Device and method for intercepting voice calls

A technology for voice calls and interception devices, applied in security devices, telephone communication, wireless communication, etc., can solve problems such as affecting the use of terminal data services, insufficient interception, etc., to speed up scene recovery, improve user experience, and intercept fast. Effect

Active Publication Date: 2019-04-19
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to propose a device and method for intercepting voice calls, aiming to solve the problem that the current way of intercepting harassing calls is not thorough enough to affect the use of other data services in the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for intercepting voice calls
  • Device and method for intercepting voice calls
  • Device and method for intercepting voice calls

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0077] This embodiment provides a voice call interception device, which can be applied to a terminal, and the device is used to intercept harassing calls, image 3 is the block diagram of the device, such as image 3 As shown, the device 30 may include the following components:

[0078] The first switching module 31 is configured to establish a connection with the base station after receiving a broadcast message from the base station;

[0079] In this embodiment, after the base station near the called terminal receives the request from the calling party to call the called party, it broadcasts a message to find the called party. After receiving the broadcast message from the base station, the called party responds and authenticates with the base station. After exchanging information such as rights, establish a connection with the base station. Optionally, the terminal switches the network back from 3G or 4G to the 2G state, that is, in this embodiment, the terminal may be in ...

no. 2 example

[0092] This embodiment provides another voice call interception device, which includes:

[0093] The first switching module is configured to establish a connection with the base station after receiving a broadcast message from the base station, and switch the current network of the terminal to 2G;

[0094] The receiving module is used for receiving the voice establishment request from the base station;

[0095] An acquisition module, configured to acquire an incoming call number according to a voice establishment request;

[0096] The second switching module is used to switch the current network from 2G to 3G or 4G after obtaining the caller number according to the voice establishment request;

[0097] It should be noted that, in the first embodiment above, after the called party obtains the calling number, it needs to keep the network fallback state, that is, the 3G or 4G state falls back to the 2G state, but in this embodiment, after obtaining the calling number After the ...

no. 3 example

[0107] In this embodiment, a voice call interception method based on process control is proposed by analyzing the initiation and establishment process of the voice call, and researching the harassment interception method based on the application layer of the traditional terminal. In this embodiment, after the voice establishment request of the harassing number arrives at the user's terminal, the bottom layer of the user terminal splits the signaling to obtain the harassing number itself, and then compares it with the harassing phone number in the terminal's harassing database. If the current incoming call is a harassment number, no link will be established with it. Otherwise, the user will be reminded of the incoming call. The following is an example combined with the attached Figure 4 The method for intercepting a voice call provided by the present invention will be described below.

[0108] First, user B's number is set as a nuisance number by user A, such as Figure 4 As ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The main purpose of the present invention is to propose a device and method for intercepting voice calls, aiming to solve the problem that the interception method of harassing calls affects the use of other data services in the terminal. The device includes: a first switching module, used to establish a connection with the base station after receiving a broadcast message from the base station; a receiving module, used to receive a voice establishment request from the base station; an acquisition module, used to acquire the caller number according to the voice establishment request The judging module is used to judge whether the incoming call number is a nuisance phone number; the notification module is used to notify the base station not to respond to the current incoming call when the judging result of the judging module is yes; the first prompt module is used to judge the result of the judging module If not, the user is prompted for the current incoming call. This solution can speed up the recovery of data service scenarios and reduce the time for users to wait for network recovery.

Description

technical field [0001] The invention relates to the field of voice calls, in particular to a voice call interception device and method. Background technique [0002] With the development of communication technology, more and more merchants and lawbreakers use mobile phones, landline phones, Internet and other communication technologies to carry out advertising, illegal publicity and financial fraud in order to achieve profit, causing many phone users to feel At the same time, it brings economic losses to individuals and disrupts the normal social order. At present, most of the interception methods for harassing calls are based on the application layer of the terminal. Before the harassing calls are intercepted, the network of the terminal keeps falling back, and the network of the terminal will not recover until the harassing calls are completely intercepted. As a result, other data services in the terminal are interrupted, so there is unnecessary resource overhead in the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/663H04W12/12H04W12/128
CPCH04M1/663H04W12/12
Inventor 杨显钧
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products