Method for avoiding malicious calling

A technology of malicious calls and normal calls, applied in the direction of unauthorized/fraudulent telephone prevention, selection devices, electrical components, etc., can solve the problem that the calling number cannot shield malicious calls, etc., to prevent continued harassment, and the operation method is simple , to achieve the effect of a simple way

Inactive Publication Date: 2004-09-15
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to overcome the problem that the existing digital program-controlled...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for avoiding malicious calling
  • Method for avoiding malicious calling
  • Method for avoiding malicious calling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] figure 1 It is a flow chart for users to add a list of malicious calling numbers. According to the method proposed by the invention, the user must first activate the service of "blocking malicious calls" before adding the list of malicious calling numbers. The user can actively apply to the telecommunications department to register the service or input a specific instruction code to the switch on the telephone to activate the service. For example, the user can enter the command code "*#23856#*" into the digital program-controlled switchboard on the phone (the command code is preset for the switchboard and notified to the user), and the switchboard will automatically activate "prevent malicious calls" after receiving the command code business. Such as figure 1 As shown, the process for the user to add the malicious calling number lis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes following steps: (1) user activates service of 'stopping malicious call'; (2) user adds phone number list of malicious call; (3) validating phone number of incoming call: if phone number of incoming call is a malicious call, the incoming call is ended, otherwise normal call flow is initiated. The invention possesses features of simple workflow, realizable by using digital stored-program control exchange and software, without need of additional hardware resources, extending service area of stored-program control exchange.

Description

technical field [0001] The invention relates to a digital program-controlled exchange in a telecommunication network, in particular to a call control method in a program-controlled exchange. Background technique [0002] The current digital program-controlled exchange can provide supplementary services for malicious calls according to user applications. If someone makes a malicious call to the user, the called user can use the malicious call service to query the number of the calling user; the exchange also provides the service of caller ID. Displayed to view the calling number. However, the technical solutions in the prior art are all methods and system devices for knowing malicious calls and automatically notifying users, without shielding malicious calls. Although these methods can obtain the number of the calling user or know that it is a malicious call, they cannot prevent the continuous harassment of the malicious call. The ringing sound of malicious telephone calls ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/66H04Q3/00H04Q3/545
Inventor 陈海彬吕严肖金平葛军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products