Incoming call processing method and device

A technology for incoming call processing and incoming calls, which is applied in the field of mobile communication to achieve the effects of avoiding harassment, realizing intelligent management, and preventing harassment

Inactive Publication Date: 2016-04-06
XIAOMI INC
View PDF5 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above scheme cannot effectively prevent those harassing calls that have been marked as "fraud", "sales", "intermediary" from causing harassment to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Incoming call processing method and device
  • Incoming call processing method and device
  • Incoming call processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0099] When the user chooses to reject the harassing call by operating the answer option, after receiving the rejection instruction, the terminal can provide the user with a caller number management option through the display interface, and the caller number management option is used to prompt the user whether to choose to The caller number is added to the blacklist, and the user confirms whether to add the caller number of the harassing call to the blacklist by operating the caller number management option.

[0100] For example, see Figure 4 , the caller number management option may be a pop-up window presented by the terminal on the answering interface. When the terminal receives the rejection instruction, it can pop up a pop-up window for the user on the display interface, "whether to add this number to the blacklist", the pop-up window includes two user options of "yes" and "no"; when the user selects When "Yes", add the calling number to the blacklist.

Embodiment approach 2

[0102] When the user chooses to reject the harassing call by operating the answering option, the terminal automatically triggers adding the phone number of the harassing call to the blacklist after receiving the rejection instruction.

[0103] For example, see Figure 5 , which can be used as image 3 On the basis of the answering interface shown, there is an option of "reject and add to the blacklist". When the incoming call is marked as a nuisance call, the user can operate this option by sliding the finger down to hang up the nuisance call , and directly add the calling number of the harassing call to the blacklist.

Embodiment approach 3

[0105] Set the preset duration, when the user does not operate the answer option within the preset duration, that is, when the terminal does not receive a reject or answer command within the preset duration, the harassing call will be hung up and the harassing call will be automatically triggered to add the caller number to the blacklist. For example, the preset duration can be set to 30 seconds. When the user does not answer an unfamiliar call marked as a nuisance call for more than 30 seconds, the system will automatically hang up the call and add the caller number to the blacklist. Alternatively, when the terminal does not receive a reject or answer command within the preset time period, the user may leave or not carry the terminal with him at this time, so a message such as Figure 4 The pop-up window of "whether to add this number to the blacklist" shown, when the user sees the pop-up window again, the user can choose whether to add the caller number to the blacklist. Of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an incoming call processing method. The method comprises the following steps: receiving an incoming call of an unfamiliar number, and obtaining a label of the unfamiliar number from a server; judging whether the incoming call is a nuisance call according to the label; when the incoming call is the nuisance call, monitoring whether the incoming call is answered; and when the incoming call is not answered, adding the number of the incoming call to a blacklist. The method is characterized by monitoring whether the incoming call is answered by a user when the incoming call number is identified as the nuisance call, and triggering the operation of adding the number of the incoming call to the blacklist when detecting that the user does not answer the incoming call; the operation is simple and quick; and the method and device can effectively prevent the nuisance call from harassing the user by calling again and again.

Description

technical field [0001] The present disclosure relates to the field of mobile communications, in particular to a method and device for processing incoming calls. Background technique [0002] With the development of cloud technology, the recognition of unfamiliar calls by mobile terminals becomes more and more intelligent. For example, in related technologies, a user can mark a certain strange call and upload it to the cloud. When the strange call is marked by a large number of users at the same time, when the user receives the strange call again, it will be intelligently displayed on the mobile terminal. Tags for unfamiliar calls, such as "scam", "sell", "intermediary", etc. [0003] However, the above solution cannot effectively prevent those harassing calls that have been marked as "fraud", "sales", "intermediary" and the like from harassing users. Contents of the invention [0004] In order to overcome the problems existing in related technologies, the present disclos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/16
Inventor 潘龙王广健权雪梅
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products