CN105491542B - number identification method and device - Google Patents

number identification method and device Download PDF

Info

Publication number
CN105491542B
CN105491542B CN201510867395.XA CN201510867395A CN105491542B CN 105491542 B CN105491542 B CN 105491542B CN 201510867395 A CN201510867395 A CN 201510867395A CN 105491542 B CN105491542 B CN 105491542B
Authority
CN
China
Prior art keywords
short message
sender
mark
message
target critical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510867395.XA
Other languages
Chinese (zh)
Other versions
CN105491542A (en
Inventor
王广健
潘龙
邹易兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510867395.XA priority Critical patent/CN105491542B/en
Publication of CN105491542A publication Critical patent/CN105491542A/en
Application granted granted Critical
Publication of CN105491542B publication Critical patent/CN105491542B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure is directed to a kind of number identification method and devices, belong to field of communication technology.The described method includes: receiving the short message that the first number is sent;It is getting with after the matched sender's mark of first number, whether detect in the short message includes target critical information;If including the target critical information in the short message, when showing the short message, sender's mark is shielded, shows first number.When due to including target critical information in short message, sender's mark is shielded, even if there are pseudo-base stations in this way, it includes the short message of sender's mark that someone, which pretends to be the number to send to user, the probability that user is cheated can also be substantially reduced, therefore this kind of Number Reorganization mode is more intelligent, better effect.

Description

Number identification method and device
Technical field
This disclosure relates to field of communication technology, in particular to a kind of number identification method and device.
Background technique
With being constantly progressive for society, the mobile terminals such as mobile phone become the electronic product of manpower indispensability.By mobile whole The built-in short message module in end carries out the transmitting-receiving of short message, a quite high function of utilization rate even more in people's daily life.? After receiving a short message, other than message content itself, people offset breath sender toward contact and compare care, therefore how Identification sends the number of short message, becomes the problem that everybody more pays close attention to.
In the related technology, after receiving number 106XXXX and being sent to the short message of user, short message is parsed, If including that sender identifies in the short message parsed, directly sender mark is shown by short message module. For example, showing XX bank printed words in sender region when showing this short message.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of number identification method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of number identification method is provided, which comprises
Receive the short message of the first number transmission;
It is getting with after the matched sender's mark of first number, whether detect in the short message includes target Key message;
If including that the target critical information shields the transmission when showing the short message in the short message Person's mark, shows first number.
It in another embodiment, whether include target critical information in the detection short message, comprising:
Template analysis is carried out to the short message, obtains the message body of the short message;
Detect in the message body whether comprising URL (Uniform Resoure Locator, uniform resource locator) or Nominal key;
If in the message body comprising in the URL or the nominal key at least one of, it is determined that it is described short to disappear It include the target critical information in breath.
In another embodiment, the method also includes:
When detecting user to the clicking operation of the URL or to the return operation of first number, display is forbidden The prompt information of operation.
In another embodiment, the method also includes:
First number is sent to cloud, number and transmission by the cloud based on first number in storage It is searched in corresponding relationship between person's mark, obtains identifying with the matched sender of first number;
Receive identifying with the matched sender of first number for the cloud return.
In another embodiment, the method also includes:
If not including the target keywords in the short message, when show the short message, display and described the The matched sender's mark of one number.
According to the second aspect of an embodiment of the present disclosure, a kind of NID number identifier is provided, described device includes:
Receiving module is configured as receiving the short message that the first number is sent;
Detection module is configured as getting with after the matched sender's mark of first number, detect described short It whether include target critical information in message;
Display module is showing described short disappear if being configured as includes the target critical information in the short message When breath, sender's mark is shielded, shows first number.
In another embodiment, the detection module is configured as carrying out template analysis to the short message, obtains institute State the message body of short message;It whether detects in the message body comprising URL or nominal key;If in the message body including institute State in URL or the nominal key at least one of, it is determined that include the target critical information in the short message.
In another embodiment, the display module is additionally configured in the click behaviour for detecting user to the URL Make or when to the return operation of first number, shows the prompt information of quiescing.
In another embodiment, described device further include:
Sending module is configured as first number being sent to cloud, is based on first number by the cloud It searches, obtains and the matched transmission of the first number in corresponding relationship between the number of storage and sender's mark Person's mark;
The receiving module is additionally configured to receive marking with the matched sender of first number for the cloud return Know.
In another embodiment, the display module, if being additionally configured in the short message does not include the target Keyword, then when showing the short message, display is identified with the matched sender of first number.
According to the third aspect of an embodiment of the present disclosure, a kind of NID number identifier is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to: receive the first number send short message;It is getting and the number one Whether after the matched sender's mark of code, detecting in the short message includes target critical information;If including in the short message The target critical information shields sender's mark, shows first number then when showing the short message.
The technical scheme provided by this disclosed embodiment can include the following benefits:
After receiving the short message of the first number transmission and getting the corresponding sender's mark of the number, not direct root Number home prompt is carried out to user according to sender mark, but short message is parsed, detect in the short message whether Including target critical information;If including target critical information in short message, when showing short message, shielding sender's mark, Show the first number.When due to including target critical information in short message, sender's mark is shielded, even if in this way There are pseudo-base station, it includes the short message of sender's mark that someone, which pretends to be the number to send to user, can also substantially reduce user's quilt The probability deceived, therefore this kind of Number Reorganization mode is more intelligent, better effect.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of number identification method shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of number identification method shown according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Fig. 4 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of flow chart of number identification method shown according to an exemplary embodiment, as shown in Figure 1, this number Code recognition methods is for including the following steps in terminal.
In a step 101, the short message that the first number is sent is received.
In a step 102, it is getting with after the matched sender's mark of the first number, is detecting in the short message and whether wrap Include target critical information.
In step 103, if including target critical information in the short message, when showing the short message, shielding is sent Person's mark, shows the first number.
The method that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
Wherein, " the first number " herein can be any number, is herein only to state conveniently, not refers in particular to or limit It is fixed.
In another embodiment, whether detect in short message includes target critical information, comprising:
Template analysis is carried out to short message, obtains the message body of short message;
Whether detect in message body includes URL or nominal key;
If including at least one in URL or nominal key in message body, it is determined that include target critical in short message Information.
In another embodiment, this method further include:
When detecting user to the clicking operation of URL or to the return operation of the first number, mentioning for quiescing is shown Show information.
In another embodiment, this method further include:
First number is sent to cloud, by cloud based on the first number the number of storage and sender mark between It is searched in corresponding relationship, obtains identifying with the matched sender of the first number;
Receive identifying with the matched sender of the first number for cloud return.
In another embodiment, this method further include:
If not including target keywords in short message, when showing short message, display and the matched transmission of the first number Person's mark.
All the above alternatives can form the alternative embodiment of the disclosure, herein no longer using any combination It repeats one by one.
Fig. 2 is a kind of flow chart of number identification method shown according to an exemplary embodiment, as shown in Fig. 2, this number Code recognition methods is for including the following steps in terminal.
In step 201, the short message that the first number is sent is received.
In daily life, user terminal may receive a plurality of short message daily.These short messages both may be logical News record in contact number send message, it is also possible to bank, operator, all kinds of businessmans yellow page number send message, The message that the numbers such as even all kinds of harassing and wrecking, swindle are sent.Since various hoaxes emerge one after another at present, for example pseudo-base station is deposited Pretended in, other side by number, be masquerading as bank's customer service number or Service Dialing Numbers etc. to short-message sending under users' terminal, It is speculated with this.If terminal is after receiving the short message of swindle, without any detection processing, such as directly will Printed words such as " XX banks " are shown in sender region, such that user more believes that this short message is exactly real number It initiates, does not take precautions against psychology so as to cause user, it is easier to have dust thrown into the eyes.The embodiment of the present disclosure is asked to solve above-mentioned technology Topic, provides a kind of number identification method, while facilitating user quickly to check numbers to identify, also short disappears to what is received Breath has carried out effective detection and has carried out corresponding prompt to user, to substantially reduce user's property loss or leakage of private information Risk.
In the embodiments of the present disclosure, terminal does not immediately show this short message after receiving a short message Show, but first carry out following step 202 shown to the treatment process of step 205 and then to it, with reach check numbers into The purpose that row effectively identifies.During this, short message can be stored temporarily in the storage mediums such as memory or flash memory, and the disclosure is real Example is applied to this without specifically limiting.
In step 202, it obtains and is identified with the matched sender of the first number.
Wherein, sender identifies the title for referring to sender.For example, 106XXXX corresponds to XX bank.In the embodiment of the present disclosure In, it can obtain and be identified with the matched sender of the first number in several ways, detailed process is as follows.
Whether first way, inquiring in address list includes the first number;If comprising obtaining information where the first number Contact name in entry.Wherein, the corresponding data entries of a contact person in address list.In this data entries at least It include contact number and contact name.
The second way directly acquires sender's mark in the short message if including that sender identifies in the short message Know.For example, a short message is that " the credit card 21:21 on the 27th of [China Merchants Bank] your tail number 1876 consumes 853.00 yuan of # of RMB 30 yuan of refund gold are led, slow with one's hands nothing → cmbtcn/mZm ", then " China Merchants Bank " is just to identify with the matched sender of the first number.
The third mode, is sent to cloud for the first number, number and transmission by cloud based on the first number in storage It is searched in corresponding relationship between person's mark, obtains identifying with the matched sender of the first number.And then it will by cloud Sender mark is issued to terminal.Wherein, cloud can be yellow pages server, have recorded post office, hospital, businessman, bank, express delivery Corresponding relationship between the number and identification information of company, each large enterprises or company etc..
It is marked it should be noted that if still cannot be got by above-mentioned three kinds of modes with the matched sender of the first number Know, then directly when showing the short message, shows the first number in sender region.
In step 203, whether detect in the short message includes target critical information;If including target critical information, Execute following step 204;If not including target critical information, following step 205 is executed.
Wherein, be divided into two major classes in the target critical deposit of faith, one kind is URL, it is another kind of be include transferring accounts, paying, handing over Easily, * * * member, downloading, identifying code etc. are with user's property safety and the higher nominal key of the related risk of personal secrets.
In the embodiments of the present disclosure, when in detecting the short message whether including target critical information, following sides can be taken Formula is realized: being carried out template analysis to short message, is obtained the message body of short message;Whether detect fixed comprising unified resource in message body Position symbol URL or nominal key;If including at least one in URL or nominal key in message body, it is determined that in short message Including target critical information.
For a number, for the number especially stored in yellow pages server, although each number may A variety of message are issued simultaneously, but these message have fixed form in most cases.For example, identifying code message, prompting Class message etc..With short message, " [fly ox net] parent, congratulates you and has obtained 50 yuan to be of use certificate, supplements with money before on December 31st, 2015, good goods Wireless purchase, quick-fried money second everyday!XXX.com is clicked to quit the subscription of " for, then the message template of this short message is just " [flying ox net] parent <*:>, 50 yuan of<*:>are of use certificate, supplement with money before<TIME>, and good goods is wirelessly purchased, quick-fried money second everyday!<*:><URL>is quit the subscription of ".Wherein, disappear Ceasing head is " flying ox net ", and can specify this number by message header is whom.Message body is the part other than message header.It is right It include URL in message body for this message template.For another message template " [debt-credit is precious] identifying code < VERIFICATIONCODE>,<*:>borrows or lends money precious<*:>for you, please don't tell identifying code to other people " for, include in message body Identifying code includes nominal key.
This step is illustrated with two small examples below.
If short message is that " [flying ox net] parent, congratulates you and obtained 50 yuan to be of use certificate, fills before on December 31st, 2015 Value, good goods wirelessly purchases, quick-fried money second everyday!XXX.com is clicked to quit the subscription of ", then due to including URL " XXX.com " in this short message, It is thus determined that including target critical information in this short message, degree of risk is higher.
If a short message is that " you pass through the credit card of tail number 1876 to grandson * *, and the card of the tail number 6521 of China Merchants Bank turns Account failure!Transfer amounts can be restored to your account within a hour, can send a telegraph 95555 understanding details ", then since this is short Include " transferring accounts " wording in message, be related to pecuniary exchange, it is thus determined that including target critical information, risk in this short message Degree is higher.
In step 204, if including target critical information in the short message, when showing the short message, shielding is sent Person's mark, shows the first number.
Due to including target keywords in short message, then proving this short message, there are potential security risks, then for It allows user to be taken precautions against, does not then show that the corresponding sender's mark of the first number is more preferable.Because if showing in this case Sender mark, then user will more believe that this short message is that real number is initiated, will not how many prevention heart Reason, greatly improves the probability having dust thrown into the eyes.
Usual short message module can be arranged sender region in the top of message display area, use when showing short message The number or sender's mark of short message are sent in display.So, when showing the short message, directly the first number is shown Sender region.
In the follow-up process, if detecting, user grasps to the clicking operation of URL in short message or to the reply of the first number When making, the prompt information of quiescing is shown.The prompt information, for prompting user this time to operate, there may be potential wind Danger.Wherein, return operation can be clawback operation or message back operation, and the embodiment of the present disclosure is to this without specifically limiting.It mentions Show that information can be shown in a manner of pop-up, the embodiment of the present disclosure is to this equally without specifically limiting.
In step 205, if not including target critical information in the short message, when show the short message, display and the The matched sender's mark of one number.
Due to not including target keywords in short message, then a possibility that proving this short message there are security risks compared with It is small, it can show the corresponding sender's mark of the first number.So, directly that the first number is corresponding when showing the short message Sender mark be shown in sender region.
The method that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
Fig. 3 is a kind of block diagram of NID number identifier shown according to an exemplary embodiment.Referring to Fig. 3, the device packet Include receiving module 301, detection module 302 and display module 303.
Receiving module 301 is configured as receiving the short message that the first number is sent;
Detection module 302 is configured as getting with after the matched sender's mark of the first number, detect in short message It whether include target critical information;
Display module 303, if being configured as in short message including target critical information, when showing short message, shielding Sender's mark, shows the first number.
In another embodiment, detection module 302 are configured as carrying out template analysis to short message, obtain short message Message body;Whether detect in message body includes URL or nominal key;If comprising in URL or nominal key in message body At least one of, it is determined that it include target critical information in short message.
In another embodiment, display module 303, be additionally configured to detect user to the clicking operation of URL or When to the return operation of the first number, the prompt information of quiescing is shown.
In another embodiment, referring to fig. 4, the device further include:
Sending module 304 is configured as the first number being sent to cloud, by cloud based on the first number storage number It is searched in corresponding relationship between code and sender's mark, obtains identifying with the matched sender of the first number;
Receiving module 301 is additionally configured to receive identifying with the matched sender of the first number for cloud return.
In another embodiment, display module 303, if being additionally configured in short message does not include target keywords, When showing short message, display is identified with the matched sender of the first number.
The device that the embodiment of the present disclosure provides is receiving short message that the first number is sent and to get the number corresponding After sender's mark, is not identified according to the sender directly and number home prompt is carried out to user, but short message is carried out Whether parsing, detecting in the short message includes target critical information;It is short showing if in short message including target critical information When message, shielding sender's mark shows the first number.When due to including target critical information in short message, to sender Mark is shielded, even if it includes the short of sender's mark that someone, which pretends to be the number to send to user, in this way there are pseudo-base station Message can also substantially reduce the probability that user is cheated, therefore this kind of Number Reorganization mode is more intelligent, better effect.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 5 is a kind of block diagram for the device 500 identified of checking numbers shown according to an exemplary embodiment.Example Such as, device 500 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, and plate is set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig. 5, device 500 may include following one or more components: processing component 502, memory 504, power supply Component 506, multimedia component 508, audio component 510, the interface 512 of I/O (Input/Output, input/output), sensor Component 514 and communication component 516.
The integrated operation of the usual control device 500 of processing component 502, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 502 may include that one or more processors 520 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 502 may include one or more modules, just Interaction between processing component 502 and other assemblies.For example, processing component 502 may include multi-media module, it is more to facilitate Interaction between media component 508 and processing component 502.
Memory 504 is configured as storing various types of data to support the operation in device 500.These data are shown Example includes the instruction of any application or method for operating on device 500, contact data, and telephone book data disappears Breath, picture, video etc..Memory 504 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as SRAM (Static Random Access Memory, static random access memory), EEPROM (Electrically-Erasable Programmable Read-Only Memory, the read-only storage of electrically erasable Device), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM (Programmable Read-Only Memory, programmable read only memory), and ROM (Read-Only Memory, it is read-only to deposit Reservoir), magnetic memory, flash memory, disk or CD.
Power supply module 506 provides electric power for the various assemblies of device 500.Power supply module 506 may include power management system System, one or more power supplys and other with for device 500 generate, manage, and distribute the associated component of electric power.
Multimedia component 508 includes the screen of one output interface of offer between described device 500 and user.One In a little embodiments, screen may include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel, touch panel).If screen includes touch panel, screen may be implemented as touch screen, from the user to receive Input signal.Touch panel includes one or more touch sensors to sense the gesture on touch, slide, and touch panel.Institute The boundary of a touch or slide action can not only be sensed by stating touch sensor, but also be detected and the touch or slide phase The duration and pressure of pass.In some embodiments, multimedia component 508 includes that a front camera and/or postposition are taken the photograph As head.When device 500 is in operation mode, such as in a shooting mode or a video mode, front camera and/or rear camera can With the multi-medium data outside reception.Each front camera and rear camera can be a fixed optical lens system Or there are focusing and optical zoom capabilities.
Audio component 510 is configured as output and/or input audio signal.For example, audio component 510 includes a MIC (Microphone, microphone), when device 500 is in operation mode, such as call mode, recording mode, and voice recognition mode When, microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory 504 Or it is sent via communication component 516.In some embodiments, audio component 510 further includes a loudspeaker, for exporting audio Signal.
I/O interface 512 provides interface between processing component 502 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 514 includes one or more sensors, and the state for providing various aspects for device 500 is commented Estimate.For example, sensor module 514 can detecte the state that opens/closes of equipment 500, the relative positioning of component, such as component For the display and keypad of device 500, sensor module 514 can be with the position of 500 1 components of detection device 500 or device Set change, the existence or non-existence that user contacts with device 500, the temperature in 500 orientation of device or acceleration/deceleration and device 500 Variation.Sensor module 514 may include proximity sensor, be configured to detect without any physical contact near The presence of object.Sensor module 514 can also include optical sensor, such as CMOS (Complementary Metal Oxide Semiconductor, complementary metal oxide) or CCD (Charge-coupled Device, charge coupled cell) image biography Sensor, for being used in imaging applications.In some embodiments, which can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 516 is configured to facilitate the communication of wired or wireless way between device 500 and other equipment.Device 500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 516 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 516 further includes that (Near Field Communication, near field are logical by NFC Letter) module, to promote short range communication.For example, RFID (Radio Frequency can be based in NFC module Identification, radio frequency identification) technology, IrDA (Infra-red Data Association, Infrared Data Association) skill Art, UWB (Ultra Wideband, ultra wide band) technology, BT (Bluetooth, bluetooth) technology and other technologies are realized.
In the exemplary embodiment, device 500 can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), DSP (Digital signal Processor, at digital signal Manage device), DSPD (Digital signal Processor Device, digital signal processing appts), PLD (Programmable Logic Device, programmable logic device), FPGA) (Field Programmable Gate Array, field programmable gate Array), controller, microcontroller, microprocessor or other electronic components realize, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 504 of instruction, above-metioned instruction can be executed by the processor 520 of device 500 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, RAM (Random Access Memory, random access memory Device), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and light data deposit Store up equipment etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of number identification method, which comprises
Receive the short message of the first number transmission;
It whether include that target critical is believed getting and after the matched sender's mark of the first number, detecting in short message Breath;
If including target critical information in short message, when showing short message, shielding sender's mark shows number one Code.
In another embodiment, whether detect in short message includes target critical information, comprising:
Template analysis is carried out to short message, obtains the message body of short message;
Whether detect in message body includes URL or nominal key;
If including at least one in URL or nominal key in message body, it is determined that include target critical in short message Information.
In another embodiment, this method further include:
When detecting user to the clicking operation of URL or to the return operation of the first number, mentioning for quiescing is shown Show information.
In another embodiment, this method further include:
First number is sent to cloud, by cloud based on the first number the number of storage and sender mark between It is searched in corresponding relationship, obtains identifying with the matched sender of the first number;
Receive identifying with the matched sender of the first number for cloud return.
In another embodiment, this method further include:
If not including target keywords in short message, when showing short message, display and the matched transmission of the first number Person's mark.
The non-transitorycomputer readable storage medium that the embodiment of the present disclosure provides, in short the disappearing for receiving the transmission of the first number After ceasing and getting the corresponding sender's mark of the number, is not identified according to the sender directly and number home is carried out to user Prompt, but short message is parsed, whether detect in the short message includes target critical information;If in short message including mesh Key message is marked, then when showing short message, shielding sender's mark shows the first number.Due to including mesh in short message When marking key message, sender's mark is shielded, even if someone pretends to be the number to send out to user in this way there are pseudo-base station The short message including sender's mark is sent, the probability that user is cheated can also be substantially reduced, therefore this kind of Number Reorganization mode is more Intelligence, better effect.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (11)

1. a kind of number identification method, which is characterized in that the described method includes:
Receive the short message of the first number transmission;
It is getting with after the matched sender's mark of first number, whether detect in the short message includes target critical Information;
If including the target critical information in the short message, when showing the short message, sender's mark is shielded Know, shows first number.
2. the method according to claim 1, wherein whether including target critical in the detection short message Information, comprising:
Template analysis is carried out to the short message, obtains the message body of the short message;
It whether detects in the message body comprising uniform resource position mark URL or nominal key;
If including at least one in the URL or the nominal key in the message body, it is determined that in the short message Including the target critical information.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
When detecting user to the clicking operation of the URL or to the return operation of first number, quiescing is shown Prompt information.
4. the method according to claim 1, wherein the method also includes:
First number is sent to cloud, is marked based on first number in the number of storage and sender by the cloud It is searched in corresponding relationship between knowledge, obtains identifying with the matched sender of first number;
Receive identifying with the matched sender of first number for the cloud return.
5. method as claimed in any of claims 1 to 4, which is characterized in that the method also includes:
If not including the target critical information in the short message, when showing the short message, display and described first The sender of numbers match identifies.
6. a kind of NID number identifier, which is characterized in that described device includes:
Receiving module is configured as receiving the short message that the first number is sent;
Detection module is configured as getting with after the matched sender's mark of first number, detects the short message In whether include target critical information;
Display module, if being configured as in the short message including the target critical information, when showing the short message, Sender's mark is shielded, shows first number.
7. device according to claim 6, which is characterized in that the detection module, be configured as to the short message into Row template analysis obtains the message body of the short message;Detect in the message body whether comprising uniform resource position mark URL or Nominal key;If including at least one in the URL or the nominal key in the message body, it is determined that described short It include the target critical information in message.
8. device according to claim 7, which is characterized in that the display module is additionally configured to detecting user Clicking operation to the URL or when to the return operation of first number, shows the prompt information of quiescing.
9. device according to claim 6, which is characterized in that described device further include:
Sending module is configured as first number being sent to cloud, is based on first number by the cloud and is depositing It is searched in corresponding relationship between the number of storage and sender's mark, obtains marking with the matched sender of first number Know;
The receiving module is additionally configured to receive identifying with the matched sender of first number for the cloud return.
10. device according to any one of claims 6 to 9, which is characterized in that the display module is also configured If not include the target critical information in the short message, when showing the short message, display and the number one The matched sender's mark of code.
11. a kind of NID number identifier characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to: receive the first number send short message;It is getting and first number Whether after the sender's mark matched, detecting in the short message includes target critical information;If including described in the short message Target critical information shields sender's mark, shows first number then when showing the short message.
CN201510867395.XA 2015-12-01 2015-12-01 number identification method and device Active CN105491542B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510867395.XA CN105491542B (en) 2015-12-01 2015-12-01 number identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510867395.XA CN105491542B (en) 2015-12-01 2015-12-01 number identification method and device

Publications (2)

Publication Number Publication Date
CN105491542A CN105491542A (en) 2016-04-13
CN105491542B true CN105491542B (en) 2018-12-18

Family

ID=55678185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510867395.XA Active CN105491542B (en) 2015-12-01 2015-12-01 number identification method and device

Country Status (1)

Country Link
CN (1) CN105491542B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332027A (en) * 2016-09-26 2017-01-11 惠州Tcl移动通信有限公司 Message analysis method and intelligent terminal capable of performing message analysis
CN106658447A (en) * 2016-12-29 2017-05-10 江西博瑞彤芸科技有限公司 Data processing method based on short message service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937806A (en) * 2005-09-23 2007-03-28 英华达(上海)电子有限公司 Mobile phone short-message management method
CN103345530A (en) * 2013-07-25 2013-10-09 南京邮电大学 Social networking service blacklist automatic filtration model based on semantic net
CN104348944A (en) * 2014-08-04 2015-02-11 腾讯科技(深圳)有限公司 Caller identification method and caller identification terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2409251A4 (en) * 2009-03-20 2015-03-18 Ad Vantage Networks Llc Methods and systems for searching, selecting, and displaying content

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937806A (en) * 2005-09-23 2007-03-28 英华达(上海)电子有限公司 Mobile phone short-message management method
CN103345530A (en) * 2013-07-25 2013-10-09 南京邮电大学 Social networking service blacklist automatic filtration model based on semantic net
CN104348944A (en) * 2014-08-04 2015-02-11 腾讯科技(深圳)有限公司 Caller identification method and caller identification terminal

Also Published As

Publication number Publication date
CN105491542A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN104731868B (en) Intercept the method and device of advertisement
CN106231089B (en) Call optimization method and device
JP6126751B2 (en) Telephone call identification method, telephone call identification device, program, and recording medium
CN105260673A (en) Short message reading method and apparatus
CN105101213A (en) Information processing method and device
CN106341313A (en) Method and apparatus for obtaining billing information
CN106067111A (en) Message treatment method and device
CN110348186B (en) Display method based on user identity recognition and electronic equipment
CN105162984B (en) Telephone number recognition methods and device
JP6143973B2 (en) Reply method, apparatus, terminal, program, and recording medium for incoming call
CN105956879A (en) Method, device and system for sending electronic ticket
CN113170019B (en) Incoming call display method and terminal equipment based on application
CN104793725B (en) The processing method and processing device of alert notification message
CN104539812B (en) Recommendation information acquisition methods, terminal and server
CN104639609B (en) Network share method and device
CN104112119A (en) Face identification-based communication method and apparatus
CN105260439B (en) Data publication method, apparatus and terminal
CN106060257A (en) Method and device for viewing relevant information of contact
CN108021932A (en) Data detection method, device and electronic equipment
CN106920170A (en) Transaction based reminding method and device
CN109525652A (en) Information sharing method, device, equipment and storage medium
CN104883385B (en) Rich media file transmission method and device
CN106027361B (en) Information display method and device
CN105491542B (en) number identification method and device
CN106375178A (en) Message display method and device based on instant messaging

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant