CN105491542B - number identification method and device - Google Patents
number identification method and device Download PDFInfo
- Publication number
- CN105491542B CN105491542B CN201510867395.XA CN201510867395A CN105491542B CN 105491542 B CN105491542 B CN 105491542B CN 201510867395 A CN201510867395 A CN 201510867395A CN 105491542 B CN105491542 B CN 105491542B
- Authority
- CN
- China
- Prior art keywords
- short message
- sender
- mark
- message
- target critical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The disclosure is directed to a kind of number identification method and devices, belong to field of communication technology.The described method includes: receiving the short message that the first number is sent;It is getting with after the matched sender's mark of first number, whether detect in the short message includes target critical information;If including the target critical information in the short message, when showing the short message, sender's mark is shielded, shows first number.When due to including target critical information in short message, sender's mark is shielded, even if there are pseudo-base stations in this way, it includes the short message of sender's mark that someone, which pretends to be the number to send to user, the probability that user is cheated can also be substantially reduced, therefore this kind of Number Reorganization mode is more intelligent, better effect.
Description
Technical field
This disclosure relates to field of communication technology, in particular to a kind of number identification method and device.
Background technique
With being constantly progressive for society, the mobile terminals such as mobile phone become the electronic product of manpower indispensability.By mobile whole
The built-in short message module in end carries out the transmitting-receiving of short message, a quite high function of utilization rate even more in people's daily life.?
After receiving a short message, other than message content itself, people offset breath sender toward contact and compare care, therefore how
Identification sends the number of short message, becomes the problem that everybody more pays close attention to.
In the related technology, after receiving number 106XXXX and being sent to the short message of user, short message is parsed,
If including that sender identifies in the short message parsed, directly sender mark is shown by short message module.
For example, showing XX bank printed words in sender region when showing this short message.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of number identification method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of number identification method is provided, which comprises
Receive the short message of the first number transmission;
It is getting with after the matched sender's mark of first number, whether detect in the short message includes target
Key message;
If including that the target critical information shields the transmission when showing the short message in the short message
Person's mark, shows first number.
It in another embodiment, whether include target critical information in the detection short message, comprising:
Template analysis is carried out to the short message, obtains the message body of the short message;
Detect in the message body whether comprising URL (Uniform Resoure Locator, uniform resource locator) or
Nominal key;
If in the message body comprising in the URL or the nominal key at least one of, it is determined that it is described short to disappear
It include the target critical information in breath.
In another embodiment, the method also includes:
When detecting user to the clicking operation of the URL or to the return operation of first number, display is forbidden
The prompt information of operation.
In another embodiment, the method also includes:
First number is sent to cloud, number and transmission by the cloud based on first number in storage
It is searched in corresponding relationship between person's mark, obtains identifying with the matched sender of first number;
Receive identifying with the matched sender of first number for the cloud return.
In another embodiment, the method also includes:
If not including the target keywords in the short message, when show the short message, display and described the
The matched sender's mark of one number.
According to the second aspect of an embodiment of the present disclosure, a kind of NID number identifier is provided, described device includes:
Receiving module is configured as receiving the short message that the first number is sent;
Detection module is configured as getting with after the matched sender's mark of first number, detect described short
It whether include target critical information in message;
Display module is showing described short disappear if being configured as includes the target critical information in the short message
When breath, sender's mark is shielded, shows first number.
In another embodiment, the detection module is configured as carrying out template analysis to the short message, obtains institute
State the message body of short message;It whether detects in the message body comprising URL or nominal key;If in the message body including institute
State in URL or the nominal key at least one of, it is determined that include the target critical information in the short message.
In another embodiment, the display module is additionally configured in the click behaviour for detecting user to the URL
Make or when to the return operation of first number, shows the prompt information of quiescing.
In another embodiment, described device further include:
Sending module is configured as first number being sent to cloud, is based on first number by the cloud
It searches, obtains and the matched transmission of the first number in corresponding relationship between the number of storage and sender's mark
Person's mark;
The receiving module is additionally configured to receive marking with the matched sender of first number for the cloud return
Know.
In another embodiment, the display module, if being additionally configured in the short message does not include the target
Keyword, then when showing the short message, display is identified with the matched sender of first number.
According to the third aspect of an embodiment of the present disclosure, a kind of NID number identifier is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to: receive the first number send short message;It is getting and the number one
Whether after the matched sender's mark of code, detecting in the short message includes target critical information;If including in the short message
The target critical information shields sender's mark, shows first number then when showing the short message.
The technical scheme provided by this disclosed embodiment can include the following benefits:
After receiving the short message of the first number transmission and getting the corresponding sender's mark of the number, not direct root
Number home prompt is carried out to user according to sender mark, but short message is parsed, detect in the short message whether
Including target critical information;If including target critical information in short message, when showing short message, shielding sender's mark,
Show the first number.When due to including target critical information in short message, sender's mark is shielded, even if in this way
There are pseudo-base station, it includes the short message of sender's mark that someone, which pretends to be the number to send to user, can also substantially reduce user's quilt
The probability deceived, therefore this kind of Number Reorganization mode is more intelligent, better effect.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of number identification method shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of number identification method shown according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Fig. 4 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of flow chart of number identification method shown according to an exemplary embodiment, as shown in Figure 1, this number
Code recognition methods is for including the following steps in terminal.
In a step 101, the short message that the first number is sent is received.
In a step 102, it is getting with after the matched sender's mark of the first number, is detecting in the short message and whether wrap
Include target critical information.
In step 103, if including target critical information in the short message, when showing the short message, shielding is sent
Person's mark, shows the first number.
The method that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding
After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out
Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information
When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender
Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station
Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
Wherein, " the first number " herein can be any number, is herein only to state conveniently, not refers in particular to or limit
It is fixed.
In another embodiment, whether detect in short message includes target critical information, comprising:
Template analysis is carried out to short message, obtains the message body of short message;
Whether detect in message body includes URL or nominal key;
If including at least one in URL or nominal key in message body, it is determined that include target critical in short message
Information.
In another embodiment, this method further include:
When detecting user to the clicking operation of URL or to the return operation of the first number, mentioning for quiescing is shown
Show information.
In another embodiment, this method further include:
First number is sent to cloud, by cloud based on the first number the number of storage and sender mark between
It is searched in corresponding relationship, obtains identifying with the matched sender of the first number;
Receive identifying with the matched sender of the first number for cloud return.
In another embodiment, this method further include:
If not including target keywords in short message, when showing short message, display and the matched transmission of the first number
Person's mark.
All the above alternatives can form the alternative embodiment of the disclosure, herein no longer using any combination
It repeats one by one.
Fig. 2 is a kind of flow chart of number identification method shown according to an exemplary embodiment, as shown in Fig. 2, this number
Code recognition methods is for including the following steps in terminal.
In step 201, the short message that the first number is sent is received.
In daily life, user terminal may receive a plurality of short message daily.These short messages both may be logical
News record in contact number send message, it is also possible to bank, operator, all kinds of businessmans yellow page number send message,
The message that the numbers such as even all kinds of harassing and wrecking, swindle are sent.Since various hoaxes emerge one after another at present, for example pseudo-base station is deposited
Pretended in, other side by number, be masquerading as bank's customer service number or Service Dialing Numbers etc. to short-message sending under users' terminal,
It is speculated with this.If terminal is after receiving the short message of swindle, without any detection processing, such as directly will
Printed words such as " XX banks " are shown in sender region, such that user more believes that this short message is exactly real number
It initiates, does not take precautions against psychology so as to cause user, it is easier to have dust thrown into the eyes.The embodiment of the present disclosure is asked to solve above-mentioned technology
Topic, provides a kind of number identification method, while facilitating user quickly to check numbers to identify, also short disappears to what is received
Breath has carried out effective detection and has carried out corresponding prompt to user, to substantially reduce user's property loss or leakage of private information
Risk.
In the embodiments of the present disclosure, terminal does not immediately show this short message after receiving a short message
Show, but first carry out following step 202 shown to the treatment process of step 205 and then to it, with reach check numbers into
The purpose that row effectively identifies.During this, short message can be stored temporarily in the storage mediums such as memory or flash memory, and the disclosure is real
Example is applied to this without specifically limiting.
In step 202, it obtains and is identified with the matched sender of the first number.
Wherein, sender identifies the title for referring to sender.For example, 106XXXX corresponds to XX bank.In the embodiment of the present disclosure
In, it can obtain and be identified with the matched sender of the first number in several ways, detailed process is as follows.
Whether first way, inquiring in address list includes the first number;If comprising obtaining information where the first number
Contact name in entry.Wherein, the corresponding data entries of a contact person in address list.In this data entries at least
It include contact number and contact name.
The second way directly acquires sender's mark in the short message if including that sender identifies in the short message
Know.For example, a short message is that " the credit card 21:21 on the 27th of [China Merchants Bank] your tail number 1876 consumes 853.00 yuan of # of RMB
30 yuan of refund gold are led, slow with one's hands nothing → cmbtcn/mZm ", then " China Merchants Bank " is just to identify with the matched sender of the first number.
The third mode, is sent to cloud for the first number, number and transmission by cloud based on the first number in storage
It is searched in corresponding relationship between person's mark, obtains identifying with the matched sender of the first number.And then it will by cloud
Sender mark is issued to terminal.Wherein, cloud can be yellow pages server, have recorded post office, hospital, businessman, bank, express delivery
Corresponding relationship between the number and identification information of company, each large enterprises or company etc..
It is marked it should be noted that if still cannot be got by above-mentioned three kinds of modes with the matched sender of the first number
Know, then directly when showing the short message, shows the first number in sender region.
In step 203, whether detect in the short message includes target critical information;If including target critical information,
Execute following step 204;If not including target critical information, following step 205 is executed.
Wherein, be divided into two major classes in the target critical deposit of faith, one kind is URL, it is another kind of be include transferring accounts, paying, handing over
Easily, * * * member, downloading, identifying code etc. are with user's property safety and the higher nominal key of the related risk of personal secrets.
In the embodiments of the present disclosure, when in detecting the short message whether including target critical information, following sides can be taken
Formula is realized: being carried out template analysis to short message, is obtained the message body of short message;Whether detect fixed comprising unified resource in message body
Position symbol URL or nominal key;If including at least one in URL or nominal key in message body, it is determined that in short message
Including target critical information.
For a number, for the number especially stored in yellow pages server, although each number may
A variety of message are issued simultaneously, but these message have fixed form in most cases.For example, identifying code message, prompting
Class message etc..With short message, " [fly ox net] parent, congratulates you and has obtained 50 yuan to be of use certificate, supplements with money before on December 31st, 2015, good goods
Wireless purchase, quick-fried money second everyday!XXX.com is clicked to quit the subscription of " for, then the message template of this short message is just " [flying ox net] parent
<*:>, 50 yuan of<*:>are of use certificate, supplement with money before<TIME>, and good goods is wirelessly purchased, quick-fried money second everyday!<*:><URL>is quit the subscription of ".Wherein, disappear
Ceasing head is " flying ox net ", and can specify this number by message header is whom.Message body is the part other than message header.It is right
It include URL in message body for this message template.For another message template " [debt-credit is precious] identifying code <
VERIFICATIONCODE>,<*:>borrows or lends money precious<*:>for you, please don't tell identifying code to other people " for, include in message body
Identifying code includes nominal key.
This step is illustrated with two small examples below.
If short message is that " [flying ox net] parent, congratulates you and obtained 50 yuan to be of use certificate, fills before on December 31st, 2015
Value, good goods wirelessly purchases, quick-fried money second everyday!XXX.com is clicked to quit the subscription of ", then due to including URL " XXX.com " in this short message,
It is thus determined that including target critical information in this short message, degree of risk is higher.
If a short message is that " you pass through the credit card of tail number 1876 to grandson * *, and the card of the tail number 6521 of China Merchants Bank turns
Account failure!Transfer amounts can be restored to your account within a hour, can send a telegraph 95555 understanding details ", then since this is short
Include " transferring accounts " wording in message, be related to pecuniary exchange, it is thus determined that including target critical information, risk in this short message
Degree is higher.
In step 204, if including target critical information in the short message, when showing the short message, shielding is sent
Person's mark, shows the first number.
Due to including target keywords in short message, then proving this short message, there are potential security risks, then for
It allows user to be taken precautions against, does not then show that the corresponding sender's mark of the first number is more preferable.Because if showing in this case
Sender mark, then user will more believe that this short message is that real number is initiated, will not how many prevention heart
Reason, greatly improves the probability having dust thrown into the eyes.
Usual short message module can be arranged sender region in the top of message display area, use when showing short message
The number or sender's mark of short message are sent in display.So, when showing the short message, directly the first number is shown
Sender region.
In the follow-up process, if detecting, user grasps to the clicking operation of URL in short message or to the reply of the first number
When making, the prompt information of quiescing is shown.The prompt information, for prompting user this time to operate, there may be potential wind
Danger.Wherein, return operation can be clawback operation or message back operation, and the embodiment of the present disclosure is to this without specifically limiting.It mentions
Show that information can be shown in a manner of pop-up, the embodiment of the present disclosure is to this equally without specifically limiting.
In step 205, if not including target critical information in the short message, when show the short message, display and the
The matched sender's mark of one number.
Due to not including target keywords in short message, then a possibility that proving this short message there are security risks compared with
It is small, it can show the corresponding sender's mark of the first number.So, directly that the first number is corresponding when showing the short message
Sender mark be shown in sender region.
The method that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding
After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out
Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information
When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender
Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station
Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
Fig. 3 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.Referring to Fig. 3, the device packet
Include receiving module 301, detection module 302 and display module 303.
Receiving module 301 is configured as receiving the short message that the first number is sent;
Detection module 302 is configured as getting with after the matched sender's mark of the first number, detect in short message
It whether include target critical information;
Display module 303, if being configured as in short message including target critical information, when showing short message, shielding
Sender's mark, shows the first number.
In another embodiment, detection module 302 are configured as carrying out template analysis to short message, obtain short message
Message body;Whether detect in message body includes URL or nominal key;If comprising in URL or nominal key in message body
At least one of, it is determined that it include target critical information in short message.
In another embodiment, display module 303, be additionally configured to detect user to the clicking operation of URL or
When to the return operation of the first number, the prompt information of quiescing is shown.
In another embodiment, referring to fig. 4, the device further include:
Sending module 304 is configured as the first number being sent to cloud, by cloud based on the first number storage number
It is searched in corresponding relationship between code and sender's mark, obtains identifying with the matched sender of the first number;
Receiving module 301 is additionally configured to receive identifying with the matched sender of the first number for cloud return.
In another embodiment, display module 303, if being additionally configured in short message does not include target keywords,
When showing short message, display is identified with the matched sender of the first number.
The device that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding
After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out
Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information
When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender
Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station
Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 5 is a kind of block diagram for the device 500 identified of checking numbers shown according to an exemplary embodiment.Example
Such as, device 500 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, and plate is set
It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig. 5, device 500 may include following one or more components: processing component 502, memory 504, power supply
Component 506, multimedia component 508, audio component 510, the interface 512 of I/O (Input/Output, input/output), sensor
Component 514 and communication component 516.
The integrated operation of the usual control device 500 of processing component 502, such as with display, telephone call, data communication, phase
Machine operation and record operate associated operation.Processing component 502 may include that one or more processors 520 refer to execute
It enables, to perform all or part of the steps of the methods described above.In addition, processing component 502 may include one or more modules, just
Interaction between processing component 502 and other assemblies.For example, processing component 502 may include multi-media module, it is more to facilitate
Interaction between media component 508 and processing component 502.
Memory 504 is configured as storing various types of data to support the operation in device 500.These data are shown
Example includes the instruction of any application or method for operating on device 500, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 504 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as SRAM (Static Random Access Memory, static random access memory), EEPROM
(Electrically-Erasable Programmable Read-Only Memory, the read-only storage of electrically erasable
Device), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM
(Programmable Read-Only Memory, programmable read only memory), and ROM (Read-Only Memory, it is read-only to deposit
Reservoir), magnetic memory, flash memory, disk or CD.
Power supply module 506 provides electric power for the various assemblies of device 500.Power supply module 506 may include power management system
System, one or more power supplys and other with for device 500 generate, manage, and distribute the associated component of electric power.
Multimedia component 508 includes the screen of one output interface of offer between described device 500 and user.One
In a little embodiments, screen may include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch
Panel, touch panel).If screen includes touch panel, screen may be implemented as touch screen, from the user to receive
Input signal.Touch panel includes one or more touch sensors to sense the gesture on touch, slide, and touch panel.Institute
The boundary of a touch or slide action can not only be sensed by stating touch sensor, but also be detected and the touch or slide phase
The duration and pressure of pass.In some embodiments, multimedia component 508 includes that a front camera and/or postposition are taken the photograph
As head.When device 500 is in operation mode, such as in a shooting mode or a video mode, front camera and/or rear camera can
With the multi-medium data outside reception.Each front camera and rear camera can be a fixed optical lens system
Or there are focusing and optical zoom capabilities.
Audio component 510 is configured as output and/or input audio signal.For example, audio component 510 includes a MIC
(Microphone, microphone), when device 500 is in operation mode, such as call mode, recording mode, and voice recognition mode
When, microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory 504
Or it is sent via communication component 516.In some embodiments, audio component 510 further includes a loudspeaker, for exporting audio
Signal.
I/O interface 512 provides interface between processing component 502 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 514 includes one or more sensors, and the state for providing various aspects for device 500 is commented
Estimate.For example, sensor module 514 can detecte the state that opens/closes of equipment 500, the relative positioning of component, such as component
For the display and keypad of device 500, sensor module 514 can be with the position of 500 1 components of detection device 500 or device
Set change, the existence or non-existence that user contacts with device 500, the temperature in 500 orientation of device or acceleration/deceleration and device 500
Variation.Sensor module 514 may include proximity sensor, be configured to detect without any physical contact near
The presence of object.Sensor module 514 can also include optical sensor, such as CMOS (Complementary Metal Oxide
Semiconductor, complementary metal oxide) or CCD (Charge-coupled Device, charge coupled cell) image biography
Sensor, for being used in imaging applications.In some embodiments, which can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 516 is configured to facilitate the communication of wired or wireless way between device 500 and other equipment.Device
500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 516 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 516 further includes that (Near Field Communication, near field are logical by NFC
Letter) module, to promote short range communication.For example, RFID (Radio Frequency can be based in NFC module
Identification, radio frequency identification) technology, IrDA (Infra-red Data Association, Infrared Data Association) skill
Art, UWB (Ultra Wideband, ultra wide band) technology, BT (Bluetooth, bluetooth) technology and other technologies are realized.
In the exemplary embodiment, device 500 can be by one or more ASIC (Application Specific
Integrated Circuit, application specific integrated circuit), DSP (Digital signal Processor, at digital signal
Manage device), DSPD (Digital signal Processor Device, digital signal processing appts), PLD (Programmable
Logic Device, programmable logic device), FPGA) (Field Programmable Gate Array, field programmable gate
Array), controller, microcontroller, microprocessor or other electronic components realize, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 504 of instruction, above-metioned instruction can be executed by the processor 520 of device 500 to complete the above method.For example,
The non-transitorycomputer readable storage medium can be ROM, RAM (Random Access Memory, random access memory
Device), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and light data deposit
Store up equipment etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device executes, so that mobile terminal is able to carry out a kind of number identification method, which comprises
Receive the short message of the first number transmission;
It whether include that target critical is believed getting and after the matched sender's mark of the first number, detecting in short message
Breath;
If including target critical information in short message, when showing short message, shielding sender's mark shows number one
Code.
In another embodiment, whether detect in short message includes target critical information, comprising:
Template analysis is carried out to short message, obtains the message body of short message;
Whether detect in message body includes URL or nominal key;
If including at least one in URL or nominal key in message body, it is determined that include target critical in short message
Information.
In another embodiment, this method further include:
When detecting user to the clicking operation of URL or to the return operation of the first number, mentioning for quiescing is shown
Show information.
In another embodiment, this method further include:
First number is sent to cloud, by cloud based on the first number the number of storage and sender mark between
It is searched in corresponding relationship, obtains identifying with the matched sender of the first number;
Receive identifying with the matched sender of the first number for cloud return.
In another embodiment, this method further include:
If not including target keywords in short message, when showing short message, display and the matched transmission of the first number
Person's mark.
The non-transitorycomputer readable storage medium that the embodiment of the present disclosure provides, in short the disappearing for receiving the transmission of the first number
After ceasing and getting the corresponding sender's mark of the number, is not identified according to the sender directly and number home is carried out to user
Prompt, but short message is parsed, whether detect in the short message includes target critical information;If in short message including mesh
Key message is marked, then when showing short message, shielding sender's mark shows the first number.Due to including mesh in short message
When marking key message, sender's mark is shielded, even if someone pretends to be the number to send out to user in this way there are pseudo-base station
The short message including sender's mark is sent, the probability that user is cheated can also be substantially reduced, therefore this kind of Number Reorganization mode is more
Intelligence, better effect.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (11)
1. a kind of number identification method, which is characterized in that the described method includes:
Receive the short message of the first number transmission;
It is getting with after the matched sender's mark of first number, whether detect in the short message includes target critical
Information;
If including the target critical information in the short message, when showing the short message, sender's mark is shielded
Know, shows first number.
2. the method according to claim 1, wherein whether including target critical in the detection short message
Information, comprising:
Template analysis is carried out to the short message, obtains the message body of the short message;
It whether detects in the message body comprising uniform resource position mark URL or nominal key;
If including at least one in the URL or the nominal key in the message body, it is determined that in the short message
Including the target critical information.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
When detecting user to the clicking operation of the URL or to the return operation of first number, quiescing is shown
Prompt information.
4. the method according to claim 1, wherein the method also includes:
First number is sent to cloud, is marked based on first number in the number of storage and sender by the cloud
It is searched in corresponding relationship between knowledge, obtains identifying with the matched sender of first number;
Receive identifying with the matched sender of first number for the cloud return.
5. method as claimed in any of claims 1 to 4, which is characterized in that the method also includes:
If not including the target critical information in the short message, when showing the short message, display and described first
The sender of numbers match identifies.
6. a kind of NID number identifier, which is characterized in that described device includes:
Receiving module is configured as receiving the short message that the first number is sent;
Detection module is configured as getting with after the matched sender's mark of first number, detects the short message
In whether include target critical information;
Display module, if being configured as in the short message including the target critical information, when showing the short message,
Sender's mark is shielded, shows first number.
7. device according to claim 6, which is characterized in that the detection module, be configured as to the short message into
Row template analysis obtains the message body of the short message;Detect in the message body whether comprising uniform resource position mark URL or
Nominal key;If including at least one in the URL or the nominal key in the message body, it is determined that described short
It include the target critical information in message.
8. device according to claim 7, which is characterized in that the display module is additionally configured to detecting user
Clicking operation to the URL or when to the return operation of first number, shows the prompt information of quiescing.
9. device according to claim 6, which is characterized in that described device further include:
Sending module is configured as first number being sent to cloud, is based on first number by the cloud and is depositing
It is searched in corresponding relationship between the number of storage and sender's mark, obtains marking with the matched sender of first number
Know;
The receiving module is additionally configured to receive identifying with the matched sender of first number for the cloud return.
10. device according to any one of claims 6 to 9, which is characterized in that the display module is also configured
If not include the target critical information in the short message, when showing the short message, display and the number one
The matched sender's mark of code.
11. a kind of NID number identifier characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to: receive the first number send short message;It is getting and first number
Whether after the sender's mark matched, detecting in the short message includes target critical information;If including described in the short message
Target critical information shields sender's mark, shows first number then when showing the short message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510867395.XA CN105491542B (en) | 2015-12-01 | 2015-12-01 | number identification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510867395.XA CN105491542B (en) | 2015-12-01 | 2015-12-01 | number identification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105491542A CN105491542A (en) | 2016-04-13 |
CN105491542B true CN105491542B (en) | 2018-12-18 |
Family
ID=55678185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510867395.XA Active CN105491542B (en) | 2015-12-01 | 2015-12-01 | number identification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105491542B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106332027A (en) * | 2016-09-26 | 2017-01-11 | 惠州Tcl移动通信有限公司 | Message analysis method and intelligent terminal capable of performing message analysis |
CN106658447A (en) * | 2016-12-29 | 2017-05-10 | 江西博瑞彤芸科技有限公司 | Data processing method based on short message service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1937806A (en) * | 2005-09-23 | 2007-03-28 | 英华达(上海)电子有限公司 | Mobile phone short-message management method |
CN103345530A (en) * | 2013-07-25 | 2013-10-09 | 南京邮电大学 | Social networking service blacklist automatic filtration model based on semantic net |
CN104348944A (en) * | 2014-08-04 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Caller identification method and caller identification terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2409251A4 (en) * | 2009-03-20 | 2015-03-18 | Ad Vantage Networks Llc | Methods and systems for searching, selecting, and displaying content |
-
2015
- 2015-12-01 CN CN201510867395.XA patent/CN105491542B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1937806A (en) * | 2005-09-23 | 2007-03-28 | 英华达(上海)电子有限公司 | Mobile phone short-message management method |
CN103345530A (en) * | 2013-07-25 | 2013-10-09 | 南京邮电大学 | Social networking service blacklist automatic filtration model based on semantic net |
CN104348944A (en) * | 2014-08-04 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Caller identification method and caller identification terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105491542A (en) | 2016-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104731868B (en) | Intercept the method and device of advertisement | |
CN106231089B (en) | Call optimization method and device | |
JP6126751B2 (en) | Telephone call identification method, telephone call identification device, program, and recording medium | |
CN105260673A (en) | Short message reading method and apparatus | |
CN105101213A (en) | Information processing method and device | |
CN106341313A (en) | Method and apparatus for obtaining billing information | |
CN106067111A (en) | Message treatment method and device | |
CN110348186B (en) | Display method based on user identity recognition and electronic equipment | |
CN105162984B (en) | Telephone number recognition methods and device | |
JP6143973B2 (en) | Reply method, apparatus, terminal, program, and recording medium for incoming call | |
CN105956879A (en) | Method, device and system for sending electronic ticket | |
CN113170019B (en) | Incoming call display method and terminal equipment based on application | |
CN104793725B (en) | The processing method and processing device of alert notification message | |
CN104539812B (en) | Recommendation information acquisition methods, terminal and server | |
CN104639609B (en) | Network share method and device | |
CN104112119A (en) | Face identification-based communication method and apparatus | |
CN105260439B (en) | Data publication method, apparatus and terminal | |
CN106060257A (en) | Method and device for viewing relevant information of contact | |
CN108021932A (en) | Data detection method, device and electronic equipment | |
CN106920170A (en) | Transaction based reminding method and device | |
CN109525652A (en) | Information sharing method, device, equipment and storage medium | |
CN104883385B (en) | Rich media file transmission method and device | |
CN106027361B (en) | Information display method and device | |
CN105491542B (en) | number identification method and device | |
CN106375178A (en) | Message display method and device based on instant messaging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |