CN106060243B - Dual user system contact approaches to IM and its mobile terminal - Google Patents

Dual user system contact approaches to IM and its mobile terminal Download PDF

Info

Publication number
CN106060243B
CN106060243B CN201610323933.3A CN201610323933A CN106060243B CN 106060243 B CN106060243 B CN 106060243B CN 201610323933 A CN201610323933 A CN 201610323933A CN 106060243 B CN106060243 B CN 106060243B
Authority
CN
China
Prior art keywords
black list
list information
information
memory space
intelligent subscriber
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610323933.3A
Other languages
Chinese (zh)
Other versions
CN106060243A (en
Inventor
邹学平
孟占军
韩澍青
周佳
冯继超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201610323933.3A priority Critical patent/CN106060243B/en
Publication of CN106060243A publication Critical patent/CN106060243A/en
Application granted granted Critical
Publication of CN106060243B publication Critical patent/CN106060243B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail

Abstract

The present invention relates to a kind of dual user system contact approaches to IM, comprising the following steps: divides amount of physical memory are as follows: the first data space, the second data space and public memory space;When being connected to communication instruction under safety/intelligent subscriber system, the request instruction for reading black list information is sent to controlling processing module;It is that an access authority is distributed in the black list information storage area in public memory space, and establishes a channel by the access authority after control processing module receives the request instruction;Secured user's system reads black list information by the channel, and black list information duplication is stored in respective data space, and according to the contact information and black list information progress call-prompting in respective data space.Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, black list information can share use, and can guarantee that two custom systems are completely isolated.

Description

Dual user system contact approaches to IM and its mobile terminal
Technical field
The present invention relates to the present invention relates to mobile communication fields, and in particular to arrives a kind of dual user system contact message tube Reason method.The invention further relates to a kind of mobile terminals for realizing above-mentioned dual user system contact approaches to IM.
Background technique
With the high speed development of internet, people pass through the intelligent terminal access movement abundant of powerful, user experience The work that powerful calculating, storage, network, human-computer interaction, the application and service etc. that network provides are oneself is enjoyed in internet With brought huge convenience of living.It is again different with traditional internet computer, mobile Internet intelligent terminal closer to User lives, and a large amount of private datas in user's daily life are stored in the terminals such as smart phone, such as the social activity connection of user It is people's information, communication information of user etc..The powerful hardware of smart phone (GPS, camera, microphone etc.) support, so that with The sensitive informations such as the position data at family are easily obtained, once being utilized by rogue program, user is presented on illegal point for " bare " In face of son, that is to say, that be flooded with various malice, unsafe, discordant factor, these are potential dangerous all to threaten Privacy of user data and safety, so, it stands for user perspective, one kind is needed to be provided with secured user's system and intelligence use Family system dual system and the completely isolated intelligent terminal of two systems, for protecting the mobile terminal of security of private data.
Meanwhile existing mobile phone is designed with a blacklist, for storing often transmission refuse messages or dialing harassing call Phone number kept away to help user filtering to fall some frequent transmission refuse messages or dial the phone number of harassing call The harassing and wrecking of these blacklist numbers are exempted from.But the intelligent subscriber system of dual user system and secured user's system be completely in every From state, then, how mobile phone blacklist to be shared between intelligent subscriber system and secured user's system, be that there is an urgent need to solve Certainly the problem of.
Summary of the invention
The invention reside in, with deficiency, provide a kind of dual user system contact information management side the shortcomings that overcoming the prior art Method and its mobile terminal.
The present invention is realized by following technical solution: a kind of dual user system contact approaches to IM, packet Include following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space; First data space is used to store the contact information under secured user's system;Second data space is used In storing the contact information under intelligent subscriber system;The public memory space is used to store shared black of two custom systems List information;
When being connected to communication instruction under secured user's system, send at the request instruction to control for reading black list information Manage module;
It is the black list information storage area point in public memory space after control processing module receives the request instruction A channel is established with an access authority, and by the access authority;
Secured user's system reads black list information by the channel, and black list information duplication is stored in the first number According to memory space, and according to the contact information and black list information progress call-prompting in first data space;
When being connected to communication instruction under intelligent subscriber system, send at the request instruction to control for reading black list information Manage module;
It is the black list information storage area point in public memory space after control processing module receives the request instruction A channel is established with an access authority, and by the access authority;
Intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the second number According to memory space, and according to the contact information and black list information progress call-prompting in second data space.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
As a further improvement of the present invention, it further comprises the steps of:
When being arranged in secured user's system or updating black list information, secured user's system will be on the black list information It reaches in public memory space, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, it further comprises the steps of: when the setting in intelligent subscriber system or updates blacklist When information, which is uploaded in public memory space by intelligent subscriber system, and synchronous by the control processing module Update the black list information of public memory space.
The present invention also provides a kind of shared mobile terminals of the blacklist between dual user system, it is characterised in that: including
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the second data are deposited Store up space and public memory space;First data space is used to store the contact information under secured user's system; Second data space is used to store the contact information under intelligent subscriber system;The public memory space is for depositing Store up the shared black list information of two custom systems;
Request module, for sending and reading asking for black list information when being connected to communication instruction under secured user's system Ask instruction to control processing module;
Authority distribution module, for being in public memory space after control processing module receives the request instruction An access authority is distributed in black list information storage area, and establishes a channel by the access authority;
Read module reads black list information by the channel for secured user's system, and the black list information is answered System is stored in the first data space, and according in first data space contact information and black list information into Row call-prompting;
The request module is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read blacklist letter The request instruction of breath is to controlling processing module;
The authority distribution module is also used to after control processing module receives the request instruction, is that common storage is empty Between in black list information storage area distribute an access authority, and a channel is established by the access authority;
The read module is also used to intelligent subscriber system by the channel and reads black list information, and by the blacklist Information duplication is stored in the second data space, and according to the contact information and blacklist in second data space Information carries out call-prompting.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
As a further improvement of the present invention, further includes:
Synchronized update module is used for when being arranged in secured user's system or updating black list information, secured user system The black list information is uploaded in public memory space by system, and by the control processing module synchronized update public memory space Black list information.
As a further improvement of the present invention, the synchronized update module is also used to be arranged in intelligent subscriber system Or when updating black list information, which is uploaded in public memory space by intelligent subscriber system, and by the control The black list information of processing module synchronized update public memory space.
The present invention also provides another dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space; The public memory space is used for storing contact information, and the contact information includes contact person's letter of secure user identity The contact information and black list information of breath, intelligent subscriber mark;
When being connected to communication instruction under secured user's system, send read secure user identity contact information and The request instruction of black list information is to controlling processing module;
It is the contact person of the secure user identity in public memory space after control processing module receives the request instruction An access authority is distributed in information and black list information storage area, and establishes a channel by the access authority;
Secured user's system reads the contact information and black list information of secure user identity, and root by the channel Call-prompting and display are carried out according to the contact information and black list information of the secure user identity in the public memory space;
When being connected to communication instruction under intelligent subscriber system, send read intelligent subscriber mark contact information and The request instruction of black list information is to controlling processing module;
It is the contact person of the intelligent subscriber mark in public memory space after control processing module receives the request instruction An access authority is distributed in information and black list information storage area, and establishes a channel by the access authority;
Intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark, and root by the channel Call-prompting and display are carried out according to the contact information and black list information of the intelligent subscriber mark in the public memory space.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence Synchronized update in energy custom system.
As a further improvement of the present invention, it further comprises the steps of: under secured user's system and/or intelligent subscriber system When updating black list information, which is uploaded to common storage sky by secured user's system and/or intelligent subscriber system Between in, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, in the contacts list under secured user's system, only display has safety The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence The contact information and black list information of user identifier.
The present invention also provides a kind of shared mobile terminals of the blacklist between dual user system comprising:
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the second data are deposited Store up space and public memory space;The public memory space is used for storing contact information, and the contact information includes peace Contact information, the contact information and black list information of intelligent subscriber mark of full user identifier;
Request module, for sending and reading secure user identity when being connected to communication instruction under secured user's system The request instruction of contact information and black list information is to controlling processing module;
Authority distribution module is the peace in public memory space for controlling after processing module receives the request instruction An access authority is distributed in the contact information of full user identifier and black list information storage area, and passes through the access authority Establish a channel;Read module, for secured user's system by the channel read secure user identity contact information, And black list information, and according to the contact information of the secure user identity in the public memory space and black list information into Row call-prompting and display;
The request module is also used to when the communication instruction under intelligent subscriber system, is sent and is read intelligent subscriber mark Contact information and black list information request instruction to controlling processing module;
The authority distribution module is also used to control after processing module receives the request instruction, is public memory space In intelligent subscriber mark contact information and black list information storage area distribute an access authority, and pass through the visit Ask that permission establishes a channel;
The read module is also used to contact person's letter that intelligent subscriber system reads intelligent subscriber mark by the channel Breath and black list information, and according to the contact information and black list information of the intelligent subscriber mark in the public memory space Carry out call-prompting and display.
It as a further improvement of the present invention, further include synchronized update module, for when in secured user's system and/or intelligence When updating black list information under energy custom system, secured user's system and/or intelligent subscriber system upload the black list information Into public memory space, and by the black list information of the control processing module synchronized update public memory space.
As a further improvement of the present invention, in the contacts list under secured user's system, only display has safety The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence The contact information and black list information of user identifier.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence Synchronized update in energy custom system.
In order to better understand and implement, the invention will now be described in detail with reference to the accompanying drawings.
Detailed description of the invention
Fig. 1 is the step flow chart of dual user system contact's approaches to IM of embodiment 1.
Fig. 2 is the division schematic diagram of the amount of physical memory of embodiment 1.
Fig. 3 is the internal module connection block diagram of the mobile terminal in embodiment 1.
Fig. 4 is the step flow chart of dual user system contact's approaches to IM of embodiment 2.
Fig. 5 is the division schematic diagram of the amount of physical memory of embodiment 2.
Fig. 6 is the internal module connection block diagram of the mobile terminal in embodiment 2.
Specific embodiment
In order to realize the management of the contact information between two custom systems in mobile terminal, the present invention mentions the present invention A kind of dual user system contact approaches to IM is supplied, and for realizing dual user system contact information management side The mobile terminal of method, examples illustrate the present invention especially by following.
Embodiment 1
Referring to Fig. 1, its step flow chart for dual user system contact's approaches to IM of the present embodiment 1.This Invention provides a kind of dual user system contact approaches to IM, comprising the following steps:
S1: amount of physical memory is divided are as follows: the first data space, the second data space and common storage are empty Between;First data space is used to store the contact information under secured user's system;The second data storage is empty Between for storing contact information under intelligent subscriber system;The public memory space is shared for storing two custom systems Black list information.
It should be understood that intelligent subscriber system and secured user's system described in the invention can be understood as being installed on shifting Dual operating systems in dynamic terminal, it is understood that for the dual user space being set on mobile terminal, it might even be possible to be interpreted as An operating system being installed on mobile terminal, it includes two sub-operating systems such as intelligent subscriber systems and secured user to be System, in short, all technical solutions for being able to achieve its function and its adaptation disposal are the scope of protection of the invention.
It is the schematic diagram divided in the present embodiment 1 from memory space please refer to Fig. 2.
Specifically, in this step S1, first data space is also used to be stored in and pacify under secured user's system The related data information of the application program of dress, the related data information of the application program include: that installation application program generates Information, the information generated using the application program etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
Storing data includes: desktop editing in first data space, contact person, short message-content, and message registration is answered With house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Second data space, is also used to be stored in the dependency number for the application program installed under intelligent subscriber system It is believed that breath, the related data information of the application program includes: to install the information of application program generation, produced using the application program Raw information etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
Storing data includes: desktop editing in second data space, contact person, short message-content, and message registration is answered With house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Except secured user's system and intelligent subscriber system, there is also a control processing modules, for controlling, assisting Adjust, manage two custom systems, the setting of blacklist memory space and black list information calling etc..
S2: when user receives communication instruction, black list information is read.It is specifically divided into following two situation:
If user currently in secured user's system, executes following steps:
S21: when receiving communication instruction under secured user's system, the request instruction of reading black list information is sent extremely Control processing module.
Communication instruction described in the present invention can be reception incoming call, receive short message, initiates calling, check that contact person believes The communication event instruction relevant to contact person, black list information such as breath.
S22: being the black list information storage area in public memory space after control processing module receives the request instruction An access authority is distributed in domain, and establishes a channel by the access authority.
S23: secured user's system reads black list information by the channel, and black list information duplication is stored in the One data space, and according in first data space contact information and black list information carry out call mention It wakes up.
If user currently in intelligent subscriber system, executes following steps:
S24: when being connected to communication instruction under intelligent subscriber system, the request instruction extremely control for reading black list information is sent Processing module processed.
S25: being the black list information storage area in public memory space after control processing module receives the request instruction An access authority is distributed in domain, and establishes a channel by the access authority.
S26: intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the Two data spaces, and according in second data space contact information and black list information carry out call mention It wakes up.
S3: black list information is updated, following two situation is specifically divided into:
If user currently in secured user's system, executes following steps:
S31: when being arranged in secured user's system or updating black list information, secured user's system believes the blacklist Breath is uploaded in public memory space, and by the black list information of the control processing module synchronized update public memory space.When When user receives communication instruction, above-mentioned steps S2 is executed, the information of blacklist can be read from public memory space.
If user currently in intelligent subscriber system, executes following steps:
S32: when being arranged in intelligent subscriber system or updating black list information, intelligent subscriber system believes the blacklist Breath is uploaded in public memory space, and by the black list information of the control processing module synchronized update public memory space.When When user receives communication instruction, above-mentioned steps S2 is executed, the information of blacklist can be read from public memory space.
Similarly, as long as user carries out black list information update in secured user's system or intelligent subscriber system, such as: increasing Contact person in blacklist, the contact person in deletion blacklist, the title of contact person or number etc. in change blacklist, can touch It sends out synchronized update step above-mentioned, and then synchronizes above-mentioned black list information.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Meanwhile contact person's letter under secured user's system It ceases, is completely isolated with the contact information under intelligent subscriber system, black list information can share.
Referring to Fig. 3, its internal mode for the mobile terminal of dual user system contact's information management in the present embodiment 1 Block connects block diagram.
The present invention also provides a kind of mobile terminals of dual user system contact information management, it is characterised in that: including Memory space division module 11, request module 12, authority distribution module 13, read module 14 and synchronized update module 15.
The memory space division module 11, for dividing amount of physical memory are as follows: the first data space, second Data space and public memory space;First data space is used to store the contact person under secured user's system Information;Second data space is used to store the contact information under intelligent subscriber system;The public memory space For storing the shared black list information of two custom systems.
Specifically, first data space, is also used to be stored in the application program installed under secured user's system Related data information, the related data information of the application program included: the information installing application program and generating, answered using this The information etc. generated with program, such as the information that the operation of short message, wechat, QQ, camera application program generates.
For example, the data stored in first data space include: desktop editing, contact person, short message-content, Message registration, using house keeper, picture library, document, downloading, camera-photograph etc..
Wherein, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Second data space, is also used to be stored in the dependency number for the application program installed under intelligent subscriber system It is believed that breath, the related data information of the application program includes: to install the information of application program generation, produced using the application program Raw information etc., such as the information that the operation of short message, wechat, QQ, camera application program generates.
For example, the data stored in second data space include: desktop editing, contact person, short message-content, Message registration, using house keeper, picture library, document, downloading, camera-photograph etc..
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
The request module 12 reads blacklist letter for sending when being connected to communication instruction under secured user's system The request instruction of breath is to controlling processing module.The control processing module, for controlling, coordinating, managing two custom systems, black The setting of list memory space and black list information calling etc..
The authority distribution module 13, for being that common storage is empty after control processing module receives the request instruction Between in black list information storage area distribute an access authority, and a channel is established by the access authority.
The read module 14 reads black list information by the channel for secured user's system, and by the blacklist Information duplication is stored in the first data space, and according to the contact information and blacklist in first data space Information carries out call-prompting.
The request module 12 is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read blacklist The request instruction of information is to controlling processing module.
The authority distribution module 13 is also used to after control processing module receives the request instruction, is common storage An access authority is distributed in black list information storage area in space, and establishes a channel by the access authority.
The read module 14 is also used to intelligent subscriber system by the channel and reads black list information, and by the black name Single information duplication is stored in the second data space, and according to the contact information and black name in second data space Single information carries out call-prompting.
The synchronized update module 15 is used for when being arranged in secured user's system or updating black list information, safety The black list information is uploaded in public memory space by custom system, and by the control processing module synchronized update common storage The black list information in space.When user receives communication instruction, can be read from public memory space by read module 14 The information of blacklist.
The synchronized update module 15 is also used to when being arranged in intelligent subscriber system or updating black list information, intelligence Can custom system the black list information is uploaded in public memory space, and control processing module synchronized update is public deposits by this Store up the black list information in space.When user receives communication instruction, can be read from public memory space by read module 14 Take the information of blacklist.
Similarly, as long as user carries out black list information update in secured user's system or intelligent subscriber system, such as: increasing Contact person in blacklist, the contact person in deletion blacklist, the title of contact person or number etc. in change blacklist, can touch It sends out synchronized update step above-mentioned, and then synchronizes above-mentioned black list information.
Embodiment 2
Referring to Fig. 4, its step flow chart for dual user system contact's approaches to IM of embodiment 2.
The present invention also provides another dual user system contact approaches to IM, comprising the following steps:
S201: amount of physical memory is divided are as follows: the first data space, the second data space and common storage Space;The public memory space is used for storing contact information, and the contact information includes the connection of secure user identity The contact information and black list information of people's information, intelligent subscriber mark.
Referring to Fig. 5, its division schematic diagram for the amount of physical memory of embodiment 2.
Specifically, in this step S1, first data space is installed for being stored under secured user's system Application program related data information, but do not include the contact information under secured user's system.The phase of the application program Closing data information includes: information, the information generated using the application program etc. that installation application program generates, as short message, wechat, The information that the operation of the application programs such as QQ, camera generates.
For example, what is stored in the first data space includes: desktop editing, and contact person, short message-content, message registration, Using house keeper, picture library, document, downloading, camera-photograph.
Wherein, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Second data space, for being stored in the related data for the application program installed under intelligent subscriber system Information, but do not include the contact information under intelligent subscriber system.The related data information of the application program includes: that installation is answered Information, the information generated using the application program etc. generated with program, such as the operation of short message, wechat, QQ, camera application program The information of generation.
For example, what is stored in the second data space includes: desktop editing, and contact person, short message-content, message registration, Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Except secured user's system and intelligent subscriber system, there is also a control processing modules, for controlling, assisting Adjust, manage two custom systems, the setting of blacklist memory space and black list information calling etc..
S202: contact information and black list information are read, following two situation is specifically included:
If user it is currently used be secured user's system when, specifically execute following steps:
S211: when being connected to communication instruction under secured user's system, the contact person's letter for reading secure user identity is sent The request instruction of breath and black list information is to controlling processing module.
S212: being the secure user identity in public memory space after control processing module receives the request instruction An access authority is distributed in contact information and black list information storage area, and establishes a channel by the access authority.
S213: secured user's system reads the contact information and black list information of secure user identity by the channel, And call-prompting is carried out according to the contact information of the secure user identity in the public memory space and black list information and is shown Show.
If active user uses intelligent subscriber system, following steps are specifically executed:
S214: when being connected to communication instruction under intelligent subscriber system, the contact person's letter for reading intelligent subscriber mark is sent The request instruction of breath and black list information is to controlling processing module.
S215: being the intelligent subscriber mark in public memory space after control processing module receives the request instruction An access authority is distributed in contact information and black list information storage area, and establishes a channel by the access authority.
S216: intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark by the channel, And according to the contact information and black list information progress call-prompting in the public memory space.
S203: being updated blacklist, specific step are as follows: when in secured user's system and/or intelligent subscriber system When lower update black list information, which is uploaded to common storage by secured user's system and/or intelligent subscriber system In space, and by the black list information of the control processing module synchronized update public memory space.
In this step, due to preserving contact information in public memory space, and increase by one for each contact person A identifier, the identifier are secured user system contact mark, intelligent subscriber system contact mark, blacklist contact person Identify thrin.If so controlling processing module when setting 13812345678 is blacklist in secured user's system It is only 13812345678 setting, one identifier, the storage location of the blacklist is constant, does not also need any such as embodiment The black list information is uploaded in 1 into contact person's memory space the step of synchronized update.
Further, in the contacts list under secured user's system, only display has the contact person of secure user identity Information and black list information.In the contacts list of intelligent subscriber system, only display has the contact person of intelligent subscriber mark Information and black list information.
Compared with the prior art, contact information is shared for secured user's system and intelligent subscriber system, black list information As long as being identified to contact information, synchronized update in secured user's system and intelligent subscriber system is not needed.
Referring to Fig. 6, its for Fig. 6 be dual user system contact's information management in embodiment 2 mobile terminal it is interior Portion's module connects block diagram.
The present invention also provides a kind of mobile terminals of dual user system contact information management comprising: memory space Division module 21, request module 22, authority distribution module 23, read module 24 and synchronized update module 25.
The memory space division module 21, for dividing amount of physical memory are as follows: the first data space, second Data space and public memory space;The public memory space is used for storing contact information, the contact information The contact information and black list information of contact information, intelligent subscriber mark including secure user identity;
Specifically, first data space, for being stored in the application program installed under secured user's system Related data information, but do not include the contact information under secured user's system.The related data information packet of the application program Include: information, the information generated using the application program etc. that installation application program generates, such as short message, wechat, QQ, camera are answered The information generated with program operation.
The data stored in first data space include: desktop editing, contact person, short message-content, message registration, Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
Second data space, for being stored in the related data for the application program installed under intelligent subscriber system Information, but do not include the contact information under intelligent subscriber system.The related data information of the application program includes: that installation is answered Information, the information generated using the application program etc. generated with program, such as the operation of short message, wechat, QQ, camera application program The information of generation.
The data stored in second data space include: desktop editing, contact person, short message-content, message registration, Using house keeper, picture library, document, downloading, camera-photograph.
Specifically, desktop editing: being exactly the setting to desktop theme style;Using house keeper: the management to application program;Under It carries: the management to downloading content.Contact person, short message-content, message registration, picture library, document, camera-photograph, to above-mentioned specific The setting of application program, the preservation for generating file etc..
The request module 22, for when being connected to communication instruction under secured user's system, the connection of secure user identity It is people's information and sends the request instruction for reading black list information to controlling processing module.Specifically, the control handles mould Block, setting and black list information calling etc. for controlling, coordinating, managing two custom systems, blacklist memory space.
The authority distribution module 23 is public memory space for controlling after processing module receives the request instruction In secure user identity contact information and black list information storage area distribute an access authority, and pass through the visit Ask that permission establishes a channel.
The read module 24 reads contact person's letter of secure user identity for secured user's system by the channel Breath and black list information, and according to the contact information and black list information of the secure user identity in the public memory space Carry out call-prompting and display.
The request module 22 is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read intelligence use The contact information of family mark and the request instruction of black list information are to controlling processing module.
The authority distribution module 23 is also used to control after processing module receives the request instruction, is that common storage is empty Between in intelligent subscriber mark contact information and black list information storage area distribute an access authority, and by should Access authority establishes a channel.
The read module 24 is also used to contact person's letter that intelligent subscriber system reads intelligent subscriber mark by the channel Breath and black list information, and according to the contact information and black list information of the intelligent subscriber mark in the public memory space Carry out call-prompting and display.
The synchronized update module 25, in the contacts list under secured user's system, only display to have safety The contact information and black list information of user identifier;In the contacts list of intelligent subscriber system, only display has intelligence The contact information and black list information of user identifier.
Further, in the contacts list under secured user's system, only display has the contact person of secure user identity Information and black list information;In the contacts list of intelligent subscriber system, only display has the contact person of intelligent subscriber mark Information and black list information.
Compared with the prior art, the present invention is regardless of in any one custom system of current display interface operation, blacklist letter Breath can share use, and can guarantee that two custom systems are completely isolated.Contact information is for secured user's system and intelligence Custom system shares, as long as black list information is identified contact information, does not need in secured user's system and intelligence Synchronized update in energy custom system.
The invention is not limited to above embodiment, if not departing from the present invention to various changes or deformation of the invention Spirit and scope, if these changes and deformation belong within the scope of claim and equivalent technologies of the invention, then this hair It is bright to be also intended to encompass these changes and deformation.

Claims (12)

1. a kind of dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;It is described First data space is used to store the contact information under secured user's system;Second data space is for depositing Store up the contact information under intelligent subscriber system;The public memory space is used to store the shared blacklist of two custom systems Information;
When being connected to communication instruction under secured user's system, the request instruction extremely control processing mould for reading black list information is sent Block;
It is the black list information storage area distribution one in public memory space after control processing module receives the request instruction A access authority, and a channel is established by the access authority;
Secured user's system reads black list information by the channel, and black list information duplication is stored in the first data and is deposited Space is stored up, and according to the contact information and black list information progress call-prompting in first data space;
When being connected to communication instruction under intelligent subscriber system, the request instruction extremely control processing mould for reading black list information is sent Block;
Intelligent subscriber system reads black list information by the channel, and black list information duplication is stored in the second data and is deposited Space is stored up, and according to the contact information and black list information progress call-prompting in second data space.
2. dual user system contact approaches to IM according to claim 1, it is characterised in that: further comprise the steps of:
When being arranged in secured user's system or updating black list information, which is uploaded to by secured user's system In public memory space, and by the black list information of the control processing module synchronized update public memory space.
3. dual user system contact approaches to IM according to claim 1, it is characterised in that: further comprise the steps of:
When being arranged in intelligent subscriber system or updating black list information, which is uploaded to by intelligent subscriber system In public memory space, and by the black list information of the control processing module synchronized update public memory space.
4. a kind of mobile terminal, it is characterised in that: include:
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the storage of the second data are empty Between and public memory space;First data space is used to store the contact information under secured user's system;It is described Second data space is used to store the contact information under intelligent subscriber system;The public memory space is for storing two The shared black list information of a custom system;
Request module, the request for when being connected to communication instruction under secured user's system, sending reading black list information refer to It enables to control processing module;
Authority distribution module, for being the black name in public memory space after control processing module receives the request instruction An access authority is distributed in single information storage area, and establishes a channel by the access authority;
Read module reads black list information by the channel for secured user's system, and black list information duplication is deposited Storage in the first data space, and according in first data space contact information and black list information led to Words are reminded;
The request module is also used to when being connected to communication instruction under intelligent subscriber system, is sent and is read black list information Request instruction is to controlling processing module;
The authority distribution module is also used to after control processing module receives the request instruction, is in public memory space Black list information storage area distribute an access authority, and a channel is established by the access authority;
The read module is also used to intelligent subscriber system by the channel and reads black list information, and by the black list information Duplication is stored in the second data space, and according to the contact information and black list information in second data space Carry out call-prompting.
5. mobile terminal according to claim 4, it is characterised in that: further include:
Synchronized update module, for when being arranged in secured user's system or updating black list information, secured user's system will The black list information is uploaded in public memory space, and by the black name of the control processing module synchronized update public memory space Single information.
6. mobile terminal according to claim 5, it is characterised in that: the synchronized update module is also used to when in intelligent use When being arranged in the system of family or updating black list information, which is uploaded to public memory space by intelligent subscriber system In, and by the black list information of the control processing module synchronized update public memory space.
7. a kind of dual user system contact approaches to IM, comprising the following steps:
Amount of physical memory is divided are as follows: the first data space, the second data space and public memory space;It is described Public memory space is used for storing contact information, and the contact information includes the contact information of secure user identity, intelligence The contact information and black list information of energy user identifier;
When being connected to communication instruction under secured user's system, the contact information for reading secure user identity, Ji Heiming are sent The request instruction of single information is to controlling processing module;
It is contact person's letter of the secure user identity in public memory space after control processing module receives the request instruction An access authority is distributed in breath and black list information storage area, and establishes a channel by the access authority;
Secured user's system reads the contact information and black list information of secure user identity by the channel, and according to this The contact information and black list information of secure user identity in public memory space carry out call-prompting and display;
When being connected to communication instruction under intelligent subscriber system, the contact information for reading intelligent subscriber mark, Ji Heiming are sent The request instruction of single information is to controlling processing module;
It is contact person's letter of the intelligent subscriber mark in public memory space after control processing module receives the request instruction An access authority is distributed in breath and black list information storage area, and establishes a channel by the access authority;
Intelligent subscriber system reads the contact information and black list information of intelligent subscriber mark by the channel, and according to this The contact information and black list information of intelligent subscriber mark in public memory space carry out call-prompting and display.
8. dual user system contact approaches to IM according to claim 7, it is characterised in that: further comprise the steps of:
When updating black list information under secured user's system and/or intelligent subscriber system, secured user's system and/or intelligence The black list information is uploaded in public memory space by custom system, and by the control processing module synchronized update common storage The black list information in space.
9. dual user system contact approaches to IM according to claim 7, it is characterised in that: in secured user's system Under contacts list in, only display have secure user identity contact information and black list information;In intelligent subscriber system In the contacts list of system, only display has the contact information and black list information of intelligent subscriber mark.
10. a kind of mobile terminal, it is characterised in that: including
Memory space division module, for dividing amount of physical memory are as follows: the first data space, the storage of the second data are empty Between and public memory space;The public memory space is used for storing contact information, and the contact information includes that safety is used Contact information, the contact information and black list information of intelligent subscriber mark of family mark;
Request module, for sending the connection for reading secure user identity when being connected to communication instruction under secured user's system The request instruction of people's information and black list information is to controlling processing module;
Authority distribution module is that the safety in public memory space is used for controlling after processing module receives the request instruction An access authority is distributed in the contact information of family mark and black list information storage area, and is established by the access authority One channel;
Read module reads the contact information and blacklist of secure user identity for secured user's system by the channel Information, and call is carried out according to the contact information of the secure user identity in the public memory space and black list information and is mentioned It wakes up and shows;
The request module is also used to when the communication instruction under intelligent subscriber system, sends the connection for reading intelligent subscriber mark It is the request instruction of people's information and black list information to controlling processing module;
The authority distribution module is also used to control after processing module receives the request instruction, is in public memory space An access authority is distributed in the contact information of intelligent subscriber mark and black list information storage area, and passes through the access right Limit establishes a channel;
The read module, be also used to intelligent subscriber system by the channel read intelligent subscriber mark contact information and Black list information, and carried out according to the contact information and black list information of the intelligent subscriber mark in the public memory space Call-prompting and display.
11. mobile terminal according to claim 10, it is characterised in that: further include synchronized update module, for when in safety When updating black list information under custom system and/or intelligent subscriber system, secured user's system and/or intelligent subscriber system should Black list information is uploaded in public memory space, and by the blacklist of the control processing module synchronized update public memory space Information.
12. mobile terminal according to claim 10, it is characterised in that: in the contacts list under secured user's system, Only display has the contact information and black list information of secure user identity;In the contacts list of intelligent subscriber system, Only display has the contact information and black list information of intelligent subscriber mark.
CN201610323933.3A 2016-05-16 2016-05-16 Dual user system contact approaches to IM and its mobile terminal Active CN106060243B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610323933.3A CN106060243B (en) 2016-05-16 2016-05-16 Dual user system contact approaches to IM and its mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610323933.3A CN106060243B (en) 2016-05-16 2016-05-16 Dual user system contact approaches to IM and its mobile terminal

Publications (2)

Publication Number Publication Date
CN106060243A CN106060243A (en) 2016-10-26
CN106060243B true CN106060243B (en) 2019-07-09

Family

ID=57177769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610323933.3A Active CN106060243B (en) 2016-05-16 2016-05-16 Dual user system contact approaches to IM and its mobile terminal

Country Status (1)

Country Link
CN (1) CN106060243B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270524A (en) * 2014-09-28 2015-01-07 酷派软件技术(深圳)有限公司 Information processing method and device
CN104503849A (en) * 2015-01-14 2015-04-08 宇龙计算机通信科技(深圳)有限公司 System data setting method, system data setting device and terminal
CN105072257B (en) * 2015-07-16 2018-09-04 深圳前海达闼云端智能科技有限公司 A kind of double card dual system termi-nal and its call processing method and device
CN105049630B (en) * 2015-08-07 2018-06-19 北京元心科技有限公司 The telephone receiving method of intelligent terminal and its multisystem

Also Published As

Publication number Publication date
CN106060243A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
CN103024061B (en) Network communication contact book shared system and method
CN103095829B (en) Realize the network contact list system of version management and rights management
CN101686425B (en) Method for providing service to whole network and service network system
CN102413169A (en) Cloud address list establishing and maintenance method and system thereof
CN102970667A (en) Method for displaying dynamic information of friends during incoming calls and system for implementing same
CN106559591A (en) The mobile phone terminal call method realized based on call forwarding and device
CN104092810B (en) One does not disturb control method, device and mobile terminal
CN106055199B (en) A kind of information synchronization method and electronic equipment
CN101931713A (en) Virtual seating system and method
CN103916526B (en) Contact person information processing method, device and mobile terminal
CN104735617A (en) Terminal and sharing method of position information of terminal
CN102572098A (en) Terminal and terminal management method
CA3053886A1 (en) A method and system for creating multi mobilephone environments and numbers on a single handset with a single sim-card
CN106470279A (en) A kind of many cartoon letters method to set up and mobile terminal
CN106060243B (en) Dual user system contact approaches to IM and its mobile terminal
CN101765059A (en) Method, system and mobile terminal for broadcasting status messages
CN108093402B (en) User privacy information protection method and system based on terminal enhancement
CN106303105B (en) The method of calling and system of dynamic more voice service number based on client identification module
CN106559767A (en) Based on the double card double standby mobile phone terminal call method and device that call forwarding is realized
CN104080057A (en) Method for controlling group calling authorities of terminals
EP2693726B1 (en) Methods and apparatus to manage voice message system attributes
CN102780714A (en) Information management cloud system and method thereof for sharing information
CN103379458B (en) A kind of number shares and the method for shielding, system and mobile terminal and server
CN105787395B (en) Data access method, data access device and mobile terminal
CN108632760A (en) Data processing equipment, method and the computer readable storage medium of intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant