CN106060243B - Dual user system contact approaches to IM and its mobile terminal - Google Patents
Dual user system contact approaches to IM and its mobile terminal Download PDFInfo
- Publication number
- CN106060243B CN106060243B CN201610323933.3A CN201610323933A CN106060243B CN 106060243 B CN106060243 B CN 106060243B CN 201610323933 A CN201610323933 A CN 201610323933A CN 106060243 B CN106060243 B CN 106060243B
- Authority
- CN
- China
- Prior art keywords
- black list
- list information
- information
- memory space
- intelligent subscriber
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
Abstract
The present invention relates to a kind of dual user system contact approaches to IM, comprising the following steps: divides amount of physical memory are as follows: the first data space, the second data space and public memory space;When being connected to communication instruction under safety/intelligent subscriber system, the request instruction for reading black list information is sent to controlling processing module;It is that an access authority is distributed in the black list information storage area in public memory space, and establishes a channel by the access authority after control processing module receives the request instruction;Secured user's system reads black list information by the channel, and black list information duplication is stored in respective data space, and according to the contact information and black list information progress call-prompting in respective data space.Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, black list information can share use, and can guarantee that two custom systems are completely isolated.
Description
Technical field
The present invention relates to the present invention relates to mobile communication fields, and in particular to arrives a kind of dual user system contact message tube
Reason method.The invention further relates to a kind of mobile terminals for realizing above-mentioned dual user system contact approaches to IM.
Background technique
With the high speed development of internet, people pass through the intelligent terminal access movement abundant of powerful, user experience
The work that powerful calculating, storage, network, human-computer interaction, the application and service etc. that network provides are oneself is enjoyed in internet
With brought huge convenience of living.It is again different with traditional internet computer, mobile Internet intelligent terminal closer to
User lives, and a large amount of private datas in user's daily life are stored in the terminals such as smart phone, such as the social activity connection of user
It is people's information, communication information of user etc..The powerful hardware of smart phone (GPS, camera, microphone etc.) support, so that with
The sensitive informations such as the position data at family are easily obtained, once being utilized by rogue program, user is presented on illegal point for " bare "
In face of son, that is to say, that be flooded with various malice, unsafe, discordant factor, these are potential dangerous all to threaten
Privacy of user data and safety, so, it stands for user perspective, one kind is needed to be provided with secured user's system and intelligence use
Family system dual system and the completely isolated intelligent terminal of two systems, for protecting the mobile terminal of security of private data.
Meanwhile existing mobile phone is designed with a blacklist, for storing often transmission refuse messages or dialing harassing call
Phone number kept away to help user filtering to fall some frequent transmission refuse messages or dial the phone number of harassing call
The harassing and wrecking of these blacklist numbers are exempted from.But the intelligent subscriber system of dual user system and secured user's system be completely in every
From state, then, how mobile phone blacklist to be shared between intelligent subscriber system and secured user's system, be that there is an urgent need to solve
Certainly the problem of.
Summary of the invention
The invention reside in, with deficiency, provide a kind of dual user system contact information management side the shortcomings that overcoming the prior art
Method and its mobile terminal.
The present invention is realized by following technical solution: a kind of dual user system contact approaches to IM, packet
Include following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;
First data space is used to store the contact information under secured user's system;Second data space is used
In storing the contact information under intelligent subscriber system;The public memory space is used to store shared black of two custom systems
List information;
When being connected to communication instruction under secured user's system, send at the request instruction to control for reading black list information
Manage module;
It is the black list information storage area point in public memory space after control processing module receives the request instruction
A channel is established with an access authority, and by the access authority;
Secured user's system reads black list information by the channel, and black list information duplication is stored in the first number
According to memory space, and according to the contact information and black list information progress call-prompting in first data space;
When being connected to communication instruction under intelligent subscriber system, send at the request instruction to control for reading black list information
Manage module;
It is the black list information storage area point in public memory space after control processing module receives the request instruction
A channel is established with an access authority, and by the access authority;
Intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the second number
According to memory space, and according to the contact information and black list information progress call-prompting in second data space.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system
It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
As a further improvement of the present invention, it further comprises the steps of:
When being arranged in secured user's system or updating black list information, secured user's system will be on the black list information
It reaches in public memory space, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, it further comprises the steps of: when the setting in intelligent subscriber system or updates blacklist
When information, which is uploaded in public memory space by intelligent subscriber system, and synchronous by the control processing module
Update the black list information of public memory space.
The present invention also provides a kind of shared mobile terminals of the blacklist between dual user system, it is characterised in that: including
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the second data are deposited
Store up space and public memory space;First data space is used to store the contact information under secured user's system;
Second data space is used to store the contact information under intelligent subscriber system;The public memory space is for depositing
Store up the shared black list information of two custom systems;
Request module, for sending and reading asking for black list information when being connected to communication instruction under secured user's system
Ask instruction to control processing module;
Authority distribution module, for being in public memory space after control processing module receives the request instruction
An access authority is distributed in black list information storage area, and establishes a channel by the access authority;
Read module reads black list information by the channel for secured user's system, and the black list information is answered
System is stored in the first data space, and according in first data space contact information and black list information into
Row call-prompting;
The request module is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read blacklist letter
The request instruction of breath is to controlling processing module;
The authority distribution module is also used to after control processing module receives the request instruction, is that common storage is empty
Between in black list information storage area distribute an access authority, and a channel is established by the access authority;
The read module is also used to intelligent subscriber system by the channel and reads black list information, and by the blacklist
Information duplication is stored in the second data space, and according to the contact information and blacklist in second data space
Information carries out call-prompting.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system
It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
As a further improvement of the present invention, further includes:
Synchronized update module is used for when being arranged in secured user's system or updating black list information, secured user system
The black list information is uploaded in public memory space by system, and by the control processing module synchronized update public memory space
Black list information.
As a further improvement of the present invention, the synchronized update module is also used to be arranged in intelligent subscriber system
Or when updating black list information, which is uploaded in public memory space by intelligent subscriber system, and by the control
The black list information of processing module synchronized update public memory space.
The present invention also provides another dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;
The public memory space is used for storing contact information, and the contact information includes contact person's letter of secure user identity
The contact information and black list information of breath, intelligent subscriber mark;
When being connected to communication instruction under secured user's system, send read secure user identity contact information and
The request instruction of black list information is to controlling processing module;
It is the contact person of the secure user identity in public memory space after control processing module receives the request instruction
An access authority is distributed in information and black list information storage area, and establishes a channel by the access authority;
Secured user's system reads the contact information and black list information of secure user identity, and root by the channel
Call-prompting and display are carried out according to the contact information and black list information of the secure user identity in the public memory space;
When being connected to communication instruction under intelligent subscriber system, send read intelligent subscriber mark contact information and
The request instruction of black list information is to controlling processing module;
It is the contact person of the intelligent subscriber mark in public memory space after control processing module receives the request instruction
An access authority is distributed in information and black list information storage area, and establishes a channel by the access authority;
Intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark, and root by the channel
Call-prompting and display are carried out according to the contact information and black list information of the intelligent subscriber mark in the public memory space.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence
Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence
Synchronized update in energy custom system.
As a further improvement of the present invention, it further comprises the steps of: under secured user's system and/or intelligent subscriber system
When updating black list information, which is uploaded to common storage sky by secured user's system and/or intelligent subscriber system
Between in, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, in the contacts list under secured user's system, only display has safety
The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence
The contact information and black list information of user identifier.
The present invention also provides a kind of shared mobile terminals of the blacklist between dual user system comprising:
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the second data are deposited
Store up space and public memory space;The public memory space is used for storing contact information, and the contact information includes peace
Contact information, the contact information and black list information of intelligent subscriber mark of full user identifier;
Request module, for sending and reading secure user identity when being connected to communication instruction under secured user's system
The request instruction of contact information and black list information is to controlling processing module;
Authority distribution module is the peace in public memory space for controlling after processing module receives the request instruction
An access authority is distributed in the contact information of full user identifier and black list information storage area, and passes through the access authority
Establish a channel;Read module, for secured user's system by the channel read secure user identity contact information,
And black list information, and according to the contact information of the secure user identity in the public memory space and black list information into
Row call-prompting and display;
The request module is also used to when the communication instruction under intelligent subscriber system, is sent and is read intelligent subscriber mark
Contact information and black list information request instruction to controlling processing module;
The authority distribution module is also used to control after processing module receives the request instruction, is public memory space
In intelligent subscriber mark contact information and black list information storage area distribute an access authority, and pass through the visit
Ask that permission establishes a channel;
The read module is also used to contact person's letter that intelligent subscriber system reads intelligent subscriber mark by the channel
Breath and black list information, and according to the contact information and black list information of the intelligent subscriber mark in the public memory space
Carry out call-prompting and display.
It as a further improvement of the present invention, further include synchronized update module, for when in secured user's system and/or intelligence
When updating black list information under energy custom system, secured user's system and/or intelligent subscriber system upload the black list information
Into public memory space, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, in the contacts list under secured user's system, only display has safety
The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence
The contact information and black list information of user identifier.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence
Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence
Synchronized update in energy custom system.
In order to better understand and implement, the invention will now be described in detail with reference to the accompanying drawings.
Detailed description of the invention
Fig. 1 is the step flow chart of dual user system contact's approaches to IM of embodiment 1.
Fig. 2 is the division schematic diagram of the amount of physical memory of embodiment 1.
Fig. 3 is the internal module connection block diagram of the mobile terminal in embodiment 1.
Fig. 4 is the step flow chart of dual user system contact's approaches to IM of embodiment 2.
Fig. 5 is the division schematic diagram of the amount of physical memory of embodiment 2.
Fig. 6 is the internal module connection block diagram of the mobile terminal in embodiment 2.
Specific embodiment
In order to realize the management of the contact information between two custom systems in mobile terminal, the present invention mentions the present invention
A kind of dual user system contact approaches to IM is supplied, and for realizing dual user system contact information management side
The mobile terminal of method, examples illustrate the present invention especially by following.
Embodiment 1
Referring to Fig. 1, its step flow chart for dual user system contact's approaches to IM of the present embodiment 1.This
Invention provides a kind of dual user system contact approaches to IM, comprising the following steps:
S1: amount of physical memory is divided are as follows: the first data space, the second data space and common storage are empty
Between;First data space is used to store the contact information under secured user's system;The second data storage is empty
Between for storing contact information under intelligent subscriber system;The public memory space is shared for storing two custom systems
Black list information.
It should be understood that intelligent subscriber system and secured user's system described in the invention can be understood as being installed on shifting
Dual operating systems in dynamic terminal, it is understood that for the dual user space being set on mobile terminal, it might even be possible to be interpreted as
An operating system being installed on mobile terminal, it includes two sub-operating systems such as intelligent subscriber systems and secured user to be
System, in short, all technical solutions for being able to achieve its function and its adaptation disposal are the scope of protection of the invention.
It is the schematic diagram divided in the present embodiment 1 from memory space please refer to Fig. 2.
Specifically, in this step S1, first data space is also used to be stored in and pacify under secured user's system
The related data information of the application program of dress, the related data information of the application program include: that installation application program generates
Information, the information generated using the application program etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
Storing data includes: desktop editing in first data space, contact person, short message-content, and message registration is answered
With house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Second data space, is also used to be stored in the dependency number for the application program installed under intelligent subscriber system
It is believed that breath, the related data information of the application program includes: to install the information of application program generation, produced using the application program
Raw information etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
Storing data includes: desktop editing in second data space, contact person, short message-content, and message registration is answered
With house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Except secured user's system and intelligent subscriber system, there is also a control processing modules, for controlling, assisting
Adjust, manage two custom systems, the setting of blacklist memory space and black list information calling etc..
S2: when user receives communication instruction, black list information is read.It is specifically divided into following two situation:
If user currently in secured user's system, executes following steps:
S21: when receiving communication instruction under secured user's system, the request instruction of reading black list information is sent extremely
Control processing module.
Communication instruction described in the present invention can be reception incoming call, receive short message, initiates calling, check that contact person believes
The communication event instruction relevant to contact person, black list information such as breath.
S22: being the black list information storage area in public memory space after control processing module receives the request instruction
An access authority is distributed in domain, and establishes a channel by the access authority.
S23: secured user's system reads black list information by the channel, and black list information duplication is stored in the
One data space, and according in first data space contact information and black list information carry out call mention
It wakes up.
If user currently in intelligent subscriber system, executes following steps:
S24: when being connected to communication instruction under intelligent subscriber system, the request instruction extremely control for reading black list information is sent
Processing module processed.
S25: being the black list information storage area in public memory space after control processing module receives the request instruction
An access authority is distributed in domain, and establishes a channel by the access authority.
S26: intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the
Two data spaces, and according in second data space contact information and black list information carry out call mention
It wakes up.
S3: black list information is updated, following two situation is specifically divided into:
If user currently in secured user's system, executes following steps:
S31: when being arranged in secured user's system or updating black list information, secured user's system believes the blacklist
Breath is uploaded in public memory space, and by the black list information of the control processing module synchronized update public memory space.When
When user receives communication instruction, above-mentioned steps S2 is executed, the information of blacklist can be read from public memory space.
If user currently in intelligent subscriber system, executes following steps:
S32: when being arranged in intelligent subscriber system or updating black list information, intelligent subscriber system believes the blacklist
Breath is uploaded in public memory space, and by the black list information of the control processing module synchronized update public memory space.When
When user receives communication instruction, above-mentioned steps S2 is executed, the information of blacklist can be read from public memory space.
Similarly, as long as user carries out black list information update in secured user's system or intelligent subscriber system, such as: increasing
Contact person in blacklist, the contact person in deletion blacklist, the title of contact person or number etc. in change blacklist, can touch
It sends out synchronized update step above-mentioned, and then synchronizes above-mentioned black list information.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system
It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
Referring to Fig. 3, its internal mode for the mobile terminal of dual user system contact's information management in the present embodiment 1
Block connects block diagram.
The present invention also provides a kind of mobile terminals of dual user system contact information management, it is characterised in that: including
Memory space division module 11, request module 12, authority distribution module 13, read module 14 and synchronized update module 15.
The memory space division module 11, for dividing amount of physical memory are as follows: the first data space, second
Data space and public memory space;First data space is used to store the contact person under secured user's system
Information;Second data space is used to store the contact information under intelligent subscriber system;The public memory space
For storing the shared black list information of two custom systems.
Specifically, first data space, is also used to be stored in the application program installed under secured user's system
Related data information, the related data information of the application program included: the information installing application program and generating, answered using this
The information etc. generated with program, such as the information that the operation of short message, wechat, QQ, camera application program generates.
For example, the data stored in first data space include: desktop editing, contact person, short message-content,
Message registration, using house keeper, picture library, document, downloading, camera-photograph etc..
Wherein, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Second data space, is also used to be stored in the dependency number for the application program installed under intelligent subscriber system
It is believed that breath, the related data information of the application program includes: to install the information of application program generation, produced using the application program
Raw information etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
For example, the data stored in second data space include: desktop editing, contact person, short message-content,
Message registration, using house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
The request module 12 reads blacklist letter for sending when being connected to communication instruction under secured user's system
The request instruction of breath is to controlling processing module.The control processing module, for controlling, coordinating, managing two custom systems, black
The setting of list memory space and black list information calling etc..
The authority distribution module 13, for being that common storage is empty after control processing module receives the request instruction
Between in black list information storage area distribute an access authority, and a channel is established by the access authority.
The read module 14 reads black list information by the channel for secured user's system, and by the blacklist
Information duplication is stored in the first data space, and according to the contact information and blacklist in first data space
Information carries out call-prompting.
The request module 12 is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read blacklist
The request instruction of information is to controlling processing module.
The authority distribution module 13 is also used to after control processing module receives the request instruction, is common storage
An access authority is distributed in black list information storage area in space, and establishes a channel by the access authority.
The read module 14 is also used to intelligent subscriber system by the channel and reads black list information, and by the black name
Single information duplication is stored in the second data space, and according to the contact information and black name in second data space
Single information carries out call-prompting.
The synchronized update module 15 is used for when being arranged in secured user's system or updating black list information, safety
The black list information is uploaded in public memory space by custom system, and by the control processing module synchronized update common storage
The black list information in space.When user receives communication instruction, can be read from public memory space by read module 14
The information of blacklist.
The synchronized update module 15 is also used to when being arranged in intelligent subscriber system or updating black list information, intelligence
Can custom system the black list information is uploaded in public memory space, and control processing module synchronized update is public deposits by this
Store up the black list information in space.When user receives communication instruction, can be read from public memory space by read module 14
Take the information of blacklist.
Similarly, as long as user carries out black list information update in secured user's system or intelligent subscriber system, such as: increasing
Contact person in blacklist, the contact person in deletion blacklist, the title of contact person or number etc. in change blacklist, can touch
It sends out synchronized update step above-mentioned, and then synchronizes above-mentioned black list information.
Embodiment 2
Referring to Fig. 4, its step flow chart for dual user system contact's approaches to IM of embodiment 2.
The present invention also provides another dual user system contact approaches to IM, comprising the following steps:
S201: amount of physical memory is divided are as follows: the first data space, the second data space and common storage
Space;The public memory space is used for storing contact information, and the contact information includes the connection of secure user identity
The contact information and black list information of people's information, intelligent subscriber mark.
Referring to Fig. 5, its division schematic diagram for the amount of physical memory of embodiment 2.
Specifically, in this step S1, first data space is installed for being stored under secured user's system
Application program related data information, but do not include the contact information under secured user's system.The phase of the application program
Closing data information includes: information, the information generated using the application program etc. that installation application program generates, as short message, wechat,
The information that the operation of the application programs such as QQ, camera generates.
For example, what is stored in the first data space includes: desktop editing, and contact person, short message-content, message registration,
Using house keeper, picture library, document, downloading, camera-photograph.
Wherein, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Second data space, for being stored in the related data for the application program installed under intelligent subscriber system
Information, but do not include the contact information under intelligent subscriber system.The related data information of the application program includes: that installation is answered
Information, the information generated using the application program etc. generated with program, such as the operation of short message, wechat, QQ, camera application program
The information of generation.
For example, what is stored in the second data space includes: desktop editing, and contact person, short message-content, message registration,
Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Except secured user's system and intelligent subscriber system, there is also a control processing modules, for controlling, assisting
Adjust, manage two custom systems, the setting of blacklist memory space and black list information calling etc..
S202: contact information and black list information are read, following two situation is specifically included:
If user it is currently used be secured user's system when, specifically execute following steps:
S211: when being connected to communication instruction under secured user's system, the contact person's letter for reading secure user identity is sent
The request instruction of breath and black list information is to controlling processing module.
S212: being the secure user identity in public memory space after control processing module receives the request instruction
An access authority is distributed in contact information and black list information storage area, and establishes a channel by the access authority.
S213: secured user's system reads the contact information and black list information of secure user identity by the channel,
And call-prompting is carried out according to the contact information of the secure user identity in the public memory space and black list information and is shown
Show.
If active user uses intelligent subscriber system, following steps are specifically executed:
S214: when being connected to communication instruction under intelligent subscriber system, the contact person's letter for reading intelligent subscriber mark is sent
The request instruction of breath and black list information is to controlling processing module.
S215: being the intelligent subscriber mark in public memory space after control processing module receives the request instruction
An access authority is distributed in contact information and black list information storage area, and establishes a channel by the access authority.
S216: intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark by the channel,
And according to the contact information and black list information progress call-prompting in the public memory space.
S203: being updated blacklist, specific step are as follows: when in secured user's system and/or intelligent subscriber system
When lower update black list information, which is uploaded to common storage by secured user's system and/or intelligent subscriber system
In space, and by the black list information of the control processing module synchronized update public memory space.
In this step, due to preserving contact information in public memory space, and increase by one for each contact person
A identifier, the identifier are secured user system contact mark, intelligent subscriber system contact mark, blacklist contact person
Identify thrin.If so controlling processing module when setting 13812345678 is blacklist in secured user's system
It is only 13812345678 setting, one identifier, the storage location of the blacklist is constant, does not also need any such as embodiment
The black list information is uploaded in 1 into contact person's memory space the step of synchronized update.
Further, in the contacts list under secured user's system, only display has the contact person of secure user identity
Information and black list information.In the contacts list of intelligent subscriber system, only display has the contact person of intelligent subscriber mark
Information and black list information.
Compared with the prior art, contact information is shared for secured user's system and intelligent subscriber system, black list information
As long as being identified to contact information, synchronized update in secured user's system and intelligent subscriber system is not needed.
Referring to Fig. 6, its for Fig. 6 be dual user system contact's information management in embodiment 2 mobile terminal it is interior
Portion's module connects block diagram.
The present invention also provides a kind of mobile terminals of dual user system contact information management comprising: memory space
Division module 21, request module 22, authority distribution module 23, read module 24 and synchronized update module 25.
The memory space division module 21, for dividing amount of physical memory are as follows: the first data space, second
Data space and public memory space;The public memory space is used for storing contact information, the contact information
The contact information and black list information of contact information, intelligent subscriber mark including secure user identity;
Specifically, first data space, for being stored in the application program installed under secured user's system
Related data information, but do not include the contact information under secured user's system.The related data information packet of the application program
Include: information, the information generated using the application program etc. that installation application program generates, such as short message, wechat, QQ, camera are answered
The information generated with program operation.
The data stored in first data space include: desktop editing, contact person, short message-content, message registration,
Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
Second data space, for being stored in the related data for the application program installed under intelligent subscriber system
Information, but do not include the contact information under intelligent subscriber system.The related data information of the application program includes: that installation is answered
Information, the information generated using the application program etc. generated with program, such as the operation of short message, wechat, QQ, camera application program
The information of generation.
The data stored in second data space include: desktop editing, contact person, short message-content, message registration,
Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under
It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific
The setting of application program, the preservation for generating file etc..
The request module 22, for when being connected to communication instruction under secured user's system, the connection of secure user identity
It is people's information and sends the request instruction for reading black list information to controlling processing module.Specifically, the control handles mould
Block, setting and black list information calling etc. for controlling, coordinating, managing two custom systems, blacklist memory space.
The authority distribution module 23 is public memory space for controlling after processing module receives the request instruction
In secure user identity contact information and black list information storage area distribute an access authority, and pass through the visit
Ask that permission establishes a channel.
The read module 24 reads contact person's letter of secure user identity for secured user's system by the channel
Breath and black list information, and according to the contact information and black list information of the secure user identity in the public memory space
Carry out call-prompting and display.
The request module 22 is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read intelligence use
The contact information of family mark and the request instruction of black list information are to controlling processing module.
The authority distribution module 23 is also used to control after processing module receives the request instruction, is that common storage is empty
Between in intelligent subscriber mark contact information and black list information storage area distribute an access authority, and by should
Access authority establishes a channel.
The read module 24 is also used to contact person's letter that intelligent subscriber system reads intelligent subscriber mark by the channel
Breath and black list information, and according to the contact information and black list information of the intelligent subscriber mark in the public memory space
Carry out call-prompting and display.
The synchronized update module 25, in the contacts list under secured user's system, only display to have safety
The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence
The contact information and black list information of user identifier.
Further, in the contacts list under secured user's system, only display has the contact person of secure user identity
Information and black list information;In the contacts list of intelligent subscriber system, only display has the contact person of intelligent subscriber mark
Information and black list information.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter
Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence
Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence
Synchronized update in energy custom system.
The invention is not limited to above embodiment, if not departing from the present invention to various changes or deformation of the invention
Spirit and scope, if these changes and deformation belong within the scope of claim and equivalent technologies of the invention, then this hair
It is bright to be also intended to encompass these changes and deformation.
Claims (12)
1. a kind of dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;It is described
First data space is used to store the contact information under secured user's system;Second data space is for depositing
Store up the contact information under intelligent subscriber system;The public memory space is used to store the shared blacklist of two custom systems
Information;
When being connected to communication instruction under secured user's system, the request instruction extremely control processing mould for reading black list information is sent
Block;
It is the black list information storage area distribution one in public memory space after control processing module receives the request instruction
A access authority, and a channel is established by the access authority;
Secured user's system reads black list information by the channel, and black list information duplication is stored in the first data and is deposited
Space is stored up, and according to the contact information and black list information progress call-prompting in first data space;
When being connected to communication instruction under intelligent subscriber system, the request instruction extremely control processing mould for reading black list information is sent
Block;
Intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the second data and is deposited
Space is stored up, and according to the contact information and black list information progress call-prompting in second data space.
2. dual user system contact approaches to IM according to claim 1, it is characterised in that: further comprise the steps of:
When being arranged in secured user's system or updating black list information, which is uploaded to by secured user's system
In public memory space, and by the black list information of the control processing module synchronized update public memory space.
3. dual user system contact approaches to IM according to claim 1, it is characterised in that: further comprise the steps of:
When being arranged in intelligent subscriber system or updating black list information, which is uploaded to by intelligent subscriber system
In public memory space, and by the black list information of the control processing module synchronized update public memory space.
4. a kind of mobile terminal, it is characterised in that: include:
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the storage of the second data are empty
Between and public memory space;First data space is used to store the contact information under secured user's system;It is described
Second data space is used to store the contact information under intelligent subscriber system;The public memory space is for storing two
The shared black list information of a custom system;
Request module, the request for when being connected to communication instruction under secured user's system, sending reading black list information refer to
It enables to control processing module;
Authority distribution module, for being the black name in public memory space after control processing module receives the request instruction
An access authority is distributed in single information storage area, and establishes a channel by the access authority;
Read module reads black list information by the channel for secured user's system, and black list information duplication is deposited
Storage in the first data space, and according in first data space contact information and black list information led to
Words are reminded;
The request module is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read black list information
Request instruction is to controlling processing module;
The authority distribution module is also used to after control processing module receives the request instruction, is in public memory space
Black list information storage area distribute an access authority, and a channel is established by the access authority;
The read module is also used to intelligent subscriber system by the channel and reads black list information, and by the black list information
Duplication is stored in the second data space, and according to the contact information and black list information in second data space
Carry out call-prompting.
5. mobile terminal according to claim 4, it is characterised in that: further include:
Synchronized update module, for when being arranged in secured user's system or updating black list information, secured user's system will
The black list information is uploaded in public memory space, and by the black name of the control processing module synchronized update public memory space
Single information.
6. mobile terminal according to claim 5, it is characterised in that: the synchronized update module is also used to when in intelligent use
When being arranged in the system of family or updating black list information, which is uploaded to public memory space by intelligent subscriber system
In, and by the black list information of the control processing module synchronized update public memory space.
7. a kind of dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;It is described
Public memory space is used for storing contact information, and the contact information includes the contact information of secure user identity, intelligence
The contact information and black list information of energy user identifier;
When being connected to communication instruction under secured user's system, the contact information for reading secure user identity, Ji Heiming are sent
The request instruction of single information is to controlling processing module;
It is contact person's letter of the secure user identity in public memory space after control processing module receives the request instruction
An access authority is distributed in breath and black list information storage area, and establishes a channel by the access authority;
Secured user's system reads the contact information and black list information of secure user identity by the channel, and according to this
The contact information and black list information of secure user identity in public memory space carry out call-prompting and display;
When being connected to communication instruction under intelligent subscriber system, the contact information for reading intelligent subscriber mark, Ji Heiming are sent
The request instruction of single information is to controlling processing module;
It is contact person's letter of the intelligent subscriber mark in public memory space after control processing module receives the request instruction
An access authority is distributed in breath and black list information storage area, and establishes a channel by the access authority;
Intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark by the channel, and according to this
The contact information and black list information of intelligent subscriber mark in public memory space carry out call-prompting and display.
8. dual user system contact approaches to IM according to claim 7, it is characterised in that: further comprise the steps of:
When updating black list information under secured user's system and/or intelligent subscriber system, secured user's system and/or intelligence
The black list information is uploaded in public memory space by custom system, and by the control processing module synchronized update common storage
The black list information in space.
9. dual user system contact approaches to IM according to claim 7, it is characterised in that: in secured user's system
Under contacts list in, only display have secure user identity contact information and black list information;In intelligent subscriber system
In the contacts list of system, only display has the contact information and black list information of intelligent subscriber mark.
10. a kind of mobile terminal, it is characterised in that: including
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the storage of the second data are empty
Between and public memory space;The public memory space is used for storing contact information, and the contact information includes that safety is used
Contact information, the contact information and black list information of intelligent subscriber mark of family mark;
Request module, for sending the connection for reading secure user identity when being connected to communication instruction under secured user's system
The request instruction of people's information and black list information is to controlling processing module;
Authority distribution module is that the safety in public memory space is used for controlling after processing module receives the request instruction
An access authority is distributed in the contact information of family mark and black list information storage area, and is established by the access authority
One channel;
Read module reads the contact information and blacklist of secure user identity for secured user's system by the channel
Information, and call is carried out according to the contact information of the secure user identity in the public memory space and black list information and is mentioned
It wakes up and shows;
The request module is also used to when the communication instruction under intelligent subscriber system, sends the connection for reading intelligent subscriber mark
It is the request instruction of people's information and black list information to controlling processing module;
The authority distribution module is also used to control after processing module receives the request instruction, is in public memory space
An access authority is distributed in the contact information of intelligent subscriber mark and black list information storage area, and passes through the access right
Limit establishes a channel;
The read module, be also used to intelligent subscriber system by the channel read intelligent subscriber mark contact information and
Black list information, and carried out according to the contact information and black list information of the intelligent subscriber mark in the public memory space
Call-prompting and display.
11. mobile terminal according to claim 10, it is characterised in that: further include synchronized update module, for when in safety
When updating black list information under custom system and/or intelligent subscriber system, secured user's system and/or intelligent subscriber system should
Black list information is uploaded in public memory space, and by the blacklist of the control processing module synchronized update public memory space
Information.
12. mobile terminal according to claim 10, it is characterised in that: in the contacts list under secured user's system,
Only display has the contact information and black list information of secure user identity;In the contacts list of intelligent subscriber system,
Only display has the contact information and black list information of intelligent subscriber mark.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610323933.3A CN106060243B (en) | 2016-05-16 | 2016-05-16 | Dual user system contact approaches to IM and its mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610323933.3A CN106060243B (en) | 2016-05-16 | 2016-05-16 | Dual user system contact approaches to IM and its mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106060243A CN106060243A (en) | 2016-10-26 |
CN106060243B true CN106060243B (en) | 2019-07-09 |
Family
ID=57177769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610323933.3A Active CN106060243B (en) | 2016-05-16 | 2016-05-16 | Dual user system contact approaches to IM and its mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106060243B (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270524A (en) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | Information processing method and device |
CN104503849A (en) * | 2015-01-14 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | System data setting method, system data setting device and terminal |
CN105072257B (en) * | 2015-07-16 | 2018-09-04 | 深圳前海达闼云端智能科技有限公司 | A kind of double card dual system termi-nal and its call processing method and device |
CN105049630B (en) * | 2015-08-07 | 2018-06-19 | 北京元心科技有限公司 | The telephone receiving method of intelligent terminal and its multisystem |
-
2016
- 2016-05-16 CN CN201610323933.3A patent/CN106060243B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106060243A (en) | 2016-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103024061B (en) | Network communication contact book shared system and method | |
CN103095829B (en) | Realize the network contact list system of version management and rights management | |
CN101686425B (en) | Method for providing service to whole network and service network system | |
CN102413169A (en) | Cloud address list establishing and maintenance method and system thereof | |
CN102970667A (en) | Method for displaying dynamic information of friends during incoming calls and system for implementing same | |
CN106559591A (en) | The mobile phone terminal call method realized based on call forwarding and device | |
CN104092810B (en) | One does not disturb control method, device and mobile terminal | |
CN106055199B (en) | A kind of information synchronization method and electronic equipment | |
CN101931713A (en) | Virtual seating system and method | |
CN103916526B (en) | Contact person information processing method, device and mobile terminal | |
CN104735617A (en) | Terminal and sharing method of position information of terminal | |
CN102572098A (en) | Terminal and terminal management method | |
CA3053886A1 (en) | A method and system for creating multi mobilephone environments and numbers on a single handset with a single sim-card | |
CN106470279A (en) | A kind of many cartoon letters method to set up and mobile terminal | |
CN106060243B (en) | Dual user system contact approaches to IM and its mobile terminal | |
CN101765059A (en) | Method, system and mobile terminal for broadcasting status messages | |
CN108093402B (en) | User privacy information protection method and system based on terminal enhancement | |
CN106303105B (en) | The method of calling and system of dynamic more voice service number based on client identification module | |
CN106559767A (en) | Based on the double card double standby mobile phone terminal call method and device that call forwarding is realized | |
CN104080057A (en) | Method for controlling group calling authorities of terminals | |
EP2693726B1 (en) | Methods and apparatus to manage voice message system attributes | |
CN102780714A (en) | Information management cloud system and method thereof for sharing information | |
CN103379458B (en) | A kind of number shares and the method for shielding, system and mobile terminal and server | |
CN105787395B (en) | Data access method, data access device and mobile terminal | |
CN108632760A (en) | Data processing equipment, method and the computer readable storage medium of intelligent terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |