Message reminding method, communication interception method, terminal and computer storage medium

A technology of message reminder and communication information, applied in the field of communication

Inactive Publication Date: 2018-04-13
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is that when the second user sets the first user as a blacklist user, since the first user cannot know that he is a blacklist user of the second user, he

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message reminding method, communication interception method, terminal and computer storage medium
  • Message reminding method, communication interception method, terminal and computer storage medium
  • Message reminding method, communication interception method, terminal and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0078] In order to solve the existing solution, when the second user sets the first user as a blacklist user, since the first user cannot know that he is a blacklist user of the second user, he will continue to send communication requests to the second user, resulting in communication resources For the problem of waste, this embodiment provides a message reminder method, please refer to image 3 shown, including:

[0079] S301: When adding the first user information of the first target user to the first blacklist, generate an interception reminder message, where the first user information includes first communication information for establishing a communication connection with the first target user.

[0080] It should be noted that the first communication information in this embodiment may be the first phone number of the first target user, and on this basis may also include the name of the first contact; or it may also be based on a certain application User identification in...

no. 2 example

[0107] In order to solve the existing solution, after the second target user sets the first target user as a blacklist user, since the first target user cannot know that he is a blacklist user of the second target user, he will continue to send communication requests to the second target user , the second target user will receive these communication requests and process these communication requests, causing the problem that the second target user misses the communication sent by other users while the line is busy. This embodiment provides a communication interception method, please refer to Figure 6 shown, including:

[0108] S601: Receive an interception reminder message sent by a second target user.

[0109] Specifically, the interception reminder message sent by the second target user in the above-mentioned first embodiment may be received, and in this case, the execution subject of step S601 is essentially the first target user.

[0110] S602: Acquire second user informa...

example 1

[0112] Example 1: If the first communication information includes the first phone number and the second communication information includes the second phone number, when the second target user adds the first phone number of the first target user to the first blacklist, an interception reminder can be generated message, and the interception reminder message can be sent to the first target user according to the first phone number, that is, the interception reminder message is sent by the second target user to the first target user, so the first target user receives the When the reminder message is intercepted, the corresponding second phone number of the second target user can be found. It should be noted that the second phone number in this embodiment can also be a mobile phone number.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message reminding method and a communication interception method. The message reminding method comprises the following steps: adding first communication information of a first target user to a first blacklist and generating an interception reminding message by a second target user, acquiring the first communication information of the first target user, and sending the interception reminding message to the first target user according to the first communication information; and after receiving the interception reminding message by the first target user, acquiring secondcommunication information of the second target user, when a communication request is received, judging whether to establish a communication connection with the second target user through the second communication information according to the communication request, and if yes, intercepting the communication request. The invention further discloses a terminal and a computer storage medium. Through the implementation of the above scheme, the first target user can know that the first target user is a blacklist user of the second target user, so that the problem that communication resources are wasted due to the fact that the first target user sends the useless communication request to the second target user is avoided.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a message reminder method, a communication interception method, a terminal and a computer storage medium. Background technique [0002] With the development of science and technology, mobile phones have become an indispensable communication tool for people. In the existing mobile phone solution, the user currently using the mobile phone can add the harassing user to the blacklist according to actual needs. For example, after user B adds the phone number of user A to the blacklist, if When the user sends a call request, user B can automatically reject the call request, but there will be a problem in this way. Since user A does not know that user B has set user A as a blacklist user, user A may continue to call user B. After sending a call request, user B will automatically reject the call request after receiving the call request and confirming that the call...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/663H04M1/677
CPCH04M1/663H04M1/677
Inventor 蒋权
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products