Method and device of intelligent intercept
An intelligent and information communication technology, applied in the field of information processing, can solve the problems of low convenience, poor intelligent interception and interception effect, and imperfect functions, and achieve the effect of improving convenience, accurate matching results, and improving interception effect.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0082] Example one
[0083] This example provides a method of intelligent interception, see figure 1 , The method flow is as follows:
[0084] 101: Receive communication information, where the communication information includes at least one of an incoming call and a short message;
[0085] 102: Match the communication information with a preset interception rule, and perform an interception operation on the communication information according to the matching result. The preset interception rule includes interception of incoming calls and short messages of preset numbers, and a preset key At least one of the short messages of the word to be intercepted.
[0086] Preferably, before matching the communication information with the preset interception rule, the method further includes:
[0087] Pre-processing communication information;
[0088] Match communication information with preset blocking rules, including:
[0089] Match the pre-processed communication information with preset blocking ...
Example Embodiment
[0118] In order to elaborate on the method provided in the first embodiment above, in the following, combined with the content of the first embodiment, the following embodiment two and third embodiment are taken as examples to illustrate the method of intelligent interception. For details, see the following embodiment two And the third embodiment:
[0119] Example two
[0120] This example provides a method of intelligent interception. For ease of description, combined with the content of the first embodiment, the preset interception rule is used as a preset blacklist containing interception numbers, that is, incoming calls and short messages of preset numbers are processed. Interception is taken as an example to illustrate the method provided in this embodiment. See figure 2 The specific process of the method provided in this embodiment is as follows:
[0121] 201: A blacklist is preset, and the blacklist contains numbers that need to be blocked;
[0122] Specifically, this embodi...
Example Embodiment
[0142] Example three
[0143] This example provides an intelligent interception method. For ease of description, combined with the content of the first embodiment above, the preset interception rule is used as the preset keyword, that is, the interception of the short message with the preset keyword as an example. The methods provided in the embodiments are illustrated by examples. Since the preset interception rule is a preset keyword, the communication information applicable to the preset interception rule includes the phone number for sending the short message and the content of the short message. See image 3 The specific process of the method provided in this embodiment is as follows:
[0144] 301: Pre-set keywords, and use the preset keywords as the preset blocking rule;
[0145] Specifically, this embodiment does not limit the specific content and quantity of the preset keywords. In order to filter the communication information that needs to be intercepted according to the p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap