CN106095814A - Contact person's processing method and server - Google Patents
Contact person's processing method and server Download PDFInfo
- Publication number
- CN106095814A CN106095814A CN201610377964.7A CN201610377964A CN106095814A CN 106095814 A CN106095814 A CN 106095814A CN 201610377964 A CN201610377964 A CN 201610377964A CN 106095814 A CN106095814 A CN 106095814A
- Authority
- CN
- China
- Prior art keywords
- contact
- contact method
- address list
- terminal
- contact person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 claims abstract description 425
- 238000004891 communication Methods 0.000 claims abstract description 33
- 230000008878 coupling Effects 0.000 claims abstract description 14
- 238000010168 coupling process Methods 0.000 claims abstract description 14
- 238000005859 coupling reaction Methods 0.000 claims abstract description 14
- 238000001914 filtration Methods 0.000 claims abstract description 6
- 238000012545 processing Methods 0.000 claims description 70
- 238000003860 storage Methods 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 12
- 238000012216 screening Methods 0.000 claims description 9
- 230000000694 effects Effects 0.000 claims description 8
- 238000010276 construction Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 11
- 238000004590 computer program Methods 0.000 description 7
- 230000005611 electricity Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000004140 cleaning Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 230000018199 S phase Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000008521 reorganization Effects 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42136—Administration or customisation of services
- H04M3/42144—Administration or customisation of services by service provider
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
The open a kind of contact person's processing method of the present invention and server, method includes: obtaining the address list of terminal use, address list includes the contact method of the contact person of terminal use;The address list searching any two terminal use obtains the terminal use of directly contact person each other, and terminal use based on direct contact person each other builds at least one relation chain;Address list based on terminal use each in relation chain determines same correspondents, the contact method obtaining conforming to a predetermined condition of comparing the contact method of same correspondents;Use data based on the contact method conformed to a predetermined condition, analyze the feature of the contact method respectively conformed to a predetermined condition, and the contact method filtering out the default feature of coupling is inefficacy contact method.Use the present invention, it is possible to identify the inefficacy number in address list, improve the service efficiency of address list, improve the communication efficiency of user.
Description
Technical field
The present invention relates to the data mining technology of technical field of information communication, particularly relate to a kind of contact person's processing method and
Server.
Background technology
Along with popularizing of people's communication, a lot of users used or were currently in use multiple different phone number, thus
In the cell phone address book of user, multiple phone number may be stored for same contact person, but, these cell-phone numbers
In Ma one or more may be currently in stopped status or by operator reclaim changed hands, this allows for the hands of user
Multiple numbers that same contact person in machine address list is corresponding also exist inefficacy number (as shut down or changing hands), when user to give
Contact person makes a phone call or during messaging, it is impossible to accurately telling which or which number from multiple numbers that contact person is corresponding is
Available number, can only attempt dialing or contacting one by one, so, can expend the time and efforts of user, reduce the use of address list
Efficiency.
Summary of the invention
In view of this, embodiment of the present invention expectation provides a kind of contact person's processing method and server, it is possible to identify logical
Inefficacy number in news record, improves the service efficiency of address list, improves the communication efficiency of user.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
First aspect, the embodiment of the present invention provides a kind of contact person's processing method, and method includes:
Obtaining the address list of terminal use, described address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most direct
The terminal use of contact person builds at least one relation chain;
Address list based on terminal use each in described relation chain determines same correspondents, the connection to described same correspondents
It is that mode is compared the contact method obtaining conforming to a predetermined condition;
Use data based on the described contact method conformed to a predetermined condition, analyze each described in the connection that conforms to a predetermined condition
Being the feature of mode, the contact method filtering out the default feature of coupling is inefficacy contact method.
Second aspect, the embodiment of the present invention provides a kind of contact person's processing server, and server includes:
Acquisition module, for obtaining the address list of terminal use, described address list includes the connection of the contact person of terminal use
It it is mode;
Searching module, the terminal obtaining directly contact person each other for searching the address list of any two terminal use is used
Family, terminal use based on direct contact person each other builds at least one relation chain;
First determines module, the address list of each terminal use in described relation chain based on described lookup module construction
Determine same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of described same correspondents is compared;
Screening module, for based on described first determine module determine described in the making of contact method that conform to a predetermined condition
By data, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the contact method of feature
For inefficacy contact method.
In the embodiment of the present invention, by based on each terminal in the relation chain that directly terminal use of contact person builds each other
The contact method of the same correspondents in the address list of user is compared, and filters out the contact method conformed to a predetermined condition, and
Feature Selection according to the contact method conformed to a predetermined condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple
The contact method of the contact person of the address list of terminal use is analyzed, and identifies inefficacy correspondent party from all contact methods
Formula, terminal use directly uses other contact methods in addition to inefficacy contact method to communicate, it is to avoid prior art
Middle terminal use needs to attempt one by one communicating to the multiple contact methods including inefficacy contact method, thus saves
The time and efforts of user, so, the embodiment of the present invention can automatically identify the inefficacy number in address list, improves address list
Service efficiency, improve user communication efficiency.
Accompanying drawing explanation
Fig. 1 is an optional configuration diagram of contact person's processing method in the embodiment of the present invention;
Fig. 2 is an optional schematic flow sheet of contact person's processing method in the embodiment of the present invention;
Fig. 3 is the optional schematic diagram implementing contact person's processing method in the embodiment of the present invention based on Fig. 1;
Fig. 4 is another optional schematic flow sheet of contact person's processing method in the embodiment of the present invention;
Fig. 5 is comparison schematic diagram before and after indicating failure contact method in address list in the embodiment of the present invention;
Fig. 6 is that in the embodiment of the present invention, in address list, mark uses the comparison schematic diagram before and after frequent degree information;
Fig. 7 a is one that in the embodiment of the present invention, cleaning inefficacy number function switchs and optionally realizes schematic diagram;
Fig. 7 b is that another that clear up inefficacy number function switch in the embodiment of the present invention optional realizes schematic diagram;
Fig. 7 c is an optional schematic diagram of the corresponding multiple telephone numbers of contact person in the embodiment of the present invention;
Fig. 7 d is to identify in the embodiment of the present invention that one of inefficacy number function switch optionally realizes schematic diagram;
Fig. 7 e is the optional interface schematic diagram clearing up inefficacy number in the embodiment of the present invention;
Fig. 8 a is the optional schematic flow sheet determining inefficacy telephone number in the embodiment of the present invention;
Fig. 8 b is an optional schematic diagram of contact person's number of degrees in the embodiment of the present invention;
Fig. 8 c is the optional data flow schematic diagram determining inefficacy telephone number in the embodiment of the present invention;
Fig. 9 is an optional structural representation of contact person's processing server in the embodiment of the present invention;
Figure 10 is another optional structural representation of contact person's processing server in the embodiment of the present invention.
Detailed description of the invention
First as follows to DESCRIPTION OF THE PRIOR ART: the address list of terminal use exists following situation: for same contact
People's storage has multiple telephone number, but one or more already at stopped status or has been returned by operator
Receipts change hands (servicing user as changed), i.e. one or more number is invalid number.When terminal use to give this position
Storage has the contact person of multiple telephone number to make a phone call or during messaging, this position contact of terminal use's storage in address list
Multiple telephone numbers of people, it is impossible to quickly, accurately telling which or which number is available number, can only attempt one by one dialing
Or contact, that dials during this repeatedly attempts the waste of the time and efforts by causing user, and so, prior art can expend
The time and efforts that user is too much, reduces the service efficiency of address list, reduces the communication efficiency of user.
Below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that described herein
Specific embodiment only in order to explain the present invention, is not intended to limit the present invention.It addition, embodiment provided below be for
Implement the section Example of the present invention, rather than the whole embodiments implementing the present invention are provided, do not pay those skilled in the art
On the premise of creative work, the technical scheme of following example is carried out the embodiment of restructuring gained and based on to invention
Other embodiments implemented belong to protection scope of the present invention.
It should be noted that in embodiments of the present invention, term " includes ", " comprising " or its any other variant are intended to
Contain comprising of nonexcludability, so that include that the method for a series of key element or device not only include that be expressly recited wants
Element, but also include other key elements being not expressly set out, or also include want intrinsic for implementation or device
Element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including this key element
Method or device in there is also other relevant factor (step in such as method or the unit in device).Such as,
Contact person's processing method that the embodiment of the present invention provides contains a series of step, but the contact that the embodiment of the present invention provides
People's processing method is not limited to described step, and similarly, contact person's processing server that the embodiment of the present invention provides includes
A series of modules, but contact person's processing server that the embodiment of the present invention provides is not limited to include module be expressly recited, also
Module/the unit of required setting when can be included as obtaining relevant information or processing based on information.
It should be noted that term " first "/" second "/" the 3rd " etc. involved by the embodiment of the present invention is only district
Not Lei Si object, do not represent the particular sorted for object, it is possible to understand that ground, " first "/" second "/" the 3rd " allow
In the case of can exchange specific order or precedence.Should be appreciated that the object that " first "/" second "/" the 3rd " distinguishes is being fitted
Can exchange in the case of when so that embodiments of the invention described herein can with except here illustrate or describe those
Order in addition is implemented.
It is pointed out that in the embodiment of the present invention, terminal can be smart mobile phone, panel computer, desktop computer, notes
This computer, Wearable (such as intelligent watch) etc. can be supported wired or wireless communication or support the various application for communication
Or the equipment of social activity software.
The technical scheme that the embodiment of the present invention is recorded may be used for identifying corresponding multiple of same contact person in address list
Inefficacy number in number;The optional framework seeing contact person's processing method in the embodiment of the present invention shown in Fig. 1 shows
Meaning, the framework shown in Fig. 1 includes: support the terminal 11 of address list, contact person's processing server 12 and network 13, terminal 11 with
Contact person's processing server 12 carries out data interaction by network 13, and terminal 11 can be multiple;As user contact person to be given
Lee * * makes a phone call or during messaging, when user inquires about the address list of terminal 11, finds to store in address list have corresponding to Lee * *
Three telephone numbers, respectively telephone number 1, telephone number 2 and telephone number 3, but, these 3 numbers may be lost
Effect number (as shut down or changing hands), but, during in prior art, user is not aware that these 3 numbers, which is significant number, uses
Family can only attempt dialing or contacting one by one, and during this, dialing repeatedly attempts the time and efforts too much by expending user, fall
The service efficiency of low address list, reduces the communication efficiency of user.
It should be noted that the application scenarios shown in Fig. 1 is only of the technical scheme that the embodiment of the present invention is recorded
Possible example architecture, other application scenarios can include terminal that Fig. 1 is not directed to or be installed in terminal for communication
Application or social software etc..The technical scheme that the embodiment of the present invention is recorded can apply in above-mentioned scene, to help to overcome now
With the presence of the time and efforts expending user of technology, reduce the service efficiency of address list, lacking of the communication efficiency of reduction user
Fall into.
Application scenarios based on above-mentioned record, proposes following specific embodiment.
Embodiment one
The present embodiment provides a kind of contact person's processing method, may be used for identifying the inefficacy number of contact person in address list
Code, overcomes the time and efforts expending user that prior art exists, reduces the service efficiency of address list, reduce the communication of user
The defect of efficiency.
Seeing Fig. 2, contact person's processing method that the present embodiment is recorded can be processed server implementation, method bag by contact person
Include following steps:
Step 101, the address list of acquisition terminal use, address list includes the contact method of the contact person of terminal use.
Here, contact person's processing server obtains the address list of multiple terminal uses from multiple terminals, such as, opens/makes
Network side can be stored in, such as cloud server, contact person with the address list of the terminal use of address list synchronization function
Reason server, after the mandate obtaining each terminal use, can obtain the address list of these terminal uses from network side;Optional
, the implementation of the mandate of terminal use can be: terminal use arranges whether allow contact in address list synchronization function
People's processing server obtains the address list of terminal use, if then instruction contact person's processing server obtains awarding of terminal use
Power;Otherwise it is unauthorized;It should be noted that contact person's processing server can be same equipment with network side, it is also possible to for
Different equipment;Here, the address list of a terminal use can include the title of contact person and the correspondent party of this terminal use
Formula;Wherein, the contact method of contact person includes but not limited to: telephone number, E-mail address, mailing address or user use terminal
The user identity voucher of application (such as mobile phone assistant, wechat, QQ).
Step 102, the address list of lookup any two terminal use obtain the terminal use of directly contact person each other, based on
Directly the terminal use of contact person builds at least one relation chain each other.
Here, the address list of the direct both sides of contact person each other includes the contact method of the other side respectively;Contact person processes
The address list of whois lookup any two terminal use obtains a kind of feasible reality of the directly terminal use of contact person each other
Existing mode includes:
Contact person's processing server obtains contact method and the correspondent party of the second terminal use of first terminal user respectively
Formula;Here, first terminal user is the terminal use that any two in multiple terminal use is different from the second terminal use;?
The address list of first terminal user is searched the contact method of the second terminal use, and, at the address list of the second terminal use
The contact method of middle lookup first terminal user;I.e. by searching the address list of first terminal user to judge first terminal user
Address list whether include the contact method of the second terminal use, and by searching the address list of the second terminal use to judge
Whether the address list of two terminal uses includes the contact method of first terminal user, however, it is determined that when all finding, and i.e. determines first
The address list of terminal use includes that the contact method of the second terminal use and the address list of the second terminal use include first terminal
During the contact method of user, it is determined that first terminal user and the second terminal use direct contact person each other.
Terminal use based on direct contact person each other builds a kind of feasible implementation bag of at least one relation chain
Include: contact person's processing server is with any terminal user in the terminal use of direct contact person each other as node, with arbitrary
Other terminal use of terminal use direct contact person each other is tandem node, and node based on cascade builds relation chain;Assume
First terminal user and the second terminal use are judged as direct contact person, then contact person's processing server is with first terminal user
For node, with the second terminal use as tandem node, node based on cascade builds relation chain.
It should be noted that contact person's processing server needs traversal to search in above-mentioned multiple terminal uses in step 102
Any two terminal use, it is assumed that contact person's processing server obtains 3 different terminal uses altogether, such as user A, use
Family B and the address list of user C, then contact person's processing server needs below execution to operate: 1) search user A, the communication of user B
Record, it is determined that user A and user B the most direct contact person;2) user A, the address list of user C are searched, it is determined that user A and use
Family C the most direct contact person;3) user B, the address list of user C are searched, it is determined that user B and user C is the most direct
Contact person;4) based on above-mentioned steps 1) to 3) determined by each other directly the terminal use of contact person build at least one relation
Chain.
Step 103, address list based on terminal use each in relation chain determine same correspondents, the connection to same correspondents
It is that mode is compared the contact method obtaining conforming to a predetermined condition.
A kind of feasible implementation of above-mentioned steps 103 includes: contact person processes each end in whois lookup relation chain
The title of each contact person in the address list of end subscriber and contact method, in search relationship chain in the address list of each terminal use
Existence has the contact person of same names, if it is not, then flow process terminates;Each terminal use in the most then comparison relation chain
Contact person's each self-corresponding contact method in address list with same names is the most identical, if it is different, then determine have identical
The each self-corresponding contact method of contact person of title is the contact method conformed to a predetermined condition.
The implementation that the another kind of above-mentioned steps 103 is feasible includes: contact person processes in whois lookup relation chain each
The title of each contact person in the address list of terminal use and contact method, the address list of each terminal use in search relationship chain
In whether there is the contact person with identical contact method, if it is not, then flow process terminates;Each terminal in the most then comparison relation chain
Contact person's each self-corresponding title in the address list of user with identical contact method is the most identical, if it is different, then determine phase
It it is the contact method conformed to a predetermined condition with contact method.
Step 104, use data based on the contact method conformed to a predetermined condition, analyze the connection respectively conformed to a predetermined condition
Being the feature of mode, the contact method filtering out the default feature of coupling is inefficacy contact method.
Here, be equivalent to add new attribute for each contact method: inefficacy contact method or effective connection mode (as
The most screened (identification) is the contact method of inefficacy contact method), judge whether to use, revise or delete connection in this, as user
Be mode according to one of.
Optionally, the inefficacy contact method filtered out is stored by contact person's processing server, such as, will filter out
Inefficacy contact method write user lost efficacy contact method log or data base.
Here, use data based on the contact method conformed to a predetermined condition, analyze the contact respectively conformed to a predetermined condition
The feature of mode, the implementation that contact method is inefficacy contact method filtering out the default feature of coupling can include following
Meaning is a kind of or combines:
Implementation 1:
Contact person's processing server resolves the use data of contact method respectively conformed to a predetermined condition, determine respectively meet predetermined
The contact method of condition is used for the use time of Information Authentication mode, it is determined that whether the time difference of use time and current time
More than very first time threshold value, the most then judge that corresponding contact method is as inefficacy contact method;Otherwise, it is determined that contact accordingly
Mode is effective connection mode.Optionally, Information Authentication mode such as includes applying registration etc. based on checking note login, user
Mode;Here, very first time threshold value can be carried out based on historical data, actual demand etc. by user/contact person's processing server
Set.
On the basis of implementation 1, for same contact method corresponding at least two contact person, such as, same electricity
Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to
Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service
Device resolves the use data of corresponding first contact person of the first contact method, obtains the first contact method by the first contact person for believing
The use time of breath verification mode;Here, the first contact method is arbitrary contact method conformed to a predetermined condition, the first contact person
Address list for terminal use each in relation chain has arbitrary contact person of the first contact method;Contact person's processing server is sentenced
Surely use the time difference of time and current time whether more than very first time threshold value, the most then judge that the first contact method is as the
The inefficacy contact method of one contact person;Otherwise, it is determined that the effective connection mode that the first contact method is the first contact person.Need
Bright, contact person's processing server need to resolve respectively relation chain has in the address list of each terminal use arbitrary meet pre-
Arbitrary contact person of the contact method of fixed condition.
Implementation 2:
Contact person's processing server resolves the associated application data of the contact method respectively conformed to a predetermined condition, it is determined that respectively meet
Whether the contact method of predetermined condition is used as the association contact method of application, if it is not, then judge that corresponding contact method is as losing efficacy
Contact method;The most then judge that corresponding contact method is as effective connection mode.Here, associated application data can include connection
It is that mode is bound with application;The association contact method of application, for example, contact method are bound for checking number, with contact
Mode carries out application registration, by the account binding etc. of contact method Yu application.
On the basis of implementation 2, for same contact method corresponding at least two contact person, such as, same electricity
Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to
Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service
Device resolves the associated application data of corresponding second contact person of the second contact method, it is judged that whether the second contact method is used as second
The association contact method of the used application of contact person, if it is not, then judge that the second contact method contacts as the inefficacy of the second contact person
Mode;The most then judge second contact method effective connection mode as the second contact person;Here, the second contact method is for appointing
One contact method conformed to a predetermined condition, has the second contact in the address list of each terminal use in the second artificial relation chain of contact
Arbitrary contact person of mode.It should be noted that contact person's processing server needs to resolve respectively each terminal use in relation chain
Address list in there is arbitrary contact person of arbitrary contact method conformed to a predetermined condition.
Implementation 3:
Contact person's processing server resolves the communication log data of the contact method respectively conformed to a predetermined condition, and determines and respectively meets
The call duration time of the contact method of predetermined condition, it is determined that whether call duration time is more than the second time threshold with the time difference of current time
Value, the most then judge that corresponding contact method is as inefficacy contact method;Otherwise, it is determined that corresponding contact method is effective connection
Mode.Optionally, call duration time can be such as the last communication occasions (as the last time transmitting-receiving note, make a phone call or
The moment of mail) etc.;Here, the second time threshold can be needed based on historical data, reality by user/contact person's processing server
Ask etc. and to be set.
On the basis of implementation 3, for same contact method corresponding at least two contact person, such as, same electricity
Words number is reclaimed, by operator, the scene that changes hands, and contact person's processing server is not only it needs to be determined that inefficacy contact method, in addition it is also necessary to
Determine this inefficacy contact method corresponding at least two contact person which or all;Specifically, contact person processes service
Device resolves the communication log data of corresponding 3rd contact person of the 3rd contact method, obtains the call duration time of the 3rd contact method;This
In, the 3rd contact method is arbitrary contact method conformed to a predetermined condition, and the 3rd contacts each terminal use in artificial relation chain
Address list has arbitrary contact person of the 3rd contact method;When contact person's processing server judges the communication of the 3rd contact method
Between with the time difference of current time whether more than the second time threshold, the most then judge that the 3rd contact method is as the 3rd contact person
Inefficacy contact method;Otherwise, it is determined that the effective connection mode that the 3rd contact method is the 3rd contact person.It should be noted that
Contact person's processing server needs to resolve respectively and has arbitrary conforming to a predetermined condition in relation chain in the address list of each terminal use
Arbitrary contact person of contact method.
Optionally, contact person's processing server, when satisfied inefficacy contact method issues condition, determines that terminal use's is logical
Inefficacy contact method in news record, and send the inefficacy contact method in the address list of terminal use to terminal, for terminal at end
Indicating failure contact method in the address list of end subscriber.Here, clockwork spring under contact person's processing server meets inefficacy contact method
The implementation of part can include following any one or combination:
1) terminal receive that user triggers for the inefficacy number cleaning operation of address list time, process service to contact person
Device sends the request of the address list for management of end-user;Contact person's processing server manages in response to being used for of sending of terminal
The request of the address list of terminal use, is sent to terminal by the inefficacy contact method in the address list of terminal use.
2) terminal receive user trigger in address list designated contact inefficacy Number Reorganization operation time, Xiang Lian
It is people's processing server transmission request for the contact person in address list of management of end-user, this request is carried appointment contact
The title of people or contact method to be identified;The leading to for management of end-user that contact person's processing server sends in response to terminal
The request of news record, is sent to terminal by the inefficacy contact method of the designated contact in the address list of terminal use.
3) periodically issue.
4) active that event triggers issues, such as the mistake during contact person's processing server detects the address list of terminal use
Absolute quantity or the relative populations of effect contact method exceed default quantity thresholding.
Contact person's processing server determines a kind of feasible realization of the inefficacy contact method in the address list of terminal use
Mode includes: contact person's processing server is by the contact method of each contact person in the address list of terminal use, respectively with above-mentioned
The inefficacy contact method filtered out mates, and obtains the inefficacy contact method in the address list of terminal use;Optionally, contact
Inefficacy contact method in the address list of the terminal use determined is preserved by people's processing server.
Inefficacy contact method in the address list of the terminal use that terminal sends according to contact person's processing server, in terminal
Indicating failure contact method in the address list of user;For terminal use for the inefficacy connection of mark in the address list of terminal use
Being that mode operates, such as, the inefficacy contact method identified in address list is completely or partially deleted by terminal use, or,
The mark being designated the part or all of contact method of inefficacy contact method in address list is cancelled by terminal use, such as, and user
Know that the one or more contact methods being identified as inefficacy contact method are effective contact method in fact.
After terminal use is in the address list of terminal use, the inefficacy contact method of mark has carried out operation, contact person
Processing server for the operation of the inefficacy contact method of mark in the address list of terminal use, updates net in response to terminal use
Inefficacy contact method in the address list of the terminal use synchronizing storage in network side;Optionally, terminal use by terminal use's
When the mark of the contact method being designated inefficacy contact method in address list is cancelled, contact person's processing server will be from above-mentioned screening
The inefficacy contact method gone out is deleted the contact method being cancelled mark.
Below in conjunction with the application scenarios shown in Fig. 1, the contact person's processing method recording the present embodiment illustrates:
See in the embodiment of the present invention shown in Fig. 3 and implement, based on the framework shown in Fig. 1, the optional schematic diagram that contact person processes,
Contact person's processing method shown in Fig. 3 includes:
Step 201, want to make a phone call to Lee * * or during messaging as the terminal use of terminal 11, end user query terminal 11
Address list, find stored 3 telephone numbers, respectively telephone number 1, telephone number 2 and electricity under one's name at address list Lee * *
Words number 3, now, terminal use is in the face of multiple telephone numbers corresponding for Lee contact person * *, it is not known that should use which phone
Number.
Step 202, terminal 11 detect that terminal use is inquiring about address list and resting on letter corresponding to Lee contact person * *
Cease the page, and terminal 11 finds that Lee contact person * * to when should have multiple telephone number, then sends to contact person's processing server 12
For managing the request of the address list of the terminal use of terminal 11, this request is carried the title of Lee contact person * *, or carries
Multiple telephone numbers that Lee contact person * * is corresponding.
Step 203, contact person's processing server 12 are according to the title of Lee contact person * *, from the end of predetermined terminal 11
The inefficacy contact method of the address list of end subscriber finds the inefficacy telephone number of Lee contact person * *;Or, contact person processes
Server 12, by multiple telephone numbers corresponding for Lee * * in the address list of terminal use, is carried out with the inefficacy contact method filtered out
Coupling, determines the inefficacy telephone number of Lee * *.Here, suppose that the inefficacy telephone number of Lee * * is telephone number 1 and telephone number
3。
Step 204, contact person's processing server 12 are by the inefficacy telephone number (telephone number 1 and telephone number 3) of Lee * *
Send to terminal 11.
Inefficacy telephone number (the telephone number of Lee * * that step 205, terminal 11 send according to contact person's processing server 12
1 and telephone number 3), by telephone number 1 corresponding for Lee * * and telephone number 3 points in the address list of the terminal use of terminal 11
It is not designated " inefficacy ", thus identifies the inefficacy telephone number (telephone number 1 and telephone number 3) of Lee * *.
So, terminal use can directly select the telephone number 2 not being identified as to lose efficacy and makes a phone call to Lee * *
Or messaging, thus avoiding user that the multiple numbers including inefficacy telephone number are attempted feelings one by one that dial or contact
Under condition, automatically identify the inefficacy number in address list, overcome consuming user time and energy that prior art exists, reduce logical
The service efficiency of news record, reduces the defect of the communication efficiency of user.
In the present embodiment, by based on each terminal use in the relation chain that directly terminal use of contact person builds each other
Address list in the contact method of same correspondents compare, filter out the contact method conformed to a predetermined condition, and according to
The Feature Selection of the contact method conformed to a predetermined condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple terminals
The contact method of the contact person of the address list of user is analyzed, and identifies inefficacy contact method from all contact methods, eventually
End subscriber directly uses other contact methods (i.e. effective connection mode) in addition to inefficacy contact method to communicate, it is to avoid
In prior art, terminal use needs to attempt one by one communicating to the multiple contact methods including inefficacy contact method,
Thus save the time and efforts of user, so, the present embodiment can automatically identify the inefficacy number in address list, improves
The service efficiency of address list, improves the communication efficiency of user.
Embodiment two
Based on above-described embodiment, the present embodiment receives, for terminal, the connection that lost efficacy in the cleaning address list that terminal use triggers
It is that the processing scheme during operation instruction of mode illustrates.
Seeing Fig. 4, contact person's processing method that the present embodiment is recorded can be coordinated with contact person's processing server from terminal
Implementing, method comprises the following steps:
Step 301, terminal detection terminal use is for the operation of address list.
What step 302, terminal detected that terminal use triggers carries out, for inefficacy contact method in address list, the behaviour that clears up
When indicating, send the message being used for obtaining the inefficacy contact method of each contact person in address list to contact person's processing server;
This message includes the contact method of all of contact person in the mark of terminal use, contact method or address list.
Step 303, contact person's processing server are used for obtaining each contact person in address list in response to what terminal use sent
The message of inefficacy contact method, the data base previously generated by inquiry is screened multiple terminal uses' of determining in advance
Inefficacy contact method, and the contact method of contact person each in the address list of this terminal use is determined many with screening in advance respectively
The inefficacy contact method of individual terminal use mates, and obtains the inefficacy correspondent party of each contact person in the address list of this terminal use
Formula, or the data base previously generated by inquiry obtains the mistake of each contact person in the address list of this terminal use predetermined
Effect contact method.
The inefficacy of contact person each in the address list of this terminal use obtained is joined by step 304, contact person's processing server
It is that mode is sent to this terminal.
Step 305, terminal process the inefficacy contact method of each contact person in the address list of server feedback according to contact person,
Contact method corresponding in address list is designated inefficacy contact method, sees the mistake of each contact person in the address list shown in Fig. 5
Comparison schematic diagram before and after effect contact method (illustrating with telephone number in Fig. 5) is identified, for terminal use for address list
In be identified as inefficacy contact method contact method operation, such as, the inefficacy correspondent party that terminal use will identify in address list
Formula is completely or partially deleted, or, terminal use will be designated the part or all of correspondent party of inefficacy contact method in address list
The mark of formula is cancelled, and such as, user knows that the one or more contact methods being identified as inefficacy contact method are effective in fact
Contact method.
In the present embodiment, when terminal use needs to clear up the inefficacy contact method of address list, terminal takes from terminal
Business device request obtains the inefficacy contact method of each contact person in address list and is identified in address list, is equivalent to as each
It is that mode adds new attribute: inefficacy contact method or effective connection mode be not (as being designated inefficacy contact method in address list
Contact method), judge whether to use in this, as user, revise or delete contact method according to one of, save user
Time and efforts, improves terminal use and arranges the accuracy and efficiency of address list.
Embodiment three
Based on above-described embodiment, the present embodiment wishes to identify in address list the difference of each contact person for terminal use
The demand using frequent degree information of contact method, proposes the technical scheme solved, specifically includes:
The different contact methods for asking each contact person that contact person's processing server actively or sends in response to terminal
Use frequent degree information message, in address list based on terminal use, the communication log data of each contact person, determine end
The frequent degree of use that in the address list of end subscriber, each contact person uses different contact methods to communicate;Here, frequency is used
Numerous degree can include information such as commonly using, be of little use;
Contact person's processing server sends the different contact methods of each contact person in the address list of terminal use to terminal
Use frequent degree information.
Terminal identifies the use frequent degree letter of the different contact methods of each contact person in the address list of terminal use
Breath;Here, be equivalent to add new attribute for each contact method: commonly use or be of little use, judging whether to make in this, as user
With, revise or delete contact method according to one of;It should be noted that the present embodiment is based on above-described embodiment, the present embodiment
In the frequent degree information of use (commonly use, be of little use) of contact method, refer to that contact person uses contact method to communicate (electricity
Words, note, associated application) the frequent degree of use;The contact method being not labeled as inefficacy (or being noted as effectively) may
It is identified as commonly using, it is also possible to be identified as being of little use;See each contact person in the address list shown in Fig. 6 contact method (with
Telephone number is illustrated) it is marked the comparison schematic diagram used before and after frequent degree information, check that Fig. 5 with Fig. 6 just can send out simultaneously
Existing:
1) telephone number 2 of Lee * *, the telephone number 7 of money * * are all not labeled as losing efficacy in Figure 5, and, in figure 6
The telephone number 2 of Lee * *, the telephone number 7 of money * * are all noted as commonly using;It is to say, the telephone number 2 of Lee * *, money * *
Telephone number 7 is effective and commonly used telephone number;
2) open the telephone number 4 of * *, telephone number 5 in Figure 5 to be all not labeled as losing efficacy, and, open * *'s in figure 6
Telephone number 4 is noted as commonly using, but, the telephone number 5 of a * * is noted as being of little use;It is to say, the phone of a * *
Number 4 is effective and commonly used telephone number, and the telephone number 5 of a * * is effectively but the telephone number being of little use.
Terminal use is frequent for the use of the different contact methods of each contact person of mark in the address list of terminal use
The operation of degree information, such as, deletes being designated the contact method being of little use in address list, or, will address list identify
" being of little use " mark of one or more contact methods for being of little use is cancelled, and such as, user knows and is identified as " being of little use "
One or more contact methods be authentic and valid and conventional contact method in fact;Here, terminal use can also will be marked
Note is purged as inefficacy contact method for the contact method of " being of little use ", and such as, terminal use can be based in address list
The frequent degree information of use of the different contact methods of each contact person of mark, the inefficacy contact method in cleaning address list.
Contact person's processing server in response to terminal use for each contact person of mark in the address list of terminal use
The operation using frequent degree information of different contact methods, updates in the address list of the terminal use synchronizing storage in network side
The different contact methods of each contact person;Such as, update the mark of corresponding contact method, or corresponding contact method is deleted.
Embodiment four
The present embodiment is based on above-mentioned any embodiment, respectively from product side and technology side to aforesaid contact person's processing method
The process that realizes illustrate.
1, product side:
A) operation interface
Seeing Fig. 7 a, user can detect whether the machine has inefficacy number in address list doctor's health check-up, and points out user
Arrange;Or,
Seeing Fig. 7 b, user also can enter from address list sorting module voluntarily, arranges inefficacy number;Or,
See Fig. 7 c, when user searches the telephone number of contact person from address list, in the face of multiple electricity that contact person is corresponding
Words number, it is not known which should use?Terminal is (right to the contact person that should have multiple telephone number in showing address list
Should be multiple) the page, increase the button of sign inefficacy number or operation entry and select for user, see Fig. 7 d, or, eventually
End, when detecting that user searches the information to the contact person that should have multiple telephone number from address list, actively points out user eventually
Rectify the inefficacy number in identifying multiple telephone numbers that contact person is corresponding, and recognition result is presented to user.
B) function
According to cloud server (contact person's processing server described above) analyze after, will determine that label (recognition result) in
Now seeing Fig. 7 e to user, user can independently choose whether to process these numbers.
2, technology side:
The calculating of inefficacy telephone number is divided into calculated off line part and online service part, due to process data volume very
Greatly, therefore can carry out calculated off line in Hadoop platform, then the result of calculated off line be imported in storage, online service
Process inquiry storage when that user asking, have the part of result of calculation to return to user;See the inefficacy phone shown in Fig. 8 a
Number calculation process.
Firstly the need of importing to the data of any active ues calculate in the middle of platform, calculating platform used herein is Hadoop
Platform.When user uses address list synchronization function, the contact data of this user can be imported by system background with the form of daily record
To calculating platform (relating to privacy owing to synchronizing the data of assistant, data are calculating all storing in the way of encryption on platform).
1) customer relationship circle is set up:
Centered by active user, by the contact person in his address list, if the contact person of he and address list all with
Step assistant deposits the number of both sides, then they can set up 1 degree of contact person.For all 1 degree of contact persons, take out them successively
Contact person in the middle of address list, resettles 1 degree of contact person, and now, central user just has the human connection circle of 2 degree, these Information Numbers
The form of user-> telephone number imports to calculate platform according to this.Here, if the number of degrees of contact person are particularly as follows: two users are mutual
Deposit phone number, then claim the two user 1 degree of contact person each other, if all there is common 1 degree connection between two users
It is people, then claim the two user 2 degree of contact persons each other, by that analogy.See Fig. 8 b, user A with B and C to be 1 degree respectively and contact
People, user A Yu D is 2 degree of contact persons, and user A Yu E is 3 degree of contact persons.
Off-line part sets up the calculating of human connection circle, and off-line part uses Hadoop system, sets up contact human connection in systems
Table, utilizes the computing capability of Hadoop, can set up human connection circle in global data, sets up condition and the previous step phase of human connection circle
Seemingly: mutually deposit number people and can set up human connection table in this approach standby with opening relationships.
2) suspicion number is filtered out:
Think that the number of user is probably the two kinds of situations that have of inefficacy: a kind of situation be this user in circle of friends, he
Name deposited number by multiple friends, and the number deposited is different;Another kind of situation is same number, is deposited not
Same name, and under this different name, include again multiple number.Both of these case, will be considered suspicion number.Certainly
This situation is to there is certain error rate, but prevents user's mistake from having deleted number some Restoration Mechanism of use, but can look for
Return.
The qualification of suspicion number: use various ways to identify whether a number is used recently: such as, combine hands
The flow short-message verification of machine house keeper, has the explanation using flux modification to be currently in use recently;Or, whether phone number has binding
Synchronize assistant, have the number of binding to be largely currently in use;Or, this number has the record of call the most recently, has logical
Being currently in use of words record.Frequent above-mentioned several investigation steps, whether the number that can find corresponding is most recently used, if very
Do not use for a long time, be then considered as inefficacy number.
3) the definition for the period of inefficacy number: such as, is considered as inefficacy number by original number in continuous 3 months, beats
The label of upper inefficacy, for reference.Demonstrate user's untapped time after the last time uses simultaneously.If because judging bar
Part is not enough, data deficiency, it is impossible to judgement do not show inefficacy label.
After offline platform is calculated, will import at line platform, online service can with quick search and return to use
Family;The data flow of whole flow process is as shown in Figure 8 c.
The present embodiment is by big data background analysis, and solving a contact person in identification cell phone address book for user has many
Individual number comprises the pain spot of the number that lost efficacy, and improves user and finds number call or the information of transmission of needs in address list
Operating efficiency, the waste repeatedly attempting causing time and efforts dialled during having evaded this;Based on the present embodiment, can realize
Automatically identify telephone number authentic and valid and conventional in the multiple number of contact person for user, promote the use of user further
Experience.
The present embodiment proposes the inefficacy telephone number people using contact person's circle to find user, from contact person's circle,
Find out the stored multiple cell-phone numbers of contact person, from these numbers, identify inefficacy number.The use data of synthetic user, can
With from the contact relationship data of user, form contact person's circle, and for the user in contact person's circle, calculate contact person's phase
Close the time that data are synchronized to use, judge whether number is used in the recent period, or untapped duration, from the most not
Synchronize the contact person used searches out the number lost efficacy, show user, whether delete inefficacy with for reference
Contact number.
Embodiment five
Record with previous embodiment one is corresponding, and the present embodiment records a kind of contact person's processing server, sees Fig. 9,
Contact person's processing server 41 shown in Fig. 9 includes:
Acquisition module 401, for obtaining the address list of terminal use, address list includes the contact of the contact person of terminal use
Mode;
Search module 402, obtain the terminal of directly contact person each other for searching the address list of any two terminal use
User, terminal use based on direct contact person each other builds at least one relation chain;
First determines module 403, for true based on searching the address list of each terminal use in the relation chain that module 402 builds
Determine same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of same correspondents is compared;
Screening module 404, for determining the use of the contact method conformed to a predetermined condition that module 403 determines based on first
Data, analyze the feature of the contact method respectively conformed to a predetermined condition, and filter out coupling and preset the contact method of feature for losing efficacy
Contact method.
The present embodiment is by being analyzed the contact method of the contact person of the address list of multiple terminal uses, from all
Being to identify inefficacy contact method in mode, terminal use can directly use other contacts in addition to inefficacy contact method
Mode communicates, it is to avoid in prior art, terminal use needs the multiple contact methods including inefficacy contact method
Attempt one by one communicating, thus save the time and efforts of user, improve the communication efficiency of user.
On the basis of above-described embodiment, search module 402, specifically for: obtain the contact method of first terminal user
And second contact method of terminal use;The contact method of the second terminal use is searched in the address list of first terminal user,
And, the address list of the second terminal use is searched the contact method of first terminal user;Determine when all finding, it is determined that
One terminal use and the second terminal use direct contact person each other.
On the basis of above-described embodiment, search module 402, specifically for: with the terminal use of direct contact person each other
In any terminal user be node, with any terminal user each other directly other terminal use of contact person for level interlink
Point, node based on cascade builds relation chain.
On the basis of above-described embodiment, first determines module 403, specifically for: each terminal use in search relationship chain
Address list in there is the contact person of same names, comparison has the contact method of the contact person of same names, if it is different, the most true
The contact method of the contact person surely with same names is the contact method conformed to a predetermined condition.
On the basis of above-described embodiment, first determines module 403, specifically for: each terminal use in search relationship chain
Address list in there is the contact person of identical contact method, comparison has the title of the contact person of identical contact method, if it is different,
Then determine that identical contact method is the contact method conformed to a predetermined condition.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the first contact method corresponding first
It is the use data of people, obtains the first contact method by the first contact person for use time of Information Authentication mode;Determining
When the time difference of use time and current time is more than very first time threshold value, it is determined that the first contact method is the mistake of the first contact person
Effect contact method;Wherein, the first contact method is arbitrary contact method conformed to a predetermined condition, and first contacts in artificial relation chain
The address list of each terminal use has arbitrary contact person of the first contact method.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the second contact method corresponding second
It is the associated application data of people, determines that the second contact method is not used as the association contact method of the second used application of contact person
Time, it is determined that the second contact method is the inefficacy contact method of the second contact person;Wherein, the second contact method be arbitrary meet predetermined
The contact method of condition, has the arbitrary of the second contact method in the address list of each terminal use in the second artificial relation chain of contact
Contact person.
On the basis of above-described embodiment, screen module 404, specifically for: resolve the 3rd contact method the corresponding 3rd
It is the communication log data of people, obtains the call duration time of the 3rd contact method;Determine the call duration time of the 3rd contact method with
When the time difference of current time is more than the second time threshold, it is determined that the 3rd contact method is the inefficacy correspondent party of the 3rd contact person
Formula;Wherein, the 3rd contact method is arbitrary contact method conformed to a predetermined condition, and the 3rd contacts each terminal in artificial relation chain uses
The address list at family has arbitrary contact person of the 3rd contact method.
On the basis of Fig. 9 illustrates structure, the present embodiment also states that another kind of contact person's processing server, sees Figure 10,
Contact person's processing server 42 shown in Figure 10 also includes: acquisition module 401, search module 402, first determine module 403, sieve
Modeling block 404, and each module also has the function shown in Fig. 9 and annexation;Meanwhile, contact person's processing server 42 is also
Including:
Second determines module 501, the communication log data of each contact person in address list based on third terminal user,
Determine the frequent degree of use that in the address list of third terminal user, each contact person uses different contact methods to communicate;
First transceiver module 502, in the address list sending third terminal user to third terminal, each contact person is not
With the frequent degree information of the use of contact method, in the address list of third terminal user, identify each contact person's for third terminal
The frequent degree information of use of different contact methods;
First more new module 503, for identifying in the address list of third terminal user in response to third terminal user
The operation using frequent degree information of different contact methods of each contact person, update in network side and synchronize the 3rd of storage eventually
The different contact methods of each contact person in the address list of end subscriber.
Optionally, contact person's processing server 42 also includes:
Second transceiver module 504, the inefficacy correspondent party in the address list sending the 4th terminal use to the 4th terminal
Formula, for the 4th terminal indicating failure contact method in the address list of the 4th terminal use;
Second more new module 505, for identifying in the address list of the 4th terminal use in response to the 4th terminal use
The operation of inefficacy contact method, update inefficacy correspondent party in the address list of the 4th terminal use synchronizing storage in network side
Formula.
In actual application, acquisition module 401, search module 402, first determine that module 403, screening module 404, second are true
Cover half block the 501, first transceiver module 502, first more new module the 503, second transceiver module the 504, second more new module 505
Can by the central processing unit (CPU) of contact person's processing server, microprocessor (MPU), special IC (ASIC) or scene
Programmings gate array (FPGA) etc. realize.
Embodiment six
The present embodiment records a kind of computer-readable medium, can be ROM (such as, read only memory, FLASH memory,
Transfer device etc.), magnetic storage medium (such as, tape, disc driver etc.), optical storage medium (such as, CD-ROM, DVD-
ROM, paper card, paper tape etc.) and the program storage of other well-known types;In computer-readable medium, storage has computer to hold
Row instruction, when executing an instruction, causes at least one processor to perform to include following operation:
Obtaining the address list of terminal use, address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most direct
The terminal use of contact person builds at least one relation chain;
Address list based on terminal use each in relation chain determines same correspondents, enters the contact method of same correspondents
Row comparison obtains the contact method conformed to a predetermined condition;
Use data based on the contact method conformed to a predetermined condition, analyze the contact method that respectively conforms to a predetermined condition
Feature, the contact method filtering out the default feature of coupling is inefficacy contact method.
To sum up, by based on the communication of each terminal use in the relation chain that directly terminal use of contact person builds each other
The contact method of the same correspondents in record is compared, and filters out the contact method conformed to a predetermined condition, and pre-according to meeting
The Feature Selection of the contact method of fixed condition goes out coupling and presets the inefficacy contact method of feature, i.e. by multiple terminal uses'
The contact method of the contact person of address list is analyzed, and identifies inefficacy contact method, terminal use from all contact methods
Other contact methods in addition to inefficacy contact method are directly used to communicate, it is to avoid in prior art, terminal use needs
To attempt one by one communicating to the multiple contact methods including inefficacy contact method, thus save user time and
Energy, so, embodiments of the invention can automatically identify the inefficacy number in address list, improves the use effect of address list
Rate, improves the communication efficiency of user.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combine software and hardware
Formula.And, the present invention can use can be with storage at one or more computers wherein including computer usable program code
The form of the upper computer program implemented of medium (including but not limited to disk memory and optical memory etc.).
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention
Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram
Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce
A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real
The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to
Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or
The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter
Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or
The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one
The step of the function specified in individual square frame or multiple square frame.
The above, only presently preferred embodiments of the present invention, it is not intended to limit protection scope of the present invention.
Claims (20)
1. contact person's processing method, it is characterised in that described method includes:
Obtaining the address list of terminal use, described address list includes the contact method of the contact person of terminal use;
The address list searching any two terminal use obtains the terminal use of directly contact person each other, based on the most directly contacting
The terminal use of people builds at least one relation chain;
Address list based on terminal use each in described relation chain determines same correspondents, the correspondent party to described same correspondents
Formula is compared the contact method obtaining conforming to a predetermined condition;
Use data based on the described contact method conformed to a predetermined condition, analyze each described in the correspondent party that conforms to a predetermined condition
The feature of formula, the contact method filtering out the default feature of coupling is inefficacy contact method.
Method the most according to claim 1, it is characterised in that the address list of described lookup any two terminal use obtains
The terminal use of direct contact person each other, including:
Obtain contact method and the contact method of the second terminal use of first terminal user;
The contact method of described second terminal use is searched in the address list of described first terminal user, and, described
The address list of two terminal uses is searched the contact method of described first terminal user;
Determine when all finding, it is determined that described first terminal user and described second terminal use direct contact person each other.
Method the most according to claim 1, it is characterised in that described terminal use based on direct contact person each other builds
At least one relation chain, including:
With any terminal user in the terminal use of described direct contact person each other as node, with described any terminal user
Directly other terminal use of contact person is tandem node each other, and described node based on cascade builds described relation chain.
Method the most according to claim 1, it is characterised in that described communication based on terminal use each in described relation chain
Record determines same correspondents, the correspondent party obtaining conforming to a predetermined condition of comparing the contact method of described same correspondents
Formula, including:
Search the contact person in the address list of each terminal use in described relation chain with same names, have identical described in comparison
The contact method of the contact person of title, if it is different, the contact method described in then determining with the contact person of same names is described
The contact method conformed to a predetermined condition.
Method the most according to claim 1, it is characterised in that described communication based on terminal use each in described relation chain
Record determines same correspondents, the correspondent party obtaining conforming to a predetermined condition of comparing the contact method of described same correspondents
Formula, including:
Search the contact person in the address list of each terminal use in described relation chain with identical contact method, have described in comparison
The title of the contact person of identical contact method, if it is different, then determine that described identical contact method conforms to a predetermined condition described in being
Contact method.
Method the most according to claim 1, it is characterised in that described based on the described contact method conformed to a predetermined condition
Use data, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the correspondent party of feature
Formula is inefficacy contact method, including:
Resolve the use data of corresponding first contact person of the first contact method, obtain described first contact method by described first
It it is people's use time for Information Authentication mode;
When determining the time difference with current time of the described use time more than very first time threshold value, it is determined that described first correspondent party
Formula is the inefficacy contact method of described first contact person;
Wherein, described first contact method be arbitrary described in the contact method that conforms to a predetermined condition, described first contacts artificial institute
State arbitrary contact person in the address list of each terminal use in relation chain with described first contact method.
7. require the method described in 1 according to claim, it is characterised in that described based on the described correspondent party conformed to a predetermined condition
The use data of formula, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out feature and meet default feature
Contact method be inefficacy contact method, including:
Resolve the associated application data of corresponding second contact person of the second contact method, determine that described second contact method is not used as institute
When stating the association contact method of the second used application of contact person, it is determined that described second contact method is described second contact person
Inefficacy contact method;
Wherein, described second contact method be arbitrary described in the contact method that conforms to a predetermined condition, described second contacts artificial institute
State arbitrary contact person in the address list of each terminal use in relation chain with described second contact method.
8. require the method described in 1 according to claim, it is characterised in that described based on the described correspondent party conformed to a predetermined condition
The use data of formula, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out feature and meet default feature
Contact method be inefficacy contact method, including:
Resolve the communication log data of corresponding 3rd contact person of the 3rd contact method, when obtaining the communication of described 3rd contact method
Between;
When the time difference of the call duration time Yu current time determining described 3rd contact method is more than the second time threshold, it is determined that
Described 3rd contact method is the inefficacy contact method of described 3rd contact person;
Wherein, described 3rd contact method be arbitrary described in the contact method that conforms to a predetermined condition, the described 3rd contacts artificial institute
State arbitrary contact person in the address list of each terminal use in relation chain with described 3rd contact method.
9. require the method described in 1 according to claim, it is characterised in that described method also includes:
The communication log data of each contact person in address list based on third terminal user, determine that described third terminal user's is logical
The frequent degree of use that in news record, each contact person uses different contact methods to communicate;
The use of the different contact methods of each contact person in the address list of described third terminal user is sent frequent to third terminal
Degree information, identifies the different contact methods of each contact person in the address list of described third terminal user for described third terminal
The frequent degree information of use;
In response to described third terminal user for the difference of each contact person of mark in the address list of described third terminal user
The operation using frequent degree information of contact method, updates the communication of the described third terminal user synchronizing storage in network side
The different contact methods of each contact person in record.
10. require the method described in 1 according to claim, it is characterised in that described method also includes:
The inefficacy contact method in the address list of the 4th terminal use is sent, for described 4th terminal described the to the 4th terminal
The address list of four terminal uses identifies described inefficacy contact method;
In response to described 4th terminal use for the inefficacy contact method of mark in the address list of described 4th terminal use
Operation, updates inefficacy contact method described in the address list of described 4th terminal use synchronizing storage in network side.
11. 1 kinds of contact person's processing servers, it is characterised in that described server includes:
Acquisition module, for obtaining the address list of terminal use, described address list includes the correspondent party of the contact person of terminal use
Formula;
Search module, obtain the terminal use of directly contact person each other, base for searching the address list of any two terminal use
Terminal use in direct contact person each other builds at least one relation chain;
First determines module, and in described relation chain based on described lookup module construction, the address list of each terminal use determines
Same correspondents, the contact method obtaining conforming to a predetermined condition that the contact method of described same correspondents is compared;
Screening module, for based on described first determine module determine described in the use number of contact method that conforms to a predetermined condition
According to, analyze each described in the feature of contact method that conforms to a predetermined condition, filter out coupling and preset the contact method of feature for losing
Effect contact method.
12. servers according to claim 11, it is characterised in that described lookup module, specifically for: obtain first eventually
The contact method of end subscriber and the contact method of the second terminal use;The address list of described first terminal user is searched described
The contact method of the second terminal use, and, the address list of described second terminal use is searched described first terminal user
Contact method;Determine when all finding, it is determined that described first terminal user and described second terminal use the most directly contact
People.
13. servers according to claim 11, it is characterised in that described lookup module, specifically for: with described each other
Directly any terminal user in the terminal use of contact person be node, with described any terminal user direct contact person each other
Other terminal use be tandem node, based on cascade described node build described relation chain.
14. servers according to claim 11, it is characterised in that described first determines module, specifically for: search institute
State the contact person in the address list of each terminal use in relation chain with same names, there is described in comparison the contact of same names
The contact method of people, if it is different, the contact method described in then determining with the contact person of same names be described in meet predetermined bar
The contact method of part.
15. servers according to claim 11, it is characterised in that described first determines module, specifically for: search institute
State the contact person in the address list of each terminal use in relation chain with identical contact method, there is described in comparison identical correspondent party
The title of the contact person of formula, if it is different, then determine described identical contact method be described in the contact method that conforms to a predetermined condition.
16. servers according to claim 11, it is characterised in that described screening module, specifically for: resolve first
It is the use data of corresponding first contact person of mode, obtains described first contact method and tested for information by described first contact person
The use time of card mode;When determining the time difference with current time of the described use time more than very first time threshold value, it is determined that
Described first contact method is the inefficacy contact method of described first contact person;Wherein, described first contact method is arbitrary institute
State the contact method conformed to a predetermined condition, described first contact artificial described relation chain has in the address list of each terminal use
Arbitrary contact person of described first contact method.
17. require the server described in 11 according to claim, it is characterised in that described screening module, specifically for: resolve the
The associated application data of corresponding second contact person of two contact methods, determine that described second contact method is not used as described second contact
During the association contact method of the used application of people, it is determined that described second contact method is the inefficacy correspondent party of described second contact person
Formula;Wherein, described second contact method be arbitrary described in the contact method that conforms to a predetermined condition, described second contact is artificial described
Relation chain has in the address list of each terminal use arbitrary contact person of described second contact method.
18. require the server described in 11 according to claim, it is characterised in that described screening module, specifically for: resolve the
The communication log data of corresponding 3rd contact person of three contact methods, obtain the call duration time of described 3rd contact method;Determining
When the call duration time of described 3rd contact method is more than the second time threshold with the time difference of current time, it is determined that the described 3rd
Be mode be the inefficacy contact method of described 3rd contact person;Wherein, described 3rd contact method be arbitrary described in meet predetermined
The contact method of condition, has the described 3rd in the address list of each terminal use in the described 3rd artificial described relation chain of contact
It is arbitrary contact person of mode.
19. require the server described in 11 according to claim, it is characterised in that described server also includes:
Second determines module, and in address list based on third terminal user, the communication log data of each contact person, determine institute
State the frequent degree of use that in the address list of third terminal user, each contact person uses different contact methods to communicate;
First transceiver module, the different connection of each contact person in the address list sending described third terminal user to third terminal
It is the frequent degree information of use of mode, in the address list of described third terminal user, identifies each contact for described third terminal
The frequent degree information of use of the different contact methods of people;
First more new module, for identifying in the address list of described third terminal user in response to described third terminal user
The operation using frequent degree information of different contact methods of each contact person, update in network side and synchronize described the of storage
The different contact methods of each contact person in the address list of three terminal uses.
20. require the server described in 11 according to claim, it is characterised in that described server also includes:
Second transceiver module, the inefficacy contact method in the address list sending the 4th terminal use to the 4th terminal, for institute
State the 4th terminal and identify described inefficacy contact method in the address list of described 4th terminal use;
Second more new module, for identifying in the address list of described 4th terminal use in response to described 4th terminal use
The operation of inefficacy contact method, update and lost efficacy described in the address list of described 4th terminal use synchronizing storage in network side
Contact method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610377964.7A CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
PCT/CN2017/084032 WO2017206696A1 (en) | 2016-05-31 | 2017-05-11 | Contact information processing method and apparatus, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610377964.7A CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106095814A true CN106095814A (en) | 2016-11-09 |
CN106095814B CN106095814B (en) | 2019-09-20 |
Family
ID=57230603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610377964.7A Active CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106095814B (en) |
WO (1) | WO2017206696A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682223A (en) * | 2017-01-04 | 2017-05-17 | 上海智臻智能网络科技股份有限公司 | Method and device for detecting data validity and method and device for intelligent interaction |
CN106713676A (en) * | 2017-01-23 | 2017-05-24 | 北京奇虎科技有限公司 | Communication number identification control method and device, and communication terminal |
CN106850926A (en) * | 2017-02-21 | 2017-06-13 | 维沃移动通信有限公司 | One kind failure contact person processing method, server and mobile terminal |
CN107295118A (en) * | 2017-06-28 | 2017-10-24 | 西安万像电子科技有限公司 | Contact searching method and device |
WO2017206696A1 (en) * | 2016-05-31 | 2017-12-07 | 腾讯科技(深圳)有限公司 | Contact information processing method and apparatus, and storage medium |
CN110166637A (en) * | 2018-02-12 | 2019-08-23 | 深圳市六度人和科技有限公司 | A kind of spacing recognition methods and device |
CN110198286A (en) * | 2018-02-24 | 2019-09-03 | 阿里巴巴集团控股有限公司 | A kind of data processing method and calculate equipment |
CN110851453A (en) * | 2018-08-01 | 2020-02-28 | 国网辽宁招标有限公司 | Dynamic generation method of project address list |
CN111310538A (en) * | 2019-11-18 | 2020-06-19 | 韩玉芝 | Content management system based on big data server |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417926A (en) * | 2018-04-28 | 2019-11-05 | 冯泽 | Contact method for building up, system and computer readable storage medium |
CN113885954B (en) * | 2021-09-26 | 2024-06-14 | 湖南于一科技有限公司 | Method, device, equipment and storage medium for detecting zombie powder in WeChat address book |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781035A (en) * | 2014-01-10 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for communication processing based on mobile terminal |
CN104394258A (en) * | 2014-12-01 | 2015-03-04 | 广州三星通信技术研究有限公司 | Method and device for processing contact change of communication object |
CN104410694A (en) * | 2014-11-28 | 2015-03-11 | 东莞中国科学院云计算产业技术创新与育成中心 | Autonomous update method for cloud address book contact information based on data mining |
CN105357357A (en) * | 2015-10-14 | 2016-02-24 | 北京乐动卓越科技有限公司 | Telephone number management method and cloud server |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882953A (en) * | 2012-09-18 | 2013-01-16 | 李建成 | Communication number synchronization method and system |
CN103095884A (en) * | 2013-01-17 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Processing method and processing system for numbers of contact persons |
CN105141648B (en) * | 2014-06-09 | 2020-06-09 | 西安中兴新软件有限责任公司 | Address book updating method and terminal |
CN104023108B (en) * | 2014-06-18 | 2016-08-24 | 中国联合网络通信集团有限公司 | The method and apparatus removing terminal failure contact person |
CN106095814B (en) * | 2016-05-31 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Contact person's processing method and server |
-
2016
- 2016-05-31 CN CN201610377964.7A patent/CN106095814B/en active Active
-
2017
- 2017-05-11 WO PCT/CN2017/084032 patent/WO2017206696A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781035A (en) * | 2014-01-10 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for communication processing based on mobile terminal |
CN104410694A (en) * | 2014-11-28 | 2015-03-11 | 东莞中国科学院云计算产业技术创新与育成中心 | Autonomous update method for cloud address book contact information based on data mining |
CN104394258A (en) * | 2014-12-01 | 2015-03-04 | 广州三星通信技术研究有限公司 | Method and device for processing contact change of communication object |
CN105357357A (en) * | 2015-10-14 | 2016-02-24 | 北京乐动卓越科技有限公司 | Telephone number management method and cloud server |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017206696A1 (en) * | 2016-05-31 | 2017-12-07 | 腾讯科技(深圳)有限公司 | Contact information processing method and apparatus, and storage medium |
CN106682223A (en) * | 2017-01-04 | 2017-05-17 | 上海智臻智能网络科技股份有限公司 | Method and device for detecting data validity and method and device for intelligent interaction |
CN106713676B (en) * | 2017-01-23 | 2019-08-06 | 北京安云世纪科技有限公司 | Communicating number identifies control method, device and communication terminal |
CN106713676A (en) * | 2017-01-23 | 2017-05-24 | 北京奇虎科技有限公司 | Communication number identification control method and device, and communication terminal |
CN106850926A (en) * | 2017-02-21 | 2017-06-13 | 维沃移动通信有限公司 | One kind failure contact person processing method, server and mobile terminal |
CN106850926B (en) * | 2017-02-21 | 2019-03-05 | 维沃移动通信有限公司 | A kind of failure contact person processing method, server and mobile terminal |
CN107295118A (en) * | 2017-06-28 | 2017-10-24 | 西安万像电子科技有限公司 | Contact searching method and device |
CN110166637A (en) * | 2018-02-12 | 2019-08-23 | 深圳市六度人和科技有限公司 | A kind of spacing recognition methods and device |
CN110166637B (en) * | 2018-02-12 | 2021-07-23 | 深圳市六度人和科技有限公司 | Empty number identification method and device |
CN110198286A (en) * | 2018-02-24 | 2019-09-03 | 阿里巴巴集团控股有限公司 | A kind of data processing method and calculate equipment |
CN110851453A (en) * | 2018-08-01 | 2020-02-28 | 国网辽宁招标有限公司 | Dynamic generation method of project address list |
CN110851453B (en) * | 2018-08-01 | 2022-09-20 | 国网辽宁招标有限公司 | Dynamic generation method of project address list |
CN111310538A (en) * | 2019-11-18 | 2020-06-19 | 韩玉芝 | Content management system based on big data server |
Also Published As
Publication number | Publication date |
---|---|
WO2017206696A1 (en) | 2017-12-07 |
CN106095814B (en) | 2019-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106095814A (en) | Contact person's processing method and server | |
US20180359200A1 (en) | System and method for facilitating the growth of a mobile community | |
CN106097468B (en) | One kind is registered method, terminal and IM application server | |
US8499049B2 (en) | System and method for accumulating social relation information for social network services | |
US11681744B2 (en) | Methods and systems for updating a database based on object recognition | |
AU2018201140B2 (en) | System and method for candidate profile screening | |
CN104410700B (en) | Issue method, harassing call hold-up interception method and the system of harassing call list | |
CN103049853A (en) | Identifying device and verification method for authenticity of shop | |
MXPA04006722A (en) | Integration integrity manager. | |
CN101808046A (en) | Method and system for managing name card information | |
CN106789550A (en) | Information processing method and device | |
CN114780301B (en) | Disaster recovery method and system supporting multi-cloud production environment | |
CN102339430B (en) | The method and apparatus of social network services relation is set up in a kind of initiation | |
US20220101245A1 (en) | Automated computerized identification of assets | |
CN102438205A (en) | Method and system for pushing service based on action of mobile user | |
CN108364049B (en) | Asset management method and system | |
US10394900B1 (en) | Community-based investigative tools | |
CN114757639A (en) | Data processing method, device, equipment and storage medium | |
CN110546638A (en) | Improvements in biometric authentication | |
CN109903006A (en) | Reporting method, device, equipment and the computer readable storage medium of building | |
WO2023273042A1 (en) | Payment method and system, and electronic device and storage medium | |
CN109672590A (en) | Collecting method, device, equipment and computer readable storage medium | |
CN106304028B (en) | Address book backup and recovery method and device | |
US20070169193A1 (en) | Data processing system | |
CN103250437A (en) | A server for conveying a set of contact identification data to user equipment, methods therefor, user equipment, computer programs and computer program products |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |