CN104113626B - A kind of communication processing method and system - Google Patents

A kind of communication processing method and system Download PDF

Info

Publication number
CN104113626B
CN104113626B CN201410300178.8A CN201410300178A CN104113626B CN 104113626 B CN104113626 B CN 104113626B CN 201410300178 A CN201410300178 A CN 201410300178A CN 104113626 B CN104113626 B CN 104113626B
Authority
CN
China
Prior art keywords
opposite end
present communications
matching
strategy
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410300178.8A
Other languages
Chinese (zh)
Other versions
CN104113626A (en
Inventor
谭少卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410300178.8A priority Critical patent/CN104113626B/en
Publication of CN104113626A publication Critical patent/CN104113626A/en
Application granted granted Critical
Publication of CN104113626B publication Critical patent/CN104113626B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of communication processing method and system, wherein, methods described includes:Signal intelligence in terminal is monitored, the communication identifier of the opposite end currently communicated with the terminal is obtained;According to the communication identifier of the opposite end, the call information and label information of the opposite end are obtained;The call information and/or label information of the opposite end are carried out matching determination matching result with the preset strategy that intercepts;The risk class of present communications is determined according to the matching result;The present communications are handled according to the risk class.By the present invention processing of the security classes software to strange conversation number is solved to place one's entire reliance upon the mark result of user, due to mark result it is inaccurate caused by inaccurate is handled to strange conversation number the problem of.

Description

A kind of communication processing method and system
Technical field
The present invention relates to communication technical field, and in particular to a kind of communication processing method and system.
Background technology
User receives the call request of some strange conversation numbers in daily life, often.Due to conversation number It is strange, therefore, the call request that user's None- identified goes out the strange conversation number is normal call request or harassing and wrecking Call request.User is only after the call request is connected, and the specific dialog context transmitted according to other side just may determine that this Whether call request is harassing and wrecking call request, and deterministic process is passive, causes user to answer inessential call request, wastes logical Talk about duration.
At present, some security classes softwares provide the function that strange conversation number is marked, with the security classes software on mobile phone Exemplified by, specific mark flow is as follows:Security classes software is ejected after user connects and then hung up the call incoming call of unknown phone number One mark window, so that user the strange conversation number is marked (e.g., by the strange call by the mark window Number mark is harassing call or ad promotions phone or letting agency's phone or dining room phone or hotel phone etc.).So Afterwards, the security classes software is handled strange conversation number according to the mark of user.
However, processing of the strange conversation number mark function provided using above-mentioned security classes software to strange conversation number There are the following problems:
Processing of the security classes software to strange conversation number places one's entire reliance upon the mark result of user, however, artificially Often there is a situation where that more mis-marked and mark is inaccurate in labeling process, in turn result in security classes software to strange call number The inaccurate situation of processing of code.Such as, when user receives the call of strange conversation number in the time for being inconvenient to answer call During request, now user will be considered that call request harassing and wrecking arrive oneself, therefore, user is connecting and then hung up strange conversation number Call incoming call after, often directly the strange conversation number is conversed labeled as harassing and wrecking, it is strange logical without going to screen this It is specifically non-harassing call or harassing call to talk about number so that mark result is inaccurate.
And, always ejection marks window to the security classes software after user connects and then hung up strange conversation number incoming call Mouthful, user is not only bothered, the usage experience of user is influenceed, and also increases operation and the processing load of terminal system.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State a kind of communication processing method and a kind of corresponding communication processing system of problem.
According to one aspect of the present invention there is provided a kind of communication processing method, including:
Signal intelligence in terminal is monitored, the communication mark of the opposite end currently communicated with the terminal is obtained Know;
According to the communication identifier of the opposite end, the call information and label information of the opposite end are obtained;
The call information and/or label information of the opposite end are carried out matching determination matching result with the preset strategy that intercepts;
The risk class of present communications is determined according to the matching result;
The present communications are handled according to the risk class.
According to another aspect of the present invention there is provided a kind of communication processing system, including:
Communication identifier acquisition module, for being monitored to the signal intelligence in terminal, acquisition is currently entered with the terminal The communication identifier of the opposite end of row communication;
Data obtaining module, for the communication identifier according to the opposite end, obtains the call information and mark of the opposite end Information;
Matching module, for the call information and/or label information of the opposite end to be matched with the preset strategy that intercepts Determine matching result;
Risk determining module, the risk class for determining present communications according to the matching result;
Processing module, for being handled according to the risk class the present communications.
A kind of communication processing method and system that the present invention is provided, by obtaining the opposite end communicated with the terminal Communication identifier, and the call information and label information of the opposite end are further obtained according to the communication identifier, then will be described The call information and/or label information of terminal carry out matching determination matching result with the preset strategy that intercepts, finally according to described The risk class of present communications is determined with result, the present communications are handled according to the risk class.The present invention is right Call information and/or label information of the judgement of present communications dependent on the opposite end, rather than it is artificial dependent on user to footpath between fields The mark result of raw communication identifier, improves the accuracy of judged result, and then ensure that when handling present communications The degree of accuracy.And, the participation of user is reduced, so as to both alleviate terminal system to needing the place of the operation of user's participation Reason, alleviates operation and the processing load of terminal system, turn avoid the harassing and wrecking to user, improve Consumer's Experience.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of flow chart of communication processing method in first embodiment of the invention;
Fig. 2 is a kind of flow chart of communication processing method in second embodiment of the invention;
Fig. 3 is a kind of flow chart of communication processing method in third embodiment of the invention;
Fig. 4 is a kind of structured flowchart of communication processing system in fourth embodiment of the invention;
Fig. 5 is a kind of structured flowchart of communication processing system in fifth embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Embodiment one
Reference picture 1, shows a kind of flow chart of communication processing method in first embodiment of the invention.In the present embodiment In, the communication processing method includes:
Step 102, the signal intelligence in terminal is monitored, the opposite end that acquisition is currently communicated with the terminal Communication identifier.
In the present embodiment, communication is included but are not limited to:The telephone relation that is carried out by terminal, short message, and pass through IM The voice call of (Instant Messaging, instant messaging) software progress, instant message.Wherein, conventional IM software kits Include:QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wang Wang etc..
Wherein, the signal intelligence in terminal is monitored and can included:Monitor the communication of access and leading to for monitoring exhalation Letter.When present communications are initiated by end side, then the opposite end is recipient, and the terminal is sender;In present communications When being by initiating side, then the terminal is to receive hair, and the opposite end is sender.
It is preferred that when terminal is mobile phone terminal, and the communication carried out is to make a phone call/receive calls and receive and dispatch short message When, the communication identifier of the opposite end can be the phone number of the opposite end.When terminal be PC ends (Personal Computer, Personal computer) or mobile phone terminal, and the communication carried out is when being instant communication session (e.g., QQ voices, QQ videos, wechat etc.), The communication identifier of the opposite end can be the instant communication number (e.g., QQ number, WeChat ID etc.) of the corresponding user in opposite end.
Step 104, according to the communication identifier of the opposite end, the call information and label information of the opposite end are obtained.
Step 106, the call information and/or label information of the opposite end are carried out matching determination with the preset strategy that intercepts With result.
Step 108, the risk class of present communications is determined according to the matching result.
Step 110, the present communications are handled according to the risk class.
In summary, the communication processing method described in the present embodiment, by obtaining the opposite end communicated with the terminal Communication identifier, and the call information and label information of the opposite end are further obtained according to the communication identifier, then by institute The call information and/or label information for stating opposite end carry out matching determination matching result with the preset strategy that intercepts, finally according to described Matching result determines the risk class of present communications, and the present communications are handled according to the risk class.The present invention Judgement to present communications depends on the corresponding call information in the opposite end and/or label information, rather than artificial dependent on user The mark result to strange communication identifier, improve the accuracy of judged result, and then ensure that and carried out to present communications Degree of accuracy during processing.And, the participation of user is reduced, so as to both alleviate terminal system to needing the operation that user participates in Processing, alleviate operation and the processing load of terminal system, turn avoid the harassing and wrecking to user, improve Consumer's Experience.
Reference picture 2, shows a kind of flow chart of communication processing method in second embodiment of the invention.
In the present embodiment, the communication processing method can be performed by mobile terminal (e.g., mobile phone).Specifically,
For perform the communication processing method can be terminal One function module.For example, the functional module is set In the talk application for being placed in the operating system of terminal or terminal, when having in terminal to be electrically accessed, held by the functional module The row communication processing method.
Or, can be a third-party application the either the 3rd in terminal for perform the communication processing method One function module in Fang Yingyong.Such as:Can be one in the safety applications (e.g., 360 mobile phone safe bodyguard) in terminal Functional module.When functional module in the third-party application or third-party application is in running status, come when having in terminal When being electrically accessed, the communication processing method can be performed by the functional module in the third-party application or third-party application.
In the present embodiment, the communication processing method includes:
Step 202, third-party application is monitored to the signal intelligence in terminal, and acquisition is currently led to the terminal The communication identifier of the opposite end of letter.
Step 204, third-party application obtains the call information and mark of the opposite end according to the communication identifier of the opposite end Information.
It is preferred that the call information is included but are not limited to:The exhalation of the opposite end and the number of times of incoming call, the opposite end Exhalation and duration of call during incoming call, the jingle bell duration when opposite end exhalation and incoming call, when the opposite end is conversed when Between distributed intelligence, the opposite end sends and receives the number of times of short message, the communication identifier of the opposite end be added into contact person and by At least one of number of times added to blacklist.
Such as, when present communications are the calls carried out using mobile phone, the call information of the opposite end can include:It is described right The exhalation at end and the number of times of incoming call, the duration of call when opposite end exhalation and incoming call, the sound when opposite end exhalation and incoming call Bell duration, the Annual distribution information when opposite end is conversed, the opposite end sends and receives the number of times of short message, the opposite end Communication identifier be added into and contact person and be added into the full details such as the number of times of blacklist.And be to use hand in present communications During the QQ voice calls that machine is carried out, the call information of the opposite end can be then the number of times of the exhalation and incoming call of the opposite end, institute Duration of call when opposite end exhalation and incoming call is stated, the jingle bell duration and the opposite end when opposite end exhalation and incoming call are conversed When the partial information such as Annual distribution information.The information content that the call information is specifically included can be according to practical communication situation It is determined that, the present embodiment is not restricted to this.
The label information is included but are not limited to:The current call is marked as time of malice and/or junk incoming call Number, the number of times that the current call occurs on the page for being defined as malice and/or rubbish network address, uses the current call The short message that conversation number is sent is marked as at least one of number of times of malice and/or refuse messages.With aforementioned call information Similar, the information content that the label information is specifically included can determine that the present embodiment is not made to this according to practical communication situation Limitation.
Explanation is needed exist for, in the present embodiment, when the call is the voice call carried out by IM softwares, Short message in the call information and the label information by IM softwares it is to be understood that use the text that word is interacted Information.
Step 206, third-party application carries out going privacy to handle to the call information and label information.
Step 208, third-party application carries out the call information and/or label information of the opposite end with the preset strategy that intercepts Matching determines matching result.
It is preferred that the step 208 can specifically include:
If the ratio between S2002, the exhalation number of times of the terminal and incoming call number of times are more than the first setting value, third-party application is true The fixed present communications and preset interception strategy matching;And/or,
If S2004, the opposite end send the number of times of short message and receive the ratio between number of times of short message more than the second setting value, the Tripartite's application determines the present communications and preset interception strategy matching;And/or,
If the ratio between S2006, the telephone operation number of times of the opposite end and short message number of operations are more than three setting values, the 3rd Fang Yingyong determines the present communications and preset interception strategy matching.Wherein, the telephone operation number of times includes the opposite end Exhalation and/or the number of times of incoming call;The short message number of operations includes the number of times that the opposite end sends and/or receives short message;With/ Or,
If the number of times that S2008, the communication identifier of the opposite end are added into contact person is less than four setting values, third party Using the determination present communications and preset interception strategy matching;And/or,
If the number of times that S2010, the communication identifier of the opposite end are added into blacklist is more than five setting values, third party Using the determination present communications and preset interception strategy matching;And/or,
If the number of times that duration of call when S2012, opposite end exhalation is less than the first setting duration is more than the 6th setting value When, third-party application determines the present communications and preset interception strategy matching;And/or,
If the number of times that duration of call when S2014, the opposite end incoming call is less than the second setting duration is more than the 7th setting value When, third-party application determines the present communications and preset interception strategy matching;And/or,
If the number of times that jingle bell duration when S2016, opposite end exhalation is less than the 3rd setting duration is more than the 8th setting value When, third-party application determines the present communications and preset interception strategy matching;And/or,
If the number of times that jingle bell duration when S2018, the opposite end incoming call is less than the 4th setting duration is more than the 9th setting value When, third-party application determines the present communications and preset interception strategy matching;And/or,
If Annual distribution when S2020, the opposite end are conversed meets setting time distribution, third-party application is determined The present communications and preset interception strategy matching;And/or,
If S2022, the communication identifier of the opposite end are marked as malice and/or the number of times of junk incoming call is more than the tenth setting During value, third-party application determines the present communications and preset interception strategy matching;And/or,
If the number of times that S2024, the communication identifier of the opposite end occur on the page for being defined as malice and/or rubbish network address During more than 11 setting value, third-party application determines the present communications and preset interception strategy matching;And/or,
If S2026, the short message sent using the communication identifier of the opposite end are marked as time of malice and/or refuse messages When number is more than 12 setting value, third-party application determines the present communications and preset interception strategy matching.
Explanation is needed exist for, in the present embodiment, can be according to practical communication situation, from above-mentioned steps S2002- S2026 selects corresponding one or more steps to carry out matching judgment.
In the present embodiment, the preset strategy that intercepts includes many height interception strategy;Wherein, strategy point is intercepted per height Do not match with corresponding call information and label information.For example, in this implementation. with above-mentioned steps S2002-S2026 accordingly In example, the preset interception strategy can include 13 sons and intercept strategy, and 13 sons intercept strategy and above-mentioned steps S2002-S2026 is corresponded.
It is preferred that the step 208 can specifically include:According to the call information of opposite end and/or label information determine with The son that the present communications match intercepts the quantity of strategy.Such as, described 13 can be determined according to above-mentioned steps S2002-S2026 Height intercepts the quantity that the son matched in strategy with the present communications intercepts strategy.
Step 210, third-party application determines the risk class of present communications according to the matching result.
In the present embodiment, the step 210 can specifically include:
When the quantity that the son matched intercepts strategy is more than or equal to first threshold, third-party application determines described current logical Letter is high-risk rank.Such as, when the quantity that the son matched with the present communications intercepts strategy is more than or equal to 10, third-party application It is high-risk rank to determine the present communications.
When the quantity that the son matched intercepts strategy is more than or equal to Second Threshold and is less than first threshold, third-party application It is risk class to determine the present communications.Such as, the quantity that the son matched with the present communications intercepts strategy is more than or equal to 6 And during less than 10, third-party application determines that the present communications are risk classes.
When the quantity that the son matched intercepts strategy is more than or equal to the 3rd threshold value and is less than Second Threshold, third-party application It is level of suspicion to determine the present communications.Such as, the quantity that the son matched with the present communications intercepts strategy is more than or equal to 3 And during less than 6, third-party application determines that the present communications are level of suspicion.
When the quantity that the son matched intercepts strategy is less than three threshold values, third-party application determines that the present communications are Level of security.Such as, when the quantity that the son matched with the present communications intercepts strategy is less than 3, third-party application determines described Present communications are level of securitys.
Step 212, third-party application is handled the present communications according to the risk class.
From preceding described, in the present embodiment, the risk class of the present communications can be divided into:High-risk rank, Risk class, level of suspicion and level of security.Explanation is needed exist for, the risk class of present communications can be according to actual feelings Condition sets multiple ranks, includes but are not limited to:High-risk rank, risk class, level of suspicion and level of security.
It is preferred that
When the present communications are high-risk ranks, third-party application carries out indicating risk to the present communications and direct Intercept the present communications.
When the present communications are risk class or level of suspicion, indicating risk is carried out to the present communications.
When the present communications are level of securitys, the talking state of the present communications is kept.
In the present embodiment, it is specific when third-party application is handled the present communications according to the risk class Processing mode can be:
Indicating risk is carried out to the present communications by voice broadcast;And/or, load risk in the dial side of terminal Prompt message is simultaneously highlighted.
In the present embodiment, after the step 210, which is performed, to be completed, it can also carry out step 214.
Step 214, third-party application carries out risk identification according to the risk class to the present communications, and preserves institute State the communication identifier and risk identification of present communications.
In the present embodiment, due to third-party application according to the risk class to the present communications carry out risk mark Know, therefore, the risk identification can be used to refer to judge the corresponding risk class of the present communications.
It is preferred that when the communication identifier and the communication identifier of preservation of outgoing call match, third-party application can root The outgoing call is handled according to the risk identification, indicating risk is such as carried out.Communication identifier and guarantor when incoming call call When the communication identifier deposited matches, third-party application can be handled incoming call call according to the risk identification, such as Indicating risk or interception etc..
In summary, the communication processing method described in the present embodiment, by obtaining the opposite end communicated with the terminal Communication identifier, and the call information and label information of the opposite end are further obtained according to the communication identifier, then by institute The call information and/or label information for stating opposite end carry out matching determination matching result with the preset strategy that intercepts, finally according to described Matching result determines the risk class of present communications, and the present communications are handled according to the risk class.The present invention Judgement to present communications depends on the call information and/or label information of the opposite end, rather than pair artificial dependent on user The mark result of strange communication identifier, improves the accuracy of judged result, and then ensure that and handled to present communications When the degree of accuracy.And, the participation of user is reduced, so as to both alleviate terminal system to needing the operation that user participates in Processing, alleviates operation and the processing load of terminal system, turn avoid the harassing and wrecking to user, improve Consumer's Experience.
Further, it is described it is preset intercept strategy and include many height intercept strategy, many height intercept strategy respectively with it is described The call information and/or label information of opposite end are corresponded, current according to the match condition comprehensive descision that many height intercept strategy The risk class of communication, rather than judged by single parameter, improve the degree of accuracy of judged result and detailed degree, Jin Erbao The degree of accuracy to present communications processing is demonstrate,proved.
Embodiment three
With reference to above-described embodiment, a kind of flow of communication processing method is illustrated below by an instantiation.
In the present embodiment, the call refers to be conversed by mobile phone, the execution communication processing method can be with It is mounted in the third-party application (e.g., address list bodyguard) of mobile phone side.Reference picture 3, shows one in third embodiment of the invention Plant the flow chart of communication processing method.In the present embodiment, the communication processing method includes:
Step 302, address list bodyguard is monitored to the incoming call situation in mobile phone, obtains the telephone number of current call.
Step 304, address list bodyguard obtains the calling letter of the current call according to the telephone number of the current call Breath and label information.
It is preferred that the call information includes:The number of times of the current call exhalation and incoming call, the current call exhalation Duration of call during with incoming call, the jingle bell duration when current call exhalation and incoming call, when the current call is conversed Annual distribution information, the current call sends and receives the number of times of short message, and the telephone number of the current call is added To at least one of contact person and the number of times for being added into blacklist.
The label information include but:The current call is marked as the number of times of malice and/or junk incoming call, described to work as The number of times that preceding incoming call occurs on the page for being defined as malice and/or rubbish network address, uses the telephone number of the current call The short message of transmission is marked as at least one of number of times of malice and/or refuse messages.
Step 306, address list bodyguard carries out going privacy to handle to the call information and label information.
In the present embodiment, it is described to go privacy processing to refer to:It is related in deleted/hidden call information and label information To the information of privacy of user.For example:Name, sex and the head of the user of current call will be indicated in call information and label information The information deletion of picture information/hide.
Step 308, the call information and/or label information of the current call are intercepted strategy by address list bodyguard with preset Carry out matching and determine matching result.
In the present embodiment, the preset strategy that intercepts includes many height interception strategy.Wherein, strategy tool is intercepted per height Body can be:
Son intercepts strategy 1:If the ratio between exhalation number of times and incoming call number of times of the current call are more than the first setting value, lead to News record bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 2:If the current call, which sends the number of times of short message and receives the ratio between number of times of short message, is more than second During setting value, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 3:If the ratio between telephone operation number of times and short message number of operations of the current call are set more than the 3rd During definite value, address list bodyguard determines the current call and preset interception strategy matching.Wherein, the telephone operation number of times includes The number of times of the current call exhalation and/or incoming call;The short message number of operations includes the current call and sends and/or receive The number of times of short message.
Son intercepts strategy 4:If the number of times that the telephone number of the current call is added into contact person is less than the 4th setting During value, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 5:If the number of times that the telephone number of the current call is added into blacklist is more than the 5th setting During value, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 6:If the number of times that the duration of call during current call exhalation is less than the first setting duration is more than During six setting values, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 7:If the number of times that the duration of call during current call incoming call is less than the second setting duration is more than During seven setting values, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 8:If the number of times that the jingle bell duration during current call exhalation is less than the 3rd setting duration is more than During eight setting values, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 9:If the number of times that the jingle bell duration during current call incoming call is less than the 4th setting duration is more than During nine setting values, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 10:If the Annual distribution when current call is conversed meets setting time distribution, lead to News record bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 11:If the current call is marked as malice and/or the number of times of junk incoming call is set more than the tenth During definite value, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 12:If time that the current call occurs on the page for being defined as malice and/or rubbish network address When number is more than 11 setting value, address list bodyguard determines the current call and preset interception strategy matching.
Son intercepts strategy 13:If using the current call telephone number send short message be marked as malice and/or When the number of times of refuse messages is more than 12 setting value, address list bodyguard determines that the current call intercepts strategy with preset Match somebody with somebody.
Such as, in the present embodiment, address list bodyguard gets incoming phone number A, B, C, D respectively;And obtain respectively The corresponding call information of telephone number A, B, C, D and label information.Address list bodyguard exhales according to telephone number A, B, C, D are corresponding Information and label information is made to determine:
Telephone number A meets son and intercepts strategy 1-11 simultaneously;Telephone number B meets son and intercepts strategy 1-8 simultaneously;Phone number Code C meets son and intercepts strategy 1-4 simultaneously;Telephone number D only meets sub- interception strategy 1.
Step 310, address list bodyguard determines the risk class of current call according to the matching result.
In the present embodiment, address list bodyguard each corresponds to the son met according to telephone number A, B, C, D and intercepts strategy Quantity, it is determined that:
Telephone number A risk class is high-risk rank;
Telephone number B risk class is risk class;
Telephone number C risk class is level of suspicion;
Telephone number D risk class is level of security.
Step 312, address list bodyguard is handled the current call according to the risk class.
In the present embodiment, address list bodyguard carries out indicating risk to telephone number A incoming call and directly intercepted.The wind Danger prompting can be carried out in voice broadcast form or to be loaded in the dial page and be highlighted indicating risk Text information form carry out.
Address list bodyguard carries out indicating risk to telephone number B and C incoming call.User can carry out phase according to indicating risk Ground operation is answered, e.g., the call is connected, or hang up the call.
Address list bodyguard keeps the talking state of telephone number D incoming call.
In summary, the communication processing method described in the present embodiment, by obtain the current call call information and Label information, the call information and/or label information of the current call then carried out matching determination with the preset strategy that intercepts Matching result, the risk class of current call is determined finally according to the matching result, is worked as according to the risk class to described Preceding incoming call is handled.Call information and/or label information of the present invention to the judgement of current call dependent on current call, and Non-dependent improves the accuracy of judged result, and then ensure that in the artificial mark result to strange conversation number of user The degree of accuracy when handling current call.And, the participation of user is reduced, so as to both alleviate terminal system to needing The processing of the operation of user's participation is wanted, operation and the processing load of terminal system is alleviated, turn avoid the harassing and wrecking to user, carry Consumer's Experience is risen.
Further, it is described it is preset intercept strategy and include many height intercept strategy, many height intercept strategy respectively with it is described The call information and/or label information of current call are corresponded, and the match condition comprehensive descision of strategy is intercepted according to many height The risk class of current call, rather than judged by single parameter, the degree of accuracy of judged result and detailed degree are improved, is entered And ensure that the degree of accuracy to current call processing.
It should be noted that for foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to According to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know, Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
Based on the same inventive concept of above method embodiment.Reference picture 4, shows a kind of in fourth embodiment of the invention The structured flowchart of communication processing system.In the present embodiment, the communication processing system includes:
Communication identifier acquisition module 402, for being monitored to the signal intelligence in terminal, obtain currently with the terminal The communication identifier of the opposite end communicated.
Data obtaining module 404, for the communication identifier according to the opposite end, obtains the call information and mark of the opposite end Remember information.
Matching module 406, for the call information and/or label information of the opposite end to be intercepted into strategy progress with preset With determination matching result.
Risk determining module 408, the risk class for determining present communications according to the matching result.
Processing module 410, for being handled according to the risk class the present communications.
In summary, the communication processing system described in the present embodiment, by obtaining the opposite end communicated with the terminal Communication identifier, and the call information and label information of the opposite end are further obtained according to the communication identifier, then by institute The call information and/or label information for stating terminal carry out matching determination matching result with the preset strategy that intercepts, finally according to described Matching result determines the risk class of present communications, and the present communications are handled according to the risk class.The present invention Judgement to present communications depends on the call information and/or label information of the opposite end, rather than pair artificial dependent on user The mark result of strange communication identifier, improves the accuracy of judged result, and then ensure that and handled to present communications When the degree of accuracy.And, the participation of user is reduced, so as to both alleviate terminal system to needing the operation that user participates in Processing, alleviates operation and the processing load of terminal system, turn avoid the harassing and wrecking to user, improve Consumer's Experience.
Reference picture 5, shows a kind of structured flowchart of communication processing system in fifth embodiment of the invention.In the present embodiment In, the communication processing system includes:
Communication identifier acquisition module 502, for being monitored to the signal intelligence in terminal, obtain currently with the terminal The communication identifier of the opposite end communicated.
Data obtaining module 504, for the communication identifier according to the opposite end, obtains the call information and mark of the opposite end Remember information.
Wherein,
The call information includes:The exhalation of the opposite end and the number of times of incoming call are logical when the opposite end exhalation and incoming call Duration is talked about, the jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is conversed is described right End sends and receives the number of times of short message, and the communication identifier of the opposite end is added into contact person and is added into the number of times of blacklist At least one of.
The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call, institute The number of times that the communication identifier of opposite end occurs on the page for being defined as malice and/or rubbish network address is stated, the logical of the opposite end is used Beacon knows the short message sent and is marked as at least one of number of times of malice and/or refuse messages.
Privacy processing module 506, call information and mark for obtaining the opposite end in described information acquisition module 504 After information, the call information and label information are carried out going privacy to handle.
In the present embodiment, it is described to go privacy processing to refer to:It is related in deleted/hidden call information and label information To the information of privacy of user.For example:Name, sex and the head of the user of current call will be indicated in call information and label information The information deletion of picture information/hide.
Matching module 508, for the call information and/or label information of the opposite end to be intercepted into strategy progress with preset With determination matching result.
In the present embodiment, the matching module 508 can specifically include:
First matching module, when being more than the first setting value for the ratio between exhalation number of times and incoming call number of times in the opposite end, Determine the present communications and preset interception strategy matching.
Second matching module, is more than second for the ratio between the number of times that short message is sent in the opposite end and the number of times for receiving short message During setting value, the present communications and preset interception strategy matching are determined.
3rd matching module, sets for the ratio between telephone operation number of times and short message number of operations in the opposite end more than the 3rd During definite value, the present communications and preset interception strategy matching are determined.
Wherein, the telephone operation number of times includes the number of times of opposite end exhalation and/or incoming call;The short message number of operations The number of times of short message is sent and/or received including the opposite end.
4th matching module, the number of times for being added into contact person for the communication identifier in the opposite end is less than the 4th setting During value, the present communications and preset interception strategy matching are determined.
5th matching module, the number of times for being added into blacklist for the communication identifier in the opposite end is more than the 5th setting During value, the present communications and preset interception strategy matching are determined.
6th matching module, the number of times for being less than the first setting duration for the duration of call when the opposite end is breathed out is more than During six setting values, the present communications and preset interception strategy matching are determined.
7th matching module, the number of times for being less than the second setting duration for the duration of call in the opposite end incoming call is more than During seven setting values, the present communications and preset interception strategy matching are determined.
8th matching module, the number of times for being less than the 3rd setting duration for the jingle bell duration when the opposite end is breathed out is more than During eight setting values, the present communications and preset interception strategy matching are determined.
9th matching module, the number of times for being less than the 4th setting duration for the jingle bell duration in the opposite end incoming call is more than During nine setting values, the present communications and preset interception strategy matching are determined.
Tenth matching module, when meeting setting time distribution for the Annual distribution when the opposite end is conversed, really The fixed present communications and preset interception strategy matching.
11st matching module, time of malice and/or junk incoming call is marked as the communication identifier in the opposite end When number is more than ten setting values, the present communications and preset interception strategy matching are determined.
12nd matching module, the page of malice and/or rubbish network address is being defined as the communication identifier in the opposite end When the number of times occurred on face is more than 11 setting value, the present communications and preset interception strategy matching are determined.
13rd matching module, for using the opposite end communication identifier send short message be marked as malice and/ Or the number of times of refuse messages be more than 12 setting value when, determine the present communications and preset interception strategy matching.
It is preferred that in the present embodiment, the preset strategy that intercepts includes many height interception strategy.Wherein, blocked per height Strategy is cut respectively with corresponding call information and label information to match.I.e., it is possible to think every height intercept strategy respectively with it is upper State the first to the 13rd matching module corresponding.
In the present embodiment, the matching module 508 by the call information and/or label information of the opposite end with it is preset When intercepting strategy progress matching determination matching result, it can specifically include:
Determined to intercept strategy with the son that the present communications match according to the call information of opposite end and/or label information Quantity.
Risk determining module 510, the risk class for determining present communications according to the matching result.
It is preferred that the risk determining module 510, specifically for intercepting plan according to the son that the present communications match Quantity slightly determines the risk class of present communications.
Wherein,
When the quantity for intercepting strategy in the son matched is more than or equal to first threshold, it is high-risk level to determine the present communications Not.
When the quantity for intercepting strategy in the son matched is more than or equal to Second Threshold and is less than first threshold, it is determined that described work as Preceding communication is risk class.
When the quantity for intercepting strategy in the son matched is more than or equal to the 3rd threshold value and is less than Second Threshold, it is determined that described work as Preceding communication is level of suspicion.
When the quantity for intercepting strategy in the son matched is less than three threshold values, it is level of security to determine the present communications.
Processing module 512, for being handled according to the risk class the present communications.
In the present embodiment, the processing module 512 can include:
First processing module, for when the present communications are high-risk ranks, carrying out risk to the present communications and carrying Show and directly intercept the present communications.
Second processing module, for when the present communications are risk class or level of suspicion, to the present communications Carry out indicating risk.
3rd processing module, for when the present communications are level of securitys, keeping the communication shape of the present communications State.
It is preferred that the processing module 512 can specifically include when handling the present communications:Pass through language Sound is reported carries out indicating risk to the present communications;And/or, indicating risk information is loaded in the dial side of terminal and highlighted Display.
Preserving module 514, the wind for determining present communications according to the matching result in the risk determining module 510 After dangerous rank, the present communications are carried out with risk identification according to the risk class, and preserve the logical of the present communications Beacon is known and risk identification.
Fourth processing module 516, when matching for the communication identifier in outgoing call and the communication identifier of preservation, according to The risk identification is handled the outgoing call.
5th processing module 518, when communication identifier and the communication identifier of preservation for being conversed in incoming call match, according to The risk identification is handled incoming call call.
In summary, the communication processing system described in the present embodiment, by obtaining the opposite end communicated with the terminal Communication identifier, and the call information and label information of the opposite end are further obtained according to the communication identifier, then by institute The call information and/or label information for stating opposite end carry out matching determination matching result with the preset strategy that intercepts, finally according to described Matching result determines the risk class of present communications, and the present communications are handled according to the risk class.The present invention Judgement to present communications depends on the call information and/or label information of the opposite end, rather than pair artificial dependent on user The mark result of strange communication identifier, improves the accuracy of judged result, and then ensure that and handled to present communications When the degree of accuracy.And, the participation of user is reduced, so as to both alleviate terminal system to needing the place of the operation of user's participation Reason, alleviates operation and the processing load of terminal system, turn avoid the harassing and wrecking to user, improve Consumer's Experience.
Further, it is described it is preset intercept strategy and include many height intercept strategy, many height intercept strategy respectively with it is described The call information and/or label information of opposite end are corresponded, current according to the match condition comprehensive descision that many height intercept strategy The risk class of communication, rather than judged by single parameter, improve the degree of accuracy of judged result and detailed degree, Jin Erbao The degree of accuracy to present communications processing is demonstrate,proved.
For said apparatus embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, The relevent part can refer to the partial explaination of embodiments of method.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can or similar purpose identical, equivalent by offer alternative features come generation Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) come realize in communication processing equipment according to embodiments of the present invention some or The some or all functions of person's whole part.The present invention is also implemented as perform method as described herein one Divide or whole equipment or program of device (for example, computer program and computer program product).It is such to realize this hair Bright program can be stored on a computer-readable medium, or can have the form of one or more signal.It is such Signal can be downloaded from internet website and obtained, and either provided or provided in any other form on carrier signal.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses A1, a kind of communication processing method, including:
Signal intelligence in terminal is monitored, the communication mark of the opposite end currently communicated with the terminal is obtained Know;
According to the communication identifier of the opposite end, the call information and label information of the opposite end are obtained;
The call information and/or label information of the opposite end are carried out matching determination matching result with the preset strategy that intercepts;
The risk class of present communications is determined according to the matching result;
The present communications are handled according to the risk class.
A, the method as described in A1,
The call information includes:The exhalation of the opposite end and the number of times of incoming call are logical when the opposite end exhalation and incoming call Duration is talked about, the jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is conversed is described right End sends and receives the number of times of short message, and the communication identifier of the opposite end is added into contact person and is added into the number of times of blacklist At least one of;
The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call, institute The number of times that the communication identifier of opposite end occurs on the page for being defined as malice and/or rubbish network address is stated, the logical of the opposite end is used Beacon knows the short message sent and is marked as at least one of number of times of malice and/or refuse messages.
A3, the method as described in A2, the call information and/or label information by the opposite end intercept strategy with preset Carry out matching and determine matching result, including:
If the ratio between exhalation number of times and incoming call number of times of the opposite end be more than the first setting value, determine the present communications with Preset interception strategy matching;And/or,
If the opposite end sends the number of times of short message and receives the ratio between number of times of short message more than the second setting value, it is determined that described Present communications and preset interception strategy matching;And/or,
If the ratio between telephone operation number of times and short message number of operations of the opposite end are more than three setting values, it is determined that described work as Preceding communication and preset interception strategy matching;Wherein, the telephone operation number of times includes the exhalation of the opposite end and/or time of incoming call Number;The short message number of operations includes the number of times that the opposite end sends and/or receives short message.
A4, the method as described in A2, the call information and/or label information by the opposite end intercept strategy with preset Carry out matching and determine matching result, including:
If the number of times that the communication identifier of the opposite end is added into contact person is less than four setting values, determine described current Communication and preset interception strategy matching;And/or,
If the number of times that the communication identifier of the opposite end is added into blacklist is more than five setting values, determine described current Communication and preset interception strategy matching.
A5, the method as described in A2, the call information and/or label information by the opposite end intercept strategy with preset Carry out matching and determine matching result, including:
If the number of times that the duration of call during opposite end exhalation is less than the first setting duration is more than six setting values, it is determined that The present communications and preset interception strategy matching;And/or,
If the number of times that the duration of call during opposite end incoming call is less than the second setting duration is more than seven setting values, it is determined that The present communications and preset interception strategy matching;And/or,
If the number of times that the jingle bell duration during opposite end exhalation is less than the 3rd setting duration is more than eight setting values, it is determined that The present communications and preset interception strategy matching;And/or,
If the number of times that the jingle bell duration during opposite end incoming call is less than the 4th setting duration is more than nine setting values, it is determined that The present communications and preset interception strategy matching;And/or,
If the Annual distribution when opposite end is conversed meets setting time distribution, the present communications are determined and pre- Put interception strategy matching.
A6, the method as described in A2, the call information and/or label information by the opposite end intercept strategy with preset Carry out matching and determine matching result, including:
If the communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call more than ten setting values, Determine the present communications and preset interception strategy matching;And/or,
If the communication identifier of opposite end number of times for occurring on the page for being defined as malice and/or rubbish network address is more than the During 11 setting value, the present communications and preset interception strategy matching are determined;And/or,
If the number of times that the short message sent using the communication identifier of the opposite end is marked as malice and/or refuse messages is more than During 12 setting value, the present communications and preset interception strategy matching are determined.
A7, the method as described in A1-A6 is any, the preset strategy that intercepts include many height interception strategy;Wherein, each Son intercepts strategy and matched respectively with corresponding call information and label information.
A8, the method as described in A7, the call information and/or label information by the opposite end intercept strategy with preset Carry out matching and determine matching result, including:
Determined to intercept strategy with the son that the present communications match according to the call information of opposite end and/or label information Quantity.
A9, the method as described in A8, the risk class that present communications are determined according to the matching result, including:
Quantity according to strategy is intercepted with the son that the present communications match determines the risk class of present communications;
Wherein,
When the quantity that the son matched intercepts strategy is more than or equal to first threshold, it is high-risk level to determine the present communications Not;
When the quantity that the son matched intercepts strategy is more than or equal to Second Threshold and is less than first threshold, it is determined that described work as Preceding communication is risk class;
When the quantity that the son matched intercepts strategy is more than or equal to the 3rd threshold value and is less than Second Threshold, it is determined that described work as Preceding communication is level of suspicion;
When the quantity that the son matched intercepts strategy is less than three threshold values, it is level of security to determine the present communications.
A10, the method as described in A9, it is described that the present communications are handled according to the risk class, including:
When the present communications are high-risk ranks, the present communications are carried out with indicating risk and described work as directly is intercepted Preceding communication;
When the present communications are risk class or level of suspicion, indicating risk is carried out to the present communications;
When the present communications are level of securitys, the communications status of the present communications is kept.
A11, the method as described in A1, it is described that the present communications are handled, including:
Indicating risk is carried out to the present communications by voice broadcast;And/or,
Indicating risk information is loaded in the dial side of terminal and is highlighted.
The step of A12, the method as described in A1, risk class that present communications are determined according to the matching result described Afterwards, methods described also includes:
According to the risk class to the present communications carry out risk identification, and preserve the opposite end communication identifier and The risk identification.
A13, the method as described in A12, methods described also include:
When the communication identifier and the communication identifier of preservation of outgoing call match, according to corresponding risk identification to described Outgoing call is handled;
When the communication identifier that incoming call is conversed and the communication identifier of preservation match, according to corresponding risk identification to described Incoming call call is handled.
After the step of A14, the method as described in A1, call information and label information for obtaining the opposite end described, Methods described also includes:
The call information and label information are carried out going privacy to handle.
The invention also discloses B15, a kind of communication processing system, including:
Communication identifier acquisition module, for being monitored to the signal intelligence in terminal, acquisition is currently entered with the terminal The communication identifier of the opposite end of row communication;
Data obtaining module, for the communication identifier according to the opposite end, obtains the call information and mark of the opposite end Information;
Matching module, for the call information and/or label information of the opposite end to be matched with the preset strategy that intercepts Determine matching result;
Risk determining module, the risk class for determining present communications according to the matching result;
Processing module, for being handled according to the risk class the present communications.
B16, the system as described in B15,
The call information includes:The exhalation of the opposite end and the number of times of incoming call are logical when the opposite end exhalation and incoming call Duration is talked about, the jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is conversed is described right End sends and receives the number of times of short message, and the communication identifier of the opposite end is added into contact person and is added into the number of times of blacklist At least one of;
The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call, institute The number of times that the communication identifier of opposite end occurs on the page for being defined as malice and/or rubbish network address is stated, the logical of the opposite end is used Beacon knows the short message sent and is marked as at least one of number of times of malice and/or refuse messages.
B17, the system as described in B16, the matching module, including:
First matching module, when being more than the first setting value for the ratio between exhalation number of times and incoming call number of times in the opposite end, Determine the present communications and preset interception strategy matching;
Second matching module, is more than second for the ratio between the number of times that short message is sent in the opposite end and the number of times for receiving short message During setting value, the present communications and preset interception strategy matching are determined;
3rd matching module, sets for the ratio between telephone operation number of times and short message number of operations in the opposite end more than the 3rd During definite value, the present communications and preset interception strategy matching are determined;Wherein, the telephone operation number of times is exhaled including the opposite end Go out and/or incoming call number of times;The short message number of operations includes the number of times that the opposite end sends and/or receives short message.
B18, the system as described in B16, the matching module, including:
4th matching module, the number of times for being added into contact person for the communication identifier in the opposite end is less than the 4th setting During value, the present communications and preset interception strategy matching are determined;
5th matching module, the number of times for being added into blacklist for the communication identifier in the opposite end is more than the 5th setting During value, the present communications and preset interception strategy matching are determined.
B19, the system as described in B16, the matching module, including:
6th matching module, the number of times for being less than the first setting duration for the duration of call when the opposite end is breathed out is more than During six setting values, the present communications and preset interception strategy matching are determined;
7th matching module, the number of times for being less than the second setting duration for the duration of call in the opposite end incoming call is more than During seven setting values, the present communications and preset interception strategy matching are determined;
8th matching module, the number of times for being less than the 3rd setting duration for the jingle bell duration when the opposite end is breathed out is more than During eight setting values, the present communications and preset interception strategy matching are determined;
9th matching module, the number of times for being less than the 4th setting duration for the jingle bell duration in the opposite end incoming call is more than During nine setting values, the present communications and preset interception strategy matching are determined;
Tenth matching module, when meeting setting time distribution for the Annual distribution when the opposite end is conversed, really The fixed present communications and preset interception strategy matching.
B20, the system as described in B16, the matching module, including:
11st matching module, time of malice and/or junk incoming call is marked as the communication identifier in the opposite end When number is more than ten setting values, the present communications and preset interception strategy matching are determined;
12nd matching module, the page of malice and/or rubbish network address is being defined as the communication identifier in the opposite end When the number of times occurred on face is more than 11 setting value, the present communications and preset interception strategy matching are determined;
13rd matching module, for using the opposite end communication identifier send short message be marked as malice and/ Or the number of times of refuse messages be more than 12 setting value when, determine the present communications and preset interception strategy matching.
B21, the system as described in B15-B20 is any, the preset strategy that intercepts include many height interception strategy;Wherein, Strategy is intercepted per height respectively with corresponding call information and label information to match.
B22, the system as described in B21, the matching module is by the call information and/or label information of the opposite end and in advance When putting interception strategy progress matching determination matching result, specifically include:
Determined to intercept strategy with the son that the present communications match according to the call information of opposite end and/or label information Quantity.
B23, the system as described in B22,
The risk determining module, specifically for true according to the quantity that strategy is intercepted with the son that the present communications match Determine the risk class of present communications;
Wherein,
When the quantity for intercepting strategy in the son matched is more than or equal to first threshold, it is high-risk level to determine the present communications Not;
When the quantity for intercepting strategy in the son matched is more than or equal to Second Threshold and is less than first threshold, it is determined that described work as Preceding communication is risk class;
When the quantity for intercepting strategy in the son matched is more than or equal to the 3rd threshold value and is less than Second Threshold, it is determined that described work as Preceding communication is level of suspicion;
When the quantity for intercepting strategy in the son matched is less than three threshold values, it is level of security to determine the present communications.
B24, the system as described in B23, the processing module, including:
First processing module, for when the present communications are high-risk ranks, carrying out risk to the present communications and carrying Show and directly intercept the present communications;
Second processing module, for when the present communications are risk class or level of suspicion, to the present communications Carry out indicating risk;
3rd processing module, for when the present communications are level of securitys, keeping the communication shape of the present communications State.
B25, the system as described in B15, the processing module are specifically included when handling the present communications:
Indicating risk is carried out to the present communications by voice broadcast;And/or, load risk in the dial side of terminal Prompt message is simultaneously highlighted.
B26, the system as described in B15, the system also include:
Preserving module, the risk class for determining present communications according to the matching result in the risk determining module Afterwards, risk identification is carried out to the present communications according to the risk class, and preserves communication identifier and the institute of the opposite end State risk identification.
B27, the system as described in B26, the system also include:
Fourth processing module, when matching for the communication identifier in outgoing call and the communication identifier of preservation, according to right Risk identification is answered to handle the outgoing call;
5th processing module, when communication identifier and the communication identifier of preservation for being conversed in incoming call match, according to right Risk identification is answered to handle incoming call call.
B28, the system as described in B15, the system also include:
Privacy processing module, for obtained in described information acquisition module the opposite end call information and label information it Afterwards, the call information and label information are carried out going privacy to handle.

Claims (28)

1. a kind of communication processing method, it is characterised in that including:
Signal intelligence in terminal is monitored, the communication identifier of the opposite end currently communicated with the terminal is obtained;
According to the communication identifier of the opposite end, the call information and label information of the opposite end are obtained;
The call information and/or label information of the opposite end are carried out matching determination matching result with the preset strategy that intercepts;Wherein, The preset strategy that intercepts includes many height interception strategy;The son that the matching result includes matching with the present communications is blocked Cut the quantity of strategy;
The risk class of present communications is determined according to the matching result;
The present communications are handled according to the risk class;
The risk class that present communications are determined according to the matching result, including:
Quantity according to strategy is intercepted with the son that the present communications match determines the risk class of present communications.
2. the method as described in claim 1, it is characterised in that
The call information includes:The exhalation of the opposite end and the number of times of incoming call, when the opposite end breathes out call during with incoming call It is long, the jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is conversed, the opposite end hair The number of times of short message is sent and receives, the communication identifier of the opposite end is added into contact person and is added into the number of times of blacklist It is at least one;
The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call, described right The number of times that the communication identifier at end occurs on the page for being defined as malice and/or rubbish network address, uses the communication mark of the opposite end Know the short message sent and be marked as at least one of number of times of malice and/or refuse messages.
3. method as claimed in claim 2, it is characterised in that the call information and/or label information by the opposite end Carry out matching determination matching result with the preset strategy that intercepts, including:
If the ratio between exhalation number of times and incoming call number of times of the opposite end be more than the first setting value, determine the present communications with it is preset Intercept strategy matching;And/or,
If the opposite end sends the number of times of short message and receives the ratio between number of times of short message more than the second setting value, determine described current Communication and preset interception strategy matching;And/or,
If the ratio between telephone operation number of times and short message number of operations of the opposite end are more than three setting values, determine described current logical Letter and preset interception strategy matching;Wherein, the telephone operation number of times includes the exhalation of the opposite end and/or the number of times of incoming call; The short message number of operations includes the number of times that the opposite end sends and/or receives short message.
4. method as claimed in claim 2, it is characterised in that the call information and/or label information by the opposite end Carry out matching determination matching result with the preset strategy that intercepts, including:
If the number of times that the communication identifier of the opposite end is added into contact person is less than four setting values, the present communications are determined With preset interception strategy matching;And/or,
If the number of times that the communication identifier of the opposite end is added into blacklist is more than five setting values, the present communications are determined With preset interception strategy matching.
5. method as claimed in claim 2, it is characterised in that the call information and/or label information by the opposite end Carry out matching determination matching result with the preset strategy that intercepts, including:
If the number of times that the duration of call during opposite end exhalation is less than the first setting duration is more than six setting values, it is determined that described Present communications and preset interception strategy matching;And/or,
If the number of times that the duration of call during opposite end incoming call is less than the second setting duration is more than seven setting values, it is determined that described Present communications and preset interception strategy matching;And/or,
If the number of times that the jingle bell duration during opposite end exhalation is less than the 3rd setting duration is more than eight setting values, it is determined that described Present communications and preset interception strategy matching;And/or,
If the number of times that the jingle bell duration during opposite end incoming call is less than the 4th setting duration is more than nine setting values, it is determined that described Present communications and preset interception strategy matching;And/or,
If the Annual distribution when opposite end is conversed meets setting time distribution, determine that the present communications are blocked with preset Cut strategy matching.
6. method as claimed in claim 2, it is characterised in that the call information and/or label information by the opposite end Carry out matching determination matching result with the preset strategy that intercepts, including:
If the communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call more than ten setting values, it is determined that The present communications and preset interception strategy matching;And/or,
If the number of times that the communication identifier of the opposite end occurs on the page for being defined as malice and/or rubbish network address is more than the 11st During setting value, the present communications and preset interception strategy matching are determined;And/or,
If the short message sent using the communication identifier of the opposite end is marked as malice and/or the number of times of refuse messages is more than the tenth During two setting values, the present communications and preset interception strategy matching are determined.
7. the method as described in claim 1-6 any claims, it is characterised in that intercepted per height strategy respectively with it is corresponding Call information and label information match.
8. method as claimed in claim 7, it is characterised in that the call information and/or label information by the opposite end Carry out matching determination matching result with the preset strategy that intercepts, including:
Determined to intercept the number of strategy with the son that the present communications match according to the call information of opposite end and/or label information Amount.
9. method as claimed in claim 8, it is characterised in that:When the quantity that the son matched intercepts strategy is more than or equal to first During threshold value, it is high-risk rank to determine the present communications;
When the quantity that the son matched intercepts strategy is more than or equal to Second Threshold and is less than first threshold, determine described current logical Letter is risk class;
When the quantity that the son matched intercepts strategy is more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical Letter is level of suspicion;
When the quantity that the son matched intercepts strategy is less than three threshold values, it is level of security to determine the present communications.
10. method as claimed in claim 9, it is characterised in that described that the present communications are entered according to the risk class Row processing, including:
When the present communications are high-risk ranks, the present communications are carried out with indicating risk and is directly intercepted described current logical Letter;
When the present communications are risk class or level of suspicion, indicating risk is carried out to the present communications;
When the present communications are level of securitys, the communications status of the present communications is kept.
11. the method as described in claim 1, it is characterised in that described that the present communications are handled, including:
Indicating risk is carried out to the present communications by voice broadcast;And/or,
Indicating risk information is loaded in the dial side of terminal and is highlighted.
12. the method as described in claim 1, it is characterised in that according to the matching result determine present communications described After the step of risk class, methods described also includes:
The present communications are carried out with risk identification according to the risk class, and preserves the communication identifier of the opposite end and described Risk identification.
13. method as claimed in claim 12, it is characterised in that methods described also includes:
When the communication identifier and the communication identifier of preservation of outgoing call match, according to corresponding risk identification to the exhalation Call is handled;
When the communication identifier that incoming call is conversed and the communication identifier of preservation match, according to corresponding risk identification to the incoming call Call is handled.
14. the method as described in claim 1, it is characterised in that believe in the call information for obtaining the opposite end and mark After the step of breath, methods described also includes:
The call information and label information are carried out going privacy to handle.
15. a kind of communication processing system, it is characterised in that including:
Communication identifier acquisition module, for being monitored to the signal intelligence in terminal, acquisition is currently led to the terminal The communication identifier of the opposite end of letter;
Data obtaining module, for the communication identifier according to the opposite end, obtains the call information and label information of the opposite end;
Matching module, for carrying out matching determination the call information and/or label information of the opposite end with the preset strategy that intercepts Matching result;Wherein, the preset strategy that intercepts includes many height interception strategy, and the matching result includes and the present communications phase The son of matching intercepts the quantity of strategy;
Risk determining module, the risk class for determining present communications according to the matching result;
Processing module, for being handled according to the risk class the present communications;
Wherein, the risk determining module, specifically for according to the quantity that strategy is intercepted with the son that the present communications match Determine the risk class of present communications.
16. system as claimed in claim 15, it is characterised in that
The call information includes:The exhalation of the opposite end and the number of times of incoming call, when the opposite end breathes out call during with incoming call It is long, the jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is conversed, the opposite end hair The number of times of short message is sent and receives, the communication identifier of the opposite end is added into contact person and is added into the number of times of blacklist It is at least one;
The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or junk incoming call, described right The number of times that the communication identifier at end occurs on the page for being defined as malice and/or rubbish network address, uses the communication mark of the opposite end Know the short message sent and be marked as at least one of number of times of malice and/or refuse messages.
17. system as claimed in claim 16, it is characterised in that the matching module, including:
First matching module, when being more than the first setting value for the ratio between exhalation number of times and incoming call number of times in the opposite end, it is determined that The present communications and preset interception strategy matching;
Second matching module, is more than the second setting for the ratio between the number of times that short message is sent in the opposite end and the number of times for receiving short message During value, the present communications and preset interception strategy matching are determined;
3rd matching module, is more than the 3rd setting value for the ratio between telephone operation number of times and short message number of operations in the opposite end When, determine the present communications and preset interception strategy matching;Wherein, the telephone operation number of times is breathed out including the opposite end And/or the number of times of incoming call;The short message number of operations includes the number of times that the opposite end sends and/or receives short message.
18. system as claimed in claim 16, it is characterised in that the matching module, including:
4th matching module, the number of times for being added into contact person for the communication identifier in the opposite end is less than the 4th setting value When, determine the present communications and preset interception strategy matching;
5th matching module, the number of times for being added into blacklist for the communication identifier in the opposite end is more than the 5th setting value When, determine the present communications and preset interception strategy matching.
19. system as claimed in claim 16, it is characterised in that the matching module, including:
6th matching module, the number of times for being less than the first setting duration for the duration of call when the opposite end is breathed out is more than the 6th During setting value, the present communications and preset interception strategy matching are determined;
7th matching module, the number of times for being less than the second setting duration for the duration of call in the opposite end incoming call is more than the 7th During setting value, the present communications and preset interception strategy matching are determined;
8th matching module, the number of times for being less than the 3rd setting duration for the jingle bell duration when the opposite end is breathed out is more than the 8th During setting value, the present communications and preset interception strategy matching are determined;
9th matching module, the number of times for being less than the 4th setting duration for the jingle bell duration in the opposite end incoming call is more than the 9th During setting value, the present communications and preset interception strategy matching are determined;
Tenth matching module, when meeting setting time distribution for the Annual distribution when the opposite end is conversed, determines institute State present communications and preset interception strategy matching.
20. system as claimed in claim 16, it is characterised in that the matching module, including:
11st matching module, the number of times for being marked as malice and/or junk incoming call for the communication identifier in the opposite end is big When ten setting values, the present communications and preset interception strategy matching are determined;
12nd matching module, the page of malice and/or rubbish network address is being defined as the communication identifier in the opposite end When the number of times of appearance is more than 11 setting value, the present communications and preset interception strategy matching are determined;
13rd matching module, the short message for being sent in the communication identifier using the opposite end is marked as malice and/or rubbish When the number of times of rubbish short message is more than 12 setting value, the present communications and preset interception strategy matching are determined.
21. the system as described in claim 15-20 any claims, it is characterised in that intercepted per height strategy respectively with Corresponding call information and label information match.
22. system as claimed in claim 21, it is characterised in that the matching module is by the call information of the opposite end And/or label information with preset interception strategy match when determining matching result, specifically includes:
Determined to intercept the number of strategy with the son that the present communications match according to the call information of opposite end and/or label information Amount.
23. the system as claimed in claim 22, it is characterised in that:
When the quantity for intercepting strategy in the son matched is more than or equal to first threshold, it is high-risk rank to determine the present communications;
When the quantity for intercepting strategy in the son matched is more than or equal to Second Threshold and is less than first threshold, determine described current logical Letter is risk class;
When the quantity for intercepting strategy in the son matched is more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical Letter is level of suspicion;
When the quantity for intercepting strategy in the son matched is less than three threshold values, it is level of security to determine the present communications.
24. system as claimed in claim 23, it is characterised in that the processing module, including:
First processing module, for when the present communications are high-risk ranks, indicating risk to be carried out simultaneously to the present communications Directly intercept the present communications;
Second processing module, for when the present communications are risk class or level of suspicion, being carried out to the present communications Indicating risk;
3rd processing module, for when the present communications are level of securitys, keeping the communications status of the present communications.
25. system as claimed in claim 15, it is characterised in that the processing module is handled to the present communications When, specifically include:
Indicating risk is carried out to the present communications by voice broadcast;And/or, load indicating risk in the dial side of terminal Information is simultaneously highlighted.
26. system as claimed in claim 15, it is characterised in that the system also includes:
Preserving module, for the risk determining module according to the matching result determine present communications risk class it Afterwards, the present communications are carried out with risk identification according to the risk class, and preserves the communication identifier of the opposite end and described Risk identification.
27. system as claimed in claim 26, it is characterised in that the system also includes:
Fourth processing module, when matching for the communication identifier in outgoing call and the communication identifier of preservation, according to correspondence wind Danger mark is handled the outgoing call;
5th processing module, when communication identifier and the communication identifier of preservation for being conversed in incoming call match, according to correspondence wind Danger mark is handled incoming call call.
28. system as claimed in claim 15, it is characterised in that the system also includes:
Privacy processing module, after obtaining the call information and label information of the opposite end in described information acquisition module, The call information and label information are carried out going privacy to handle.
CN201410300178.8A 2014-06-26 2014-06-26 A kind of communication processing method and system Active CN104113626B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410300178.8A CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410300178.8A CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Publications (2)

Publication Number Publication Date
CN104113626A CN104113626A (en) 2014-10-22
CN104113626B true CN104113626B (en) 2017-10-31

Family

ID=51710257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410300178.8A Active CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Country Status (1)

Country Link
CN (1) CN104113626B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506743B (en) * 2014-12-17 2017-11-03 百度在线网络技术(北京)有限公司 A kind of method and device of dynamic interception phone
CN104683537B (en) * 2015-01-28 2017-10-13 北京羽乐创新科技有限公司 A kind of number mark method and device
CN104735671B (en) * 2015-02-27 2018-11-09 腾讯科技(深圳)有限公司 A kind of method and apparatus of identification malicious call
AU2015413329B2 (en) 2015-10-28 2020-02-06 Viasat, Inc. Time-dependent machine-generated hinting
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal
CN105791574A (en) * 2016-03-02 2016-07-20 吴伟东 Communication shielding method and system of mobile phone app
CN105844475A (en) * 2016-03-17 2016-08-10 流量海科技成都有限公司 Risk control method and risk control apparatus
CN106101363A (en) * 2016-05-27 2016-11-09 北京小米移动软件有限公司 Income prompting method and device
CN106534464A (en) * 2016-11-30 2017-03-22 依偎科技(南昌)有限公司 Call processing method and terminal
CN107317935A (en) * 2017-07-07 2017-11-03 北京奇虎科技有限公司 Telephone number query, display methods and device, cloud server and terminal device
CN107896287B (en) * 2017-09-30 2021-06-18 深圳壹账通智能科技有限公司 Mobile phone number risk monitoring method, mobile terminal and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459718A (en) * 2009-01-06 2009-06-17 华中科技大学 Rubbish voice filtering method based on mobile communication network and system thereof
CN101540797A (en) * 2009-01-21 2009-09-23 宇龙计算机通信科技(深圳)有限公司 Incoming number filter method, system and mobile terminal
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN103685675A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Information processing method and electronic device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319359C (en) * 2004-06-07 2007-05-30 华为技术有限公司 Incoming calling receiving method
CN102368853B (en) * 2011-09-26 2013-06-26 广州市动景计算机科技有限公司 Communication event processing method and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459718A (en) * 2009-01-06 2009-06-17 华中科技大学 Rubbish voice filtering method based on mobile communication network and system thereof
CN101540797A (en) * 2009-01-21 2009-09-23 宇龙计算机通信科技(深圳)有限公司 Incoming number filter method, system and mobile terminal
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN103685675A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Information processing method and electronic device

Also Published As

Publication number Publication date
CN104113626A (en) 2014-10-22

Similar Documents

Publication Publication Date Title
CN104113626B (en) A kind of communication processing method and system
CN104135563A (en) A communication processing method and system
CN104038648A (en) Method and device for recognizing crank calls
US20150006655A1 (en) Intra-conversation Text Message Threading
CN108366173A (en) A kind of phone recognition methods, relevant device and system
CN110072019A (en) A kind of method and device shielding harassing call
CN106713674B (en) Call processing method and incoming call handling device
CN105611054A (en) Reminding creating method and terminal
CN104270509A (en) Displaying method of interface of mobile terminal, mobile terminal and server
CN109962893A (en) A kind of intelligent call method and its relevant device
CN106953987A (en) A kind of call processing method and device and mobile terminal
CN102148886A (en) Method for sorting contact list in mobile phone address book
CN107241505B (en) A kind of based reminding method of incoming call, device and its user terminal
CN102547614B (en) A kind of automatic reminding method based on mobile phone and mobile phone
CN102694896A (en) Method, terminal and system for storing communication number
CN106921949A (en) The method and apparatus that a kind of batch is dialed number
CN104869208A (en) Telephone voice message leaving method, device and system
CN106792600A (en) A kind of information processing method, mobile terminal, netscape messaging server Netscape
CN104506743B (en) A kind of method and device of dynamic interception phone
CN207115719U (en) A kind of security alarm information transmission system
CN101345792A (en) Method for automatically sending short message
WO2018144635A1 (en) Identifying and scoring key influencers in a network
CN104967989B (en) A kind of method and device for transmitting the communication information
CN110312049A (en) Execution operating method and device based on smart home operating system
CN101572870A (en) Method for monitoring junk information in communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230629

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right