Malicious call identification method
A malicious call and identification method technology, applied in the communication field, can solve the problems of large storage space, application server occupation, inconvenience, etc., and achieve the effect of meeting the demand
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings.
[0022] refer to figure 2 , illustrating a malicious call identification method according to an embodiment of the present invention. Such as figure 2 As shown, the malicious call identification method includes the following steps: S202, the second user terminal initiates a call invitation request to the first user terminal and establishes a connection with the first user terminal, wherein the first user terminal pre-registers the malicious call identification service, The call invitation request passes through the malicious call identification application server, and the malicious call identification application server temporarily stores the information of the call invitation request; S204, the first user terminal judges that the call is a malicious call, and sends the malicious call The information record instruction is sent t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 