CN104468927B - The processing method of address list information and mobile communication terminal in mobile communication terminal - Google Patents
The processing method of address list information and mobile communication terminal in mobile communication terminal Download PDFInfo
- Publication number
- CN104468927B CN104468927B CN201410766112.8A CN201410766112A CN104468927B CN 104468927 B CN104468927 B CN 104468927B CN 201410766112 A CN201410766112 A CN 201410766112A CN 104468927 B CN104468927 B CN 104468927B
- Authority
- CN
- China
- Prior art keywords
- information
- address
- address list
- harassing
- wrecking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000010295 mobile communication Methods 0.000 title claims abstract description 84
- 238000003672 processing method Methods 0.000 title claims abstract description 8
- 238000000034 method Methods 0.000 claims abstract description 54
- 238000004891 communication Methods 0.000 claims abstract description 45
- 239000003999 initiator Substances 0.000 claims description 9
- 238000012937 correction Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims 1
- 230000000875 corresponding effect Effects 0.000 description 62
- 230000008569 process Effects 0.000 description 12
- 230000008901 benefit Effects 0.000 description 4
- 238000002372 labelling Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 238000013316 zoning Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention is about the processing method of address list information in a kind of mobile communication terminal and mobile communication terminal.Described method includes: mobile communication terminal obtains the first address list;First address list is backed up, generates backup information, backup information includes the associated person information of the first contact person in address list and mark ID that associated person information is corresponding;Harassing and wrecking identification (RFID) tag corresponding at least one the harassing and wrecking address comprised in harassing and wrecking address base and harassing and wrecking address is saved in the first address list as the newly-increased communication mode of designated contact, obtains the second address list;Comparison the second address list and backup information have the associated person information of like-identified ID, if there are differences, then the associated person information of the described mark ID associated person information of the described mark ID in the second address list being modified in described backup information.Present invention, avoiding because of after adding harassing and wrecking address in address list the information of some network address by the problem of bug patch.
Description
Technical field
The present invention relates to a kind of computer realm, particularly relate to address list in a kind of mobile communication terminal
The processing method of information and mobile communication terminal.
Background technology
IOS is the Mobile operating system developed by Apple.Apple is early than in January, 2007
Announce this system in the Macworld conference of 9 days, be initially to design to use to iPhone, later
Set is used on the products such as iPod touch, iPad and Apple TV successively.IOS and the Mac OS of Fructus Mali pumilae
X operating system is the same, belongs to the commercial operating systems of class Unix.
When importing multiple phone number in the address list of mobile communication terminal being provided with iOS operating system
During code, the situation that the information in certain or some contact persons in address list will be tampered occurs.
Such as, if there is the telephone number that one or more telephone number label is empty (NULL/nil), then warp
Often there will be this problem: after adding multiple telephone number in iOS address list, some labels are
The label of the telephone number of empty (NULL/nil) can by mistake be modified as newly import telephone number contact person
In label.
Summary of the invention
In view of the above problems, it is proposed that the present invention is so that providing one to overcome the problems referred to above or at least
Partly solve processing method and the mobile communication of address list information in the mobile communication terminal of the problems referred to above
Terminal.
According to the first aspect of the invention, it is provided that address list information in a kind of mobile communication terminal
Processing method, including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes
The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base
Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact,
To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID
Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list
Associated person information for the described mark ID in described backup information.
According to the second aspect of the invention, it is provided that a kind of mobile communication terminal, including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby
Part information includes associated person information and the associated person information pair of described first contact person in address list
Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb
Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact
In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information
The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list
The associated person information of described mark ID that is modified in described backup information of associated person information.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has the advantage that
The technical scheme that the embodiment of the present invention provides is by preserving the harassing and wrecking comprised in harassing and wrecking address base
Address list is backed up before being saved in address list by address, after harassing and wrecking address is saved in address list,
Current address list is checked, when examination there are differences, according to standby by address list based on backup
Part the current address list of address list correction in the information that there are differences, it is to avoid because adding in address list
After adding harassing and wrecking address, the information of some network address, by the problem being modified as other information of mistake, is protected
Demonstrate,prove the accuracy of original information in address list.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention's
Technological means, and can be practiced according to the content of description, below with presently preferred embodiments of the present invention
And after coordinating accompanying drawing to describe in detail such as.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for
Those of ordinary skill in the art will be clear from understanding.Accompanying drawing is only used for illustrating the mesh of preferred implementation
, and it is not considered as limitation of the present invention.And in whole accompanying drawing, with identical reference symbol
Number represent identical parts.In the accompanying drawings:
Fig. 1 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides
The schematic flow sheet of method;
Fig. 2 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides
It method is the exemplary plot of the harassing and wrecking identification (RFID) tag of each described harassing and wrecking address and designated contact setting;
Fig. 3 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides
In method, when communications access is incoming call access, incoming call accesses the exemplary plot of the prompting page;
Fig. 4 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides
The schematic diagram of a concrete contact person in method;
Fig. 5 shows the structural representation of the mobile communication terminal that the embodiment of the present invention two provides.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this
Accompanying drawing in inventive embodiments, clearly and completely retouches the technical scheme in the embodiment of the present invention
State, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments.
Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, broadly falls into the scope of protection of the invention.
As it is shown in figure 1, the place of address list information in the mobile communication terminal of the embodiment of the present invention one offer
The schematic flow sheet of reason method.The present embodiment one provides the executive agent of method can be that mobile communication is whole
End.Described mobile communication terminal can be the mobile communication terminal being provided with iOS operating system of not escaping from prison
Concrete, described method, including:
Step 101, mobile communication terminal obtain the first address list.
Wherein, described first address list include the contact details of at least one contact person and respectively join
It is mark ID (ABRecordID) corresponding to people's information.Described mark ID is raw when creating contact person
The unique ID become.This mark ID will not change.
Step 102, described first address list is backed up, generate backup information.
Wherein, described backup information includes the contact person of All Contacts in described first address list
Information and mark ID corresponding to each described associated person information.
Concrete, the backup procedure of described first address list can use following steps to realize:
First, backup array is created.
Then, travel through described first address list, and obtain the contact of described first contact person in address list
People's information and mark ID corresponding to associated person information.
Finally, by mark ID pair corresponding to the described associated person information got and described associated person information
Should store in described backup array.
Wherein, the information of described contact person includes contact person's label, the network address and the network address
Corresponding label.Some associated person informations are likely not to have contact person's label, in some associated person informations
Some network address are likely not to have the label of correspondence.The described network address is IP telephone numbers, movement
Telephone number, fixed telephone number, mailbox user name or SMS platform number.
Above steps may be characterized as following expression formula 1:
Create backup array PersonArray
For (each contact person Person1 of the first address list)
Step 103, at least one harassing and wrecking address and described harassing and wrecking address of will comprising in harassing and wrecking address base
Corresponding harassing and wrecking identification (RFID) tag is saved in described first communication as the newly-increased communication mode of designated contact
In record, obtain the second address list.
Wherein, this step can be also described designated contact arranges harassing and wrecking identification (RFID) tag.Described appointment
Contact person can be one, it is also possible to is multiple.When designated contact is one, described harassing and wrecking ground
The all harassing and wrecking addresses comprised in storehouse, location can all be added in this designated contact.When specifying connection
Be artificial multiple time, all harassing and wrecking addresses of comprising in harassing and wrecking address base can be carried out by mobile communication terminal
Divide, to obtain the harassing and wrecking group of addresses identical with described designated contact quantity, then, by each harassing and wrecking
Group of addresses is added in the designated contact of correspondence.
Need exist for explanation: the described designated contact in the present embodiment can be newly-built contact
People, it is also possible to be existing contact person in local communication record.The described method that i.e. this enforcement provides, also
Can comprise the steps:
Creating new contact person in described local address book, described new contact person specifies contact as described
People;Or
Specify in described local address book existing contact person as described designated contact.
In actual use, what user may be autonomous enters the network address in local communication record
The setting of row harassing and wrecking identification (RFID) tag.Now, above-mentioned appointed existing contact person i.e. can be by user
Marked the contact person of harassing and wrecking identification (RFID) tag, or include the net that be marked harassing and wrecking identification (RFID) tag by user
The contact person of network address.
The harassing and wrecking identification (RFID) tag arranged for described designated contact can be picture or word etc..Such as,
The harassing and wrecking identification (RFID) tag arranged for described designated contact can be harassing and wrecking marking head picture and/or harassing and wrecking mark
Title.Shown in Fig. 2, harassing and wrecking marking head picture as shown in Figure 2 is set for described designated contact, with
And harassing and wrecking mark title " harassing and wrecking contact person ", as long as so caller ID comprises in being this designated contact
Harassing and wrecking address, mobile communication terminal, while display harassing and wrecking address and harassing and wrecking identification (RFID) tag, also shows
Harassing and wrecking marking head picture, thinks that mobile communication terminal user provides significant suggesting effect.Assume insurance
Financing 1 incoming call, as it is shown on figure 3, incoming call access prompting the page on simultaneously present harassing and wrecking marking head picture,
Contact person harasses harassing and wrecking identification (RFID) tag " the insurance financing of mark title " harassing and wrecking contact person " and harassing and wrecking address
1”。
Same, the harassing and wrecking tag identifier arranged for described harassing and wrecking address can also be picture or word etc..
In actual applications, in described harassing and wrecking address base in addition to including harassing and wrecking address, also can include and respectively disturb
Disturb the harassing and wrecking labelling that address is corresponding.The harassing and wrecking that respectively harassing and wrecking address is corresponding are labeled as " insurance financing ", " room
Produce intermediary ", " ad promotions ", " express delivery food delivery ", " harassing call ", " ring a sound " and " swindle is electric
Words " etc..Thus, mobile communication terminal can be according to harassing and wrecking labelling corresponding to each harassing and wrecking address to interpolation
Harassing and wrecking address in designated contact carries out harassing the setting of identification (RFID) tag.Such as, address is harassed
Type is " ringing a sound ", then mobile communication terminal can be the harassing and wrecking that this harassing and wrecking address arranges " ringing a sound "
Identification (RFID) tag.Therefore, corresponding above-mentioned all types of, mobile communication terminal is disturbing of each harassing and wrecking address setting
Disturb identification (RFID) tag may is that " insurance financing ", " house property medium ", " ad promotions ", " express delivery food delivery ",
" harassing call ", " ringing a sound " and " fraudulent call " etc..
For common phone, its label may is that " house ", " work ", " iPhone ", " hands
Machine ", " mainly ", " house fax ", " work fax " and " call " etc..
Wherein, in actual applications, the harassing and wrecking identification (RFID) tag arranged for each described harassing and wrecking address can be equal
Differ.Such as, as in figure 2 it is shown, add numerical character in harassing and wrecking identification (RFID) tag, such as " insurance reason
Wealth 1 ", " insurance financing 2 ", " insurance financing 3 " etc..
By in the harassing and wrecking address that will comprise in harassing and wrecking address base as the newly-increased communication party of designated contact
Formula is saved in local communication record, and arranges harassing and wrecking identification (RFID) tag and/or for described finger for each harassing and wrecking address
Determine contact person and harassing and wrecking identification (RFID) tag is set;Make when mobile communication terminal has communications access, if communication
The network address accessing initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as the most directly using
Existing communications access presents mechanism just can obtain described harassing and wrecking address correspondence from described local address book
The harassing and wrecking identification (RFID) tag of designated contact corresponding to harassing and wrecking identification (RFID) tag and/or harassing and wrecking address, and present
Described harassing and wrecking identification (RFID) tag, solves prior art and can not obtain caller ID for IOS system APP
And the problem of harassing and wrecking information warning can not to represent on electric interface, and owing to the present embodiment is direct
Harassing and wrecking address is saved in local address book, decrease of the prior art need to be with harassing call number
Storehouse carries out inquiring about the process of comparison, accelerates the recognition speed of harassing and wrecking communication.
Second address list described in step 104, comparison and described backup information has like-identified ID
Associated person information, if there are differences, then by the contact person of the described mark ID in described second address list
Information revision is the associated person information of the described mark ID in described backup information.
Concrete, this step can use following method to realize:
First, obtain described second address list and described backup information have the contact of like-identified ID
People's information, wherein, the associated person information of the described mark ID got from described second address list is made
For associated person information to be checked, contact person's letter of the described mark ID got from described backup information
Breath is as examination reference information.
Wherein, this step actually it is understood that based on mark ID comprised in described backup information,
Go to obtain associated person information to be checked from described second address list.It practice, be described in order to check
Information in addition to newly-increased harassing and wrecking address in second address list.
Then, associated person information to be checked described in comparison and described examination reference information, if there are differences,
Then associated person information to be checked described in described second address list is modified to described examination benchmark letter
Breath.
The present invention finds during research, when importing harassing and wrecking address in address list, and address list
In the label of contact person and the mark of the network address corresponding to all communication modes of each described contact person
Sign, more error-prone, therefore, can be only to label corresponding to the network address in associated person information and/or connection
It is that people's label is compared examination, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;
And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
Such as, shown in Fig. 4, all communication modes of contact person xxx have five, these five communication parties
The network address of formula correspondence respectively is: " 010-xxxxxxxx ", " 150-0101-xxxx ",
" 010-yyyyyyyy ", " 010-zzzzzzzz " and " 010-nnnnnnnn ".The network address
The label of " 010-xxxxxxxx " is " house ";The label of the network address " 150-0101-xxxx " is " hands
Machine ";The network address is: the label of " 010-yyyyyyyy " is " work ";The network address is:
The label of " 010-zzzzzzzz " is " work fax ";The label of " 010-nnnnnnnn " is that " house passes
Very ".The label of contact person xxx is " xxx ".According to having and contact person xxx in examination reference information
The label that this five network address of identical mark ID are corresponding, checks this connection in the second address list respectively
It is whether label corresponding to each network address of people xxx be by bug patch.If one of them, two
Or multiple be modified, the most successively according to examination reference information to the corresponding network in the second address list
Address is modified, and changes back the corresponding label in examination reference information.Such as, net is drawn by comparing
Network address is: " 010-xxxxxxxx " has been become " work " by bug patch, now, and can be based on examination benchmark
In information, the network address is: the label " house " that " 010-xxxxxxxx " is corresponding, by the second address list
The network address of contact person xxx be: the label that " 010-xxxxxxxx " is corresponding " works ".
Wherein, the described network address be IP telephone numbers, Mobile Directory Number, fixed telephone number,
Mailbox user name or SMS platform number.
Further, when the designated contact preserving harassing and wrecking address is newly-built contact person, i.e. harass ground
Harassing and wrecking address in storehouse, location is not intended as in described first address list the communication mode of existing contact person and carries out
During preservation, this step also can be adopted and be realized with the following method:
First, travel through the contact person in described second address list, find out in described second address list with
The contact person A identical for mark ID comprised in backup array.
Achieved that letter in addition to newly-increased harassing and wrecking address in described second address list by this step
Breath (i.e. contact person in addition to described designated contact) is checked.
Then, from described second address list, obtain the network comprised in the associated person information of contact person A
The label Label2 of address.
Subsequently, the network address that comprises in the associated person information of the first contact person in address list A is obtained
Label Label1.
Finally, label Label2 and label Label1 is compared.
The process that realizes of above-mentioned steps 104~106 may be characterized as following expression formula 2, this expression formula 2
The most above-mentioned expression formula 1 constitutes the whole process that realizes of described method that the embodiment of the present invention provides:
For (each contact person Person2 in the second address list)
Further, the described method that above-described embodiment provides also comprises the steps:
Address base is harassed described in described acquisition for mobile terminal.
Wherein, described harassing and wrecking address base can obtain from network equipment.In described harassing and wrecking address base
Include harassing and wrecking identification (RFID) tag corresponding at least one harassing and wrecking address and described harassing and wrecking address.Wherein,
What described harassing and wrecking address was corresponding harasses identification (RFID) tag can also be the follow-up harassing and wrecking labelling according to harassing and wrecking address
For harassing and wrecking address configuration.This network equipment can be cloud server.I.e. mobile communication terminal can
Described harassing and wrecking address base is downloaded from network equipment by wired or wireless network.Such as, mobile communication
Terminal can download described harassing and wrecking address base by 2G, 3G and 4G network from network equipment;Also can lead to
Cross the LAN access waies such as Wi-Fi and access in the Internet described to realize from network equipment download
Harassing and wrecking address;Internet can also be accessed by the way of wired realize downloading institute from network equipment
State harassing and wrecking address.Certainly, mobile communication terminal obtains by the way of carrying out data syn-chronization with calculating equipment
The mode taking the described harassing and wrecking address base being loaded in down in calculating equipment is also feasible, wherein, described
Calculating equipment first passes through network and downloads described harassing and wrecking address base from network equipment.
In the present embodiment, mobile communication terminal can be adopted and download from described network equipment with the following method
Described harassing and wrecking address base, the method includes:
First, mobile communication terminal can send, to network equipment, the request of download by client end interface.
Wherein, this download request carries the mark of mobile communication terminal.
Then, described network equipment can download request according to described, sends harassing and wrecking address base to moving
Mobile communication terminal.
Wherein, described mobile terminal can be disturbed from described in server device download by wired or wireless network
Disturb address base.
Need exist for supplementing: it practice, on network equipment harassing and wrecking address base in storage disturb
Disturb address date the hugest.If the harassing and wrecking ground that mobile communication terminal will be downloaded on network equipment
All harassing and wrecking addresses in storehouse, location are all added in local address book, can take mobile communication terminal
The biggest memory space, the normal of address list also having an impact mobile communication terminal is suitable for, and causes communication
Opening of record becomes the slowest.For solving the problems referred to above, the inventors found that harassing and wrecking address base
In great majority harassing and wrecking addresses only can remove to harass mobile communication terminal in region belonging to it.Such as,
Ad promotions phone only can be made service area in Pekinese's mobile communication by certain Beijing ad promotions company
Terminal;Harassing call only can be made the mobile communication in region, house property medium place by house property medium company
Terminal, etc..Therefore, network equipment side just can will belong to one together according to region belonging to harassing and wrecking address
The harassing and wrecking address of individual region is placed in a harassing and wrecking address base.So mobile communication terminal can be only from net
It is the most permissible that network side apparatus obtains harassing and wrecking address base corresponding to its region, place.This step, mobile communication
Before terminal obtains harassing and wrecking address base, may also include that
Described mobile communication terminal uploads the positional information of present position to described network equipment,
So that described network equipment is according to described positional information, determine that mobile communication terminal is currently located region,
And for described mobile communication terminal provide described region corresponding harassing and wrecking address base download service.
Wherein, but the IP address of positional information mobile communication terminal or GPS information.Region can basis
The service zoning that mobile supplier provides determines, as divided by provinces and cities.
Accordingly, described mobile communication terminal obtain harassing and wrecking address base, can particularly as follows:
Described mobile communication terminal downloads described harassing and wrecking ground by wired or wireless network from network equipment
Storehouse, location.
Further, the described method that the present embodiment provides can also comprise the steps:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base
Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark
Sign and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking mark
Label.
Concrete, when described communications access accesses for incoming call, the network of described communications access initiator
Address is IP telephone numbers, Mobile Directory Number or fixed telephone number.
When described communications access is note or internet message accesses, the net of described communications access initiator
Network address is Mobile Directory Number, mailbox user name or SMS platform number.
Described present described harassing and wrecking identification (RFID) tag, can be particularly as follows: present on the communications access prompting page
Described harassing and wrecking identification (RFID) tag.
When described communications access accesses for incoming call, described present on the communications access prompting page described
Harassing and wrecking identification (RFID) tag, particularly as follows:
Access at incoming call and on the prompting page, present described harassing and wrecking identification (RFID) tag, and be used for responding user's extension
Break and connect the manipulation key that described incoming call accesses.
Present harassing and wrecking marking head picture, contact person on the prompting page as it is shown on figure 3, access at incoming call simultaneously
Harassing and wrecking mark title " harassing and wrecking contact person ", the harassing and wrecking identification (RFID) tag " insurance financing 1 " of harassing and wrecking address;And
Hang up for relative users and connect the manipulation key that described incoming call accesses, " refusal " manipulation key and " answering "
Manipulation key.Certainly, access, at incoming call, " reminding me " manipulation key and " information " of also presenting on the prompting page
Manipulation key.
It should be understood that for aforesaid each method embodiment, in order to be briefly described, therefore by it all
Being expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not subject to
The restriction of described sequence of movement, because according to the present invention, some step can use other orders
Or carry out simultaneously.Secondly, those skilled in the art also should know, reality described in this description
Execute example and belong to preferred embodiment, necessary to involved action and the module not necessarily present invention.
As it is shown in figure 5, the structural representation of the mobile communication terminal of the embodiment of the present invention two offer.This
The mobile communication terminal that embodiment two provides can realize the described method that above-described embodiment one provides.Specifically
, the described mobile communication terminal of the present embodiment two offer, including:
First acquisition module 1, for obtaining the first address list;
Backup module 2, for backing up described first address list, generates backup information, described standby
Part information includes associated person information and the associated person information pair of described first contact person in address list
Mark ID answered;
Preserve module 3, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb
Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact
In one address list, obtain the second address list;
Comparison correcting module 4, has identical in the second address list described in comparison and described backup information
The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list
The associated person information of described mark ID that is modified in described backup information of associated person information.
The technical scheme that the present embodiment provides is by preserving the harassing and wrecking address comprised in harassing and wrecking address base
Before being saved in address list, address list is backed up, after harassing and wrecking address is saved in address list, base
Current address list is checked, when examination there are differences, according to backup by the address list in backup
The current address list of address list correction in the information that there are differences, it is to avoid because adding in address list
Behind harassing and wrecking address, the information of some network address is by the problem being modified as other information of mistake, it is ensured that
The accuracy of original information in address list.
Further, described comparison correcting module, specifically for:
Obtain contact person's letter in described second address list and described backup information with like-identified ID
Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating
Examination associated person information, the associated person information of the described mark ID got from described backup information is made
For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will
Associated person information to be checked described in described second address list is modified to described examination reference information.
Further, described mobile communication terminal may also include that
First processing module, for creating new contact person, described new contact in described first address list
People is as described designated contact;Or specify in described first address list existing contact person as institute
State designated contact.
Further, associated person information includes: label corresponding to the network address and the network address,
And/or contact person's label;Accordingly,
Above-mentioned comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
Further, above-mentioned backup module can use following structure to realize.Concrete, described backup
Module, including: creating unit, acquiring unit and memory element.Wherein, creating unit, it is used for creating
Build backup array;Acquiring unit, is used for traveling through described first address list, and obtains described first communication
The associated person information of contact person and mark ID corresponding to associated person information in record;Memory element, being used for will
The described associated person information got and mark ID correspondence corresponding to described associated person information store described
In backup array.
Further, above-mentioned mobile communication terminal, may also include that
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base
Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
Concrete, described acquisition module, it may include:
Download unit, downloads described harassing and wrecking address base by wired or wireless network from server device.
Further, described acquisition module, may also include that
Uploading unit, for uploading the positional information of present position to described network equipment, with
Make described network equipment according to described positional information, determine that mobile communication terminal is currently located region,
And for described mobile communication terminal provide described region corresponding harassing and wrecking address base download service.
Further, above-mentioned mobile communication terminal, may also include that
Second processing module, is used for when there being communications access, if the network address of communications access initiator
For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground
What location was corresponding harasses identification (RFID) tag and/or harasses the harassing and wrecking identification (RFID) tag of designated contact corresponding to address,
And present described harassing and wrecking identification (RFID) tag.
Need exist for explanation: the mobile communication terminal that the present embodiment provides can realize above-described embodiment
The one described method provided, concrete implementation process and realize principle and can be found in above-described embodiment one and retouch
The related content stated, here is omitted.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has in certain embodiment
The part being described in detail, may refer to the associated description of other embodiments.
It is understood that the correlated characteristic in said method and switch can mutually reference.It addition,
" first ", " second " in above-described embodiment etc. are for distinguishing each embodiment, and do not represent each enforcement
The quality of example.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned
The system described, the specific works process of device and unit, it is referred in preceding method embodiment
Corresponding process, does not repeats them here.
Provided herein algorithm and display not with any certain computer, virtual system or miscellaneous equipment
Intrinsic relevant.Various general-purpose systems can also be used together with based on teaching in this.According to above
Describe, construct the structure required by this kind of system and be apparent from.Additionally, the present invention is also not for
Any certain programmed language.It is understood that, it is possible to use various programming languages realize described here
The content of invention, and the description above done language-specific is to disclose the optimal real of the present invention
Execute mode.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that
Embodiments of the invention can be put into practice in the case of not having these details.In some instances,
It is not shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand in each inventive aspect
Individual or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention
Sometimes it is grouped together in single embodiment, figure or descriptions thereof.But, should be by
The method of the disclosure is construed to reflect an intention that i.e. the present invention for required protection requires that ratio is each
The more feature of feature being expressly recited in claim.More precisely, as following right is wanted
As asking book to be reflected, inventive aspect is all features less than single embodiment disclosed above.
Therefore, it then follows claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention,
The most each claim itself is as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment
Adaptively change and they are arranged in one or more equipment different from this embodiment.
Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and
In addition multiple submodule or subelement or sub-component can be put them into.Except such feature and/or
Outside at least some in process or unit excludes each other, any combination can be used this explanation
All features disclosed in book (including adjoint claim, summary and accompanying drawing) and the openest
Any method or all processes of equipment or unit be combined.Unless expressly stated otherwise, originally
Each feature disclosed in description (including adjoint claim, summary and accompanying drawing) can be by carrying
Alternative features for identical, equivalent or similar purpose replaces.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include
Some feature included in other embodiments rather than further feature, but the feature of different embodiment
Combination mean to be within the scope of the present invention and formed different embodiments.Such as, under
In the claims in face, embodiment required for protection one of arbitrarily can be in any combination
Mode uses.
The all parts embodiment of the present invention can realize with hardware, or with at one or more
The software module run on reason device realizes, or realizes with combinations thereof.Those skilled in the art
Should be appreciated that and microprocessor or digital signal processor (DSP) can be used in practice to realize
Some or all parts in the mobile communication terminal provided according to embodiments of the present invention some or
Repertoire.The present invention be also implemented as the part for performing method as described herein or
Whole equipment or device program (such as, computer program and computer program).So
The program realizing the present invention can store on a computer-readable medium, or can have one or
The form of the multiple signal of person.Such signal can be downloaded from internet website and obtain, or carrying
There is provided on body signal, or provide with any other form.
The present invention will be described rather than limits the present invention to it should be noted above-described embodiment
Make, and those skilled in the art can design without departing from the scope of the appended claims
Alternative embodiment.In the claims, any reference marks that should not will be located between bracket is configured to
Limitations on claims.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims
Suddenly.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such element.The present invention
And can come real by means of properly programmed computer by means of including the hardware of some different elements
Existing.If in the unit claim listing equipment for drying, several in these devices can be logical
Cross same hardware branch specifically to embody.Word first, second and third use do not indicate that
Any order.Can be title by these word explanations.
The invention discloses the processing method of address list information in A1, a kind of mobile communication terminal, including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes
The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base
Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact,
To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID
Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list
Associated person information for the described mark ID in described backup information.
A2, method as described in A1, wherein, the second address list described in described comparison and described backup
Information has the associated person information of like-identified ID, if there are differences, then by described second address list
In the connection of described mark ID that is modified in described backup information of the associated person information of described mark ID
It is people's information, including:
Obtain contact person's letter in described second address list and described backup information with like-identified ID
Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating
Examination associated person information, the associated person information of the described mark ID got from described backup information is made
For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will
Associated person information to be checked described in described second address list is modified to described examination reference information.
A3, method as described in A1, wherein, described mobile communication terminal is for being provided with the iOS that do not escapes from prison
The mobile communication terminal of operating system.
A4, method as described in A1, also include:
Creating new contact person in described first address list, described new contact person specifies contact as described
People;Or
Specify in described first address list existing contact person as described designated contact.
A5, method as according to any one of A1~A4, wherein, include in associated person information: net
Label corresponding to network address and the network address, and/or contact person's label;Accordingly,
Second address list described in comparison and described backup information have contact person's letter of like-identified ID
Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list
For the associated person information of the described mark ID in described backup information, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
A6, method as described in A5, wherein, the described network address is IP telephone numbers, movement
Telephone number, fixed telephone number, mailbox user name or SMS platform number.
A7, method as according to any one of A1~A4, wherein, described to described first address list
Back up, generate backup information, including:
Create backup array;
Travel through described first address list, and obtain the associated person information of described first contact person in address list
And mark ID that associated person information is corresponding;
By mark ID correspondence storage corresponding to the described associated person information got and described associated person information
In described backup array.
A8, method as according to any one of A1~A4, also include:
Harass address base described in described acquisition for mobile terminal, described harassing and wrecking address base includes at least one
Harassing and wrecking identification (RFID) tag corresponding to individual harassing and wrecking address and described harassing and wrecking address.
A9, method as according to any one of A1~A4, also include:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base
Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark
Sign, and present described harassing and wrecking identification (RFID) tag.
The invention also discloses B10, a kind of mobile communication terminal, including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby
Part information includes associated person information and the associated person information pair of described first contact person in address list
Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb
Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact
In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information
The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list
The associated person information of described mark ID that is modified in described backup information of associated person information.
B11, mobile communication terminal as described in B10, wherein, described comparison correcting module, specifically use
In:
Obtain contact person's letter in described second address list and described backup information with like-identified ID
Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating
Examination associated person information, the associated person information of the described mark ID got from described backup information is made
For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will
Associated person information to be checked described in described second address list is modified to described examination reference information.
B12, mobile communication terminal as described in B10, also include:
First processing module, for creating new contact person, described new contact in described first address list
People is as described designated contact;Or specify in described first address list existing contact person as institute
State designated contact.
B13, mobile communication terminal as according to any one of B10~B12, wherein, associated person information
In include: label corresponding to the network address and the network address, and/or contact person's label;Accordingly,
Described comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
B14, mobile communication terminal as according to any one of B10~B12, wherein, described backup mould
Block, including:
Creating unit, is used for creating backup array;
Acquiring unit, is used for traveling through described first address list, and obtains contact in described first address list
The associated person information of people and mark ID corresponding to associated person information;
Memory element, corresponding for described associated person information and the described associated person information that will get
Mark ID correspondence stores in described backup array.
B15, mobile communication terminal as according to any one of B10~B12, also include:
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base
Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
B16, mobile communication terminal as according to any one of B10~B12, also include:
Second processing module, is used for when there being communications access, if the network address of communications access initiator
For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground
The harassing and wrecking identification (RFID) tag that location is corresponding, and present described harassing and wrecking identification (RFID) tag.
Claims (14)
1. the processing method of address list information in a mobile communication terminal, it is characterised in that including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes
The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base
Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact,
To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID
Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list
Associated person information for the described mark ID in described backup information;
Wherein, described described first address list is backed up, generate backup information, including:
Create backup array;
Travel through described first address list, and obtain the associated person information of described first contact person in address list
And mark ID that associated person information is corresponding;
By mark ID correspondence storage corresponding to the described associated person information got and described associated person information
In described backup array.
Method the most according to claim 1, it is characterised in that the second communication described in described comparison
Record and described backup information have the associated person information of like-identified ID, if there are differences, then by institute
That states that the associated person information of the described mark ID in the second address list is modified in described backup information is described
The associated person information of mark ID, including:
Obtain contact person's letter in described second address list and described backup information with like-identified ID
Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating
Examination associated person information, the associated person information of the described mark ID got from described backup information is made
For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will
Associated person information to be checked described in described second address list is modified to described examination reference information.
Method the most according to claim 1, it is characterised in that described mobile communication terminal is peace
Mobile communication terminal equipped with iOS operating system of not escaping from prison.
Method the most according to claim 1, it is characterised in that also include:
Creating new contact person in described first address list, described new contact person specifies contact as described
People;Or
Specify in described first address list existing contact person as described designated contact.
5. according to the method according to any one of Claims 1 to 4, it is characterised in that associated person information
In include: label corresponding to the network address and the network address, and/or contact person's label;Accordingly,
Second address list described in comparison and described backup information have contact person's letter of like-identified ID
Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list
For the associated person information of the described mark ID in described backup information, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
Method the most according to claim 5, it is characterised in that the described network address is network electricity
Words number, Mobile Directory Number, fixed telephone number, mailbox user name or SMS platform number.
7. according to the method according to any one of Claims 1 to 4, it is characterised in that also include:
Harass address base described in described acquisition for mobile terminal, described harassing and wrecking address base includes at least one
Harassing and wrecking identification (RFID) tag corresponding to individual harassing and wrecking address and described harassing and wrecking address.
8. according to the method according to any one of Claims 1 to 4, it is characterised in that also include:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base
Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark
Sign, and present described harassing and wrecking identification (RFID) tag.
9. a mobile communication terminal, it is characterised in that including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby
Part information includes associated person information and the associated person information pair of described first contact person in address list
Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb
Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact
In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information
The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list
The associated person information of described mark ID that is modified in described backup information of associated person information;
Wherein, described backup module, including:
Creating unit, is used for creating backup array;
Acquiring unit, is used for traveling through described first address list, and obtains contact in described first address list
The associated person information of people and mark ID corresponding to associated person information;
Memory element, corresponding for described associated person information and the described associated person information that will get
Mark ID correspondence stores in described backup array.
Mobile communication terminal the most according to claim 9, it is characterised in that described comparison is repaiied
Positive module, specifically for:
Obtain contact person's letter in described second address list and described backup information with like-identified ID
Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating
Examination associated person information, the associated person information of the described mark ID got from described backup information is made
For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will
Associated person information to be checked described in described second address list is modified to described examination reference information.
11. mobile communication terminals according to claim 9, it is characterised in that also include:
First processing module, for creating new contact person, described new contact in described first address list
People is as described designated contact;Or specify in described first address list existing contact person as institute
State designated contact.
12. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that
Associated person information includes: label corresponding to the network address and the network address, and/or contact person's mark
Sign;Accordingly,
Described comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list
The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information
The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID
The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list
The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information
Contact person's label in information.
13. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that
Also include:
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base
Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
14. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that
Also include:
Second processing module, is used for when there being communications access, if the network address of communications access initiator
For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground
The harassing and wrecking identification (RFID) tag that location is corresponding, and present described harassing and wrecking identification (RFID) tag.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410766112.8A CN104468927B (en) | 2014-12-11 | 2014-12-11 | The processing method of address list information and mobile communication terminal in mobile communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410766112.8A CN104468927B (en) | 2014-12-11 | 2014-12-11 | The processing method of address list information and mobile communication terminal in mobile communication terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104468927A CN104468927A (en) | 2015-03-25 |
CN104468927B true CN104468927B (en) | 2016-10-19 |
Family
ID=52914270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410766112.8A Active CN104468927B (en) | 2014-12-11 | 2014-12-11 | The processing method of address list information and mobile communication terminal in mobile communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104468927B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110996252A (en) * | 2019-12-11 | 2020-04-10 | 武汉微分享互动科技有限公司 | Communication platform and method for providing business communication for partitioned mobile telecommunication clients |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867915A (en) * | 2010-06-13 | 2010-10-20 | 优视科技有限公司 | Address book data backup and recovery method based on mobile terminal and system |
CN102722428A (en) * | 2012-06-29 | 2012-10-10 | 北京小米科技有限责任公司 | Address book backup and recovery method and address book backup and recovery device |
CN103309906A (en) * | 2012-03-16 | 2013-09-18 | 中国移动通信集团公司 | Address book backup and recovery method and device |
CN103916509A (en) * | 2012-12-31 | 2014-07-09 | 北京新媒传信科技有限公司 | Method and apparatus for restoring phone contacts |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
-
2014
- 2014-12-11 CN CN201410766112.8A patent/CN104468927B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867915A (en) * | 2010-06-13 | 2010-10-20 | 优视科技有限公司 | Address book data backup and recovery method based on mobile terminal and system |
CN103309906A (en) * | 2012-03-16 | 2013-09-18 | 中国移动通信集团公司 | Address book backup and recovery method and device |
CN102722428A (en) * | 2012-06-29 | 2012-10-10 | 北京小米科技有限责任公司 | Address book backup and recovery method and address book backup and recovery device |
CN103916509A (en) * | 2012-12-31 | 2014-07-09 | 北京新媒传信科技有限公司 | Method and apparatus for restoring phone contacts |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
Also Published As
Publication number | Publication date |
---|---|
CN104468927A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8423060B2 (en) | Mobile phone and method for processing short message | |
CN105701122A (en) | Log collection method, apparatus and system | |
CN104135563A (en) | A communication processing method and system | |
CN105100513B (en) | Method for processing message of incoming call and device, incoming call service server | |
CN104243661A (en) | Method, server and mobile terminal for determining types of incoming call numbers | |
CN106792653B (en) | Communication number information processing method, device and system | |
WO2017032076A1 (en) | Method and apparatus for creating circle of friends, and communications method and apparatus based on circles of friends | |
CN105491239B (en) | The hold-up interception method and device of junk information | |
CN106792600A (en) | A kind of information processing method, mobile terminal, netscape messaging server Netscape | |
CN104468927B (en) | The processing method of address list information and mobile communication terminal in mobile communication terminal | |
CN109391658B (en) | Account data synchronization method and equipment, storage medium and terminal thereof | |
CN104252541B (en) | A kind of webpage information method for pushing, data server and terminal | |
CN106209584A (en) | User profile processing method based on the Internet, client and server | |
CN105744525A (en) | Method, device and system for mobile communication terminal to identify harassing communication | |
US20160165054A1 (en) | Contextual contact substitution for mobile devices | |
WO2018152978A1 (en) | Method and device for prompting change of account-bound telephone number and computer storage medium | |
US20130260716A1 (en) | Phone Number Encapsulation Using Token Based Framework | |
CN105827780A (en) | Caller identification method and caller identification device | |
CN105744035B (en) | Mobile communication terminal carries out the method and mobile communication terminal that harassing and wrecking communication intercepts | |
CN104735643A (en) | Information processing method and data server | |
US10728191B2 (en) | Method for establishing communication within a closed network | |
US9456077B2 (en) | Communication server, communication terminal, and method of communication | |
KR20140073073A (en) | Method and system for phone number inquiry | |
CN105763708B (en) | The processing method and mobile communication terminal of address book information in mobile communication terminal | |
CN109547317B (en) | Method and device for establishing connection tunnel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220728 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |