Call processing method, user terminal and server

A technology of call processing and server, which is applied in the field of communication to achieve the effect of improving user experience

Active Publication Date: 2016-03-30
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a call processing method, a user terminal and a server to solve the technical problem in the prior art that the user cannot avoid some malicious harassing calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call processing method, user terminal and server
  • Call processing method, user terminal and server
  • Call processing method, user terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1 of the present invention provides a call processing method. figure 1 It is a flow chart of the call processing method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method in this embodiment may include:

[0037] Step 101. Receive a call request sent by a calling terminal, where the call request carries an identifier of the calling terminal and an identifier of the called terminal.

[0038] Specifically, the execution subject in this embodiment may be a server. The calling terminal identifier may be the calling terminal number or account, and the called terminal identifier may be the called terminal number or account.

[0039] Step 102: Send the call request to the called terminal corresponding to the called terminal identifier, so that the called terminal inquires whether the calling terminal identifier is in the address book of the called terminal.

[0040] After the query is completed, the called terminal may send a...

Embodiment 2

[0055] Embodiment 2 of the present invention provides a call processing method. In this embodiment, on the basis of the technical solution provided in Embodiment 1, further verification is performed on the calling terminal when the first reply is correct. figure 2 It is a flow chart of the call processing method provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the method in this embodiment may include:

[0056] Step 201, the server receives a call request sent by a calling terminal, and the call request carries an identification of the calling terminal and an identification of the called terminal.

[0057] Step 202, the server sends the call request to the called terminal corresponding to the called terminal identifier.

[0058] Step 203, the called terminal queries whether the calling terminal identifier is in the address book of the called terminal.

[0059] Step 204, the server receives the query result returned by the called terminal.

...

Embodiment 3

[0082] Embodiment 3 of the present invention provides a call processing method. This embodiment is based on the technical solution provided by the first embodiment, and provides a call processing method when the identification of the calling terminal is in the address book of the called terminal. image 3 It is a flow chart of the call processing method provided by Embodiment 3 of the present invention. Such as image 3 As shown, the method in this embodiment may include:

[0083] Step 301, the server receives a call request sent by a calling terminal, and the call request carries a calling terminal identifier and a called terminal identifier.

[0084] Step 302, the server sends the call request to the called terminal corresponding to the called terminal identifier.

[0085] Step 303, the called terminal inquires whether the calling terminal ID is in the address book of the called terminal: if it is in the address book, the called terminal searches for the calling terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a call processing method, a user terminal and a server. The call processing method comprises the steps of receiving a call request sent by a calling terminal, wherein the call request contains the identifier of the calling terminal and the identifier of a called terminal; sending the call request to the called terminal corresponding to the identifier of the called terminal to enable the called terminal to find out whether the identifier of the calling terminal is in the address book of the called terminal or not; receiving a search result returned by the called terminal; if the search result shows that the identifier of the calling terminal is not in the address book, sending a standard verification problem to the calling terminal to enable a calling party to input a first replay in the calling terminal according to the standard verification problem; receiving the first reply returned by the calling terminal and judging whether the first reply is correct or not; if not correct, ending the current call. Based on the call processing method, the user terminal and the server, malicious harassment calls can be filtered out to a certain extent. Therefore, the user experience is improved.

Description

technical field [0001] The present invention relates to communication technology, in particular to a call processing method, user terminal and server. Background technique [0002] With the continuous development of modern society, users often receive some strange calls, some of which are useless calls such as advertisements, promotions or even malicious harassment, which bring a lot of inconvenience to users. [0003] In the prior art, in order to prevent malicious harassment, the user can set a blacklist in the terminal. When a number in the blacklist initiates a call, the terminal can directly block the call, which can effectively prevent the number in the blacklist from initiating calls to the user. malicious harassment. However, the number saved in the blacklist is limited, and the user can only know the malicious phone number after receiving a malicious call. Therefore, many malicious phone numbers are not saved in the blacklist. [0004] When there are strange calls...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/667
CPCH04M1/667
Inventor 师瑜严斌峰周晶魏亚杰
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products