondingly, an embodiment of the present disclosure provides a terminal for preventing harassment calls, including a memory and a processor, the memory stores a computer program that can be run on the processor, and the processor implements the program according to the present disclosure. Steps in the anti-harassment call method of the above embodiments.
本公开实施例提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时,使得处理器实现根据本公开上述各实施例的防骚扰电话的方法中的步骤。An embodiment of the present disclosure provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the processor causes the processor to implement the steps in the anti-harassment telephone method according to the above embodiments of the present disclosure.
这里需要指出的是:以上存储介质和设备实施例的描述,与上述方法实施例的描述是类似的,具有同方法实施例相似的有益效果。对于本公开存储介质和设备实施例中未披露的技术细节,请参照本公开方法实施例的描述而理解。It should be pointed out here that the above description of the storage medium and device embodiments is similar to the description of the above method embodiments, and has similar beneficial effects as the method embodiments. For technical details not disclosed in the storage medium and device embodiments of the present disclosure, please refer to the description of the method embodiments of the present disclosure for understanding.
图8为本公开实施例中终端的一种硬件结构示意图,如图8所示,该终端800的硬件实体包括:处理器801、通信接口802和存储器803。处理器801通常控制终端800的总体操作。通信接口802可以使终端通过网络与其他终端或服务器通信。存储器803配置为存储由处理器801可执行的指令和应用,还可以缓存待处理器801以及终端800中各模块待处理或已经处理的数据(例如,图像数据、音频数据、语音通信数据和视频通信数据),可以通过闪存(FLASH)或随机访问存储器(Random Access Memory,RAM)实现。FIG. 8 is a schematic diagram of a hardware structure of a terminal in an embodiment of the present disclosure. As shown in FIG. 8, the hardware entity of the terminal 800 includes: a processor 801, a communication interface 802, and a memory 803. The processor 801 generally controls the overall operation of the terminal 800. The communication interface 802 may enable the terminal to communicate with other terminals or servers through the network. The memory 803 is configured to store instructions and applications executable by the processor 801, and may also cache data to be processed or processed by the modules in the processor 801 and the terminal 800 (for example, image data, audio data, voice communication data, and video Communication data) can be achieved through flash memory (FLASH) or random access memory (Random Access Memory, RAM).
通过本公开实施例所提供的技术方案,利用区块链技术来进行手机的来电识别。尤其是针对骚扰电话的识别,采用区块链技术不会受到换机、换号、换运营商等因素的影响,只要区块链上有记录的号码,都可以在有数据网络的情况下随时随地获取来电在区块链上的标记信息,以识别是否为骚扰电话,且由于这些数据是区块链网络中任何人和机构都可以使用的,最终可以达成联盟效应,共享数据。Through the technical solutions provided by the embodiments of the present disclosure, the blockchain technology is used to identify incoming calls of mobile phones. Especially for the identification of harassing calls, the use of blockchain technology will not be affected by factors such as switching, number change, and operator change. As long as there are recorded numbers on the blockchain, they can be used at any time in the presence of a data network. Get the tag information of the incoming call on the blockchain to identify whether it is a harassing phone call, and because these data can be used by anyone and institutions in the blockchain network, the alliance effect can be finally achieved and the data can be shared.
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本公开的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本公开的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本公开实施例的实施过程构成任何限定。上述本公开实施例序号仅 仅为了描述,不代表实施例的优劣。It should be understood that “one embodiment” or “one embodiment” mentioned throughout the specification means that a specific feature, structure, or characteristic related to the embodiment is included in at least one embodiment of the present disclosure. Therefore, “in one embodiment” or “in an embodiment” appearing throughout the specification does not necessarily refer to the same embodiment. In addition, these specific features, structures, or characteristics may be combined in one or more embodiments in any suitable manner. It should be understood that, in various embodiments of the present disclosure, the size of the sequence numbers of the above processes does not mean the order of execution, and the execution order of each process should be determined by its function and inherent logic, and should not deal with the embodiments of the present disclosure The implementation process constitutes no limitation. The sequence numbers of the above-mentioned embodiments of the present disclosure are only for description, and do not represent the advantages and disadvantages of the embodiments.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that in this article, the terms "include", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device that includes a series of elements includes not only those elements, It also includes other elements that are not explicitly listed, or include elements inherent to this process, method, article, or device. Without more restrictions, the element defined by the sentence "include one..." does not exclude that there are other identical elements in the process, method, article or device that includes the element.
在本公开所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。In the several embodiments provided by the present disclosure, it should be understood that the disclosed device and method may be implemented in other ways. The device embodiments described above are only schematic. For example, the division of the units is only a division of logical functions. In actual implementation, there may be other division methods, such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored, or not implemented. In addition, the displayed or discussed components are coupled to each other, or directly coupled, or the communication connection may be through some interfaces, and the indirect coupling or communication connection of the device or unit may be electrical, mechanical, or other forms of.
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元;既可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units; they may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本公开各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。In addition, the functional units in the embodiments of the present disclosure may all be integrated into one processing unit, or each unit may be separately used as a unit, or two or more units may be integrated into one unit; the above integration The unit can be implemented in the form of hardware, or in the form of hardware plus software functional units.
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(Read Only Memory,ROM)、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art may understand that all or part of the steps to implement the above method embodiments may be completed by program instructions related hardware. The foregoing program may be stored in a computer-readable storage medium. When the program is executed, the execution includes The steps of the foregoing method embodiments; and the foregoing storage media include various media that can store program codes, such as a mobile storage device, a read-only memory (Read Only Memory, ROM), a magnetic disk, or an optical disk.
本公开上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台终端(可以是个人计算机、移动终端、服务器、或者网络设备等)执行本公开各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、磁碟或者光盘等各种可以存储程序代码的介质。If the above integrated unit of the present disclosure is implemented in the form of a software function module and sold or used as an independent product, it may also be stored in a computer-readable storage medium. Based on this understanding, the technical solutions of the embodiments of the present disclosure can be embodied in the form of a software product in essence or part that contributes to the prior art. The computer software product is stored in a storage medium and includes several instructions for A terminal (which may be a personal computer, mobile terminal, server, or network device, etc.) executes all or part of the methods described in the embodiments of the present disclosure. The foregoing storage media include various media that can store program codes, such as mobile storage devices, ROM, magnetic disks, or optical disks.
以上所述,仅为本公开的实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。The above are only the embodiments of the present disclosure, but the protection scope of the present disclosure is not limited to this. Any person skilled in the art can easily think of changes or replacements within the technical scope disclosed by the present disclosure. Covered within the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (13)

  1. 一种防骚扰电话的方法,包括:A method for preventing harassment of telephones includes:
    终端接收陌生来电时,获取区块链上数据集合所在节点的地址;When the terminal receives a strange call, it obtains the address of the node on the blockchain where the data collection is located;
    根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息;以及Acquiring the marking information in the data set according to the address of the node where the data set is located; and
    当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。When the phone number of the strange call is included in the marking information, the phone number is marked as a harassing call.
  2. 根据权利要求1所述的方法,其中,根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息的步骤包括:The method according to claim 1, wherein the step of acquiring the marking information in the data set according to the address of the node where the data set is located includes:
    根据所述数据集合所在节点的地址,下载所述数据集合中的标记列表,其中,所述标记列表中包括至少一项所述标记信息;以及Download a tag list in the data set according to the address of the node where the data set is located, wherein the tag list includes at least one item of the tag information; and
    从所述标记列表中获取所述标记信息。Obtain the mark information from the mark list.
  3. 根据权利要求1所述的方法,还包括:The method of claim 1, further comprising:
    当终端确定所述陌生来电为骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送标记上链指令,When the terminal determines that the unfamiliar call is a harassing call, according to the address of the node where the data set is located, it sends a markup instruction to the node where the data set is located
    其中,所述标记上链指令包括标记信息。Wherein, the mark on chain instruction includes mark information.
  4. 根据权利要求3所述的方法,还包括:The method of claim 3, further comprising:
    终端根据数字钱包的地址和账户密码生成账户信息;以及The terminal generates account information based on the digital wallet address and account password; and
    当终端向所述数据集合所在节点发送所述标记上链指令时,根据所述数字钱包的地址支付所述数字钱包中的代币,When the terminal sends the instruction to mark the chain to the node where the data set is located, the token in the digital wallet is paid according to the address of the digital wallet,
    其中,所述标记上链指令还包括所述账户信息。Wherein, the mark on chain instruction also includes the account information.
  5. 根据权利要求3所述的方法,还包括:The method of claim 3, further comprising:
    当终端确定所述陌生来电不是骚扰电话时,根据所述数据集合所在节点的地址,向所述数据集合所在节点发送反标记上链指令,When the terminal determines that the unfamiliar call is not a harassing call, according to the address of the node where the data set is located, it sends an anti-tag chain instruction to the node where the data set is located,
    其中,所述反标记上链指令包括电话号码、反标记标识和标记 时间。Wherein, the anti-marking on-chain instruction includes a telephone number, an anti-marking mark and a marking time.
  6. 一种防骚扰电话的方法,包括:A method for preventing harassment of telephones includes:
    数据集合所在节点接收区块链中第一终端发送的标记上链指令,其中,所述标记上链指令包括标记信息;The node where the data set is located receives the mark-up chain instruction sent by the first terminal in the blockchain, wherein the mark-up chain instruction includes mark information;
    将所述标记信息保存在标记列表中;以及Save the tag information in the tag list; and
    将所述标记列表传送至所述区块链中的其他终端。Transfer the tag list to other terminals in the blockchain.
  7. 根据权利要求6所述的方法,其中,所述标记上链指令还包括所述第一终端的数字钱包的地址,并且所述方法还包括:The method according to claim 6, wherein the mark on chain instruction further includes the address of the digital wallet of the first terminal, and the method further includes:
    数据集合所在节点根据所述第一终端的数字钱包的地址,从所述第一终端的数字钱包中扣除代币。The node where the data set is located deducts tokens from the digital wallet of the first terminal according to the address of the digital wallet of the first terminal.
  8. 根据权利要求7所述的方法,还包括:The method of claim 7, further comprising:
    数据集合所在节点根据所述标记上链指令,确定所述标记上链指令中的电话号码在当前标记时间之前,已被第二终端标记且保存在所述标记列表中;以及The node where the data set is located determines that the phone number in the mark-up chain instruction has been marked by the second terminal before the current mark-up time and is stored in the mark list according to the mark-up chain instruction; and
    根据所述第二终端发送的标记上链指令,向所述第二终端的数字钱包发送奖励代币。According to the mark-up chain instruction sent by the second terminal, send reward tokens to the digital wallet of the second terminal.
  9. 根据权利要求6所述的方法,还包括:The method of claim 6, further comprising:
    数据集合所在节点接收第一终端发送的反标记上链指令,其中,所述反标记上链指令包括电话号码、反标记标识和标记时间;The node where the data set is located receives the anti-marking on-chain instruction sent by the first terminal, wherein the anti-marking on-chain instruction includes a telephone number, an anti-marking identifier, and a marking time;
    根据所述反标记上链指令,分别统计所述电话号码被标记的次数N和被反标记的次数M,其中,所述N和M分别为大于或等于0的整数;以及According to the anti-marking on-chain instruction, count the number N of times the number of the telephone number is marked and the number M of the times of the unmarking, where N and M are integers greater than or equal to 0; and
    当所述M大于或等于N时,将带有所述电话号码的全部标记信息从所述标记列表中删除。When the M is greater than or equal to N, all tag information with the phone number is deleted from the tag list.
  10. 一种防骚扰电话的装置,包括:An anti-harassment telephone device includes:
    第一获取单元,配置为在接收陌生来电时,获取区块链上数据集合所在节点的地址;The first obtaining unit is configured to obtain the address of the node where the data collection is located on the blockchain when receiving a strange call;
    第二获取单元,配置为根据所述数据集合所在节点的地址,获取所述数据集合中的标记信息;以及A second obtaining unit configured to obtain the marking information in the data set according to the address of the node where the data set is located; and
    标记单元,配置为当所述标记信息中包括所述陌生来电的电话号码时,将该电话号码标记为骚扰电话。The marking unit is configured to mark the telephone number as a harassing call when the marking information includes the telephone number of the strange call.
  11. 一种防骚扰电话的装置,包括:An anti-harassment telephone device includes:
    第一接收单元,配置为接收区块链中第一终端发送的标记上链指令,其中,所述标记上链指令包括标记信息;The first receiving unit is configured to receive the mark-up chain instruction sent by the first terminal in the blockchain, wherein the mark-up chain instruction includes mark information;
    保存单元,配置为将所述标记信息保存在标记列表中;以及A saving unit configured to save the mark information in a mark list; and
    第一发送单元,配置为将所述标记列表传送至所述区块链中的其他终端。The first sending unit is configured to transmit the mark list to other terminals in the blockchain.
  12. 一种终端,包括存储器和处理器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行时,所述处理器实现根据权利要求1至9中任一项所述的防骚扰电话的方法。A terminal includes a memory and a processor. The memory stores a computer program. When the computer program is executed by the processor, the processor implements the anti-harassment according to any one of claims 1 to 9. Phone method.
  13. 一种计算机可读存储介质,其上存储有计算机可执行指令,该计算机可执行指令被处理器执行时,所述处理器执行根据权利要求1至9中任一项所述的防骚扰电话的方法。A computer-readable storage medium having computer-executable instructions stored thereon, when the computer-executable instructions are executed by a processor, the processor executes the anti-harassment telephone according to any one of claims 1 to 9. method.
PCT/CN2019/127804 2018-12-26 2019-12-24 Nuisance call prevention method and device, terminal, and storage medium WO2020135393A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811599915.3 2018-12-26
CN201811599915.3A CN111371941A (en) 2018-12-26 2018-12-26 Method and device for preventing harassing call, terminal and storage medium

Publications (1)

Publication Number Publication Date
WO2020135393A1 true WO2020135393A1 (en) 2020-07-02

Family

ID=71125695

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/127804 WO2020135393A1 (en) 2018-12-26 2019-12-24 Nuisance call prevention method and device, terminal, and storage medium

Country Status (2)

Country Link
CN (1) CN111371941A (en)
WO (1) WO2020135393A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116437349A (en) * 2023-06-13 2023-07-14 武汉博易讯信息科技有限公司 Method, device, equipment and medium for controlling access to mobile network

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979378B (en) * 2022-05-07 2023-11-10 中移互联网有限公司 Incoming call processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN107851111A (en) * 2015-05-05 2018-03-27 识卡公司 Use the identity management services of block chain
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109067824A (en) * 2018-06-12 2018-12-21 东方银谷(北京)投资管理有限公司 User information processing method and processing device based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107851111A (en) * 2015-05-05 2018-03-27 识卡公司 Use the identity management services of block chain
CN106878528A (en) * 2017-01-23 2017-06-20 北京思特奇信息技术股份有限公司 A kind of disturbance incoming call SMS interception method and system based on block chain technology
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109067824A (en) * 2018-06-12 2018-12-21 东方银谷(北京)投资管理有限公司 User information processing method and processing device based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116437349A (en) * 2023-06-13 2023-07-14 武汉博易讯信息科技有限公司 Method, device, equipment and medium for controlling access to mobile network
CN116437349B (en) * 2023-06-13 2023-09-05 武汉博易讯信息科技有限公司 Method, device, equipment and medium for controlling access to mobile network

Also Published As

Publication number Publication date
CN111371941A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
US20210334856A1 (en) Telecommunications call augmentation system
KR102396739B1 (en) Asset management method and apparatus, and electronic device
US11610019B2 (en) Information management method, apparatus, and information management system
CN109102269B (en) Transfer method and device based on block chain, block chain node and storage medium
KR20200078556A (en) Asset management method and apparatus, and electronic device
KR20200081422A (en) Asset management method and apparatus, and electronic device
US20170031874A1 (en) Blockchain and deep links for mobile apps
WO2018153305A1 (en) Security early-warning method applied to network payment, computer device and storage medium
WO2020221106A1 (en) Publication information pushing method and device
JP2019500703A (en) Barcode-based mobile payment and service processing method and apparatus
CN107979525A (en) A kind of red packet distribution method, equipment and medium
US20200257749A1 (en) Method and a device for friend recommendation
EP4044512A1 (en) Data sharing method, device, and system
US9137649B2 (en) Short code management for messaging campaigns
WO2018184494A1 (en) Information processing method and device and storage medium
WO2020135393A1 (en) Nuisance call prevention method and device, terminal, and storage medium
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
JP2010081607A (en) Method and system for realizing video shop
WO2016079539A1 (en) Telecommunications call augmentation system
US10129411B1 (en) System and method of enhancing a mobile device upgrade offer
JP6375235B2 (en) Information processing apparatus, data delivery method and program for program
CN111291335B (en) Bill data processing method and device, computer equipment and storage medium
WO2016131257A1 (en) Method and device for information storage, acquisition, and processing
CN110246042B (en) Data processing method and data server
CN116467529A (en) Financial product recommendation method, device, server and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19902984

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/11/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19902984

Country of ref document: EP

Kind code of ref document: A1