Block-chain-technology-based crank incoming call and harassing text message interception method and system

An interception system and blockchain technology, applied in the field of harassing call interception, can solve problems such as high maintenance costs

Inactive Publication Date: 2017-06-20
北京思特奇信息技术股份有限公司
View PDF8 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and system for intercepting harassing calls and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block-chain-technology-based crank incoming call and harassing text message interception method and system
  • Block-chain-technology-based crank incoming call and harassing text message interception method and system
  • Block-chain-technology-based crank incoming call and harassing text message interception method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0065] The blockchain database is a transaction database shared by all nodes in the system. These nodes participate in the blockchain network based on the value exchange protocol to save the harassing phone data originally stored on the central server in the form of blocks. Each block records The harassment calls are all data exchange activities that occurred after the previous block was formed and before the block was created. This feature ensures the integrity of the database; in most cases, once the new block is completed, it is added to the block At the end of the chain, the data records of this block can no longer be changed or deleted. This feature guarantees the rigor of the database and cannot be tampered wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which relates to the crank call interception field, provides a block-chain-technology-based crank incoming call and harassing text message interception method and system. According to a communication content, whether a call received by a current mobile phone is a crank call is determined; if so, an on-hook operation is carried out according to preset on-hook time and the crank call is stored into a memory card of the phone and is used as a temporary data file; the crank call is sent to all mobile phone terminals associated with the mobile phone and the crank call is marked as an official data file according to information returned by other mobile phone terminals; the crank call that is marked as the official data file is ranked regularly and is packaged as a block, and the packaged block is sent to all mobile phone terminals associated with the mobile phone; and all the mobile phone terminals receiving the block identify the block and generate block chains. The block-chain-technology-based crank incoming call and harassing text message interception method and system are suitable for crank incoming call and harassing text message interception.

Description

technical field [0001] The invention relates to the field of harassing call interception. Background technique [0002] There are more and more harassing calls and text messages, endless marketing harassing calls and text messages, and personal information being stolen; many people are familiar with these situations, and some suffer from them; we usually use some software to intercept , such as Tencent Mobile Manager, 360 Mobile Guard, or the security software provided by the mobile phone manufacturer. When a harassing call comes in, it will prompt you. At present, this kind of anti-harassment security software needs the support of the background database server. All marked harassment calls need to be stored in the central database server. All data identification and transmission must use the server of the software provider as the main node, which requires the support of the software manufacturer. Maintenance and data services are required to complete the function. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/663H04M1/665
CPCH04M1/663H04M1/665
Inventor 李波涛
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products