Device and method of intercepting voice call

A voice call and interception device technology, which is applied in security devices, telephone communications, wireless communications, etc., can solve problems such as insufficient interception and impact on the use of terminal data services, so as to speed up scene recovery, improve user experience, and recover quickly Effect

Active Publication Date: 2016-10-05
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to propose a device and method for intercepting voice calls, aiming to solve the problem that the current way of intercepting harassing calls is not thorough enough to affect the use of other data services in the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method of intercepting voice call
  • Device and method of intercepting voice call
  • Device and method of intercepting voice call

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0077] This embodiment provides a voice call interception device, which can be applied to a terminal, and the device is used to intercept harassing calls, image 3 is the block diagram of the device, such as image 3 As shown, the device 30 may include the following components:

[0078] The first switching module 31 is configured to establish a connection with the base station after receiving a broadcast message from the base station;

[0079] In this embodiment, after the base station near the called terminal receives the request from the calling party to call the called party, it broadcasts a message to find the called party. After receiving the broadcast message from the base station, the called party responds and authenticates with the base station. After exchanging information such as rights, establish a connection with the base station. Optionally, the terminal switches the network back from 3G or 4G to the 2G state, that is, in this embodiment, the terminal may be in ...

no. 2 example

[0092] This embodiment provides another voice call interception device, which includes:

[0093] The first switching module is configured to establish a connection with the base station after receiving a broadcast message from the base station, and switch the current network of the terminal to 2G;

[0094] The receiving module is used for receiving the voice establishment request from the base station;

[0095] An acquisition module, configured to acquire an incoming call number according to a voice establishment request;

[0096] The second switching module is used to switch the current network from 2G to 3G or 4G after obtaining the caller number according to the voice establishment request;

[0097] It should be noted that, in the first embodiment above, after the called party obtains the calling number, it needs to keep the network fallback state, that is, the 3G or 4G state falls back to the 2G state, but in this embodiment, after obtaining the calling number After the ...

no. 3 example

[0107] In this embodiment, a voice call interception method based on process control is proposed by analyzing the initiation and establishment process of the voice call, and researching the harassment interception method based on the application layer of the traditional terminal. In this embodiment, after the voice establishment request of the harassing number arrives at the user's terminal, the bottom layer of the user terminal splits the signaling to obtain the harassing number itself, and then compares it with the harassing phone number in the terminal's harassing database. If the current incoming call is a harassment number, no link will be established with it. Otherwise, the user will be reminded of the incoming call. The following is an example combined with the attached Figure 4 The method for intercepting a voice call provided by the present invention will be described below.

[0108] First, user B's number is set as a nuisance number by user A, such as Figure 4 As ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention mainly aims at providing a device and a method of intercepting a voice call, so as to solve the problem that the current crank call intercepting mode influences use of other data service in a terminal. The device comprises a first switching module, a receiving module, an acquisition module, a judgment module, an informing module and a first prompting module, wherein the first switching module is used for building connection with a base station after a broadcasting message from the base station is received; the receiving module is used for a voice building request from the base station; the acquisition module is used for acquiring an incoming call number according to the voice building request; the judgment module is used for judging whether the incoming call number is a crank call number; the informing module is used for informing the base station not to respond to the current incoming call when the judgment result of the judgment module is yes; and the first prompting module is used for prompting the current incoming call for the user when the judgment result of the judgment module is no. The scheme of the invention can quicken the recovery speed of the data service scene, and reduce network recovery waiting time by the user.

Description

technical field [0001] The invention relates to the field of voice calls, in particular to a voice call interception device and method. Background technique [0002] With the development of communication technology, more and more merchants and lawbreakers use mobile phones, landline phones, Internet and other communication technologies to carry out advertising, illegal publicity and financial fraud in order to achieve profit, causing many phone users to feel At the same time, it brings economic losses to individuals and disrupts the normal social order. At present, most of the interception methods for harassing calls are based on the application layer of the terminal. Before the harassing calls are intercepted, the network of the terminal keeps falling back, and the network of the terminal will not recover until the harassing calls are completely intercepted. As a result, other data services in the terminal are interrupted, so there is unnecessary resource overhead in the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/663H04W12/12H04W12/128
CPCH04M1/663H04W12/12
Inventor 杨显钧
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products