CN106095814A - Contact person's processing method and server - Google Patents

Contact person's processing method and server Download PDF

Info

Publication number
CN106095814A
CN106095814A CN201610377964.7A CN201610377964A CN106095814A CN 106095814 A CN106095814 A CN 106095814A CN 201610377964 A CN201610377964 A CN 201610377964A CN 106095814 A CN106095814 A CN 106095814A
Authority
CN
China
Prior art keywords
contact
contact method
address list
terminal
contact person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610377964.7A
Other languages
Chinese (zh)
Other versions
CN106095814B (en
Inventor
林立
邓雨星
林�也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610377964.7A priority Critical patent/CN106095814B/en
Publication of CN106095814A publication Critical patent/CN106095814A/en
Priority to PCT/CN2017/084032 priority patent/WO2017206696A1/en
Application granted granted Critical
Publication of CN106095814B publication Critical patent/CN106095814B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42144Administration or customisation of services by service provider
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The open a kind of contact person's processing method of the present invention and server, method includes: obtaining the address list of terminal use, address list includes the contact method of the contact person of terminal use;The address list searching any two terminal use obtains the terminal use of directly contact person each other, and terminal use based on direct contact person each other builds at least one relation chain;Address list based on terminal use each in relation chain determines same correspondents, the contact method obtaining conforming to a predetermined condition of comparing the contact method of same correspondents;Use data based on the contact method conformed to a predetermined condition, analyze the feature of the contact method respectively conformed to a predetermined condition, and the contact method filtering out the default feature of coupling is inefficacy contact method.Use the present invention, it is possible to identify the inefficacy number in address list, improve the service efficiency of address list, improve the communication efficiency of user.

Description

Contact person's processing method and server
Technical field
The present invention relates to the data mining technology of technical field of information communication, particularly relate to a kind of contact person's processing method and Server.
Background technology
Along with popularizing of people's communication, a lot of users used or were currently in use multiple different phone number, thus In the cell phone address book of user, multiple phone number may be stored for same contact person, but, these cell-phone numbers In Ma one or more may be currently in stopped status or by operator reclaim changed hands, this allows for the hands of user Multiple numbers that same contact person in machine address list is corresponding also exist inefficacy number (as shut down or changing hands), when user to give Contact person makes a phone call or during messaging, it is impossible to accurately telling which or which number from multiple numbers that contact person is corresponding is Available number, can only attempt dialing or contacting one by one, so, can expend the time and efforts of user, reduce the use of address list Efficiency.
Summary of the invention
In view of this, embodiment of the present invention expectation provides a kind of contact person's processing method and server, it is possible to identify logical Inefficacy number in news record, improves the service efficiency of address list, improves the communication efficiency of user.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
First aspect, the embodiment of the present invention provides a kind of contact person's processing method, and method includes:
Obtaining the address list of terminal use, described address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most direct The terminal use of contact person builds at least one relation chain;
Address list based on terminal use each in described relation chain determines same correspondents, the connection to described same correspondents It is that mode is compared the contact method obtaining conforming to a predetermined condition;
Use data based on the described contact method conformed to a predetermined condition, analyze each described in the connection that conforms to a predetermined condition Being the feature of mode, the contact method filtering out the default feature of coupling is inefficacy contact method.
Second aspect, the embodiment of the present invention provides a kind of contact person's processing server, and server includes:
Acquisition module, for obtaining the address list of terminal use, described address list includes the connection of the contact person of terminal use It it is mode;
Searching module, the terminal obtaining directly contact person each other for searching the address list of any two terminal use is used Family, terminal use based on direct contact person each other builds at least one relation chain;
First determines module, the address list of each terminal use in described relation chain based on described lookup module construction Determine same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of described same correspondents is compared;
Screening module, for based on described first determine module determine described in the making of contact method that conform to a predetermined condition By data, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the contact method of feature For inefficacy contact method.
In the embodiment of the present invention, by based on each terminal in the relation chain that directly terminal use of contact person builds each other The contact method of the same correspondents in the address list of user is compared, and filters out the contact method conformed to a predetermined condition, and Feature Selection according to the contact method conformed to a predetermined condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple The contact method of the contact person of the address list of terminal use is analyzed, and identifies inefficacy correspondent party from all contact methods Formula, terminal use directly uses other contact methods in addition to inefficacy contact method to communicate, it is to avoid prior art Middle terminal use needs to attempt one by one communicating to the multiple contact methods including inefficacy contact method, thus saves The time and efforts of user, so, the embodiment of the present invention can automatically identify the inefficacy number in address list, improves address list Service efficiency, improve user communication efficiency.
Accompanying drawing explanation
Fig. 1 is an optional configuration diagram of contact person's processing method in the embodiment of the present invention;
Fig. 2 is an optional schematic flow sheet of contact person's processing method in the embodiment of the present invention;
Fig. 3 is the optional schematic diagram implementing contact person's processing method in the embodiment of the present invention based on Fig. 1;
Fig. 4 is another optional schematic flow sheet of contact person's processing method in the embodiment of the present invention;
Fig. 5 is comparison schematic diagram before and after indicating failure contact method in address list in the embodiment of the present invention;
Fig. 6 is that in the embodiment of the present invention, in address list, mark uses the comparison schematic diagram before and after frequent degree information;
Fig. 7 a is one that in the embodiment of the present invention, cleaning inefficacy number function switchs and optionally realizes schematic diagram;
Fig. 7 b is that another that clear up inefficacy number function switch in the embodiment of the present invention optional realizes schematic diagram;
Fig. 7 c is an optional schematic diagram of the corresponding multiple telephone numbers of contact person in the embodiment of the present invention;
Fig. 7 d is to identify in the embodiment of the present invention that one of inefficacy number function switch optionally realizes schematic diagram;
Fig. 7 e is the optional interface schematic diagram clearing up inefficacy number in the embodiment of the present invention;
Fig. 8 a is the optional schematic flow sheet determining inefficacy telephone number in the embodiment of the present invention;
Fig. 8 b is an optional schematic diagram of contact person's number of degrees in the embodiment of the present invention;
Fig. 8 c is the optional data flow schematic diagram determining inefficacy telephone number in the embodiment of the present invention;
Fig. 9 is an optional structural representation of contact person's processing server in the embodiment of the present invention;
Figure 10 is another optional structural representation of contact person's processing server in the embodiment of the present invention.
Detailed description of the invention
First as follows to DESCRIPTION OF THE PRIOR ART: the address list of terminal use exists following situation: for same contact People's storage has multiple telephone number, but one or more already at stopped status or has been returned by operator Receipts change hands (servicing user as changed), i.e. one or more number is invalid number.When terminal use to give this position Storage has the contact person of multiple telephone number to make a phone call or during messaging, this position contact of terminal use's storage in address list Multiple telephone numbers of people, it is impossible to quickly, accurately telling which or which number is available number, can only attempt one by one dialing Or contact, that dials during this repeatedly attempts the waste of the time and efforts by causing user, and so, prior art can expend The time and efforts that user is too much, reduces the service efficiency of address list, reduces the communication efficiency of user.
Below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that described herein Specific embodiment only in order to explain the present invention, is not intended to limit the present invention.It addition, embodiment provided below be for Implement the section Example of the present invention, rather than the whole embodiments implementing the present invention are provided, do not pay those skilled in the art On the premise of creative work, the technical scheme of following example is carried out the embodiment of restructuring gained and based on to invention Other embodiments implemented belong to protection scope of the present invention.
It should be noted that in embodiments of the present invention, term " includes ", " comprising " or its any other variant are intended to Contain comprising of nonexcludability, so that include that the method for a series of key element or device not only include that be expressly recited wants Element, but also include other key elements being not expressly set out, or also include want intrinsic for implementation or device Element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including this key element Method or device in there is also other relevant factor (step in such as method or the unit in device).Such as, Contact person's processing method that the embodiment of the present invention provides contains a series of step, but the contact that the embodiment of the present invention provides People's processing method is not limited to described step, and similarly, contact person's processing server that the embodiment of the present invention provides includes A series of modules, but contact person's processing server that the embodiment of the present invention provides is not limited to include module be expressly recited, also Module/the unit of required setting when can be included as obtaining relevant information or processing based on information.
It should be noted that term " first "/" second "/" the 3rd " etc. involved by the embodiment of the present invention is only district Not Lei Si object, do not represent the particular sorted for object, it is possible to understand that ground, " first "/" second "/" the 3rd " allow In the case of can exchange specific order or precedence.Should be appreciated that the object that " first "/" second "/" the 3rd " distinguishes is being fitted Can exchange in the case of when so that embodiments of the invention described herein can with except here illustrate or describe those Order in addition is implemented.
It is pointed out that in the embodiment of the present invention, terminal can be smart mobile phone, panel computer, desktop computer, notes This computer, Wearable (such as intelligent watch) etc. can be supported wired or wireless communication or support the various application for communication Or the equipment of social activity software.
The technical scheme that the embodiment of the present invention is recorded may be used for identifying corresponding multiple of same contact person in address list Inefficacy number in number;The optional framework seeing contact person's processing method in the embodiment of the present invention shown in Fig. 1 shows Meaning, the framework shown in Fig. 1 includes: support the terminal 11 of address list, contact person's processing server 12 and network 13, terminal 11 with Contact person's processing server 12 carries out data interaction by network 13, and terminal 11 can be multiple;As user contact person to be given Lee * * makes a phone call or during messaging, when user inquires about the address list of terminal 11, finds to store in address list have corresponding to Lee * * Three telephone numbers, respectively telephone number 1, telephone number 2 and telephone number 3, but, these 3 numbers may be lost Effect number (as shut down or changing hands), but, during in prior art, user is not aware that these 3 numbers, which is significant number, uses Family can only attempt dialing or contacting one by one, and during this, dialing repeatedly attempts the time and efforts too much by expending user, fall The service efficiency of low address list, reduces the communication efficiency of user.
It should be noted that the application scenarios shown in Fig. 1 is only of the technical scheme that the embodiment of the present invention is recorded Possible example architecture, other application scenarios can include terminal that Fig. 1 is not directed to or be installed in terminal for communication Application or social software etc..The technical scheme that the embodiment of the present invention is recorded can apply in above-mentioned scene, to help to overcome now With the presence of the time and efforts expending user of technology, reduce the service efficiency of address list, lacking of the communication efficiency of reduction user Fall into.
Application scenarios based on above-mentioned record, proposes following specific embodiment.
Embodiment one
The present embodiment provides a kind of contact person's processing method, may be used for identifying the inefficacy number of contact person in address list Code, overcomes the time and efforts expending user that prior art exists, reduces the service efficiency of address list, reduce the communication of user The defect of efficiency.
Seeing Fig. 2, contact person's processing method that the present embodiment is recorded can be processed server implementation, method bag by contact person Include following steps:
Step 101, the address list of acquisition terminal use, address list includes the contact method of the contact person of terminal use.
Here, contact person's processing server obtains the address list of multiple terminal uses from multiple terminals, such as, opens/makes Network side can be stored in, such as cloud server, contact person with the address list of the terminal use of address list synchronization function Reason server, after the mandate obtaining each terminal use, can obtain the address list of these terminal uses from network side;Optional , the implementation of the mandate of terminal use can be: terminal use arranges whether allow contact in address list synchronization function People's processing server obtains the address list of terminal use, if then instruction contact person's processing server obtains awarding of terminal use Power;Otherwise it is unauthorized;It should be noted that contact person's processing server can be same equipment with network side, it is also possible to for Different equipment;Here, the address list of a terminal use can include the title of contact person and the correspondent party of this terminal use Formula;Wherein, the contact method of contact person includes but not limited to: telephone number, E-mail address, mailing address or user use terminal The user identity voucher of application (such as mobile phone assistant, wechat, QQ).
Step 102, the address list of lookup any two terminal use obtain the terminal use of directly contact person each other, based on Directly the terminal use of contact person builds at least one relation chain each other.
Here, the address list of the direct both sides of contact person each other includes the contact method of the other side respectively;Contact person processes The address list of whois lookup any two terminal use obtains a kind of feasible reality of the directly terminal use of contact person each other Existing mode includes:
Contact person's processing server obtains contact method and the correspondent party of the second terminal use of first terminal user respectively Formula;Here, first terminal user is the terminal use that any two in multiple terminal use is different from the second terminal use;? The address list of first terminal user is searched the contact method of the second terminal use, and, at the address list of the second terminal use The contact method of middle lookup first terminal user;I.e. by searching the address list of first terminal user to judge first terminal user Address list whether include the contact method of the second terminal use, and by searching the address list of the second terminal use to judge Whether the address list of two terminal uses includes the contact method of first terminal user, however, it is determined that when all finding, and i.e. determines first The address list of terminal use includes that the contact method of the second terminal use and the address list of the second terminal use include first terminal During the contact method of user, it is determined that first terminal user and the second terminal use direct contact person each other.
Terminal use based on direct contact person each other builds a kind of feasible implementation bag of at least one relation chain Include: contact person's processing server is with any terminal user in the terminal use of direct contact person each other as node, with arbitrary Other terminal use of terminal use direct contact person each other is tandem node, and node based on cascade builds relation chain;Assume First terminal user and the second terminal use are judged as direct contact person, then contact person's processing server is with first terminal user For node, with the second terminal use as tandem node, node based on cascade builds relation chain.
It should be noted that contact person's processing server needs traversal to search in above-mentioned multiple terminal uses in step 102 Any two terminal use, it is assumed that contact person's processing server obtains 3 different terminal uses altogether, such as user A, use Family B and the address list of user C, then contact person's processing server needs below execution to operate: 1) search user A, the communication of user B Record, it is determined that user A and user B the most direct contact person;2) user A, the address list of user C are searched, it is determined that user A and use Family C the most direct contact person;3) user B, the address list of user C are searched, it is determined that user B and user C is the most direct Contact person;4) based on above-mentioned steps 1) to 3) determined by each other directly the terminal use of contact person build at least one relation Chain.
Step 103, address list based on terminal use each in relation chain determine same correspondents, the connection to same correspondents It is that mode is compared the contact method obtaining conforming to a predetermined condition.
A kind of feasible implementation of above-mentioned steps 103 includes: contact person processes each end in whois lookup relation chain The title of each contact person in the address list of end subscriber and contact method, in search relationship chain in the address list of each terminal use Existence has the contact person of same names, if it is not, then flow process terminates;Each terminal use in the most then comparison relation chain Contact person's each self-corresponding contact method in address list with same names is the most identical, if it is different, then determine have identical The each self-corresponding contact method of contact person of title is the contact method conformed to a predetermined condition.
The implementation that the another kind of above-mentioned steps 103 is feasible includes: contact person processes in whois lookup relation chain each The title of each contact person in the address list of terminal use and contact method, the address list of each terminal use in search relationship chain In whether there is the contact person with identical contact method, if it is not, then flow process terminates;Each terminal in the most then comparison relation chain Contact person's each self-corresponding title in the address list of user with identical contact method is the most identical, if it is different, then determine phase It it is the contact method conformed to a predetermined condition with contact method.
Step 104, use data based on the contact method conformed to a predetermined condition, analyze the connection respectively conformed to a predetermined condition Being the feature of mode, the contact method filtering out the default feature of coupling is inefficacy contact method.
Here, be equivalent to add new attribute for each contact method: inefficacy contact method or effective connection mode (as The most screened (identification) is the contact method of inefficacy contact method), judge whether to use, revise or delete connection in this, as user Be mode according to one of.
Optionally, the inefficacy contact method filtered out is stored by contact person's processing server, such as, will filter out Inefficacy contact method write user lost efficacy contact method log or data base.
Here, use data based on the contact method conformed to a predetermined condition, analyze the contact respectively conformed to a predetermined condition The feature of mode, the implementation that contact method is inefficacy contact method filtering out the default feature of coupling can include following Meaning is a kind of or combines:
Implementation 1:
Contact person's processing server resolves the use data of contact method respectively conformed to a predetermined condition, determine respectively meet predetermined The contact method of condition is used for the use time of Information Authentication mode, it is determined that whether the time difference of use time and current time More than very first time threshold value, the most then judge that corresponding contact method is as inefficacy contact method;Otherwise, it is determined that contact accordingly Mode is effective connection mode.Optionally, Information Authentication mode such as includes applying registration etc. based on checking note login, user Mode;Here, very first time threshold value can be carried out based on historical data, actual demand etc. by user/contact person's processing server Set.
On the basis of implementation 1, for same contact method corresponding at least two contact person, such as, same electricity Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service Device resolves the use data of corresponding first contact person of the first contact method, obtains the first contact method by the first contact person for believing The use time of breath verification mode;Here, the first contact method is arbitrary contact method conformed to a predetermined condition, the first contact person Address list for terminal use each in relation chain has arbitrary contact person of the first contact method;Contact person's processing server is sentenced Surely use the time difference of time and current time whether more than very first time threshold value, the most then judge that the first contact method is as the The inefficacy contact method of one contact person;Otherwise, it is determined that the effective connection mode that the first contact method is the first contact person.Need Bright, contact person's processing server need to resolve respectively relation chain has in the address list of each terminal use arbitrary meet pre- Arbitrary contact person of the contact method of fixed condition.
Implementation 2:
Contact person's processing server resolves the associated application data of the contact method respectively conformed to a predetermined condition, it is determined that respectively meet Whether the contact method of predetermined condition is used as the association contact method of application, if it is not, then judge that corresponding contact method is as losing efficacy Contact method;The most then judge that corresponding contact method is as effective connection mode.Here, associated application data can include connection It is that mode is bound with application;The association contact method of application, for example, contact method are bound for checking number, with contact Mode carries out application registration, by the account binding etc. of contact method Yu application.
On the basis of implementation 2, for same contact method corresponding at least two contact person, such as, same electricity Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service Device resolves the associated application data of corresponding second contact person of the second contact method, it is judged that whether the second contact method is used as second The association contact method of the used application of contact person, if it is not, then judge that the second contact method contacts as the inefficacy of the second contact person Mode;The most then judge second contact method effective connection mode as the second contact person;Here, the second contact method is for appointing One contact method conformed to a predetermined condition, has the second contact in the address list of each terminal use in the second artificial relation chain of contact Arbitrary contact person of mode.It should be noted that contact person's processing server needs to resolve respectively each terminal use in relation chain Address list in there is arbitrary contact person of arbitrary contact method conformed to a predetermined condition.
Implementation 3:
Contact person's processing server resolves the communication log data of the contact method respectively conformed to a predetermined condition, and determines and respectively meets The call duration time of the contact method of predetermined condition, it is determined that whether call duration time is more than the second time threshold with the time difference of current time Value, the most then judge that corresponding contact method is as inefficacy contact method;Otherwise, it is determined that corresponding contact method is effective connection Mode.Optionally, call duration time can be such as the last communication occasions (as the last time transmitting-receiving note, make a phone call or The moment of mail) etc.;Here, the second time threshold can be needed based on historical data, reality by user/contact person's processing server Ask etc. and to be set.
On the basis of implementation 3, for same contact method corresponding at least two contact person, such as, same electricity Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service Device resolves the communication log data of corresponding 3rd contact person of the 3rd contact method, obtains the call duration time of the 3rd contact method;This In, the 3rd contact method is arbitrary contact method conformed to a predetermined condition, and the 3rd contacts each terminal use in artificial relation chain Address list has arbitrary contact person of the 3rd contact method;When contact person's processing server judges the communication of the 3rd contact method Between with the time difference of current time whether more than the second time threshold, the most then judge that the 3rd contact method is as the 3rd contact person Inefficacy contact method;Otherwise, it is determined that the effective connection mode that the 3rd contact method is the 3rd contact person.It should be noted that Contact person's processing server needs to resolve respectively and has arbitrary conforming to a predetermined condition in relation chain in the address list of each terminal use Arbitrary contact person of contact method.
Optionally, contact person's processing server, when satisfied inefficacy contact method issues condition, determines that terminal use's is logical Inefficacy contact method in news record, and send the inefficacy contact method in the address list of terminal use to terminal, for terminal at end Indicating failure contact method in the address list of end subscriber.Here, clockwork spring under contact person's processing server meets inefficacy contact method The implementation of part can include following any one or combination:
1) terminal receive that user triggers for the inefficacy number cleaning operation of address list time, process service to contact person Device sends the request of the address list for management of end-user;Contact person's processing server manages in response to being used for of sending of terminal The request of the address list of terminal use, is sent to terminal by the inefficacy contact method in the address list of terminal use.
2) terminal receive user trigger in address list designated contact inefficacy Number Reorganization operation time, Xiang Lian It is people's processing server transmission request for the contact person in address list of management of end-user, this request is carried appointment contact The title of people or contact method to be identified;The leading to for management of end-user that contact person's processing server sends in response to terminal The request of news record, is sent to terminal by the inefficacy contact method of the designated contact in the address list of terminal use.
3) periodically issue.
4) active that event triggers issues, such as the mistake during contact person's processing server detects the address list of terminal use Absolute quantity or the relative populations of effect contact method exceed default quantity thresholding.
Contact person's processing server determines a kind of feasible realization of the inefficacy contact method in the address list of terminal use Mode includes: contact person's processing server is by the contact method of each contact person in the address list of terminal use, respectively with above-mentioned The inefficacy contact method filtered out mates, and obtains the inefficacy contact method in the address list of terminal use;Optionally, contact Inefficacy contact method in the address list of the terminal use determined is preserved by people's processing server.
Inefficacy contact method in the address list of the terminal use that terminal sends according to contact person's processing server, in terminal Indicating failure contact method in the address list of user;For terminal use for the inefficacy connection of mark in the address list of terminal use Being that mode operates, such as, the inefficacy contact method identified in address list is completely or partially deleted by terminal use, or, The mark being designated the part or all of contact method of inefficacy contact method in address list is cancelled by terminal use, such as, and user Know that the one or more contact methods being identified as inefficacy contact method are effective contact method in fact.
After terminal use is in the address list of terminal use, the inefficacy contact method of mark has carried out operation, contact person Processing server for the operation of the inefficacy contact method of mark in the address list of terminal use, updates net in response to terminal use Inefficacy contact method in the address list of the terminal use synchronizing storage in network side;Optionally, terminal use by terminal use's When the mark of the contact method being designated inefficacy contact method in address list is cancelled, contact person's processing server will be from above-mentioned screening The inefficacy contact method gone out is deleted the contact method being cancelled mark.
Below in conjunction with the application scenarios shown in Fig. 1, the contact person's processing method recording the present embodiment illustrates: See in the embodiment of the present invention shown in Fig. 3 and implement, based on the framework shown in Fig. 1, the optional schematic diagram that contact person processes, Contact person's processing method shown in Fig. 3 includes:
Step 201, want to make a phone call to Lee * * or during messaging as the terminal use of terminal 11, end user query terminal 11 Address list, find stored 3 telephone numbers, respectively telephone number 1, telephone number 2 and electricity under one's name at address list Lee * * Words number 3, now, terminal use is in the face of multiple telephone numbers corresponding for Lee contact person * *, it is not known that should use which phone Number.
Step 202, terminal 11 detect that terminal use is inquiring about address list and resting on letter corresponding to Lee contact person * * Cease the page, and terminal 11 finds that Lee contact person * * to when should have multiple telephone number, then sends to contact person's processing server 12 For managing the request of the address list of the terminal use of terminal 11, this request is carried the title of Lee contact person * *, or carries Multiple telephone numbers that Lee contact person * * is corresponding.
Step 203, contact person's processing server 12 are according to the title of Lee contact person * *, from the end of predetermined terminal 11 The inefficacy contact method of the address list of end subscriber finds the inefficacy telephone number of Lee contact person * *;Or, contact person processes Server 12, by multiple telephone numbers corresponding for Lee * * in the address list of terminal use, is carried out with the inefficacy contact method filtered out Coupling, determines the inefficacy telephone number of Lee * *.Here, suppose that the inefficacy telephone number of Lee * * is telephone number 1 and telephone number 3。
Step 204, contact person's processing server 12 are by the inefficacy telephone number (telephone number 1 and telephone number 3) of Lee * * Send to terminal 11.
Inefficacy telephone number (the telephone number of Lee * * that step 205, terminal 11 send according to contact person's processing server 12 1 and telephone number 3), by telephone number 1 corresponding for Lee * * and telephone number 3 points in the address list of the terminal use of terminal 11 It is not designated " inefficacy ", thus identifies the inefficacy telephone number (telephone number 1 and telephone number 3) of Lee * *.
So, terminal use can directly select the telephone number 2 not being identified as to lose efficacy and makes a phone call to Lee * * Or messaging, thus avoiding user that the multiple numbers including inefficacy telephone number are attempted feelings one by one that dial or contact Under condition, automatically identify the inefficacy number in address list, overcome consuming user time and energy that prior art exists, reduce logical The service efficiency of news record, reduces the defect of the communication efficiency of user.
In the present embodiment, by based on each terminal use in the relation chain that directly terminal use of contact person builds each other Address list in the contact method of same correspondents compare, filter out the contact method conformed to a predetermined condition, and according to The Feature Selection of the contact method conformed to a predetermined condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple terminals The contact method of the contact person of the address list of user is analyzed, and identifies inefficacy contact method from all contact methods, eventually End subscriber directly uses other contact methods (i.e. effective connection mode) in addition to inefficacy contact method to communicate, it is to avoid In prior art, terminal use needs to attempt one by one communicating to the multiple contact methods including inefficacy contact method, Thus save the time and efforts of user, so, the present embodiment can automatically identify the inefficacy number in address list, improves The service efficiency of address list, improves the communication efficiency of user.
Embodiment two
Based on above-described embodiment, the present embodiment receives, for terminal, the connection that lost efficacy in the cleaning address list that terminal use triggers It is that the processing scheme during operation instruction of mode illustrates.
Seeing Fig. 4, contact person's processing method that the present embodiment is recorded can be coordinated with contact person's processing server from terminal Implementing, method comprises the following steps:
Step 301, terminal detection terminal use is for the operation of address list.
What step 302, terminal detected that terminal use triggers carries out, for inefficacy contact method in address list, the behaviour that clears up When indicating, send the message being used for obtaining the inefficacy contact method of each contact person in address list to contact person's processing server; This message includes the contact method of all of contact person in the mark of terminal use, contact method or address list.
Step 303, contact person's processing server are used for obtaining each contact person in address list in response to what terminal use sent The message of inefficacy contact method, the data base previously generated by inquiry is screened multiple terminal uses' of determining in advance Inefficacy contact method, and the contact method of contact person each in the address list of this terminal use is determined many with screening in advance respectively The inefficacy contact method of individual terminal use mates, and obtains the inefficacy correspondent party of each contact person in the address list of this terminal use Formula, or the data base previously generated by inquiry obtains the mistake of each contact person in the address list of this terminal use predetermined Effect contact method.
The inefficacy of contact person each in the address list of this terminal use obtained is joined by step 304, contact person's processing server It is that mode is sent to this terminal.
Step 305, terminal process the inefficacy contact method of each contact person in the address list of server feedback according to contact person, Contact method corresponding in address list is designated inefficacy contact method, sees the mistake of each contact person in the address list shown in Fig. 5 Comparison schematic diagram before and after effect contact method (illustrating with telephone number in Fig. 5) is identified, for terminal use for address list In be identified as inefficacy contact method contact method operation, such as, the inefficacy correspondent party that terminal use will identify in address list Formula is completely or partially deleted, or, terminal use will be designated the part or all of correspondent party of inefficacy contact method in address list The mark of formula is cancelled, and such as, user knows that the one or more contact methods being identified as inefficacy contact method are effective in fact Contact method.
In the present embodiment, when terminal use needs to clear up the inefficacy contact method of address list, terminal takes from terminal Business device request obtains the inefficacy contact method of each contact person in address list and is identified in address list, is equivalent to as each It is that mode adds new attribute: inefficacy contact method or effective connection mode be not (as being designated inefficacy contact method in address list Contact method), judge whether to use in this, as user, revise or delete contact method according to one of, save user Time and efforts, improves terminal use and arranges the accuracy and efficiency of address list.
Embodiment three
Based on above-described embodiment, the present embodiment wishes to identify in address list the difference of each contact person for terminal use The demand using frequent degree information of contact method, proposes the technical scheme solved, specifically includes:
The different contact methods for asking each contact person that contact person's processing server actively or sends in response to terminal Use frequent degree information message, in address list based on terminal use, the communication log data of each contact person, determine end The frequent degree of use that in the address list of end subscriber, each contact person uses different contact methods to communicate;Here, frequency is used Numerous degree can include information such as commonly using, be of little use;
Contact person's processing server sends the different contact methods of each contact person in the address list of terminal use to terminal Use frequent degree information.
Terminal identifies the use frequent degree letter of the different contact methods of each contact person in the address list of terminal use Breath;Here, be equivalent to add new attribute for each contact method: commonly use or be of little use, judging whether to make in this, as user With, revise or delete contact method according to one of;It should be noted that the present embodiment is based on above-described embodiment, the present embodiment In the frequent degree information of use (commonly use, be of little use) of contact method, refer to that contact person uses contact method to communicate (electricity Words, note, associated application) the frequent degree of use;The contact method being not labeled as inefficacy (or being noted as effectively) may It is identified as commonly using, it is also possible to be identified as being of little use;See each contact person in the address list shown in Fig. 6 contact method (with Telephone number is illustrated) it is marked the comparison schematic diagram used before and after frequent degree information, check that Fig. 5 with Fig. 6 just can send out simultaneously Existing:
1) telephone number 2 of Lee * *, the telephone number 7 of money * * are all not labeled as losing efficacy in Figure 5, and, in figure 6 The telephone number 2 of Lee * *, the telephone number 7 of money * * are all noted as commonly using;It is to say, the telephone number 2 of Lee * *, money * * Telephone number 7 is effective and commonly used telephone number;
2) open the telephone number 4 of * *, telephone number 5 in Figure 5 to be all not labeled as losing efficacy, and, open * *'s in figure 6 Telephone number 4 is noted as commonly using, but, the telephone number 5 of a * * is noted as being of little use;It is to say, the phone of a * * Number 4 is effective and commonly used telephone number, and the telephone number 5 of a * * is effectively but the telephone number being of little use.
Terminal use is frequent for the use of the different contact methods of each contact person of mark in the address list of terminal use The operation of degree information, such as, deletes being designated the contact method being of little use in address list, or, will address list identify " being of little use " mark of one or more contact methods for being of little use is cancelled, and such as, user knows and is identified as " being of little use " One or more contact methods be authentic and valid and conventional contact method in fact;Here, terminal use can also will be marked Note is purged as inefficacy contact method for the contact method of " being of little use ", and such as, terminal use can be based in address list The frequent degree information of use of the different contact methods of each contact person of mark, the inefficacy contact method in cleaning address list.
Contact person's processing server in response to terminal use for each contact person of mark in the address list of terminal use The operation using frequent degree information of different contact methods, updates in the address list of the terminal use synchronizing storage in network side The different contact methods of each contact person;Such as, update the mark of corresponding contact method, or corresponding contact method is deleted.
Embodiment four
The present embodiment is based on above-mentioned any embodiment, respectively from product side and technology side to aforesaid contact person's processing method The process that realizes illustrate.
1, product side:
A) operation interface
Seeing Fig. 7 a, user can detect whether the machine has inefficacy number in address list doctor's health check-up, and points out user Arrange;Or,
Seeing Fig. 7 b, user also can enter from address list sorting module voluntarily, arranges inefficacy number;Or,
See Fig. 7 c, when user searches the telephone number of contact person from address list, in the face of multiple electricity that contact person is corresponding Words number, it is not known which should use?Terminal is (right to the contact person that should have multiple telephone number in showing address list Should be multiple) the page, increase the button of sign inefficacy number or operation entry and select for user, see Fig. 7 d, or, eventually End, when detecting that user searches the information to the contact person that should have multiple telephone number from address list, actively points out user eventually Rectify the inefficacy number in identifying multiple telephone numbers that contact person is corresponding, and recognition result is presented to user.
B) function
According to cloud server (contact person's processing server described above) analyze after, will determine that label (recognition result) in Now seeing Fig. 7 e to user, user can independently choose whether to process these numbers.
2, technology side:
The calculating of inefficacy telephone number is divided into calculated off line part and online service part, due to process data volume very Greatly, therefore can carry out calculated off line in Hadoop platform, then the result of calculated off line be imported in storage, online service Process inquiry storage when that user asking, have the part of result of calculation to return to user;See the inefficacy phone shown in Fig. 8 a Number calculation process.
Firstly the need of importing to the data of any active ues calculate in the middle of platform, calculating platform used herein is Hadoop Platform.When user uses address list synchronization function, the contact data of this user can be imported by system background with the form of daily record To calculating platform (relating to privacy owing to synchronizing the data of assistant, data are calculating all storing in the way of encryption on platform).
1) customer relationship circle is set up:
Centered by active user, by the contact person in his address list, if the contact person of he and address list all with Step assistant deposits the number of both sides, then they can set up 1 degree of contact person.For all 1 degree of contact persons, take out them successively Contact person in the middle of address list, resettles 1 degree of contact person, and now, central user just has the human connection circle of 2 degree, these Information Numbers The form of user-> telephone number imports to calculate platform according to this.Here, if the number of degrees of contact person are particularly as follows: two users are mutual Deposit phone number, then claim the two user 1 degree of contact person each other, if all there is common 1 degree connection between two users It is people, then claim the two user 2 degree of contact persons each other, by that analogy.See Fig. 8 b, user A with B and C to be 1 degree respectively and contact People, user A Yu D is 2 degree of contact persons, and user A Yu E is 3 degree of contact persons.
Off-line part sets up the calculating of human connection circle, and off-line part uses Hadoop system, sets up contact human connection in systems Table, utilizes the computing capability of Hadoop, can set up human connection circle in global data, sets up condition and the previous step phase of human connection circle Seemingly: mutually deposit number people and can set up human connection table in this approach standby with opening relationships.
2) suspicion number is filtered out:
Think that the number of user is probably the two kinds of situations that have of inefficacy: a kind of situation be this user in circle of friends, he Name deposited number by multiple friends, and the number deposited is different;Another kind of situation is same number, is deposited not Same name, and under this different name, include again multiple number.Both of these case, will be considered suspicion number.Certainly This situation is to there is certain error rate, but prevents user's mistake from having deleted number some Restoration Mechanism of use, but can look for Return.
The qualification of suspicion number: use various ways to identify whether a number is used recently: such as, combine hands The flow short-message verification of machine house keeper, has the explanation using flux modification to be currently in use recently;Or, whether phone number has binding Synchronize assistant, have the number of binding to be largely currently in use;Or, this number has the record of call the most recently, has logical Being currently in use of words record.Frequent above-mentioned several investigation steps, whether the number that can find corresponding is most recently used, if very Do not use for a long time, be then considered as inefficacy number.
3) the definition for the period of inefficacy number: such as, is considered as inefficacy number by original number in continuous 3 months, beats The label of upper inefficacy, for reference.Demonstrate user's untapped time after the last time uses simultaneously.If because judging bar Part is not enough, data deficiency, it is impossible to judgement do not show inefficacy label.
After offline platform is calculated, will import at line platform, online service can with quick search and return to use Family;The data flow of whole flow process is as shown in Figure 8 c.
The present embodiment is by big data background analysis, and solving a contact person in identification cell phone address book for user has many Individual number comprises the pain spot of the number that lost efficacy, and improves user and finds number call or the information of transmission of needs in address list Operating efficiency, the waste repeatedly attempting causing time and efforts dialled during having evaded this;Based on the present embodiment, can realize Automatically identify telephone number authentic and valid and conventional in the multiple number of contact person for user, promote the use of user further Experience.
The present embodiment proposes the inefficacy telephone number people using contact person's circle to find user, from contact person's circle, Find out the stored multiple cell-phone numbers of contact person, from these numbers, identify inefficacy number.The use data of synthetic user, can With from the contact relationship data of user, form contact person's circle, and for the user in contact person's circle, calculate contact person's phase Close the time that data are synchronized to use, judge whether number is used in the recent period, or untapped duration, from the most not Synchronize the contact person used searches out the number lost efficacy, show user, whether delete inefficacy with for reference Contact number.
Embodiment five
Record with previous embodiment one is corresponding, and the present embodiment records a kind of contact person's processing server, sees Fig. 9, Contact person's processing server 41 shown in Fig. 9 includes:
Acquisition module 401, for obtaining the address list of terminal use, address list includes the contact of the contact person of terminal use Mode;
Search module 402, obtain the terminal of directly contact person each other for searching the address list of any two terminal use User, terminal use based on direct contact person each other builds at least one relation chain;
First determines module 403, for true based on searching the address list of each terminal use in the relation chain that module 402 builds Determine same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of same correspondents is compared;
Screening module 404, for determining the use of the contact method conformed to a predetermined condition that module 403 determines based on first Data, analyze the feature of the contact method respectively conformed to a predetermined condition, and filter out coupling and preset the contact method of feature for losing efficacy Contact method.
The present embodiment is by being analyzed the contact method of the contact person of the address list of multiple terminal uses, from all Being to identify inefficacy contact method in mode, terminal use can directly use other contacts in addition to inefficacy contact method Mode communicates, it is to avoid in prior art, terminal use needs the multiple contact methods including inefficacy contact method Attempt one by one communicating, thus save the time and efforts of user, improve the communication efficiency of user.
On the basis of above-described embodiment, search module 402, specifically for: obtain the contact method of first terminal user And second contact method of terminal use;The contact method of the second terminal use is searched in the address list of first terminal user, And, the address list of the second terminal use is searched the contact method of first terminal user;Determine when all finding, it is determined that One terminal use and the second terminal use direct contact person each other.
On the basis of above-described embodiment, search module 402, specifically for: with the terminal use of direct contact person each other In any terminal user be node, with any terminal user each other directly other terminal use of contact person for level interlink Point, node based on cascade builds relation chain.
On the basis of above-described embodiment, first determines module 403, specifically for: each terminal use in search relationship chain Address list in there is the contact person of same names, comparison has the contact method of the contact person of same names, if it is different, the most true The contact method of the contact person surely with same names is the contact method conformed to a predetermined condition.
On the basis of above-described embodiment, first determines module 403, specifically for: each terminal use in search relationship chain Address list in there is the contact person of identical contact method, comparison has the title of the contact person of identical contact method, if it is different, Then determine that identical contact method is the contact method conformed to a predetermined condition.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the first contact method corresponding first It is the use data of people, obtains the first contact method by the first contact person for use time of Information Authentication mode;Determining When the time difference of use time and current time is more than very first time threshold value, it is determined that the first contact method is the mistake of the first contact person Effect contact method;Wherein, the first contact method is arbitrary contact method conformed to a predetermined condition, and first contacts in artificial relation chain The address list of each terminal use has arbitrary contact person of the first contact method.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the second contact method corresponding second It is the associated application data of people, determines that the second contact method is not used as the association contact method of the second used application of contact person Time, it is determined that the second contact method is the inefficacy contact method of the second contact person;Wherein, the second contact method be arbitrary meet predetermined The contact method of condition, has the arbitrary of the second contact method in the address list of each terminal use in the second artificial relation chain of contact Contact person.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the 3rd contact method the corresponding 3rd It is the communication log data of people, obtains the call duration time of the 3rd contact method;Determine the call duration time of the 3rd contact method with When the time difference of current time is more than the second time threshold, it is determined that the 3rd contact method is the inefficacy correspondent party of the 3rd contact person Formula;Wherein, the 3rd contact method is arbitrary contact method conformed to a predetermined condition, and the 3rd contacts each terminal in artificial relation chain uses The address list at family has arbitrary contact person of the 3rd contact method.
On the basis of Fig. 9 illustrates structure, the present embodiment also states that another kind of contact person's processing server, sees Figure 10, Contact person's processing server 42 shown in Figure 10 also includes: acquisition module 401, search module 402, first determine module 403, sieve Modeling block 404, and each module also has the function shown in Fig. 9 and annexation;Meanwhile, contact person's processing server 42 is also Including:
Second determines module 501, the communication log data of each contact person in address list based on third terminal user, Determine the frequent degree of use that in the address list of third terminal user, each contact person uses different contact methods to communicate;
First transceiver module 502, in the address list sending third terminal user to third terminal, each contact person is not With the frequent degree information of the use of contact method, in the address list of third terminal user, identify each contact person's for third terminal The frequent degree information of use of different contact methods;
First more new module 503, for identifying in the address list of third terminal user in response to third terminal user The operation using frequent degree information of different contact methods of each contact person, update in network side and synchronize the 3rd of storage eventually The different contact methods of each contact person in the address list of end subscriber.
Optionally, contact person's processing server 42 also includes:
Second transceiver module 504, the inefficacy correspondent party in the address list sending the 4th terminal use to the 4th terminal Formula, for the 4th terminal indicating failure contact method in the address list of the 4th terminal use;
Second more new module 505, for identifying in the address list of the 4th terminal use in response to the 4th terminal use The operation of inefficacy contact method, update inefficacy correspondent party in the address list of the 4th terminal use synchronizing storage in network side Formula.
In actual application, acquisition module 401, search module 402, first determine that module 403, screening module 404, second are true Cover half block the 501, first transceiver module 502, first more new module the 503, second transceiver module the 504, second more new module 505 Can by the central processing unit (CPU) of contact person's processing server, microprocessor (MPU), special IC (ASIC) or scene Programmings gate array (FPGA) etc. realize.
Embodiment six
The present embodiment records a kind of computer-readable medium, can be ROM (such as, read only memory, FLASH memory, Transfer device etc.), magnetic storage medium (such as, tape, disc driver etc.), optical storage medium (such as, CD-ROM, DVD- ROM, paper card, paper tape etc.) and the program storage of other well-known types;In computer-readable medium, storage has computer to hold Row instruction, when executing an instruction, causes at least one processor to perform to include following operation:
Obtaining the address list of terminal use, address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most direct The terminal use of contact person builds at least one relation chain;
Address list based on terminal use each in relation chain determines same correspondents, enters the contact method of same correspondents Row comparison obtains the contact method conformed to a predetermined condition;
Use data based on the contact method conformed to a predetermined condition, analyze the contact method that respectively conforms to a predetermined condition Feature, the contact method filtering out the default feature of coupling is inefficacy contact method.
To sum up, by based on the communication of each terminal use in the relation chain that directly terminal use of contact person builds each other The contact method of the same correspondents in record is compared, and filters out the contact method conformed to a predetermined condition, and pre-according to meeting The Feature Selection of the contact method of fixed condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple terminal uses' The contact method of the contact person of address list is analyzed, and identifies inefficacy contact method, terminal use from all contact methods Other contact methods in addition to inefficacy contact method are directly used to communicate, it is to avoid in prior art, terminal use needs To attempt one by one communicating to the multiple contact methods including inefficacy contact method, thus save user time and Energy, so, embodiments of the invention can automatically identify the inefficacy number in address list, improves the use effect of address list Rate, improves the communication efficiency of user.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combine software and hardware Formula.And, the present invention can use can be with storage at one or more computers wherein including computer usable program code The form of the upper computer program implemented of medium (including but not limited to disk memory and optical memory etc.).
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one The step of the function specified in individual square frame or multiple square frame.
The above, only presently preferred embodiments of the present invention, it is not intended to limit protection scope of the present invention.

Claims (20)

1. contact person's processing method, it is characterised in that described method includes:
Obtaining the address list of terminal use, described address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most directly contacting The terminal use of people builds at least one relation chain;
Address list based on terminal use each in described relation chain determines same correspondents, the correspondent party to described same correspondents Formula is compared the contact method obtaining conforming to a predetermined condition;
Use data based on the described contact method conformed to a predetermined condition, analyze each described in the correspondent party that conforms to a predetermined condition The feature of formula, the contact method filtering out the default feature of coupling is inefficacy contact method.
Method the most according to claim 1, it is characterised in that the address list of described lookup any two terminal use obtains The terminal use of direct contact person each other, including:
Obtain contact method and the contact method of the second terminal use of first terminal user;
The contact method of described second terminal use is searched in the address list of described first terminal user, and, described The address list of two terminal uses is searched the contact method of described first terminal user;
Determine when all finding, it is determined that described first terminal user and described second terminal use direct contact person each other.
Method the most according to claim 1, it is characterised in that described terminal use based on direct contact person each other builds At least one relation chain, including:
With any terminal user in the terminal use of described direct contact person each other as node, with described any terminal user Directly other terminal use of contact person is tandem node each other, and described node based on cascade builds described relation chain.
Method the most according to claim 1, it is characterised in that described communication based on terminal use each in described relation chain Record determines same correspondents, the correspondent party obtaining conforming to a predetermined condition of comparing the contact method of described same correspondents Formula, including:
Search the contact person in the address list of each terminal use in described relation chain with same names, have identical described in comparison The contact method of the contact person of title, if it is different, the contact method described in then determining with the contact person of same names is described The contact method conformed to a predetermined condition.
Method the most according to claim 1, it is characterised in that described communication based on terminal use each in described relation chain Record determines same correspondents, the correspondent party obtaining conforming to a predetermined condition of comparing the contact method of described same correspondents Formula, including:
Search the contact person in the address list of each terminal use in described relation chain with identical contact method, have described in comparison The title of the contact person of identical contact method, if it is different, then determine that described identical contact method conforms to a predetermined condition described in being Contact method.
Method the most according to claim 1, it is characterised in that described based on the described contact method conformed to a predetermined condition Use data, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the correspondent party of feature Formula is inefficacy contact method, including:
Resolve the use data of corresponding first contact person of the first contact method, obtain described first contact method by described first It it is people's use time for Information Authentication mode;
When determining the time difference with current time of the described use time more than very first time threshold value, it is determined that described first correspondent party Formula is the inefficacy contact method of described first contact person;
Wherein, described first contact method be arbitrary described in the contact method that conforms to a predetermined condition, described first contacts artificial institute State arbitrary contact person in the address list of each terminal use in relation chain with described first contact method.
7. require the method described in 1 according to claim, it is characterised in that described based on the described correspondent party conformed to a predetermined condition The use data of formula, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out feature and meet default feature Contact method be inefficacy contact method, including:
Resolve the associated application data of corresponding second contact person of the second contact method, determine that described second contact method is not used as institute When stating the association contact method of the second used application of contact person, it is determined that described second contact method is described second contact person Inefficacy contact method;
Wherein, described second contact method be arbitrary described in the contact method that conforms to a predetermined condition, described second contacts artificial institute State arbitrary contact person in the address list of each terminal use in relation chain with described second contact method.
8. require the method described in 1 according to claim, it is characterised in that described based on the described correspondent party conformed to a predetermined condition The use data of formula, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out feature and meet default feature Contact method be inefficacy contact method, including:
Resolve the communication log data of corresponding 3rd contact person of the 3rd contact method, when obtaining the communication of described 3rd contact method Between;
When the time difference of the call duration time Yu current time determining described 3rd contact method is more than the second time threshold, it is determined that Described 3rd contact method is the inefficacy contact method of described 3rd contact person;
Wherein, described 3rd contact method be arbitrary described in the contact method that conforms to a predetermined condition, the described 3rd contacts artificial institute State arbitrary contact person in the address list of each terminal use in relation chain with described 3rd contact method.
9. require the method described in 1 according to claim, it is characterised in that described method also includes:
The communication log data of each contact person in address list based on third terminal user, determine that described third terminal user's is logical The frequent degree of use that in news record, each contact person uses different contact methods to communicate;
The use of the different contact methods of each contact person in the address list of described third terminal user is sent frequent to third terminal Degree information, identifies the different contact methods of each contact person in the address list of described third terminal user for described third terminal The frequent degree information of use;
In response to described third terminal user for the difference of each contact person of mark in the address list of described third terminal user The operation using frequent degree information of contact method, updates the communication of the described third terminal user synchronizing storage in network side The different contact methods of each contact person in record.
10. require the method described in 1 according to claim, it is characterised in that described method also includes:
The inefficacy contact method in the address list of the 4th terminal use is sent, for described 4th terminal described the to the 4th terminal The address list of four terminal uses identifies described inefficacy contact method;
In response to described 4th terminal use for the inefficacy contact method of mark in the address list of described 4th terminal use Operation, updates inefficacy contact method described in the address list of described 4th terminal use synchronizing storage in network side.
11. 1 kinds of contact person's processing servers, it is characterised in that described server includes:
Acquisition module, for obtaining the address list of terminal use, described address list includes the correspondent party of the contact person of terminal use Formula;
Search module, obtain the terminal use of directly contact person each other, base for searching the address list of any two terminal use Terminal use in direct contact person each other builds at least one relation chain;
First determines module, and in described relation chain based on described lookup module construction, the address list of each terminal use determines Same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of described same correspondents is compared;
Screening module, for based on described first determine module determine described in the use number of contact method that conforms to a predetermined condition According to, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the contact method of feature for losing Effect contact method.
12. servers according to claim 11, it is characterised in that described lookup module, specifically for: obtain first eventually The contact method of end subscriber and the contact method of the second terminal use;The address list of described first terminal user is searched described The contact method of the second terminal use, and, the address list of described second terminal use is searched described first terminal user Contact method;Determine when all finding, it is determined that described first terminal user and described second terminal use the most directly contact People.
13. servers according to claim 11, it is characterised in that described lookup module, specifically for: with described each other Directly any terminal user in the terminal use of contact person be node, with described any terminal user direct contact person each other Other terminal use be tandem node, based on cascade described node build described relation chain.
14. servers according to claim 11, it is characterised in that described first determines module, specifically for: search institute State the contact person in the address list of each terminal use in relation chain with same names, there is described in comparison the contact of same names The contact method of people, if it is different, the contact method described in then determining with the contact person of same names be described in meet predetermined bar The contact method of part.
15. servers according to claim 11, it is characterised in that described first determines module, specifically for: search institute State the contact person in the address list of each terminal use in relation chain with identical contact method, there is described in comparison identical correspondent party The title of the contact person of formula, if it is different, then determine described identical contact method be described in the contact method that conforms to a predetermined condition.
16. servers according to claim 11, it is characterised in that described screening module, specifically for: resolve first It is the use data of corresponding first contact person of mode, obtains described first contact method and tested for information by described first contact person The use time of card mode;When determining the time difference with current time of the described use time more than very first time threshold value, it is determined that Described first contact method is the inefficacy contact method of described first contact person;Wherein, described first contact method is arbitrary institute State the contact method conformed to a predetermined condition, described first contact artificial described relation chain has in the address list of each terminal use Arbitrary contact person of described first contact method.
17. require the server described in 11 according to claim, it is characterised in that described screening module, specifically for: resolve the The associated application data of corresponding second contact person of two contact methods, determine that described second contact method is not used as described second contact During the association contact method of the used application of people, it is determined that described second contact method is the inefficacy correspondent party of described second contact person Formula;Wherein, described second contact method be arbitrary described in the contact method that conforms to a predetermined condition, described second contact is artificial described Relation chain has in the address list of each terminal use arbitrary contact person of described second contact method.
18. require the server described in 11 according to claim, it is characterised in that described screening module, specifically for: resolve the The communication log data of corresponding 3rd contact person of three contact methods, obtain the call duration time of described 3rd contact method;Determining When the call duration time of described 3rd contact method is more than the second time threshold with the time difference of current time, it is determined that the described 3rd Be mode be the inefficacy contact method of described 3rd contact person;Wherein, described 3rd contact method be arbitrary described in meet predetermined The contact method of condition, has the described 3rd in the address list of each terminal use in the described 3rd artificial described relation chain of contact It is arbitrary contact person of mode.
19. require the server described in 11 according to claim, it is characterised in that described server also includes:
Second determines module, and in address list based on third terminal user, the communication log data of each contact person, determine institute State the frequent degree of use that in the address list of third terminal user, each contact person uses different contact methods to communicate;
First transceiver module, the different connection of each contact person in the address list sending described third terminal user to third terminal It is the frequent degree information of use of mode, in the address list of described third terminal user, identifies each contact for described third terminal The frequent degree information of use of the different contact methods of people;
First more new module, for identifying in the address list of described third terminal user in response to described third terminal user The operation using frequent degree information of different contact methods of each contact person, update in network side and synchronize described the of storage The different contact methods of each contact person in the address list of three terminal uses.
20. require the server described in 11 according to claim, it is characterised in that described server also includes:
Second transceiver module, the inefficacy contact method in the address list sending the 4th terminal use to the 4th terminal, for institute State the 4th terminal and identify described inefficacy contact method in the address list of described 4th terminal use;
Second more new module, for identifying in the address list of described 4th terminal use in response to described 4th terminal use The operation of inefficacy contact method, update and lost efficacy described in the address list of described 4th terminal use synchronizing storage in network side Contact method.
CN201610377964.7A 2016-05-31 2016-05-31 Contact person's processing method and server Active CN106095814B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610377964.7A CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server
PCT/CN2017/084032 WO2017206696A1 (en) 2016-05-31 2017-05-11 Contact information processing method and apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610377964.7A CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server

Publications (2)

Publication Number Publication Date
CN106095814A true CN106095814A (en) 2016-11-09
CN106095814B CN106095814B (en) 2019-09-20

Family

ID=57230603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610377964.7A Active CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server

Country Status (2)

Country Link
CN (1) CN106095814B (en)
WO (1) WO2017206696A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682223A (en) * 2017-01-04 2017-05-17 上海智臻智能网络科技股份有限公司 Method and device for detecting data validity and method and device for intelligent interaction
CN106713676A (en) * 2017-01-23 2017-05-24 北京奇虎科技有限公司 Communication number identification control method and device, and communication terminal
CN106850926A (en) * 2017-02-21 2017-06-13 维沃移动通信有限公司 One kind failure contact person processing method, server and mobile terminal
CN107295118A (en) * 2017-06-28 2017-10-24 西安万像电子科技有限公司 Contact searching method and device
WO2017206696A1 (en) * 2016-05-31 2017-12-07 腾讯科技(深圳)有限公司 Contact information processing method and apparatus, and storage medium
CN110166637A (en) * 2018-02-12 2019-08-23 深圳市六度人和科技有限公司 A kind of spacing recognition methods and device
CN110198286A (en) * 2018-02-24 2019-09-03 阿里巴巴集团控股有限公司 A kind of data processing method and calculate equipment
CN110851453A (en) * 2018-08-01 2020-02-28 国网辽宁招标有限公司 Dynamic generation method of project address list
CN111310538A (en) * 2019-11-18 2020-06-19 韩玉芝 Content management system based on big data server

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417926A (en) * 2018-04-28 2019-11-05 冯泽 Contact method for building up, system and computer readable storage medium
CN113885954A (en) * 2021-09-26 2022-01-04 湖南于一科技有限公司 Method, device and equipment for detecting zombie powder in WeChat address book and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781035A (en) * 2014-01-10 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Method and system for communication processing based on mobile terminal
CN104394258A (en) * 2014-12-01 2015-03-04 广州三星通信技术研究有限公司 Method and device for processing contact change of communication object
CN104410694A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Autonomous update method for cloud address book contact information based on data mining
CN105357357A (en) * 2015-10-14 2016-02-24 北京乐动卓越科技有限公司 Telephone number management method and cloud server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882953A (en) * 2012-09-18 2013-01-16 李建成 Communication number synchronization method and system
CN103095884A (en) * 2013-01-17 2013-05-08 东莞宇龙通信科技有限公司 Processing method and processing system for numbers of contact persons
CN105141648B (en) * 2014-06-09 2020-06-09 西安中兴新软件有限责任公司 Address book updating method and terminal
CN104023108B (en) * 2014-06-18 2016-08-24 中国联合网络通信集团有限公司 The method and apparatus removing terminal failure contact person
CN106095814B (en) * 2016-05-31 2019-09-20 腾讯科技(深圳)有限公司 Contact person's processing method and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781035A (en) * 2014-01-10 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Method and system for communication processing based on mobile terminal
CN104410694A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Autonomous update method for cloud address book contact information based on data mining
CN104394258A (en) * 2014-12-01 2015-03-04 广州三星通信技术研究有限公司 Method and device for processing contact change of communication object
CN105357357A (en) * 2015-10-14 2016-02-24 北京乐动卓越科技有限公司 Telephone number management method and cloud server

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017206696A1 (en) * 2016-05-31 2017-12-07 腾讯科技(深圳)有限公司 Contact information processing method and apparatus, and storage medium
CN106682223A (en) * 2017-01-04 2017-05-17 上海智臻智能网络科技股份有限公司 Method and device for detecting data validity and method and device for intelligent interaction
CN106713676B (en) * 2017-01-23 2019-08-06 北京安云世纪科技有限公司 Communicating number identifies control method, device and communication terminal
CN106713676A (en) * 2017-01-23 2017-05-24 北京奇虎科技有限公司 Communication number identification control method and device, and communication terminal
CN106850926A (en) * 2017-02-21 2017-06-13 维沃移动通信有限公司 One kind failure contact person processing method, server and mobile terminal
CN106850926B (en) * 2017-02-21 2019-03-05 维沃移动通信有限公司 A kind of failure contact person processing method, server and mobile terminal
CN107295118A (en) * 2017-06-28 2017-10-24 西安万像电子科技有限公司 Contact searching method and device
CN110166637A (en) * 2018-02-12 2019-08-23 深圳市六度人和科技有限公司 A kind of spacing recognition methods and device
CN110166637B (en) * 2018-02-12 2021-07-23 深圳市六度人和科技有限公司 Empty number identification method and device
CN110198286A (en) * 2018-02-24 2019-09-03 阿里巴巴集团控股有限公司 A kind of data processing method and calculate equipment
CN110851453A (en) * 2018-08-01 2020-02-28 国网辽宁招标有限公司 Dynamic generation method of project address list
CN110851453B (en) * 2018-08-01 2022-09-20 国网辽宁招标有限公司 Dynamic generation method of project address list
CN111310538A (en) * 2019-11-18 2020-06-19 韩玉芝 Content management system based on big data server

Also Published As

Publication number Publication date
CN106095814B (en) 2019-09-20
WO2017206696A1 (en) 2017-12-07

Similar Documents

Publication Publication Date Title
CN106095814A (en) Contact person's processing method and server
US20180359200A1 (en) System and method for facilitating the growth of a mobile community
CN106097468B (en) One kind is registered method, terminal and IM application server
US8499049B2 (en) System and method for accumulating social relation information for social network services
US11681744B2 (en) Methods and systems for updating a database based on object recognition
AU2018201140B2 (en) System and method for candidate profile screening
CN104410700B (en) Issue method, harassing call hold-up interception method and the system of harassing call list
MXPA04006722A (en) Integration integrity manager.
CN103049853A (en) Identifying device and verification method for authenticity of shop
CN105427089A (en) Intelligent agenda, setting and detecting method and agenda system
US10735421B1 (en) Method and system for authentication via location monitoring
CN106789550A (en) Information processing method and device
CN101764889A (en) Processing method of contact information in electronic device and electronic devices
US20220279025A1 (en) Network service system, computer storage medium for communication, and network service method
CN114780301B (en) Disaster recovery method and system supporting multi-cloud production environment
CN102438205A (en) Method and system for pushing service based on action of mobile user
US10394900B1 (en) Community-based investigative tools
CN114757639A (en) Data processing method, device, equipment and storage medium
GB2601045A (en) Automated computerized identification of assets
CN109903006A (en) Reporting method, device, equipment and the computer readable storage medium of building
CN106304028B (en) The method and device of address book backup and recovery
CN114969530A (en) Service data processing method and device and server
US7784091B2 (en) Data processing system
CN109815393B (en) Information processing method and device, computer equipment and readable storage medium
CN110417634A (en) Anti- brush ticket cheat method and relevant device based on information security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant