Summary of the invention
In view of the above problems, the present invention proposes a kind of method for the harassing call that " rings a sound " based on the preventing of cloud computing and device.Utilize the method and device, being undertaken ringing harassing call identification by being generated by cloud computing server to ring a sound harassing call database and download in mobile terminal to install, the identification accuracy of " ringing a sound " harassing call can be improved.
According to an aspect of the present invention, provide a kind of harassing call prevention method based on cloud computing, comprising: the telephone number obtaining Inbound Calls, judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged, when this telephone number is not in described address list and white list, judge whether this telephone number is ringing in a sound harassing call database, if this telephone number rings in a sound harassing call database at this, then process according to the sound one acoustic-electric words processing mode pre-set, if this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number be treated to suspicious sound one sound harassing call number and upload to cloud computing server, wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by described cloud computing server generates, and download from described cloud computing server and store in the terminal.
In addition, in one or more example of the present invention, described sound one sonication mode can comprise: just automatically connecting once receive Inbound Calls, then hanging up; Or just automatically hang up once receive Inbound Calls, and delete this missed call message registration.
In addition, in one or more example of the present invention, if this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number and the process uploading to cloud computing server also comprises: after this telephone number is treated to suspicious sound one sound harassing call number, stored as suspicious sound one sound harassing call number by this telephone number; And stored suspicious sound one sound harassing call number is uploaded to cloud computing server.
In addition, in one or more example of the present invention, cloud computing server generates the process of ringing a sound harassing call database and comprises: the suspicious sound one sound harassing call number uploaded for mobile phone users, if the probability of occurrence of this suspicious sound one sound harassing call number exceedes predetermined threshold, then automatically this suspicious sound one sound harassing call number is added to and ring in a sound harassing call database.
In addition, in one or more example of the present invention, described sound one sound harassing call database can by regularly or download under mobile phone users sends update request from described cloud computing server and upgrade.
According to a further aspect in the invention, provide the anti-locking apparatus of a kind of harassing call based on cloud computing, comprising: acquiring unit, for obtaining the telephone number of Inbound Calls; First judging unit, for judging in the address list whether this telephone number stores in the terminal or the white list that user is arranged; Second judging unit, for when this telephone number is not in described address list and white list, judges whether this telephone number is ringing in a sound harassing call database; Incoming call handling unit, if ring in a sound harassing call database for this telephone number at this, then process according to the sound one acoustic-electric words processing mode pre-set, if and this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number; Communication unit, a sound harassing call database is rung for described suspicious sound one sound harassing and wrecking are uploaded to cloud computing server and download from cloud computing server, wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by cloud computing server generates.
In addition, in one or more example of the present invention, the anti-locking apparatus of described harassing call can also comprise delete cells, for complete the uploading of suspicious sound one sound harassing call number at described communication unit after, automatically deletes the suspicious sound one sound harassing call number uploaded.
In addition, in one or more example of the present invention, the anti-locking apparatus of described harassing call can also comprise: updating block, for regularly or download under mobile phone users sends update request from described cloud computing server and upgrade described sound one sound harassing call database.
According to a further aspect in the invention, provide a kind of mobile terminal, comprise the anti-locking apparatus of harassing call as above.
In order to realize above-mentioned and relevant object, will describe in detail and the feature particularly pointed out in the claims after one or more aspect of the present invention comprises.Explanation below and accompanying drawing describe some illustrative aspects of the present invention in detail.But what these aspects indicated is only some modes that can use in the various modes of principle of the present invention.In addition, the present invention is intended to comprise all these aspects and their equivalent.
Embodiment
Various aspects of the present disclosure are described below.It is to be understood that instruction herein can with varied form imbody, and in this article disclosed any concrete structure, function or both be only representational.Based on instruction herein, those skilled in the art are it is to be understood that an aspect disclosed herein can realize independent of any other side, and the two or more aspects in these aspects can combine according to various mode.Such as, aspect, implement device or the hands-on approach of any number described in this paper can be used.In addition, other structure, function or except one or more aspect described in this paper or be not the 26S Proteasome Structure and Function of one or more aspect described in this paper can be used, realize this device or put into practice this method.In addition, any aspect described herein can comprise at least one element of claim.
Each embodiment of the present invention is described below with reference to accompanying drawings.
Fig. 1 shows according to an embodiment of the invention based on the flow chart of the harassing call prevention method of cloud computing, and the method is performed by mobile terminal.
As shown in Figure 1, first, in step s 110, the telephone number of Inbound Calls is obtained.After the telephone number obtaining Inbound Calls, in step S120, judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged.Described white list is the particular number that user is arranged, and this particular number not inside address list, but does not wish the number being considered to suspicious " ringing a sound " phone.Such as, this particular number can be cell-phone telephone number, prefix, asterisk wildcard number etc., and wherein asterisk wildcard is a kind of special sentence for searching for character string generally, mainly contain asterisk (*) and question mark (?).Here, No. * represents any character, such as 173***, and so 173001,173231,173786 grades all belong to and have matched, and character string here mainly refers to telephone number.In addition, if this particular number is prefix, then all numbers of this area all belong to white list.
If this telephone number is in described address list or in described white list, that is, the determination result of step S120 is "Yes", then proceed to step S130.In step S130, connect this incoming call and send a telegram here and carry out normal talking.
If this telephone number is not in described address list and white list, that is, the judged result of step S120 is "No", then proceed to step S140.In step S140, judge whether this telephone number is ringing in a sound harassing call database.Described " ringing a sound " harassing call database is for storing " ringing a sound " harassing call number.Described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by cloud computing server generates, and downloads from cloud computing server and store in the terminal.Such as, this database can imbed in mobile terminal installation kit, when being discharged in mobile terminal after user installation.
In an example of the present invention, cloud computing server generates the process of ringing a sound harassing call database and can comprise: the suspicious sound one sound harassing call number uploaded for mobile phone users, if the probability of occurrence of this suspicious sound one sound harassing call number exceedes predetermined threshold, then automatically this suspicious sound one sound harassing call number is added to and ring in a sound harassing call database.Such as, if in the suspicious sound one sound harassing call number uploaded, this telephone number occurs 10 times, or the number of times that this telephone number is uploaded accounts for all number number of times 5% that mobile terminal is uploaded, then think that this suspicious sound one sound harassing call number rings a sound telephone number, and be added to by its automatic powder adding in sound one sound harassing call database, thus form the sound one sound harassing call database of redaction.Or, in another example of the present invention, if have accumulated a predetermined new phone number (such as, 1000), or the new digit of accumulating take the lead before version ring 10% of the telephone numbers in a sound harassing call database, the just sound one sound harassing call database of formation redaction.In addition, for the sound one sound harassing call database generated in cloud computing server, the sound one sound harassing call number after also allowing background service personnel manually investigation to be confirmed adds in sound one sound harassing call database.
In addition, in one or more example of the present invention, described sound one sound harassing call database can be downloaded from described cloud computing server by regularly (such as, 15 minutes) and upgrade.Or described sound one sound harassing call database under mobile phone users sends update request, according to the update request that mobile phone users sends, can be downloaded the sound one sound harassing call database of corresponding version from described cloud computing server and upgrades.Or described sound one sound harassing call database when mobile terminal carries out finding to there is redaction when ringing the detection of harassing call database version, can be downloaded from cloud computing server and upgrades.
If judge that in step S140 this telephone number is in this sound one sound harassing call database, then proceed to step S150.In step S150, process according to the sound one acoustic-electric words processing mode pre-set.Described sound one sonication mode such as can comprise just to be connected once receive Inbound Calls at once automatically, then hangs up at once.In this case, calling party can be made to produce communication cost, thus increase the fraud risk cost of calling party.Or described sound one sonication mode such as can comprise just to be hung up automatically once receive Inbound Calls, and deletes this missed call message registration at once.In addition, described sound one sonication mode can also be arranged according to self-demand flexibly by mobile phone users.If judge this telephone number in step S140 not in this sound one sound harassing call database, then, in step S160, after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number.Then, in step S170, described suspicious sound one sound harassing call number is uploaded to cloud computing server, be used for upgrading for cloud computing server and ring a sound harassing call database.Here, this Inbound Calls can be hung up by callee after one period of scheduled time of ring, also can be hung up by calling party.
Particularly, in an example of the present invention, if incoming call is not in " ringing a sound " harassing call database, and not in address list and white list, then after hanging up the telephone, (the other side is hung up, or the side of answering is hung up), this telephone number is treated to suspicious sound one sound telephone number.Then, automatically this telephone number is uploaded to cloud computing server.Or, after this telephone number being treated to suspicious sound one sound harassing call number, this telephone number is stored as suspicious sound one sound telephone number.In addition, more preferably, in another example of the present invention, when this telephone number is stored as suspicious sound one sound telephone number, the word of " ring a sound " phone or pattern identification on can also adding in this telephone number missed call record of mobile terminal, and jingle bell duration can be indicated further.
In addition, in another example of the present invention, if incoming call is not in " ringing a sound " harassing call database, and not in address list and white list, then judge whether ring time is less than setting threshold values (such as 2 seconds).If the ring time when hanging up the telephone is less than setting threshold, then after hanging up the telephone, it is suspicious number that pop-up window carrys out this number of reminding user, and whether prompting user uploads this number to server.If user determines not upload, then this suspicious sound one sound harassing call is stored in the terminal.Such as: a strangeness numbers not in " ringing a sound " harassing call database phoned user at 12: 10: 12, then to hang up or user is initiatively hung up (being less than threshold values two seconds from beating to come hang up) 12: 10: 13 the other side, after hanging up, so just play window reminds this number to be suspicious number, and whether prompting user will upload to cloud server this number.In another example of the present invention, also after this telephone number is treated to suspicious sound one sound harassing call number, this telephone number can be uploaded to cloud computing server automatically.
If the telephone number being treated to suspicious sound one sound harassing call is stored in the terminal, then in this case, the suspicious sound one sound harassing call number stored can be uploaded to described cloud computing server termly automatically by described mobile terminal.Or the suspicious sound one sound harassing call number stored can be uploaded to cloud computing server by user's indicating mobile terminal after user has checked missed call record at once.More preferably, in another example of the present invention, after completing the uploading of described suspicious sound one sound harassing call number, automatically can also delete the suspicious sound one sound harassing call number uploaded.
The flow chart according to the harassing call prevention method based on cloud computing of the present invention is described above with reference to Fig. 1.The above-mentioned harassing call prevention method based on cloud computing of the present invention, can adopt software simulating, also can adopt hardware implementing, or adopts the mode of software and hardware combination to realize.
Fig. 2 shows according to an embodiment of the invention based on the block diagram of the anti-locking apparatus 200 of harassing call of cloud computing.
As shown in Figure 2, the anti-locking apparatus 200 of harassing call according to the present invention comprises acquiring unit 21, first judging unit 220, second judging unit 230, incoming call handling unit 240, communication unit 250 and delete cells 260.
Described acquiring unit 210 is for obtaining the telephone number of Inbound Calls.After the telephone number obtaining this Inbound Calls, the first judging unit 220 judges in the address list whether this telephone number stores in the terminal or the white list that user is arranged.If this telephone number is in address list or white list, then connects this incoming call, and keep normal talking.
If this telephone number is in described address list and white list, then the second judging unit 230 judges whether this telephone number is ringing in a sound harassing call database.Described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile phone users by cloud computing server generates.
When this telephone number rings in a sound harassing call database at this, incoming call handling unit 240 processes according to the sound one acoustic-electric words processing mode pre-set.Such as, described sound one sonication mode such as can comprise just to be connected once receive Inbound Calls at once automatically, then hangs up at once.In this case, calling party can be made to produce communication cost, thus increase the fraud risk cost of calling party.Or described sound one sonication mode such as can comprise just to be hung up automatically once receive Inbound Calls, and deletes this missed call message registration at once.
When this telephone number does not ring in a sound harassing call database at this, after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number by incoming call handling unit 240.In addition, in an example of the present invention, described incoming call handling unit 240 also comprises memory cell (not shown), for storing the telephone number being treated to suspicious sound one sound harassing call number.In addition, in another example of the present invention, described incoming call handling unit 240 also comprises the 3rd judging unit (not shown), for judging whether the ring time of this Inbound Calls exceedes setting threshold; And Tip element (not shown), for telephone number being treated to suspicious sound one sound harassing call number and after described ring time is less than described setting threshold, uploading to cloud computing server to user's prompting the need of by this telephone number.If user determines not upload, then this telephone number is stored in the memory unit as suspicious sound one sound harassing call.
Communication unit 250 rings a sound harassing call database for described suspicious sound one sound harassing call number being uploaded to cloud computing server and downloading from cloud computing server.Such as, the telephone number being treated to suspicious sound one sound harassing call number can be uploaded to described cloud computing server by described communication unit 250 automatically.Or, when described suspicious sound one sound harassing call number stores in the terminal, stored suspicious sound one sound harassing call number regularly (such as, 15 minutes) can be uploaded to described cloud computing server by described communication unit 250 automatically.Or described communication unit after user has checked missed call record, can be indicated by user and stored suspicious sound one sound harassing call number is uploaded to cloud computing server.
Delete cells 260 for upload at described communication unit suspicious sound one sound harassing call number success after, automatically delete the suspicious sound one sound harassing call number uploaded.
In addition, in an example of the present invention, the anti-locking apparatus 200 of described harassing call can also comprise updating block (not shown), for regularly or download under mobile phone users sends update request from described cloud computing server and upgrade described sound one sound harassing call database.
Utilize the method and device, being undertaken ringing harassing call identification by being generated by cloud computing server to ring a sound harassing call database and download in mobile terminal to install, the identification accuracy of " ringing a sound " harassing call can be improved.In addition, described sound one sonication mode can also be arranged according to self-demand flexibly by mobile phone users.
Fig. 3 shows the schematic diagram of the mobile terminal 10 comprising the anti-locking apparatus 200 of harassing call shown in Fig. 2 of the present invention.
In addition, typically, mobile terminal of the present invention can be various hand-held terminal device, such as mobile phone, personal digital assistant (PDA) etc., and therefore protection scope of the present invention should not be defined as the mobile terminal of certain particular type.
In addition, the computer program performed by CPU can also be implemented as according to method of the present invention.When this computer program is performed by CPU, perform the above-mentioned functions limited in method of the present invention.
In addition, said method step and system unit also can utilize controller and realize for storing the computer readable storage devices making controller realize the computer program of above-mentioned steps or Elementary Function.
In addition, it is to be understood that computer readable storage devices as herein described (such as, memory) can be volatile memory or nonvolatile memory, or volatile memory and nonvolatile memory can be comprised.Nonrestrictive as an example, nonvolatile memory can comprise read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory can comprise random access memory (RAM), and this RAM can serve as external cache.Nonrestrictive as an example, RAM can obtain in a variety of forms, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhancing SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and direct RambusRAM (DRRAM).The memory device of disclosed aspect is intended to the memory including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, may be implemented as electronic hardware, computer software or both combinations in conjunction with various illustrative logical blocks, module, circuit and the algorithm steps described by disclosure herein.In order to this interchangeability of hardware and software is clearly described, the function with regard to various exemplary components, square, module, circuit and step has carried out general description to it.This function is implemented as software or is implemented as hardware and depends on embody rule and be applied to the design constraint of whole system.Those skilled in the art can realize described function in every way for often kind of embody rule, but this realization determines should not be interpreted as causing departing from the scope of the present invention.
The following parts being designed to perform function described here can be utilized to realize or perform in conjunction with various illustrative logical blocks, module and the circuit described by disclosure herein: any combination of general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete nextport hardware component NextPort or these parts.General processor can be microprocessor, but alternatively, processor can be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as the combination of computing equipment, and such as, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessor are in conjunction with DSP core or other this configuration any.
In the software module that step in conjunction with the method described by disclosure herein or algorithm can directly comprise within hardware, performed by processor or in the combination of both.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or other form any known in the art.Exemplary storage medium is coupled to processor, make processor can from this storage medium reading information or to this storage medium written information.In an alternative, described storage medium can be integral to the processor together.Processor and storage medium can reside in ASIC.ASIC can be in the user terminal resident.In an alternative, processor and storage medium can be in the user terminal resident as discrete assembly.
In one or more exemplary design, described function can realize in hardware, software, firmware or its combination in any.If realized in software, then described function can be transmitted on a computer-readable medium or by computer-readable medium as one or more instruction or code storage.Computer-readable medium comprises computer-readable storage medium and communication media, and this communication media comprises any medium contributing to computer program being sent to another position from a position.Storage medium can be can by any usable medium of universal or special computer access.Nonrestrictive as an example, this computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage device or other magnetic storage apparatus, or may be used for carrying or file layout be instruction or data structure required program code and can by other medium any of universal or special computer or universal or special processor access.In addition, any connection suitably can be called computer-readable medium.Such as, if use coaxial cable, optical fiber cable, twisted-pair feeder, the wireless technology of digital subscriber line (DSL) or such as infrared ray, radio and microwave is come from website, server or other remote source send software, then the wireless technology of above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared first, radio and microwave includes the definition at medium.As used herein, disk and CD comprise compact disk (CD), laser disk, CD, digital versatile disc (DVD), floppy disk, Blu-ray disc, the wherein usual magnetically rendering data of disk, and cd-rom using laser optics ground rendering data.The combination of foregoing also should be included in the scope of computer-readable medium.
Although disclosed content shows exemplary embodiment of the present invention above, it should be noted that under the prerequisite not deviating from the scope of the present invention that claim limits, can multiple change and amendment be carried out.Need not perform with any particular order according to the function of the claim to a method of inventive embodiments described herein, step and/or action.In addition, although element of the present invention can, with individual formal description or requirement, also it is contemplated that multiple, be odd number unless explicitly limited.
Although describe each embodiment according to the present invention above with reference to figure to be described, it will be appreciated by those skilled in the art that each embodiment that the invention described above is proposed, various improvement can also be made on the basis not departing from content of the present invention.Therefore, protection scope of the present invention should be determined by the content of appending claims.