CN104135563A - A communication processing method and system - Google Patents

A communication processing method and system Download PDF

Info

Publication number
CN104135563A
CN104135563A CN201410319218.3A CN201410319218A CN104135563A CN 104135563 A CN104135563 A CN 104135563A CN 201410319218 A CN201410319218 A CN 201410319218A CN 104135563 A CN104135563 A CN 104135563A
Authority
CN
China
Prior art keywords
communication
information
terminal
opposite terminal
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410319218.3A
Other languages
Chinese (zh)
Other versions
CN104135563B (en
Inventor
谭少卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410319218.3A priority Critical patent/CN104135563B/en
Publication of CN104135563A publication Critical patent/CN104135563A/en
Priority to PCT/CN2015/083176 priority patent/WO2016000636A1/en
Application granted granted Critical
Publication of CN104135563B publication Critical patent/CN104135563B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention discloses a communication processing method and system, wherein the method includes: monitoring the communication in a terminal; acquiring communication information of an opposite terminal which is currently communicating with the terminal, wherein the communication information includes a communication identifier; comparing the acquired communication identifier of the opposite terminal with contact information in an address book application; generating a newly built contact page when the acquired communication identifier of the opposite terminal does not match the contact information; and adding the acquired communication identifier of the opposite terminal to a corresponding position of the newly built contact page. The problem of complicated operations and low efficiency when storing an unknown communication identifier is solved by the present invention.

Description

Communication processing method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a communication processing method and system.
Background
With the continuous development of communication technology, communication modes are more and more, for example, a user can use a mobile phone to perform telephone communication and instant chat software to perform instant communication. When a user communicates by using various communication modes, the user often receives communication requests of unknown communication identifiers, wherein the unknown communication identifiers are required to be stored by the user, for example, the unknown communication identifiers are friends newly known by the current user, and the two people exchange respective communication identifiers with each other. At this time, the user needs to save the unknown communication identifier, but there are many problems in saving the communication identifier.
Taking mobile phone communication as an example, after a user A answers an unknown incoming call, the user A determines that the unknown incoming call is dialed by using a new mobile phone number after a friend user B of the user A changes the mobile phone number. After hanging up the call, the user A wants to store the number corresponding to the unknown incoming call, at this time, the user needs to open a contact person adding page in an address list through a series of click selection operations, then manually input the mobile phone number into the contact person adding page, or in the adding process, through switching between pages back and forth, firstly switching to a communication record to view the mobile phone number, and then switching to the contact person adding page to input the mobile phone number.
Therefore, when an unknown communication identifier is stored by a user, a series of clicking operations are required to open a contact adding page in an address book, and frequent switching among different interfaces is required, so that the operation is complicated, the time is wasted, and the efficiency is low; the user experience is influenced, and the operation and processing burden of the terminal system is increased. Furthermore, the user is required to input the communication identifier by himself, the input process takes a long time, and the input result has poor reliability and low accuracy.
Disclosure of Invention
In view of the above, the present invention has been made to provide a communication processing method and a corresponding communication processing system that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a communication processing method, including:
monitoring communication in a terminal, and acquiring communication information of an opposite terminal currently communicating with the terminal; wherein the communication information comprises: a communication identifier;
comparing the acquired communication identifier of the opposite terminal with contact person information in the address list application;
when the acquired communication identifier of the opposite terminal is not matched with the contact information, a new contact page is generated;
and adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page.
According to another aspect of the present invention, there is provided a communication processing system including:
the monitoring module is used for monitoring communication in the terminal and acquiring communication information of an opposite terminal which is currently in communication with the terminal; wherein the communication information comprises: a communication identifier;
the comparison module is used for comparing the acquired communication identifier of the opposite terminal with the contact information in the address list application;
the generating module is used for generating a new contact person page when the acquired communication identifier of the opposite terminal is not matched with the contact person information;
and the first adding module is used for adding the acquired communication identifier of the opposite terminal to the corresponding position of the newly-built contact page.
The invention provides a communication processing method and a system, which are used for monitoring communication in a terminal, acquiring a communication identifier of an opposite terminal currently communicating with the terminal, and judging whether the communication identifier is matched with contact information or not; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flow chart of a communication processing method in a first embodiment of the present invention;
fig. 2 is a flow chart of a communication processing method in a second embodiment of the present invention;
FIG. 3 is a flow chart of a method for determining security of a current communication according to a second embodiment of the present invention;
FIG. 4 is a diagram illustrating a new contact page in a second embodiment of the present invention;
fig. 5 is a flowchart of a communication processing method according to a third embodiment of the present invention;
FIG. 6 is a diagram illustrating a new contact page in a third embodiment of the present invention;
fig. 7 is a block diagram showing a communication processing system according to a fourth embodiment of the present invention;
fig. 8 is a block diagram showing a communication processing system according to a fifth embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Example one
Referring to fig. 1, a flow chart of a communication processing method in a first embodiment of the present invention is shown. In this embodiment, the communication processing method includes:
step 102, monitoring communication in a terminal, and acquiring communication information of an opposite terminal currently communicating with the terminal.
In this embodiment, the communication between the terminal and the peer includes, but is not limited to: a phone call and a short message through a terminal, and a voice call and an Instant message through IM (Instant Messaging) software. The commonly used IM software includes: QQ, MSN Messenger, Feixin, Skype, Sina UC, Google Talk, Aliwang, etc.
Wherein, monitoring the communication condition in the terminal may include: monitoring for incoming communications and monitoring for outgoing communications. When the current communication is initiated by a terminal side, the opposite end is a receiver, and the terminal is a sender; when the current communication is initiated by the opposite terminal side, the terminal is a receiving party, and the opposite terminal is a sending party.
In this embodiment, the communication information includes: and (5) communication identification. Preferably, when the terminal is a mobile phone terminal and the communication is to make/receive a call and to send/receive a short message, the communication identifier of the opposite terminal may be a mobile phone number of the opposite terminal. When the terminal is a PC terminal (personal computer) or a mobile phone terminal and the ongoing communication is an instant messaging session (e.g., QQ voice, QQ video, WeChat, etc.), the communication identifier of the opposite terminal may be an instant messaging number (e.g., QQ number, WeChat, etc.) of the user corresponding to the opposite terminal.
And 104, comparing the acquired communication identifier of the opposite terminal with the contact information in the address book application.
And 106, when the acquired communication identifier of the opposite terminal is not matched with the contact information, generating a new contact page.
Preferably, when the obtained communication identifier of the opposite terminal is not in the address list of the terminal, or when the obtained communication identifier of the opposite terminal is not a friend number (e.g., a QQ friend number, a wechat friend number, etc.) in the instant messaging of the user, it may be determined that the obtained communication identifier of the opposite terminal does not match the contact information, that is, is a strange communication identifier.
And step 108, adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page.
In this embodiment, the obtained communication identifier of the peer may be automatically added to the corresponding position of the new contact page.
In summary, the communication processing method according to this embodiment acquires a communication identifier of an opposite end currently communicating with a terminal by monitoring communication in the terminal, and determines whether the communication identifier matches contact information; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
Example two
In the present embodiment, a third party application installed on the terminal side may be used to execute the communication processing method. However, it should be clear to those skilled in the art that the application for executing the communication processing method is not limited to the third party application on the terminal side, but a functional module of the terminal may be used for executing the communication processing method, for example, the functional module is disposed in an operating system of the terminal or an address book application of the terminal. Or, what is used to execute the communication processing method may also be a functional module in a third-party application at the terminal side, such as: a function module in a security application (e.g., 360 mobile security guard) in the terminal.
Referring to fig. 2, a flow chart of a communication processing method in a second embodiment of the present invention is shown. In this embodiment, the communication processing method includes:
step 202, a third party application monitors communication in a terminal to acquire communication information of an opposite terminal currently communicating with the terminal. Wherein the communication information comprises: and (5) communication identification.
In this embodiment, the communication performed between the terminal and the opposite end may be voice communication (e.g., telephone communication, QQ voice communication, etc.), video communication (e.g., video telephone, QQ video call, etc.), or text communication (e.g., short message, text chat using QQ, etc.).
Preferably, the communication processing method described in this embodiment can be executed in, but is not limited to, the following cases:
when the current communication is initiated by the peer to the terminal,
executing the communication processing method after the terminal is connected and hangs up the communication; or the communication processing method is executed after the communication is not switched on and then is suspended.
When the current communication is initiated by the terminal to the peer,
executing the communication processing method after the terminal is dialed and then hangs up the communication; or the communication processing method is executed after the communication is not dialed on and then hung up.
And 204, comparing the acquired communication identifier of the opposite terminal with the contact information in the address list application by the third-party application.
In this embodiment, when the obtained communication identifier of the opposite end is matched with the contact information, the user corresponding to the opposite end is a contact or a friend of the user corresponding to the terminal, and the process may be directly ended.
And executing step 206 when the acquired communication identifier of the opposite terminal does not match with the contact information.
And step 206, when the acquired communication identifier of the opposite terminal is not matched with the contact information, the third party application judges the safety of the current communication.
Preferably, when the third-party application determines the security of the current communication, the third-party application may directly determine the security by using the security determination module in the third-party application, or may determine the security by calling another security application (e.g., a 360-degree mobile security guard), which is not limited in this embodiment.
Specifically, referring to fig. 3, a flow chart of a method for determining the security of current communication in a second embodiment of the present invention is shown. In this embodiment, the step 206 may specifically include:
and step S302, when the obtained communication identifier of the opposite terminal is not matched with the contact information, the third party application compares the communication identifier of the opposite terminal with data in a preset black/white list.
Preferably, the data stored in the whitelist is a communication identification corresponding to a communication that has been determined to be secure. The data stored in the black list is a communication identification corresponding to a communication that has been determined to be a fraudulent communication, and/or a communication of a fake message, and/or a communication of phishing, and/or a communication of a trojan horse, and/or a communication of a pseudo base station.
In the present embodiment, it is preferred that,
if the communication identifier of the opposite end is matched with the data in the blacklist, it can be determined that the current communication is a high-risk communication (e.g., a fraud communication, a pseudo base station communication, etc.), and at this time, the third-party application directly intercepts the current communication, and ends the process.
And if the communication identifier of the opposite terminal is matched with the data in the white list, determining that the current communication is safe communication. Preferably, in order to further ensure that the current communication is a secure communication and improve the accuracy of the result of determining the security of the current communication, when the communication identifier of the peer matches the data in the white list, the substep S304 may be continuously performed.
It should be noted that when the communication identifier of the opposite end is neither in the blacklist nor in the whitelist, in order to improve the accuracy of the current communication security judgment result, the substep S304 may be continuously performed.
And S304, the third party application acquires the call information and the mark information of the opposite terminal communicating with the terminal.
Preferably, the call information includes: the number of outgoing calls and incoming calls of the opposite terminal, the communication time of the opposite terminal during outgoing calls and incoming calls, the ringing time of the opposite terminal during outgoing calls and incoming calls, the time distribution information of the opposite terminal during communication, the number of times of sending and receiving information by the opposite terminal, and at least one of the number of times of adding the communication identifier of the opposite terminal to a contact and a blacklist; the marking information includes: the communication identifier of the opposite terminal is marked as the times of malicious and/or spam communication, the times of occurrence of the communication identifier of the opposite terminal on a page determined as a malicious and/or spam website, and the times of marking the information sent by using the communication identifier of the opposite terminal as malicious and/or spam information.
And a substep S306, matching the call information and/or the mark information with a preset interception strategy by the third party application, and determining a matching result.
In this embodiment, the preset interception policy includes a plurality of sub-interception policies; and each sub-interception strategy is respectively matched with the corresponding call information and the corresponding mark information. Preferably, the third party application matches the call information and/or the tag information with a preset interception policy, and determining a matching result may specifically include: and determining the number of the sub-interception strategies matched with the current incoming call according to the call information and/or the mark information.
And a substep S308, determining the risk level of the current communication by the third party application according to the matching result.
In this embodiment, the determining the risk level of the current communication according to the matching result may specifically include: and determining the risk level of the current communication according to the number of the sub-interception strategies matched with the current communication. Wherein,
when the number of the matched sub-interception strategies is larger than or equal to a first threshold value, determining that the current communication is in a high risk level;
when the number of the matched sub-interception strategies is larger than or equal to a second threshold and smaller than a first threshold, determining that the current communication is a risk level;
when the number of the matched sub-interception strategies is larger than or equal to a third threshold and smaller than a second threshold, determining that the current communication is a suspicious level;
determining that the current communication is a security level when the number of matching child interception policies is less than a third threshold.
Preferably, the first and second liquid crystal films are made of a polymer,
and when the risk level of the current communication is determined to be a high-risk level according to the matching result, the third-party application can directly intercept the current communication and end the process.
When the risk level of the current communication is determined to be a risk level or a suspicious level according to the matching result, the third party application may load and display risk prompt information to prompt the user that the current communication is at risk, and may execute step 208.
When it is determined that the risk level of the current communication is a security level according to the matching result, it is determined that the current communication is a secure communication, and step 208 is performed.
And step 208, the third-party application generates a new contact page.
Preferably, in order to ensure that the generation process of the new contact page meets the expectations of the user, the distance between the terminal and the opposite terminal may be determined before the new contact page is generated, and the specific process is as follows:
firstly, the third party application respectively acquires the position information of the current communication terminal and the opposite terminal. The position information may be obtained by any known position information obtaining method.
And then, the third party application determines the distance between the terminal and the opposite terminal according to the position information of the terminal and the opposite terminal.
And finally, when the distance is smaller than or equal to the set distance, executing the step 208, and generating a new contact page by the third-party application.
Preferably, in order to ensure that the generation process of the new contact page meets the user's expectations, the third-party application may obtain the network information of the terminal and the opposite terminal of the current communication before generating the new contact page. Wherein the network information includes but is not limited to: at least one of WIreless-FIdelity (WIFI) information, base station information, and local area network information. And the third party application determines whether the terminal and the opposite terminal have the same network information or not, and executes the step of generating the new contact page when determining that the terminal and the opposite terminal have the same network information.
For example, the third-party application acquires WIFI information of the terminal and the opposite terminal from the cloud server respectively. And then, the third party application determines whether the terminal and the opposite terminal share the same WIFI or not according to the WIFI information of the terminal and the opposite terminal. And finally, when the terminal and the opposite terminal share the same WIFI, the third-party application executes the step of generating the new contact page.
In this embodiment, the generating, by the third-party application, a new contact page may specifically include: and the third party application generates the new contact page according to a set format.
Preferably, the third-party application generates the new contact page according to a set format, and during specific implementation, the new contact page can be generated according to a default format corresponding to the system address book application by calling the address book application. The address book application may be a system address book application on the terminal side, and at this time, the set format is a template of a newly-created contact page corresponding to the system address book application. The address book application can also be a template in the third-party application or other applications, and the format of the template is matched with the format of the newly-built contact page, so that the format of the newly-built contact page is more diversified and richer, and the user requirements are met.
Preferably, the setting format includes but is not limited to: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options.
For example, referring to fig. 4, a diagram of a new contact page in the second embodiment of the present invention is shown. The format of the new contact page comprises the following steps: communication identification, name, gender and email.
And step 210, adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page by the third-party application.
For example, the third-party application adds the acquired communication identifier of the opposite end to the corresponding position of the communication identifier option shown in fig. 4.
In step 212, the third party application obtains the personal information of the user corresponding to the opposite terminal from the cloud.
Preferably, if the user corresponding to the peer uploads the personal information of the user to the cloud server, at this time, the third-party application may obtain, in addition to the communication identifier of the peer currently communicating with the terminal when monitoring communication in the terminal, further information of the peer, that is, the personal information of the user, from the cloud. Wherein the personal information includes: at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
In step 214, the third-party application adds the acquired personal information to the corresponding option position in the set format.
The third party application responds to the user's add request, step 216.
Wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an email address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request.
In step 218, the third party application adds information corresponding to the addition request to a corresponding option position in the set format.
For example, the third party application adds information corresponding to the name information addition request to a location corresponding to the name option shown in fig. 4, adds information corresponding to the gender information addition request to a location corresponding to the gender option shown in fig. 4, and so on.
And step 220, the third-party application responds to the saving operation request, and updates and saves the added new contact page into the address book application.
In summary, the communication processing method according to this embodiment acquires a communication identifier of an opposite end currently communicating with a terminal by monitoring communication in the terminal, and determines whether the communication identifier matches contact information; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
Meanwhile, before the unknown communication identification is stored, the safety of the current communication is judged, the safety and the reliability of the stored communication identification are guaranteed, the possibility of being cheated by a user is reduced, the rights and interests of the user are guaranteed, and the safety is improved.
EXAMPLE III
With reference to the above-described embodiments, a communication processing method is described in detail below by way of a specific example.
In this embodiment, a mobile phone call is taken as an example, that is, both the terminal and the opposite terminal are mobile phone terminals, the performed communication is a mobile phone call, and the current communication is a call request initiated from the opposite terminal to the terminal. The communication processing method is executed after the terminal connects the call request of the opposite terminal and hangs up the call, or after the terminal does not answer the call request of the opposite terminal and the call request is ended, and specifically, the flow of the communication processing method is as follows:
referring to fig. 5, a flow chart of a communication processing method in a third embodiment of the present invention is shown. In this embodiment, the communication processing method includes:
step 502, a third party application monitors communication in a terminal to obtain a phone number of an opposite terminal currently communicating with the terminal.
Wherein the third party application is an application installed in a terminal (e.g., a mobile phone terminal).
At step 504, the third party application compares the obtained phone number with the contact information.
Preferably, when the obtained phone number is matched with the contact information, it may be determined that the user corresponding to the opposite terminal that initiates the call request to the terminal is a contact of the user corresponding to the terminal, and is a known number, and at this time, the process may be directly ended.
When the obtained phone number does not match the contact information, that is, the incoming call is an unknown number, step 506 is executed.
At step 506, the third party application determines the security of the current communication.
The method for determining the security of the current communication by the third party application may refer to the method in the foregoing embodiment, and the current communication may be classified into a high risk level, a suspicious level, and a security level. It should be noted here that the current communication level may include, but is not limited to, the above four levels.
And when the current communication is determined to be in a high-risk level, directly intercepting the current communication, and ending the process.
When it is determined that the current communication is a risk level or a suspicious level, step 508 is performed.
When it is determined that the current communication is a security level, i.e., the current communication is a secure communication, step 510 is performed.
In step 508, the third party application generates a risk prompt page.
Preferably, the third party application loads and displays risk prompt information on the risk prompt page to prompt the user that the current communication is risk communication or suspicious communication. Meanwhile, the risk prompt page further comprises: a first trigger operation option and a second trigger operation option. If the user triggers the first triggering operation option after browsing the risk prompt information, canceling to generate a new contact page, and ending the process; if the user triggers the second trigger operation option after browsing the risk prompt information, step 510 is executed.
Step 510, when the user triggers the second trigger operation option, the third-party application generates a new contact page.
Preferably, the third-party application generates the new contact page according to a set format. Wherein the setting format includes but is not limited to: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options. The newly-built contact page can be a newly-built contact page in a system address book of the mobile phone terminal, or a newly-built contact page which is set by a third-party application and is different from the system address book, but the same as the system address book, the newly-built contact page set by the third-party application can also store contact information into the system for use, or can also transmit the contact information to the system address book for storage and use through the system address book. Fig. 6 is a schematic diagram of a new contact page in the third embodiment of the present invention. In this embodiment. The format of the new contact page comprises the following steps: communication identification, name, gender and email. When the new contact page is set by the third-party application, the format of the new contact page can be the same as or different from that of the new contact page in the system address book.
And step 512, the third party application acquires the personal information of the user corresponding to the opposite terminal from the cloud, and adds the personal information and the acquired phone number of the opposite terminal to the corresponding position of the newly-built contact page. Wherein the personal information includes: at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
For example, referring to fig. 6, the third party application adds the acquired name information "zhang san" to the corresponding name option, and adds the phone number "123456" acquired in step 502 to the corresponding phone number option.
At step 514, the third party application responds to the user's add request.
Wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an email address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request.
In step 516, the third-party application adds the information corresponding to the addition request to the corresponding option position in the set format.
For example, referring to fig. 6, the user may enter "man" directly at the location corresponding to the gender option and "123456. com" at the location corresponding to the email option.
And step 518, the third-party application responds to the saving operation request, and updates and saves the added new contact page into the address book application.
It should be noted that, when the current communication is a call request initiated from a terminal to an opposite terminal, the processing may be performed with reference to the flow of the communication processing method in this embodiment.
In summary, the communication processing method according to this embodiment acquires a communication identifier of an opposite end currently communicating with a terminal by monitoring communication in the terminal, and determines whether the communication identifier matches contact information; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
And when the personal information of the user corresponding to the terminal and the opposite terminal which are interacted with each other is stored in the cloud, the detailed personal information of the user can be directly obtained from the cloud, various contents in the newly-built contact page are perfected, the content integrity of the newly-built contact page is improved, and the operation of checking and searching by the user is reduced.
Meanwhile, before the unknown communication identification is stored, the safety of the current communication is judged, the safety and the reliability of the stored communication identification are guaranteed, the possibility of being cheated by a user is reduced, the rights and interests of the user are guaranteed, and the safety is improved.
It should be noted that the foregoing method embodiments are described as a series of acts or combinations for simplicity in explanation, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Example four
Referring to fig. 7, a block diagram of a communication processing system according to a fourth embodiment of the present invention is shown based on the same inventive concept as the above method embodiments. In this embodiment, the communication processing system includes:
a monitoring module 702, configured to monitor communication in a terminal, and acquire communication information of an opposite terminal currently communicating with the terminal.
Wherein the communication information comprises: and (5) communication identification.
A comparing module 704, configured to compare the obtained communication identifier of the peer with contact information in the address book application.
A generating module 706, configured to generate a new contact page when the obtained communication identifier of the peer is not matched with the contact information.
A first adding module 708, configured to add the obtained communication identifier of the peer to the corresponding location of the new contact page.
In summary, the communication processing system described in this embodiment acquires the communication identifier of the opposite end currently communicating with the terminal by monitoring communication in the terminal, and determines whether the communication identifier matches with contact information; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
EXAMPLE five
Referring to fig. 8, there is shown a block diagram of a communication processing system in a fifth embodiment of the present invention. In this embodiment, the communication processing system includes:
a monitoring module 802, configured to monitor communication in a terminal, and acquire communication information of an opposite terminal currently communicating with the terminal. Wherein the communication information comprises: and (5) communication identification.
A comparing module 804, configured to compare the obtained communication identifier of the peer with contact information in the address list application.
A determining module 806, configured to determine security of current communication when the obtained communication identifier of the peer is not matched with the contact information.
Preferably, the determining module 806 includes:
a data comparing module 8062, configured to compare the communication identifier of the peer end with data in a preset black/white list.
A first determining module 8064, configured to determine that the current communication is a secure communication when the communication identifier of the peer matches data in the white list.
Preferably, after determining that the current communication is a secure communication, information acquisition module 8068 may continue to be executed.
A second determining module 8066, configured to determine that the current communication is a high-risk communication when the communication identifier of the peer matches data in a blacklist.
Preferably, when it is determined that the current communication is a high-risk communication, the current communication can be directly intercepted by the interception module, and the current process is received.
An information obtaining module 8068, configured to obtain call information and tag information of an opposite end that communicates with the terminal.
Preferably, the call information includes: the number of outgoing calls and incoming calls of the opposite terminal, the communication time of the opposite terminal during outgoing calls and incoming calls, the ringing time of the opposite terminal during outgoing calls and incoming calls, the time distribution information of the opposite terminal during communication, the number of times of sending and receiving information by the opposite terminal, and at least one of the number of times of adding the communication identifier of the opposite terminal to a contact and a blacklist; the marking information includes: the communication identifier of the opposite terminal is marked as the times of malicious and/or spam communication, the times of occurrence of the communication identifier of the opposite terminal on a page determined as a malicious and/or spam website, and the times of marking the information sent by using the communication identifier of the opposite terminal as malicious and/or spam information.
A matching module 80610, configured to match the call information and/or the tag information with a preset interception policy, and determine a matching result.
Preferably, the preset interception policy includes a plurality of sub-interception policies; and each sub-interception strategy is respectively matched with the corresponding call information and the corresponding mark information.
In this embodiment, the matching module 80610 is specifically configured to determine, according to the call information and/or the tag information, the number of sub-interception policies matched with the current incoming call.
A risk level determination module 80612, configured to determine a risk level of the current communication according to the matching result.
In this embodiment, the risk level determining module 80612 is specifically configured to determine the risk level of the current communication according to the number of sub-interception policies matching the current communication. Wherein,
when the number of the matched sub-interception strategies is larger than or equal to a first threshold value, determining that the current communication is in a high risk level;
when the number of the matched sub-interception strategies is larger than or equal to a second threshold and smaller than a first threshold, determining that the current communication is a risk level;
when the number of the matched sub-interception strategies is larger than or equal to a third threshold and smaller than a second threshold, determining that the current communication is a suspicious level;
determining that the current communication is a security level when the number of matching child interception policies is less than a third threshold.
A security determining module 80614, configured to determine that the current communication is a secure communication if it is determined that the risk level of the current communication is a security level according to the matching result.
Preferably, the location information acquisition module 808 may be executed when it is determined that the current communication is a secure communication.
A location information obtaining module 808, configured to obtain location information of the current communication terminal and the opposite terminal respectively.
A distance determining module 810, configured to determine a distance between the terminal and the opposite terminal according to the location information of the terminal and the opposite terminal.
Preferably, the generating module 816 is executed when the distance determining module 810 determines that the distance is less than or equal to a set distance.
Still preferably, the network information acquisition module 812 may be executed when it is determined that the current communication is a secure communication.
A network information obtaining module 812, configured to obtain network information of the terminal and the peer end of the current communication respectively before the generating module generates a new contact page. Wherein the network information comprises at least one of: wireless fidelity (WIFI) information, base station information and local area network information.
A network information determining module 814, configured to determine whether the terminal and the peer have the same network information; when it is determined that the terminal and the opposite terminal have the same network information, the generating module 816 is executed.
And a generating module 816, configured to generate a new contact page. Preferably, the generating module 816 is specifically configured to generate the new contact page according to a set format when the obtained peer communication identifier is not matched with the contact information. Wherein the setting format comprises: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options.
Preferably, the generating module 816 is specifically configured to, when the obtained peer communication identifier is not matched with the contact information, invoke the system address book application, and generate a new contact page according to a default format corresponding to the system address book application.
A personal information obtaining module 818, configured to obtain, from the cloud, the personal information of the user corresponding to the peer.
Wherein the personal information includes: at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
And a third adding module 820, configured to add the acquired personal information to a corresponding option position in the setting format.
A first adding module 822, configured to add the obtained communication identifier of the peer to the corresponding position of the new contact page.
A first response module 824, configured to respond to the addition request of the user.
Wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an e-mail address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request;
a second adding module 826, configured to add information corresponding to the adding request to a corresponding option position in the setting format.
And a second responding module 828, configured to respond to the saving operation request, and save the newly-created contact page update that is completed to be added into the address book application.
In this embodiment, the communication processing system may execute after the current communication is not connected or connected. Wherein the current communication comprises: at least one of voice communication, video communication, and text communication.
In summary, the communication processing system described in this embodiment acquires the communication identifier of the opposite end currently communicating with the terminal by monitoring communication in the terminal, and determines whether the communication identifier matches with contact information; when the acquired communication identifier of the opposite terminal is not matched with the contact information, directly generating a new contact page; the method avoids the situation that a user manually opens the address book through complicated and tedious triggering operation and establishes a contact person adding page; the method simplifies the operation steps, improves the communication processing efficiency, saves time, and reduces the operation and processing burden of the terminal system. Furthermore, the communication identification is automatically added to the corresponding position of the newly-built contact page, so that the manual input process of a user is avoided, the efficiency is improved, and the accuracy of the result is ensured.
And when the personal information of the user corresponding to the terminal and the opposite terminal which are interacted with each other is stored in the cloud, the detailed personal information of the user can be directly obtained from the cloud, various contents in the newly-built contact page are perfected, the content integrity of the newly-built contact page is improved, and the operation of checking and searching by the user is reduced.
Meanwhile, before the unknown communication identification is stored, the safety of the current communication is judged, the safety and the reliability of the stored communication identification are guaranteed, the possibility of being cheated by a user is reduced, the rights and interests of the user are guaranteed, and the safety is improved.
For the above device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in a communication processing device according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses a1 and a communication processing method, which comprises the following steps:
monitoring communication in a terminal, and acquiring communication information of an opposite terminal currently communicating with the terminal; wherein the communication information comprises: a communication identifier;
comparing the acquired communication identifier of the opposite terminal with contact person information in the address list application;
when the acquired communication identifier of the opposite terminal is not matched with the contact information, a new contact page is generated;
and adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page.
A2, the method as in A1, wherein before the step of generating a new contact page, the method further comprises:
respectively acquiring the position information of the current communication terminal and the opposite terminal;
determining the distance between the terminal and the opposite terminal according to the position information of the terminal and the opposite terminal;
and when the distance is smaller than or equal to the set distance, executing the step of generating the new contact page.
A3, the method as in A1, the generating a new contact page includes:
generating the new contact page according to a set format; wherein the setting format comprises: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options.
A4, the method as in A3, the generating the contact establishing page according to the set format, comprising:
and calling the address book application, and generating a new contact page according to a default format corresponding to the system address book application.
A5, the method as in A3, wherein after the step of adding the obtained communication identifier of the opposite terminal to the corresponding position of the new contact page, the method further comprises:
responding to an addition request of a user; wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an e-mail address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request;
and adding information corresponding to the adding request to the corresponding option position in the set format.
A6, the method as in A3, after the step of generating a new contact page, the method further comprising:
acquiring personal information of a user corresponding to the opposite terminal from a cloud terminal; wherein the personal information includes: at least one of name information, gender information, company information, e-mail address, birthday information, address information, hobby information, and avatar information;
and adding the acquired personal information to the corresponding option position in the set format.
A7, the method as in A1, wherein after the step of adding the obtained communication identifier of the opposite terminal to the corresponding position of the new contact page, the method further comprises:
and responding to the storage operation request, and updating and storing the newly-built contact page which is added into the address book application.
A8, the method as in A1, wherein before the step of generating a new contact page, the method further comprises:
judging the security of the current communication;
and when the current communication is judged to be safe communication, executing the step of generating the new contact page.
A9, the method of A8, wherein the determining the security of the current communication comprises:
comparing the communication identifier of the opposite terminal with data in a preset black/white list;
if the communication identifier of the opposite terminal is matched with the data in the white list, determining that the current communication is safe communication;
and if the communication identifier of the opposite terminal is matched with the data in the blacklist, determining that the current communication is high-risk communication.
A10, the method of A8, wherein the determining the security of the current communication comprises:
acquiring call information and mark information of an opposite terminal communicating with the terminal; wherein the call information includes: the number of outgoing calls and incoming calls of the opposite terminal, the communication time of the opposite terminal during outgoing calls and incoming calls, the ringing time of the opposite terminal during outgoing calls and incoming calls, the time distribution information of the opposite terminal during communication, the number of times of sending and receiving information by the opposite terminal, and at least one of the number of times of adding the communication identifier of the opposite terminal to a contact and a blacklist; the marking information includes: the communication identifier of the opposite terminal is marked as the times of malicious and/or spam communication, the times of occurrence of the communication identifier of the opposite terminal on a page determined as a malicious and/or spam website, and the times of marking the information sent by using the communication identifier of the opposite terminal as malicious and/or spam information;
matching the call information and/or the mark information with a preset interception strategy to determine a matching result;
determining the risk level of the current communication according to the matching result;
and if the risk level of the current communication is determined to be the security level according to the matching result, determining that the current communication is the secure communication.
A11, the method as in A10, the preset interception policy comprises a plurality of sub-interception policies; and each sub-interception strategy is respectively matched with the corresponding call information and the corresponding mark information.
A12, the method as in a11, wherein the matching the call information and/or the tag information with a preset interception policy to determine a matching result comprises:
and determining the number of the sub-interception strategies matched with the current incoming call according to the call information and/or the mark information.
A13, the method of A12, the determining a risk level of a current communication according to the matching result, comprising:
determining the risk level of the current communication according to the number of the sub-interception strategies matched with the current communication; wherein,
when the number of the matched sub-interception strategies is larger than or equal to a first threshold value, determining that the current communication is in a high risk level;
when the number of the matched sub-interception strategies is larger than or equal to a second threshold and smaller than a first threshold, determining that the current communication is a risk level;
when the number of the matched sub-interception strategies is larger than or equal to a third threshold and smaller than a second threshold, determining that the current communication is a suspicious level;
determining that the current communication is a security level when the number of matching child interception policies is less than a third threshold.
A14, the method as in A1, wherein before the step of generating a new contact page, the method further comprises:
respectively acquiring network information of the current communication terminal and the opposite terminal; wherein the network information comprises at least one of: wireless fidelity (WIFI) information, base station information and local area network information;
determining whether the terminal and the opposite terminal have the same network information;
and when the terminal and the opposite terminal are determined to have the same network information, executing the step of generating the new contact page.
A15, the method as in any a1-a14, wherein the communication processing method is executed after the current communication is not connected or connected; wherein the current communication comprises: at least one of voice communication, video communication, and text communication.
The invention also discloses B16, a communication processing system, comprising:
the monitoring module is used for monitoring communication in the terminal and acquiring communication information of an opposite terminal which is currently in communication with the terminal; wherein the communication information comprises: a communication identifier;
the comparison module is used for comparing the acquired communication identifier of the opposite terminal with the contact information in the address list application;
the generating module is used for generating a new contact person page when the acquired communication identifier of the opposite terminal is not matched with the contact person information;
and the first adding module is used for adding the acquired communication identifier of the opposite terminal to the corresponding position of the newly-built contact page.
B17, the system of B16, the system further comprising:
the position information acquisition module is used for respectively acquiring the position information of the terminal and the opposite terminal of the current communication before the generation module generates a new contact page;
the distance determining module is used for determining the distance between the terminal and the opposite terminal according to the position information of the terminal and the opposite terminal; and executing the generating module when the distance is less than or equal to a set distance.
B18, System as in B16,
the generating module is specifically configured to generate the new contact page according to a set format when the acquired opposite-end communication identifier is not matched with the contact information; wherein the setting format comprises: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options.
B19, System as in B18,
the generating module is specifically configured to, when the obtained opposite-end communication identifier is not matched with the contact information, invoke the system address book application, and generate a new contact page according to a default format corresponding to the system address book application.
B20, the system of B18, the system further comprising:
the first response module is used for responding to an adding request of a user after the first adding module adds the acquired communication identifier of the opposite terminal to the corresponding position of the newly-built contact page; wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an e-mail address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request;
and the second adding module is used for adding the information corresponding to the adding request to the corresponding option position in the set format.
B21, the system of B18, the system further comprising:
the personal information acquisition module is used for acquiring the personal information of the user corresponding to the opposite terminal from a cloud terminal after the new contact page is generated by the generation module; wherein the personal information includes: at least one of name information, gender information, company information, e-mail address, birthday information, address information, hobby information, and avatar information;
and the third adding module is used for adding the acquired personal information to the corresponding option position in the set format.
B22, the system of B16, the system further comprising:
and the second response module is used for responding to the storage operation request and updating and storing the newly-built contact page which is added into the address book application after the first adding module adds the acquired communication identifier of the opposite terminal to the corresponding position of the newly-built contact page.
B23, the system of B16, the system further comprising:
the judging module is used for judging the safety of the current communication before the generating module generates the new contact page; and executing the generating module when the current communication is judged to be safe communication.
B24, the system according to B23, the judging module includes:
the data comparison module is used for comparing the communication identifier of the opposite terminal with data in a preset black/white list;
a first determining module, configured to determine that the current communication is a secure communication when a communication identifier of the peer matches data in a white list;
and the second determining module is used for determining that the current communication is high-risk communication when the communication identifier of the opposite terminal is matched with the data in the blacklist.
B25, the system according to B23, the judging module includes:
the information acquisition module is used for acquiring call information and mark information of an opposite terminal communicating with the terminal; wherein the call information includes: the number of outgoing calls and incoming calls of the opposite terminal, the communication time of the opposite terminal during outgoing calls and incoming calls, the ringing time of the opposite terminal during outgoing calls and incoming calls, the time distribution information of the opposite terminal during communication, the number of times of sending and receiving information by the opposite terminal, and at least one of the number of times of adding the communication identifier of the opposite terminal to a contact and a blacklist; the marking information includes: the communication identifier of the opposite terminal is marked as the times of malicious and/or spam communication, the times of occurrence of the communication identifier of the opposite terminal on a page determined as a malicious and/or spam website, and the times of marking the information sent by using the communication identifier of the opposite terminal as malicious and/or spam information;
the matching module is used for matching the call information and/or the mark information with a preset interception strategy and determining a matching result;
a risk level determination module for determining the risk level of the current communication according to the matching result;
and the security determination module is used for determining that the current communication is the secure communication if the risk level of the current communication is determined to be the security level according to the matching result.
B26, the system according to B25, the preset interception strategy comprises a plurality of sub-interception strategies; and each sub-interception strategy is respectively matched with the corresponding call information and the corresponding mark information.
B27, System as in B26,
the matching module is specifically configured to determine the number of the sub-interception policies matched with the current incoming call according to the call information and/or the tag information.
B28, System as in B27,
the risk level determining module is specifically configured to determine a risk level of the current communication according to the number of the sub-interception policies matched with the current communication; wherein,
when the number of the matched sub-interception strategies is larger than or equal to a first threshold value, determining that the current communication is in a high risk level;
when the number of the matched sub-interception strategies is larger than or equal to a second threshold and smaller than a first threshold, determining that the current communication is a risk level;
when the number of the matched sub-interception strategies is larger than or equal to a third threshold and smaller than a second threshold, determining that the current communication is a suspicious level;
determining that the current communication is a security level when the number of matching child interception policies is less than a third threshold.
B29, the system of B16, the system further comprising:
the network information acquisition module is used for respectively acquiring the network information of the terminal and the opposite terminal of the current communication before the generation module generates a new contact page; wherein the network information comprises at least one of: wireless fidelity (WIFI) information, base station information and local area network information;
a network information determining module, configured to determine whether the terminal and the peer have the same network information; and executing the generating module when the terminal and the opposite terminal are determined to have the same network information.
B30, the system as described in any of B16-B29, the communication processing system executing after the current communication is not connected or connected; wherein the current communication comprises: at least one of voice communication, video communication, and text communication.

Claims (10)

1. A communication processing method, comprising:
monitoring communication in a terminal, and acquiring communication information of an opposite terminal currently communicating with the terminal; wherein the communication information comprises: a communication identifier;
comparing the acquired communication identifier of the opposite terminal with contact person information in the address list application;
when the acquired communication identifier of the opposite terminal is not matched with the contact information, a new contact page is generated;
and adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page.
2. The method of claim 1, wherein prior to the step of generating a new contact page, the method further comprises:
respectively acquiring the position information of the current communication terminal and the opposite terminal;
determining the distance between the terminal and the opposite terminal according to the position information of the terminal and the opposite terminal;
and when the distance is smaller than or equal to the set distance, executing the step of generating the new contact page.
3. The method of claim 1, wherein the generating a new contact page comprises:
generating the new contact page according to a set format; wherein the setting format comprises: at least one of communication identification, name, gender, company information, email, birthday, address, hobbies, and avatar options.
4. The method of claim 3, wherein the generating the contact creation page in a set format comprises:
and calling the address book application, and generating a new contact page according to a default format corresponding to the system address book application.
5. The method according to claim 3, wherein after the step of adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page, the method further comprises:
responding to an addition request of a user; wherein the add request comprises: at least one of a name information addition request, a gender information addition request, a company information addition request, an e-mail address addition request, a birthday information addition request, an address information addition request, a taste information addition request, and an avatar information addition request;
and adding information corresponding to the adding request to the corresponding option position in the set format.
6. The method of claim 3, wherein after the step of generating a new contact page, the method further comprises:
acquiring personal information of a user corresponding to the opposite terminal from a cloud terminal; wherein the personal information includes: at least one of name information, gender information, company information, e-mail address, birthday information, address information, hobby information, and avatar information;
and adding the acquired personal information to the corresponding option position in the set format.
7. The method of claim 1, wherein after the step of adding the acquired communication identifier of the opposite terminal to the corresponding position of the new contact page, the method further comprises:
and responding to the storage operation request, and updating and storing the newly-built contact page which is added into the address book application.
8. The method of claim 1, wherein prior to the step of generating a new contact page, the method further comprises:
judging the security of the current communication;
and when the current communication is judged to be safe communication, executing the step of generating the new contact page.
9. The method of claim 8, wherein said determining the security of the current communication comprises:
comparing the communication identifier of the opposite terminal with data in a preset black/white list;
if the communication identifier of the opposite terminal is matched with the data in the white list, determining that the current communication is safe communication;
and if the communication identifier of the opposite terminal is matched with the data in the blacklist, determining that the current communication is high-risk communication.
10. A communication processing system, comprising:
the monitoring module is used for monitoring communication in the terminal and acquiring communication information of an opposite terminal which is currently in communication with the terminal; wherein the communication information comprises: a communication identifier;
the comparison module is used for comparing the acquired communication identifier of the opposite terminal with the contact information in the address list application;
the generating module is used for generating a new contact person page when the acquired communication identifier of the opposite terminal is not matched with the contact person information;
and the first adding module is used for adding the acquired communication identifier of the opposite terminal to the corresponding position of the newly-built contact page.
CN201410319218.3A 2014-07-04 2014-07-04 A kind of communication processing method and system Active CN104135563B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system
PCT/CN2015/083176 WO2016000636A1 (en) 2014-07-04 2015-07-02 Communications processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system

Publications (2)

Publication Number Publication Date
CN104135563A true CN104135563A (en) 2014-11-05
CN104135563B CN104135563B (en) 2017-03-15

Family

ID=51808083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410319218.3A Active CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system

Country Status (2)

Country Link
CN (1) CN104135563B (en)
WO (1) WO2016000636A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410693A (en) * 2014-11-28 2015-03-11 北京搜狗科技发展有限公司 Data transmission method, information obtaining method, server and electronic equipment
CN104618874A (en) * 2015-01-29 2015-05-13 北京搜狗科技发展有限公司 Data obtaining method and electronic equipment
CN104836893A (en) * 2015-03-30 2015-08-12 北京奇虎科技有限公司 Method, device and system for adding contact persons and mobile terminal
CN105120045A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new contact name
CN105120046A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new number
WO2016000636A1 (en) * 2014-07-04 2016-01-07 北京奇虎科技有限公司 Communications processing method and system
CN105245674A (en) * 2015-09-10 2016-01-13 陈包容 Method of creating address book according to note information of newly-added email account and device
CN105472090A (en) * 2016-01-13 2016-04-06 陈包容 Address list contact person merging method and device
CN105553679A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information push method and system, and server
CN106874254A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of business card generation method and equipment
CN106878522A (en) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 Contact person's adding method, contact person's adding set and terminal
CN107370863A (en) * 2017-08-11 2017-11-21 北京安云世纪科技有限公司 A kind of link information update method and device based on bluetooth connection
WO2018121649A1 (en) * 2016-12-29 2018-07-05 Zhejiang Geely Holding Group Co., Ltd. Incoming call management method and apparatus
CN112399011A (en) * 2019-10-12 2021-02-23 上海赛连信息科技有限公司 Intelligent call recording method and device
CN105657138B (en) * 2014-11-14 2021-09-03 中兴通讯股份有限公司 Call processing method and communication terminal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113098898A (en) * 2021-04-29 2021-07-09 王小平 Service data monitoring and early warning platform and early warning method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951425A (en) * 2010-09-30 2011-01-19 宇龙计算机通信科技(深圳)有限公司 Processing method and system of contact information and mobile terminal
CN102594918A (en) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 Address book realization method and system for terminal, and terminal
CN103051765A (en) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 Method and device for displaying personal information in text information
CN103078949A (en) * 2013-01-17 2013-05-01 北京奇虎科技有限公司 Method and system for displaying phone number information
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN103167089A (en) * 2011-12-15 2013-06-19 中国移动通信集团江苏有限公司 Mobile terminal and maintaining method for address book of mobile terminal
CN103249034A (en) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 Method and device for acquiring contact information
CN103595547A (en) * 2013-11-15 2014-02-19 北京奇虎科技有限公司 Broadcast intercept method and device of intelligent equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (en) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 Method and device for automatically adding contact information and mobile terminal
CN101976265A (en) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 Method for automatically judging telephone number and adding contact
CN102892087A (en) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 Method and mobile terminal for adding contact information
CN104135563B (en) * 2014-07-04 2017-03-15 北京奇虎科技有限公司 A kind of communication processing method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951425A (en) * 2010-09-30 2011-01-19 宇龙计算机通信科技(深圳)有限公司 Processing method and system of contact information and mobile terminal
CN103167089A (en) * 2011-12-15 2013-06-19 中国移动通信集团江苏有限公司 Mobile terminal and maintaining method for address book of mobile terminal
CN102594918A (en) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 Address book realization method and system for terminal, and terminal
CN103051765A (en) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 Method and device for displaying personal information in text information
CN103078949A (en) * 2013-01-17 2013-05-01 北京奇虎科技有限公司 Method and system for displaying phone number information
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN103249034A (en) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 Method and device for acquiring contact information
CN103595547A (en) * 2013-11-15 2014-02-19 北京奇虎科技有限公司 Broadcast intercept method and device of intelligent equipment

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016000636A1 (en) * 2014-07-04 2016-01-07 北京奇虎科技有限公司 Communications processing method and system
CN105657138B (en) * 2014-11-14 2021-09-03 中兴通讯股份有限公司 Call processing method and communication terminal
CN104410693A (en) * 2014-11-28 2015-03-11 北京搜狗科技发展有限公司 Data transmission method, information obtaining method, server and electronic equipment
CN104410693B (en) * 2014-11-28 2019-06-21 北京搜狗科技发展有限公司 A kind of data transmission method, information acquisition method, server and electronic equipment
CN104618874A (en) * 2015-01-29 2015-05-13 北京搜狗科技发展有限公司 Data obtaining method and electronic equipment
CN104618874B (en) * 2015-01-29 2019-01-29 北京搜狗科技发展有限公司 A kind of data capture method and electronic equipment
CN104836893A (en) * 2015-03-30 2015-08-12 北京奇虎科技有限公司 Method, device and system for adding contact persons and mobile terminal
CN105553679A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information push method and system, and server
CN105120046A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new number
CN105245674A (en) * 2015-09-10 2016-01-13 陈包容 Method of creating address book according to note information of newly-added email account and device
CN105120045A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new contact name
CN106878522A (en) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 Contact person's adding method, contact person's adding set and terminal
CN106874254A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of business card generation method and equipment
CN105472090A (en) * 2016-01-13 2016-04-06 陈包容 Address list contact person merging method and device
WO2018121649A1 (en) * 2016-12-29 2018-07-05 Zhejiang Geely Holding Group Co., Ltd. Incoming call management method and apparatus
US10659587B2 (en) 2016-12-29 2020-05-19 Zhejiang Geely Holding Group Co., Ltd. Incoming call management method and apparatus
CN107370863A (en) * 2017-08-11 2017-11-21 北京安云世纪科技有限公司 A kind of link information update method and device based on bluetooth connection
CN112399011A (en) * 2019-10-12 2021-02-23 上海赛连信息科技有限公司 Intelligent call recording method and device

Also Published As

Publication number Publication date
CN104135563B (en) 2017-03-15
WO2016000636A1 (en) 2016-01-07

Similar Documents

Publication Publication Date Title
CN104135563B (en) A kind of communication processing method and system
CN104113626B (en) A kind of communication processing method and system
US8543144B2 (en) Automated caller identifier from contact lists of a user's contacts
KR102145089B1 (en) Seamless call transitions with pre-escalation participation confirmation
US9882865B1 (en) Multiple phone numbers for mobile device
CN104935500B (en) Friend recommendation method and device based on network call
US11165899B1 (en) Techniques to manage contact records
US11546760B2 (en) Caller verification in rich communication services (RCS)
WO2020124453A1 (en) Automatic information reply method and related apparatus
WO2016123896A1 (en) Information sharing method and device
RU2651159C1 (en) Method and device for marking unknown number
US20160323231A1 (en) Techniques for coordinating a messaging experience across platforms
US10547577B2 (en) Techniques for templated messages
EP3652901A1 (en) Techniques for multi-agent messaging
US20160255181A1 (en) Method and system for providing selective call execution based on user preferences
CN109218506A (en) Method and device for protecting privacy information and mobile terminal
CN107534660B (en) Managing communication events
US9930101B2 (en) Receiving a communication event
CN106385516B (en) A kind of method, apparatus and terminal of the transfer of setting business
CN103179550A (en) Method and device for inquiring information of calling counter parts
US10313503B2 (en) Techniques to reconfigure messaging clients during contact information changes
WO2016019488A1 (en) Communication interception method, device, server and user equipment
CN103200178A (en) Method and device for inquiring and processing conversation party information
US11070677B1 (en) Techniques for media call multiway relay escalation
CN104580070A (en) Method, device and system for confirming network conversations

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220721

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.