Communication monitoring method and device

A technology for monitoring and monitoring strategies during calls, applied in the field of communications, can solve the problem of insufficient interception of harassing calls, and achieve the effect of improving monitoring and prevention capabilities and improving the interception rate.

Inactive Publication Date: 2018-11-02
ZTE CORP
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a call monitoring method and device to at least solve the technical problem of insufficient interception of harassing calls in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication monitoring method and device
  • Communication monitoring method and device
  • Communication monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal of a call monitoring method according to an embodiment of the present invention. like figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission device 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, the mobile terminal 10 may also include figure 1 more...

Embodiment 2

[0058] In this embodiment, a call monitoring device is also provided, which is used to implement the above embodiments and preferred implementation modes, and those that have been explained will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0059] image 3 is a structural block diagram of a call monitoring device according to an embodiment of the present invention, such as image 3 As shown, the device includes:

[0060] The first judging module 30 is used to judge whether the called number exists in the preset blacklist of harassing calls when the calling number initiates a call to the called number;

[0061] The first interception module 32 is configured to intercept the...

Embodiment 3

[0068] This embodiment is an optional embodiment according to the present invention, and is used to describe the application in detail in conjunction with specific examples:

[0069] The scheme of this embodiment can further improve the accuracy of harassing call interception, prevent problems before they happen, supplement and improve the current harassing call monitoring method, and use the monitored harassing source information to monitor the harassing source number in an all-round way. It is forbidden for ordinary users to call back and get through the harassment source number.

[0070] This embodiment provides a method for monitoring harassing calls based on the state analysis of the called user. During the monitoring process, before analyzing the characteristics of the calling call, the state information of the called user is searched, and whether the called user is black or not based on the feedback from the storage module List users to distinguish whether this call is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication monitoring method and device. The method comprises the following steps: judging whether a called number is in a preset blacklist of crank calls when a calling number initiates the communication to the called number; and intercepting a call request to the called number by the calling request when the called number is in the preset blacklist. Through the methodprovided by the invention, the technical problem that the crank call interception in the related technology is not comprehensive is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a call monitoring method and device. Background technique [0002] With the development of communication technology, communication tools such as mobile phones have become an indispensable part of people's lives. Today's technological development has brought great convenience to users of communication tools such as mobile phones; A double-edged sword, convenient communication also provides criminals and malicious scammers with an additional channel for communication and deception, and harassing calls appear, and their behavior affects and troubles operators and users. [0003] The specific manifestations of harassing phone calls are: illegal users use special equipment or artificially to make malicious calls to ordinary users, and once the ringing starts, they hang up immediately and wait for ordinary users to call back to use fraudulent or malicious methods. Charge phone charge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/667H04M1/725H04M3/22
CPCH04M1/667H04M3/2281H04M1/72454H04M1/72463H04M1/72484
Inventor 杨镕旭
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products