CN104853342B - User identification method and device - Google Patents

User identification method and device Download PDF

Info

Publication number
CN104853342B
CN104853342B CN201510191251.7A CN201510191251A CN104853342B CN 104853342 B CN104853342 B CN 104853342B CN 201510191251 A CN201510191251 A CN 201510191251A CN 104853342 B CN104853342 B CN 104853342B
Authority
CN
China
Prior art keywords
user identifier
terminal
harassing
library
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510191251.7A
Other languages
Chinese (zh)
Other versions
CN104853342A (en
Inventor
侯俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510191251.7A priority Critical patent/CN104853342B/en
Publication of CN104853342A publication Critical patent/CN104853342A/en
Application granted granted Critical
Publication of CN104853342B publication Critical patent/CN104853342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure is directed to a kind of user identification method and devices.The described method includes: obtaining the user identifier of other terminals communicated with the terminal;Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;When the user identifier belongs to the harassing and wrecking user identifier library prestored, network side is sent by the telephone number, the telephone number is added to the harassing call number library of the network side by the network side.The disclosure is for identifying harassing call.

Description

User identification method and device
Technical field
This disclosure relates to wireless communication technology field more particularly to a kind of user identification method and device.
Background technique
With the fast development of wireless technology, mobile phone communication also brings one while bringing various convenient A little problems.Various intermediaries, business telephone promote the normal life for also constantly bothering people.In general mobile phone all can it is preset or The some harassing and wrecking numbers of Dynamic Recognition, such user can avoid harassing to a certain extent.
Currently, one SIM card of replacement can change number, the threshold for changing phone number is very low.Promoting service intermediary After replacing number, some users still will receive harassing and wrecking.Dozens or even hundreds of number is grasped in intermediary's hand, constantly to user into Row harassing and wrecking.
Summary of the invention
The embodiment of the present disclosure provides a kind of user identification method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of user identification method is provided, terminal, the method packet are applied to It includes:
Whether the user identifier or telephone number for detecting the terminal change;
When the user identifier of the terminal or telephone number change, by the user identifier and phone number of the terminal Code is sent to network side, and the user identifier for judging the terminal by the network side works as institute whether in harassing and wrecking user identifier library When stating the user identifier of terminal in the harassing and wrecking user identifier library, the telephone number of the terminal is added to by the network side In harassing call number library.
According to the second aspect of an embodiment of the present disclosure, a kind of user identification method is provided, terminal, the method packet are applied to It includes:
Obtain the user identifier of other terminals communicated with the terminal;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, network side is sent by the telephone number, The telephone number is added to the harassing call number library of the network side by the network side.
Optionally, the method also includes:
Home banking acquisition request is sent to the network side;
Receive harassing and wrecking user identifier library and harassing call number library that the network side is sent.
According to the third aspect of an embodiment of the present disclosure, a kind of user identification method is provided, network side, the method are applied to Include:
Obtain the user identifier and telephone number of the terminal that terminal is sent;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added Into harassing call number library.
Optionally, the method also includes:
When receiving the home banking acquisition request of terminal transmission, by current harassing and wrecking user identifier library or harassing and wrecking electricity Words number library is sent to the terminal.
According to a fourth aspect of embodiments of the present disclosure, a kind of customer identification device is provided, terminal, described device packet are applied to It includes:
Whether detection module, user identifier or telephone number for detecting the terminal change;
Sending module, for when the user identifier of the terminal or telephone number change, by the use of the terminal Whether family mark and telephone number are sent to network side, judge the user identifier of the terminal in harassing and wrecking user by the network side In home banking, when the user identifier of the terminal is in the harassing and wrecking user identifier library, the network side is by the terminal Telephone number is added in harassing call number library.
According to a fifth aspect of the embodiments of the present disclosure, a kind of customer identification device is provided, terminal, described device packet are applied to It includes:
Module is obtained, for obtaining the user identifier of other terminals communicated with the terminal;
Judgment module, for judging whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
Sending module, for when the user identifier belongs to the harassing and wrecking user identifier library prestored, by the telephone number It is sent to network side, the telephone number is added to the harassing call number library of the network side by the network side.
Optionally, described device further include: receiving module,
The sending module, for sending home banking acquisition request to the network side;
The receiving module, the harassing and wrecking user identifier library and harassing call number library sent for receiving the network side.
According to a sixth aspect of an embodiment of the present disclosure, a kind of customer identification device is provided, network side, described device are applied to Include:
Module is obtained, the user identifier and telephone number of the terminal for obtaining terminal transmission;
Judgment module, for judging the user identifier of the terminal whether in harassing and wrecking user identifier library;
Adding module, for when the user identifier of the terminal is in the harassing and wrecking user identifier library, by the terminal Telephone number be added in harassing call number library.
Optionally, described device further include:
Sending module, for when receive terminal transmission home banking acquisition request when, by the current harassing and wrecking user Home banking or harassing call number library are sent to the terminal.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of customer identification device is provided, is applied to terminal, described device packet It includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Whether the user identifier or telephone number for detecting the terminal change;
When the user identifier of the terminal or telephone number change, by the user identifier and phone number of the terminal Code is sent to network side, and the user identifier for judging the terminal by the network side works as institute whether in harassing and wrecking user identifier library When stating the user identifier of terminal in the harassing and wrecking user identifier library, the telephone number of the terminal is added the network side Into harassing call number library.
According to the eighth aspect of the embodiment of the present disclosure, a kind of customer identification device is provided, is applied to terminal, described device packet It includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain the user identifier of other terminals communicated with the terminal;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, network side is sent by the telephone number, The telephone number is added to the harassing call number library of the network side by the network side.
According to the 9th of the embodiment of the present disclosure the aspect, a kind of customer identification device is provided, is applied to network side, described device Include:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain the user identifier and telephone number of the terminal that terminal is sent;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added Into harassing call number library.
The technical scheme provided by this disclosed embodiment can include the following benefits: no matter promoting service intermediary have it is more Few number, can be identified, also can not just continue to harass others, considerably reduce user and receive harassing call Quantity improves user experience.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the reality for meeting the disclosure Example is applied, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of user identification method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of user identification method shown according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of the user identification method shown according to another exemplary embodiment;
Fig. 4 is a kind of flow chart of user identification method shown according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of customer identification device shown according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of customer identification device shown according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the customer identification device shown according to another exemplary embodiment;
Fig. 8 is a kind of block diagram of the customer identification device shown according to another exemplary embodiment;
Fig. 9 is a kind of block diagram of the customer identification device shown according to another exemplary embodiment;
Figure 10 is a kind of block diagram of device for user's identification shown according to an exemplary embodiment;
Figure 11 is a kind of block diagram of device for user's identification shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
After user buys intelligent terminal, for the first time in use, being typically necessary registration user identity, to be backed up in network side The private data of user itself.
The main purpose done so is, can be from network controls individual privacy after user is accidentally lost intelligent terminal Information does not leak, and guarantees that personal information will not lose, personal using same identity logs after user more renews intelligent terminal Information can be restored quickly.In addition, the personal data of each intelligent terminal can be real-time for multiple intelligent terminals of same user It is synchronous.
Therefore, user can be identified based on the identity of user, the identity attribute of user can be according to its identity mark It is identified.
Fig. 1 is a kind of flow chart of user identification method shown according to an exemplary embodiment, as shown in Figure 1, user Recognition methods is for including the following steps in terminal.
In step s 11, whether the user identifier or telephone number for detecting terminal change;
In step s 12, when the user identifier of terminal or telephone number change, by the user identifier and electricity of terminal Words number be sent to network side, by network side judge terminal user identifier whether harass user identifier library in, when terminal When harassing in user identifier library, the telephone number of terminal is added in harassing call number library user identifier by network side.
In the present embodiment, the program of monitoring User Status is executed on the backstage of terminal, when user identifier in terminal or phone Number changes, i.e., when user has replaced SIM card or re-started identity registration, terminal is from the background by the user identifier of terminal It is sent to network side with telephone number, authentication is carried out to user identifier and telephone number by the server of network side, if Telephone number is not in harassing call number library, and user identifier then illustrates that the user replaces in harassing and wrecking identity library SIM card, but since user identifier is that uniquely, the telephone number after user replacement SIM card still can be identified as harassing and wrecking electricity Talk about number.In this way, no matter how many number of promoting service intermediary, can be identified, also can not just continue to harass others, The quantity that user receives harassing call is considerably reduced, user experience is improved.
Fig. 2 is a kind of flow chart of user identification method shown according to an exemplary embodiment, as shown in Fig. 2, user Recognition methods is for including the following steps in terminal.
In the step s 21, the user identifier of other terminals communicated with terminal is obtained;
In step S22, judge whether user identifier belongs to the harassing and wrecking user identifier library prestored;
In step S23, when user identifier belongs to the harassing and wrecking user identifier library prestored, network is sent by telephone number Telephone number is added to the harassing call number library of network side by network side by side.
In the present embodiment, after terminal booting, it just will start and identity knowledge carried out to other terminals communicated with terminal Not, there is the harassing and wrecking user identifier library prestored in terminal, for identifying the user identifier of other terminals, as the user of the terminal Mark is not determined as harassing user, then it is harassing call that the terminal, which corresponds to all telephone numbers, in this way, no matter in promoting service How many number is situated between, and can be identified, and also can not just continue to harass others, considerably reduces user and receives harassing and wrecking The quantity of phone, improves user experience.
Fig. 3 is a kind of flow chart of the user identification method shown according to another exemplary embodiment, as shown in figure 3, can Choosing, this method further include:
In step S31, home banking acquisition request is sent to network side;
In step s 32, harassing and wrecking user identifier library and harassing call number library that network side is sent are received.
In optinal plan, terminal after powering, can request newest harassing and wrecking user identifier library and harassing and wrecking to network side Telephone number library, to identify harassing call accurately and in time, improves user to identify other terminal user IDs Experience Degree.In addition, since the harassing and wrecking user identifier library of network side and harassing call number library are real-time updates, terminal Harassing and wrecking user identifier library and harassing call number library periodically can also be requested to network side, update the harassing and wrecking user mark of itself storage Know library and harassing call number library, so as to much sooner, accurately identify harassing call, improve user experience.
Fig. 4 is a kind of flow chart of user identification method shown according to an exemplary embodiment, as shown in figure 4, user Recognition methods is used for network side, includes the following steps.
In step S41, the user identifier and telephone number of the terminal that terminal is sent are obtained;
In step S42, judge the user identifier of terminal whether in harassing and wrecking user identifier library;
In step S43, when the user identifier of terminal is when harassing in user identifier library, by the telephone number addition of terminal Into harassing call number library.
In the present embodiment, network side carries out authentication to the user identifier and telephone number received, works as user identifier In harassing and wrecking identity library, then illustrate that the user has replaced SIM card, but since user identifier is unique, user replacement Telephone number after SIM card still can be identified as harassing call number.In this way, no matter how many number of promoting service intermediary, It can be identified, also can not just continue to harass others, considerably reduce the quantity that user receives harassing call, mention High user experience.
Optionally, this method further include:
When receiving the home banking acquisition request of terminal transmission, by current harassing and wrecking user identifier library or harassing call number Code library is sent to terminal.
In optinal plan, network side also according to terminal request, by current harassing and wrecking user identifier library or harassing call Number library is sent to terminal, so that terminal can identify harassing call accurately and in time, improves user experience.
Fig. 5 is a kind of block diagram of customer identification device shown according to an exemplary embodiment.As shown in figure 5, the device Applied to terminal, including detection module 51 and sending module 52.
Detection module 51 is configured as detecting the user identifier of the terminal or whether telephone number changes;
Sending module 52 is configured as when the user identifier of the terminal or telephone number change, by the terminal User identifier and telephone number be sent to network side, judge whether the user identifier of the terminal is harassing by the network side In user identifier library, when the user identifier of the terminal is in the harassing and wrecking user identifier library, the network side is by the end The telephone number at end is added in harassing call number library.
Fig. 6 is a kind of block diagram of customer identification device shown according to an exemplary embodiment.As shown in fig. 6, the device Applied to terminal, including obtain module 61, judgment module 62 and sending module 63.
Module 61 is obtained to be configured as obtaining the user identifier of other terminals communicated with the terminal;
Judgment module 62 is configured as judging whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
Sending module 63 is configured as when the user identifier belongs to the harassing and wrecking user identifier library prestored, by the phone Number is sent to network side, and the telephone number is added to the harassing call number library of the network side by the network side.
Fig. 7 is a kind of block diagram of the customer identification device shown according to another exemplary embodiment.As shown in fig. 7, optional , the device further include: receiving module 64,
The sending module 63 is configured as sending home banking acquisition request to the network side;
The receiving module 64 is configured as receiving the harassing and wrecking user identifier library and harassing call number that the network side is sent Code library.
Fig. 8 is a kind of block diagram of customer identification device shown according to an exemplary embodiment.As shown in figure 8, the device Applied to network side, including obtain module 81, judgment module 82 and adding module 83.
Module 81 is obtained to be configured as obtaining the user identifier and telephone number of the terminal that terminal is sent;
Whether judgment module 82 is configured as judging the user identifier of the terminal in harassing and wrecking user identifier library;
Adding module 83 is configured as when the user identifier of the terminal is in the harassing and wrecking user identifier library, by institute The telephone number for stating terminal is added in harassing call number library.
Fig. 9 is a kind of block diagram of the customer identification device shown according to another exemplary embodiment.As shown in figure 9, optional , the device further include:
Sending module 84 is configured as when receiving the home banking acquisition request of terminal transmission, by the current harassing and wrecking User identifier library or harassing call number library are sent to the terminal.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
The disclosure also provides a kind of customer identification device, is applied to terminal, and described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Whether the user identifier or telephone number for detecting the terminal change;
When the user identifier of the terminal or telephone number change, by the user identifier and phone number of the terminal Code is sent to network side, and the user identifier for judging the terminal by the network side works as institute whether in harassing and wrecking user identifier library When stating the user identifier of terminal in the harassing and wrecking user identifier library, the telephone number of the terminal is added to by the network side In harassing call number library.
The disclosure also provides a kind of customer identification device, is applied to terminal, and described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain the user identifier of other terminals communicated with the terminal;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, network side is sent by the telephone number, The telephone number is added to the harassing call number library of the network side by the network side.
The disclosure also provides a kind of customer identification device, is applied to network side, and described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain the user identifier and telephone number of the terminal that terminal is sent;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added Into harassing call number library.
Figure 10 is a kind of block diagram of device for user's identification shown according to an exemplary embodiment.For example, device 1300 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, medical treatment Equipment, body-building equipment, personal digital assistant etc..
As shown in Figure 10, device 1300 may include following one or more components: processing component 1302, memory 1304, power supply module 1306, multimedia component 1308, audio component 1310, the interface 1312 of input/output (I/O), sensor Component 1314 and communication component 1316.
The integrated operation of the usual control device 1300 of processing component 1302, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1302 may include one or more processors 1320 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1302 may include one or more moulds Block, convenient for the interaction between processing component 1302 and other assemblies.For example, processing component 1302 may include multi-media module, To facilitate the interaction between multimedia component 1308 and processing component 1302.
Memory 1304 is configured as storing various types of data to support the operation in equipment 1300.These data Example includes the instruction of any application or method for operating on device 1300, contact data, telephone book data, Message, picture, video etc..Memory 1304 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1306 provides electric power for the various assemblies of device 1300.Power supply module 1306 may include power supply pipe Reason system, one or more power supplys and other with for device 1300 generate, manage, and distribute the associated component of electric power.
Multimedia component 1308 includes the screen of one output interface of offer between described device 1300 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 1308 includes a front camera and/or rear camera.When equipment 1300 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1310 is configured as output and/or input audio signal.For example, audio component 1310 includes a wheat Gram wind (MIC), when device 1300 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1304 or via communication Component 1316 is sent.In some embodiments, audio component 1310 further includes a loudspeaker, is used for output audio signal.
I/O interface 1312 provides interface, above-mentioned peripheral interface module between processing component 1302 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1314 includes one or more sensors, and the state for providing various aspects for device 1300 is commented Estimate.For example, sensor module 1314 can detecte the state that opens/closes of equipment 1300, the relative positioning of component, such as institute The display and keypad that component is device 1300 are stated, sensor module 1314 can be with detection device 1300 or device 1,300 1 The position change of a component, the existence or non-existence that user contacts with device 1300,1300 orientation of device or acceleration/deceleration and dress Set 1300 temperature change.Sensor module 1314 may include proximity sensor, be configured in not any physics It is detected the presence of nearby objects when contact.Sensor module 1314 can also include optical sensor, as CMOS or ccd image are passed Sensor, for being used in imaging applications.In some embodiments, which can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1316 is configured to facilitate the communication of wired or wireless way between device 1300 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1300,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1316 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1316 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1304 of instruction, above-metioned instruction can be executed by the processor 1320 of device 1300 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of user identification method, which comprises
Whether the user identifier or telephone number for detecting the terminal change;
When the user identifier of the terminal or telephone number change, by the user identifier and phone number of the terminal Code is sent to network side, and the user identifier for judging the terminal by the network side works as institute whether in harassing and wrecking user identifier library When stating the user identifier of terminal in the harassing and wrecking user identifier library, the telephone number of the terminal is added to by the network side In harassing call number library.
Alternatively, executing another user identification method, which comprises obtain other communicated with the terminal The user identifier of terminal;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, network side is sent by the telephone number, The telephone number is added to the harassing call number library of the network side by the network side.
Optionally, the method also includes:
Home banking acquisition request is sent to the network side;
Receive harassing and wrecking user identifier library and harassing call number library that the network side is sent.
Alternatively, mobile terminal may be performed simultaneously above two method.
Figure 11 is a kind of block diagram of device for user's identification shown according to an exemplary embodiment.For example, device 1900 may be provided as a server.Referring to Fig.1 1, device 1900 includes processing component 1922, further comprise one or Multiple processors and memory resource represented by a memory 1932, can be by the execution of processing component 1922 for storing Instruction, such as application program.The application program stored in memory 1932 may include it is one or more each Module corresponding to one group of instruction.In addition, processing component 1922 is configured as executing instruction, enable the server to execute one kind User identification method, which comprises
Obtain the user identifier and telephone number of the terminal that terminal is sent;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added Into harassing call number library.
Optionally, the method also includes:
When receiving the home banking acquisition request of terminal transmission, by current harassing and wrecking user identifier library or harassing and wrecking electricity Words number library is sent to the terminal.
Device 1900 can also include that a power supply module 1926 be configured as the power management of executive device 1900, and one Wired or wireless network interface 1950 is configured as device 1900 being connected to network and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (16)

1. a kind of user identification method, which is characterized in that be applied to terminal, which comprises
Whether the user identifier or telephone number for detecting the terminal change, and the user identifier is for identity user in net The user identity attribute of network side registration;
When the user identifier of the terminal or telephone number change, the user identifier of the terminal and telephone number are sent out Be sent to network side, by the network side judge the terminal user identifier whether harassing and wrecking user identifier library in, when the end When the user identifier at end is in the harassing and wrecking user identifier library, the telephone number of the terminal is added to harassing and wrecking by the network side In telephone number library.
2. a kind of user identification method, which is characterized in that be applied to terminal, which comprises
The user identifier of other terminals communicated with the terminal is obtained, the user identifier is for identity user in network The user identity attribute of side registration;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, net is sent by the telephone number of other terminals The telephone number is added to the harassing call number library of the network side by the network side by network side.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Home banking acquisition request is sent to the network side;
Receive harassing and wrecking user identifier library and harassing call number library that the network side is sent.
4. a kind of user identification method, which is characterized in that be applied to network side, which comprises
The user identifier and telephone number of the terminal that terminal is sent are obtained, the user identifier is for identity user in network The user identity attribute of side registration;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added to and is disturbed It disturbs in telephone number library.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
When receiving the home banking acquisition request of terminal transmission, by current harassing and wrecking user identifier library or harassing call number Code library is sent to the terminal.
6. a kind of customer identification device, which is characterized in that be applied to terminal, described device includes:
Whether detection module, user identifier or telephone number for detecting the terminal change, and the user identifier is used In the user identity attribute that identity user is registered in network side;
Sending module, for when the user identifier of the terminal or telephone number change, the user of the terminal to be marked Know and telephone number is sent to network side, judges the user identifier of the terminal whether in harassing and wrecking user identifier by the network side In library, when the user identifier of the terminal is in the harassing and wrecking user identifier library, the network side is by the phone of the terminal Number is added in harassing call number library.
7. a kind of customer identification device, which is characterized in that be applied to terminal, described device includes:
Module is obtained, for obtaining the user identifier of other terminals communicated with the terminal, the user identifier is used for The user identity attribute that identity user is registered in network side;
Judgment module, for judging whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
Sending module, for when the user identifier belongs to the harassing and wrecking user identifier library prestored, by the electricity of other terminals Words number is sent to network side, and the telephone number is added to the harassing call number of the network side by the network side Library.
8. device according to claim 7, which is characterized in that described device further include: receiving module,
The sending module, for sending home banking acquisition request to the network side;
The receiving module, the harassing and wrecking user identifier library and harassing call number library sent for receiving the network side.
9. a kind of customer identification device, which is characterized in that be applied to network side, described device includes:
Module is obtained, the user identifier and telephone number of the terminal for obtaining terminal transmission, the user identifier are used for The user identity attribute that identity user is registered in network side;
Judgment module, for judging the user identifier of the terminal whether in harassing and wrecking user identifier library;
Adding module, for when the user identifier of the terminal is in the harassing and wrecking user identifier library, by the electricity of the terminal Words number is added in harassing call number library.
10. device according to claim 9, which is characterized in that described device further include:
Sending module, for when receive terminal transmission home banking acquisition request when, by the current harassing and wrecking user identifier Library or harassing call number library are sent to the terminal.
11. a kind of customer identification device, which is characterized in that be applied to terminal, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Whether the user identifier or telephone number for detecting the terminal change, and the user identifier is for identity user in net The user identity attribute of network side registration;
When the user identifier of the terminal or telephone number change, the user identifier of the terminal and telephone number are sent out Be sent to network side, by the network side judge the terminal user identifier whether harassing and wrecking user identifier library in, when the end When the user identifier at end is in the harassing and wrecking user identifier library, the telephone number of the terminal is added to harassing and wrecking by the network side In telephone number library.
12. a kind of customer identification device, which is characterized in that be applied to terminal, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The user identifier of other terminals communicated with the terminal is obtained, the user identifier is for identity user in network The user identity attribute of side registration;
Judge whether the user identifier belongs to the harassing and wrecking user identifier library prestored;
When the user identifier belongs to the harassing and wrecking user identifier library prestored, net is sent by the telephone number of other terminals The telephone number is added to the harassing call number library of the network side by the network side by network side.
13. a kind of customer identification device, which is characterized in that be applied to network side, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The user identifier and telephone number of the terminal that terminal is sent are obtained, the user identifier is for identity user in network The user identity attribute of side registration;
Judge the user identifier of the terminal whether in harassing and wrecking user identifier library;
When the user identifier of the terminal is in the harassing and wrecking user identifier library, the telephone number of the terminal is added to and is disturbed It disturbs in telephone number library.
14. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor The step of 1 the method for the claims is realized when execution.
15. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor The step of the claims 2 or 3 the method are realized when execution.
16. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor The step of the claims 4 or 5 the method are realized when execution.
CN201510191251.7A 2015-04-21 2015-04-21 User identification method and device Active CN104853342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510191251.7A CN104853342B (en) 2015-04-21 2015-04-21 User identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510191251.7A CN104853342B (en) 2015-04-21 2015-04-21 User identification method and device

Publications (2)

Publication Number Publication Date
CN104853342A CN104853342A (en) 2015-08-19
CN104853342B true CN104853342B (en) 2019-06-11

Family

ID=53852619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510191251.7A Active CN104853342B (en) 2015-04-21 2015-04-21 User identification method and device

Country Status (1)

Country Link
CN (1) CN104853342B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184303A (en) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 Anti-theft method and apparatus for mobile terminal
CN102098640A (en) * 2010-12-28 2011-06-15 中兴通讯股份有限公司 Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls
CN103716792A (en) * 2013-12-19 2014-04-09 中国联合网络通信集团有限公司 Malicious call information processing method and apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038648B (en) * 2014-06-06 2017-01-25 陈伟 Method and device for recognizing crank calls
CN104410700B (en) * 2014-12-04 2018-04-03 北京奇虎科技有限公司 Issue method, harassing call hold-up interception method and the system of harassing call list

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184303A (en) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 Anti-theft method and apparatus for mobile terminal
CN102098640A (en) * 2010-12-28 2011-06-15 中兴通讯股份有限公司 Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls
CN103716792A (en) * 2013-12-19 2014-04-09 中国联合网络通信集团有限公司 Malicious call information processing method and apparatus

Also Published As

Publication number Publication date
CN104853342A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
EP2975821B1 (en) Network connection method and apparatus
CN104038263B (en) Method and device for establishing Bluetooth connection
EP3151507A1 (en) Methods and apparatuses for controlling device
CN104951377B (en) The abnormality eliminating method and device of intelligent household terminal
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
CN105703932B (en) Log recording method for uploading, log recording method of reseptance, terminal and server
CN107204883B (en) Network fault processing method and device
CN105246138A (en) Control method and device of Internet-of-things device
CN104298547A (en) Terminal setting method and device
CN105045690A (en) Terminal test method and apparatus
CN104636453A (en) Illegal user data identification method and device
CN104837154A (en) Wireless access point control method and device
CN105578401A (en) Locating information collection method, locating information collection device and mobile terminal
CN106096009A (en) Method for generating message and device
CN103929788A (en) Communication control method and device and terminal
CN109814942A (en) A kind of parameter processing method and device
CN107703348A (en) The detection method and device of smart jack
CN107454204A (en) User profile mask method and device
CN107027157A (en) Location updating method and equipment
EP3086582A1 (en) Method, devices and system for transmitting sim card information
CN105491518A (en) Method and device for social reminding based on wearable devices
CN107070707B (en) Method and device for determining initialization mode of router
CN105227660A (en) A kind of based reminding method and device
CN106101372A (en) Method to set up and device are reminded in application
CN107422911B (en) Pressure value detection method and device and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant