CN104135563B - A kind of communication processing method and system - Google Patents

A kind of communication processing method and system Download PDF

Info

Publication number
CN104135563B
CN104135563B CN201410319218.3A CN201410319218A CN104135563B CN 104135563 B CN104135563 B CN 104135563B CN 201410319218 A CN201410319218 A CN 201410319218A CN 104135563 B CN104135563 B CN 104135563B
Authority
CN
China
Prior art keywords
information
opposite end
communication
page
newly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410319218.3A
Other languages
Chinese (zh)
Other versions
CN104135563A (en
Inventor
谭少卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410319218.3A priority Critical patent/CN104135563B/en
Publication of CN104135563A publication Critical patent/CN104135563A/en
Priority to PCT/CN2015/083176 priority patent/WO2016000636A1/en
Application granted granted Critical
Publication of CN104135563B publication Critical patent/CN104135563B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of communication processing method and system, wherein, methods described includes:Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Wherein, the communication information includes:Communication identifier;The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.User is solved when storing unknown communication and identifying by the present invention, the low problem of cumbersome, efficiency.

Description

A kind of communication processing method and system
Technical field
The present invention relates to communication technical field, and in particular to a kind of communication processing method and system.
Background technology
With the continuous development of communication technology, the mode of communication is also more and more, and e.g., user can carry out electricity using mobile phone Words communication, is exchanged immediately using instant chat software.User is often connect when communicating using various communication modes The communication request of some unknown communication marks is received, wherein, some unknown communication marks are that user needs to be preserved, e.g., The unknown communication mark is a friend of active user's new knowledge, is exchanging respective communication identifier between two people. Now, user needs to preserve unknown communication mark, but during the communication identifier is preserved, can exist very Many problems.
By taking mobile communication as an example, user A determines that the unknown incoming call is the good friend of oneself after a unknown incoming call is answered User B is dialed using new cell-phone number after cell-phone number is changed.After hanging up the telephone, unknown next described in user's A want to save The corresponding number of electricity, now, user needs to open the contact person's interpolation page in address list by a series of selection operation of clicking on Then phone number is manually entered into contact person and is added in the page by face, or, by between the page in adding procedure Toggle, first switch to communications records and check the phone number, then switch to contact person again and add described in page input Phone number.
As can be seen here, user is when storing unknown communication and identifying, need to carry out a series of clicking operation open logical Contact person in news record adds the page, and needs frequently to be switched between different interfaces, during cumbersome, waste Between, efficiency low;The experience of user is affected, and also increases operation and the processing load of terminal system.Further, need User is wanted voluntarily to carry out the input of communication identifier, input process is time-consuming long, and input results poor reliability, accuracy are low.
Content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on State a kind of communication processing method and a kind of communication processing system accordingly of problem.
According to one aspect of the present invention, there is provided a kind of communication processing method, including:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Its In, the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
According to a further aspect in the invention, there is provided a kind of communication processing system, including:
Monitoring modular, is monitored for the communication in terminal, obtains the opposite end for currently being communicated with the terminal The communication information;Wherein, the communication information includes:Communication identifier;
Comparison module, for being compared the communication identifier of the opposite end of acquisition with the associated person information in address list application Compared with;
Generation module, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated newly-built Contact person's page;
First add module, for adding corresponding to newly-built contact person's page by the communication identifier of the opposite end of acquisition Position.
A kind of communication processing method and system that the present invention is provided, are monitored by the communication in terminal, are obtained and are worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 is a kind of flow chart of communication processing method in first embodiment of the invention;
Fig. 2 is a kind of flow chart of communication processing method in second embodiment of the invention;
Fig. 3 is a kind of flow chart of the method for judging present communications safety in second embodiment of the invention;
Fig. 4 is a kind of schematic diagram of newly-built contact person's page in second embodiment of the invention;
Fig. 5 is a kind of flow chart of communication processing method in third embodiment of the invention;
Fig. 6 is a kind of schematic diagram of newly-built contact person's page in third embodiment of the invention;
Fig. 7 is a kind of structured flowchart of communication processing system in fourth embodiment of the invention;
Fig. 8 is a kind of structured flowchart of communication processing system in fifth embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Embodiment one
With reference to Fig. 1, a kind of flow chart of communication processing method in first embodiment of the invention is shown.In the present embodiment In, the communication processing method, including:
Step 102, to terminal in communication be monitored, obtain the communication of opposite end for currently being communicated with the terminal Information.
In the present embodiment, terminal is included but are not limited to the communication of opposite end:The telephone relation that carried out by terminal, short Letter, and pass through voice call, the instant message that IM (Instant Messaging, instant messaging) software is carried out.Wherein, commonly use IM softwares include:QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wang Wang etc..
Wherein, to terminal in signal intelligence be monitored and can include:It is logical that the communication and monitoring that monitoring is accessed is breathed out Letter.When present communications are initiated by end side, then the opposite end is recipient, and the terminal is sender;In present communications When being by initiating to side, then the terminal is recipient, and the opposite end is sender.
In the present embodiment, the communication information includes:Communication identifier.It is preferred that when terminal is mobile phone terminal, and enter When capable communication is to call/receive calls and receive and dispatch note, the communication identifier of the opposite end can be the opposite end Phone number.When terminal is PC ends (Personal Computer, personal computer) or mobile phone terminal, and the communication for carrying out is During instant communication session (e.g., QQ voices, QQ videos, wechat etc.), the communication identifier of the opposite end can be the corresponding use in opposite end The instant communication number (e.g., No. QQ, micro-signal etc.) at family.
Step 104, the communication identifier of the opposite end of acquisition is compared with the associated person information in address list application.
Step 106, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, generates newly-built contact person The page.
It is preferred that can when the opposite end for obtaining communication identifier not in the address list of terminal when, or, when obtaining The communication identifier of the opposite end for taking is not good friend's number (e.g., QQ good friends number, wechat good friend number in the instant messaging of user Code etc.) when, determine that the communication identifier of the opposite end for obtaining is mismatched with the associated person information, be a strange communication identifier.
Step 108, the communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
In the present embodiment, the communication identifier of the opposite end of acquisition can be automatically added to newly-built contact person's page Correspondence position.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
Embodiment two
In the present embodiment, should for executing the third party that can be mounted in end side of the communication processing method With.But, those skilled in the art are it should be apparent that be not limited in end side for execute the communication processing method Third-party application, for execute the communication processing method can also be terminal One function module, e.g., the function mould Block is arranged in the address list application of the operating system or terminal of terminal.Or, for executing the communication processing method The One function module in the third-party application of end side is can also be, such as:Safety applications (e.g., 360 mobile phone safe in terminal Bodyguard) in One function module.
With reference to Fig. 2, a kind of flow chart of communication processing method in second embodiment of the invention is shown.In the present embodiment In, the communication processing method, including:
Step 202, third-party application to terminal in communication be monitored, obtain and currently communicated with the terminal The communication information of opposite end.Wherein, the communication information includes:Communication identifier.
In the present embodiment, the communication for carrying out between terminal and opposite end can be voice communication (e.g., telephone communication, QQ languages Sound communication etc.), or video communication (e.g., visual telephone, QQ video callings etc.), can also be that textcommunication is (e.g., short Letter, the text chat carried out using QQ etc.).
It is preferred that communication processing method described in the present embodiment can with but be not limited only to execute in the case of several as follows:
Present communications be when the opposite end is initiated to the terminal,
The communication processing method is executed after the terminal is connected and then hangs up the communication;Or in access failure and then hang up The communication processing method is executed after the communication.
Present communications be when the terminal is initiated to the opposite end,
The communication processing method is executed after the terminal is put through and then hangs up the communication;Or do not putting through and then hanging up The communication processing method is executed after the communication.
The communication identifier of the opposite end of acquisition is entered by step 204, third-party application with the associated person information in address list application Row compares.
In the present embodiment, when the communication identifier of the opposite end for obtaining is matched with the associated person information, then described right The contact person or good friend for holding corresponding user to be the corresponding user of the terminal, can directly terminate this flow process.
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, execution step 206.
Step 206, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, third-party application judges The safety of present communications.
It is preferred that the third-party application is when the safety of present communications is judged, can directly pass through the third party Analysis module in application is directly judged, it is also possible to which by calling other safety applications, (e.g., 360 mobile phone safes are defended Scholar) judged, the present embodiment is not restricted to this.
Specifically, with reference to Fig. 3, a kind of method for judging present communications safety in second embodiment of the invention is shown Flow chart.In the present embodiment, the step 206, can specifically include:
Sub-step S302, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, third-party application The communication identifier of the opposite end is compared with data in preset black/white list.
It is preferred that the data stored in white list are that to have determined as be the corresponding communication identifier of safe communication.Black name In list store data be have determined as be swindle communication, and/or spoofing communication, and/or fishing communication, And/or the communication of wooden horse, and/or the corresponding communication identifier of the communication of pseudo-base station.
In the present embodiment,
If the communication identifier of the opposite end and the data match in blacklist, can determine that the present communications are high The risk communication (e.g., swindle communication, pseudo-base station communication etc.) of danger, now, third-party application directly intercepts present communications, terminates this Secondary flow process.
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are that safety is logical Letter.It is preferred that in order to be further ensured that present communications are secure communications, improving the accurate of present communications safety judged result Property, during data match in communication identifier and the white list of the opposite end, sub-step S304 can be continued executing with.
Explanation is needed exist for, when the communication identifier of the opposite end is neither in the blacklist nor in the white name When in list, in order to improve the accuracy of present communications safety judged result, it is also possible to continue executing with sub-step S304.
Sub-step S304, third-party application obtain the call information and labelling letter of the opposite end communicated with the terminal Breath.
It is preferred that the call information includes:The exhalation of the opposite end and incoming call number of times, when the opposite end exhalation and incoming call Communication time, jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, institute The number of times that opposite end sends and receives information is stated, the communication identifier of the opposite end is added into contact person and is added into blacklist At least one in number of times;The label information includes:The communication identifier of the opposite end is marked as malice and/or garbage communication Number of times, the number of times that the communication identifier of the opposite end occurs on the page for being defined as malice and/or rubbish network address, using described The information that the communication identifier of opposite end sends is marked as at least one in the number of times of malice and/or junk information.
The call information and/or label information and preset interception strategy are carried out by sub-step S306, third-party application Match somebody with somebody, determine matching result.
In the present embodiment, the preset strategy that intercepts includes that many height intercept strategy;Wherein, strategy point is intercepted per height Do not match with corresponding call information and label information.It is preferred that the third-party application is by the call information and/or mark Note information is mated with preset interception strategy, determines that matching result can specifically include:According to the call information and/or mark Note information determines that the son matched with the current call intercepts the quantity of strategy.
Sub-step S308, third-party application determine the risk class of the present communications according to the matching result.
In the present embodiment, the risk class for determining present communications according to the matching result, can specifically include: Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications.Wherein,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk levels Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined Front communication is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
It is preferred that
When the risk class for determining the present communications according to the matching result is high-risk rank, third-party application can Directly to intercept present communications, terminate this flow process.
When the risk class for determining the present communications according to the matching result is risk class or level of suspicion, the Can there is risk to point out user's present communications, while can be with execution step with loaded and displayed indicating risk information in tripartite's application 208.
When the risk class for determining the present communications according to the matching result is level of security, determine described current Communication is secure communication, execution step 208.
Step 208, third-party application generate newly-built contact person's page.
It is preferred that the generating process in order to ensure newly-built contact person's page meets the expectation of user, can generate Before newly-built contact person's page, the distance between terminal and opposite end are judged, detailed process is as follows:
First, third-party application obtains the terminal of the present communications and the positional information of opposite end respectively.Wherein, institute's rheme The acquisition of confidence breath can adopt location information acquisition method known to any one.
Then, third-party application according to the positional information of the terminal and opposite end determine the terminal and the opposite end away from From.
Finally, when the distance is less than or equal to setpoint distance, above-mentioned steps 208 are executed, third-party application generates newly-built Contact person's page.
Another it is preferred that the generating process in order to ensure newly-built contact person's page meets the expectation of user, third party Application can obtain the terminal of the present communications and the network information of opposite end before newly-built contact person's page is generated respectively. Wherein, the network information is included but is not limited to:Wireless Fidelity WIFI (WIreless-FIdelity, Wireless Fidelity) information, base At least one that stands in information and LAN Information.Third-party application determines whether the terminal and the opposite end have identical The network information, when determining that the terminal and the opposite end have the identical network information, executes the newly-built contact person of the generation The step of page.
For example, third-party application obtains the WIFI information of terminal and opposite end respectively from cloud server.Then, third party should Determine whether the terminal and the opposite end share same WIFI with the WIFI information according to the terminal and opposite end.Finally, when When determining that the terminal and the opposite end share same WIFI, third-party application executes the step for generating newly-built contact person's page Suddenly.
In the present embodiment, the third-party application generates newly-built contact page mask body and can include:Third-party application Newly-built contact person's page is generated according to form is set.
It is preferred that the third-party application generates newly-built contact person's page according to form is set, when implementing, Newly-built contact person can be generated by calling the address list application according to the corresponding default form of the system address list application The page.Wherein, the address list application can be the system address list application of end side, now, set form then logical for system The template of the corresponding newly-built contact person's page of letter record application.The address list application can also be the third-party application or its Template in its application, the form of the template are matched with the form of newly-built contact person's page, so that stating for generating is newly-built The form of contact person's page is more diversified, abundantization, meets user's request.
It is preferred that the setting form is included but are not limited to:Communication identifier, name, sex, company information, electronics postal At least one in part, birthday, address, hobby and head portrait option.
Such as, with reference to Fig. 4, it is a kind of schematic diagram of newly-built contact person's page in second embodiment of the invention.Described newly-built It is that the form of people's page includes:Communication identifier, name, four options of sex and Email.
Step 210, it is right to newly-built contact person's page that the communication identifier of the opposite end of acquisition is added by third-party application Answer position.
Such as, the communication identifier of the opposite end of acquisition is added right to the communication identifier option shown in Fig. 4 by third-party application Answer at position.
Step 212, third-party application obtain the personal information of the corresponding user in the opposite end from high in the clouds.
If it is preferred that the personal information of oneself has been uploaded to cloud server side by the corresponding user in the opposite end, this When, the third-party application except communication that can be in terminal be monitored when, obtain currently led to the terminal The communication identifier of the opposite end of letter, can be with the more information from the high in the clouds acquisition opposite end, i.e. the personal information of user.Wherein, The personal information includes:Name information, gender information, company information, e-mail address, birthday by information, address information, love At least one in good information and head image information.
Step 214, third-party application add the personal information of acquisition to the corresponding option position set in form Place.
Step 216, the interpolation request of third-party application response user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request Add at least one in request with head image information.
Step 218, third-party application by described add ask corresponding information add to described set in form correspond to At option position.
Such as, name information is added the corresponding information of request and is added to the name option pair shown in Fig. 4 by third-party application At the position that answers, gender information is added the corresponding information of request and is added to the corresponding position of sex option shown in Fig. 4, Deng.
Step 220, third-party application response preserve operation requests, and the newly-built contact person's renewal of the page for completing to add is preserved Into address list application.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve Safety.
Embodiment three
In conjunction with above-described embodiment, a kind of communication processing method is described in detail below by an instantiation.
In the present embodiment, by taking mobile phone communication as an example, i.e. terminal and opposite end are mobile phone terminal, the communication for carrying out is handss Machine is conversed, and, present communications are the call requests that is initiated to terminal from opposite end.Connect the call request of opposite end, hang up in terminal After phone, or do not answer in terminal and after the call request of opposite end, call request terminate, execute the communication processing method, have Body ground, the flow process of the communication processing method are as follows:
With reference to Fig. 5, a kind of flow chart of communication processing method in third embodiment of the invention is shown.In the present embodiment In, the communication processing method, including:
Step 502, third-party application to terminal in communication be monitored, obtain and currently communicated with the terminal The telephone number of opposite end.
Wherein, the third-party application is mounted in the application in terminal (e.g., mobile phone terminal).
The telephone number of acquisition and associated person information are compared by step 504, third-party application.
It is preferred that when the telephone number for obtaining is matched with associated person information, it may be determined that initiating call to terminal please The corresponding user in the opposite end asked is the contact person of the corresponding user of the terminal, is a known number, now directly can tie Shu Benci flow processs.
When the telephone number for obtaining is not matched that with associated person information, i.e., incoming call is strangeness numbers, now execution step 506.
Step 506, third-party application judge the safety of present communications.
Third-party application judges that the method for the safety of present communications is referred to the method in previous embodiment, can be by Present communications are divided into high-risk rank, risk class, level of suspicion and level of security.Need exist for explanation, present communications Rank can include but are not limited to above-mentioned four kinds of ranks.
When determining that present communications are high-risk rank, present communications are intercepted directly, terminates this flow process.
When determining that present communications are risk class or level of suspicion, execution step 508.
When determination present communications are level of securitys, i.e., when present communications are secure communications, execution step 510.
Step 508, third-party application generate the indicating risk page.
It is preferred that third-party application loaded and displayed indicating risk information on the indicating risk page, points out user to work as Front communication is risk communication or suspicious traffic.Meanwhile, also include in the indicating risk page:First trigger action option and Two trigger action options.Wherein, if user triggers the first trigger action option after indicating risk information is browsed, take Disappear the newly-built contact person's page of generation, that is, terminate this flow process;If user triggers described second after indicating risk information is browsed Trigger action option, then execution step 510.
Step 510, when user triggers the second trigger action option, third-party application generates newly-built contact page Face.
It is preferred that third-party application generates newly-built contact person's page according to form is set.Wherein, the setting form Include but are not limited to:Communication identifier, name, sex, company information, Email, birthday, address, hobby and head portrait option In at least one.Newly-built contact person's page can be the newly-built contact person's page in the system communication record of mobile phone terminal, also may be used To be the newly-built contact person's page different from system communication record of third-party application setting, but with system communication record identical it is, Newly-built contact person's page that the third-party application is arranged equally can preserve associated person information to used in system, or, Associated person information can be passed to system communication record, be preserved and use by system communication record.With reference to Fig. 6, it is the present invention the A kind of schematic diagram of newly-built contact person's page in three embodiments.In the present embodiment.The form bag of newly-built contact person's page Include:Communication identifier, name, four options of sex and Email.Wherein, when newly-built contact person's page is arranged for third-party application Newly-built contact person's page when, the form of the page can be identical with the form of newly-built contact person's page of system communication record, Can be with difference.
Step 512, third-party application obtain the personal information of the corresponding user in the opposite end from high in the clouds, and by the individual The telephone number of information and the opposite end for obtaining adds to the correspondence position of newly-built contact person's page.Wherein, the personal letter Breath includes:Name information, gender information, company information, e-mail address, birthday by information, address information, preference information and head As at least one in information.
Such as, with reference to Fig. 6, during third-party application adds the name information " Zhang San " for obtaining to corresponding name option, will During the telephone number " 123456 " for obtaining in step 502 adds to corresponding telephone number option.
Step 514, the interpolation request of third-party application response user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request Add at least one in request with head image information.
Step 516, third-party application by described add ask corresponding information add to described set in form correspond to At option position.
Such as, with reference to Fig. 6, user directly can be input into " man " at the corresponding position of sex option, in E-mail option " 123@456.com " is input at corresponding position.
Step 518, third-party application response preserve operation requests, and the newly-built contact person's renewal of the page for completing to add is preserved Into address list application.
Need exist for explanation, when the present communications are the call request that is initiated from terminal to opposite end, Ke Yican Flow process according to the communication processing method of the present embodiment is processed.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
And, when the personal information of the corresponding user of the terminal and opposite end that interact is preserved beyond the clouds, can be direct The detailed personal information of user is obtained from high in the clouds, the every content that improves in newly-built contact person's page improves newly-built contact person The content intact degree of the page, reduces the operation that user's verification is searched.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve Safety.
It should be noted that for aforesaid embodiment of the method, in order to be briefly described, therefore which is all expressed as a series of Combination of actions, but those skilled in the art should know, and the present invention is not limited by described sequence of movement, because according to According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art should also know, Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
It is based on and the same inventive concept of said method embodiment, with reference to Fig. 7, shows a kind of in fourth embodiment of the invention The structured flowchart of communication processing system.In the present embodiment, the communication processing system, including:
Monitoring modular 702, is monitored for the communication in terminal, and it is currently right with what the terminal was communicated to obtain The communication information at end.
Wherein, the communication information includes:Communication identifier.
Comparison module 704, for carrying out the communication identifier of the opposite end of acquisition with the associated person information in address list application Relatively.
Generation module 706, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated new Build contact person's page.
First add module 708, for adding the communication identifier of the opposite end of acquisition to newly-built contact person's page Correspondence position.
In sum, the communication processing system described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
Embodiment five
With reference to Fig. 8, a kind of structured flowchart of communication processing system in fifth embodiment of the invention is shown.In the present embodiment In, the communication processing system, including:
Monitoring modular 802, is monitored for the communication in terminal, and it is currently right with what the terminal was communicated to obtain The communication information at end.Wherein, the communication information includes:Communication identifier.
Comparison module 804, for carrying out the communication identifier of the opposite end of acquisition with the associated person information in address list application Relatively.
Judge module 806, when mismatching with the associated person information for the communication identifier in the opposite end for obtaining, judges to work as The safety of front communication.
It is preferred that the judge module 806, including:
Data comparison module 8062, for being compared the communication identifier of the opposite end with data in preset black/white list Compared with.
First determining module 8064, during for data match in the communication identifier of the opposite end and white list, really The fixed present communications are secure communications.
It is preferred that after determining that the present communications are secure communication, data obtaining module 8068 can be continued executing with.
Second determining module 8066, during for data match in the communication identifier of the opposite end and blacklist, really The fixed present communications are high-risk communication.
It is preferred that when determining that present communications are high-risk communication, directly can be carried out to present communications by blocking module Intercept, receive this flow process.
Data obtaining module 8068, for obtaining the call information and labelling letter of the opposite end communicated with the terminal Breath.
It is preferred that the call information includes:The exhalation of the opposite end and incoming call number of times, when the opposite end exhalation and incoming call Communication time, jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, institute The number of times that opposite end sends and receives information is stated, the communication identifier of the opposite end is added into contact person and is added into blacklist At least one in number of times;The label information includes:The communication identifier of the opposite end is marked as malice and/or garbage communication Number of times, the number of times that the communication identifier of the opposite end occurs on the page for being defined as malice and/or rubbish network address, using described The information that the communication identifier of opposite end sends is marked as at least one in the number of times of malice and/or junk information.
Matching module 80610, for the call information and/or label information are mated with preset interception strategy, Determine matching result.
It is preferred that the preset strategy that intercepts includes that many height intercept strategy;Wherein, per height intercept strategy respectively with right The call information and label information that answers matches.
In the present embodiment, the matching module 80610, specifically for according to the call information and/or label information Determine that the son matched with the current call intercepts the quantity of strategy.
Risk class determining module 80612, for determining the risk class of the present communications according to the matching result.
In the present embodiment, the risk class determining module 80612, specifically for basis and the present communications phase The son that matches somebody with somebody intercepts the risk class that the quantity of strategy determines present communications.Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk levels Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined Front communication is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
Module 80614 is completely determined, in the risk class that the present communications are determined according to the matching result being Level of security, it is determined that the present communications are secure communications.
It is preferred that when determining that the present communications are secure communication, can be with execution position data obtaining module 808.
Position information acquisition module 808, for obtaining the terminal of the present communications and the positional information of opposite end respectively.
Apart from determining module 810, for determining the terminal and described right according to the positional information of the terminal and opposite end The distance at end.
It is preferred that when described determine that the distance is less than or equal to setpoint distance apart from determining module 810 when, execute the life Into module 816.
Another it is preferred that when determining that the present communications are secure communication, network information acquisition module can be executed 812.
Network information acquisition module 812, for, before the generation module generates newly-built contact person's page, obtaining respectively The terminal of the present communications and the network information of opposite end.Wherein, the network information include following at least one:Wireless Fidelity WIFI information, base station information, LAN Information.
Network information determining module 814, for determining whether the terminal and the opposite end have the identical network information; When determining that the terminal and the opposite end have the identical network information, the generation module 816 is executed.
Generation module 816, for generating newly-built contact person's page.It is preferred that the generation module 816, specifically for When the opposite end communication identifier of acquisition is mismatched with the associated person information, the newly-built contact page is generated according to form is set Face.Wherein, the setting form includes:Communication identifier, name, sex, company information, Email, birthday, address, hobby With at least one in head portrait option.
Another it is preferred that the generation module 816, specifically for believing with the contact person in the opposite end communication identifier for obtaining When breath is mismatched, the system address list application is called, generated according to the corresponding default form of the system address list application new Build contact person's page.
Personal information acquisition module 818, for obtaining the personal information of the corresponding user in the opposite end from high in the clouds.
Wherein, the personal information includes:Name information, gender information, company information, e-mail address, birthday letter At least one in breath, address information, preference information and head image information.
3rd add module 820, for adding the personal information of acquisition to the corresponding option bit set in form Put place.
First add module 822, for adding the communication identifier of the opposite end of acquisition to newly-built contact person's page Correspondence position.
First respond module 824, asks for responding the interpolation of user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request Add at least one in request with head image information;
Second add module 826, for right in asking corresponding information to be added to the setting form interpolation Answer at option position.
Second respond module 828, preserves operation requests for responding, and the newly-built contact person's renewal of the page for completing to add is protected In depositing to address list application.
In the present embodiment, the communication processing system can after present communications access failure is hung up or connect hang up it After execute.Wherein, the present communications include:At least one in voice communication, video communication and textcommunication.
In sum, the communication processing system described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information; When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure, Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further, Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves Efficiency, while ensure that the accuracy of result.
And, when the personal information of the corresponding user of the terminal and opposite end that interact is preserved beyond the clouds, can be direct The detailed personal information of user is obtained from high in the clouds, the every content that improves in newly-built contact person's page improves newly-built contact person The content intact degree of the page, reduces the operation that user's verification is searched.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve Safety.
For said apparatus embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, Related part is illustrated referring to the part of embodiment of the method.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the above description done by language-specific is to disclose this Bright preferred forms.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case where not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure helping understand one or more in each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, should not be construed to reflect following intention by the method for the disclosure:I.e. required guarantor The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art be appreciated that can to embodiment in equipment in module carry out adaptively Change and they are arranged in one or more equipment different from the embodiment.Can be the module in embodiment or list Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can identical by offers, be equal to or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In some included features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) come realize in communication processing equipment according to embodiments of the present invention some or The some or all functions of the whole parts of person.The present invention is also implemented as executing one of method as described herein Divide or whole equipment or program of device (for example, computer program and computer program).Such realize this Bright program can be stored on a computer-readable medium, or can have the form of one or more signal.Such Signal can be downloaded from internet website and be obtained, or provide on carrier signal, or be provided with any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss being located between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before being located at element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer Existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.
The invention discloses A1, a kind of communication processing method, including:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Its In, the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
A2, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
The terminal of the present communications and the positional information of opposite end are obtained respectively;
Positional information according to the terminal and opposite end determines the distance of the terminal and the opposite end;
When the distance be less than or equal to setpoint distance when, execute described generation newly-built contact person's page the step of.
A3, the method as described in A1, the newly-built contact person's page of the generation, including:
Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, surname At least one in name, sex, company information, Email, birthday, address, hobby and head portrait option.
A4, the method as described in A3, described according to set form generate described in build contact person's page, including:
The address list application is called, and newly-built contact person is generated according to the corresponding default form of the system address list application The page.
A5, the method as described in A3, the communication identifier in the opposite end by acquisition are added to the newly-built contact page After the step of correspondence position in face, methods described also includes:
The interpolation request of response user;Wherein, the interpolation request includes:Name information adds request, gender information and adds Plus request, company information add request, e-mail address add request, birthday by information add request, address information add please Ask, preference information adds request and head image information adds at least one in request;
Corresponding information is asked to be added to the corresponding option position set in form described interpolation.
A6, the method as described in A3, described generation newly-built contact person's page the step of after, methods described also includes:
The personal information of the corresponding user in the opposite end is obtained from high in the clouds;Wherein, the personal information includes:Name is believed In breath, gender information, company information, e-mail address, birthday by information, address information, preference information and head image information extremely Few one kind;
The personal information of acquisition is added to the corresponding option position set in form.
A7, the method as described in A1, the communication identifier in the opposite end by acquisition are added to the newly-built contact page After the step of correspondence position in face, methods described also includes:
Response preserves operation requests, during the newly-built contact person's renewal of the page for completing to add is preserved to address list application.
A8, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
Judge the safety of present communications;
When judging that the present communications are secure communication, execute described generation newly-built contact person's page the step of.
A9, the method as described in A8, the safety of the judgement present communications, including:
The communication identifier of the opposite end is compared with data in preset black/white list;
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are that safety is logical Letter;
If the communication identifier of the opposite end and the data match in blacklist, it is determined that the present communications are high-risk logical Letter.
A10, the method as described in A8, the safety of the judgement present communications, including:
Obtain the call information and label information of the opposite end communicated with the terminal;Wherein, the call information bag Include:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call, the opposite end exhalation and incoming call When jingle bell duration, the Annual distribution information when opposite end is communicated, the opposite end send and receive the number of times of information, institute The communication identifier for stating opposite end is added into contact person and at least one being added in the number of times of blacklist;The label information Including:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, and the communication identifier of the opposite end is true It is set to the number of times that occur on the page of malice and/or rubbish network address, the information sent using the communication identifier of the opposite end is marked At least one being designated as in the number of times of malice and/or junk information;
The call information and/or label information are mated with preset interception strategy, matching result is determined;
According to the risk class that the matching result determines the present communications;
If determining that the risk class of the present communications is level of security according to the matching result, it is determined that described current Communication is secure communication.
A11, the method as described in A10, the preset strategy that intercepts include that many height intercept strategy;Wherein, block per height Cut strategy to match with corresponding call information and label information respectively.
The call information and/or label information described are carried out by A12, the method as described in A11 with preset interception strategy Coupling determines matching result, including:
Determine that the son matched with the current call intercepts the number of strategy according to the call information and/or label information Amount.
A13, the method as described in A12, the risk class for determining present communications according to the matching result, including:
Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications;Its In,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk levels Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined Front communication is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
A14, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
The terminal of the present communications and the network information of opposite end are obtained respectively;Wherein, the network information includes following At least one:Wireless Fidelity WIFI information, base station information, LAN Information;
Determine whether the terminal and the opposite end have the identical network information;
When determining that the terminal and the opposite end have the identical network information, the newly-built contact page of the generation is executed The step of face.
A15, the method as described in A1-A14 is arbitrary, the communication processing method after present communications access failure is hung up or Connection is executed after hanging up;Wherein, the present communications include:In voice communication, video communication and textcommunication at least one Kind.
The invention also discloses B16, a kind of communication processing system, including:
Monitoring modular, is monitored for the communication in terminal, obtains the opposite end for currently being communicated with the terminal The communication information;Wherein, the communication information includes:Communication identifier;
Comparison module, for being compared the communication identifier of the opposite end of acquisition with the associated person information in address list application Compared with;
Generation module, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated newly-built Contact person's page;
First add module, for adding corresponding to newly-built contact person's page by the communication identifier of the opposite end of acquisition Position.
B17, the system as described in B16, the system also include:
Position information acquisition module, for, before the generation module generates newly-built contact person's page, obtaining institute respectively State the terminal of present communications and the positional information of opposite end;
Apart from determining module, for determining the terminal and the opposite end according to the positional information of the terminal and opposite end Distance;When the distance is less than or equal to setpoint distance, the generation module is executed.
B18, the system as described in B16,
The generation module, during specifically for being mismatched with the associated person information in the opposite end communication identifier for obtaining, is pressed Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, name, sex, public affairs At least one in department's information, Email, birthday, address, hobby and head portrait option.
B19, the system as described in B18,
The generation module, during specifically for being mismatched with the associated person information in the opposite end communication identifier for obtaining, is adjusted With the system address list application, newly-built contact person's page is generated according to the corresponding default form of the system address list application.
B20, the system as described in B18, the system also include:
First respond module, for adding the communication identifier of the opposite end of acquisition to described new in first add module After building the correspondence position of contact person's page, the interpolation request of user is responded;Wherein, the interpolation request includes:Name information Interpolation request, gender information add to be asked, company information adds asks, e-mail address adds request, birthday by information interpolation Request, address information are added request, preference information interpolation request and head image information and add at least one in request;
Second add module, for asking corresponding information to be added to the corresponding choosing set in form described interpolation At item position.
B21, the system as described in B18, the system also include:
Personal information acquisition module, after generating newly-built contact person's page in the generation module, obtains from high in the clouds The personal information of the corresponding user in the opposite end;Wherein, the personal information includes:Name information, gender information, company's letter At least one in breath, e-mail address, birthday by information, address information, preference information and head image information;
3rd add module, for adding the personal information of acquisition to the corresponding option position set in form Place.
B22, the system as described in B16, the system also include:
Second respond module, for adding the communication identifier of the opposite end of acquisition to described new in first add module After building the correspondence position of contact person's page, response preserves operation requests, and the newly-built contact person's renewal of the page for completing to add is protected In depositing to address list application.
B23, the system as described in B16, the system also include:
Judge module, for, before the generation module generates newly-built contact person's page, judging the safety of present communications Property;When judging that the present communications are secure communication, the generation module is executed.
B24, the system as described in B23, the judge module, including:
Data comparison module, for the communication identifier of the opposite end is compared with data in preset black/white list;
First determining module, during for data match in the communication identifier of the opposite end and white list, determines institute It is secure communication to state present communications;
Second determining module, during for data match in the communication identifier of the opposite end and blacklist, determines institute It is high-risk communication to state present communications.
B25, the system as described in B23, the judge module, including:
Data obtaining module, for obtaining the call information and label information of the opposite end communicated with the terminal;Its In, the call information includes:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call, Jingle bell duration when the opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, the opposite end send With the number of times of receive information, the communication identifier of the opposite end is added into contact person and is added in the number of times of blacklist extremely Few one kind;The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, institute The number of times that the communication identifier of opposite end occurs on the page for being defined as malice and/or rubbish network address is stated, using the logical of the opposite end Beacon knows at least one that the information for sending is marked as in the number of times of malice and/or junk information;
Matching module, for the call information and/or label information are mated with preset interception strategy, determination Match somebody with somebody result;
Risk class determining module, for determining the risk class of the present communications according to the matching result;
Module is completely determined, for being safe level in the risk class that the present communications are determined according to the matching result Not, it is determined that the present communications are secure communications.
B26, the system as described in B25, the preset strategy that intercepts include that many height intercept strategy;Wherein, block per height Cut strategy to match with corresponding call information and label information respectively.
B27, the system as described in B26,
The matching module, specifically for determining and the current call according to the call information and/or label information The son for matching intercepts the quantity of strategy.
B28, the system as described in B27,
The risk class determining module, specifically for intercepting the number of strategy according to the son matched with the present communications Amount determines the risk class of present communications;Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk levels Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined Front communication is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
B29, the system as described in B16, the system also include:
Network information acquisition module, for, before the generation module generates newly-built contact person's page, obtaining institute respectively State the terminal of present communications and the network information of opposite end;Wherein, the network information include following at least one:Wireless Fidelity WIFI information, base station information, LAN Information;
Network information determining module, for determining whether the terminal and the opposite end have the identical network information;When When determining that the terminal and the opposite end have the identical network information, the generation module is executed.
B30, the system as described in B16-B29 is arbitrary, the communication processing system after present communications access failure is hung up or Connection is executed after hanging up;Wherein, the present communications include:In voice communication, video communication and textcommunication at least one Kind.

Claims (28)

1. a kind of communication processing method, it is characterised in that include:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Wherein, institute Stating the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page;
Before the step of the generation newly-built contact person's page, methods described also includes:
The terminal of present communications and the positional information of opposite end are obtained respectively;
Positional information according to the terminal and opposite end determines the distance of the terminal and the opposite end;
When the distance be less than or equal to setpoint distance when, execute described generation newly-built contact person's page the step of.
2. the method for claim 1, it is characterised in that the newly-built contact person's page of the generation, including:
Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, name, property Not, at least one in company information, Email, birthday, address, hobby and head portrait option.
3. method as claimed in claim 2, it is characterised in that described according to set form generate described in build contact person's page, Including:
The address list application is called, and newly-built contact person's page is generated according to the corresponding default form of the address list application.
4. method as claimed in claim 2, it is characterised in that the communication identifier in the opposite end by acquisition adds to described After the step of correspondence position of newly-built contact person's page, methods described also includes:
The interpolation request of response user;Wherein, the interpolation request includes:Name information adds request, gender information's interpolation please Ask, company information adds request, e-mail address adds request, birthday by information adds request, address information adds request, love Good information adds request and head image information adds at least one in request;
Corresponding information is asked to be added to the corresponding option position set in form described interpolation.
5. method as claimed in claim 2, it is characterised in that after the step of the generation newly-built contact person's page, institute Stating method also includes:
The personal information of the corresponding user in the opposite end is obtained from high in the clouds;Wherein, the personal information includes:Name information, property In other information, company information, e-mail address, birthday by information, address information, preference information and head image information at least one Kind;
The personal information of acquisition is added to the corresponding option position set in form.
6. the method for claim 1, it is characterised in that the communication identifier in the opposite end by acquisition adds to described After the step of correspondence position of newly-built contact person's page, methods described also includes:
Response preserves operation requests, during the newly-built contact person's renewal of the page for completing to add is preserved to address list application.
7. the method for claim 1, it is characterised in that before the step of the generation newly-built contact person's page, institute Stating method also includes:
Judge the safety of present communications;
When judging that the present communications are secure communication, execute described generation newly-built contact person's page the step of.
8. method as claimed in claim 7, it is characterised in that the safety of the judgement present communications, including:
The communication identifier of the opposite end is compared with data in preset black/white list;
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are secure communications;
If the communication identifier of the opposite end and the data match in blacklist, it is determined that the present communications are high-risk communication.
9. method as claimed in claim 7, it is characterised in that the safety of the judgement present communications, including:
Obtain the call information and label information of the opposite end communicated with the terminal;Wherein, the call information includes:Institute Exhalation and the incoming call number of times of opposite end, the opposite end exhalation and communication time during incoming call is stated, when the opposite end exhalation and incoming call Jingle bell duration, the Annual distribution information when opposite end is communicated, the opposite end send and receive the number of times of information, described right The communication identifier at end is added into contact person and at least one being added in the number of times of blacklist;The label information bag Include:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, and the communication identifier of the opposite end is determining For the number of times occurred on the page of malice and/or rubbish network address, it is labeled using the information of the communication identifier transmission of the opposite end For at least one in the number of times of malice and/or junk information;
The call information and/or label information are mated with preset interception strategy, matching result is determined;
According to the risk class that the matching result determines the present communications;
If determining that the risk class of the present communications is level of security according to the matching result, it is determined that the present communications It is secure communication.
10. method as claimed in claim 9, it is characterised in that the preset strategy that intercepts includes that many height intercept strategy;Its In, strategy is intercepted per height to match with corresponding call information and label information respectively.
11. methods as claimed in claim 10, it is characterised in that described by the call information and/or label information with pre- Putting interception strategy carries out coupling determination matching result, including:
Determine that the son matched with current call intercepts the quantity of strategy according to the call information and/or label information.
12. methods as claimed in claim 11, it is characterised in that the wind for determining present communications according to the matching result Dangerous rank, including:
Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications;Wherein,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk ranks;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, determine described current logical Letter is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical Letter is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
13. the method for claim 1, it is characterised in that before the step of the generation newly-built contact person's page, institute Stating method also includes:
The terminal of present communications and the network information of opposite end are obtained respectively;Wherein, the network information include following at least one: Wireless Fidelity WIFI information, base station information, LAN Information;
Determine whether the terminal and the opposite end have the identical network information;
When determining that the terminal and the opposite end have the identical network information, the newly-built contact person's page of the generation is executed Step.
14. methods as described in claim 1-13 is arbitrary, it is characterised in that the communication processing method is not connect in present communications Logical hanging up after rear or connection is hung up executes;Wherein, the present communications include:Voice communication, video communication and textcommunication In at least one.
15. a kind of communication processing systems, it is characterised in that include:
Monitoring modular, is monitored for the communication in terminal, obtains the logical of the opposite end that currently communicated with the terminal Letter information;Wherein, the communication information includes:Communication identifier;
Comparison module, for the communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
Generation module, when mismatching with the associated person information for the communication identifier in the opposite end for obtaining, generates newly-built contact People's page;
First add module, for adding the communication identifier of the opposite end of acquisition to the corresponding position of newly-built contact person's page Put;
Position information acquisition module, current logical for, before the generation module generates newly-built contact person's page, obtaining respectively The terminal of letter and the positional information of opposite end;
Apart from determining module, for according to the positional information of the terminal and opposite end determine the terminal and the opposite end away from From;When the distance is less than or equal to setpoint distance, the generation module is executed.
16. systems as claimed in claim 15, it is characterised in that
The generation module, during specifically for mismatching with the associated person information in the opposite end communication identifier for obtaining, according to setting The formula that fixes generates newly-built contact person's page;Wherein, the setting form includes:Communication identifier, name, sex, company's letter At least one in breath, Email, birthday, address, hobby and head portrait option.
17. systems as claimed in claim 16, it is characterised in that
The generation module, during specifically for mismatching with the associated person information in the opposite end communication identifier for obtaining, calls institute Address list application is stated, and newly-built contact person's page is generated according to the corresponding default form of the address list application.
18. systems as claimed in claim 16, it is characterised in that the system also includes:
First respond module, for adding the communication identifier of the opposite end of acquisition to described newly-built in first add module Be people's page correspondence position after, respond user interpolation request;Wherein, the interpolation request includes:Name information adds Request, gender information add to be asked, company information interpolation is asked, e-mail address adds request, birthday by information interpolation is asked, Address information is added request, preference information and adds at least one in request and head image information interpolation request;
Second add module, for asking corresponding information to be added to the corresponding option bit set in form described interpolation Put place.
19. systems as claimed in claim 16, it is characterised in that the system also includes:
Personal information acquisition module, after generating newly-built contact person's page in the generation module, obtains from high in the clouds described The personal information of the corresponding user in opposite end;Wherein, the personal information includes:Name information, gender information, company information, electricity At least one in sub- addresses of items of mail, birthday by information, address information, preference information and head image information;
3rd add module, for adding the personal information of acquisition to the corresponding option position set in form.
20. systems as claimed in claim 15, it is characterised in that the system also includes:
Second respond module, for adding the communication identifier of the opposite end of acquisition to described newly-built in first add module Be people's page correspondence position after, response preserve operation requests, by complete add newly-built contact person's renewal of the page preserve to In address list application.
21. systems as claimed in claim 15, it is characterised in that the system also includes:
Judge module, for, before the generation module generates newly-built contact person's page, judging the safety of present communications;? When to judge the present communications be secure communication, the generation module is executed.
22. systems as claimed in claim 21, it is characterised in that the judge module, including:
Data comparison module, for the communication identifier of the opposite end is compared with data in preset black/white list;
First determining module, during for data match in the communication identifier of the opposite end and white list, determines described working as Front communication is secure communication;
Second determining module, during for data match in the communication identifier of the opposite end and blacklist, determines described working as Front communication is high-risk communication.
23. systems as claimed in claim 21, it is characterised in that the judge module, including:
Data obtaining module, for obtaining the call information and label information of the opposite end communicated with the terminal;Wherein, institute Stating call information includes:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call are described right Jingle bell duration when end exhalation and incoming call, the Annual distribution information when opposite end is communicated, the opposite end sends and receives The number of times of information, the communication identifier of the opposite end are added into contact person and be added in the number of times of blacklist at least Kind;The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, described right The number of times that the communication identifier at end occurs on the page for being defined as malice and/or rubbish network address, using the communication mark of the opposite end Know at least one that the information for sending is marked as in the number of times of malice and/or junk information;
Matching module, for being mated the call information and/or label information with preset interception strategy, determines coupling knot Really;
Risk class determining module, for determining the risk class of the present communications according to the matching result;
Module is completely determined, for being level of security in the risk class for determining the present communications according to the matching result, Then determine that the present communications are secure communications.
24. systems as claimed in claim 23, it is characterised in that the preset strategy that intercepts includes that many height intercept strategy; Wherein, intercept strategy to match with corresponding call information and label information per height respectively.
25. systems as claimed in claim 24, it is characterised in that
The matching module, specifically for matched according to the call information and/or label information determination and current call Son intercepts the quantity of strategy.
26. systems as claimed in claim 25, it is characterised in that
The risk class determining module, the quantity specifically for intercepting strategy according to the son matched with the present communications are true Determine the risk class of present communications;Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk ranks;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, determine described current logical Letter is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical Letter is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
27. systems as claimed in claim 15, it is characterised in that the system also includes:
Network information acquisition module is current logical for, before the generation module generates newly-built contact person's page, obtaining respectively The terminal of letter and the network information of opposite end;Wherein, the network information include following at least one:Wireless Fidelity WIFI information, Base station information, LAN Information;
Network information determining module, for determining whether the terminal and the opposite end have the identical network information;Work as determination When the terminal and the opposite end have the identical network information, the generation module is executed.
28. systems as described in claim 15-27 is arbitrary, it is characterised in that the communication processing system in present communications not Execute after connection is hung up or after connection is hung up;Wherein, the present communications include:Voice communication, video communication and text lead to At least one in letter.
CN201410319218.3A 2014-07-04 2014-07-04 A kind of communication processing method and system Active CN104135563B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system
PCT/CN2015/083176 WO2016000636A1 (en) 2014-07-04 2015-07-02 Communications processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system

Publications (2)

Publication Number Publication Date
CN104135563A CN104135563A (en) 2014-11-05
CN104135563B true CN104135563B (en) 2017-03-15

Family

ID=51808083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410319218.3A Active CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system

Country Status (2)

Country Link
CN (1) CN104135563B (en)
WO (1) WO2016000636A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135563B (en) * 2014-07-04 2017-03-15 北京奇虎科技有限公司 A kind of communication processing method and system
CN105657138B (en) * 2014-11-14 2021-09-03 中兴通讯股份有限公司 Call processing method and communication terminal
CN104410693B (en) * 2014-11-28 2019-06-21 北京搜狗科技发展有限公司 A kind of data transmission method, information acquisition method, server and electronic equipment
CN104618874B (en) * 2015-01-29 2019-01-29 北京搜狗科技发展有限公司 A kind of data capture method and electronic equipment
CN104836893B (en) * 2015-03-30 2016-09-28 北京奇虎科技有限公司 A kind of add the method for contact person, device, system and mobile terminal
CN105553679A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information push method and system, and server
CN105245674A (en) * 2015-09-10 2016-01-13 陈包容 Method of creating address book according to note information of newly-added email account and device
CN105120046A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new number
CN105120045A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new contact name
CN106878522A (en) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 Contact person's adding method, contact person's adding set and terminal
CN106874254A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of business card generation method and equipment
CN105472090A (en) * 2016-01-13 2016-04-06 陈包容 Address list contact person merging method and device
CN106657528B (en) * 2016-12-29 2020-01-24 浙江吉利控股集团有限公司 Incoming call management method and device
CN107370863B (en) * 2017-08-11 2020-07-10 北京安云世纪科技有限公司 Connection information updating method and device based on Bluetooth connection
CN110753158B (en) * 2019-10-12 2020-10-23 上海赛连信息科技有限公司 Intelligent call recording method and device
CN113098898A (en) * 2021-04-29 2021-07-09 王小平 Service data monitoring and early warning platform and early warning method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594918A (en) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 Address book realization method and system for terminal, and terminal
CN103051765A (en) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 Method and device for displaying personal information in text information
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN103249034A (en) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 Method and device for acquiring contact information

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (en) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 Method and device for automatically adding contact information and mobile terminal
CN101951425A (en) * 2010-09-30 2011-01-19 宇龙计算机通信科技(深圳)有限公司 Processing method and system of contact information and mobile terminal
CN101976265A (en) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 Method for automatically judging telephone number and adding contact
CN103167089A (en) * 2011-12-15 2013-06-19 中国移动通信集团江苏有限公司 Mobile terminal and maintaining method for address book of mobile terminal
CN102892087A (en) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 Method and mobile terminal for adding contact information
CN103078949B (en) * 2013-01-17 2015-09-23 北京奇虎科技有限公司 The method and system of display telephone number information
CN103595547B (en) * 2013-11-15 2016-07-13 北京奇虎科技有限公司 The broadcast hold-up interception method of smart machine and device
CN104135563B (en) * 2014-07-04 2017-03-15 北京奇虎科技有限公司 A kind of communication processing method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594918A (en) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 Address book realization method and system for terminal, and terminal
CN103051765A (en) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 Method and device for displaying personal information in text information
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN103249034A (en) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 Method and device for acquiring contact information

Also Published As

Publication number Publication date
CN104135563A (en) 2014-11-05
WO2016000636A1 (en) 2016-01-07

Similar Documents

Publication Publication Date Title
CN104135563B (en) A kind of communication processing method and system
CN104113626B (en) A kind of communication processing method and system
US11283743B1 (en) Techniques for scam detection and prevention
US10116792B2 (en) Adding additional information to caller ID information
CN104967557A (en) Communication message sending method and apparatus
WO2018153305A1 (en) Security early-warning method applied to network payment, computer device and storage medium
CN105898085B (en) Harass recognition methods and the device of communications account
US20150006655A1 (en) Intra-conversation Text Message Threading
AU2012348048A1 (en) Contextual and location awareness for device interaction
CN103200542B (en) Information prompting method, device and terminal
US10178106B1 (en) Apparatus and method for identifying and warning of synthetic identity behavior that reduces user privacy
CN103152462B (en) A kind of address list sharing method and device
CN105872178A (en) Contact person information sharing method and mobile terminal
US9973920B2 (en) Managing multiple communication profiles at a mobile device
CN106953987A (en) A kind of call processing method and device and mobile terminal
CN104883290A (en) Contact person online status notification method and apparatus
US9391940B2 (en) Typing indicator for IMAP messaging
CN106488422A (en) A kind of information processing method, mobile terminal, netscape messaging server Netscape
CN106658376A (en) Event sharing method and device
US9444775B2 (en) Multipurpose internet mail extensions (“MIME”) metadata for group messaging
CN105472144A (en) Situation management method and system, and electronic equipment
CN104836883A (en) Method, equipment and system for processing incoming call
US9699121B2 (en) Instant text message conductor
CN107135493A (en) A kind of information processing method and device and mobile terminal
CN107547716A (en) A kind of information processing method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220721

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right