Nothing Special   »   [go: up one dir, main page]

CN102316203B - Based on the harassing call prevention method of cloud computing, device and mobile terminal - Google Patents

Based on the harassing call prevention method of cloud computing, device and mobile terminal Download PDF

Info

Publication number
CN102316203B
CN102316203B CN201110282539.7A CN201110282539A CN102316203B CN 102316203 B CN102316203 B CN 102316203B CN 201110282539 A CN201110282539 A CN 201110282539A CN 102316203 B CN102316203 B CN 102316203B
Authority
CN
China
Prior art keywords
sound
harassing call
suspicious
telephone number
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110282539.7A
Other languages
Chinese (zh)
Other versions
CN102316203A (en
Inventor
梁捷
黄颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Cloud Computing Ltd
Original Assignee
Guangzhou Dongjing Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dongjing Computer Technology Co Ltd filed Critical Guangzhou Dongjing Computer Technology Co Ltd
Priority to CN201110282539.7A priority Critical patent/CN102316203B/en
Publication of CN102316203A publication Critical patent/CN102316203A/en
Application granted granted Critical
Publication of CN102316203B publication Critical patent/CN102316203B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of harassing call prevention method based on cloud computing, comprising: the telephone number obtaining Inbound Calls, judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged, when not in address list and white list, judge whether ringing in a sound harassing call database, if ring in a sound harassing call database at this, then according to the sound one acoustic-electric words processing mode process pre-set, if do not ringing in a sound harassing call database, then after this Inbound Calls is hung up, this telephone number be treated to suspicious sound one sound harassing call number and upload to cloud computing server, wherein, ringing a sound harassing call database is generated according to uploaded suspicious sound one sound harassing call number by cloud computing server, and download from cloud computing server and store in the terminal.Utilize the method and device, the identification accuracy of " ringing a sound " harassing call can be improved.

Description

Based on the harassing call prevention method of cloud computing, device and mobile terminal
Technical field
The present invention relates to moving communicating field, more specifically, relate to a kind of for the method and the device that prevent " ringing a sound " harassing call based on cloud computing, and there is the mobile terminal of this device.
Background technology
In daily life, people often can receive the incoming call ringing a sound, and this incoming call is just hung up usually after ringing a sound.This kind of incoming call is called as sound one acoustic-electric words, this sound one acoustic-electric words employing special group is dialled equipment and is carried out auto dialing, dial assigned number or a number section, hang up immediately after victim's fixed line or mobile phone demonstrate caller ID, now fixed line or mobile phone only produce ring usually.Because victim can not confirm that whether this incoming call is that acquaintance sends a telegram here or the incoming call of oneself client; worry acquaintance's incoming all announcement material particular or worry lost customer order; so victim when not receiving this kind of incoming call, can carry out clawback to this type of number usually.But, after clawback, usually can be transferred to external pay telephone and deduct fees, or hear each series advertisements, thus make victim suffer economic loss.
In order to prevent this kind of harassing call, propose some solutions in the prior art.Be in the application " telephone firewall for preventing hang-up of calling with once ringing " of 201010004295.1 in Beijing NetQin Tech. Co., Ltd. in the application number that on January 20th, 2010 submits to, provide a kind of method of telephone firewall for preventing hang-up of calling with once ringing.In the method, calling party to be divided by software simulating and is tentatively divided into " trusted party " and " insincere side " by this fire compartment wall, and is " trusted party " or " insincere side " by software intelligent decision calling party.Normal phone is performed for trusted party, and for insincere side, then adopts the weak prompting of a period of time, and then take normal call notification mode.In the method, described terminal is all playing quiet bell sound for the previous period for all-calls, can shield thus to ring a sound and just hang the impact that this kind of harassing call causes phone user.But, in this case, be only the sound of shielding harassing call, make phone user can not answer this phone, but can not prevent phone user from after seeing missed call information, carrying out clawback.
Be in " a kind of mobile phone being taken precautions against the method for ' ring a sound ' fraudulent call " of 200910247447.8 in Wentai Group Co., Ltd in the application number that on December 29th, 2009 submits to, disclose the method for preventing ' one sound ' fraudulent calls on a kind of mobile phone.The method comprises and arranges incoming call determination strategy, and this incoming call determination strategy is in order to distinguish friendly incoming call and suspicious incoming call, and wherein suspicious incoming call be that " a loud sound " sends a telegram here.The method also comprises and arranges incoming call handling, for distinguishing friendly incoming call and suspicious incoming call according to this configuration file, and carries out special processing to suspicious incoming call in missed call and message registration.Utilize the method, by distinguish friendly and suspicious incoming call and limited subscriber to the random operation of suspicious incoming call, can effectively prevent mobile phone from swindling, thus make user avoid monetary loss.Although this method by arranging configuration file to identify friendly incoming call and suspicious incoming call, and can carry out special processing to suspicious incoming call, prevent the random clawback of phone user.But this kind of method can not upgrade automatically to suspicious incoming call list, thus make when receiving strange phone, if the configuration file that this strange phone can not be arranged by oneself is distinguished, even if then this strange phone is not harassing call, also can conductively-closed, thus phone user is suffered a loss, particularly this strange phone is customer phone, causes thus and prevents the accuracy of harassing call not high.
Summary of the invention
In view of the above problems, the present invention proposes a kind of method for the harassing call that " rings a sound " based on the preventing of cloud computing and device.Utilize the method and device, being undertaken ringing harassing call identification by being generated by cloud computing server to ring a sound harassing call database and download in mobile terminal to install, the identification accuracy of " ringing a sound " harassing call can be improved.
According to an aspect of the present invention, provide a kind of harassing call prevention method based on cloud computing, comprising: the telephone number obtaining Inbound Calls, judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged, when this telephone number is not in described address list and white list, judge whether this telephone number is ringing in a sound harassing call database, if this telephone number rings in a sound harassing call database at this, then process according to the sound one acoustic-electric words processing mode pre-set, if this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number be treated to suspicious sound one sound harassing call number and upload to cloud computing server, wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by described cloud computing server generates, and download from described cloud computing server and store in the terminal.
In addition, in one or more example of the present invention, described sound one sonication mode can comprise: just automatically connecting once receive Inbound Calls, then hanging up; Or just automatically hang up once receive Inbound Calls, and delete this missed call message registration.
In addition, in one or more example of the present invention, if this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number and the process uploading to cloud computing server also comprises: after this telephone number is treated to suspicious sound one sound harassing call number, stored as suspicious sound one sound harassing call number by this telephone number; And stored suspicious sound one sound harassing call number is uploaded to cloud computing server.
In addition, in one or more example of the present invention, cloud computing server generates the process of ringing a sound harassing call database and comprises: the suspicious sound one sound harassing call number uploaded for mobile phone users, if the probability of occurrence of this suspicious sound one sound harassing call number exceedes predetermined threshold, then automatically this suspicious sound one sound harassing call number is added to and ring in a sound harassing call database.
In addition, in one or more example of the present invention, described sound one sound harassing call database can by regularly or download under mobile phone users sends update request from described cloud computing server and upgrade.
According to a further aspect in the invention, provide the anti-locking apparatus of a kind of harassing call based on cloud computing, comprising: acquiring unit, for obtaining the telephone number of Inbound Calls; First judging unit, for judging in the address list whether this telephone number stores in the terminal or the white list that user is arranged; Second judging unit, for when this telephone number is not in described address list and white list, judges whether this telephone number is ringing in a sound harassing call database; Incoming call handling unit, if ring in a sound harassing call database for this telephone number at this, then process according to the sound one acoustic-electric words processing mode pre-set, if and this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number; Communication unit, a sound harassing call database is rung for described suspicious sound one sound harassing and wrecking are uploaded to cloud computing server and download from cloud computing server, wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by cloud computing server generates.
In addition, in one or more example of the present invention, the anti-locking apparatus of described harassing call can also comprise delete cells, for complete the uploading of suspicious sound one sound harassing call number at described communication unit after, automatically deletes the suspicious sound one sound harassing call number uploaded.
In addition, in one or more example of the present invention, the anti-locking apparatus of described harassing call can also comprise: updating block, for regularly or download under mobile phone users sends update request from described cloud computing server and upgrade described sound one sound harassing call database.
According to a further aspect in the invention, provide a kind of mobile terminal, comprise the anti-locking apparatus of harassing call as above.
In order to realize above-mentioned and relevant object, will describe in detail and the feature particularly pointed out in the claims after one or more aspect of the present invention comprises.Explanation below and accompanying drawing describe some illustrative aspects of the present invention in detail.But what these aspects indicated is only some modes that can use in the various modes of principle of the present invention.In addition, the present invention is intended to comprise all these aspects and their equivalent.
Accompanying drawing explanation
According to following detailed description of carrying out with reference to accompanying drawing, above and other object of the present invention, feature and advantage will become more apparent.In the accompanying drawings:
Fig. 1 shows according to an embodiment of the invention based on the flow chart of the harassing call prevention method of cloud computing;
Fig. 2 shows according to an embodiment of the invention based on the block diagram of the anti-locking apparatus of harassing call of cloud computing; With
Fig. 3 shows the block diagram of the mobile terminal with the anti-locking apparatus of harassing call according to the present invention.
Label identical in all of the figs indicates similar or corresponding feature or function.
Embodiment
Various aspects of the present disclosure are described below.It is to be understood that instruction herein can with varied form imbody, and in this article disclosed any concrete structure, function or both be only representational.Based on instruction herein, those skilled in the art are it is to be understood that an aspect disclosed herein can realize independent of any other side, and the two or more aspects in these aspects can combine according to various mode.Such as, aspect, implement device or the hands-on approach of any number described in this paper can be used.In addition, other structure, function or except one or more aspect described in this paper or be not the 26S Proteasome Structure and Function of one or more aspect described in this paper can be used, realize this device or put into practice this method.In addition, any aspect described herein can comprise at least one element of claim.
Each embodiment of the present invention is described below with reference to accompanying drawings.
Fig. 1 shows according to an embodiment of the invention based on the flow chart of the harassing call prevention method of cloud computing, and the method is performed by mobile terminal.
As shown in Figure 1, first, in step s 110, the telephone number of Inbound Calls is obtained.After the telephone number obtaining Inbound Calls, in step S120, judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged.Described white list is the particular number that user is arranged, and this particular number not inside address list, but does not wish the number being considered to suspicious " ringing a sound " phone.Such as, this particular number can be cell-phone telephone number, prefix, asterisk wildcard number etc., and wherein asterisk wildcard is a kind of special sentence for searching for character string generally, mainly contain asterisk (*) and question mark (?).Here, No. * represents any character, such as 173***, and so 173001,173231,173786 grades all belong to and have matched, and character string here mainly refers to telephone number.In addition, if this particular number is prefix, then all numbers of this area all belong to white list.
If this telephone number is in described address list or in described white list, that is, the determination result of step S120 is "Yes", then proceed to step S130.In step S130, connect this incoming call and send a telegram here and carry out normal talking.
If this telephone number is not in described address list and white list, that is, the judged result of step S120 is "No", then proceed to step S140.In step S140, judge whether this telephone number is ringing in a sound harassing call database.Described " ringing a sound " harassing call database is for storing " ringing a sound " harassing call number.Described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by cloud computing server generates, and downloads from cloud computing server and store in the terminal.Such as, this database can imbed in mobile terminal installation kit, when being discharged in mobile terminal after user installation.
In an example of the present invention, cloud computing server generates the process of ringing a sound harassing call database and can comprise: the suspicious sound one sound harassing call number uploaded for mobile phone users, if the probability of occurrence of this suspicious sound one sound harassing call number exceedes predetermined threshold, then automatically this suspicious sound one sound harassing call number is added to and ring in a sound harassing call database.Such as, if in the suspicious sound one sound harassing call number uploaded, this telephone number occurs 10 times, or the number of times that this telephone number is uploaded accounts for all number number of times 5% that mobile terminal is uploaded, then think that this suspicious sound one sound harassing call number rings a sound telephone number, and be added to by its automatic powder adding in sound one sound harassing call database, thus form the sound one sound harassing call database of redaction.Or, in another example of the present invention, if have accumulated a predetermined new phone number (such as, 1000), or the new digit of accumulating take the lead before version ring 10% of the telephone numbers in a sound harassing call database, the just sound one sound harassing call database of formation redaction.In addition, for the sound one sound harassing call database generated in cloud computing server, the sound one sound harassing call number after also allowing background service personnel manually investigation to be confirmed adds in sound one sound harassing call database.
In addition, in one or more example of the present invention, described sound one sound harassing call database can be downloaded from described cloud computing server by regularly (such as, 15 minutes) and upgrade.Or described sound one sound harassing call database under mobile phone users sends update request, according to the update request that mobile phone users sends, can be downloaded the sound one sound harassing call database of corresponding version from described cloud computing server and upgrades.Or described sound one sound harassing call database when mobile terminal carries out finding to there is redaction when ringing the detection of harassing call database version, can be downloaded from cloud computing server and upgrades.
If judge that in step S140 this telephone number is in this sound one sound harassing call database, then proceed to step S150.In step S150, process according to the sound one acoustic-electric words processing mode pre-set.Described sound one sonication mode such as can comprise just to be connected once receive Inbound Calls at once automatically, then hangs up at once.In this case, calling party can be made to produce communication cost, thus increase the fraud risk cost of calling party.Or described sound one sonication mode such as can comprise just to be hung up automatically once receive Inbound Calls, and deletes this missed call message registration at once.In addition, described sound one sonication mode can also be arranged according to self-demand flexibly by mobile phone users.If judge this telephone number in step S140 not in this sound one sound harassing call database, then, in step S160, after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number.Then, in step S170, described suspicious sound one sound harassing call number is uploaded to cloud computing server, be used for upgrading for cloud computing server and ring a sound harassing call database.Here, this Inbound Calls can be hung up by callee after one period of scheduled time of ring, also can be hung up by calling party.
Particularly, in an example of the present invention, if incoming call is not in " ringing a sound " harassing call database, and not in address list and white list, then after hanging up the telephone, (the other side is hung up, or the side of answering is hung up), this telephone number is treated to suspicious sound one sound telephone number.Then, automatically this telephone number is uploaded to cloud computing server.Or, after this telephone number being treated to suspicious sound one sound harassing call number, this telephone number is stored as suspicious sound one sound telephone number.In addition, more preferably, in another example of the present invention, when this telephone number is stored as suspicious sound one sound telephone number, the word of " ring a sound " phone or pattern identification on can also adding in this telephone number missed call record of mobile terminal, and jingle bell duration can be indicated further.
In addition, in another example of the present invention, if incoming call is not in " ringing a sound " harassing call database, and not in address list and white list, then judge whether ring time is less than setting threshold values (such as 2 seconds).If the ring time when hanging up the telephone is less than setting threshold, then after hanging up the telephone, it is suspicious number that pop-up window carrys out this number of reminding user, and whether prompting user uploads this number to server.If user determines not upload, then this suspicious sound one sound harassing call is stored in the terminal.Such as: a strangeness numbers not in " ringing a sound " harassing call database phoned user at 12: 10: 12, then to hang up or user is initiatively hung up (being less than threshold values two seconds from beating to come hang up) 12: 10: 13 the other side, after hanging up, so just play window reminds this number to be suspicious number, and whether prompting user will upload to cloud server this number.In another example of the present invention, also after this telephone number is treated to suspicious sound one sound harassing call number, this telephone number can be uploaded to cloud computing server automatically.
If the telephone number being treated to suspicious sound one sound harassing call is stored in the terminal, then in this case, the suspicious sound one sound harassing call number stored can be uploaded to described cloud computing server termly automatically by described mobile terminal.Or the suspicious sound one sound harassing call number stored can be uploaded to cloud computing server by user's indicating mobile terminal after user has checked missed call record at once.More preferably, in another example of the present invention, after completing the uploading of described suspicious sound one sound harassing call number, automatically can also delete the suspicious sound one sound harassing call number uploaded.
The flow chart according to the harassing call prevention method based on cloud computing of the present invention is described above with reference to Fig. 1.The above-mentioned harassing call prevention method based on cloud computing of the present invention, can adopt software simulating, also can adopt hardware implementing, or adopts the mode of software and hardware combination to realize.
Fig. 2 shows according to an embodiment of the invention based on the block diagram of the anti-locking apparatus 200 of harassing call of cloud computing.
As shown in Figure 2, the anti-locking apparatus 200 of harassing call according to the present invention comprises acquiring unit 21, first judging unit 220, second judging unit 230, incoming call handling unit 240, communication unit 250 and delete cells 260.
Described acquiring unit 210 is for obtaining the telephone number of Inbound Calls.After the telephone number obtaining this Inbound Calls, the first judging unit 220 judges in the address list whether this telephone number stores in the terminal or the white list that user is arranged.If this telephone number is in address list or white list, then connects this incoming call, and keep normal talking.
If this telephone number is in described address list and white list, then the second judging unit 230 judges whether this telephone number is ringing in a sound harassing call database.Described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile phone users by cloud computing server generates.
When this telephone number rings in a sound harassing call database at this, incoming call handling unit 240 processes according to the sound one acoustic-electric words processing mode pre-set.Such as, described sound one sonication mode such as can comprise just to be connected once receive Inbound Calls at once automatically, then hangs up at once.In this case, calling party can be made to produce communication cost, thus increase the fraud risk cost of calling party.Or described sound one sonication mode such as can comprise just to be hung up automatically once receive Inbound Calls, and deletes this missed call message registration at once.
When this telephone number does not ring in a sound harassing call database at this, after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number by incoming call handling unit 240.In addition, in an example of the present invention, described incoming call handling unit 240 also comprises memory cell (not shown), for storing the telephone number being treated to suspicious sound one sound harassing call number.In addition, in another example of the present invention, described incoming call handling unit 240 also comprises the 3rd judging unit (not shown), for judging whether the ring time of this Inbound Calls exceedes setting threshold; And Tip element (not shown), for telephone number being treated to suspicious sound one sound harassing call number and after described ring time is less than described setting threshold, uploading to cloud computing server to user's prompting the need of by this telephone number.If user determines not upload, then this telephone number is stored in the memory unit as suspicious sound one sound harassing call.
Communication unit 250 rings a sound harassing call database for described suspicious sound one sound harassing call number being uploaded to cloud computing server and downloading from cloud computing server.Such as, the telephone number being treated to suspicious sound one sound harassing call number can be uploaded to described cloud computing server by described communication unit 250 automatically.Or, when described suspicious sound one sound harassing call number stores in the terminal, stored suspicious sound one sound harassing call number regularly (such as, 15 minutes) can be uploaded to described cloud computing server by described communication unit 250 automatically.Or described communication unit after user has checked missed call record, can be indicated by user and stored suspicious sound one sound harassing call number is uploaded to cloud computing server.
Delete cells 260 for upload at described communication unit suspicious sound one sound harassing call number success after, automatically delete the suspicious sound one sound harassing call number uploaded.
In addition, in an example of the present invention, the anti-locking apparatus 200 of described harassing call can also comprise updating block (not shown), for regularly or download under mobile phone users sends update request from described cloud computing server and upgrade described sound one sound harassing call database.
Utilize the method and device, being undertaken ringing harassing call identification by being generated by cloud computing server to ring a sound harassing call database and download in mobile terminal to install, the identification accuracy of " ringing a sound " harassing call can be improved.In addition, described sound one sonication mode can also be arranged according to self-demand flexibly by mobile phone users.
Fig. 3 shows the schematic diagram of the mobile terminal 10 comprising the anti-locking apparatus 200 of harassing call shown in Fig. 2 of the present invention.
In addition, typically, mobile terminal of the present invention can be various hand-held terminal device, such as mobile phone, personal digital assistant (PDA) etc., and therefore protection scope of the present invention should not be defined as the mobile terminal of certain particular type.
In addition, the computer program performed by CPU can also be implemented as according to method of the present invention.When this computer program is performed by CPU, perform the above-mentioned functions limited in method of the present invention.
In addition, said method step and system unit also can utilize controller and realize for storing the computer readable storage devices making controller realize the computer program of above-mentioned steps or Elementary Function.
In addition, it is to be understood that computer readable storage devices as herein described (such as, memory) can be volatile memory or nonvolatile memory, or volatile memory and nonvolatile memory can be comprised.Nonrestrictive as an example, nonvolatile memory can comprise read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory can comprise random access memory (RAM), and this RAM can serve as external cache.Nonrestrictive as an example, RAM can obtain in a variety of forms, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhancing SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and direct RambusRAM (DRRAM).The memory device of disclosed aspect is intended to the memory including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, may be implemented as electronic hardware, computer software or both combinations in conjunction with various illustrative logical blocks, module, circuit and the algorithm steps described by disclosure herein.In order to this interchangeability of hardware and software is clearly described, the function with regard to various exemplary components, square, module, circuit and step has carried out general description to it.This function is implemented as software or is implemented as hardware and depends on embody rule and be applied to the design constraint of whole system.Those skilled in the art can realize described function in every way for often kind of embody rule, but this realization determines should not be interpreted as causing departing from the scope of the present invention.
The following parts being designed to perform function described here can be utilized to realize or perform in conjunction with various illustrative logical blocks, module and the circuit described by disclosure herein: any combination of general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete nextport hardware component NextPort or these parts.General processor can be microprocessor, but alternatively, processor can be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as the combination of computing equipment, and such as, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessor are in conjunction with DSP core or other this configuration any.
In the software module that step in conjunction with the method described by disclosure herein or algorithm can directly comprise within hardware, performed by processor or in the combination of both.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or other form any known in the art.Exemplary storage medium is coupled to processor, make processor can from this storage medium reading information or to this storage medium written information.In an alternative, described storage medium can be integral to the processor together.Processor and storage medium can reside in ASIC.ASIC can be in the user terminal resident.In an alternative, processor and storage medium can be in the user terminal resident as discrete assembly.
In one or more exemplary design, described function can realize in hardware, software, firmware or its combination in any.If realized in software, then described function can be transmitted on a computer-readable medium or by computer-readable medium as one or more instruction or code storage.Computer-readable medium comprises computer-readable storage medium and communication media, and this communication media comprises any medium contributing to computer program being sent to another position from a position.Storage medium can be can by any usable medium of universal or special computer access.Nonrestrictive as an example, this computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage device or other magnetic storage apparatus, or may be used for carrying or file layout be instruction or data structure required program code and can by other medium any of universal or special computer or universal or special processor access.In addition, any connection suitably can be called computer-readable medium.Such as, if use coaxial cable, optical fiber cable, twisted-pair feeder, the wireless technology of digital subscriber line (DSL) or such as infrared ray, radio and microwave is come from website, server or other remote source send software, then the wireless technology of above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared first, radio and microwave includes the definition at medium.As used herein, disk and CD comprise compact disk (CD), laser disk, CD, digital versatile disc (DVD), floppy disk, Blu-ray disc, the wherein usual magnetically rendering data of disk, and cd-rom using laser optics ground rendering data.The combination of foregoing also should be included in the scope of computer-readable medium.
Although disclosed content shows exemplary embodiment of the present invention above, it should be noted that under the prerequisite not deviating from the scope of the present invention that claim limits, can multiple change and amendment be carried out.Need not perform with any particular order according to the function of the claim to a method of inventive embodiments described herein, step and/or action.In addition, although element of the present invention can, with individual formal description or requirement, also it is contemplated that multiple, be odd number unless explicitly limited.
Although describe each embodiment according to the present invention above with reference to figure to be described, it will be appreciated by those skilled in the art that each embodiment that the invention described above is proposed, various improvement can also be made on the basis not departing from content of the present invention.Therefore, protection scope of the present invention should be determined by the content of appending claims.

Claims (4)

1., based on a harassing call prevention method for cloud computing, comprising:
Obtain the telephone number of Inbound Calls;
Judge in the address list whether this telephone number stores in the terminal or the white list that user is arranged, but the number not wishing to be considered to suspicious " ringing a sound " phone in address list that described white list is user to be arranged, comprises cell-phone telephone number, prefix and asterisk wildcard number;
When this telephone number is not in described address list and white list, judge whether this telephone number is ringing in a sound harassing call database,
If this telephone number rings in a sound harassing call database at this, then process according to the sound one acoustic-electric words processing mode pre-set, described sound one sonication mode comprises: just automatically connecting once receive Inbound Calls, then hanging up; Or just automatically hang up once receive Inbound Calls, and delete this missed call message registration;
If this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number be treated to suspicious sound one sound harassing call number and upload to cloud computing server, and, after uploading described suspicious sound one sound harassing call number, automatically delete the suspicious sound one sound harassing call number uploaded;
Wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile terminal by described cloud computing server generates, and by regularly or download under mobile phone users sends update request from described cloud computing server and store in the terminal; And;
For the suspicious sound one sound harassing call number that mobile phone users is uploaded, if this suspicious sound one sound harassing call number is proved to be sound one sound harassing call or its probability of occurrence exceedes predetermined threshold, this suspicious sound one sound harassing call number then adds in sound one sound harassing call database by cloud computing server automatically.
2. the method for claim 1, wherein, if this telephone number does not ring in a sound harassing call database at this, then after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number and uploads to cloud computing server and also comprise:
After this telephone number being treated to suspicious sound one sound harassing call number, this telephone number is stored as suspicious sound one sound harassing call number; And
Stored suspicious sound one sound harassing call number is uploaded to cloud computing server.
3., based on the anti-locking apparatus of harassing call of cloud computing, comprising:
Acquiring unit, for obtaining the telephone number of Inbound Calls;
First judging unit, for judging in the address list whether this telephone number stores in the terminal or the white list that user is arranged, but the number not wishing to be considered to suspicious " ringing a sound " phone in address list that described white list is user to be arranged;
Second judging unit, for when this telephone number is not in described address list and white list, judges whether this telephone number is ringing in a sound harassing call database;
Incoming call handling unit, if ring in a sound harassing call database for this telephone number at this, then process according to the sound one acoustic-electric words processing mode pre-set, described sound one sonication mode comprises: just automatically connecting once receive Inbound Calls, then hanging up; Or just automatically hang up once receive Inbound Calls, and delete this missed call message registration; And, if this telephone number does not ring in a sound harassing call database at this, then, after this Inbound Calls is hung up, this telephone number is treated to suspicious sound one sound harassing call number;
Communication unit, rings a sound harassing call database for described suspicious sound one sound harassing call number being uploaded to cloud computing server and downloading from cloud computing server;
Delete cells, for complete the uploading of suspicious sound one sound harassing call number at described communication unit after, deletes the suspicious sound one sound harassing call number uploaded automatically;
Updating block, for regularly or download under mobile phone users sends update request from described cloud computing server and upgrade described sound one sound harassing call database;
Wherein, described sound one sound harassing call database is that the suspicious sound one sound harassing call number uploaded according to mobile phone users by described cloud computing server generates;
For the suspicious sound one sound harassing call number that mobile phone users is uploaded, if this suspicious sound one sound harassing call number is proved to be sound one sound harassing call or its probability of occurrence exceedes predetermined threshold, this suspicious sound one sound harassing call number then adds in sound one sound harassing call database by cloud computing server automatically.
4. a mobile terminal, comprises the anti-locking apparatus of harassing call as claimed in claim 3.
CN201110282539.7A 2011-09-21 2011-09-21 Based on the harassing call prevention method of cloud computing, device and mobile terminal Expired - Fee Related CN102316203B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110282539.7A CN102316203B (en) 2011-09-21 2011-09-21 Based on the harassing call prevention method of cloud computing, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110282539.7A CN102316203B (en) 2011-09-21 2011-09-21 Based on the harassing call prevention method of cloud computing, device and mobile terminal

Publications (2)

Publication Number Publication Date
CN102316203A CN102316203A (en) 2012-01-11
CN102316203B true CN102316203B (en) 2015-09-16

Family

ID=45429006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110282539.7A Expired - Fee Related CN102316203B (en) 2011-09-21 2011-09-21 Based on the harassing call prevention method of cloud computing, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN102316203B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220393A (en) * 2012-01-18 2013-07-24 百度在线网络技术(北京)有限公司 Method and device for preventing telephone nuisance
US9256742B2 (en) * 2012-01-30 2016-02-09 Intel Corporation Remote trust attestation and geo-location of servers and clients in cloud computing environments
CN104081713B (en) 2012-01-30 2018-08-17 英特尔公司 The long-range trust identification of server and client computer in cloud computing environment and geographical location
CN102752732A (en) * 2012-07-09 2012-10-24 江南大学 Junk message rejection method based on cloud framework
CN103685846A (en) * 2012-08-31 2014-03-26 丰桂兰 Internet-connected fax machine, Internet fax system and junk fax filtering method of Internet fax system
CN103780734A (en) * 2012-10-23 2014-05-07 江南大学 System and method for mobile phone automatic answering
CN103841123A (en) * 2012-11-20 2014-06-04 中国电信股份有限公司 Number information obtaining method and obtaining system, and cloud number information system
US9264870B2 (en) 2013-04-08 2016-02-16 Xiaomi Inc. Mobile terminal, server and calling method based on cloud contact list
CN104348947A (en) * 2013-07-30 2015-02-11 腾讯科技(深圳)有限公司 Method and device of managing incoming call of mobile terminal
CN103944986B (en) * 2014-04-18 2018-01-02 北京搜狗科技发展有限公司 The method and device of personalized resource is integrated for user
CN104378488A (en) * 2014-07-08 2015-02-25 腾讯科技(深圳)有限公司 Harassing call processing method and device
CN105472587A (en) * 2014-08-26 2016-04-06 小米科技有限责任公司 Incoming call processing method and device
CN104284325B (en) * 2014-10-15 2018-07-31 北京搜狗科技发展有限公司 A kind of address book updating method and device
CN105657130A (en) * 2015-11-30 2016-06-08 东莞酷派软件技术有限公司 Crank call intercepting method and system
CN105959927A (en) * 2016-04-22 2016-09-21 成都蓝燚软件开发有限公司 System and method for pushing incoming call information among mobile communication terminals
CN105898001B (en) * 2016-06-02 2020-06-30 北京安云世纪科技有限公司 Communication information processing method and device and server
CN107889111A (en) * 2016-09-30 2018-04-06 北京金山安全软件有限公司 Crank call identification method and device based on deep neural network
CN106357938A (en) * 2016-11-30 2017-01-25 深圳天珑无线科技有限公司 Caller ID (identification) processing method and caller ID processing device
CN106603794A (en) * 2016-12-26 2017-04-26 北京奇虎科技有限公司 Updating method and updating device of iOS system nuisance telephone number database, and mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022470A (en) * 2007-03-16 2007-08-22 中兴通讯股份有限公司 Metod for preventing/judging trap incoming call and telephone set capable of preventing trap incoming call
CN101808086A (en) * 2010-03-01 2010-08-18 魏新成 Method for adding and storing telephone website in communication terminal telephone directory
CN101827147A (en) * 2009-01-20 2010-09-08 北京网秦天下科技有限公司 Telephone firewall for preventing hang-up of calling with once ringing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022470A (en) * 2007-03-16 2007-08-22 中兴通讯股份有限公司 Metod for preventing/judging trap incoming call and telephone set capable of preventing trap incoming call
CN101827147A (en) * 2009-01-20 2010-09-08 北京网秦天下科技有限公司 Telephone firewall for preventing hang-up of calling with once ringing
CN101808086A (en) * 2010-03-01 2010-08-18 魏新成 Method for adding and storing telephone website in communication terminal telephone directory

Also Published As

Publication number Publication date
CN102316203A (en) 2012-01-11

Similar Documents

Publication Publication Date Title
CN102316203B (en) Based on the harassing call prevention method of cloud computing, device and mobile terminal
CN104869248B (en) The method and device of information of mobile terminal prompt
US9516163B2 (en) Analyzing telephone calls
US9509821B2 (en) Method to mute automatically phone calls on mobile communication device
CN103297941A (en) Communication event processing method and communication event processing device
US8406740B2 (en) Computerized system and method of recording communications between parties using telecommunications devices
JP6126751B2 (en) Telephone call identification method, telephone call identification device, program, and recording medium
EP3160115A1 (en) Identity identification method and apparatus and communication terminal
CN104486476A (en) Crank call interception method and device
CN103220391A (en) Cloud address book-based device, server and calling method
CN107770777B (en) Method for identifying recorded fraud calls
US11706336B2 (en) Managing spoofed calls to mobile devices
US8331268B2 (en) Methods, systems, and computer-readable media for providing an event alert
CN106161749A (en) A kind of malicious call recognition methods, and device
CN109257480A (en) Call processing method, mobile terminal and computer storage medium
CN107018227A (en) Incoming call processing method and device
CN107508991A (en) A kind of communication processing method and device, terminal and readable storage medium storing program for executing
CN102158584A (en) Method, device and system for automatically identifying phone number of communication initiator
CN105516988A (en) Telephone filtering method and device, electronic equipment and server
CN114979378A (en) Incoming call processing method and device
JP2004274256A (en) Management server and communication system
JP4696528B2 (en) Nuisance call prevention method and program
CN114095609B (en) Incoming call processing method and storage medium
CN113840029B (en) Abnormal call state identification method and device
CN103856601A (en) Incoming call displaying method and telephone calling method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200702

Address after: 310052 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Alibaba (China) Co.,Ltd.

Address before: 2, 16, 301 rooms, 510665 Yun Yun Road, Tianhe District, Guangdong, Guangzhou

Patentee before: Guangzhou Dongjing Computer Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200819

Address after: 310024 Hangzhou City, Zhejiang Province, Xihu District turn pond science and technology economic block No. 16, 8

Patentee after: ALIYUN COMPUTING Co.,Ltd.

Address before: 310052 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Alibaba (China) Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150916