CN104468927B - The processing method of address list information and mobile communication terminal in mobile communication terminal - Google Patents

The processing method of address list information and mobile communication terminal in mobile communication terminal Download PDF

Info

Publication number
CN104468927B
CN104468927B CN201410766112.8A CN201410766112A CN104468927B CN 104468927 B CN104468927 B CN 104468927B CN 201410766112 A CN201410766112 A CN 201410766112A CN 104468927 B CN104468927 B CN 104468927B
Authority
CN
China
Prior art keywords
information
address
address list
harassing
wrecking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410766112.8A
Other languages
Chinese (zh)
Other versions
CN104468927A (en
Inventor
张福生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410766112.8A priority Critical patent/CN104468927B/en
Publication of CN104468927A publication Critical patent/CN104468927A/en
Application granted granted Critical
Publication of CN104468927B publication Critical patent/CN104468927B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention is about the processing method of address list information in a kind of mobile communication terminal and mobile communication terminal.Described method includes: mobile communication terminal obtains the first address list;First address list is backed up, generates backup information, backup information includes the associated person information of the first contact person in address list and mark ID that associated person information is corresponding;Harassing and wrecking identification (RFID) tag corresponding at least one the harassing and wrecking address comprised in harassing and wrecking address base and harassing and wrecking address is saved in the first address list as the newly-increased communication mode of designated contact, obtains the second address list;Comparison the second address list and backup information have the associated person information of like-identified ID, if there are differences, then the associated person information of the described mark ID associated person information of the described mark ID in the second address list being modified in described backup information.Present invention, avoiding because of after adding harassing and wrecking address in address list the information of some network address by the problem of bug patch.

Description

The processing method of address list information and mobile communication terminal in mobile communication terminal
Technical field
The present invention relates to a kind of computer realm, particularly relate to address list in a kind of mobile communication terminal The processing method of information and mobile communication terminal.
Background technology
IOS is the Mobile operating system developed by Apple.Apple is early than in January, 2007 Announce this system in the Macworld conference of 9 days, be initially to design to use to iPhone, later Set is used on the products such as iPod touch, iPad and Apple TV successively.IOS and the Mac OS of Fructus Mali pumilae X operating system is the same, belongs to the commercial operating systems of class Unix.
When importing multiple phone number in the address list of mobile communication terminal being provided with iOS operating system During code, the situation that the information in certain or some contact persons in address list will be tampered occurs. Such as, if there is the telephone number that one or more telephone number label is empty (NULL/nil), then warp Often there will be this problem: after adding multiple telephone number in iOS address list, some labels are The label of the telephone number of empty (NULL/nil) can by mistake be modified as newly import telephone number contact person In label.
Summary of the invention
In view of the above problems, it is proposed that the present invention is so that providing one to overcome the problems referred to above or at least Partly solve processing method and the mobile communication of address list information in the mobile communication terminal of the problems referred to above Terminal.
According to the first aspect of the invention, it is provided that address list information in a kind of mobile communication terminal Processing method, including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact, To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list Associated person information for the described mark ID in described backup information.
According to the second aspect of the invention, it is provided that a kind of mobile communication terminal, including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby Part information includes associated person information and the associated person information pair of described first contact person in address list Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list The associated person information of described mark ID that is modified in described backup information of associated person information.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has the advantage that
The technical scheme that the embodiment of the present invention provides is by preserving the harassing and wrecking comprised in harassing and wrecking address base Address list is backed up before being saved in address list by address, after harassing and wrecking address is saved in address list, Current address list is checked, when examination there are differences, according to standby by address list based on backup Part the current address list of address list correction in the information that there are differences, it is to avoid because adding in address list After adding harassing and wrecking address, the information of some network address, by the problem being modified as other information of mistake, is protected Demonstrate,prove the accuracy of original information in address list.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention's Technological means, and can be practiced according to the content of description, below with presently preferred embodiments of the present invention And after coordinating accompanying drawing to describe in detail such as.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for Those of ordinary skill in the art will be clear from understanding.Accompanying drawing is only used for illustrating the mesh of preferred implementation , and it is not considered as limitation of the present invention.And in whole accompanying drawing, with identical reference symbol Number represent identical parts.In the accompanying drawings:
Fig. 1 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides The schematic flow sheet of method;
Fig. 2 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides It method is the exemplary plot of the harassing and wrecking identification (RFID) tag of each described harassing and wrecking address and designated contact setting;
Fig. 3 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides In method, when communications access is incoming call access, incoming call accesses the exemplary plot of the prompting page;
Fig. 4 shows the process of address list information in the mobile communication terminal that the embodiment of the present invention one provides The schematic diagram of a concrete contact person in method;
Fig. 5 shows the structural representation of the mobile communication terminal that the embodiment of the present invention two provides.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in inventive embodiments, clearly and completely retouches the technical scheme in the embodiment of the present invention State, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, broadly falls into the scope of protection of the invention.
As it is shown in figure 1, the place of address list information in the mobile communication terminal of the embodiment of the present invention one offer The schematic flow sheet of reason method.The present embodiment one provides the executive agent of method can be that mobile communication is whole End.Described mobile communication terminal can be the mobile communication terminal being provided with iOS operating system of not escaping from prison Concrete, described method, including:
Step 101, mobile communication terminal obtain the first address list.
Wherein, described first address list include the contact details of at least one contact person and respectively join It is mark ID (ABRecordID) corresponding to people's information.Described mark ID is raw when creating contact person The unique ID become.This mark ID will not change.
Step 102, described first address list is backed up, generate backup information.
Wherein, described backup information includes the contact person of All Contacts in described first address list Information and mark ID corresponding to each described associated person information.
Concrete, the backup procedure of described first address list can use following steps to realize:
First, backup array is created.
Then, travel through described first address list, and obtain the contact of described first contact person in address list People's information and mark ID corresponding to associated person information.
Finally, by mark ID pair corresponding to the described associated person information got and described associated person information Should store in described backup array.
Wherein, the information of described contact person includes contact person's label, the network address and the network address Corresponding label.Some associated person informations are likely not to have contact person's label, in some associated person informations Some network address are likely not to have the label of correspondence.The described network address is IP telephone numbers, movement Telephone number, fixed telephone number, mailbox user name or SMS platform number.
Above steps may be characterized as following expression formula 1:
Create backup array PersonArray
For (each contact person Person1 of the first address list)
Step 103, at least one harassing and wrecking address and described harassing and wrecking address of will comprising in harassing and wrecking address base Corresponding harassing and wrecking identification (RFID) tag is saved in described first communication as the newly-increased communication mode of designated contact In record, obtain the second address list.
Wherein, this step can be also described designated contact arranges harassing and wrecking identification (RFID) tag.Described appointment Contact person can be one, it is also possible to is multiple.When designated contact is one, described harassing and wrecking ground The all harassing and wrecking addresses comprised in storehouse, location can all be added in this designated contact.When specifying connection Be artificial multiple time, all harassing and wrecking addresses of comprising in harassing and wrecking address base can be carried out by mobile communication terminal Divide, to obtain the harassing and wrecking group of addresses identical with described designated contact quantity, then, by each harassing and wrecking Group of addresses is added in the designated contact of correspondence.
Need exist for explanation: the described designated contact in the present embodiment can be newly-built contact People, it is also possible to be existing contact person in local communication record.The described method that i.e. this enforcement provides, also Can comprise the steps:
Creating new contact person in described local address book, described new contact person specifies contact as described People;Or
Specify in described local address book existing contact person as described designated contact.
In actual use, what user may be autonomous enters the network address in local communication record The setting of row harassing and wrecking identification (RFID) tag.Now, above-mentioned appointed existing contact person i.e. can be by user Marked the contact person of harassing and wrecking identification (RFID) tag, or include the net that be marked harassing and wrecking identification (RFID) tag by user The contact person of network address.
The harassing and wrecking identification (RFID) tag arranged for described designated contact can be picture or word etc..Such as, The harassing and wrecking identification (RFID) tag arranged for described designated contact can be harassing and wrecking marking head picture and/or harassing and wrecking mark Title.Shown in Fig. 2, harassing and wrecking marking head picture as shown in Figure 2 is set for described designated contact, with And harassing and wrecking mark title " harassing and wrecking contact person ", as long as so caller ID comprises in being this designated contact Harassing and wrecking address, mobile communication terminal, while display harassing and wrecking address and harassing and wrecking identification (RFID) tag, also shows Harassing and wrecking marking head picture, thinks that mobile communication terminal user provides significant suggesting effect.Assume insurance Financing 1 incoming call, as it is shown on figure 3, incoming call access prompting the page on simultaneously present harassing and wrecking marking head picture, Contact person harasses harassing and wrecking identification (RFID) tag " the insurance financing of mark title " harassing and wrecking contact person " and harassing and wrecking address 1”。
Same, the harassing and wrecking tag identifier arranged for described harassing and wrecking address can also be picture or word etc.. In actual applications, in described harassing and wrecking address base in addition to including harassing and wrecking address, also can include and respectively disturb Disturb the harassing and wrecking labelling that address is corresponding.The harassing and wrecking that respectively harassing and wrecking address is corresponding are labeled as " insurance financing ", " room Produce intermediary ", " ad promotions ", " express delivery food delivery ", " harassing call ", " ring a sound " and " swindle is electric Words " etc..Thus, mobile communication terminal can be according to harassing and wrecking labelling corresponding to each harassing and wrecking address to interpolation Harassing and wrecking address in designated contact carries out harassing the setting of identification (RFID) tag.Such as, address is harassed Type is " ringing a sound ", then mobile communication terminal can be the harassing and wrecking that this harassing and wrecking address arranges " ringing a sound " Identification (RFID) tag.Therefore, corresponding above-mentioned all types of, mobile communication terminal is disturbing of each harassing and wrecking address setting Disturb identification (RFID) tag may is that " insurance financing ", " house property medium ", " ad promotions ", " express delivery food delivery ", " harassing call ", " ringing a sound " and " fraudulent call " etc..
For common phone, its label may is that " house ", " work ", " iPhone ", " hands Machine ", " mainly ", " house fax ", " work fax " and " call " etc..
Wherein, in actual applications, the harassing and wrecking identification (RFID) tag arranged for each described harassing and wrecking address can be equal Differ.Such as, as in figure 2 it is shown, add numerical character in harassing and wrecking identification (RFID) tag, such as " insurance reason Wealth 1 ", " insurance financing 2 ", " insurance financing 3 " etc..
By in the harassing and wrecking address that will comprise in harassing and wrecking address base as the newly-increased communication party of designated contact Formula is saved in local communication record, and arranges harassing and wrecking identification (RFID) tag and/or for described finger for each harassing and wrecking address Determine contact person and harassing and wrecking identification (RFID) tag is set;Make when mobile communication terminal has communications access, if communication The network address accessing initiator is the harassing and wrecking address in described harassing and wrecking address base, as long as the most directly using Existing communications access presents mechanism just can obtain described harassing and wrecking address correspondence from described local address book The harassing and wrecking identification (RFID) tag of designated contact corresponding to harassing and wrecking identification (RFID) tag and/or harassing and wrecking address, and present Described harassing and wrecking identification (RFID) tag, solves prior art and can not obtain caller ID for IOS system APP And the problem of harassing and wrecking information warning can not to represent on electric interface, and owing to the present embodiment is direct Harassing and wrecking address is saved in local address book, decrease of the prior art need to be with harassing call number Storehouse carries out inquiring about the process of comparison, accelerates the recognition speed of harassing and wrecking communication.
Second address list described in step 104, comparison and described backup information has like-identified ID Associated person information, if there are differences, then by the contact person of the described mark ID in described second address list Information revision is the associated person information of the described mark ID in described backup information.
Concrete, this step can use following method to realize:
First, obtain described second address list and described backup information have the contact of like-identified ID People's information, wherein, the associated person information of the described mark ID got from described second address list is made For associated person information to be checked, contact person's letter of the described mark ID got from described backup information Breath is as examination reference information.
Wherein, this step actually it is understood that based on mark ID comprised in described backup information, Go to obtain associated person information to be checked from described second address list.It practice, be described in order to check Information in addition to newly-increased harassing and wrecking address in second address list.
Then, associated person information to be checked described in comparison and described examination reference information, if there are differences, Then associated person information to be checked described in described second address list is modified to described examination benchmark letter Breath.
The present invention finds during research, when importing harassing and wrecking address in address list, and address list In the label of contact person and the mark of the network address corresponding to all communication modes of each described contact person Sign, more error-prone, therefore, can be only to label corresponding to the network address in associated person information and/or connection It is that people's label is compared examination, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;
And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
Such as, shown in Fig. 4, all communication modes of contact person xxx have five, these five communication parties The network address of formula correspondence respectively is: " 010-xxxxxxxx ", " 150-0101-xxxx ", " 010-yyyyyyyy ", " 010-zzzzzzzz " and " 010-nnnnnnnn ".The network address The label of " 010-xxxxxxxx " is " house ";The label of the network address " 150-0101-xxxx " is " hands Machine ";The network address is: the label of " 010-yyyyyyyy " is " work ";The network address is: The label of " 010-zzzzzzzz " is " work fax ";The label of " 010-nnnnnnnn " is that " house passes Very ".The label of contact person xxx is " xxx ".According to having and contact person xxx in examination reference information The label that this five network address of identical mark ID are corresponding, checks this connection in the second address list respectively It is whether label corresponding to each network address of people xxx be by bug patch.If one of them, two Or multiple be modified, the most successively according to examination reference information to the corresponding network in the second address list Address is modified, and changes back the corresponding label in examination reference information.Such as, net is drawn by comparing Network address is: " 010-xxxxxxxx " has been become " work " by bug patch, now, and can be based on examination benchmark In information, the network address is: the label " house " that " 010-xxxxxxxx " is corresponding, by the second address list The network address of contact person xxx be: the label that " 010-xxxxxxxx " is corresponding " works ".
Wherein, the described network address be IP telephone numbers, Mobile Directory Number, fixed telephone number, Mailbox user name or SMS platform number.
Further, when the designated contact preserving harassing and wrecking address is newly-built contact person, i.e. harass ground Harassing and wrecking address in storehouse, location is not intended as in described first address list the communication mode of existing contact person and carries out During preservation, this step also can be adopted and be realized with the following method:
First, travel through the contact person in described second address list, find out in described second address list with The contact person A identical for mark ID comprised in backup array.
Achieved that letter in addition to newly-increased harassing and wrecking address in described second address list by this step Breath (i.e. contact person in addition to described designated contact) is checked.
Then, from described second address list, obtain the network comprised in the associated person information of contact person A The label Label2 of address.
Subsequently, the network address that comprises in the associated person information of the first contact person in address list A is obtained Label Label1.
Finally, label Label2 and label Label1 is compared.
The process that realizes of above-mentioned steps 104~106 may be characterized as following expression formula 2, this expression formula 2 The most above-mentioned expression formula 1 constitutes the whole process that realizes of described method that the embodiment of the present invention provides:
For (each contact person Person2 in the second address list)
Further, the described method that above-described embodiment provides also comprises the steps:
Address base is harassed described in described acquisition for mobile terminal.
Wherein, described harassing and wrecking address base can obtain from network equipment.In described harassing and wrecking address base Include harassing and wrecking identification (RFID) tag corresponding at least one harassing and wrecking address and described harassing and wrecking address.Wherein, What described harassing and wrecking address was corresponding harasses identification (RFID) tag can also be the follow-up harassing and wrecking labelling according to harassing and wrecking address For harassing and wrecking address configuration.This network equipment can be cloud server.I.e. mobile communication terminal can Described harassing and wrecking address base is downloaded from network equipment by wired or wireless network.Such as, mobile communication Terminal can download described harassing and wrecking address base by 2G, 3G and 4G network from network equipment;Also can lead to Cross the LAN access waies such as Wi-Fi and access in the Internet described to realize from network equipment download Harassing and wrecking address;Internet can also be accessed by the way of wired realize downloading institute from network equipment State harassing and wrecking address.Certainly, mobile communication terminal obtains by the way of carrying out data syn-chronization with calculating equipment The mode taking the described harassing and wrecking address base being loaded in down in calculating equipment is also feasible, wherein, described Calculating equipment first passes through network and downloads described harassing and wrecking address base from network equipment.
In the present embodiment, mobile communication terminal can be adopted and download from described network equipment with the following method Described harassing and wrecking address base, the method includes:
First, mobile communication terminal can send, to network equipment, the request of download by client end interface.
Wherein, this download request carries the mark of mobile communication terminal.
Then, described network equipment can download request according to described, sends harassing and wrecking address base to moving Mobile communication terminal.
Wherein, described mobile terminal can be disturbed from described in server device download by wired or wireless network Disturb address base.
Need exist for supplementing: it practice, on network equipment harassing and wrecking address base in storage disturb Disturb address date the hugest.If the harassing and wrecking ground that mobile communication terminal will be downloaded on network equipment All harassing and wrecking addresses in storehouse, location are all added in local address book, can take mobile communication terminal The biggest memory space, the normal of address list also having an impact mobile communication terminal is suitable for, and causes communication Opening of record becomes the slowest.For solving the problems referred to above, the inventors found that harassing and wrecking address base In great majority harassing and wrecking addresses only can remove to harass mobile communication terminal in region belonging to it.Such as, Ad promotions phone only can be made service area in Pekinese's mobile communication by certain Beijing ad promotions company Terminal;Harassing call only can be made the mobile communication in region, house property medium place by house property medium company Terminal, etc..Therefore, network equipment side just can will belong to one together according to region belonging to harassing and wrecking address The harassing and wrecking address of individual region is placed in a harassing and wrecking address base.So mobile communication terminal can be only from net It is the most permissible that network side apparatus obtains harassing and wrecking address base corresponding to its region, place.This step, mobile communication Before terminal obtains harassing and wrecking address base, may also include that
Described mobile communication terminal uploads the positional information of present position to described network equipment, So that described network equipment is according to described positional information, determine that mobile communication terminal is currently located region, And for described mobile communication terminal provide described region corresponding harassing and wrecking address base download service.
Wherein, but the IP address of positional information mobile communication terminal or GPS information.Region can basis The service zoning that mobile supplier provides determines, as divided by provinces and cities.
Accordingly, described mobile communication terminal obtain harassing and wrecking address base, can particularly as follows:
Described mobile communication terminal downloads described harassing and wrecking ground by wired or wireless network from network equipment Storehouse, location.
Further, the described method that the present embodiment provides can also comprise the steps:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark Sign and/or harass the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, and present described harassing and wrecking mark Label.
Concrete, when described communications access accesses for incoming call, the network of described communications access initiator Address is IP telephone numbers, Mobile Directory Number or fixed telephone number.
When described communications access is note or internet message accesses, the net of described communications access initiator Network address is Mobile Directory Number, mailbox user name or SMS platform number.
Described present described harassing and wrecking identification (RFID) tag, can be particularly as follows: present on the communications access prompting page Described harassing and wrecking identification (RFID) tag.
When described communications access accesses for incoming call, described present on the communications access prompting page described Harassing and wrecking identification (RFID) tag, particularly as follows:
Access at incoming call and on the prompting page, present described harassing and wrecking identification (RFID) tag, and be used for responding user's extension Break and connect the manipulation key that described incoming call accesses.
Present harassing and wrecking marking head picture, contact person on the prompting page as it is shown on figure 3, access at incoming call simultaneously Harassing and wrecking mark title " harassing and wrecking contact person ", the harassing and wrecking identification (RFID) tag " insurance financing 1 " of harassing and wrecking address;And Hang up for relative users and connect the manipulation key that described incoming call accesses, " refusal " manipulation key and " answering " Manipulation key.Certainly, access, at incoming call, " reminding me " manipulation key and " information " of also presenting on the prompting page Manipulation key.
It should be understood that for aforesaid each method embodiment, in order to be briefly described, therefore by it all Being expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not subject to The restriction of described sequence of movement, because according to the present invention, some step can use other orders Or carry out simultaneously.Secondly, those skilled in the art also should know, reality described in this description Execute example and belong to preferred embodiment, necessary to involved action and the module not necessarily present invention.
As it is shown in figure 5, the structural representation of the mobile communication terminal of the embodiment of the present invention two offer.This The mobile communication terminal that embodiment two provides can realize the described method that above-described embodiment one provides.Specifically , the described mobile communication terminal of the present embodiment two offer, including:
First acquisition module 1, for obtaining the first address list;
Backup module 2, for backing up described first address list, generates backup information, described standby Part information includes associated person information and the associated person information pair of described first contact person in address list Mark ID answered;
Preserve module 3, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact In one address list, obtain the second address list;
Comparison correcting module 4, has identical in the second address list described in comparison and described backup information The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list The associated person information of described mark ID that is modified in described backup information of associated person information.
The technical scheme that the present embodiment provides is by preserving the harassing and wrecking address comprised in harassing and wrecking address base Before being saved in address list, address list is backed up, after harassing and wrecking address is saved in address list, base Current address list is checked, when examination there are differences, according to backup by the address list in backup The current address list of address list correction in the information that there are differences, it is to avoid because adding in address list Behind harassing and wrecking address, the information of some network address is by the problem being modified as other information of mistake, it is ensured that The accuracy of original information in address list.
Further, described comparison correcting module, specifically for:
Obtain contact person's letter in described second address list and described backup information with like-identified ID Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating Examination associated person information, the associated person information of the described mark ID got from described backup information is made For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will Associated person information to be checked described in described second address list is modified to described examination reference information.
Further, described mobile communication terminal may also include that
First processing module, for creating new contact person, described new contact in described first address list People is as described designated contact;Or specify in described first address list existing contact person as institute State designated contact.
Further, associated person information includes: label corresponding to the network address and the network address, And/or contact person's label;Accordingly,
Above-mentioned comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
Further, above-mentioned backup module can use following structure to realize.Concrete, described backup Module, including: creating unit, acquiring unit and memory element.Wherein, creating unit, it is used for creating Build backup array;Acquiring unit, is used for traveling through described first address list, and obtains described first communication The associated person information of contact person and mark ID corresponding to associated person information in record;Memory element, being used for will The described associated person information got and mark ID correspondence corresponding to described associated person information store described In backup array.
Further, above-mentioned mobile communication terminal, may also include that
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
Concrete, described acquisition module, it may include:
Download unit, downloads described harassing and wrecking address base by wired or wireless network from server device.
Further, described acquisition module, may also include that
Uploading unit, for uploading the positional information of present position to described network equipment, with Make described network equipment according to described positional information, determine that mobile communication terminal is currently located region, And for described mobile communication terminal provide described region corresponding harassing and wrecking address base download service.
Further, above-mentioned mobile communication terminal, may also include that
Second processing module, is used for when there being communications access, if the network address of communications access initiator For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground What location was corresponding harasses identification (RFID) tag and/or harasses the harassing and wrecking identification (RFID) tag of designated contact corresponding to address, And present described harassing and wrecking identification (RFID) tag.
Need exist for explanation: the mobile communication terminal that the present embodiment provides can realize above-described embodiment The one described method provided, concrete implementation process and realize principle and can be found in above-described embodiment one and retouch The related content stated, here is omitted.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has in certain embodiment The part being described in detail, may refer to the associated description of other embodiments.
It is understood that the correlated characteristic in said method and switch can mutually reference.It addition, " first ", " second " in above-described embodiment etc. are for distinguishing each embodiment, and do not represent each enforcement The quality of example.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned The system described, the specific works process of device and unit, it is referred in preceding method embodiment Corresponding process, does not repeats them here.
Provided herein algorithm and display not with any certain computer, virtual system or miscellaneous equipment Intrinsic relevant.Various general-purpose systems can also be used together with based on teaching in this.According to above Describe, construct the structure required by this kind of system and be apparent from.Additionally, the present invention is also not for Any certain programmed language.It is understood that, it is possible to use various programming languages realize described here The content of invention, and the description above done language-specific is to disclose the optimal real of the present invention Execute mode.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that Embodiments of the invention can be put into practice in the case of not having these details.In some instances, It is not shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand in each inventive aspect Individual or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention Sometimes it is grouped together in single embodiment, figure or descriptions thereof.But, should be by The method of the disclosure is construed to reflect an intention that i.e. the present invention for required protection requires that ratio is each The more feature of feature being expressly recited in claim.More precisely, as following right is wanted As asking book to be reflected, inventive aspect is all features less than single embodiment disclosed above. Therefore, it then follows claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, The most each claim itself is as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment Adaptively change and they are arranged in one or more equipment different from this embodiment. Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and In addition multiple submodule or subelement or sub-component can be put them into.Except such feature and/or Outside at least some in process or unit excludes each other, any combination can be used this explanation All features disclosed in book (including adjoint claim, summary and accompanying drawing) and the openest Any method or all processes of equipment or unit be combined.Unless expressly stated otherwise, originally Each feature disclosed in description (including adjoint claim, summary and accompanying drawing) can be by carrying Alternative features for identical, equivalent or similar purpose replaces.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include Some feature included in other embodiments rather than further feature, but the feature of different embodiment Combination mean to be within the scope of the present invention and formed different embodiments.Such as, under In the claims in face, embodiment required for protection one of arbitrarily can be in any combination Mode uses.
The all parts embodiment of the present invention can realize with hardware, or with at one or more The software module run on reason device realizes, or realizes with combinations thereof.Those skilled in the art Should be appreciated that and microprocessor or digital signal processor (DSP) can be used in practice to realize Some or all parts in the mobile communication terminal provided according to embodiments of the present invention some or Repertoire.The present invention be also implemented as the part for performing method as described herein or Whole equipment or device program (such as, computer program and computer program).So The program realizing the present invention can store on a computer-readable medium, or can have one or The form of the multiple signal of person.Such signal can be downloaded from internet website and obtain, or carrying There is provided on body signal, or provide with any other form.
The present invention will be described rather than limits the present invention to it should be noted above-described embodiment Make, and those skilled in the art can design without departing from the scope of the appended claims Alternative embodiment.In the claims, any reference marks that should not will be located between bracket is configured to Limitations on claims.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims Suddenly.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such element.The present invention And can come real by means of properly programmed computer by means of including the hardware of some different elements Existing.If in the unit claim listing equipment for drying, several in these devices can be logical Cross same hardware branch specifically to embody.Word first, second and third use do not indicate that Any order.Can be title by these word explanations.
The invention discloses the processing method of address list information in A1, a kind of mobile communication terminal, including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact, To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list Associated person information for the described mark ID in described backup information.
A2, method as described in A1, wherein, the second address list described in described comparison and described backup Information has the associated person information of like-identified ID, if there are differences, then by described second address list In the connection of described mark ID that is modified in described backup information of the associated person information of described mark ID It is people's information, including:
Obtain contact person's letter in described second address list and described backup information with like-identified ID Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating Examination associated person information, the associated person information of the described mark ID got from described backup information is made For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will Associated person information to be checked described in described second address list is modified to described examination reference information.
A3, method as described in A1, wherein, described mobile communication terminal is for being provided with the iOS that do not escapes from prison The mobile communication terminal of operating system.
A4, method as described in A1, also include:
Creating new contact person in described first address list, described new contact person specifies contact as described People;Or
Specify in described first address list existing contact person as described designated contact.
A5, method as according to any one of A1~A4, wherein, include in associated person information: net Label corresponding to network address and the network address, and/or contact person's label;Accordingly,
Second address list described in comparison and described backup information have contact person's letter of like-identified ID Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list For the associated person information of the described mark ID in described backup information, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
A6, method as described in A5, wherein, the described network address is IP telephone numbers, movement Telephone number, fixed telephone number, mailbox user name or SMS platform number.
A7, method as according to any one of A1~A4, wherein, described to described first address list Back up, generate backup information, including:
Create backup array;
Travel through described first address list, and obtain the associated person information of described first contact person in address list And mark ID that associated person information is corresponding;
By mark ID correspondence storage corresponding to the described associated person information got and described associated person information In described backup array.
A8, method as according to any one of A1~A4, also include:
Harass address base described in described acquisition for mobile terminal, described harassing and wrecking address base includes at least one Harassing and wrecking identification (RFID) tag corresponding to individual harassing and wrecking address and described harassing and wrecking address.
A9, method as according to any one of A1~A4, also include:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark Sign, and present described harassing and wrecking identification (RFID) tag.
The invention also discloses B10, a kind of mobile communication terminal, including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby Part information includes associated person information and the associated person information pair of described first contact person in address list Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list The associated person information of described mark ID that is modified in described backup information of associated person information.
B11, mobile communication terminal as described in B10, wherein, described comparison correcting module, specifically use In:
Obtain contact person's letter in described second address list and described backup information with like-identified ID Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating Examination associated person information, the associated person information of the described mark ID got from described backup information is made For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will Associated person information to be checked described in described second address list is modified to described examination reference information.
B12, mobile communication terminal as described in B10, also include:
First processing module, for creating new contact person, described new contact in described first address list People is as described designated contact;Or specify in described first address list existing contact person as institute State designated contact.
B13, mobile communication terminal as according to any one of B10~B12, wherein, associated person information In include: label corresponding to the network address and the network address, and/or contact person's label;Accordingly,
Described comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
B14, mobile communication terminal as according to any one of B10~B12, wherein, described backup mould Block, including:
Creating unit, is used for creating backup array;
Acquiring unit, is used for traveling through described first address list, and obtains contact in described first address list The associated person information of people and mark ID corresponding to associated person information;
Memory element, corresponding for described associated person information and the described associated person information that will get Mark ID correspondence stores in described backup array.
B15, mobile communication terminal as according to any one of B10~B12, also include:
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
B16, mobile communication terminal as according to any one of B10~B12, also include:
Second processing module, is used for when there being communications access, if the network address of communications access initiator For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground The harassing and wrecking identification (RFID) tag that location is corresponding, and present described harassing and wrecking identification (RFID) tag.

Claims (14)

1. the processing method of address list information in a mobile communication terminal, it is characterised in that including:
Mobile communication terminal obtains the first address list;
Described first address list is backed up, generates backup information, described backup information includes The associated person information of described first contact person in address list and mark ID corresponding to associated person information;
At least one harassing and wrecking address and corresponding the disturbing in described harassing and wrecking address that will comprise in harassing and wrecking address base Disturb identification (RFID) tag to be saved in described first address list as the newly-increased communication mode of designated contact, To the second address list;
Second address list described in comparison and described backup information have contact person's letter of like-identified ID Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list Associated person information for the described mark ID in described backup information;
Wherein, described described first address list is backed up, generate backup information, including:
Create backup array;
Travel through described first address list, and obtain the associated person information of described first contact person in address list And mark ID that associated person information is corresponding;
By mark ID correspondence storage corresponding to the described associated person information got and described associated person information In described backup array.
Method the most according to claim 1, it is characterised in that the second communication described in described comparison Record and described backup information have the associated person information of like-identified ID, if there are differences, then by institute That states that the associated person information of the described mark ID in the second address list is modified in described backup information is described The associated person information of mark ID, including:
Obtain contact person's letter in described second address list and described backup information with like-identified ID Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating Examination associated person information, the associated person information of the described mark ID got from described backup information is made For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will Associated person information to be checked described in described second address list is modified to described examination reference information.
Method the most according to claim 1, it is characterised in that described mobile communication terminal is peace Mobile communication terminal equipped with iOS operating system of not escaping from prison.
Method the most according to claim 1, it is characterised in that also include:
Creating new contact person in described first address list, described new contact person specifies contact as described People;Or
Specify in described first address list existing contact person as described designated contact.
5. according to the method according to any one of Claims 1 to 4, it is characterised in that associated person information In include: label corresponding to the network address and the network address, and/or contact person's label;Accordingly,
Second address list described in comparison and described backup information have contact person's letter of like-identified ID Breath, if there are differences, then by the associated person information correction of the described mark ID in described second address list For the associated person information of the described mark ID in described backup information, particularly as follows:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
Method the most according to claim 5, it is characterised in that the described network address is network electricity Words number, Mobile Directory Number, fixed telephone number, mailbox user name or SMS platform number.
7. according to the method according to any one of Claims 1 to 4, it is characterised in that also include:
Harass address base described in described acquisition for mobile terminal, described harassing and wrecking address base includes at least one Harassing and wrecking identification (RFID) tag corresponding to individual harassing and wrecking address and described harassing and wrecking address.
8. according to the method according to any one of Claims 1 to 4, it is characterised in that also include:
When there being communications access, if the network address of communications access initiator is in described harassing and wrecking address base Harassing and wrecking address, then obtain from described second address list described harassing and wrecking address corresponding harassing and wrecking mark mark Sign, and present described harassing and wrecking identification (RFID) tag.
9. a mobile communication terminal, it is characterised in that including:
First acquisition module, for obtaining the first address list;
Backup module, for backing up described first address list, generates backup information, described standby Part information includes associated person information and the associated person information pair of described first contact person in address list Mark ID answered;
Preserve module, for by harassing and wrecking address base in comprise at least one harassing and wrecking address and described in disturb Disturb harassing and wrecking identification (RFID) tag corresponding to address and be saved in described the as the newly-increased communication mode of designated contact In one address list, obtain the second address list;
Comparison correcting module, has identical in the second address list described in comparison and described backup information The associated person information of mark ID, if there are differences, then by the described mark ID in described second address list The associated person information of described mark ID that is modified in described backup information of associated person information;
Wherein, described backup module, including:
Creating unit, is used for creating backup array;
Acquiring unit, is used for traveling through described first address list, and obtains contact in described first address list The associated person information of people and mark ID corresponding to associated person information;
Memory element, corresponding for described associated person information and the described associated person information that will get Mark ID correspondence stores in described backup array.
Mobile communication terminal the most according to claim 9, it is characterised in that described comparison is repaiied Positive module, specifically for:
Obtain contact person's letter in described second address list and described backup information with like-identified ID Breath, wherein, the associated person information of the described mark ID got from described second address list is as treating Examination associated person information, the associated person information of the described mark ID got from described backup information is made For examination reference information;
Associated person information to be checked described in comparison and described examination reference information, if there are differences, then will Associated person information to be checked described in described second address list is modified to described examination reference information.
11. mobile communication terminals according to claim 9, it is characterised in that also include:
First processing module, for creating new contact person, described new contact in described first address list People is as described designated contact;Or specify in described first address list existing contact person as institute State designated contact.
12. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that Associated person information includes: label corresponding to the network address and the network address, and/or contact person's mark Sign;Accordingly,
Described comparison correcting module, specifically for:
Second address list described in comparison and described backup information have the associated person information of like-identified ID The label that the network address that comprises is corresponding, if there are differences, then by described in described second address list The label that described in the associated person information of mark ID, the network address is corresponding is modified in described backup information The label that described in the associated person information of described mark ID, the network address is corresponding;And/or
Second address list described in comparison and described backup information have the associated person information of like-identified ID The contact person's label comprised, if there are differences, then by the described mark ID's in described second address list The contact person of the described mark ID that the contact person's label in associated person information is modified in described backup information Contact person's label in information.
13. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that Also include:
Acquisition module, is used for obtaining described harassing and wrecking address base, includes at least in described harassing and wrecking address base Harassing and wrecking identification (RFID) tag corresponding to one harassing and wrecking address and described harassing and wrecking address.
14. according to the mobile communication terminal according to any one of claim 9~11, it is characterised in that Also include:
Second processing module, is used for when there being communications access, if the network address of communications access initiator For the harassing and wrecking address in described harassing and wrecking address base, then from described second address list, obtain described harassing and wrecking ground The harassing and wrecking identification (RFID) tag that location is corresponding, and present described harassing and wrecking identification (RFID) tag.
CN201410766112.8A 2014-12-11 2014-12-11 The processing method of address list information and mobile communication terminal in mobile communication terminal Active CN104468927B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410766112.8A CN104468927B (en) 2014-12-11 2014-12-11 The processing method of address list information and mobile communication terminal in mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410766112.8A CN104468927B (en) 2014-12-11 2014-12-11 The processing method of address list information and mobile communication terminal in mobile communication terminal

Publications (2)

Publication Number Publication Date
CN104468927A CN104468927A (en) 2015-03-25
CN104468927B true CN104468927B (en) 2016-10-19

Family

ID=52914270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410766112.8A Active CN104468927B (en) 2014-12-11 2014-12-11 The processing method of address list information and mobile communication terminal in mobile communication terminal

Country Status (1)

Country Link
CN (1) CN104468927B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110996252A (en) * 2019-12-11 2020-04-10 武汉微分享互动科技有限公司 Communication platform and method for providing business communication for partitioned mobile telecommunication clients

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867915A (en) * 2010-06-13 2010-10-20 优视科技有限公司 Address book data backup and recovery method based on mobile terminal and system
CN102722428A (en) * 2012-06-29 2012-10-10 北京小米科技有限责任公司 Address book backup and recovery method and address book backup and recovery device
CN103309906A (en) * 2012-03-16 2013-09-18 中国移动通信集团公司 Address book backup and recovery method and device
CN103916509A (en) * 2012-12-31 2014-07-09 北京新媒传信科技有限公司 Method and apparatus for restoring phone contacts
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867915A (en) * 2010-06-13 2010-10-20 优视科技有限公司 Address book data backup and recovery method based on mobile terminal and system
CN103309906A (en) * 2012-03-16 2013-09-18 中国移动通信集团公司 Address book backup and recovery method and device
CN102722428A (en) * 2012-06-29 2012-10-10 北京小米科技有限责任公司 Address book backup and recovery method and address book backup and recovery device
CN103916509A (en) * 2012-12-31 2014-07-09 北京新媒传信科技有限公司 Method and apparatus for restoring phone contacts
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system

Also Published As

Publication number Publication date
CN104468927A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
US8423060B2 (en) Mobile phone and method for processing short message
CN105701122A (en) Log collection method, apparatus and system
CN104135563A (en) A communication processing method and system
CN105100513B (en) Method for processing message of incoming call and device, incoming call service server
CN104243661A (en) Method, server and mobile terminal for determining types of incoming call numbers
CN106792653B (en) Communication number information processing method, device and system
WO2017032076A1 (en) Method and apparatus for creating circle of friends, and communications method and apparatus based on circles of friends
CN105491239B (en) The hold-up interception method and device of junk information
CN106792600A (en) A kind of information processing method, mobile terminal, netscape messaging server Netscape
CN104468927B (en) The processing method of address list information and mobile communication terminal in mobile communication terminal
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN104252541B (en) A kind of webpage information method for pushing, data server and terminal
CN106209584A (en) User profile processing method based on the Internet, client and server
CN105744525A (en) Method, device and system for mobile communication terminal to identify harassing communication
US20160165054A1 (en) Contextual contact substitution for mobile devices
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
US20130260716A1 (en) Phone Number Encapsulation Using Token Based Framework
CN105827780A (en) Caller identification method and caller identification device
CN105744035B (en) Mobile communication terminal carries out the method and mobile communication terminal that harassing and wrecking communication intercepts
CN104735643A (en) Information processing method and data server
US10728191B2 (en) Method for establishing communication within a closed network
US9456077B2 (en) Communication server, communication terminal, and method of communication
KR20140073073A (en) Method and system for phone number inquiry
CN105763708B (en) The processing method and mobile communication terminal of address book information in mobile communication terminal
CN109547317B (en) Method and device for establishing connection tunnel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220728

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.