Check patentability & draft patents in minutes with Patsnap Eureka AI!

Communication information intercepting method and device

A technology for communicating information and text messages, which is applied in the field of communication, and can solve problems such as the inability to intercept spam text messages or calls

Inactive Publication Date: 2017-05-31
MEIZU TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Both the blacklist and cloud identification interception methods have certain disadvantages, such as a certain delay. When receiving a text message / call from a certain phone number for the first time, or when there is no identification method in the cloud identification, it cannot be detected in time. Interception of spam text messages or phone calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication information intercepting method and device
  • Communication information intercepting method and device
  • Communication information intercepting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] figure 1 It is a schematic flowchart of a method for intercepting communication information provided by an embodiment of the present invention. The method for intercepting communication information is applied to an electronic device, and the electronic device may be a terminal capable of receiving calls and short messages, such as a mobile phone and a tablet. Such as figure 1 As shown, the method for intercepting communication information may include the following steps:

[0048] S120: After receiving the communication information, acquire the phone number of the sender of the communication information, where the communication information includes at least one of a short message and an incoming call.

[0049] After the electronic device receives the communication information, the electronic device obtains the phone number of the sender of the communication information. When communicating, both the receiver and the sender have their own phone numbers.

[0050] In spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication information intercepting method which comprises the following steps: obtaining a phone number of a sender of communication information after receiving the communication information, wherein the communication information comprises at least one of short text message and an incoming call; judging whether length of the phone number is preset length and whether the phone number comprises preset characters or not; and if the length of the phone number is not the preset length or the phone number does not contain the preset characters, performing intercepting operation on the communication information. The invention further provides a communication information intercepting device. The purpose of intercepting junk short message or call can be realized.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for intercepting communication information. Background technique [0002] At present, the interception of spam text messages and phone calls is basically based on blacklist interception or cloud identification interception. Blacklist interception is to intercept calls or text messages in the blacklist after the user sets the blacklist. Cloud identification is to place the received phone number or SMS content in the cloud for identification and analysis, and intercept it according to the analysis results. [0003] Both the blacklist and cloud identification interception methods have certain disadvantages, such as a certain delay. When receiving a text message / call from a certain phone number for the first time, or when there is no identification method in the cloud identification, it cannot be detected in time. Intercept spam text messages or phone cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/14H04W12/12
CPCH04W4/14H04W12/12
Inventor 陈文俊
Owner MEIZU TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More