CN104135563B - A kind of communication processing method and system - Google Patents
A kind of communication processing method and system Download PDFInfo
- Publication number
- CN104135563B CN104135563B CN201410319218.3A CN201410319218A CN104135563B CN 104135563 B CN104135563 B CN 104135563B CN 201410319218 A CN201410319218 A CN 201410319218A CN 104135563 B CN104135563 B CN 104135563B
- Authority
- CN
- China
- Prior art keywords
- information
- opposite end
- communication
- page
- newly
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of communication processing method and system, wherein, methods described includes:Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Wherein, the communication information includes:Communication identifier;The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.User is solved when storing unknown communication and identifying by the present invention, the low problem of cumbersome, efficiency.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of communication processing method and system.
Background technology
With the continuous development of communication technology, the mode of communication is also more and more, and e.g., user can carry out electricity using mobile phone
Words communication, is exchanged immediately using instant chat software.User is often connect when communicating using various communication modes
The communication request of some unknown communication marks is received, wherein, some unknown communication marks are that user needs to be preserved, e.g.,
The unknown communication mark is a friend of active user's new knowledge, is exchanging respective communication identifier between two people.
Now, user needs to preserve unknown communication mark, but during the communication identifier is preserved, can exist very
Many problems.
By taking mobile communication as an example, user A determines that the unknown incoming call is the good friend of oneself after a unknown incoming call is answered
User B is dialed using new cell-phone number after cell-phone number is changed.After hanging up the telephone, unknown next described in user's A want to save
The corresponding number of electricity, now, user needs to open the contact person's interpolation page in address list by a series of selection operation of clicking on
Then phone number is manually entered into contact person and is added in the page by face, or, by between the page in adding procedure
Toggle, first switch to communications records and check the phone number, then switch to contact person again and add described in page input
Phone number.
As can be seen here, user is when storing unknown communication and identifying, need to carry out a series of clicking operation open logical
Contact person in news record adds the page, and needs frequently to be switched between different interfaces, during cumbersome, waste
Between, efficiency low;The experience of user is affected, and also increases operation and the processing load of terminal system.Further, need
User is wanted voluntarily to carry out the input of communication identifier, input process is time-consuming long, and input results poor reliability, accuracy are low.
Content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on
State a kind of communication processing method and a kind of communication processing system accordingly of problem.
According to one aspect of the present invention, there is provided a kind of communication processing method, including:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Its
In, the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
According to a further aspect in the invention, there is provided a kind of communication processing system, including:
Monitoring modular, is monitored for the communication in terminal, obtains the opposite end for currently being communicated with the terminal
The communication information;Wherein, the communication information includes:Communication identifier;
Comparison module, for being compared the communication identifier of the opposite end of acquisition with the associated person information in address list application
Compared with;
Generation module, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated newly-built
Contact person's page;
First add module, for adding corresponding to newly-built contact person's page by the communication identifier of the opposite end of acquisition
Position.
A kind of communication processing method and system that the present invention is provided, are monitored by the communication in terminal, are obtained and are worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 is a kind of flow chart of communication processing method in first embodiment of the invention;
Fig. 2 is a kind of flow chart of communication processing method in second embodiment of the invention;
Fig. 3 is a kind of flow chart of the method for judging present communications safety in second embodiment of the invention;
Fig. 4 is a kind of schematic diagram of newly-built contact person's page in second embodiment of the invention;
Fig. 5 is a kind of flow chart of communication processing method in third embodiment of the invention;
Fig. 6 is a kind of schematic diagram of newly-built contact person's page in third embodiment of the invention;
Fig. 7 is a kind of structured flowchart of communication processing system in fourth embodiment of the invention;
Fig. 8 is a kind of structured flowchart of communication processing system in fifth embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Embodiment one
With reference to Fig. 1, a kind of flow chart of communication processing method in first embodiment of the invention is shown.In the present embodiment
In, the communication processing method, including:
Step 102, to terminal in communication be monitored, obtain the communication of opposite end for currently being communicated with the terminal
Information.
In the present embodiment, terminal is included but are not limited to the communication of opposite end:The telephone relation that carried out by terminal, short
Letter, and pass through voice call, the instant message that IM (Instant Messaging, instant messaging) software is carried out.Wherein, commonly use
IM softwares include:QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wang Wang etc..
Wherein, to terminal in signal intelligence be monitored and can include:It is logical that the communication and monitoring that monitoring is accessed is breathed out
Letter.When present communications are initiated by end side, then the opposite end is recipient, and the terminal is sender;In present communications
When being by initiating to side, then the terminal is recipient, and the opposite end is sender.
In the present embodiment, the communication information includes:Communication identifier.It is preferred that when terminal is mobile phone terminal, and enter
When capable communication is to call/receive calls and receive and dispatch note, the communication identifier of the opposite end can be the opposite end
Phone number.When terminal is PC ends (Personal Computer, personal computer) or mobile phone terminal, and the communication for carrying out is
During instant communication session (e.g., QQ voices, QQ videos, wechat etc.), the communication identifier of the opposite end can be the corresponding use in opposite end
The instant communication number (e.g., No. QQ, micro-signal etc.) at family.
Step 104, the communication identifier of the opposite end of acquisition is compared with the associated person information in address list application.
Step 106, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, generates newly-built contact person
The page.
It is preferred that can when the opposite end for obtaining communication identifier not in the address list of terminal when, or, when obtaining
The communication identifier of the opposite end for taking is not good friend's number (e.g., QQ good friends number, wechat good friend number in the instant messaging of user
Code etc.) when, determine that the communication identifier of the opposite end for obtaining is mismatched with the associated person information, be a strange communication identifier.
Step 108, the communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
In the present embodiment, the communication identifier of the opposite end of acquisition can be automatically added to newly-built contact person's page
Correspondence position.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
Embodiment two
In the present embodiment, should for executing the third party that can be mounted in end side of the communication processing method
With.But, those skilled in the art are it should be apparent that be not limited in end side for execute the communication processing method
Third-party application, for execute the communication processing method can also be terminal One function module, e.g., the function mould
Block is arranged in the address list application of the operating system or terminal of terminal.Or, for executing the communication processing method
The One function module in the third-party application of end side is can also be, such as:Safety applications (e.g., 360 mobile phone safe in terminal
Bodyguard) in One function module.
With reference to Fig. 2, a kind of flow chart of communication processing method in second embodiment of the invention is shown.In the present embodiment
In, the communication processing method, including:
Step 202, third-party application to terminal in communication be monitored, obtain and currently communicated with the terminal
The communication information of opposite end.Wherein, the communication information includes:Communication identifier.
In the present embodiment, the communication for carrying out between terminal and opposite end can be voice communication (e.g., telephone communication, QQ languages
Sound communication etc.), or video communication (e.g., visual telephone, QQ video callings etc.), can also be that textcommunication is (e.g., short
Letter, the text chat carried out using QQ etc.).
It is preferred that communication processing method described in the present embodiment can with but be not limited only to execute in the case of several as follows:
Present communications be when the opposite end is initiated to the terminal,
The communication processing method is executed after the terminal is connected and then hangs up the communication;Or in access failure and then hang up
The communication processing method is executed after the communication.
Present communications be when the terminal is initiated to the opposite end,
The communication processing method is executed after the terminal is put through and then hangs up the communication;Or do not putting through and then hanging up
The communication processing method is executed after the communication.
The communication identifier of the opposite end of acquisition is entered by step 204, third-party application with the associated person information in address list application
Row compares.
In the present embodiment, when the communication identifier of the opposite end for obtaining is matched with the associated person information, then described right
The contact person or good friend for holding corresponding user to be the corresponding user of the terminal, can directly terminate this flow process.
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, execution step 206.
Step 206, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, third-party application judges
The safety of present communications.
It is preferred that the third-party application is when the safety of present communications is judged, can directly pass through the third party
Analysis module in application is directly judged, it is also possible to which by calling other safety applications, (e.g., 360 mobile phone safes are defended
Scholar) judged, the present embodiment is not restricted to this.
Specifically, with reference to Fig. 3, a kind of method for judging present communications safety in second embodiment of the invention is shown
Flow chart.In the present embodiment, the step 206, can specifically include:
Sub-step S302, when the communication identifier of the opposite end for obtaining is mismatched with the associated person information, third-party application
The communication identifier of the opposite end is compared with data in preset black/white list.
It is preferred that the data stored in white list are that to have determined as be the corresponding communication identifier of safe communication.Black name
In list store data be have determined as be swindle communication, and/or spoofing communication, and/or fishing communication,
And/or the communication of wooden horse, and/or the corresponding communication identifier of the communication of pseudo-base station.
In the present embodiment,
If the communication identifier of the opposite end and the data match in blacklist, can determine that the present communications are high
The risk communication (e.g., swindle communication, pseudo-base station communication etc.) of danger, now, third-party application directly intercepts present communications, terminates this
Secondary flow process.
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are that safety is logical
Letter.It is preferred that in order to be further ensured that present communications are secure communications, improving the accurate of present communications safety judged result
Property, during data match in communication identifier and the white list of the opposite end, sub-step S304 can be continued executing with.
Explanation is needed exist for, when the communication identifier of the opposite end is neither in the blacklist nor in the white name
When in list, in order to improve the accuracy of present communications safety judged result, it is also possible to continue executing with sub-step S304.
Sub-step S304, third-party application obtain the call information and labelling letter of the opposite end communicated with the terminal
Breath.
It is preferred that the call information includes:The exhalation of the opposite end and incoming call number of times, when the opposite end exhalation and incoming call
Communication time, jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, institute
The number of times that opposite end sends and receives information is stated, the communication identifier of the opposite end is added into contact person and is added into blacklist
At least one in number of times;The label information includes:The communication identifier of the opposite end is marked as malice and/or garbage communication
Number of times, the number of times that the communication identifier of the opposite end occurs on the page for being defined as malice and/or rubbish network address, using described
The information that the communication identifier of opposite end sends is marked as at least one in the number of times of malice and/or junk information.
The call information and/or label information and preset interception strategy are carried out by sub-step S306, third-party application
Match somebody with somebody, determine matching result.
In the present embodiment, the preset strategy that intercepts includes that many height intercept strategy;Wherein, strategy point is intercepted per height
Do not match with corresponding call information and label information.It is preferred that the third-party application is by the call information and/or mark
Note information is mated with preset interception strategy, determines that matching result can specifically include:According to the call information and/or mark
Note information determines that the son matched with the current call intercepts the quantity of strategy.
Sub-step S308, third-party application determine the risk class of the present communications according to the matching result.
In the present embodiment, the risk class for determining present communications according to the matching result, can specifically include:
Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications.Wherein,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk levels
Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined
Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined
Front communication is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
It is preferred that
When the risk class for determining the present communications according to the matching result is high-risk rank, third-party application can
Directly to intercept present communications, terminate this flow process.
When the risk class for determining the present communications according to the matching result is risk class or level of suspicion, the
Can there is risk to point out user's present communications, while can be with execution step with loaded and displayed indicating risk information in tripartite's application
208.
When the risk class for determining the present communications according to the matching result is level of security, determine described current
Communication is secure communication, execution step 208.
Step 208, third-party application generate newly-built contact person's page.
It is preferred that the generating process in order to ensure newly-built contact person's page meets the expectation of user, can generate
Before newly-built contact person's page, the distance between terminal and opposite end are judged, detailed process is as follows:
First, third-party application obtains the terminal of the present communications and the positional information of opposite end respectively.Wherein, institute's rheme
The acquisition of confidence breath can adopt location information acquisition method known to any one.
Then, third-party application according to the positional information of the terminal and opposite end determine the terminal and the opposite end away from
From.
Finally, when the distance is less than or equal to setpoint distance, above-mentioned steps 208 are executed, third-party application generates newly-built
Contact person's page.
Another it is preferred that the generating process in order to ensure newly-built contact person's page meets the expectation of user, third party
Application can obtain the terminal of the present communications and the network information of opposite end before newly-built contact person's page is generated respectively.
Wherein, the network information is included but is not limited to:Wireless Fidelity WIFI (WIreless-FIdelity, Wireless Fidelity) information, base
At least one that stands in information and LAN Information.Third-party application determines whether the terminal and the opposite end have identical
The network information, when determining that the terminal and the opposite end have the identical network information, executes the newly-built contact person of the generation
The step of page.
For example, third-party application obtains the WIFI information of terminal and opposite end respectively from cloud server.Then, third party should
Determine whether the terminal and the opposite end share same WIFI with the WIFI information according to the terminal and opposite end.Finally, when
When determining that the terminal and the opposite end share same WIFI, third-party application executes the step for generating newly-built contact person's page
Suddenly.
In the present embodiment, the third-party application generates newly-built contact page mask body and can include:Third-party application
Newly-built contact person's page is generated according to form is set.
It is preferred that the third-party application generates newly-built contact person's page according to form is set, when implementing,
Newly-built contact person can be generated by calling the address list application according to the corresponding default form of the system address list application
The page.Wherein, the address list application can be the system address list application of end side, now, set form then logical for system
The template of the corresponding newly-built contact person's page of letter record application.The address list application can also be the third-party application or its
Template in its application, the form of the template are matched with the form of newly-built contact person's page, so that stating for generating is newly-built
The form of contact person's page is more diversified, abundantization, meets user's request.
It is preferred that the setting form is included but are not limited to:Communication identifier, name, sex, company information, electronics postal
At least one in part, birthday, address, hobby and head portrait option.
Such as, with reference to Fig. 4, it is a kind of schematic diagram of newly-built contact person's page in second embodiment of the invention.Described newly-built
It is that the form of people's page includes:Communication identifier, name, four options of sex and Email.
Step 210, it is right to newly-built contact person's page that the communication identifier of the opposite end of acquisition is added by third-party application
Answer position.
Such as, the communication identifier of the opposite end of acquisition is added right to the communication identifier option shown in Fig. 4 by third-party application
Answer at position.
Step 212, third-party application obtain the personal information of the corresponding user in the opposite end from high in the clouds.
If it is preferred that the personal information of oneself has been uploaded to cloud server side by the corresponding user in the opposite end, this
When, the third-party application except communication that can be in terminal be monitored when, obtain currently led to the terminal
The communication identifier of the opposite end of letter, can be with the more information from the high in the clouds acquisition opposite end, i.e. the personal information of user.Wherein,
The personal information includes:Name information, gender information, company information, e-mail address, birthday by information, address information, love
At least one in good information and head image information.
Step 214, third-party application add the personal information of acquisition to the corresponding option position set in form
Place.
Step 216, the interpolation request of third-party application response user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation
Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request
Add at least one in request with head image information.
Step 218, third-party application by described add ask corresponding information add to described set in form correspond to
At option position.
Such as, name information is added the corresponding information of request and is added to the name option pair shown in Fig. 4 by third-party application
At the position that answers, gender information is added the corresponding information of request and is added to the corresponding position of sex option shown in Fig. 4,
Deng.
Step 220, third-party application response preserve operation requests, and the newly-built contact person's renewal of the page for completing to add is preserved
Into address list application.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage
Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve
Safety.
Embodiment three
In conjunction with above-described embodiment, a kind of communication processing method is described in detail below by an instantiation.
In the present embodiment, by taking mobile phone communication as an example, i.e. terminal and opposite end are mobile phone terminal, the communication for carrying out is handss
Machine is conversed, and, present communications are the call requests that is initiated to terminal from opposite end.Connect the call request of opposite end, hang up in terminal
After phone, or do not answer in terminal and after the call request of opposite end, call request terminate, execute the communication processing method, have
Body ground, the flow process of the communication processing method are as follows:
With reference to Fig. 5, a kind of flow chart of communication processing method in third embodiment of the invention is shown.In the present embodiment
In, the communication processing method, including:
Step 502, third-party application to terminal in communication be monitored, obtain and currently communicated with the terminal
The telephone number of opposite end.
Wherein, the third-party application is mounted in the application in terminal (e.g., mobile phone terminal).
The telephone number of acquisition and associated person information are compared by step 504, third-party application.
It is preferred that when the telephone number for obtaining is matched with associated person information, it may be determined that initiating call to terminal please
The corresponding user in the opposite end asked is the contact person of the corresponding user of the terminal, is a known number, now directly can tie
Shu Benci flow processs.
When the telephone number for obtaining is not matched that with associated person information, i.e., incoming call is strangeness numbers, now execution step
506.
Step 506, third-party application judge the safety of present communications.
Third-party application judges that the method for the safety of present communications is referred to the method in previous embodiment, can be by
Present communications are divided into high-risk rank, risk class, level of suspicion and level of security.Need exist for explanation, present communications
Rank can include but are not limited to above-mentioned four kinds of ranks.
When determining that present communications are high-risk rank, present communications are intercepted directly, terminates this flow process.
When determining that present communications are risk class or level of suspicion, execution step 508.
When determination present communications are level of securitys, i.e., when present communications are secure communications, execution step 510.
Step 508, third-party application generate the indicating risk page.
It is preferred that third-party application loaded and displayed indicating risk information on the indicating risk page, points out user to work as
Front communication is risk communication or suspicious traffic.Meanwhile, also include in the indicating risk page:First trigger action option and
Two trigger action options.Wherein, if user triggers the first trigger action option after indicating risk information is browsed, take
Disappear the newly-built contact person's page of generation, that is, terminate this flow process;If user triggers described second after indicating risk information is browsed
Trigger action option, then execution step 510.
Step 510, when user triggers the second trigger action option, third-party application generates newly-built contact page
Face.
It is preferred that third-party application generates newly-built contact person's page according to form is set.Wherein, the setting form
Include but are not limited to:Communication identifier, name, sex, company information, Email, birthday, address, hobby and head portrait option
In at least one.Newly-built contact person's page can be the newly-built contact person's page in the system communication record of mobile phone terminal, also may be used
To be the newly-built contact person's page different from system communication record of third-party application setting, but with system communication record identical it is,
Newly-built contact person's page that the third-party application is arranged equally can preserve associated person information to used in system, or,
Associated person information can be passed to system communication record, be preserved and use by system communication record.With reference to Fig. 6, it is the present invention the
A kind of schematic diagram of newly-built contact person's page in three embodiments.In the present embodiment.The form bag of newly-built contact person's page
Include:Communication identifier, name, four options of sex and Email.Wherein, when newly-built contact person's page is arranged for third-party application
Newly-built contact person's page when, the form of the page can be identical with the form of newly-built contact person's page of system communication record,
Can be with difference.
Step 512, third-party application obtain the personal information of the corresponding user in the opposite end from high in the clouds, and by the individual
The telephone number of information and the opposite end for obtaining adds to the correspondence position of newly-built contact person's page.Wherein, the personal letter
Breath includes:Name information, gender information, company information, e-mail address, birthday by information, address information, preference information and head
As at least one in information.
Such as, with reference to Fig. 6, during third-party application adds the name information " Zhang San " for obtaining to corresponding name option, will
During the telephone number " 123456 " for obtaining in step 502 adds to corresponding telephone number option.
Step 514, the interpolation request of third-party application response user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation
Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request
Add at least one in request with head image information.
Step 516, third-party application by described add ask corresponding information add to described set in form correspond to
At option position.
Such as, with reference to Fig. 6, user directly can be input into " man " at the corresponding position of sex option, in E-mail option
" 123@456.com " is input at corresponding position.
Step 518, third-party application response preserve operation requests, and the newly-built contact person's renewal of the page for completing to add is preserved
Into address list application.
Need exist for explanation, when the present communications are the call request that is initiated from terminal to opposite end, Ke Yican
Flow process according to the communication processing method of the present embodiment is processed.
In sum, the communication processing method described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
And, when the personal information of the corresponding user of the terminal and opposite end that interact is preserved beyond the clouds, can be direct
The detailed personal information of user is obtained from high in the clouds, the every content that improves in newly-built contact person's page improves newly-built contact person
The content intact degree of the page, reduces the operation that user's verification is searched.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage
Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve
Safety.
It should be noted that for aforesaid embodiment of the method, in order to be briefly described, therefore which is all expressed as a series of
Combination of actions, but those skilled in the art should know, and the present invention is not limited by described sequence of movement, because according to
According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art should also know,
Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
It is based on and the same inventive concept of said method embodiment, with reference to Fig. 7, shows a kind of in fourth embodiment of the invention
The structured flowchart of communication processing system.In the present embodiment, the communication processing system, including:
Monitoring modular 702, is monitored for the communication in terminal, and it is currently right with what the terminal was communicated to obtain
The communication information at end.
Wherein, the communication information includes:Communication identifier.
Comparison module 704, for carrying out the communication identifier of the opposite end of acquisition with the associated person information in address list application
Relatively.
Generation module 706, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated new
Build contact person's page.
First add module 708, for adding the communication identifier of the opposite end of acquisition to newly-built contact person's page
Correspondence position.
In sum, the communication processing system described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
Embodiment five
With reference to Fig. 8, a kind of structured flowchart of communication processing system in fifth embodiment of the invention is shown.In the present embodiment
In, the communication processing system, including:
Monitoring modular 802, is monitored for the communication in terminal, and it is currently right with what the terminal was communicated to obtain
The communication information at end.Wherein, the communication information includes:Communication identifier.
Comparison module 804, for carrying out the communication identifier of the opposite end of acquisition with the associated person information in address list application
Relatively.
Judge module 806, when mismatching with the associated person information for the communication identifier in the opposite end for obtaining, judges to work as
The safety of front communication.
It is preferred that the judge module 806, including:
Data comparison module 8062, for being compared the communication identifier of the opposite end with data in preset black/white list
Compared with.
First determining module 8064, during for data match in the communication identifier of the opposite end and white list, really
The fixed present communications are secure communications.
It is preferred that after determining that the present communications are secure communication, data obtaining module 8068 can be continued executing with.
Second determining module 8066, during for data match in the communication identifier of the opposite end and blacklist, really
The fixed present communications are high-risk communication.
It is preferred that when determining that present communications are high-risk communication, directly can be carried out to present communications by blocking module
Intercept, receive this flow process.
Data obtaining module 8068, for obtaining the call information and labelling letter of the opposite end communicated with the terminal
Breath.
It is preferred that the call information includes:The exhalation of the opposite end and incoming call number of times, when the opposite end exhalation and incoming call
Communication time, jingle bell duration when opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, institute
The number of times that opposite end sends and receives information is stated, the communication identifier of the opposite end is added into contact person and is added into blacklist
At least one in number of times;The label information includes:The communication identifier of the opposite end is marked as malice and/or garbage communication
Number of times, the number of times that the communication identifier of the opposite end occurs on the page for being defined as malice and/or rubbish network address, using described
The information that the communication identifier of opposite end sends is marked as at least one in the number of times of malice and/or junk information.
Matching module 80610, for the call information and/or label information are mated with preset interception strategy,
Determine matching result.
It is preferred that the preset strategy that intercepts includes that many height intercept strategy;Wherein, per height intercept strategy respectively with right
The call information and label information that answers matches.
In the present embodiment, the matching module 80610, specifically for according to the call information and/or label information
Determine that the son matched with the current call intercepts the quantity of strategy.
Risk class determining module 80612, for determining the risk class of the present communications according to the matching result.
In the present embodiment, the risk class determining module 80612, specifically for basis and the present communications phase
The son that matches somebody with somebody intercepts the risk class that the quantity of strategy determines present communications.Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk levels
Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined
Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined
Front communication is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
Module 80614 is completely determined, in the risk class that the present communications are determined according to the matching result being
Level of security, it is determined that the present communications are secure communications.
It is preferred that when determining that the present communications are secure communication, can be with execution position data obtaining module 808.
Position information acquisition module 808, for obtaining the terminal of the present communications and the positional information of opposite end respectively.
Apart from determining module 810, for determining the terminal and described right according to the positional information of the terminal and opposite end
The distance at end.
It is preferred that when described determine that the distance is less than or equal to setpoint distance apart from determining module 810 when, execute the life
Into module 816.
Another it is preferred that when determining that the present communications are secure communication, network information acquisition module can be executed
812.
Network information acquisition module 812, for, before the generation module generates newly-built contact person's page, obtaining respectively
The terminal of the present communications and the network information of opposite end.Wherein, the network information include following at least one:Wireless Fidelity
WIFI information, base station information, LAN Information.
Network information determining module 814, for determining whether the terminal and the opposite end have the identical network information;
When determining that the terminal and the opposite end have the identical network information, the generation module 816 is executed.
Generation module 816, for generating newly-built contact person's page.It is preferred that the generation module 816, specifically for
When the opposite end communication identifier of acquisition is mismatched with the associated person information, the newly-built contact page is generated according to form is set
Face.Wherein, the setting form includes:Communication identifier, name, sex, company information, Email, birthday, address, hobby
With at least one in head portrait option.
Another it is preferred that the generation module 816, specifically for believing with the contact person in the opposite end communication identifier for obtaining
When breath is mismatched, the system address list application is called, generated according to the corresponding default form of the system address list application new
Build contact person's page.
Personal information acquisition module 818, for obtaining the personal information of the corresponding user in the opposite end from high in the clouds.
Wherein, the personal information includes:Name information, gender information, company information, e-mail address, birthday letter
At least one in breath, address information, preference information and head image information.
3rd add module 820, for adding the personal information of acquisition to the corresponding option bit set in form
Put place.
First add module 822, for adding the communication identifier of the opposite end of acquisition to newly-built contact person's page
Correspondence position.
First respond module 824, asks for responding the interpolation of user.
Wherein, the interpolation request includes:Name information adds request, gender information and adds request, company information interpolation
Request, e-mail address add asks, birthday by information adds request, address information adds request, preference information interpolation request
Add at least one in request with head image information;
Second add module 826, for right in asking corresponding information to be added to the setting form interpolation
Answer at option position.
Second respond module 828, preserves operation requests for responding, and the newly-built contact person's renewal of the page for completing to add is protected
In depositing to address list application.
In the present embodiment, the communication processing system can after present communications access failure is hung up or connect hang up it
After execute.Wherein, the present communications include:At least one in voice communication, video communication and textcommunication.
In sum, the communication processing system described in the present embodiment, is monitored by the communication in terminal, is obtained and is worked as
The communication identifier of the front opposite end communicated with the terminal, and judge whether the communication identifier is mated with associated person information;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is directly generated;Avoid
User goes to open address list by numerous and diverse tediously long trigger action manually, sets up contact person and adds the page;Simplify operating procedure,
Communication process efficiency is improve, the time has been saved, while also reducing operation and the processing load of terminal system.Further,
Communication identifier is automatically added to the correspondence position of newly-built contact person's page, it is to avoid the manual input process of user, improves
Efficiency, while ensure that the accuracy of result.
And, when the personal information of the corresponding user of the terminal and opposite end that interact is preserved beyond the clouds, can be direct
The detailed personal information of user is obtained from high in the clouds, the every content that improves in newly-built contact person's page improves newly-built contact person
The content intact degree of the page, reduces the operation that user's verification is searched.
Meanwhile, before unknown communication mark is preserved, also the safety of present communications is judged, it is ensured that storage
Communication identifier safety and reliability, reduce the probability that user has dust thrown into the eyes, ensured the rights and interests of user, improve
Safety.
For said apparatus embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple,
Related part is illustrated referring to the part of embodiment of the method.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various
Programming language realizes the content of invention described herein, and the above description done by language-specific is to disclose this
Bright preferred forms.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case where not having these details.In some instances, known method, structure are not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure helping understand one or more in each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.However, should not be construed to reflect following intention by the method for the disclosure:I.e. required guarantor
The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as the separate embodiments of the present invention.
Those skilled in the art be appreciated that can to embodiment in equipment in module carry out adaptively
Change and they are arranged in one or more equipment different from the embodiment.Can be the module in embodiment or list
Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit is required, summary and accompanying drawing) disclosed in each feature can identical by offers, be equal to or the alternative features of similar purpose carry out generation
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In some included features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint
One of meaning can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) come realize in communication processing equipment according to embodiments of the present invention some or
The some or all functions of the whole parts of person.The present invention is also implemented as executing one of method as described herein
Divide or whole equipment or program of device (for example, computer program and computer program).Such realize this
Bright program can be stored on a computer-readable medium, or can have the form of one or more signal.Such
Signal can be downloaded from internet website and be obtained, or provide on carrier signal, or be provided with any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference markss being located between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element listed in the claims or step.Word "a" or "an" before being located at element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer
Existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame
Claim.
The invention discloses A1, a kind of communication processing method, including:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Its
In, the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page.
A2, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
The terminal of the present communications and the positional information of opposite end are obtained respectively;
Positional information according to the terminal and opposite end determines the distance of the terminal and the opposite end;
When the distance be less than or equal to setpoint distance when, execute described generation newly-built contact person's page the step of.
A3, the method as described in A1, the newly-built contact person's page of the generation, including:
Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, surname
At least one in name, sex, company information, Email, birthday, address, hobby and head portrait option.
A4, the method as described in A3, described according to set form generate described in build contact person's page, including:
The address list application is called, and newly-built contact person is generated according to the corresponding default form of the system address list application
The page.
A5, the method as described in A3, the communication identifier in the opposite end by acquisition are added to the newly-built contact page
After the step of correspondence position in face, methods described also includes:
The interpolation request of response user;Wherein, the interpolation request includes:Name information adds request, gender information and adds
Plus request, company information add request, e-mail address add request, birthday by information add request, address information add please
Ask, preference information adds request and head image information adds at least one in request;
Corresponding information is asked to be added to the corresponding option position set in form described interpolation.
A6, the method as described in A3, described generation newly-built contact person's page the step of after, methods described also includes:
The personal information of the corresponding user in the opposite end is obtained from high in the clouds;Wherein, the personal information includes:Name is believed
In breath, gender information, company information, e-mail address, birthday by information, address information, preference information and head image information extremely
Few one kind;
The personal information of acquisition is added to the corresponding option position set in form.
A7, the method as described in A1, the communication identifier in the opposite end by acquisition are added to the newly-built contact page
After the step of correspondence position in face, methods described also includes:
Response preserves operation requests, during the newly-built contact person's renewal of the page for completing to add is preserved to address list application.
A8, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
Judge the safety of present communications;
When judging that the present communications are secure communication, execute described generation newly-built contact person's page the step of.
A9, the method as described in A8, the safety of the judgement present communications, including:
The communication identifier of the opposite end is compared with data in preset black/white list;
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are that safety is logical
Letter;
If the communication identifier of the opposite end and the data match in blacklist, it is determined that the present communications are high-risk logical
Letter.
A10, the method as described in A8, the safety of the judgement present communications, including:
Obtain the call information and label information of the opposite end communicated with the terminal;Wherein, the call information bag
Include:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call, the opposite end exhalation and incoming call
When jingle bell duration, the Annual distribution information when opposite end is communicated, the opposite end send and receive the number of times of information, institute
The communication identifier for stating opposite end is added into contact person and at least one being added in the number of times of blacklist;The label information
Including:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, and the communication identifier of the opposite end is true
It is set to the number of times that occur on the page of malice and/or rubbish network address, the information sent using the communication identifier of the opposite end is marked
At least one being designated as in the number of times of malice and/or junk information;
The call information and/or label information are mated with preset interception strategy, matching result is determined;
According to the risk class that the matching result determines the present communications;
If determining that the risk class of the present communications is level of security according to the matching result, it is determined that described current
Communication is secure communication.
A11, the method as described in A10, the preset strategy that intercepts include that many height intercept strategy;Wherein, block per height
Cut strategy to match with corresponding call information and label information respectively.
The call information and/or label information described are carried out by A12, the method as described in A11 with preset interception strategy
Coupling determines matching result, including:
Determine that the son matched with the current call intercepts the number of strategy according to the call information and/or label information
Amount.
A13, the method as described in A12, the risk class for determining present communications according to the matching result, including:
Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications;Its
In,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk levels
Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined
Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined
Front communication is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
A14, the method as described in A1, described generation newly-built contact person's page the step of before, methods described also includes:
The terminal of the present communications and the network information of opposite end are obtained respectively;Wherein, the network information includes following
At least one:Wireless Fidelity WIFI information, base station information, LAN Information;
Determine whether the terminal and the opposite end have the identical network information;
When determining that the terminal and the opposite end have the identical network information, the newly-built contact page of the generation is executed
The step of face.
A15, the method as described in A1-A14 is arbitrary, the communication processing method after present communications access failure is hung up or
Connection is executed after hanging up;Wherein, the present communications include:In voice communication, video communication and textcommunication at least one
Kind.
The invention also discloses B16, a kind of communication processing system, including:
Monitoring modular, is monitored for the communication in terminal, obtains the opposite end for currently being communicated with the terminal
The communication information;Wherein, the communication information includes:Communication identifier;
Comparison module, for being compared the communication identifier of the opposite end of acquisition with the associated person information in address list application
Compared with;
Generation module, when being mismatched with the associated person information for the communication identifier in the opposite end for obtaining, is generated newly-built
Contact person's page;
First add module, for adding corresponding to newly-built contact person's page by the communication identifier of the opposite end of acquisition
Position.
B17, the system as described in B16, the system also include:
Position information acquisition module, for, before the generation module generates newly-built contact person's page, obtaining institute respectively
State the terminal of present communications and the positional information of opposite end;
Apart from determining module, for determining the terminal and the opposite end according to the positional information of the terminal and opposite end
Distance;When the distance is less than or equal to setpoint distance, the generation module is executed.
B18, the system as described in B16,
The generation module, during specifically for being mismatched with the associated person information in the opposite end communication identifier for obtaining, is pressed
Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, name, sex, public affairs
At least one in department's information, Email, birthday, address, hobby and head portrait option.
B19, the system as described in B18,
The generation module, during specifically for being mismatched with the associated person information in the opposite end communication identifier for obtaining, is adjusted
With the system address list application, newly-built contact person's page is generated according to the corresponding default form of the system address list application.
B20, the system as described in B18, the system also include:
First respond module, for adding the communication identifier of the opposite end of acquisition to described new in first add module
After building the correspondence position of contact person's page, the interpolation request of user is responded;Wherein, the interpolation request includes:Name information
Interpolation request, gender information add to be asked, company information adds asks, e-mail address adds request, birthday by information interpolation
Request, address information are added request, preference information interpolation request and head image information and add at least one in request;
Second add module, for asking corresponding information to be added to the corresponding choosing set in form described interpolation
At item position.
B21, the system as described in B18, the system also include:
Personal information acquisition module, after generating newly-built contact person's page in the generation module, obtains from high in the clouds
The personal information of the corresponding user in the opposite end;Wherein, the personal information includes:Name information, gender information, company's letter
At least one in breath, e-mail address, birthday by information, address information, preference information and head image information;
3rd add module, for adding the personal information of acquisition to the corresponding option position set in form
Place.
B22, the system as described in B16, the system also include:
Second respond module, for adding the communication identifier of the opposite end of acquisition to described new in first add module
After building the correspondence position of contact person's page, response preserves operation requests, and the newly-built contact person's renewal of the page for completing to add is protected
In depositing to address list application.
B23, the system as described in B16, the system also include:
Judge module, for, before the generation module generates newly-built contact person's page, judging the safety of present communications
Property;When judging that the present communications are secure communication, the generation module is executed.
B24, the system as described in B23, the judge module, including:
Data comparison module, for the communication identifier of the opposite end is compared with data in preset black/white list;
First determining module, during for data match in the communication identifier of the opposite end and white list, determines institute
It is secure communication to state present communications;
Second determining module, during for data match in the communication identifier of the opposite end and blacklist, determines institute
It is high-risk communication to state present communications.
B25, the system as described in B23, the judge module, including:
Data obtaining module, for obtaining the call information and label information of the opposite end communicated with the terminal;Its
In, the call information includes:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call,
Jingle bell duration when the opposite end exhalation and incoming call, the Annual distribution information when opposite end is communicated, the opposite end send
With the number of times of receive information, the communication identifier of the opposite end is added into contact person and is added in the number of times of blacklist extremely
Few one kind;The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, institute
The number of times that the communication identifier of opposite end occurs on the page for being defined as malice and/or rubbish network address is stated, using the logical of the opposite end
Beacon knows at least one that the information for sending is marked as in the number of times of malice and/or junk information;
Matching module, for the call information and/or label information are mated with preset interception strategy, determination
Match somebody with somebody result;
Risk class determining module, for determining the risk class of the present communications according to the matching result;
Module is completely determined, for being safe level in the risk class that the present communications are determined according to the matching result
Not, it is determined that the present communications are secure communications.
B26, the system as described in B25, the preset strategy that intercepts include that many height intercept strategy;Wherein, block per height
Cut strategy to match with corresponding call information and label information respectively.
B27, the system as described in B26,
The matching module, specifically for determining and the current call according to the call information and/or label information
The son for matching intercepts the quantity of strategy.
B28, the system as described in B27,
The risk class determining module, specifically for intercepting the number of strategy according to the son matched with the present communications
Amount determines the risk class of present communications;Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk levels
Not;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, described working as is determined
Front communication is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, described working as is determined
Front communication is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
B29, the system as described in B16, the system also include:
Network information acquisition module, for, before the generation module generates newly-built contact person's page, obtaining institute respectively
State the terminal of present communications and the network information of opposite end;Wherein, the network information include following at least one:Wireless Fidelity
WIFI information, base station information, LAN Information;
Network information determining module, for determining whether the terminal and the opposite end have the identical network information;When
When determining that the terminal and the opposite end have the identical network information, the generation module is executed.
B30, the system as described in B16-B29 is arbitrary, the communication processing system after present communications access failure is hung up or
Connection is executed after hanging up;Wherein, the present communications include:In voice communication, video communication and textcommunication at least one
Kind.
Claims (28)
1. a kind of communication processing method, it is characterised in that include:
Communication in terminal is monitored, and obtains the communication information of the opposite end for currently being communicated with the terminal;Wherein, institute
Stating the communication information includes:Communication identifier;
The communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
When the communication identifier of the opposite end for obtaining is mismatched with the associated person information, newly-built contact person's page is generated;
The communication identifier of the opposite end of acquisition is added to the correspondence position of newly-built contact person's page;
Before the step of the generation newly-built contact person's page, methods described also includes:
The terminal of present communications and the positional information of opposite end are obtained respectively;
Positional information according to the terminal and opposite end determines the distance of the terminal and the opposite end;
When the distance be less than or equal to setpoint distance when, execute described generation newly-built contact person's page the step of.
2. the method for claim 1, it is characterised in that the newly-built contact person's page of the generation, including:
Newly-built contact person's page is generated according to form is set;Wherein, the setting form includes:Communication identifier, name, property
Not, at least one in company information, Email, birthday, address, hobby and head portrait option.
3. method as claimed in claim 2, it is characterised in that described according to set form generate described in build contact person's page,
Including:
The address list application is called, and newly-built contact person's page is generated according to the corresponding default form of the address list application.
4. method as claimed in claim 2, it is characterised in that the communication identifier in the opposite end by acquisition adds to described
After the step of correspondence position of newly-built contact person's page, methods described also includes:
The interpolation request of response user;Wherein, the interpolation request includes:Name information adds request, gender information's interpolation please
Ask, company information adds request, e-mail address adds request, birthday by information adds request, address information adds request, love
Good information adds request and head image information adds at least one in request;
Corresponding information is asked to be added to the corresponding option position set in form described interpolation.
5. method as claimed in claim 2, it is characterised in that after the step of the generation newly-built contact person's page, institute
Stating method also includes:
The personal information of the corresponding user in the opposite end is obtained from high in the clouds;Wherein, the personal information includes:Name information, property
In other information, company information, e-mail address, birthday by information, address information, preference information and head image information at least one
Kind;
The personal information of acquisition is added to the corresponding option position set in form.
6. the method for claim 1, it is characterised in that the communication identifier in the opposite end by acquisition adds to described
After the step of correspondence position of newly-built contact person's page, methods described also includes:
Response preserves operation requests, during the newly-built contact person's renewal of the page for completing to add is preserved to address list application.
7. the method for claim 1, it is characterised in that before the step of the generation newly-built contact person's page, institute
Stating method also includes:
Judge the safety of present communications;
When judging that the present communications are secure communication, execute described generation newly-built contact person's page the step of.
8. method as claimed in claim 7, it is characterised in that the safety of the judgement present communications, including:
The communication identifier of the opposite end is compared with data in preset black/white list;
If the communication identifier of the opposite end and the data match in white list, it is determined that the present communications are secure communications;
If the communication identifier of the opposite end and the data match in blacklist, it is determined that the present communications are high-risk communication.
9. method as claimed in claim 7, it is characterised in that the safety of the judgement present communications, including:
Obtain the call information and label information of the opposite end communicated with the terminal;Wherein, the call information includes:Institute
Exhalation and the incoming call number of times of opposite end, the opposite end exhalation and communication time during incoming call is stated, when the opposite end exhalation and incoming call
Jingle bell duration, the Annual distribution information when opposite end is communicated, the opposite end send and receive the number of times of information, described right
The communication identifier at end is added into contact person and at least one being added in the number of times of blacklist;The label information bag
Include:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, and the communication identifier of the opposite end is determining
For the number of times occurred on the page of malice and/or rubbish network address, it is labeled using the information of the communication identifier transmission of the opposite end
For at least one in the number of times of malice and/or junk information;
The call information and/or label information are mated with preset interception strategy, matching result is determined;
According to the risk class that the matching result determines the present communications;
If determining that the risk class of the present communications is level of security according to the matching result, it is determined that the present communications
It is secure communication.
10. method as claimed in claim 9, it is characterised in that the preset strategy that intercepts includes that many height intercept strategy;Its
In, strategy is intercepted per height to match with corresponding call information and label information respectively.
11. methods as claimed in claim 10, it is characterised in that described by the call information and/or label information with pre-
Putting interception strategy carries out coupling determination matching result, including:
Determine that the son matched with current call intercepts the quantity of strategy according to the call information and/or label information.
12. methods as claimed in claim 11, it is characterised in that the wind for determining present communications according to the matching result
Dangerous rank, including:
Son according to matching with the present communications intercepts the risk class that the quantity of strategy determines present communications;Wherein,
When the quantity that the son for matching intercepts strategy is more than or equal to first threshold, determine that the present communications are high-risk ranks;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, determine described current logical
Letter is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical
Letter is level of suspicion;
When the quantity that the son for matching intercepts strategy is less than three threshold values, determine that the present communications are level of securitys.
13. the method for claim 1, it is characterised in that before the step of the generation newly-built contact person's page, institute
Stating method also includes:
The terminal of present communications and the network information of opposite end are obtained respectively;Wherein, the network information include following at least one:
Wireless Fidelity WIFI information, base station information, LAN Information;
Determine whether the terminal and the opposite end have the identical network information;
When determining that the terminal and the opposite end have the identical network information, the newly-built contact person's page of the generation is executed
Step.
14. methods as described in claim 1-13 is arbitrary, it is characterised in that the communication processing method is not connect in present communications
Logical hanging up after rear or connection is hung up executes;Wherein, the present communications include:Voice communication, video communication and textcommunication
In at least one.
15. a kind of communication processing systems, it is characterised in that include:
Monitoring modular, is monitored for the communication in terminal, obtains the logical of the opposite end that currently communicated with the terminal
Letter information;Wherein, the communication information includes:Communication identifier;
Comparison module, for the communication identifier of the opposite end of acquisition is compared with the associated person information in address list application;
Generation module, when mismatching with the associated person information for the communication identifier in the opposite end for obtaining, generates newly-built contact
People's page;
First add module, for adding the communication identifier of the opposite end of acquisition to the corresponding position of newly-built contact person's page
Put;
Position information acquisition module, current logical for, before the generation module generates newly-built contact person's page, obtaining respectively
The terminal of letter and the positional information of opposite end;
Apart from determining module, for according to the positional information of the terminal and opposite end determine the terminal and the opposite end away from
From;When the distance is less than or equal to setpoint distance, the generation module is executed.
16. systems as claimed in claim 15, it is characterised in that
The generation module, during specifically for mismatching with the associated person information in the opposite end communication identifier for obtaining, according to setting
The formula that fixes generates newly-built contact person's page;Wherein, the setting form includes:Communication identifier, name, sex, company's letter
At least one in breath, Email, birthday, address, hobby and head portrait option.
17. systems as claimed in claim 16, it is characterised in that
The generation module, during specifically for mismatching with the associated person information in the opposite end communication identifier for obtaining, calls institute
Address list application is stated, and newly-built contact person's page is generated according to the corresponding default form of the address list application.
18. systems as claimed in claim 16, it is characterised in that the system also includes:
First respond module, for adding the communication identifier of the opposite end of acquisition to described newly-built in first add module
Be people's page correspondence position after, respond user interpolation request;Wherein, the interpolation request includes:Name information adds
Request, gender information add to be asked, company information interpolation is asked, e-mail address adds request, birthday by information interpolation is asked,
Address information is added request, preference information and adds at least one in request and head image information interpolation request;
Second add module, for asking corresponding information to be added to the corresponding option bit set in form described interpolation
Put place.
19. systems as claimed in claim 16, it is characterised in that the system also includes:
Personal information acquisition module, after generating newly-built contact person's page in the generation module, obtains from high in the clouds described
The personal information of the corresponding user in opposite end;Wherein, the personal information includes:Name information, gender information, company information, electricity
At least one in sub- addresses of items of mail, birthday by information, address information, preference information and head image information;
3rd add module, for adding the personal information of acquisition to the corresponding option position set in form.
20. systems as claimed in claim 15, it is characterised in that the system also includes:
Second respond module, for adding the communication identifier of the opposite end of acquisition to described newly-built in first add module
Be people's page correspondence position after, response preserve operation requests, by complete add newly-built contact person's renewal of the page preserve to
In address list application.
21. systems as claimed in claim 15, it is characterised in that the system also includes:
Judge module, for, before the generation module generates newly-built contact person's page, judging the safety of present communications;?
When to judge the present communications be secure communication, the generation module is executed.
22. systems as claimed in claim 21, it is characterised in that the judge module, including:
Data comparison module, for the communication identifier of the opposite end is compared with data in preset black/white list;
First determining module, during for data match in the communication identifier of the opposite end and white list, determines described working as
Front communication is secure communication;
Second determining module, during for data match in the communication identifier of the opposite end and blacklist, determines described working as
Front communication is high-risk communication.
23. systems as claimed in claim 21, it is characterised in that the judge module, including:
Data obtaining module, for obtaining the call information and label information of the opposite end communicated with the terminal;Wherein, institute
Stating call information includes:The exhalation of the opposite end and incoming call number of times, the communication time when opposite end exhalation and incoming call are described right
Jingle bell duration when end exhalation and incoming call, the Annual distribution information when opposite end is communicated, the opposite end sends and receives
The number of times of information, the communication identifier of the opposite end are added into contact person and be added in the number of times of blacklist at least
Kind;The label information includes:The communication identifier of the opposite end is marked as the number of times of malice and/or garbage communication, described right
The number of times that the communication identifier at end occurs on the page for being defined as malice and/or rubbish network address, using the communication mark of the opposite end
Know at least one that the information for sending is marked as in the number of times of malice and/or junk information;
Matching module, for being mated the call information and/or label information with preset interception strategy, determines coupling knot
Really;
Risk class determining module, for determining the risk class of the present communications according to the matching result;
Module is completely determined, for being level of security in the risk class for determining the present communications according to the matching result,
Then determine that the present communications are secure communications.
24. systems as claimed in claim 23, it is characterised in that the preset strategy that intercepts includes that many height intercept strategy;
Wherein, intercept strategy to match with corresponding call information and label information per height respectively.
25. systems as claimed in claim 24, it is characterised in that
The matching module, specifically for matched according to the call information and/or label information determination and current call
Son intercepts the quantity of strategy.
26. systems as claimed in claim 25, it is characterised in that
The risk class determining module, the quantity specifically for intercepting strategy according to the son matched with the present communications are true
Determine the risk class of present communications;Wherein,
When the quantity that strategy is intercepted in the son for matching is more than or equal to first threshold, determine that the present communications are high-risk ranks;
When the son for matching intercepts the quantity of strategy more than or equal to Second Threshold and is less than first threshold, determine described current logical
Letter is risk class;
When the son for matching intercepts the quantity of strategy more than or equal to the 3rd threshold value and is less than Second Threshold, determine described current logical
Letter is level of suspicion;
When the quantity that strategy is intercepted in the son for matching is less than three threshold values, determine that the present communications are level of securitys.
27. systems as claimed in claim 15, it is characterised in that the system also includes:
Network information acquisition module is current logical for, before the generation module generates newly-built contact person's page, obtaining respectively
The terminal of letter and the network information of opposite end;Wherein, the network information include following at least one:Wireless Fidelity WIFI information,
Base station information, LAN Information;
Network information determining module, for determining whether the terminal and the opposite end have the identical network information;Work as determination
When the terminal and the opposite end have the identical network information, the generation module is executed.
28. systems as described in claim 15-27 is arbitrary, it is characterised in that the communication processing system in present communications not
Execute after connection is hung up or after connection is hung up;Wherein, the present communications include:Voice communication, video communication and text lead to
At least one in letter.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410319218.3A CN104135563B (en) | 2014-07-04 | 2014-07-04 | A kind of communication processing method and system |
PCT/CN2015/083176 WO2016000636A1 (en) | 2014-07-04 | 2015-07-02 | Communications processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410319218.3A CN104135563B (en) | 2014-07-04 | 2014-07-04 | A kind of communication processing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104135563A CN104135563A (en) | 2014-11-05 |
CN104135563B true CN104135563B (en) | 2017-03-15 |
Family
ID=51808083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410319218.3A Active CN104135563B (en) | 2014-07-04 | 2014-07-04 | A kind of communication processing method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104135563B (en) |
WO (1) | WO2016000636A1 (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135563B (en) * | 2014-07-04 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of communication processing method and system |
CN105657138B (en) * | 2014-11-14 | 2021-09-03 | 中兴通讯股份有限公司 | Call processing method and communication terminal |
CN104410693B (en) * | 2014-11-28 | 2019-06-21 | 北京搜狗科技发展有限公司 | A kind of data transmission method, information acquisition method, server and electronic equipment |
CN104618874B (en) * | 2015-01-29 | 2019-01-29 | 北京搜狗科技发展有限公司 | A kind of data capture method and electronic equipment |
CN104836893B (en) * | 2015-03-30 | 2016-09-28 | 北京奇虎科技有限公司 | A kind of add the method for contact person, device, system and mobile terminal |
CN105553679A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Information push method and system, and server |
CN105245674A (en) * | 2015-09-10 | 2016-01-13 | 陈包容 | Method of creating address book according to note information of newly-added email account and device |
CN105120046A (en) * | 2015-09-10 | 2015-12-02 | 陈包容 | Method and device for creating address book according to note information of new number |
CN105120045A (en) * | 2015-09-10 | 2015-12-02 | 陈包容 | Method and device for creating address book according to note information of new contact name |
CN106878522A (en) * | 2015-12-10 | 2017-06-20 | 北京奇虎科技有限公司 | Contact person's adding method, contact person's adding set and terminal |
CN106874254A (en) * | 2015-12-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of business card generation method and equipment |
CN105472090A (en) * | 2016-01-13 | 2016-04-06 | 陈包容 | Address list contact person merging method and device |
CN106657528B (en) * | 2016-12-29 | 2020-01-24 | 浙江吉利控股集团有限公司 | Incoming call management method and device |
CN107370863B (en) * | 2017-08-11 | 2020-07-10 | 北京安云世纪科技有限公司 | Connection information updating method and device based on Bluetooth connection |
CN110753158B (en) * | 2019-10-12 | 2020-10-23 | 上海赛连信息科技有限公司 | Intelligent call recording method and device |
CN113098898A (en) * | 2021-04-29 | 2021-07-09 | 王小平 | Service data monitoring and early warning platform and early warning method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594918A (en) * | 2012-03-19 | 2012-07-18 | 中兴通讯股份有限公司 | Address book realization method and system for terminal, and terminal |
CN103051765A (en) * | 2012-11-19 | 2013-04-17 | 广东欧珀移动通信有限公司 | Method and device for displaying personal information in text information |
CN103167500A (en) * | 2013-02-01 | 2013-06-19 | 杭州东信北邮信息技术有限公司 | Method and system achieving united processing of mobile phone |
CN103249034A (en) * | 2013-05-21 | 2013-08-14 | 北京小米科技有限责任公司 | Method and device for acquiring contact information |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100064012A1 (en) * | 2008-09-08 | 2010-03-11 | International Business Machines Corporation | Method, system and apparatus to automatically add senders of email to a contact list |
CN101945175A (en) * | 2010-09-26 | 2011-01-12 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for automatically adding contact information and mobile terminal |
CN101951425A (en) * | 2010-09-30 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | Processing method and system of contact information and mobile terminal |
CN101976265A (en) * | 2010-11-17 | 2011-02-16 | 上海合合信息科技发展有限公司 | Method for automatically judging telephone number and adding contact |
CN103167089A (en) * | 2011-12-15 | 2013-06-19 | 中国移动通信集团江苏有限公司 | Mobile terminal and maintaining method for address book of mobile terminal |
CN102892087A (en) * | 2012-09-24 | 2013-01-23 | 东莞宇龙通信科技有限公司 | Method and mobile terminal for adding contact information |
CN103078949B (en) * | 2013-01-17 | 2015-09-23 | 北京奇虎科技有限公司 | The method and system of display telephone number information |
CN103595547B (en) * | 2013-11-15 | 2016-07-13 | 北京奇虎科技有限公司 | The broadcast hold-up interception method of smart machine and device |
CN104135563B (en) * | 2014-07-04 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of communication processing method and system |
-
2014
- 2014-07-04 CN CN201410319218.3A patent/CN104135563B/en active Active
-
2015
- 2015-07-02 WO PCT/CN2015/083176 patent/WO2016000636A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594918A (en) * | 2012-03-19 | 2012-07-18 | 中兴通讯股份有限公司 | Address book realization method and system for terminal, and terminal |
CN103051765A (en) * | 2012-11-19 | 2013-04-17 | 广东欧珀移动通信有限公司 | Method and device for displaying personal information in text information |
CN103167500A (en) * | 2013-02-01 | 2013-06-19 | 杭州东信北邮信息技术有限公司 | Method and system achieving united processing of mobile phone |
CN103249034A (en) * | 2013-05-21 | 2013-08-14 | 北京小米科技有限责任公司 | Method and device for acquiring contact information |
Also Published As
Publication number | Publication date |
---|---|
CN104135563A (en) | 2014-11-05 |
WO2016000636A1 (en) | 2016-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104135563B (en) | A kind of communication processing method and system | |
CN104113626B (en) | A kind of communication processing method and system | |
US11283743B1 (en) | Techniques for scam detection and prevention | |
US10116792B2 (en) | Adding additional information to caller ID information | |
CN104967557A (en) | Communication message sending method and apparatus | |
WO2018153305A1 (en) | Security early-warning method applied to network payment, computer device and storage medium | |
CN105898085B (en) | Harass recognition methods and the device of communications account | |
US20150006655A1 (en) | Intra-conversation Text Message Threading | |
AU2012348048A1 (en) | Contextual and location awareness for device interaction | |
CN103200542B (en) | Information prompting method, device and terminal | |
US10178106B1 (en) | Apparatus and method for identifying and warning of synthetic identity behavior that reduces user privacy | |
CN103152462B (en) | A kind of address list sharing method and device | |
CN105872178A (en) | Contact person information sharing method and mobile terminal | |
US9973920B2 (en) | Managing multiple communication profiles at a mobile device | |
CN106953987A (en) | A kind of call processing method and device and mobile terminal | |
CN104883290A (en) | Contact person online status notification method and apparatus | |
US9391940B2 (en) | Typing indicator for IMAP messaging | |
CN106488422A (en) | A kind of information processing method, mobile terminal, netscape messaging server Netscape | |
CN106658376A (en) | Event sharing method and device | |
US9444775B2 (en) | Multipurpose internet mail extensions (“MIME”) metadata for group messaging | |
CN105472144A (en) | Situation management method and system, and electronic equipment | |
CN104836883A (en) | Method, equipment and system for processing incoming call | |
US9699121B2 (en) | Instant text message conductor | |
CN107135493A (en) | A kind of information processing method and device and mobile terminal | |
CN107547716A (en) | A kind of information processing method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220721 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |