CN113256254A - Mail classification method and mail classification device - Google Patents

Mail classification method and mail classification device Download PDF

Info

Publication number
CN113256254A
CN113256254A CN202110579677.5A CN202110579677A CN113256254A CN 113256254 A CN113256254 A CN 113256254A CN 202110579677 A CN202110579677 A CN 202110579677A CN 113256254 A CN113256254 A CN 113256254A
Authority
CN
China
Prior art keywords
mail
mails
sender
blacklist
mailbox address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110579677.5A
Other languages
Chinese (zh)
Inventor
宋亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN202110579677.5A priority Critical patent/CN113256254A/en
Publication of CN113256254A publication Critical patent/CN113256254A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a mail classification method and mail classification equipment, which are used for solving the problem that junk mails bring inconvenience to users. In the embodiment of the application, the information of the mail is recorded aiming at the received mail; determining and storing the score of the mail according to the score corresponding to the operation type; determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period; and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.

Description

Mail classification method and mail classification device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a mail classification method and a mail classification device.
Background
With the development of the technology, more and more users communicate by using mails, a mobile phone mailbox user may receive many mails every day, but some mails are not concerned by the user, the user can directly delete or transfer the mails to a trash box, and the mails of the type and the mails concerned by the user are all in the same mailbox, so that the user is influenced to view the concerned mails, and excessive flow is wasted when the contents of the mails of the type are loaded, thereby bringing great inconvenience to the user.
Disclosure of Invention
The application aims to provide a mail classification method and mail classification equipment, which are used for solving the problem that junk mails bring inconvenience to users.
In a first aspect, an embodiment of the present application provides a mail classification method, including:
recording the information of the received mail; the information comprises a sender mailbox address and an operation type of the mail;
determining and storing the score of the mail according to the score corresponding to the operation type;
determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period;
and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, a first mail folder and a second mail folder are created in the inbox, the first mail folder is used for storing mails sent by a sender mailbox address which is not included in the blacklist, and the operation type includes at least one of the following types: viewing the mail, deleting the mail, and restoring the mail from a garbage box to the mail in the first mail folder, wherein:
said viewing said mail for increasing a positive score value;
the deleting the mail is used for increasing a negative score value;
the restoring of the mail from the trash box to the mail in the first mail folder is used to increase the positive score value.
In some possible embodiments, the method further comprises:
and for the received mails, if the received mails contain a plurality of operation types, sequentially accumulating the scores of the mails according to the execution time sequence of the operation types and storing the scores.
In some possible embodiments, after said adding said sender mailbox address to a blacklist, said method further comprises:
and transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder.
In some possible embodiments, after transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder, the method further includes:
all mails in the second mail folder are deleted in response to one-key cleaning operation of a user; alternatively, the first and second electrodes may be,
and transferring the mails in the second mail folder to the first mail folder in response to the recovery operation of the user.
In some possible embodiments, if the sum of the scores of the mails and the number of the mails meet a preset condition, adding the sender to a sender blacklist, including:
and if the number of the mails is greater than a first preset value and the sum of the scores of the mails is less than or equal to a second preset value, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, after said adding said sender mailbox address to a blacklist, said method further comprises:
viewing a sender mailbox address in the blacklist in response to a viewing operation of a user; alternatively, the first and second electrodes may be,
removing the sender mailbox address in the blacklist from the blacklist in response to a removal operation of a user; alternatively, the first and second electrodes may be,
setting a special prompt tone for a sender mailbox address in the blacklist in response to a first setting operation of a user; alternatively, the first and second electrodes may be,
and responding to a second setting operation of the user to set a format of the received mail for the sender mailbox address in the blacklist.
In some possible embodiments, the information of the mail further includes at least one of: the serial number of the mail and the time of receiving the mail;
the sequence number of the mail is used for identifying the sequence of the mail in an inbox;
and the time of receiving the mail is used for identifying the time information of receiving the mail.
In some possible embodiments, the order of the mail in the inbox includes:
if the mailbox address of the sender of the received mail is in the blacklist list, the sequence number of the mail is the sequence in a second mail folder;
and if the mailbox address of the sender of the received mail is not in the blacklist list, the sequence number of the mail is the sequence in the first mail folder.
Second aspect the present application also provides a mail sorting apparatus, the apparatus comprising: a first memory, a second memory and a controller;
the first memory for storing a computer program executable by the controller;
the second memory is used for buffering input signals;
the controller is coupled to the first memory and the second memory and configured to:
recording the information of the received mail; the information comprises a sender mailbox address and an operation type of the mail;
determining and storing the score of the mail according to the score corresponding to the operation type;
determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period;
and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, a first mail folder and a second mail folder are created in the inbox, the first mail folder is used for storing mails sent by a sender mailbox address which is not included in the blacklist, and the operation type includes at least one of the following types: viewing the mail, deleting the mail, and restoring the mail from a garbage box to the mail in the first mail folder, wherein:
said viewing said mail for increasing a positive score value;
the deleting the mail is used for increasing a negative score value;
the restoring of the mail from the trash box to the mail in the first mail folder is used to increase the positive score value.
In some possible embodiments, the controller is further configured to:
and for the received mails, if the received mails contain a plurality of operation types, sequentially accumulating the scores of the mails according to the execution time sequence of the operation types and storing the scores.
In some possible embodiments, after the controller performs the adding of the sender mailbox address to a blacklist, the controller is further configured to:
and transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder.
In some possible embodiments, after the controller performs transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder, the controller is further configured to:
all mails in the second mail folder are deleted in response to one-key cleaning operation of a user; alternatively, the first and second electrodes may be,
and transferring the mails in the second mail folder to the first mail folder in response to the recovery operation of the user.
In some possible embodiments, if the sum of the scores of the mails and the number of the mails meet a preset condition, adding the sender to a sender blacklist, including:
and if the number of the mails is greater than a first preset value and the sum of the scores of the mails is less than or equal to a second preset value, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, after the controller performs the adding of the sender mailbox address to a blacklist, the controller is further configured to:
viewing a sender mailbox address in the blacklist in response to a viewing operation of a user; alternatively, the first and second electrodes may be,
removing the sender mailbox address in the blacklist from the blacklist in response to a removal operation of a user; alternatively, the first and second electrodes may be,
setting a special prompt tone for a sender mailbox address in the blacklist in response to a first setting operation of a user; alternatively, the first and second electrodes may be,
and responding to a second setting operation of the user to set a format of the received mail for the sender mailbox address in the blacklist.
In some possible embodiments, the information of the mail further includes at least one of: the serial number of the mail and the time of receiving the mail;
the sequence number of the mail is used for identifying the sequence of the mail in an inbox;
and the time of receiving the mail is used for identifying the time information of receiving the mail.
In some possible embodiments, the order of the mail in the inbox includes:
if the mailbox address of the sender of the received mail is in the blacklist list, the sequence number of the mail is the sequence in a second mail folder;
and if the mailbox address of the sender of the received mail is not in the blacklist list, the sequence number of the mail is the sequence in the first mail folder.
In the embodiment of the application, the mails are classified by setting the blacklist, so that the flow for loading the junk mails is saved, the time of a user is greatly saved, and the user experience is improved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a software architecture of a terminal according to an embodiment of the present application;
fig. 3 is an application scenario diagram of the mail classification method according to the embodiment of the present application;
FIG. 4 is a flowchart illustrating an overall mail classification method according to an embodiment of the present disclosure;
FIG. 5A is a schematic diagram of a mail direct deletion method according to an embodiment of the present application;
FIG. 5B is a diagram illustrating a mail sorting method according to an embodiment of the present application for placing mail into a trash;
fig. 5C is a schematic diagram of a mail in a second mail folder deleted by one key in the mail classification method according to the embodiment of the application;
FIG. 5D is a schematic diagram of a mail sorting method according to an embodiment of the present application for moving a mail in a second mail folder into a first mail folder;
fig. 6 is a schematic diagram of a mail sorting apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
It is noted that the terms "first," "second," and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
First, fig. 1 shows a schematic structural diagram of a terminal 100.
The following describes an embodiment specifically by taking the terminal 100 as an example. It should be understood that the terminal 100 shown in fig. 1 is merely an example, and that the terminal 100 may have more or fewer components than shown in fig. 1, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
A block diagram of a hardware configuration of the terminal 100 according to an exemplary embodiment is exemplarily shown in fig. 1. As shown in fig. 1, the terminal 100 includes: a Radio Frequency (RF) circuit 110, a memory 120, a display unit 130, a camera 140, a sensor 150, an audio circuit 160, a Wireless Fidelity (Wi-Fi) module 170, a processor 180, a bluetooth module 181, and a power supply 190.
The RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink data of a base station and then send the downlink data to the processor 180 for processing; the uplink data may be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 120 may be used to store software programs and data. The processor 180 performs various functions of the terminal 100 and data processing by executing software programs or data stored in the memory 120. The memory 120 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The memory 120 stores an operating system that enables the terminal 100 to operate. The memory 120 may store an operating system and various application programs, and may also store program codes for performing the methods described in the embodiments of the present application.
The display unit 130 may be used to receive input numeric or character information and generate signal input related to user settings and function control of the terminal 100, and particularly, the display unit 130 may include a touch screen 131 disposed on the front surface of the terminal 100 and may collect touch operations of a user thereon or nearby, such as clicking a button, dragging a scroll box, and the like.
The display unit 130 may also be used to display a Graphical User Interface (GUI) of information input by or provided to the user and various menus of the terminal 100. Specifically, the display unit 130 may include a display screen 132 disposed on the front surface of the terminal 100. The display screen 132 may be configured in the form of a liquid crystal display, a light emitting diode, or the like. The display unit 130 may be used to display a mailing list interface described herein.
The touch screen 131 may cover the display screen 132, or the touch screen 131 and the display screen 132 may be integrated to implement the input and output functions of the terminal 100, and after the integration, the touch screen may be referred to as a touch display screen for short. In the present application, the display unit 130 may display the application programs and the corresponding operation steps.
The camera 140 may be used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing elements convert the light signals into electrical signals which are then passed to the processor 180 for conversion into digital image signals.
The terminal 100 may further comprise at least one sensor 150, such as an acceleration sensor 151, a distance sensor 152, a fingerprint sensor 153, a temperature sensor 154. The terminal 100 may also be configured with other sensors such as a gyroscope, barometer, hygrometer, thermometer, infrared sensor, light sensor, motion sensor, etc.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and terminal 100. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161. The terminal 100 may also be provided with a volume button for adjusting the volume of the sound signal. On the other hand, the microphone 162 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 160, and outputs the audio data to the RF circuit 110 to be transmitted to, for example, another terminal or outputs the audio data to the memory 120 for further processing.
Wi-Fi short-range wireless transmission technology the terminal 100 may help a user to send and receive e-mails, browse web pages, access streaming media, etc. through the Wi-Fi module 170, which provides wireless broadband internet access to the user.
The processor 180 is a control center of the terminal 100, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal 100 and processes data by running or executing software programs stored in the memory 120 and calling data stored in the memory 120. In some embodiments, processor 180 may include one or more processing units; the processor 180 may also integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a baseband processor, which mainly handles wireless communications. It will be appreciated that the baseband processor described above may not be integrated into the processor 180. In the present application, the processor 180 may run an operating system, an application program, a user interface display, and a touch response, and the processing method described in the embodiments of the present application. Further, the processor 180 is coupled with the display unit 130.
And the bluetooth module 181 is configured to perform information interaction with other bluetooth devices having a bluetooth module through a bluetooth protocol. For example, the terminal 100 may establish a bluetooth connection with a wearable electronic device (e.g., a smart watch) having a bluetooth module via the bluetooth module 181, so as to perform data interaction.
The terminal 100 also includes a power supply 190 (e.g., a battery) to power the various components. The power supply may be logically connected to the processor 180 through a power management system to manage charging, discharging, power consumption, etc. through the power management system. The terminal 100 may also be configured with power buttons for powering the terminal on and off, and locking the screen.
Fig. 2 is a block diagram of a software configuration of the terminal 100 according to the embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system may be divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer, from top to bottom, respectively.
The application layer may include a series of application packages.
As shown in fig. 2, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 2, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, dialed and answered calls, browsing history and bookmarks, phone books, short messages, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying a picture.
The phone manager is used to provide a communication function of the terminal 100. Such as management of call status (including on, off, etc.).
The resource manager provides various resources, such as localized strings, icons, pictures, layout files, video files, etc., to the application.
The notification manager allows the application to display notification information (e.g., message digest of short message, message content) in the status bar, can be used to convey notification-type messages, and can automatically disappear after a short dwell without user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, text information is prompted in the status bar, a prompt tone is given, the terminal vibrates, an indicator light flashes, and the like.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
A 2D (an animation mode) graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The terminal 100 in the embodiment of the present application may be a mobile phone, a tablet computer, a wearable device, a notebook computer, a television, and the like.
The inventor researches and discovers that with the development of the technology, more and more users communicate by using mails, a mobile phone mailbox user may receive a lot of mails every day, but some mails are not concerned by the user, the user can directly delete or transfer the mails to a trash box, and the mails of the kind and the mails concerned by the user adopt the same setting, so that excessive flow is wasted when the content is loaded, and inconvenience is brought to the user.
In view of the above, the present application provides a mail sorting method and a mail sorting apparatus, which are used to solve the above problems. The inventive concept of the present application can be summarized as follows: recording the information of the mail aiming at the received mail; determining and storing the score of the mail according to the score corresponding to the operation type; determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period; and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
Fig. 3 is a diagram of an application scenario of the mail classification method in the embodiment of the present application. The figure includes: network 10, server 20, storage 30, terminal device 40; wherein:
a user receives a mail on a terminal device through a network, then the information of the mail is recorded, a server determines the score of the mail according to the score corresponding to the operation type of the user and stores the score into a memory, and the server determines the sum of the scores corresponding to the mails from the mailbox address of the same sender and the number of the mails in a preset time period; and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list. It should be noted that the execution subject of the above steps is not limited to the server, and may also be executed by the terminal device, and also may be executed by a part of the steps executed by the server, and a part of the steps executed by the terminal device, are all applicable to the embodiments of the present application.
Only a single server or terminal device is detailed in the description of the present application, but it will be understood by those skilled in the art that the terminal device 40, the server 20 and the memory 30 shown are intended to represent the operations of the terminal device, the server and the memory involved in the technical solutions of the present application. The individual servers and memories are described in detail for convenience of illustration only and are not meant to imply limitations on the number, type, or location of end devices and servers. It should be noted that the underlying concepts of the example embodiments of the present application may not be altered if additional modules are added or removed from the illustrated environments. In addition, although fig. 3 shows a bidirectional arrow from the storage 30 to the server 20 for convenience of explanation, it will be understood by those skilled in the art that the above-described transmission and reception of mail also need to be realized through the network 10.
It should be noted that the storage in the embodiment of the present application may be, for example, a cache system, or a hard disk storage, a memory storage, and the like. In addition, the mail classification method provided by the application is not only suitable for the application scene shown in fig. 3, but also suitable for any device with mail classification requirements.
For the convenience of understanding, the mail classification method proposed by the embodiment of the present application is described in detail below with reference to the accompanying drawings.
As shown in fig. 4, an overall flowchart of the mail classification method provided in the embodiment of the present application is shown, where:
in step 401: recording the information of the mail aiming at the received mail; the information comprises a sender mailbox address and an operation type of the mail;
in one embodiment, as shown in Table 1, the information of the mail includes, but is not limited to: the serial number of the mail, the address of a sender mailbox, the operation type, the received time and the corresponding score calculated according to the operation type;
serial number of mail Sender mailbox address Type of operation Time of receipt Score value
1 123@xx.com Viewing mail 12:23 1
TABLE 1
In the embodiment of the application, in order to facilitate statistics of mail types, a first mail folder and a second mail folder are created in an inbox, and the first mail folder is used for storing mails which are sent by a sender mailbox address and are not included in a blacklist, namely ordinary mails; in order to facilitate statistics of the number of the mails in the first mail folder and the second mail folder, if the address of the sender of the received mail is in a blacklist list, the sequence number of the mail indicates the sequence in the second mail folder; and if the mailbox address of the sender of the received mail is not in the blacklist list, the sequence numbers of the mails are in the sequence in the first mail folder.
In step 402: determining and storing the score of the mail according to the score corresponding to the operation type;
in one embodiment, the operation type includes at least one of: viewing the mail, deleting the mail, and restoring the mail from the garbage box to the mail in the first mail folder, wherein: viewing the mail for increasing the positive score; deleting the mail for increasing the negative score; restoring mail from the trash to mail in the first mail folder is used to increase the positive score.
In one embodiment, deleting the email may be implemented as deleting the email directly, and moving the email into a trash. Wherein, directly deleting the mail may be implemented as shown in fig. 5A, clicking a mail deletion button to delete the mail; moving the mail to a trash can be implemented as shown in fig. 5B, holding the mail and then dragging to the trash.
In one embodiment, the score corresponding to the operation type may be implemented by a code, as shown in table 2:
viewing mail +1 TYPE_UNWANTED_OPEN
Direct delete mail -5 TYPE_UNWANTED_DELETE
Moving mail to a trash bin -5 TYPE_MOVE_TO_TRASH
Recovering from garbage can to ordinary postPiece +5 TYPE_MOVE_TO_NORMAL
TABLE 2
It should be understood that the description in table 2 is only an example, and other codes that can implement the technical solution of the present application are also applicable to the present application.
In one embodiment, the operation types of the user on the mails may be multiple, and for the received mails, if the operation types include multiple operation types, the scores of the mails are sequentially accumulated and stored according to the execution time sequence of the operation types. For example:
1) aiming at the mail A, a user firstly checks the mail and then deletes the mail, so that the score of the mail A is + 1-5-4;
2) aiming at the mail B, a user firstly checks the mail, then deletes the mail, and finally restores the mail from a garbage box into a common mail, wherein the score of the mail B is +1-5+ 5-1;
3) and for the mail C, the user does not check and directly deletes the mail, and then restores the mail from the garbage box into a common mail, so that the score of the mail C is-5 + 5-0.
Other cases where multiple operations are performed on the same mail are the same as the processing manner in the above example, and are not described in detail later.
In the embodiment of the present application, a corresponding statistical function may be added to mailbox software (legacy. java); adding a corresponding function to an update mail status (updatemessages) function to record the information of the received mail, wherein the initial value of the operation type is 0, and the initial value of the score is 0.
Wherein the added function may be:
the mail is checked, and TYPE _ UNWANTED _ OPEN is triggered to be 1 and less than 1;
the mail is directly deleted, and TYPE _ UNWANTED _ DELETE is triggered to be 1 and less than 2;
mail is moved TO a TRASH bin, triggering TYPE _ MOVE _ TO _ TRASH 1 < 2;
mail is transferred from the trash box TO the first mail folder, triggering TYPE _ MOVE _ TO _ NORMAL ≦ 3;
wherein, the TYPE _ UNWANTED _ OPEN, TYPE _ UNWANTED _ DELETE, TYPE _ MOVE _ TO _ TRASH, and TYPE _ MOVE _ TO _ NORMAL are all codes corresponding TO different operation TYPEs in table 2;
after the user operates, the state values of the operation are respectively counted and stored in a database, and the score corresponding to the operation type is synchronously calculated.
In step 43: determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period;
in step 404: and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
In one embodiment, in order to avoid that the mail sent by the sender in the blacklist causes trouble to the user, in the embodiment of the present application, after the sender mailbox address is added to the blacklist, the mail sent by the sender mailbox address in the blacklist is transferred to the second mail folder. That is, the mails sent by the sender mailbox address added in the blacklist list can not be displayed in the first mail folder, and are directly listed as mails which are not concerned by the user, so that the disturbance of the mails to the user is reduced.
In the embodiment of the application, in order to improve user experience and meet various requirements of a user, after transferring the mail sent by the mailbox address of the sender in the blacklist list into the second mail folder, as shown in fig. 5C, the user can perform one-key cleaning on the mail in the second mail folder, that is, delete all the mails in the second mail folder; as shown in fig. 5D, or the mail in the second mail folder is transferred to the first mail folder.
In the embodiment of the present application, the preset condition may be set as: the number of the mails is greater than a first preset value, and the sum of the scores of the mails is less than or equal to a second preset value; for example:
if the number of the received mails from the same sender mailbox address is greater than 5 and the score corresponding to the operation type of each corresponding mail is 0, the total score of the mails is 0, namely the user receives more than 5 mails from the same sender within a preset time period, but the user views the content and does not perform other corresponding processing, and the sender is considered to be a sender which the user does not want to pay attention to, and the mailbox address of the sender is added into a sender blacklist.
If the number of the received mails from the same sender mailbox address is larger than 2 and the score corresponding to the operation type of each corresponding mail is smaller than 0, namely the user receives more than 2 mails from the same sender within a preset time period, but the user performs deletion operation, the sender is considered as the sender which the user does not want to pay attention to, and the mailbox address of the sender is added into a sender blacklist list.
It needs to be known that, the value of the first preset value and the value of the second preset value are not limited, and a user can set the values according to the requirement of the user.
In the embodiment of the application, in order to increase the experience of the user, after the user adds the sender mailbox address to the blacklist, the following operations can be performed on the sender address in the blacklist:
checking a sender mailbox address in the blacklist list; removing the inventor mailbox address in the blacklist from the blacklist; setting a special prompt tone for the address of the sender in the blacklist; setting a format for receiving the mail for the mailbox address of the sender in the blacklist, for example: the mail header of the mail sent by the sender in the blacklist can be set, so that the purpose of saving the flow is achieved.
After introducing the mail classification method provided by the embodiment of the present application, based on the same inventive concept, the following describes in detail the mail classification apparatus provided by the embodiment of the present application:
as shown in fig. 6, the apparatus includes a first memory 601, a second memory 602, and a controller 603;
the first memory 601 for storing a computer program executable by the controller;
the second memory 602 is used for buffering input signals;
the controller 603 is connected to the first memory 601 and the second memory 602, and configured to perform:
recording the information of the received mail; the information comprises a sender mailbox address and an operation type of the mail;
determining and storing the score of the mail according to the score corresponding to the operation type;
determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period;
and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, a first mail folder and a second mail folder are created in the inbox, the first mail folder is used for storing mails sent by a sender mailbox address which is not included in the blacklist, and the operation type includes at least one of the following types: viewing the mail, deleting the mail, and restoring the mail from a garbage box to the mail in the first mail folder, wherein:
said viewing said mail for increasing a positive score value;
the deleting the mail is used for increasing a negative score value;
the restoring of the mail from the trash box to the mail in the first mail folder is used to increase the positive score value.
In some possible embodiments, the controller 603 is further configured to:
and for the received mails, if the received mails contain a plurality of operation types, sequentially accumulating the scores of the mails according to the execution time sequence of the operation types and storing the scores.
In some possible embodiments, after the controller performs the adding of the sender mailbox address to a blacklist, the controller is further configured to:
and transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder.
In some possible embodiments, after the controller 603 performs transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder, the controller 603 is further configured to:
all mails in the second mail folder are deleted in response to one-key cleaning operation of a user; alternatively, the first and second electrodes may be,
and transferring the mails in the second mail folder to the first mail folder in response to the recovery operation of the user.
In some possible embodiments, if the sum of the scores of the mails and the number of the mails meet a preset condition, adding the sender to a sender blacklist, including:
and if the number of the mails is greater than a first preset value and the sum of the scores of the mails is less than or equal to a second preset value, adding the mailbox address of the sender into a blacklist list.
In some possible embodiments, after the controller 603 performs adding the sender mailbox address to a blacklist, the controller 603 is further configured to:
viewing a sender mailbox address in the blacklist in response to a viewing operation of a user; alternatively, the first and second electrodes may be,
removing the sender mailbox address in the blacklist from the blacklist in response to a removal operation of a user; alternatively, the first and second electrodes may be,
setting a special prompt tone for a sender mailbox address in the blacklist in response to a first setting operation of a user; alternatively, the first and second electrodes may be,
and responding to a second setting operation of the user to set a format of the received mail for the sender mailbox address in the blacklist.
In some possible embodiments, the information of the mail further includes at least one of: the serial number of the mail and the time of receiving the mail;
the sequence number of the mail is used for identifying the sequence of the mail in an inbox;
and the time of receiving the mail is used for identifying the time information of receiving the mail.
In some possible embodiments, the order of the mail in the inbox includes:
if the mailbox address of the sender of the received mail is in the blacklist list, the sequence number of the mail is the sequence in a second mail folder;
and if the mailbox address of the sender of the received mail is not in the blacklist list, the sequence number of the mail is the sequence in the first mail folder.
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method of mail classification, the method comprising:
recording the information of the received mail; the information comprises a sender mailbox address and an operation type of the mail;
determining and storing the score of the mail according to the score corresponding to the operation type;
determining the sum of scores corresponding to mails from the same sender mailbox address and the number of the mails in a preset time period;
and if the sum of the scores of the mails and the number of the mails meet preset conditions, adding the mailbox address of the sender into a blacklist list.
2. The method of claim 1, wherein a first mail folder and a second mail folder are created in an inbox, the first mail folder being used to store mail sent from a sender's mailbox address that is not included in the blacklist, the type of operation comprising at least one of: viewing the mail, deleting the mail, and restoring the mail from a garbage box to the mail in the first mail folder, wherein:
said viewing said mail for increasing a positive score value;
the deleting the mail is used for increasing a negative score value;
the restoring of the mail from the trash box to the mail in the first mail folder is used to increase the positive score value.
3. The method of claim 2, further comprising:
and for the received mails, if the received mails contain a plurality of operation types, sequentially accumulating the scores of the mails according to the execution time sequence of the operation types and storing the scores.
4. The method of claim 1 wherein after said adding said sender mailbox address to a blacklist, said method further comprises:
and transferring the mail sent by the sender mailbox address in the blacklist list into the second mail folder.
5. The method of claim 4, wherein after transferring the mail sent by the sender's mailbox address in the blacklist list into the second mail folder, the method further comprises:
all mails in the second mail folder are deleted in response to one-key cleaning operation of a user; alternatively, the first and second electrodes may be,
and transferring the mails in the second mail folder to the first mail folder in response to the recovery operation of the user.
6. The method of claim 1, wherein adding the sender to a sender blacklist if the sum of the scores of the mails and the number of the mails satisfy a preset condition, comprises:
and if the number of the mails is greater than a first preset value and the sum of the scores of the mails is less than or equal to a second preset value, adding the mailbox address of the sender into a blacklist list.
7. The method of claim 1 wherein after said adding said sender mailbox address to a blacklist, said method further comprises:
viewing a sender mailbox address in the blacklist in response to a viewing operation of a user; alternatively, the first and second electrodes may be,
removing the sender mailbox address in the blacklist from the blacklist in response to a removal operation of a user; alternatively, the first and second electrodes may be,
setting a special prompt tone for a sender mailbox address in the blacklist in response to a first setting operation of a user; alternatively, the first and second electrodes may be,
and responding to a second setting operation of the user to set a format of the received mail for the sender mailbox address in the blacklist.
8. The method according to any of claims 1-7, wherein the information of the mail further comprises at least one of: the serial number of the mail and the time of receiving the mail;
the sequence number of the mail is used for identifying the sequence of the mail in an inbox;
and the time of receiving the mail is used for identifying the time information of receiving the mail.
9. The method of claim 8, wherein the order of the mail in the inbox comprises:
if the mailbox address of the sender of the received mail is in the blacklist list, the sequence number of the mail is the sequence in a second mail folder;
and if the mailbox address of the sender of the received mail is not in the blacklist list, the sequence number of the mail is the sequence in the first mail folder.
10. A mail sorting apparatus, comprising a first memory, a second memory, and a controller:
the first memory for storing a computer program executable by the controller;
the second memory is used for caching the received mails;
the controller, coupled to the first memory and the second memory, is configured to perform the method of any of claims 1-9.
CN202110579677.5A 2021-05-26 2021-05-26 Mail classification method and mail classification device Pending CN113256254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110579677.5A CN113256254A (en) 2021-05-26 2021-05-26 Mail classification method and mail classification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110579677.5A CN113256254A (en) 2021-05-26 2021-05-26 Mail classification method and mail classification device

Publications (1)

Publication Number Publication Date
CN113256254A true CN113256254A (en) 2021-08-13

Family

ID=77184560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110579677.5A Pending CN113256254A (en) 2021-05-26 2021-05-26 Mail classification method and mail classification device

Country Status (1)

Country Link
CN (1) CN113256254A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068217A (en) * 2006-06-16 2007-11-07 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
CN104636438A (en) * 2014-12-31 2015-05-20 广东欧珀移动通信有限公司 E-mail sorted storing method and device
CN105847123A (en) * 2016-04-19 2016-08-10 乐视控股(北京)有限公司 Spam mail recognition method and device
CN106789590A (en) * 2017-01-03 2017-05-31 青岛海信移动通信技术股份有限公司 The sorting technique and device of e-mail sending
CN111222851A (en) * 2019-12-31 2020-06-02 论客科技(广州)有限公司 Mail classification method and device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068217A (en) * 2006-06-16 2007-11-07 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
CN104636438A (en) * 2014-12-31 2015-05-20 广东欧珀移动通信有限公司 E-mail sorted storing method and device
CN105847123A (en) * 2016-04-19 2016-08-10 乐视控股(北京)有限公司 Spam mail recognition method and device
CN106789590A (en) * 2017-01-03 2017-05-31 青岛海信移动通信技术股份有限公司 The sorting technique and device of e-mail sending
CN111222851A (en) * 2019-12-31 2020-06-02 论客科技(广州)有限公司 Mail classification method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106557330B (en) Method and device for processing notification information of notification bar of mobile terminal system and mobile terminal
CN111597000B (en) Small window management method and terminal
CN110865837B (en) Method and terminal for system upgrade
CN111367456A (en) Communication terminal and display method in multi-window mode
US20140297586A1 (en) Device and method for cloud file management
CN113535207B (en) Vehicle and updating method of vehicle-mounted software thereof and mobile terminal
CN113835569A (en) Terminal device, quick start method for internal function of application and storage medium
CN113709026B (en) Method, device, storage medium and program product for processing instant communication message
CN111857531A (en) Mobile terminal and file display method thereof
CN113656490A (en) Data synchronization method, device, terminal and storage medium
CN111176766A (en) Communication terminal and component display method
CN111459565A (en) Method and device for rendering client page and mobile terminal
CN112835472B (en) Communication terminal and display method
CN111935353B (en) Mobile terminal and short message display method thereof
CN113055585B (en) Thumbnail display method of shooting interface and mobile terminal
CN114371895B (en) Terminal equipment, mail marking method and storage medium
CN113068229A (en) Communication terminal and wireless network switching method
US20140210834A1 (en) Information processing device, method and program for displaying number of transferred data
CN113256254A (en) Mail classification method and mail classification device
CN113157092B (en) Visualization method, terminal device and storage medium
CN113642010B (en) Method for acquiring data of extended storage device and mobile terminal
CN113900740A (en) Method and device for loading multiple list data
CN114356559A (en) Multithreading control method and terminal equipment
CN110852717A (en) Travel updating method and intelligent communication terminal
CN113641431A (en) Method and terminal equipment for enhancing display of two-dimensional code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210813

RJ01 Rejection of invention patent application after publication