CN104994009A - Friend message shielding method and device based on address list - Google Patents

Friend message shielding method and device based on address list Download PDF

Info

Publication number
CN104994009A
CN104994009A CN201510413765.2A CN201510413765A CN104994009A CN 104994009 A CN104994009 A CN 104994009A CN 201510413765 A CN201510413765 A CN 201510413765A CN 104994009 A CN104994009 A CN 104994009A
Authority
CN
China
Prior art keywords
address list
user
shielded
shielding
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510413765.2A
Other languages
Chinese (zh)
Inventor
潘晓旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Iaround Network Technology Co Ltd
Original Assignee
Guangzhou Iaround Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Iaround Network Technology Co Ltd filed Critical Guangzhou Iaround Network Technology Co Ltd
Priority to CN201510413765.2A priority Critical patent/CN104994009A/en
Publication of CN104994009A publication Critical patent/CN104994009A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a friend message shielding method and device based on an address list and belongs to the network field. The method comprises the following steps: obtaining a first address list of a user mobile terminal, wherein the first address list is the address list of a first application program; determining at least one object to be shielded according to the first address list and a pre-stored second address list, wherein the second address list is the address list of a second application program; and executing a shielding strategy corresponding to the at least one object to be shielded. The technical scheme can realize bidirectional message shielding between friends, thereby simplifying operation of a user, protecting privacy safety of the user and enhancing user experience.

Description

A kind of good friend's message screening method and apparatus based on address list
Technical field
The present invention relates to network field, particularly relate to a kind of good friend's message screening method and apparatus based on address list.
Background technology
Universal along with the social mode of stranger, it is mutual that increasing user realizes with other people by stranger's social activity, and in stranger's social activity, user pays close attention to, the message demand shared all compares privacy, does not want that the people by being familiar with sees.If user decide friend can't see oneself the message sent out, need to arrange stealthy invisible to this good friend or several good friend.
In prior art, if user is unilaterally provided with stealthy, can also receive and browse this good friend the message sent out, still can be seen by other good friends.Especially, when shielding the good friend in other application programs, needing manually to go to find good friend to be shielded by comparison, bringing great inconvenience to the operation of user and use.If two good friend users shield the message that the other side sends out mutually, then need all to arrange separately stealthy, poor synchronization, and the possibility realized is lower, troublesome poeration.
Summary of the invention
In order to simplify the operation of user further, strengthening Consumer's Experience, the invention provides a kind of good friend's message screening method and apparatus based on address list.This technical scheme comprises:
First aspect, provide a kind of good friend's message screening method based on address list, described method comprises:
Obtain the first address list of customer mobile terminal, described first address list is the address list of the first application program;
According to described first address list and the second address list prestored, determine at least one object to be shielded, described second address list is the address list of the second application program;
Perform the shielding strategy corresponding with at least one object to be shielded described.
In conjunction with first aspect, in the implementation that the first is possible, the first address list of described acquisition mobile terminal comprises:
The request instruction of described first address list obtaining mobile terminal is sent to described user; Described request instruction is used to indicate described mobile terminal and uploads described first address list to server;
Described mobile terminal shows authorization requests to described user after receiving described request instruction;
The feedback information that described user's input agreement corresponding with described authorization requests is uploaded, uploads described first address list to described server.
In conjunction with the first possible implementation of first aspect, in the implementation that the second is possible, described according to described first address list and the second address list prestored, determine that at least one object to be shielded comprises:
Contrast the user profile in described first address list and the user profile in described second address list, at least one object identical according to comparing result determination user profile;
Arranging at least one object described is at least one object to be shielded described.
In conjunction with the implementation that the second of first aspect is possible, in the implementation that the third is possible, described shielding strategy comprises the relevant message of server shielding at least one object to be shielded described; Server sends masking instruction at least one object to be shielded described, and described masking instruction is used to indicate the described user-dependent message of shielding, and the described execution shielding strategy corresponding with at least one object to be shielded described comprises,
The message that shielding at least one object to be shielded described is relevant;
Send masking instruction at least one object to be shielded described, described masking instruction is used to indicate the described user-dependent message of shielding.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation, described method also comprises:
What obtain that user triggers arranges instruction, describedly arranges instruction and is used to indicate the object that user will shield;
Instruction is set according to described, the user in described second address list is set at least one object to be shielded described.
Second aspect, provide a kind of good friend's message screening equipment based on address list, described equipment comprises:
Acquisition module, for obtaining the first address list of customer mobile terminal, described first address list is the address list of the first application program;
Processing module, for according to described first address list and the second address list of prestoring, determine at least one object to be shielded, described second address list is the address list of the second application program;
Executive Module, for performing the shielding strategy corresponding with at least one object to be shielded described.
In conjunction with second aspect, in the implementation that the first is possible, described acquisition module comprises:
Server module, sends the request instruction of described first address list obtaining mobile terminal to described user; Described request instruction is used to indicate described mobile terminal and uploads described first address list to server;
Mobile terminal module, described mobile terminal shows authorization requests to described user after receiving described request instruction;
Upper transmission module, the feedback information that described user's input agreement corresponding with described authorization requests is uploaded, uploads described first address list to described server.
In conjunction with the first possible implementation of second aspect, in the implementation that the second is possible, described processing module comprises:
Contrast judge module, for contrasting the user profile in described first address list and the user profile in described second address list, determines at least one object that user profile is identical;
Arranging module, is at least one object to be shielded described for arranging at least one object described.
In conjunction with the implementation that the second of second aspect is possible, in the third possible implementation, described shielding strategy comprises the relevant message of server shielding at least one object to be shielded described; Server sends masking instruction at least one object to be shielded described, and described masking instruction is used to indicate the described user-dependent message of shielding, and described Executive Module comprises:
First shroud module, for shielding the relevant message of at least one object to be shielded described;
Secondary shielding module, for sending masking instruction at least one object to be shielded described, described masking instruction is used to indicate the described user-dependent message of shielding.
In conjunction with the third possible implementation of second aspect, in the 4th kind of possible implementation,
Described acquisition module also arranges instruction for what obtain that user triggers, describedly arranges instruction and is used to indicate the object that user will shield;
Described module being set also for arranging instruction according to described, the user in described second address list being set at least one object to be shielded described.
The invention provides a kind of good friend's message screening method and apparatus based on address list, comprising: compared with prior art, obtain the first address list of customer mobile terminal, make the process obtained manually go operation without the need to user.In addition, first address list can be the address list of cell phone address book or other application programs, thus the shielding that can realize multiple mobile phone address list good friend message, add the range of choice of at least one shielding object, further increase the scope of shielding object, improve the applicability of the present embodiment screen method.In addition; by in the second address list and the first address list comparison process; if the information of user is identical; then can confirm as at least one object to be shielded; identical good friend between first address list with the second address list can be shielded completely; the personal secrets of protection user, the further demand of protection user, strengthen user personal experience in use.In addition, by performing in the shielding strategy corresponding with at least one object to be shielded, server can according to the object to be shielded arranged, and message user being sent to object to be shielded shields, object to be shielded sends to the message of user also can shield, without the need to the setting that object to be shielded is other, after user arranges shielding, mutual message screening can be realized between the two, simple to operate, practicality is high, simplifies the operation of user further, strengthens Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of good friend's message screening method flow schematic diagram based on address list that the embodiment of the present invention provides;
Fig. 2 is a kind of good friend's message screening device structure schematic diagram based on address list that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The method that embodiment provided by the invention provides is applied to and a kind ofly comprises in the interactive system of electronic equipment and server, this electronic equipment can be mobile device, comprise mobile phone, panel computer and intelligent wearable device, the embodiment of the present invention is not limited concrete electronic equipment, wherein, this electronic equipment at least can run the first application program and the second application program, this server is the server of the second application program, this first application program at least comprises the first address list, this second application program at least comprises the second address list, this second application program can realize its interactive function by message transfer, this interactive function can be that stranger is social.This message comprises point-to-point message between user and point-to-points message, and point-to-point message is the message of communicating between users, point-to-points message be user share link, the content such as word and picture.
Embodiment one
A kind of good friend's message screening method based on address list embodiments provided, with reference to shown in Fig. 1, the method comprises:
First address list of S101, acquisition customer mobile terminal, the first address list is the address list of the first application program;
S102, according to the first address list and the second address list of prestoring, determine at least one object to be shielded, the second address list is the address list of the second application program;
S103, perform the shielding strategy corresponding with at least one object to be shielded.
Wherein, the first address list obtaining mobile terminal comprises:
The request instruction of the first address list obtaining mobile terminal is sent to user; Request instruction is used to indicate mobile terminal and uploads the first address list to server;
Mobile terminal shows authorization requests to user after receiving request instruction;
The feedback information that user's input agreement corresponding with authorization requests is uploaded, uploads the first address list to server.
Wherein, according to the first address list and the second address list prestored, determine that at least one object to be shielded comprises:
Contrast the user profile in the first address list and the user profile in the second address list, at least one object identical according to comparing result determination user profile;
Arranging at least one object is at least one object to be shielded.
Wherein, shielding strategy comprises the relevant message of server shielding at least one object to be shielded described; Server sends masking instruction at least one object to be shielded, and masking instruction is used to indicate the user-dependent message of shielding, performs the shielding strategy corresponding with at least one object to be shielded and comprises:
Shield the message that at least one object to be shielded is relevant;
Send masking instruction at least one object to be shielded, masking instruction is used to indicate the user-dependent message of shielding.
Wherein, said method also comprises:
What obtain that user triggers arranges instruction, arranges instruction and is used to indicate the object that user will shield;
According to arranging instruction, the user in the second address list is set at least one object to be shielded.
Embodiments providing a kind of good friend's message screening method based on address list, by obtaining the first address list of customer mobile terminal, making the process obtained manually go operation without the need to user.In addition, first address list can be the address list of cell phone address book or other application programs, thus the shielding that can realize multiple mobile phone address list good friend message, add the range of choice of at least one shielding object, further increase the scope of shielding object, to the terseness of Object Selection to be shielded, improve the applicability of the present embodiment screen method.In addition; by in the second address list and the first address list comparison process; if the information of user is identical; then can confirm as at least one object to be shielded; identical good friend between first address list with the second address list can be shielded completely; the personal secrets of protection user, the further demand of protection user, strengthen user personal experience in use.In addition, by performing in the shielding strategy corresponding with at least one object to be shielded, user can, according to the object to be shielded arranged, send to the message of object to be shielded to shield by server, object to be shielded sends to the message of user also can shield, without the need to the setting that object to be shielded is other, after user arranges shielding, mutual message screening can be realized between the two, simple to operate, practicality is high, simplifies the operation of user further, strengthens Consumer's Experience.
Embodiment two
Embodiments provide a kind of good friend's message screening method based on address list, with reference to shown in Fig. 1, the method comprises:
First address list of S101, acquisition customer mobile terminal, the first address list is the address list of the first application program.
Wherein, the first address list can be the address list in user mobile phone or other mobile terminals, also can be the address list of application program in mobile phone or other mobile terminals.
Concrete, the process that server end obtains the first address list can be:
Server sends the request instruction of the first address list obtaining mobile terminal to user; This request instruction is used to indicate mobile device and uploads the first address list to server;
Mobile device shows authorization requests to user after receiving request instruction;
When after the feedback information that user uploads according to the input agreement corresponding with this authorization requests, upload the first address list to server.
When user according to input is corresponding with this authorization requests do not agree to the feedback information uploaded after, end.
When obtaining the first address list of customer mobile terminal, mobile terminal uploads the first address list according to authorized order to server, manually goes to add without the need to user, simple to operate; And the first address list can be the address list of cell phone address book or other application programs, the scope contained is wide, compatible strong.In addition, in order to meet the privacy requirements of user, the mandate of user can be solicited before acquisition first address list, also reducing the data volume of upload server simultaneously, reduce data redundancy.
S102, according to the first address list and the second address list of prestoring, determine at least one object to be shielded, the second address list is the address list of the second application program.
Wherein, the second address list is be pre-stored in server;
In this second address list, the user profile in user list comprises the phone number of user, title, Email Accounts, instant messaging program account, social application account or other information;
Optionally, user list can also comprise mark, and whether this mark is provided with the object of masked state and shielding for identifying active user.In the process of server process, if there is the object of same subscriber information between the two, server end by its independent list, but can not mark in the list of the second address list, is set to object to be shielded.
By arranging the mark of object to be shielded in the user list of the second address list, can directly can identify in the user list of the second address list without the need to setting up separately list to be shielded, save memory space, also simplify the step of setting, improve the processing speed of data, the memory space of further saving server end, improves the screening effeciency of data, improves server to the optimal speed of data.
Concrete, contrast the first address list and the second address list determines that the process of at least one object to be shielded is:
Contrast the user profile in the first address list and the user profile in the second address list, at least one object identical according to comparing result determination user profile;
According to the difference of the first application program, contrast the user profile in the first address list and the user profile in the second address list can be: if the first address list is cell phone address book, then the user profile contrasted is phone number or name etc.;
If the first address list is good friend's address list of other application programs, then the user profile contrasted is good friend's account;
Above-mentioned way of contrast and the first application program are only exemplary, and the embodiment of the present invention is not limited concrete way of contrast and the first application program.
Server can travel through the user profile in the first address list, and contrast with the user profile in the second address list, search the object with the identical information in the second address list in the first address list, and judge whether the object of identical information according to the result of searching.
Arranging at least one object is at least one object to be shielded.
After finding the object of identical information by contrast, this object can be marked in the user list of the second address list in server, be state to be shielded by this object tag, this object is set to object to be shielded.
Due in the second address list and the first address list comparison process; if the information of user is identical; then confirm as the object that at least one is to be shielded; identical good friend between first address list with the second address list all can be selected; coverage is comprehensive, and processing speed is fast, protects the stealthy safety of user further more comprehensively; and manually go to select specific band shielding object without the need to user, safe and efficient.
S103, perform the shielding strategy corresponding with at least one object to be shielded.
In the embodiment of the present invention, message refers to the point-to-points message between user, and the link namely share, paid close attention to, picture character etc., do not comprise the point-to-point message between user, the communication namely between user can not be fallen in conductively-closed.
What shield is the message that user-dependent message is relevant with at least one object to be shielded, can share when communicating between user, forward link, picture and word etc., also message can be paid close attention to, also comprise the message about this user that server pushes to the other user, such as: based on user's related news in geographical position, Software advertisement related news, share forwarding messages related news, etc., related news are herein not limited thereto, as long as be included in this scope with the user-dependent message of a side, are all related news of server shielding.
Wherein, the tactful server that comprises of shielding shields the relevant message of at least one object to be shielded; Server sends masking instruction at least one object to be shielded, and masking instruction is used to indicate the user-dependent message of shielding.Shielding strategy is used for the message about the other side mutually sent between user and at least one object to be shielded to shield, and both sides can not receive the information of the other side.
Concrete, the message shielding at least one object to be shielded relevant comprises:
At least one object in second address list is set at least one object to be shielded by server;
Server shields the message that at least one object to be shielded sends according to the mark of state to be shielded.When the related news of at least one object to be shielded are sent to server, and when sending to user, server can according to the mark of state to be shielded, the related news of at least one object to be shielded with this are carried out tackling or not sending, does not namely send the related news of at least one object to be shielded to user;
If the PUSH message etc. of at least one object to be shielded of server internal generation, whether server internal detects relevant at least one object to be shielded, if it is can be shielded or not push to user.
Because the PUSH message that user is relevant at least one object to be shielded can detect by server, except by forwarding with the message screening shared except, PUSH message can shield by server equally, add the scope of shielding, what also enhance message screening is comprehensive, the further shielding accuracy of message and comprehensive of improving, improves the personal secrets of user.
Send masking instruction at least one object to be shielded, masking instruction is used to indicate the user-dependent message of shielding and comprises:
In the server, after at least one object to be shielded is set to masked state by user, the related news user that at least one object to be shielded sends cannot receive.
Specifically comprise:
Send coupling and arrange instruction, arranging user is the shielding object that at least one object to be shielded is corresponding;
Server internal is provided with Intelligent Matching program, when after the object conductively-closed to be shielded of at least one in the second address list, the user of server to this second address list mates setting accordingly, this is used for identifying, make it be masked state relative at least one object to be shielded, namely user is now shielded by least one object to be shielded.
Server arranges instruction according to coupling, and shielding user sends to the related news of at least one object to be shielded.
When the related news that this user sends or server internal produce send at least one object to be shielded with this user-dependent PUSH message time, server can detect, can carry out equally shielding or not sending for related news, at least one object to be shielded cannot receive user-dependent message.
Perform in the shielding strategy corresponding with at least one object to be shielded, server can according to the object to be shielded arranged, and when having message to be sent to server end from the other side, server can carry out automatic shield according to the state arranged; And the content of shielding is the point-to-points message that user and object to be shielded send, and do not comprise point-to-point message, the basis that ensure that normal communication communication realizes the two-way shielding of message, without the need to the setting that object to be shielded is other, after user arranges shielding, can realize mutual message screening between the two, simple to operate, practicality is high.The automaticity of further raising screen method, and the coverage and the accuracy that increase shielding object, simplify the operation of user.
Optionally, before execution step S103, can also comprise:
Obtain the interpolation request of user's input, this interpolation request is used to indicate the shielding object that user will shield;
This shielding object indicated by interpolation request is obtained from the second address list.
When the user profile in the user profile in the first address list and the second address list fill in inconsistent but still need to shield time or in order to independent object in second address list is shielded time, by obtaining the interpolation request of user's input and being set to shield object, alternative and the flexibility of user operation can be improved, increase the applicability of this method further.
Optionally, after execution step S103, can also comprise:
What obtain user's input resets the request of putting, and this is reseted the request of putting and is used to indicate user and will resets the shielding object put;
Reset and put this and reset shielding object indicated by the request of putting.
Obtain the replacement request of user and reset shielding object according to replacement request, the user profile mistake that can obtain, or do not need to revise in time when some object being added to shielding object, improve the operability of user, further raising user, to the selection of shielding object, increases the flexibility selected.
Optionally, the method for the present embodiment also comprises:
What obtain that user triggers arranges instruction, arranges instruction and is used to indicate the object that user will shield; This object is the object in the second address list.
Optionally, obtain the text instruction of user's input, text instruction is used to indicate the object to be shielded that user will shield; The input mode of text instruction comprises the phone number, name, account etc. that input user and reaches the object determining at least one object in selection second address list.
The object to be shielded indicated by text instruction is obtained from the second address list.
By obtaining the text instruction of user's input, object to be shielded is determined in the second address list, user directly can input the text message of special object, convenient and swift, can verify that when determining object to be shielded whether the information of input is correct simultaneously, from promoting further user to the cognition of user profile the second address list, user-specific information also can be corrected or be replaced other user profile when input error at any time.
Optionally, obtain the phonetic order of user's input, this phonetic order is used to indicate the object to be shielded that user will shield; Voice unit by mobile terminal completes input to the user profile such as name, phone number and identification, and in the second address list, determine the object that the information that inputs is corresponding.
The object to be shielded indicated by phonetic order is obtained from the second address list.
By obtaining the phonetic order of user, and determine object to be shielded in the second address list, the user speech instruction inconvenient for manually input can provide great convenience, improves the participation of user further, increases the diversification of input mode.
Optionally, obtain the selection instruction of user, this selection instruction is used to indicate the object to be shielded that user will shield; At least one object is selected in the second address list.
The object to be shielded indicated by selection instruction is obtained from the second address list.
By obtaining the selection instruction of user, and object to be shielded is selected in the second address list, user directly selects special object in the list of the second address list, thus determine object to be shielded, enormously simplify the operation of user, mutual between further raising is man-machine, improves the convenience of user operation.
According to arranging instruction, the user in the second address list is set at least one object to be shielded.
After arranging at least one object that instruction selectes in the second address list, at least one object identity to be shielded determined is state to be shielded by server in the second address list, completes and arranges the shielding of at least one object to be shielded.
By user, instruction is set, at least one object in second address list is set to object to be shielded by server, for can initiatively add object to be shielded when deviation appears at least one object to be shielded of server automatic acquisition, or user according to self need add object to be shielded, flexibility is high.Further raising user, to the real-time monitoring of object to be shielded, strengthens user to the selection flexibility of object to be shielded.
Optionally, set up data at server internal to store and Filtering system; Carry out classification to the point-to-points and point-to-points message between user to store and screening.For use second application program user between communication data, such as: private chat, group chat, share, data type that concern etc. is different, server internal can store by distributing different memory spaces, for chat messages can with share, pay close attention to message etc. and store respectively, when needs shield message time, be convenient to screening.
Store and Filtering system by setting up data in advance at server internal, different storages can be carried out for the different types of data communicated between user, when shielding the related news of user and at least one object to be shielded, the message shot and type that need shielding can be filtered out accurately, the treating capacity of data in further minimizing server, improves retrieval precision and the processing speed of data.
Embodiments provide a kind of good friend's message screening method based on address list, pass through
Server obtains the first address list of mobile terminal, and manually go to add object to be shielded without the need to user, when obtaining the first address list, server can seek the mandate of user, respects fully the wish of user, the privacy of protection user.The further efficiency improving acquisition object to be shielded, respects fully the personal secrets of user simultaneously.Determine object to be shielded by the first address list and the second address list are carried out contrast, seek scope is extensive, and object to be shielded is also more comprehensive, increases the scope of shielding further, the privacy of protection user.。By performing the shielding strategy corresponding with at least one object to be shielded, after user oneself arranges shielding object, the two-way shielding of related news that user and object to be shielded can send by server automatically between the two, without the need to object to be shielded is independent again, user is shielded, workable, applied widely.The operation of further simplification user, increases the promptness of message screening.In addition, when the first address list obtains, consider the shielding demand of user, needing to obtain in the first address list step of customer mobile terminal, license request can be sent to user, be determined the need of shielding by user, respecting fully the privacy requirements of user, decrease the treating capacity of servers' data simultaneously, reduce power consumption.In addition, by contrasting the first address list and the second address list, if there is the object of same subscriber information between the two, server end can not by its independent list, but identify in the list of the second address list, be set to object to be shielded, save memory space, the processing speed of data is provided.In addition, during by performing shielding strategy, user and object to be shielded can arrange the other side mutually for shield object, and when there being message to be sent to server end from the other side, server end can carry out automatic shield according to the state arranged; And the content of shielding is the point-to-points message that user and object to be shielded send, and does not comprise point-to-point message, and the basis that ensure that normal communication communication realizes the two-way shielding of message.In addition, the user with identical information in the second address list is not had in first address list of user, and when needing it to arrange separately, the setting that instruction come certain special object in the second address list can be set by what receive user's input, realize the two-way shielding of server end to the message of user and this special object, add the flexibility of this method and the selection space of user.In addition, server is set up data and is stored in Filtering system, dissimilar message is stored, and is convenient to data processing when communicating between user.In addition, when the user profile in the user profile in the first address list and the second address list fill in inconsistent but still need to shield time or in order to independent object in second address list is shielded time, by obtaining the interpolation request of user's input and being set to shield object, alternative and the flexibility of user operation can be provided, increase the applicability of this method.
Embodiment three
Present embodiments provide a kind of good friend's message screening equipment based on address list, with reference to shown in Fig. 2, this equipment 2 comprises:
Acquisition module 201, for obtaining the first address list of customer mobile terminal, the first address list is the address list of the first application program;
Processing module 202, for according to the first address list and the second address list of prestoring, determine at least one object to be shielded, the second address list is the address list of the second application program;
Executive Module 203, for performing shielding strategy corresponding to object to be shielded with at least one.
Acquisition module 201 comprises:
Server module, sends the request instruction of the first address list obtaining mobile terminal to user; Request instruction is used to indicate mobile terminal and uploads the first address list to server;
Mobile terminal module, mobile terminal shows authorization requests to user after receiving request instruction;
Upper transmission module, the feedback information that user's input agreement corresponding with authorization requests is uploaded, uploads the first address list to server.
Processing module 202 comprises:
Contrast judge module, for contrasting the user profile in the first address list and the user profile in the second address list, determines at least one object that user profile is identical;
Arranging module, is at least one object to be shielded for arranging at least one object.
Shielding strategy comprises server and shields the relevant message of at least one object to be shielded; Server sends masking instruction at least one object to be shielded, and masking instruction is used to indicate the user-dependent message of shielding, and Executive Module 203 comprises:
First shroud module, for shielding the relevant message of at least one object to be shielded;
Secondary shielding module, for sending masking instruction at least one object to be shielded, masking instruction is used to indicate the user-dependent message of shielding.
Above-mentioned acquisition module also arranges instruction for what obtain that user triggers, arranges instruction and is used to indicate the object that user will shield;
Above-mentioned module being set also for according to arranging instruction, the user in the second address list being set at least one object to be shielded.
Embodiments provide a kind of good friend's message screening equipment based on address list, obtained the first address list of customer mobile terminal by acquisition module 201, make the process obtained manually go operation without the need to user.In addition, first address list can be the address list of cell phone address book or other application programs, thus the shielding that can realize multiple mobile phone address list good friend message, add the range of choice of at least one shielding object, further increase the scope of shielding object, to the terseness of Object Selection to be shielded, improve the applicability of the present embodiment screen method.In addition; by processing module 202 in the second address list and the first address list comparison process; if the information of user is identical; then can confirm as at least one object to be shielded; identical good friend between first address list with the second address list can be shielded completely; the personal secrets of protection user, the further demand of protection user, strengthen user personal experience in use.In addition, perform in the shielding strategy corresponding with at least one object to be shielded by Executive Module 203, user can, according to the object to be shielded arranged, send to the message of object to be shielded to shield by server, object to be shielded sends to the message of user also can shield, without the need to the setting that object to be shielded is other, after user arranges shielding, mutual message screening can be realized between the two, simple to operate, practicality is high, simplifies the operation of user further, increases the promptness of message screening.
One of ordinary skill in the art will appreciate that, the all or part of step realized in above-described embodiment method is that the hardware that can carry out instruction relevant by program has come, described program can be stored in a computer read/write memory medium, this program is when performing, comprise the step as above-mentioned embodiment of the method, described storage medium, as: magnetic disc, CD, read-only store-memory body (Read-Only Memory, or random store-memory body (Random Access Memory, RAM) etc. ROM).In each embodiment of the method for the present invention; the sequence number of described each step can not be used for the sequencing limiting each step; for those of ordinary skill in the art, under the prerequisite not paying creative work, the priority of each step is changed also within protection scope of the present invention.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1., based on good friend's message screening method of address list, it is characterized in that, described method comprises:
Obtain the first address list of customer mobile terminal, described first address list is the address list of the first application program;
According to described first address list and the second address list prestored, determine at least one object to be shielded, described second address list is the address list of the second application program;
Perform the shielding strategy corresponding with at least one object to be shielded described.
2. method according to claim 1, is characterized in that, the first address list of described acquisition mobile terminal comprises:
The request instruction of described first address list obtaining mobile terminal is sent to described user; Described request instruction is used to indicate described mobile terminal and uploads described first address list to server;
Described mobile terminal shows authorization requests to described user after receiving described request instruction;
The feedback information that described user's input agreement corresponding with described authorization requests is uploaded, uploads described first address list to described server.
3. method according to claim 2, is characterized in that, described according to described first address list and the second address list prestored, and determines that at least one object to be shielded comprises:
Contrast the user profile in described first address list and the user profile in described second address list, at least one object identical according to comparing result determination user profile;
Arranging at least one object described is at least one object to be shielded described.
4. method according to claim 3, is characterized in that, described shielding strategy comprises the relevant message of server shielding at least one object to be shielded described; Server sends masking instruction at least one object to be shielded described, and described masking instruction is used to indicate the described user-dependent message of shielding, and the described execution shielding strategy corresponding with at least one object to be shielded described comprises,
The message that shielding at least one object to be shielded described is relevant;
Send masking instruction at least one object to be shielded described, described masking instruction is used to indicate the described user-dependent message of shielding.
5. method according to claim 1, is characterized in that, described method also comprises:
What obtain that user triggers arranges instruction, describedly arranges instruction and is used to indicate the object that user will shield;
Instruction is set according to described, the user in described second address list is set at least one object to be shielded described.
6., based on good friend's message screening equipment of address list, it is characterized in that, described equipment comprises:
Acquisition module, for obtaining the first address list of customer mobile terminal, described first address list is the address list of the first application program;
Processing module, for according to described first address list and the second address list of prestoring, determine at least one object to be shielded, described second address list is the address list of the second application program;
Executive Module, for performing the shielding strategy corresponding with at least one object to be shielded described.
7. equipment according to claim 6, is characterized in that, described acquisition module comprises:
Server module, sends the request instruction of described first address list obtaining mobile terminal to described user; Described request instruction is used to indicate described mobile terminal and uploads described first address list to server;
Mobile terminal module, described mobile terminal shows authorization requests to described user after receiving described request instruction;
Upper transmission module, the feedback information that described user's input agreement corresponding with described authorization requests is uploaded, uploads described first address list to described server.
8. equipment according to claim 7, is characterized in that, described processing module comprises:
Contrast judge module, for contrasting the user profile in described first address list and the user profile in described second address list, determines at least one object that user profile is identical;
Arranging module, is at least one object to be shielded described for arranging at least one object described.
9. equipment according to claim 8, is characterized in that, described shielding strategy comprises the relevant message of server shielding at least one object to be shielded described; Server sends masking instruction at least one object to be shielded described, and described masking instruction is used to indicate the described user-dependent message of shielding, and described Executive Module comprises:
First shroud module, for shielding the relevant message of at least one object to be shielded described;
Secondary shielding module, for sending masking instruction at least one object to be shielded described, described masking instruction is used to indicate the described user-dependent message of shielding.
10. equipment according to claim 6, is characterized in that,
Described acquisition module also arranges instruction for what obtain that user triggers, describedly arranges instruction and is used to indicate the object that user will shield;
Described module being set also for arranging instruction according to described, the user in described second address list being set at least one object to be shielded described.
CN201510413765.2A 2015-07-14 2015-07-14 Friend message shielding method and device based on address list Pending CN104994009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510413765.2A CN104994009A (en) 2015-07-14 2015-07-14 Friend message shielding method and device based on address list

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510413765.2A CN104994009A (en) 2015-07-14 2015-07-14 Friend message shielding method and device based on address list

Publications (1)

Publication Number Publication Date
CN104994009A true CN104994009A (en) 2015-10-21

Family

ID=54305765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510413765.2A Pending CN104994009A (en) 2015-07-14 2015-07-14 Friend message shielding method and device based on address list

Country Status (1)

Country Link
CN (1) CN104994009A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450510A (en) * 2015-12-18 2016-03-30 小米科技有限责任公司 Friend management method, device and server for social network platform
CN105898060A (en) * 2016-04-22 2016-08-24 广东小天才科技有限公司 Message receiving method and system for smart watch
CN110300049A (en) * 2018-03-23 2019-10-01 阿里巴巴集团控股有限公司 A kind of message screening method, equipment and system based on instant messaging
CN110505146A (en) * 2019-08-23 2019-11-26 人立方智能科技有限公司 A kind of instant communication method and system applied to recruitment system
CN111740896A (en) * 2020-07-07 2020-10-02 腾讯科技(深圳)有限公司 Content sharing control method and device, electronic equipment and storage medium
CN111786874A (en) * 2019-04-17 2020-10-16 北京京东尚科信息技术有限公司 Caller identification method and device
CN113298667A (en) * 2021-05-24 2021-08-24 维沃移动通信有限公司 Message shielding method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562789A (en) * 2009-05-04 2009-10-21 腾讯科技(北京)有限公司 Method and device for integrating address list and instant messaging software
US20110151896A1 (en) * 2009-12-18 2011-06-23 Alcatel-Lucent Usa Inc. Method and apparatus for selective message service blocking
CN102325097A (en) * 2011-09-04 2012-01-18 上海量明科技发展有限公司 Limited shielding method in instant communication and system
CN103345606A (en) * 2013-05-31 2013-10-09 东莞宇龙通信科技有限公司 Method and device for protecting mobile terminal address list contact person information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562789A (en) * 2009-05-04 2009-10-21 腾讯科技(北京)有限公司 Method and device for integrating address list and instant messaging software
US20110151896A1 (en) * 2009-12-18 2011-06-23 Alcatel-Lucent Usa Inc. Method and apparatus for selective message service blocking
CN102325097A (en) * 2011-09-04 2012-01-18 上海量明科技发展有限公司 Limited shielding method in instant communication and system
CN103345606A (en) * 2013-05-31 2013-10-09 东莞宇龙通信科技有限公司 Method and device for protecting mobile terminal address list contact person information

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450510A (en) * 2015-12-18 2016-03-30 小米科技有限责任公司 Friend management method, device and server for social network platform
CN105450510B (en) * 2015-12-18 2019-03-01 小米科技有限责任公司 Friend management method, device and server for social network-i i-platform
CN105898060A (en) * 2016-04-22 2016-08-24 广东小天才科技有限公司 Message receiving method and system for smart watch
CN110300049A (en) * 2018-03-23 2019-10-01 阿里巴巴集团控股有限公司 A kind of message screening method, equipment and system based on instant messaging
CN110300049B (en) * 2018-03-23 2022-05-27 阿里巴巴集团控股有限公司 Message shielding method, device and system based on instant messaging
CN111786874A (en) * 2019-04-17 2020-10-16 北京京东尚科信息技术有限公司 Caller identification method and device
CN111786874B (en) * 2019-04-17 2022-09-06 北京京东尚科信息技术有限公司 Caller identification method and device
CN110505146A (en) * 2019-08-23 2019-11-26 人立方智能科技有限公司 A kind of instant communication method and system applied to recruitment system
CN111740896A (en) * 2020-07-07 2020-10-02 腾讯科技(深圳)有限公司 Content sharing control method and device, electronic equipment and storage medium
CN111740896B (en) * 2020-07-07 2023-07-25 腾讯科技(深圳)有限公司 Content sharing control method and device, electronic equipment and storage medium
CN113298667A (en) * 2021-05-24 2021-08-24 维沃移动通信有限公司 Message shielding method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104994009A (en) Friend message shielding method and device based on address list
US20230015178A1 (en) Techniques for messaging bot rich communication
EP3270619B1 (en) Network connection control method and system for mobile terminal
KR102415452B1 (en) Techniques for automated determination of form responses
CN109669924A (en) Sharing method, device, electronic equipment and the storage medium of online document
CN113691444B (en) Instant messaging system for organization
US20170250935A1 (en) Techniques for messaging bot app interactions
EP3211840B1 (en) Techniques for messaging bot rich communication
CN107273415A (en) Peer system can search for by the subject index based on instant messaging
CN105469502A (en) Intelligent oiling method and terminal
CN102413233B (en) Contact information expansion processing method and device of mobile terminal
US9313210B2 (en) Automated privacy level suggestions for social networking
CN106357521A (en) Data sharing method and device
WO2013184394A2 (en) Transmitting initiation details from a mobile device
CN103249115A (en) Policy configuration method and device
CN104662581A (en) Group management method and server in mobile social network service application
CN106411920A (en) Data sharing method and device
CN105657781A (en) Method and device for accessing WiFi network
CN107229875A (en) Terminal method for secret protection and system
CN107423395A (en) Navigation data processing system
CN107180109A (en) Location-based Condom recommends method and system
CN107103565A (en) Network meal-ordering method and system based on positioning
US20230013744A1 (en) Connection of network members
CN102223399B (en) Contact person session presentation method based on intelligent terminal and system thereof
CN107272733A (en) The unmanned aerial vehicle (UAV) control method and system of terminal positioning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151021