CN111786874B - Caller identification method and device - Google Patents

Caller identification method and device Download PDF

Info

Publication number
CN111786874B
CN111786874B CN201910307490.2A CN201910307490A CN111786874B CN 111786874 B CN111786874 B CN 111786874B CN 201910307490 A CN201910307490 A CN 201910307490A CN 111786874 B CN111786874 B CN 111786874B
Authority
CN
China
Prior art keywords
contact information
incoming call
message
contact
information file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910307490.2A
Other languages
Chinese (zh)
Other versions
CN111786874A (en
Inventor
王凯斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201910307490.2A priority Critical patent/CN111786874B/en
Publication of CN111786874A publication Critical patent/CN111786874A/en
Application granted granted Critical
Publication of CN111786874B publication Critical patent/CN111786874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention discloses a method and a device for displaying a caller, and relates to the technical field of computers. One embodiment of the method comprises: acquiring pre-contact information matched with the user identification according to the user identification, and synchronizing the pre-contact information into a contact information file; generating a message corresponding to each telephone number according to each telephone number in the contact person information file; and consuming the message corresponding to the incoming call number according to the incoming call number, acquiring the contact information corresponding to the incoming call number, and displaying the contact information. The method and the device can solve the technical problem that the contact person information can be acquired only by networking the terminal or the contact person information in the terminal address list is too crowded.

Description

Caller identification method and device
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for displaying an incoming call.
Background
Enterprise Instant messaging, abbreviated as eim (enterprise Instant messaging), is a network communication tool service for enterprise terminal users, and users can perform real-time communication between two or more people through terminals equipped with Instant messaging. The communication content comprises characters, interfaces, voice, video, file interaction and the like. Therefore, the use of enterprise communication tools is more and more widespread, and when a mobile terminal receives an incoming call, the display is mainly performed in the following two ways:
the first method comprises the following steps: the mobile terminal receives an incoming call, calls an interface of an communication tool to transmit the telephone number if the address list does not have the contact person record of the related telephone number, returns the contact person information corresponding to the telephone number if the telephone number exists in the enterprise address list library, and displays the contact person information on a terminal screen.
And the second method comprises the following steps: the enterprise communication tool can automatically store the contact information under the preset rule into the address list of the terminal.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
the first method comprises the following steps: the terminal networking is needed to search whether the telephone number is in the enterprise address book library or not, and the communication tool interface is easily illegally utilized by other applications, so that the contact information is leaked.
And the second method comprises the following steps: the contact person information in the terminal address list is too crowded, which is not beneficial to user experience; and the contact information is stored in the terminal address book and is easy to steal on behalf of other applications for reading the address book authority.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for displaying an incoming call, so as to solve the technical problem that a terminal needs to be networked to acquire contact information or contact information in a terminal address list is too crowded.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a caller identification method including:
acquiring pre-contact information matched with the user identification according to the user identification, and synchronizing the pre-contact information into a contact information file;
generating a message corresponding to each telephone number according to each telephone number in the contact person information file;
and consuming the message corresponding to the incoming call number according to the incoming call number, acquiring the contact information corresponding to the incoming call number, and displaying the contact information.
Optionally, synchronizing the pre-contact information into a contact information file includes:
judging whether a contact person information file corresponding to the user identification exists or not;
if not, establishing a contact person information file, and writing the pre-contact person information into the newly established contact person information file;
if so, decrypting the contact person information file by using the user identification as a key, and synchronizing the pre-contact person information into the contact person information of the contact person information file.
Optionally, synchronizing the pre-contact information to the contact information of the contact information file includes:
judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier;
if so, covering the information corresponding to the telephone number in the contact information with the information corresponding to the telephone number in the pre-contact information;
if not, adding the information corresponding to the telephone number in the pre-contact information to the contact information.
Optionally, after generating a message corresponding to each phone number according to each phone number in the contact information file, the method further includes:
and encrypting the synchronized contact information file by using the user identification as a key.
Optionally, generating a message corresponding to each phone number according to each phone number in the contact information file, where the message includes:
for each phone number in the contact information file: generating a message corresponding to the telephone number according to the telephone number; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by using the telephone number.
Optionally, consuming, according to the incoming call number, a message corresponding to the incoming call number, to obtain contact information corresponding to the incoming call number, includes:
generating an incoming call message identification according to an incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number;
searching a target message with the same message subject as the incoming call message identification;
and decrypting the message body of the target message by using the incoming call number as a key to obtain the contact information corresponding to the incoming call number.
Optionally, decrypting the message body of the target message by using the incoming call number as a key includes:
copying the target message;
and decrypting the copied message body of the target message by using the incoming call number as a key.
Optionally, obtaining the pre-contact information matched with the user identifier according to the user identifier includes:
acquiring a user identifier of a current user;
and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule.
In addition, according to another aspect of the embodiments of the present invention, there is provided a caller id display device including:
the synchronization module is used for acquiring pre-contact information matched with the user identification according to the user identification and synchronizing the pre-contact information into a contact information file;
the message module is used for generating messages corresponding to all telephone numbers according to all telephone numbers in the contact person information file;
the display module is used for consuming the message corresponding to the incoming call number according to the incoming call number, obtaining the contact information corresponding to the incoming call number and displaying the contact information.
Optionally, synchronizing the pre-contact information into a contact information file includes:
judging whether a contact person information file corresponding to the user identification exists or not;
if not, a contact person information file is newly established, and the pre-contact person information is written into the newly established contact person information file;
if so, decrypting the contact information file by using the user identification as a key, and synchronizing the pre-contact information into the contact information of the contact information file.
Optionally, synchronizing the pre-contact information to the contact information of the contact information file includes:
judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier;
if yes, information corresponding to the telephone number in the pre-contact information is used for covering the information corresponding to the telephone number in the contact information;
and if not, newly adding the information corresponding to the telephone number in the pre-contact information into the contact information.
Optionally, the message module is further configured to:
and after generating the message corresponding to each telephone number according to each telephone number in the contact person information file, encrypting the synchronized contact person information file by using the user identification as a key.
Optionally, the message module is configured to:
for each phone number in the contact information file: generating a message corresponding to the telephone number according to the telephone number; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by using the telephone number.
Optionally, consuming, according to the incoming call number, a message corresponding to the incoming call number, to obtain contact information corresponding to the incoming call number, including:
generating an incoming call message identification according to an incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number;
searching a target message with the same message subject as the incoming call message identification;
and decrypting the message body of the target message by using the incoming call number as a key to obtain the contact information corresponding to the incoming call number.
Optionally, decrypting the message body of the target message by using the incoming call number as a key includes:
copying the target message;
and decrypting the copied message body of the target message by using the incoming call number as a key.
Optionally, obtaining, according to a user identifier, pre-contact information matched with the user identifier includes:
acquiring a user identifier of a current user;
and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any of the embodiments described above.
According to another aspect of the embodiments of the present invention, there is also provided a computer readable medium, on which a computer program is stored, the program, when executed by a processor, implementing the method according to any of the embodiments described above.
One embodiment of the above invention has the following advantages or benefits: because the technical means of synchronizing the pre-contact information into the contact information file, generating the information corresponding to each telephone number according to each telephone number in the contact information file and acquiring the contact information corresponding to the incoming call number according to the incoming call number consumption information are adopted, the technical problem that the contact information can be acquired only through terminal networking or the contact information in a terminal address list is too crowded is solved. The method and the system can acquire the contact information without networking, ensure the safety and the confidentiality of the contact information, avoid storing the contact information in the mobile phone address book, and avoid overcrowding the mobile phone address book. And the message is used to solve the difficult problems that networking is not needed and the contact information is not needed to be stored in the mobile phone address list, and the security of the contact information is further ensured by using the user identification or the telephone number as a secret key and in an encryption and decryption mode.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic view of a main flow of an incoming call display method according to an embodiment of the present invention;
fig. 2 is a schematic view of a main flow of a caller identification method according to a referential embodiment of the present invention;
fig. 3 is a schematic view of a main flow of a caller identification method according to another referential embodiment of the present invention;
FIG. 4 is a schematic diagram of the main modules of the caller identification device according to the embodiment of the present invention;
FIG. 5 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 6 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram of a main flow of an incoming call display method according to an embodiment of the present invention. As an embodiment of the present invention, as shown in fig. 1, the incoming call display method may include:
step 101, obtaining pre-contact information matched with a user identifier according to the user identifier, and synchronizing the pre-contact information into a contact information file.
When a user logs in the enterprise communication tool, a user identifier (such as an account name, an account ID, and other unique identifiers) needs to be input, so that the user identifier of the current user can be obtained. And then, sending a data request to the server, so as to acquire pre-contact information matched with the user identifier from an enterprise address book library of the server, and finally synchronizing the pre-contact information into a contact information file of the terminal.
Optionally, the obtaining of the pre-contact information matched with the user identifier according to the user identifier includes: acquiring a user identifier of a current user; and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule. The preset rule comprises at least one of contact frequency, a department or a group to which the preset rule belongs.
For example, other user identifiers whose contact frequency with the user identifier reaches a preset threshold within a preset historical time range are obtained, and other user identifiers under other condition rules (such as other accounts in the same department and the same chat group) are obtained, and contact information corresponding to the user identifiers is used as pre-contact information matched with the user identifier of the current user. Optionally, the contact information may include a name, a phone number, a work position, and the like.
After the terminal receives the pre-contact information returned by the server, the pre-contact information is synchronized into a contact information file of the terminal, so that a message can be generated according to the information in the contact information file in the subsequent steps.
And 102, generating a message corresponding to each telephone number according to each telephone number in the contact person information file.
Since the contact information in the contact information file is updated in step 101, a message may be generated based on the latest contact information. Specifically, a message corresponding to each phone number may be generated according to each phone number in the contact information file, so that the corresponding message may be consumed in the subsequent steps, and thus, the corresponding contact information may be obtained through analysis.
Optionally, step 102 comprises: for each phone number in the contact information file: generating a message corresponding to the telephone number according to the telephone number; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by using the telephone number.
For example, since a phone number in the contact information file is 15600888888, the message generated according to the phone number has a topic of '8888', and the corresponding message body is a ciphertext obtained by encrypting the contact information corresponding to the phone number by using the phone number. It should be noted that each telephone number generates a message to facilitate matching one by one when a call comes; and is not limited to the message topic being represented by the last four digits of the telephone number, the present invention is illustratively described in terms of the last four digits of the telephone number. To distinguish that the message is used by the service flow and avoid being used by other handset logic flows, a prefix, such as 'Ph _', may be added to the message topic, so that the message topic corresponding to the phone number 15600888888 is four digits after the 'Ph _ incoming call number', that is, 'Ph _ 8888'.
Optionally, before step 102, the method further comprises: and clearing the message corresponding to the backlogged telephone number in the mobile terminal. The messages are generated when the user logs in the enterprise communication tool last time, and are preferably cleared so as not to occupy the memory and influence the consumption of the messages.
Step 103, consuming the message corresponding to the incoming call number according to the incoming call number, obtaining the contact information corresponding to the incoming call number, and displaying the contact information.
When the mobile terminal detects an incoming call, the mobile terminal first reads the terminal address book database, and if the corresponding contact information is not matched, step 103 is executed. Since the message corresponding to each phone number is generated according to each phone number (including the incoming call number) in step 102, in step 103, the contact information corresponding to the incoming call number is obtained according to the message corresponding to the incoming call number generated in step 102, and the contact information is displayed on the screen of the terminal.
Optionally, consuming, according to the incoming call number, a message corresponding to the incoming call number, to obtain contact information corresponding to the incoming call number, including: generating an incoming call message identification according to an incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number; searching a target message with the same message subject as the incoming call message identification; and decrypting the message body of the target message by using the incoming call number as a key to obtain the contact information corresponding to the incoming call number.
Still taking the phone number in step 102 as an example, if the incoming call number is 15600888888, an incoming call message identifier 'Ph _8888' is generated according to the incoming call number, and whether a target message with a message topic of 'Ph _8888' exists in the currently backlogged messages is searched in the memory of the mobile terminal. If there is a target message with a message topic of ' Ph _8888', it represents that the incoming call number is likely to be the current user's job title contact (i.e., pre-contact). And then, the incoming call number is used as a key to decrypt the message body of the target message. If the decryption fails, the incoming number does not accord with the telephone number corresponding to the target message; if the decryption is successful, the incoming call number is the telephone number corresponding to the target message, and the plaintext obtained after decryption is obtained, namely the contact information corresponding to the incoming call number. And finally, displaying the acquired contact information on a screen of the mobile terminal.
According to the various embodiments, the technical means that the pre-contact information is synchronized into the contact information file, the information corresponding to each telephone number is generated according to each telephone number in the contact information file, and the contact information corresponding to the incoming call number is obtained according to the incoming call number consumption information can be achieved, so that the problem that the contact information can be obtained only through terminal networking or the contact information in a terminal address list is too crowded can be solved. The invention can acquire the contact information without networking, ensures the safety and the security of the contact information, does not store the contact way in the mobile phone address list and avoids the overcrowding of the mobile phone address list. And the message is used to solve the difficult problems that networking is not needed and the contact information is not needed to be stored in the mobile phone address list, and the security of the contact information is further ensured by using the user identification or the telephone number as a secret key and in an encryption and decryption mode.
Fig. 2 is a schematic diagram of a main flow of an incoming call display method according to a reference embodiment of the present invention, where the incoming call display method may specifically include:
step 201, obtaining the information of the pre-contact matched with the user identifier according to the user identifier.
When a user logs in an enterprise communication tool and inputs a user identifier, acquiring the user identifier of the current user; and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule. The preset rule comprises at least one of contact frequency, a department or a group to which the preset rule belongs. Specifically, other user identifiers whose number of contacts exceeds a preset threshold (for example, 5 times, 10 times, and the like) within a preset time period (the last month, the last three months, and the like) closest to the current time may be obtained, and contact information corresponding to these user identifiers is used as pre-contact information matched with the user identifier of the current user. And acquiring other user identifications belonging to the same department as the user identification of the current user, and taking the contact information corresponding to the user identifications as pre-contact information matched with the user identifications.
Step 202, judging whether a contact person information file corresponding to the user identification exists or not; if not, go to step 203; if yes, go to step 204.
It should be noted that, the contact information files corresponding to a plurality of users may be stored in the terminal, and whether the contact information file corresponding to the user identifier is stored in the terminal is determined according to the user identifier.
Step 203, creating a new contact information file, and writing the pre-contact information into the newly created contact information file.
If the terminal does not have the contact information file corresponding to the user identifier, a new contact information file is created in the terminal, and the pre-contact information obtained in the step 201 is written into the newly created contact information file.
And 204, decrypting the contact person information file by using the user identification as a key, and synchronizing the pre-contact person information into the contact person information of the contact person information file.
If the contact person information file corresponding to the user identifier exists in the terminal, the user identifier is firstly used as a key to decrypt the contact person information file, and then the pre-contact person information obtained in the step 201 is synchronized into the contact person information file.
Optionally, synchronizing the pre-contact information to the contact information of the contact information file includes: judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier; if so, covering the information corresponding to the telephone number in the contact information with the information corresponding to the telephone number in the pre-contact information; if not, adding the information corresponding to the telephone number in the pre-contact information to the contact information.
Step 205, generating a message corresponding to each telephone number according to each telephone number in the contact information file.
Since the contact information in the contact information file is updated in steps 203 and 204, a message may be generated based on the latest contact information. Specifically, a message corresponding to each phone number may be generated according to each phone number in the contact information file, so that the corresponding message may be consumed in the subsequent steps, and thus, the corresponding contact information may be obtained through analysis.
Optionally, step 205 comprises: for each phone number in the contact information file: generating a message corresponding to the telephone number according to the telephone number; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by using the telephone number. For example, the message topic is 'five digits after P _ caller id number', or 'five digits after Ph _ caller id number', the message topic is 'four digits after Phone _ caller id number', and the like, which is not limited in this embodiment of the present invention.
And step 206, encrypting the synchronized contact information file by using the user identifier as a key.
In the step, the user identification is used as a key to encrypt the updated contact information file, so that the contact information file is prevented from being stolen and read by other applications, and the safety of the contact information is ensured.
Step 207, according to the message corresponding to the incoming call number consumed by the incoming call number, obtaining the contact information corresponding to the incoming call number, and displaying the contact information.
When the mobile terminal detects an incoming call, the mobile terminal first reads the terminal address book database, and if no corresponding contact information is matched, step 207 is executed. In step 207, according to the message generated in step 205, the contact information corresponding to the incoming call number is obtained and displayed on the screen of the terminal.
Optionally, consuming, according to the incoming call number, a message corresponding to the incoming call number, to obtain contact information corresponding to the incoming call number, including: generating an incoming call message identification according to an incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number; searching a target message with the same message subject as the incoming call message identification; and decrypting the message body of the target message by using the incoming call number as a key to obtain the contact information corresponding to the incoming call number. For example, the incoming call message identifier is 'five digits after P _ incoming call number', or 'five digits after Ph _ incoming call number', the message topic is 'four digits after Phone _ incoming call number', and the like, which is not limited in this embodiment of the present invention. But the incoming message identification should be represented in the same way as the message topic in step 205 in order to facilitate the search and consumption of the corresponding message.
If the corresponding message is found through the incoming call message identification, the incoming call number is possibly the current user's place contact. And then, the incoming call number is used as a key to decrypt the message body of the target message. If the decryption fails, the incoming number does not accord with the telephone number corresponding to the target message; if the decryption is successful, the incoming call number is the telephone number corresponding to the target message, and the clear text obtained after decryption, namely the contact information corresponding to the incoming call number, is obtained. And finally, displaying the acquired contact information on a screen of the mobile terminal.
In addition, in one embodiment of the present invention, the details of the implementation of the incoming call display method are described in detail above, and therefore, the repeated description is not repeated here.
Fig. 3 is a schematic diagram of a main flow of a caller id display method according to a reference embodiment of the present invention, where the caller id display method may specifically include:
step 301, obtaining pre-contact information matched with the user identifier according to the user identifier.
Step 302, judging whether a contact person information file corresponding to the user identification exists or not; if not, go to step 303; if so, go to step 304.
Step 303, creating a new contact information file, and writing the pre-contact information into the newly created contact information file.
And 304, decrypting the contact information file by using the user identification as a key, and synchronizing the pre-contact information into the contact information of the contact information file.
And 305, generating a message corresponding to each telephone number according to each telephone number in the contact person information file.
And step 306, encrypting the synchronized contact information file by using the user identifier as a key.
And 307, clearing messages corresponding to the overstocked telephone numbers in the mobile terminal. The messages corresponding to these telephone numbers are messages generated the last time the user logs in the enterprise communication tool, and therefore need to be removed.
Step 308, generating an incoming message identifier according to the incoming number, wherein the incoming message identifier comprises a plurality of continuous digits of the incoming number.
Step 309, searching for the target message with the same message subject as the incoming call message identifier.
And 310, copying the target message, and decrypting the copied message body of the target message by using the incoming call number as a key.
In step 310, the matched message is copied first, and then the copied message is consumed, while the original message is still accumulated in the terminal, so that the corresponding message can still be searched through the message topic when the next incoming call comes.
In addition, in one embodiment of the present invention, the detailed implementation of the incoming call display method is described in detail above, and therefore, the repeated content is not described herein.
Fig. 4 is a schematic diagram of main modules of a caller id display apparatus according to an embodiment of the present invention, and as shown in fig. 4, the caller id display apparatus 400 includes a synchronization module 401, a message module 402, and a display module 403. The synchronization module 401 is configured to obtain pre-contact information matched with a user identifier according to the user identifier, and synchronize the pre-contact information into a contact information file; the message module 402 is configured to generate a message corresponding to each phone number according to each phone number in the contact information file; the display module 403 is configured to consume a message corresponding to an incoming call number according to the incoming call number, obtain contact information corresponding to the incoming call number, and display the contact information.
Optionally, synchronizing the pre-contact information into a contact information file includes:
judging whether a contact person information file corresponding to the user identification exists or not;
if not, establishing a contact person information file, and writing the pre-contact person information into the newly established contact person information file;
if so, decrypting the contact information file by using the user identification as a key, and synchronizing the pre-contact information into the contact information of the contact information file.
Optionally, synchronizing the pre-contact information to the contact information of the contact information file includes:
judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier;
if yes, information corresponding to the telephone number in the pre-contact information is used for covering the information corresponding to the telephone number in the contact information;
if not, adding the information corresponding to the telephone number in the pre-contact information to the contact information.
Optionally, the message module 402 is further configured to:
and after generating the message corresponding to each telephone number according to each telephone number in the contact person information file, encrypting the synchronized contact person information file by using the user identification as a key.
Optionally, the message module 402 is configured to:
for each phone number in the contact information file: generating a message corresponding to the telephone number according to the telephone number; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by using the telephone number.
Optionally, consuming, according to the incoming call number, a message corresponding to the incoming call number, to obtain contact information corresponding to the incoming call number, including:
generating an incoming call message identification according to an incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number;
searching a target message with the same message subject as the incoming call message identification;
and decrypting the message body of the target message by using the incoming call number as a key to obtain the contact information corresponding to the incoming call number.
Optionally, decrypting the message body of the target message by using the incoming call number as a key includes:
copying the target message;
and decrypting the copied message body of the target message by using the incoming call number as a key.
Optionally, obtaining the pre-contact information matched with the user identifier according to the user identifier includes:
acquiring a user identifier of a current user;
and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule.
According to the various embodiments, the technical means that the pre-contact information is synchronized into the contact information file, the information corresponding to each telephone number is generated according to each telephone number in the contact information file, and the contact information corresponding to the incoming call number is obtained according to the incoming call number consumption information can be achieved, so that the problem that the contact information can be obtained only through terminal networking or the contact information in a terminal address list is too crowded can be solved. The method and the system can acquire the contact information without networking, ensure the safety and the confidentiality of the contact information, avoid storing the contact information in the mobile phone address book, and avoid overcrowding the mobile phone address book. And the message is used to solve the difficult problems of no networking and no need of storing the contact information in the mobile phone address list, and the user identification or the telephone number is used as a key to further ensure the safety of the contact information in an encryption and decryption mode.
It should be noted that, the detailed implementation of the caller identification apparatus of the present invention has been described in detail in the above caller identification method, and therefore, the repeated description is not repeated here.
Fig. 5 illustrates an exemplary system architecture 500 of a caller id display method or apparatus to which embodiments of the present invention may be applied.
As shown in fig. 5, the system architecture 500 may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 is the medium used to provide communication links between terminal devices 501, 502, 503 and the server 505. Network 504 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 501, 502, 503 to interact with a server 504 over a network 504 to receive or send messages, etc. The terminal devices 501, 502, 503 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 501, 502, 503 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 505 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 501, 502, 503.
It should be noted that the incoming call display method provided by the embodiment of the present invention is generally executed on the terminal devices 501, 502, and 503, and accordingly, the incoming call display apparatus is generally disposed on the terminal devices 501, 502, and 503.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 6, a block diagram of a computer system 600 suitable for use with a terminal device implementing an embodiment of the invention is shown. The terminal device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. A driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that the computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 601.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present invention, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a synchronization module, a message module, and a display module, where the names of the modules do not in some cases constitute a limitation on the modules themselves.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: acquiring pre-contact information matched with the user identification according to the user identification, and synchronizing the pre-contact information into a contact information file; generating a message corresponding to each telephone number according to each telephone number in the contact person information file; and consuming the message corresponding to the incoming call number according to the incoming call number, acquiring the contact information corresponding to the incoming call number, and displaying the contact information.
According to the technical scheme of the embodiment of the invention, because the technical means that the pre-contact information is synchronized into the contact information file, the information corresponding to each telephone number is generated according to each telephone number in the contact information file, and the contact information corresponding to the incoming telephone number is obtained according to the incoming telephone number consumption information is adopted, the technical problem that the contact information can be obtained only by terminal networking or the contact information in the terminal address list is too crowded is solved. The invention can acquire the contact information without networking, ensures the safety and the security of the contact information, does not store the contact way in the mobile phone address list and avoids the overcrowding of the mobile phone address list. And the message is used to solve the difficult problems that networking is not needed and the contact information is not needed to be stored in the mobile phone address list, and the security of the contact information is further ensured by using the user identification or the telephone number as a secret key and in an encryption and decryption mode.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may occur depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (18)

1. A method for displaying an incoming call, comprising:
acquiring pre-contact information matched with the user identification from a server according to the user identification, and synchronizing the pre-contact information into a contact information file;
generating a message corresponding to each telephone number according to each telephone number in the contact person information file; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by adopting the telephone number or the user identification;
when an incoming call is detected, if the contact person information corresponding to the incoming call number is not matched in a terminal address book database, the contact person information corresponding to the incoming call number is obtained from the contact person information file according to the message corresponding to the incoming call number consumed by the incoming call number, and the contact person information is displayed;
wherein consuming the message corresponding to the incoming call number according to the incoming call number comprises: generating an incoming call message identification according to the incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number; and searching a target message with the same message theme as the incoming call message identification.
2. The method of claim 1, wherein synchronizing the pre-contact information into a contact information file comprises:
judging whether a contact person information file corresponding to the user identification exists or not;
if not, establishing a contact person information file, and writing the pre-contact person information into the newly established contact person information file;
if so, decrypting the contact person information file by using the user identification as a key, and synchronizing the pre-contact person information into the contact person information of the contact person information file.
3. The method of claim 2, wherein synchronizing the pre-contact information into the contact information of the contact information file comprises:
judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier;
if so, covering the information corresponding to the telephone number in the contact information with the information corresponding to the telephone number in the pre-contact information;
and if not, newly adding the information corresponding to the telephone number in the pre-contact information into the contact information.
4. The method of claim 1, after generating the message corresponding to each phone number according to each phone number in the contact information file, further comprising:
and encrypting the synchronized contact information file by using the user identification as a key.
5. The method of claim 1, wherein generating a message corresponding to each phone number according to each phone number in the contact information file comprises:
for each phone number in the contact information file: and generating a message corresponding to the telephone number according to the telephone number.
6. The method of claim 5, wherein obtaining contact information corresponding to the incoming call number from the contact information file comprises:
and decrypting the message body of the target message by using the incoming call number as a key, and acquiring the contact information corresponding to the incoming call number from the contact information file.
7. The method of claim 6, wherein decrypting the message body of the target message using the incoming call number as a key comprises:
copying the target message;
and decrypting the copied message body of the target message by using the incoming call number as a key.
8. The method of claim 1, wherein obtaining pre-contact information matching the user identifier according to the user identifier comprises:
acquiring a user identifier of a current user;
and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule.
9. An incoming call display device, comprising:
the synchronization module is used for acquiring pre-contact information matched with the user identification from a server according to the user identification and synchronizing the pre-contact information into a contact information file;
the message module is used for generating messages corresponding to all the telephone numbers according to all the telephone numbers in the contact person information file; the message body of the message comprises a ciphertext obtained by encrypting the contact information corresponding to the telephone number by adopting the telephone number or the user identification;
the display module is used for acquiring the contact information corresponding to the incoming call number from the contact information file according to the message corresponding to the incoming call number consumed by the incoming call number if the contact information corresponding to the incoming call number is not matched in a terminal address book database when the incoming call is detected, and displaying the contact information;
wherein consuming the message corresponding to the incoming call number according to the incoming call number comprises: generating an incoming call message identification according to the incoming call number, wherein the incoming call message identification comprises a plurality of continuous digits of the incoming call number; and searching a target message with the same message subject as the incoming call message identification.
10. The apparatus of claim 9, wherein synchronizing the pre-contact information into a contact information file comprises:
judging whether a contact person information file corresponding to the user identification exists or not;
if not, establishing a contact person information file, and writing the pre-contact person information into the newly established contact person information file;
if so, decrypting the contact information file by using the user identification as a key, and synchronizing the pre-contact information into the contact information of the contact information file.
11. The apparatus of claim 10, wherein synchronizing the pre-contact information into the contact information of the contact information file comprises:
judging whether the telephone number exists in the contact information of the contact information file or not by taking the telephone number in the pre-contact information as a unique identifier;
if so, covering the information corresponding to the telephone number in the contact information with the information corresponding to the telephone number in the pre-contact information;
and if not, newly adding the information corresponding to the telephone number in the pre-contact information into the contact information.
12. The apparatus of claim 9, wherein the message module is further configured to:
and after generating messages corresponding to all telephone numbers according to all telephone numbers in the contact person information file, encrypting the synchronized contact person information file by using the user identification as a key.
13. The apparatus of claim 9, wherein the message module is configured to:
for each phone number in the contact information file: and generating a message corresponding to the telephone number according to the telephone number.
14. The apparatus of claim 13, wherein obtaining contact information corresponding to the incoming call number from the contact information file comprises:
and decrypting the message body of the target message by using the incoming call number as a key, and acquiring the contact information corresponding to the incoming call number from the contact information file.
15. The apparatus of claim 14, wherein decrypting the message body of the target message using the incoming call number as a key comprises:
copying the target message;
and decrypting the copied message body of the target message by using the incoming call number as a key.
16. The apparatus of claim 9, wherein obtaining the pre-contact information matching the user identifier according to the user identifier comprises:
acquiring a user identifier of a current user;
and acquiring the information of the pre-contact matched with the user identification from a server according to a preset rule.
17. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
18. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN201910307490.2A 2019-04-17 2019-04-17 Caller identification method and device Active CN111786874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910307490.2A CN111786874B (en) 2019-04-17 2019-04-17 Caller identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910307490.2A CN111786874B (en) 2019-04-17 2019-04-17 Caller identification method and device

Publications (2)

Publication Number Publication Date
CN111786874A CN111786874A (en) 2020-10-16
CN111786874B true CN111786874B (en) 2022-09-06

Family

ID=72755447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910307490.2A Active CN111786874B (en) 2019-04-17 2019-04-17 Caller identification method and device

Country Status (1)

Country Link
CN (1) CN111786874B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140012871A (en) * 2012-07-23 2014-02-04 주식회사 인프라웨어 Method of providing originating information
CN104994009A (en) * 2015-07-14 2015-10-21 广州遇见网络科技有限公司 Friend message shielding method and device based on address list
CN105162936A (en) * 2015-08-04 2015-12-16 广东欧珀移动通信有限公司 Unfamiliar call prompt method and user terminal
CN105376720A (en) * 2015-09-30 2016-03-02 小米科技有限责任公司 A call processing method, a server, a terminal and a call processing system
CN107332963A (en) * 2017-06-26 2017-11-07 维沃移动通信有限公司 A kind of number method to set up and terminal
CN107566629A (en) * 2017-08-28 2018-01-09 深圳市金立通信设备有限公司 A kind of method of display information, terminal and computer-readable medium
CN107666395A (en) * 2016-07-28 2018-02-06 中兴通讯股份有限公司 One population file management method, user terminal, group chat system
CN108540650A (en) * 2018-03-13 2018-09-14 维沃移动通信有限公司 The display methods and device and mobile terminal of incoming number

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140012871A (en) * 2012-07-23 2014-02-04 주식회사 인프라웨어 Method of providing originating information
CN104994009A (en) * 2015-07-14 2015-10-21 广州遇见网络科技有限公司 Friend message shielding method and device based on address list
CN105162936A (en) * 2015-08-04 2015-12-16 广东欧珀移动通信有限公司 Unfamiliar call prompt method and user terminal
CN105376720A (en) * 2015-09-30 2016-03-02 小米科技有限责任公司 A call processing method, a server, a terminal and a call processing system
CN107666395A (en) * 2016-07-28 2018-02-06 中兴通讯股份有限公司 One population file management method, user terminal, group chat system
CN107332963A (en) * 2017-06-26 2017-11-07 维沃移动通信有限公司 A kind of number method to set up and terminal
CN107566629A (en) * 2017-08-28 2018-01-09 深圳市金立通信设备有限公司 A kind of method of display information, terminal and computer-readable medium
CN108540650A (en) * 2018-03-13 2018-09-14 维沃移动通信有限公司 The display methods and device and mobile terminal of incoming number

Also Published As

Publication number Publication date
CN111786874A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN110266480B (en) Data transmission method, device and storage medium
CN112287372B (en) Method and apparatus for protecting clipboard privacy
WO2013184578A1 (en) Method and system for automatic generation of context-aware cover message
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN112437044B (en) Instant messaging method and device
JP2020526991A (en) Techniques for multi-agent messaging
CN113536327A (en) Data processing method, device and system
CN111339206B (en) Block chain-based data sharing method and device
CN114239072B (en) Block chain node management method and block chain network
CN111416788A (en) Method and device for preventing transmitted data from being tampered
CN107707528B (en) Method and device for isolating user information
WO2024060630A1 (en) Data transmission management method, and data processing method and apparatus
CN111786874B (en) Caller identification method and device
CN111767550A (en) Data storage method and device
CN112637230B (en) Instant messaging method and system
CN113761566A (en) Data processing method and device
CN112565156B (en) Information registration method, device and system
CN113992345A (en) Method and device for encrypting and decrypting webpage sensitive data, electronic equipment and storage medium
CN110166226B (en) Method and device for generating secret key
CN113132115B (en) Certificate switching method, device and system
CN114727238B (en) Message transmission method, message transmission device, medium and equipment
CN113420331B (en) Method and device for managing file downloading permission
CN116112172B (en) Android client gRPC interface security verification method and device
CN114297701A (en) User data processing method and device
US11445057B2 (en) Private contact sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant