CN107566596B - Incoming call intercepting method and device - Google Patents
Incoming call intercepting method and device Download PDFInfo
- Publication number
- CN107566596B CN107566596B CN201610513222.2A CN201610513222A CN107566596B CN 107566596 B CN107566596 B CN 107566596B CN 201610513222 A CN201610513222 A CN 201610513222A CN 107566596 B CN107566596 B CN 107566596B
- Authority
- CN
- China
- Prior art keywords
- user
- call
- information
- type information
- incoming call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention aims to provide a method and a device for intercepting an incoming call. When an incoming call event of a number in a blacklist is detected, determining type information of the number; and if the type information of the number is matched with the call requirement information of the user, putting through the incoming call of the number for the user. Compared with the prior art, the method and the device have the advantages that incoming calls of numbers in the blacklist are not intercepted uniformly, but incoming calls conforming to the conversation requirement information of the users are released for the users according to the conversation requirement information of the users, even if the incoming call belongs to the numbers in the blacklist, so that the method and the device provide personalized incoming call interception for the users, and the users can obtain better conversation experience.
Description
Technical Field
The invention relates to the technical field of communication equipment, in particular to a technology for intercepting an incoming call.
Background
The current incoming call interception technology usually adopts blacklist interception, such as generating a blacklist including crank calls according to a large number of address lists and call records of users or the report of crank calls by users. When the user has an incoming call event, if the incoming call number belongs to the number in the blacklist, the incoming call is intercepted for the user, otherwise, the incoming call is released.
Disclosure of Invention
The invention aims to provide a method and a device for intercepting an incoming call.
According to an aspect of the present invention, there is provided an incoming call intercepting method, wherein the method comprises the steps of:
-determining type information to which a number in a blacklist belongs when an incoming call event for said number is detected;
-if the type information to which the number belongs matches the call requirement information of the user, putting through the incoming call of the number for the user.
According to another aspect of the present invention, there is also provided an incoming call intercepting apparatus, wherein the apparatus includes:
-means for determining type information to which a number in a blacklist belongs when an incoming event for said number is detected;
-means for placing an incoming call to said number for said user if the type information to which said number belongs matches the call demand information of the user.
Compared with the prior art, the method and the device have the advantages that incoming calls of numbers in the blacklist are not intercepted uniformly, but incoming calls conforming to the conversation requirement information of the users are released for the users according to the conversation requirement information of the users, even if the incoming call belongs to the numbers in the blacklist, so that the method and the device provide personalized incoming call interception for the users, and the users can obtain better conversation experience.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
FIG. 1 illustrates a flow diagram of a method for call interception according to one embodiment of the present invention;
fig. 2 shows a schematic diagram of an apparatus for call interception according to an embodiment of the present invention.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The term "computer device" or "computer" in this context refers to an intelligent electronic device that can execute predetermined processes such as numerical calculation and/or logic calculation by running predetermined programs or instructions, and may include a processor and a memory, wherein the predetermined processes are executed by the processor by executing program instructions prestored in the memory, or the predetermined processes are executed by hardware such as ASIC, FPGA, DSP, or a combination thereof. Computer devices include, but are not limited to, servers, personal computers, laptops, tablets, smart phones, and the like.
The computer devices include, for example, mobile terminals and network devices. Wherein, the mobile terminal includes but is not limited to a smart phone, a PDA, etc.; the network device includes, but is not limited to, a single network server, a server group consisting of a plurality of network servers, or a Cloud Computing (Cloud Computing) based Cloud consisting of a large number of computers or network servers, wherein Cloud Computing is one of distributed Computing, a super virtual computer consisting of a collection of loosely coupled computers. Wherein the computer device can be operated alone to implement the invention, or can be accessed to a network and implement the invention through interoperation with other computer devices in the network. The network in which the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
It should be noted that the mobile terminal, the network device, the network, etc. are only examples, and other existing or future computer devices or networks may also be included in the scope of the present invention, and are included by reference.
The methodologies discussed hereinafter, some of which are illustrated by flow diagrams, may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium such as a storage medium. The processor(s) may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative and are provided for purposes of describing example embodiments of the present invention. The present invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element may be termed a second element, and, similarly, a second element may be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present. Other words used to describe the relationship between elements (e.g., "between" versus "directly between", "adjacent" versus "directly adjacent to", etc.) should be interpreted in a similar manner.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
The invention may be implemented by a user equipment. More specifically, the user equipment of the present invention is a telephony device having a telephony function, typically a mobile phone. Specifically, when an incoming call event of a number in a blacklist is detected, the user equipment determines type information to which the incoming call number belongs; if the type information of the incoming call number is matched with the call requirement information of the user, the user equipment connects the incoming call of the number for the user.
Preferably, the solution of the present invention can be implemented by an APP installed and running in the user equipment, for example, various APPs capable of monitoring and intercepting conversation events, such as various mobile phone security APPs. Further, the scheme of the invention can be integrated in the mobile phone safety APP as a functional module.
The present invention is described in further detail below with reference to the attached drawing figures.
Fig. 1 shows a method flow diagram, which particularly illustrates an incoming call interception process, according to an embodiment of the present invention. As shown in fig. 1, in step S1, when an incoming call event of a number in the blacklist is detected, the user equipment determines type information to which the number belongs; in step S2, if the type information to which the number belongs matches the call requirement information of the user, the user equipment connects an incoming call of the number for the user.
Specifically, in step S1, when an incoming call event of a number in the blacklist is detected, the user equipment determines type information to which the incoming call number belongs.
The user equipment monitors the incoming call event on the current equipment, and when the incoming call event of the number in the blacklist exists, the user equipment inquires the type information of the incoming call number. Here, the blacklist may include crank call numbers and suspected crank call numbers, wherein at least some of the numbers are marked with type information to which each belongs, such as real estate agency, financing, insurance, hunting head, and the like. The blacklist may be stored locally in the user equipment, or may be stored in the network device, so as to be queried by a plurality of user equipments. And, the network device may also update the blacklist stored locally at the user device. Alternatively, only the crank call numbers may be included in the black list, and no suspected crank call numbers may be included.
Subsequently, in step S2, if the type information to which the blacklist number belongs matches the call demand information of the user, the user equipment puts through an incoming call of the number for the user.
According to a preferred embodiment, the user equipment does not need to specifically determine the call requirement information of the user, but only needs to know whether the type information to which the incoming call number belongs is matched with the call requirement information of the user.
An example may be that the aforementioned black list is also marked with a corresponding relationship between the type information and the call demand information of the user, such as marking a matching user in a record of the corresponding type information.
For example, the record of the incoming call number in the blacklist is as follows: harassing call (135xxxxxxxx), type information (property broker), user 1. Therefore, when the user equipment queries the blacklist, whether the type information of the incoming call number is associated with the current user 1 can be known, if the type information to which the number belongs is marked as the call requirement information of the user 1, the number is judged to be matched, and the incoming call is connected for the user.
Another example may be that, if the user has previously answered the incoming call of the same type of number as the incoming call number and the call duration exceeds the predetermined duration threshold, it is determined that the corresponding type information matches the call requirement information of the user.
For example, if the type information of the current incoming call number is a real estate agent, and the user has also received the incoming call of the real estate agent before and the call duration with the incoming call number exceeds a predetermined duration threshold, such as 1 minute, it can be considered that the type information of "real estate agent" matches the call demand information of the user.
According to another preferred embodiment, the call requirement information of the user needs to be specifically determined, and the determining operation may be performed by the user equipment or the network equipment.
Several ways of determination are listed below by way of example:
1) and if the number of the applications of the same type installed on the conversation equipment of the current user is greater than a preset number threshold value, taking the corresponding type information as the conversation demand information of the user.
For example, the types of APPs installed on a mobile phone by a user are counted, and if more than 2 APPs belonging to the same type exist, the type information can be used as the call demand information of the user. Specifically, if the user installs 3 recruitment APPs, namely hunting, Boss direct recruitment and pull-up, the type information "recruitment (or hunting)" is used as the call requirement information of the user.
Preferably, when the application change event on the user call device is detected, the number of applications of each type is detected, so as to update the call demand information of the user accordingly.
The user installs APP on the mobile phone and often changes, for example, install new APP or uninstall installed APP, so that the user equipment can detect the user's installation or uninstallation behavior, or periodically scan the installed APP to obtain application change events, and then count the number of APPs under each type to determine the type information of the currently installed APP, thereby updating the user's conversation demand information. For example, the user equipment scans the installed APPs once a week, and finds that the number of the financial APPs in the week is increased from 1 to 2, and all the recruitment APPs are deleted, so that the call requirement information of the user is updated to the financial APP.
2) And taking the type information of the calling number which is received by the user in the previous preset time period and the calling time length of which exceeds the preset time length threshold value as the calling requirement information of the user.
For example, in a previous preset time period, such as within one month or one week, the user answers a plurality of incoming calls, the type information of the incoming calls includes real estate agency, financing and recruitment, wherein the call duration between the user and two incoming calls exceeds a preset duration threshold, such as 1 minute, the type information of the two incoming calls is real estate agency and financing, and accordingly, the type information "real estate agency" and "financing" is used as the call demand information of the user.
3) And if the user answers the incoming call of the same type of number of the current incoming call number before and the call duration exceeds a preset duration threshold, using the corresponding type information as the call requirement information of the user.
Here, the determination method may be used to determine the call demand information of the user in real time. For example, when there is an incoming call, if the type of the incoming call number is a property broker, if the user has previously received other incoming calls belonging to the property broker and the call exceeds a predetermined time threshold, for example, 1 minute, the type information "property broker" may be used as the call demand information of the user.
It should be noted that, as will be understood by those skilled in the art, the above-mentioned various ways of determining the call requirement information of the user are not mutually exclusive, but can be combined with each other to determine the call requirement information of the user.
It should be noted that, those skilled in the art should understand that the above-mentioned various ways of determining the call requirement information of the user are only examples for the purpose of explaining the present invention, and should not be construed as any limitation to the present invention, and other existing or future determining ways, such as being applicable to the present invention, should also be included in the scope of the present invention.
After determining the call requirement information of the user, if the type information to which the current incoming call number belongs is matched with the call requirement information of the user, the user equipment connects the incoming call of the number for the user.
In addition, the determined user call requirement information may be stored in a blacklist or locally stored in the user equipment, and may be set according to specific application requirements.
Based on this, compared with the scheme of simply using the blacklist to filter the incoming call for the user in the prior art, the invention further provides a personalized incoming call filtering scheme for the user. The invention does not simply and roughly shield the incoming call in the blacklist, but according to the actual requirement of the user, namely the conversation requirement information of the user, the incoming call of a specific type is released for each specific user, even if the incoming call number belongs to the blacklist. Obviously, the invention is a higher-level secondary filtering scheme which is more in line with the needs of users and thus more humanized. Aiming at different call requirement information of each specific user, for example, the user 1 has a financial requirement, the user 2 has a recruitment requirement, and even the call requirement of the user 1 in the last month or the recruitment requirement, the method and the system can well release the incoming calls of the numbers listed in the blacklist in the corresponding types according to the current call requirement of the user. This ensures that the user does not miss, nor be disturbed by, his unwanted incoming call.
In addition, the invention can effectively utilize various existing blacklist libraries to carry out secondary modeling on the blacklist libraries so as to mark the type information of each number in the blacklist libraries and even the call requirement information of each user.
Fig. 2 shows a schematic diagram of an apparatus according to an embodiment of the present invention, which particularly shows an incoming call intercepting apparatus. As shown in fig. 2, the incoming call intercepting apparatus 20 is installed in a mobile phone security APP200, and specifically includes a type determining apparatus 21 and an incoming call releasing apparatus 22.
When an incoming call event of a number in the blacklist is detected, the type determining device 21 determines the type information to which the number belongs; if the type information of the number is matched with the call requirement information of the user, the incoming call release device 22 puts through the incoming call of the number for the user.
Specifically, when an incoming event of a number in the blacklist is detected, the genre determination means 21 determines genre information to which the incoming number belongs.
The type determining means 21 monitors incoming events on the current device, and when there is an incoming event of a number in the blacklist, the type determining means 21 inquires the type information to which the incoming number belongs. Here, the blacklist may include crank call numbers and suspected crank call numbers, wherein at least some of the numbers are marked with type information to which each belongs, such as real estate agency, financing, insurance, hunting head, and the like. The blacklist may be stored locally in the user equipment, or may be stored in the network device, so as to be queried by a plurality of user equipments. And, the network device may also update the blacklist stored locally at the user device. Alternatively, only the crank call numbers may be included in the black list, and no suspected crank call numbers may be included.
Subsequently, if the type information to which the blacklist number belongs matches the call demand information of the user, the incoming call release means 22 puts through an incoming call of the number for the user.
According to a preferred embodiment, the incoming call release device 22 does not need to specifically determine the call requirement information of the user, but only needs to know whether the type information to which the incoming call number belongs matches the call requirement information of the user.
An example may be that the aforementioned black list is also marked with a corresponding relationship between the type information and the call demand information of the user, such as marking a matching user in a record of the corresponding type information.
For example, the record of the incoming call number in the blacklist is as follows: harassing call (135xxxxxxxx), type information (property broker), user 1. Therefore, when the type determining device 21 queries the black list, it can know whether the type information of the incoming call number is associated with the current user 1, and if the type information to which the number belongs is marked as the call requirement information of the user 1, the incoming call releasing device 22 determines that the number is matched, and then puts through the incoming call for the user.
Another example may be that if the user has previously answered an incoming call of the same kind of number as the incoming call number and the call duration exceeds the predetermined duration threshold, the incoming call release device 22 determines that the corresponding type information matches the call requirement information of the user.
For example, if the type information of the current incoming call number is a real estate agent, and the user has also received the incoming call of the real estate agent before and the call duration with the incoming call number exceeds a predetermined duration threshold, such as 1 minute, it can be considered that the type information of "real estate agent" matches the call demand information of the user.
According to another preferred embodiment, the call requirement information of the user needs to be specifically determined, and the determining operation may be performed by the user equipment or the network equipment.
For the sake of illustration, the following exemplarily lists several determination manners implemented by each of the call intercepting devices 20:
1) the incoming call intercepting apparatus 20 may further include a first determining device (not shown in fig. 2) configured to, if the number of applications of the same type installed by the current user on the call device of the current user is greater than a predetermined number threshold, use the corresponding type information as the call demand information of the user.
For example, the types of APPs installed on a mobile phone by a user are counted, and if more than 2 APPs belonging to the same type exist, the first determining device may use the type information as the call demand information of the user. Specifically, if the user installs 3 recruitment APPs, namely hunting, Boss direct recruitment and pull-up, the type information "recruitment (or hunting)" is used as the call requirement information of the user.
Preferably, when detecting an application change event on the user call device, the first determining means detects the number of applications of each type, so as to update the call demand information of the user accordingly.
The user installs APP on the cell-phone also can change frequently, for example install new APP or uninstall installed APP, therefore, first determining device can be when detecting user's installation or uninstallation action, or regularly scan installed APP and obtain application change event, and then count the quantity of APP under each type to confirm the type information of APP installed at present, thereby update user's conversation demand information. For example, the user equipment scans the installed APPs once a week, and finds that the number of the financial APPs in the week is increased from 1 to 2, and all the recruitment APPs are deleted, so that the call requirement information of the user is updated to the financial APP.
2) The incoming call intercepting device 20 may further include a second determining device (not shown in fig. 2) configured to use, as the call demand information of the user, type information to which an incoming call number that the user answered within a previous preset time period and whose call duration exceeds a predetermined time duration threshold belongs.
For example, within a previous preset time period, such as within one month or one week, the user answers a plurality of incoming calls, the type information of the incoming calls includes real estate agency, financing and recruitment, wherein the call duration between the user and two incoming calls exceeds a preset duration threshold, such as 1 minute, the type information of the two incoming calls is real estate agency and financing, and accordingly the second determination device takes the type information "real estate agency" and "financing" as the call demand information of the user.
3) The incoming call intercepting device 20 may further include a third determining device (not shown in fig. 2) configured to use the corresponding type information as the call demand information of the user if the user previously answers an incoming call with the same type of current incoming call number and the call duration exceeds a predetermined duration threshold.
Here, the determination method may be used to determine the call demand information of the user in real time. For example, when there is an incoming call, if the type of the incoming call number is a property broker, if the user has previously received other incoming calls belonging to the property broker and the call exceeds a predetermined time threshold, for example, 1 minute, the third determining device may use the type information "property broker" as the call demand information of the user.
It should be noted that, as will be understood by those skilled in the art, the above-mentioned various ways of determining the call requirement information of the user are not mutually exclusive, but can be combined with each other to determine the call requirement information of the user. Therefore, at least two of the above-described first, second, and third determining means may be integrated together.
It should be noted that, those skilled in the art should understand that the above-mentioned various ways of determining the call requirement information of the user are only examples for the purpose of explaining the present invention, and should not be construed as any limitation to the present invention, and other existing or future determining ways, such as being applicable to the present invention, should also be included in the scope of the present invention.
After determining the call requirement information of the user, if the type information to which the current incoming call number belongs matches the call requirement information of the user, the incoming call release device 22 puts through the incoming call of the number for the user.
In addition, the determined user call requirement information may be stored in a blacklist or locally stored in the user equipment, and may be set according to specific application requirements.
It is noted that the present invention may be implemented in software and/or in a combination of software and hardware, for example, the various means of the invention may be implemented using Application Specific Integrated Circuits (ASICs) or any other similar hardware devices. In one embodiment, the software program of the present invention may be executed by a processor to implement the steps or functions described above. Also, the software programs (including associated data structures) of the present invention can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Further, some of the steps or functions of the present invention may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (10)
1. An incoming call intercepting method, wherein the method comprises the following steps:
-determining type information to which a number in a blacklist belongs when an incoming call event for said number is detected;
-if the type information to which the number belongs matches the call demand information of the user, putting through an incoming call of the number for the user;
the step of determining the call demand information of the user specifically includes:
-if the number of applications of the same type installed by the user on his telephony device is greater than a predetermined number threshold, taking the corresponding type information as telephony requirement information of the user;
-upon detection of an application change event on the telephony device, detecting a number of applications of each type to update the telephony need information of the user accordingly;
the step of judging that the type information to which the number belongs matches the call requirement information of the user specifically comprises:
-if the user has previously answered an incoming call of the same type of number as the number and the call duration exceeds a predetermined duration threshold, determining that the corresponding type information matches the call demand information of the user.
2. The method according to claim 1, wherein the step of determining the call demand information of the user specifically includes:
and taking the type information of the incoming call number which is answered by the user in the previous preset time period and has the call duration exceeding a preset duration threshold as the call demand information of the user.
3. The method according to claim 1 or 2, wherein the step of determining the call demand information of the user specifically comprises:
-if the user has previously answered the incoming call of the same type of number of the numbers and the call duration exceeds a predetermined duration threshold, taking the corresponding type information as the call demand information of the user.
4. The method according to claim 1 or 2, wherein the step of determining the type information to which the number belongs specifically comprises:
-querying a blacklist according to the numbers to determine type information to which the numbers belong, wherein the blacklist at least comprises one or more harassing numbers and respective type information thereof.
5. The method of claim 4, wherein the blacklist is further marked with a correspondence between type information and call demand information of the user;
the step of judging that the type information to which the number belongs matches the call requirement information of the user specifically comprises:
-determining a match if the type information to which the number belongs is marked as the call requirement information of the user.
6. An incoming call intercepting apparatus, wherein the apparatus comprises:
-means for determining type information to which a number in a blacklist belongs when an incoming event for said number is detected;
-means for placing an incoming call to said number for said user if the type information to which said number belongs matches the call demand information of the user;
the device also includes:
-means for, if the number of applications of the same type installed by the user on his telephony device is greater than a predetermined number threshold, taking the corresponding type information as telephony requirement information of the user;
the operation of determining the call demand information of the user further includes:
-means for detecting the number of applications of each type when an application change event on the telephony device is detected, to update the telephony need information of the user accordingly;
the operation of judging the matching between the type information of the number and the call requirement information of the user specifically comprises the following steps:
-if the user has previously answered an incoming call of the same type of number as the number and the call duration exceeds a predetermined duration threshold, determining that the corresponding type information matches the call demand information of the user.
7. The apparatus of claim 6, wherein the apparatus further comprises:
-means for using the type information to which the incoming call number that the user answered in the previous preset time period and the call duration of which exceeds the preset time threshold belongs as the call demand information of the user.
8. The apparatus of claim 6 or 7, wherein the apparatus further comprises:
-means for taking the corresponding type information as the call demand information of the user if the user has previously answered an incoming call of the same type of number as the number and the call duration exceeds a predetermined duration threshold.
9. The apparatus according to claim 6 or 7, wherein the operation of determining the type information to which the number belongs specifically includes:
-querying a blacklist according to the numbers to determine type information to which the numbers belong, wherein the blacklist at least comprises one or more harassing numbers and respective type information thereof.
10. The apparatus of claim 9, wherein the blacklist is further marked with a correspondence between type information and call demand information of a user;
the operation of judging the matching between the type information of the number and the call requirement information of the user specifically comprises the following steps:
-if the type information to which the number belongs is marked as the call requirement information of the user, determining that the type information to which the number belongs matches the call requirement information of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513222.2A CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513222.2A CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107566596A CN107566596A (en) | 2018-01-09 |
CN107566596B true CN107566596B (en) | 2020-06-23 |
Family
ID=60969967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610513222.2A Active CN107566596B (en) | 2016-06-30 | 2016-06-30 | Incoming call intercepting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107566596B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110336925B (en) * | 2019-06-25 | 2021-06-25 | 维沃移动通信有限公司 | Telephone incoming call processing method and terminal equipment |
CN114629984A (en) * | 2022-03-23 | 2022-06-14 | 姜皓文 | Incoming call management method and corresponding product, storage medium and equipment |
CN118093734B (en) * | 2024-03-01 | 2025-02-07 | 湖南微趣互动科技有限公司 | A big data blacklist filtering method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135424A (en) * | 2014-02-14 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Application information push method, application server, application terminal and application information push system |
CN105354196A (en) * | 2014-08-19 | 2016-02-24 | 北京羽扇智信息科技有限公司 | Information pushing method and information pushing apparatus |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8849913B2 (en) * | 2006-06-23 | 2014-09-30 | Sony Corporation | Method and system for triggering activation of IMS applications on a mobile radio terminal |
JP5477379B2 (en) * | 2009-04-30 | 2014-04-23 | 日本電気株式会社 | Rogue call detection device, rogue call detection method, and rogue call detection program |
CN103095889B (en) * | 2013-01-07 | 2015-06-03 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN103886103A (en) * | 2014-04-10 | 2014-06-25 | 广东欧珀移动通信有限公司 | App recommendation method and system |
CN104506743B (en) * | 2014-12-17 | 2017-11-03 | 百度在线网络技术(北京)有限公司 | A kind of method and device of dynamic interception phone |
CN104836883B (en) * | 2015-04-20 | 2016-09-21 | 北京奇虎科技有限公司 | The method of incoming call handling, equipment and system |
CN104866526B (en) * | 2015-04-21 | 2020-01-03 | 惠州Tcl移动通信有限公司 | Intelligent terminal and method for recommending application program |
CN105162937B (en) * | 2015-08-31 | 2018-04-06 | 小米科技有限责任公司 | Method for processing message of incoming call and device |
CN105391855B (en) * | 2015-10-29 | 2018-11-30 | 小米科技有限责任公司 | Incoming call processing method and device |
-
2016
- 2016-06-30 CN CN201610513222.2A patent/CN107566596B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135424A (en) * | 2014-02-14 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Application information push method, application server, application terminal and application information push system |
CN105354196A (en) * | 2014-08-19 | 2016-02-24 | 北京羽扇智信息科技有限公司 | Information pushing method and information pushing apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN107566596A (en) | 2018-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110830986B (en) | Method, device, equipment and storage medium for detecting abnormal behavior of Internet of things card | |
US9191823B2 (en) | Mobile device and method to monitor a baseband processor in relation to the actions on an applicaton processor | |
CN102779255B (en) | Method and device for judging malicious program | |
US8863157B2 (en) | Method, device, and mobile terminal for API interception | |
EP2680182B1 (en) | Mobile device and method to monitor a baseband processor in relation to the actions on an application processor | |
CN105471935B (en) | Information prompting method and device | |
CN109145590B (en) | Function hook detection method, detection equipment and computer readable medium | |
CN110442502B (en) | Point burying method, device, equipment and storage medium | |
US9747449B2 (en) | Method and device for preventing application in an operating system from being uninstalled | |
CN107566596B (en) | Incoming call intercepting method and device | |
CN111367698B (en) | Application program flash back detection and processing method and device and electronic equipment | |
CN103514075A (en) | Method and device for monitoring API function calling in mobile terminal | |
CN107741891B (en) | Object reconstruction method, medium, device and computing equipment | |
CN103065083A (en) | Method and system for monitoring application program interface of intelligent mobile terminal | |
CN107358103A (en) | The Android sensitive behavior monitoring method and system of pitching pile are called based on sensitivity function | |
CN110704131B (en) | Method and device for calling native application by HTML5 application | |
CN105933497B (en) | A kind of call blocking method and apparatus of multi-mode | |
CN112231699B (en) | Read function interception method, device, electronic device and computer readable medium | |
CN104133703A (en) | Method and device for determining software not used frequently | |
CN109711149B (en) | Dynamic updating mechanism judging method and application full life cycle behavior monitoring method | |
JP5828457B2 (en) | API execution control device and program | |
WO2015037850A1 (en) | Device and method for detecting url call | |
CN105447384A (en) | Anti-monitoring method and system and mobile terminal | |
CN108718369B (en) | Gateway access method, device and computer storage medium | |
CN106850701B (en) | Mobile terminal sharing isolation method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |