CN106095814B - Contact person's processing method and server - Google Patents
Contact person's processing method and server Download PDFInfo
- Publication number
- CN106095814B CN106095814B CN201610377964.7A CN201610377964A CN106095814B CN 106095814 B CN106095814 B CN 106095814B CN 201610377964 A CN201610377964 A CN 201610377964A CN 106095814 B CN106095814 B CN 106095814B
- Authority
- CN
- China
- Prior art keywords
- contact
- contact method
- terminal user
- address list
- contact person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 claims abstract description 415
- 238000004891 communication Methods 0.000 claims abstract description 36
- 238000001914 filtration Methods 0.000 claims abstract description 7
- 238000012545 processing Methods 0.000 claims description 76
- 238000003860 storage Methods 0.000 claims description 14
- 238000012216 screening Methods 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 12
- 230000001360 synchronised effect Effects 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 25
- 230000006870 function Effects 0.000 description 11
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 230000005611 electricity Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 5
- 238000004140 cleaning Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 101000911390 Homo sapiens Coagulation factor VIII Proteins 0.000 description 1
- 230000018199 S phase Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 102000057593 human F8 Human genes 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229940047431 recombinate Drugs 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000008521 reorganization Effects 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42136—Administration or customisation of services
- H04M3/42144—Administration or customisation of services by service provider
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention discloses a kind of contact person's processing method and server, and method includes: the address list for obtaining terminal user, and address list includes the contact method of the contact person of terminal user;The address list for searching any two terminal user obtains the terminal user of direct contact person each other, and the terminal user based on direct contact person each other constructs at least one relation chain;Same correspondents are determined based on the address list of terminal user each in relation chain, the contact method of same correspondents are compared the contact method to be conformed to a predetermined condition;Use data based on the contact method to conform to a predetermined condition, analyze the feature of the contact method respectively to conform to a predetermined condition, and filtering out and matching the contact method of default feature is failure contact method.Using the present invention, it can recognize that the failure number in address list, improve the service efficiency of address list, improve the communication efficiency of user.
Description
Technical field
The present invention relates to the data mining technology of technical field of information communication more particularly to a kind of contact person's processing method and
Server.
Background technique
With popularizing for people's communication, many users used or were used multiple and different phone numbers, thus
In the cell phone address book of user, multiple phone numbers may be stored with for the same contact person, however, these cell-phone numbers
One or more may be currently in shutdown status or be changed hands by operator's recycling in code, this allows for the hand of user
There is failures number (such as shut down or change hands) in the corresponding multiple numbers of same contact person in machine address list, when user will give
When contact person makes a phone call or sends out message, can not accurately tell which or which number from the corresponding multiple numbers of contact person is
Available number can only be attempted to dial one by one or be contacted, in this way, the time and efforts of user can be expended, reduce the use of address list
Efficiency.
Summary of the invention
In view of this, can recognize that logical an embodiment of the present invention is intended to provide a kind of contact person's processing method and server
Failure number in news record, improves the service efficiency of address list, improves the communication efficiency of user.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
In a first aspect, the embodiment of the present invention provides a kind of contact person's processing method, method includes:
The address list of terminal user is obtained, the address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on direct each other
The terminal user of contact person constructs at least one relation chain;
Same correspondents are determined based on the address list of each terminal user in the relation chain, to the connection of the same correspondents
It is that the contact method to be conformed to a predetermined condition is compared in mode;
Based on the use data of the contact method to conform to a predetermined condition, each connection to conform to a predetermined condition is analyzed
It is the feature of mode, filtering out and matching the contact method of default feature is failure contact method.
Second aspect, the embodiment of the present invention provide a kind of contact person's processing server, and server includes:
Module is obtained, for obtaining the address list of terminal user, the address list includes the connection of the contact person of terminal user
It is mode;
Searching module, the terminal that the address list for searching any two terminal user obtains direct contact person each other are used
Family, the terminal user based on direct contact person each other construct at least one relation chain;
First determining module, the address list of each terminal user in the relation chain for being constructed based on the searching module
It determines same correspondents, the contact method of the same correspondents is compared the contact method to be conformed to a predetermined condition;
Screening module, for making based on the contact method to conform to a predetermined condition described in first determining module determination
With data, the feature of each contact method to conform to a predetermined condition is analyzed, the contact method for matching default feature is filtered out
For the contact method that fails.
In the embodiment of the present invention, pass through each terminal in the relation chain to terminal user's building based on direct contact person each other
The contact method of same correspondents in the address list of user is compared, and filters out the contact method to conform to a predetermined condition, and
The failure contact method for going out to match default feature according to the Feature Selection of the contact method to conform to a predetermined condition, i.e., by multiple
The contact method of the contact person of the address list of terminal user is analyzed, and failure correspondent party is identified from all contact methods
Formula, terminal user directly use other contact methods other than the contact method that fails to communicate, avoid the prior art
Middle terminal user needs to attempt to communicate one by one to multiple contact methods including failure contact method, to save
The time and efforts of user improves address list in this way, the embodiment of the present invention can automatically identify the failure number in address list
Service efficiency, improve the communication efficiency of user.
Detailed description of the invention
Fig. 1 is an optional configuration diagram of contact person's processing method in the embodiment of the present invention;
Fig. 2 is an optional flow diagram of contact person's processing method in the embodiment of the present invention;
Fig. 3 is an optional schematic diagram for implementing contact person's processing method in the embodiment of the present invention based on Fig. 1;
Fig. 4 is another optional flow diagram of contact person's processing method in the embodiment of the present invention;
Fig. 5 is the control schematic diagram in the embodiment of the present invention in address list before and after indicating failure contact method;
Fig. 6 is that mark uses the control schematic diagram before and after frequent degree information in address list in the embodiment of the present invention;
Fig. 7 a, which is that one of cleaning failure number function switch in the embodiment of the present invention is optional, realizes schematic diagram;
Fig. 7 b is another optional realization schematic diagram of cleaning failure number function switch in the embodiment of the present invention;
Fig. 7 c is the optional schematic diagram that a contact person corresponds to multiple telephone numbers in the embodiment of the present invention;
Fig. 7 d, which is that one of identification failure number function switch in the embodiment of the present invention is optional, realizes schematic diagram;
Fig. 7 e is an optional interface schematic diagram of cleaning failure number in the embodiment of the present invention;
Fig. 8 a is the optional flow diagram that failure telephone number is determined in the embodiment of the present invention;
Fig. 8 b is an optional schematic diagram of contact person's degree in the embodiment of the present invention;
Fig. 8 c is the optional data flow schematic diagram that failure telephone number is determined in the embodiment of the present invention;
Fig. 9 is an optional structural schematic diagram of contact person's processing server in the embodiment of the present invention;
Figure 10 is another optional structural schematic diagram of contact person's processing server in the embodiment of the present invention.
Specific embodiment
As follows to DESCRIPTION OF THE PRIOR ART first: there are following situations for the address list of terminal user: for the same connection
People is stored with multiple telephone numbers, but one or more has been in shutdown status or has been returned by operator
Receipts change hands and (have such as replaced service user), i.e., one or more of numbers are invalid number.When terminal user will give this position
When the contact person for being stored with multiple telephone numbers makes a phone call or sends out message, terminal user faces this connection stored in address list
Multiple telephone numbers of people, can not quickly, accurately tell which or which number is available number, can only attempt to dial one by one
Or connection, the waste of the multiple time and efforts for attempting will lead to user to dial during this, in this way, the prior art can expend
The excessive time and efforts of user, reduces the service efficiency of address list, reduces the communication efficiency of user.
The present invention is further described in detail below with reference to the accompanying drawings and embodiments.It should be appreciated that described herein
Specific embodiment is only used to explain the present invention, is not intended to limit the present invention.In addition, embodiment provided below is to be used for
Implement section Example of the invention, rather than provide and implement whole embodiments of the invention, is not paid in those skilled in the art
Under the premise of creative work, the technical solution of following embodiment is carried out to recombinate resulting embodiment and based on to invention
The other embodiments implemented all belong to the scope of protection of the present invention.
It should be noted that in embodiments of the present invention, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that including the method for a series of elements or device not only includes wanting of being expressly recited
Element, but also including other elements that are not explicitly listed, or further include for implementation method or device intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Method or device in there is also other relevant factor (such as the step in method or units in device).For example,
Contact person's processing method provided in an embodiment of the present invention contains a series of step, but connection provided in an embodiment of the present invention
People's processing method is not limited to documented step, and similarly, contact person's processing server provided in an embodiment of the present invention includes
A series of modules, but contact person's processing server provided in an embodiment of the present invention is not limited to include module be expressly recited, also
Module/unit of required setting when may include to obtain relevant information or being handled based on information.
It should be noted that it is area that term " first " involved in the embodiment of the present invention/" second "/" third " etc., which is only,
Not similar object does not represent the particular sorted for object, it is possible to understand that ground, " first "/" second "/" third " is in permission
In the case of specific sequence or precedence can be interchanged.It should be understood that the object that " first "/" second "/" third " is distinguished is suitable
It can be interchanged in the case of, so that the embodiment of the present invention described herein can be in addition to those of illustrating or describing herein
Sequence in addition is implemented.
It should be pointed out that terminal can be smart phone, tablet computer, desktop computer, notes in the embodiment of the present invention
This computer, wearable device (such as smartwatch) can support wired or wireless communication or support the various applications for communication
Or the equipment of social software.
The technical solution that the embodiment of the present invention is recorded can be used for identifying that same contact person is corresponding multiple in address list
Failure number in number;Show referring to an optional framework of contact person's processing method in the embodiment of the present invention shown in fig. 1
Meaning, includes: terminal 11, contact person's processing server 12 and the network 13 for supporting address list in framework shown in FIG. 1, terminal 11 with
Contact person's processing server 12 carries out data interaction by network 13, and terminal 11 can be multiple;When user will give contact person
When Lee * * makes a phone call or sends out message, when the address list of user query terminal 11, discovery is stored with corresponding to Lee * * in address list
Three telephone numbers, respectively telephone number 1, telephone number 2 and telephone number 3 may still lose in this 3 numbers
It imitates number (such as shut down or change hands), however, user is not aware that in this 3 numbers which is significant number in the prior art, uses
Family can only attempt to dial one by one or contact, and the multiple trial dialled during this will expend the excessive time and efforts of user, drop
The service efficiency of low address list reduces the communication efficiency of user.
It should be noted that application scenarios shown in Fig. 1 are only one of the technical solution that the embodiment of the present invention is recorded
Possible example architecture, other application scenarios may include the terminal that Fig. 1 is not directed to or be installed in terminal for communication
Using or social software etc..The technical solution that the embodiment of the present invention is recorded can be applied in above-mentioned scene, existing to help to overcome
There is the existing time and efforts for expending user of technology, reduce the service efficiency of address list, reduces lacking for the communication efficiency of user
It falls into.
Based on the application scenarios of above-mentioned record, following specific embodiment is proposed.
Embodiment one
The present embodiment provides a kind of contact person's processing methods, can be used for identifying the failure number of contact person in address list
Code overcomes the time and efforts of the existing technology for expending user, reduces the service efficiency of address list, reduce the communication of user
The defect of efficiency.
Referring to fig. 2, contact person's processing method that the present embodiment is recorded can be handled server implementation, method packet by contact person
Include following steps:
Step 101, the address list for obtaining terminal user, address list includes the contact method of the contact person of terminal user.
Here, contact person's processing server obtains the address list of multiple terminal users from multiple terminals, for example, opening/making
Network side, such as cloud server, contact person can be stored in the address list of the terminal user of address list synchronization function
Server is managed after the authorization for obtaining each terminal user, the address list of these terminal users can be obtained from network side;It is optional
, the implementation of the authorization of terminal user can be with are as follows: whether terminal user is arranged in address list synchronization function allows to contact
People's processing server obtains the address list of terminal user, if then indicating that contact person's processing server obtains awarding for terminal user
Power;Otherwise it is unauthorized;It should be noted that contact person's processing server can be same equipment with network side, or
Different equipment;Here, the address list of a terminal user may include the title and correspondent party of the contact person of the terminal user
Formula;Wherein, the contact method of contact person includes but is not limited to: telephone number, E-mail address, mailing address or user's using terminal
Using the user identity voucher of (such as mobile phone assistant, wechat, QQ).
Step 102, the address list for searching any two terminal user obtain the terminal user of direct contact person each other, are based on
The terminal user of direct contact person constructs at least one relation chain each other.
Here, the contact method of other side is respectively included in the address list of the both sides of direct contact person each other;Contact person's processing
The address list that server searches any two terminal user obtains a kind of feasible reality of the terminal user of direct contact person each other
Now mode includes:
Contact person's processing server obtains the contact method of first terminal user and the correspondent party of second terminal user respectively
Formula;Here, first terminal user and second terminal user are the terminal user that any two in multiple terminal users are different;?
The contact method of second terminal user is searched in the address list of first terminal user, and, in the address list of second terminal user
The middle contact method for searching first terminal user;I.e. by searching for the address list of first terminal user to determine first terminal user
Address list whether include second terminal user contact method, and by searching for the address list of second terminal user to determine
The address list of two terminal users whether include first terminal user contact method, however, it is determined that when finding, that is, determine first
The address list of terminal user includes that the address list of the contact method of second terminal user and second terminal user include first terminal
When the contact method of user, first terminal user and second terminal user direct contact person each other are determined.
Terminal user based on direct contact person each other constructs a kind of feasible implementation packet of at least one relation chain
Include: contact person's processing server using any terminal user in the terminal user of direct contact person each other as node, with it is any
Terminal user each other direct contact person other terminal users be tandem node, based on cascade node construct relation chain;Assuming that
First terminal user and second terminal user are judged as direct contact person, then contact person's processing server is with first terminal user
For node, using second terminal user as tandem node, based on cascade node construct relation chain.
It should be noted that contact person's processing server needs to be traversed in the above-mentioned multiple terminal users of lookup in step 102
Any two terminal user, it is assumed that contact person's processing server obtains 3 different terminal users in total, such as user A, use
The address list of family B and user C, then the following operations need to be performed for contact person's processing server: 1) searching the communication of user A, user B
Whether each other record determines user A and user B direct contact person;2) address list for searching user A, user C, determines user A and use
Family C whether each other direct contact person;3) address list for searching user B, user C determines whether user B and user C is direct each other
Contact person;4) based on above-mentioned steps 1) construct at least one relationship to the terminal user of contact person direct each other determined by 3)
Chain.
Step 103 determines same correspondents based on the address list of terminal user each in relation chain, to the connection of same correspondents
It is that the contact method to be conformed to a predetermined condition is compared in mode.
A kind of feasible implementation of above-mentioned steps 103 includes: each end in contact person's processing server search relationship chain
The title and contact method of each contact person in the address list of end subscriber, in search relationship chain in the address list of each terminal user
With the presence or absence of the contact person with same names, if it is not, then process terminates;If so, comparing each terminal user in relation chain
Whether the corresponding contact method of contact person in address list with same names is identical, if it is different, then determining with identical
The corresponding contact method of the contact person of title is the contact method to conform to a predetermined condition.
The feasible implementation of another kind of above-mentioned steps 103 includes: each in contact person's processing server search relationship chain
The title and contact method of each contact person in the address list of terminal user, the address list of each terminal user in search relationship chain
In with the presence or absence of with identical contact method contact person, if it is not, then process terminates;If so, comparing each terminal in relation chain
Whether the corresponding title of contact person in the address list of user with identical contact method is identical, if it is different, then determining phase
It is the contact method to conform to a predetermined condition with contact method.
Step 104, the use data based on the contact method to conform to a predetermined condition, analyze the connection respectively to conform to a predetermined condition
It is the feature of mode, filtering out and matching the contact method of default feature is failure contact method.
Here, be equivalent to and increase new attribute for each contact method: failure contact method or effective connection mode are (such as
Be not screened (identification) be fail contact method contact method), in this, as user judge whether using, modification or delete connection
It is one of the foundation of mode.
Optionally, contact person's processing server stores the failure contact method filtered out, such as will filter out
Fail contact method write-in user failure contact method record sheet or database.
Here, based on the use data of the contact method to conform to a predetermined condition, the connection respectively to conform to a predetermined condition is analyzed
The feature of mode, filtering out and matching the implementation that the contact method for presetting feature is failure contact method may include following
It anticipates a kind of or combines:
Implementation 1:
The use data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, determination respectively meet predetermined
What the contact method of condition was used for Information Authentication mode uses the time, determine using time and current time time difference whether
Greater than first time threshold, if so, determining corresponding contact method for the contact method that fails;Otherwise, it is determined that corresponding connection
Mode is effective connection mode.Optionally, Information Authentication mode is for example including based on the login of verifying short message, user's application registration etc.
Mode;Here, first time threshold can be based on the progress such as historical data, actual demand by user/contact person's processing server
Setting.
On the basis of implementation 1, correspond at least two contact persons for same contact method, for example, same electricity
Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to
Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service
Device parses the use data of corresponding first contact person of the first contact method, obtains the first contact method by the first contact person for believing
Cease verification mode uses the time;Here, the first contact method is any contact method to conform to a predetermined condition, the first contact person
To have any contact person of the first contact method in the address list of terminal user each in relation chain;Contact person's processing server is sentenced
Surely whether it is greater than first time threshold using the time difference of time and current time, if so, determining that the first contact method is the
The failure contact method of one contact person;Otherwise, it is determined that the first contact method is the effective connection mode of the first contact person.It needs
It is bright, contact person's processing server need to parse respectively in relation chain in the address list of each terminal user have it is any meet it is pre-
Any contact person of the contact method of fixed condition.
Implementation 2:
The associated application data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, judgement respectively meet
Whether the contact method of predetermined condition is used as the association contact method of application, if it is not, then determining corresponding contact method for failure
Contact method;If so, determining corresponding contact method for effective connection mode.Here, associated application data may include connection
It is that mode is bound with application;The association contact method of application, for example, contact method are bound for verifying number, with connection
Mode apply registration, bind contact method and the account of application etc..
On the basis of implementation 2, correspond at least two contact persons for same contact method, for example, same electricity
Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to
Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service
Device parses the associated application data of corresponding second contact person of the second contact method, judges whether the second contact method is used as second
Contact person uses the association contact method of application, if it is not, then determining that the failure that the second contact method is the second contact person contacts
Mode;If so, determining that the second contact method is the effective connection mode of the second contact person;Here, the second contact method is to appoint
One contact method to conform to a predetermined condition has the second connection in the address list of each terminal user in the second artificial relation chain of connection
Any contact person of mode.It should be noted that contact person's processing server needs to parse each terminal user in relation chain respectively
Address list in any contact method to conform to a predetermined condition any contact person.
Implementation 3:
The communication log data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, determination respectively meet
The call duration time of the contact method of predetermined condition, determines whether the time difference of call duration time and current time is greater than the second time threshold
Value, if so, determining corresponding contact method for the contact method that fails;Otherwise, it is determined that corresponding contact method is effective connection
Mode.Optionally, call duration time for example can for the last communication occasions (such as the last transmitting-receiving short message, make a phone call or
At the time of mail) etc.;Here, second time threshold can be based on historical data by user/contact person's processing server, reality needs
It asks etc. and to be set.
On the basis of implementation 3, correspond at least two contact persons for same contact method, for example, same electricity
Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to
Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service
Device parsing third contact method corresponds to the communication log data of third contact person, obtains the call duration time of third contact method;This
In, third contact method is any contact method to conform to a predetermined condition, and third contacts each terminal user in artificial relation chain
With any contact person of third contact method in address list;When contact person's processing server determines the communication of third contact method
Between with time difference of current time whether be greater than second time threshold, if so, determining that third contact method is third contact person
Failure contact method;Otherwise, it is determined that third contact method is the effective connection mode of third contact person.It should be noted that
Contact person's processing server, which needs to parse respectively, has any conform to a predetermined condition in the address list of each terminal user in relation chain
Contact method any contact person.
Optionally, contact person's processing server determines that terminal user's is logical when satisfaction failure contact method issues condition
Failure contact method in news record, and the failure contact method into the address list of terminal transmission terminal user, for terminal at end
Indicating failure contact method in the address list of end subscriber.Here, contact person's processing server meets clockwork spring under failure contact method
The implementation of part may include any one following or combination:
1) terminal receive user triggering be directed to address list failure number cleaning operation when, to contact person processing service
Device sends the request of the address list for management of end-user;Contact person's processing server is used to manage in response to what terminal was sent
Failure contact method in the address list of terminal user is sent to terminal by the request of the address list of terminal user.
2) when the failure Number Reorganization for designated contact in address list that terminal receives user's triggering operates, Xiang Lian
It is the request for the contact person in address list that people's processing server is sent for management of end-user, specified connection is carried in the request
The title of people or contact method to be identified;The leading to for management of end-user that contact person's processing server is sent in response to terminal
The request for interrogating record, is sent to terminal for the failure contact method of the designated contact in the address list of terminal user.
3) it periodically issues.
4) active of event triggering issues, such as contact person's processing server detects the mistake in the address list of terminal user
The absolute quantity or relative populations for imitating contact method are more than preset quantity thresholding.
Contact person's processing server determines a kind of feasible realization of the failure contact method in the address list of terminal user
Mode includes: contact person's processing server by the contact method of contact person each in the address list of terminal user, respectively with it is above-mentioned
The failure contact method filtered out is matched, and the failure contact method in the address list of terminal user is obtained;Optionally, it contacts
People's processing server saves the failure contact method in the address list of determining terminal user.
Failure contact method in the address list for the terminal user that terminal is sent according to contact person's processing server, in terminal
Indicating failure contact method in the address list of user;So that terminal user is for the failure connection identified in the address list of terminal user
It is that mode is operated, for example, the failure contact method that terminal user will identify in address list is completely or partially deleted, alternatively,
Terminal user cancels the mark that some or all of failure contact method contact method is identified as in address list, for example, user
Know that being identified as one or more contact methods of failure contact method is effective contact method in fact.
After terminal user is operated for the failure contact method identified in the address list of terminal user, contact person
Processing server, for the operation of the failure contact method identified in the address list of terminal user, updates net in response to terminal user
Fail in the address list of the terminal user of synchronous storage contact method in network side;Optionally, in terminal user by terminal user's
When being identified as the mark cancellation of the contact method of failure contact method in address list, contact person's processing server will be from above-mentioned screening
The contact method for being cancelled mark is deleted in failure contact method out.
Below with reference to application scenarios shown in fig. 1, the contact person's processing method recorded to the present embodiment is illustrated:
The optional schematic diagram that contact person is handled is implemented based on framework shown in FIG. 1 referring in the embodiment of the present invention shown in Fig. 3,
Contact person's processing method shown in Fig. 3 includes:
Step 201, when the terminal user of terminal 11 wants to make a phone call to Lee * * or send out message, end user query terminal 11
Address list, discovery in address list Lee * * is stored with 3 telephone numbers, respectively telephone number 1, telephone number 2 and electricity under one's name
Number 3 is talked about, at this point, terminal user faces the corresponding multiple telephone numbers of Lee contact person * *, it is not known which phone should be used
Number.
Step 202, terminal 11 detect that terminal user is inquiring address list and resting on the corresponding letter of Lee contact person * *
The page is ceased, and terminal 11 finds that Lee contact person * * when being corresponding with multiple telephone numbers, is then sent to contact person's processing server 12
The request of the address list of terminal user for management terminal 11 carries the title of Lee contact person * * in the request, or carries
The corresponding multiple telephone numbers of Lee contact person * *.
Step 203, contact person's processing server 12 are according to the title of Lee contact person * *, from the end of predetermined terminal 11
The failure telephone number of Lee contact person * * is found in the failure contact method of the address list of end subscriber;Alternatively, contact person is handled
Server 12 carries out the corresponding multiple telephone numbers of Lee * * in the address list of terminal user with the failure contact method filtered out
Matching, determines the failure telephone number of Lee * *.Here, suppose that the failure telephone number of Lee * * is telephone number 1 and telephone number
3。
Step 204, contact person's processing server 12 are by the failure telephone number (telephone number 1 and telephone number 3) of Lee * *
It is sent to terminal 11.
Failure telephone number (the telephone number for Lee * * that step 205, terminal 11 are sent according to contact person's processing server 12
1 and telephone number 3), the corresponding telephone number 1 of Lee * * and telephone number 3 are divided in the address list of the terminal user of terminal 11
It is not identified as " failure ", to identify the failure telephone number (telephone number 1 and telephone number 3) of Lee * *.
So, terminal user can directly select the telephone number 2 for not being identified as to fail and make a phone call to Lee * *
Or hair message, thus avoiding user from attempting the feelings dialed or contacted one by one to multiple numbers including failure telephone number
Under condition, the failure number in address list is automatically identified, overcomes consuming user time of the existing technology and energy, is reduced logical
The service efficiency for interrogating record, reduces the defect of the communication efficiency of user.
In the present embodiment, pass through each terminal user in the relation chain to terminal user's building based on direct contact person each other
Address list in the contact methods of same correspondents be compared, filter out the contact method to conform to a predetermined condition, and according to
The Feature Selection of the contact method to conform to a predetermined condition goes out the failure contact method for matching default feature, i.e., by multiple terminals
The contact method of the contact person of the address list of user is analyzed, and failure contact method is identified from all contact methods, eventually
End subscriber directly uses other contact methods (i.e. effective connection mode) other than the contact method that fails to be communicated, and avoids
Terminal user needs to including that multiple contact methods including failing contact method are attempted to communicate one by one in the prior art,
To save the time and efforts of user, in this way, the present embodiment can automatically identify the failure number in address list, improve
The service efficiency of address list improves the communication efficiency of user.
Embodiment two
Based on the above embodiment, the present embodiment receives the connection that fails in the cleaning address list of terminal user's triggering for terminal
Processing scheme when being the operation instruction of mode is illustrated.
Referring to fig. 4, contact person's processing method that the present embodiment is recorded can be with terminal and contact person's processing server
Implement, method the following steps are included:
Step 301, terminal detection terminal user are directed to the operation of address list.
Step 302, terminal detect the behaviour of terminal user's triggering cleared up for the contact method that fails in address list
When indicating, the message of the failure contact method for obtaining each contact person in address list is sent to contact person's processing server;
The contact method of all contact persons in mark, contact method or address list in the message including terminal user.
Step 303, contact person's processing server are used to obtain each contact person in address list in response to what terminal user sent
Failure contact method message, obtain screening determining multiple terminal users' in advance by inquiring pre-generated database
Fail contact method, and the contact method of contact person each in the address list of the terminal user is more with preparatory screening determination respectively
The failure contact method of a terminal user matches, and obtains the failure correspondent party of each contact person in the address list of the terminal user
Formula, or the mistake of each contact person in the address list of the predetermined terminal user is obtained by inquiring pre-generated database
Imitate contact method.
Step 304, contact person's processing server join the failure of contact person each in the address list of the obtained terminal user
It is that mode is sent to the terminal.
Step 305, terminal handle the failure contact method of each contact person in the address list of server feedback according to contact person,
Contact method corresponding in address list is identified as failure contact method, referring to the mistake of each contact person in the address list shown in Fig. 5
The control schematic diagram that contact method (illustrating in Fig. 5 with telephone number) is identified front and back is imitated, so that terminal user is directed to address list
In be identified as failure contact method contact method operation, for example, the failure correspondent party that terminal user will identify in address list
Formula is completely or partially deleted, alternatively, terminal user will be identified as some or all of failure contact method correspondent party in address list
The mark of formula is cancelled, for example, user knows that being identified as one or more contact methods of failure contact method is effective in fact
Contact method.
In the present embodiment, when terminal user needs the failure contact method to address list to clear up, terminal takes from terminal
Business device is requested to obtain the failure contact method of each contact person in address list and is identified in address list, and it is each for being equivalent to
Be that mode increases new attribute: failure contact method or effective connection mode (are not identified as failure contact method in such as address list
Contact method), in this, as user judge whether using, modification or delete contact method foundation one of, save user's
Time and efforts improves the accuracy and efficiency that terminal user arranges address list.
Embodiment three
Based on the above embodiment, the present embodiment wishes the difference that each contact person is identified in address list for terminal user
The demand using frequent degree information of contact method proposes the technical solution solved, specifically includes:
The different contact methods for being used to request each contact person that contact person's processing server actively or in response to terminal is sent
The message using frequent degree information, the communication log data of each contact person in the address list based on terminal user determine eventually
The use frequent degree that each contact person is communicated using different contact methods in the address list of end subscriber;Here, using frequency
Numerous degree may include the information such as commonly using, being of little use;
Contact person's processing server sends the different contact methods of each contact person in the address list of terminal user to terminal
Use frequent degree information.
The use frequent degree that terminal identifies the different contact methods of each contact person in the address list of terminal user is believed
Breath;Here, it is equivalent to and increases new attribute for each contact method: commonly using or be of little use, judge whether to make in this, as user
With, modification or delete contact method foundation one of;It should be noted that the present embodiment is based on the above embodiment, the present embodiment
In contact method use frequent degree information (commonly use, be of little use), refer to that contact person is communicated (electricity using contact method
Words, short message, associated application) use frequent degree;The contact method for being not labeled as failure (or being noted as effectively) may
It is identified as commonly using, it is also possible to be identified as being of little use;Referring to each contact person in the address list shown in Fig. 6 contact method (with
Telephone number citing) it is marked using the control schematic diagram before and after frequent degree information, while checking that Fig. 5 and Fig. 6 can be sent out
It is existing:
1) in Fig. 5 the telephone number 2 of Lee * *, money * * telephone number 7 be not labeled as failing, and, in Fig. 6
The telephone number 2 of Lee * *, the telephone number 7 of money * * are noted as commonly using;That is, the telephone number 2 of Lee * *, money * *
Telephone number 7 is effective and commonly used telephone number;
2) telephone number 4, the telephone number 5 of * * are not labeled as failing in Fig. 5, and, the * * in Fig. 6
Telephone number 4 is noted as commonly using, and still, the telephone number 5 of * * is noted as being of little use;That is, the phone of * *
Number 4 is effective and commonly used telephone number, and the telephone number 5 of * * is the telephone number effectively but being of little use.
Terminal user is frequent for the use of the different contact methods of each contact person identified in the address list of terminal user
The operation of degree information, for example, being deleted the contact method being of little use is identified as in address list, alternatively, by being identified in address list
Cancel for " being of little use " mark for the one or more contact methods being of little use, for example, user, which knows, is identified as " being of little use "
One or more contact methods be authentic and valid and common contact method in fact;Here, terminal user can also will be marked
Note is that the contact method of " being of little use " is purged as failure contact method, for example, terminal user can be based in address list
The use frequent degree information of the different contact methods of each contact person of mark clears up the failure contact method in address list.
Contact person's processing server is in response to terminal user for each contact person's identified in the address list of terminal user
The operation using frequent degree information of different contact methods updates in network side in the address list of the terminal user of synchronous storage
The different contact methods of each contact person;For example, updating the mark of corresponding contact method, or corresponding contact method is deleted.
Example IV
The present embodiment is based on above-mentioned any embodiment, respectively from product side and technology side to contact person's processing method above-mentioned
Realization process be illustrated.
1, product side:
A) operation interface
Referring to Fig. 7 a, user can detect whether the machine has failure number in address list doctor's physical examination, and prompt user
It is arranged;Alternatively,
Referring to Fig. 7 b, user can also voluntarily enter from address list sorting module, arrange failure number;Alternatively,
Referring to Fig. 7 c, when user searches the telephone number of contact person from address list, the corresponding multiple electricity of contact person are faced
Should number be talked about, it is not known which be used? the contact person that terminal is corresponding with multiple telephone numbers in showing address list is (right
Answer multiple) the page, the button or operation entry for increasing sign failure number are selected for user, referring to Fig. 7 d, alternatively, eventually
End actively prompts user's end when detecting user and searching the information for being corresponding with the contact person of multiple telephone numbers from address list
Rectify the failure number in the corresponding multiple telephone numbers of identification contact person, and recognition result is presented to user.
B) function
After cloud server (such as above-mentioned contact person's processing server) analysis, it will judge that label (recognition result) is in
Now to user referring to Fig. 7 e, user can independently choose whether to handle these numbers.
2, technology side:
Failure telephone number calculating be divided into off-line calculation part and online service part, due to processing data volume very
Greatly, therefore off-line calculation can be carried out in Hadoop platform, then the result of off-line calculation is imported into storage, online service
Inquiry storage, has the part of calculated result to return to user when handling user's request;Referring to the failure phone shown in Fig. 8 a
Number calculation process.
It is imported into computing platform firstly the need of by the data of any active ues, computing platform used herein is Hadoop
Platform.When user uses address list synchronization function, system background can be imported the contact data of the user in the form of log
To computing platform (since the data of synchronous assistant are related to privacy, data all storing in a manner of encryption in computing platform).
1) customer relationship circle is established:
Centered on active user, by the contact person in his address list, if the contact person of he and address list is same
Step assistant deposits the number of both sides, then they can establish 1 degree of contact person.For all 1 degree of contact persons, them are successively taken out
Contact person in address list resettles 1 degree of contact person, at this point, central user just has 2 degree of human connection circle, these Information Numbers
User -> telephone number form imported into computing platform accordingly.Here, the degree of contact person specifically: if two users are mutual
Phone number is deposited, then claiming the two users 1 degree of contact person each other, if all there is 1 degree of common connection between two users
It is people, then claim the two users 2 degree of contact persons each other, and so on.Referring to Fig. 8 b, user A and B and C are respectively 1 degree and contact
People, user A and D are 2 degree of contact persons, and user A and E are 3 degree of contact persons.
The calculating of human connection circle is partially established offline, and offline part uses Hadoop system, establishes connection human connection in systems
Table can establish human connection circle using the computing capability of Hadoop in global data, establish the condition and previous step phase of human connection circle
Seemingly: mutually depositing number people can establish relationship, and it is spare to establish human connection table in this approach.
2) suspicion number is filtered out:
The number for thinking user may be failure there are two types of situation: a kind of situation is this user in circle of friends, he
Name deposit number by multiple friends, and the number deposited is different;Another situation is that the same number, is deposited not
Same name, and under this different name, and include multiple numbers.Both of these case will be considered as suspicion number.Certainly
Rate that such case is that there is a certain error, but some Restoration Mechanisms will be used to prevent user's mistake from having deleted number, but can look for
It returns.
The identification of suspicion number: use a plurality of ways to whether one number of identification is used recently: for example, joint hand
The flow short-message verification of machine house keeper, is had be used using the explanation of flux modification recently;Alternatively, whether phone number has binding
Synchronous assistant, has the number of binding to be largely used;Alternatively, whether the number has the record of call recently, have logical
Words record is used.Frequent above-mentioned several investigation steps, can find whether corresponding number is most recently used, if very
It is not used for a long time, is then considered as failure number.
3) it the definition for the period of failure number: for example, original number in continuous 3 months is considered as failure number, beats
The label of upper failure, it is for reference.Show that user uses the rear not used time from the last time simultaneously.If because judging item
Part is insufficient, data deficiency, and what can not be judged does not show failure label then.
It after offline platform is calculated, will imported into line platform, online service with quick search and can return to use
Family;The data flow of whole flow process is as shown in Figure 8 c.
The present embodiment solves for user by big data background analysis and identifies that a contact person has more in cell phone address book
Pain spot of a number comprising the number that failed improves user and finds the number call of needs in address list or send information
Operating efficiency has evaded the multiple waste for attempting to lead to time and efforts dialled during this;Based on the present embodiment, it is able to achieve
Automatically authentic and valid and common telephone number in the multiple numbers of contact person is identified for user, further promote the use of user
Experience.
The present embodiment proposes the failure telephone number people that user is found using contact person's circle, from contact person's circle,
The stored multiple cell-phone numbers of contact person are found out, failure number is identified from these numbers.The use data of synthetic user, can
To form contact person's circle from the contact relationship data of user, and for the user in contact person's circle, contact person's phase is calculated
Close data be synchronized using time, to judge whether number is being used or not used duration in the recent period, from for a long time not
It synchronizes and searches out no longer valid number in the contact person used, show user, whether delete failure with for reference
Contact number.
Embodiment five
Corresponding with the record of previous embodiment one, the present embodiment records a kind of contact person's processing server, referring to Fig. 9,
Contact person's processing server 41 shown in Fig. 9 includes:
Module 401 is obtained, for obtaining the address list of terminal user, address list includes the connection of the contact person of terminal user
Mode;
Searching module 402, the address list for searching any two terminal user obtain the terminal of direct contact person each other
User, the terminal user based on direct contact person each other construct at least one relation chain;
First determining module 403, the address list of each terminal user is true in the relation chain for being constructed based on searching module 402
Determine same correspondents, the contact method of same correspondents is compared the contact method to be conformed to a predetermined condition;
Screening module 404, the use of the contact method to conform to a predetermined condition for being determined based on the first determining module 403
Data analyze the feature of the contact method respectively to conform to a predetermined condition, and filtering out and matching the contact method of default feature is failure
Contact method.
The present embodiment is analyzed by the contact method of the contact person of the address list to multiple terminal users, from all
It is that failure contact method is identified in mode, terminal user can directly use other connections other than the contact method that fails
Mode is communicated, and is avoided terminal user in the prior art and is needed to multiple contact methods including failure contact method
It attempts to be communicated one by one, to save the time and efforts of user, improves the communication efficiency of user.
On the basis of the above embodiments, searching module 402 are specifically used for: obtaining the contact method of first terminal user
And the contact method of second terminal user;The contact method of second terminal user is searched in the address list of first terminal user,
And the contact method of first terminal user is searched in the address list of second terminal user;It determines when finding, determines the
One terminal user and second terminal user direct contact person each other.
On the basis of the above embodiments, searching module 402 are specifically used for: with the terminal user of direct contact person each other
In any terminal user be node, with other terminal users with any terminal user direct contact person be each other a grade interlink
Point constructs relation chain based on cascade node.
On the basis of the above embodiments, the first determining module 403, is specifically used for: each terminal user in search relationship chain
Address list in same names contact person, compare have same names contact person contact method, if it is different, then really
Surely the contact method of the contact person with same names is the contact method to conform to a predetermined condition.
On the basis of the above embodiments, the first determining module 403, is specifically used for: each terminal user in search relationship chain
Address list in identical contact method contact person, compare have identical contact method contact person title, if it is different,
Then determine that identical contact method is the contact method to conform to a predetermined condition.
On the basis of the above embodiments, screening module 404 are specifically used for: the first contact method of parsing corresponding first
It is the use data of people, obtains the first contact method by the first contact person and use the time for Information Authentication mode;In determination
When being greater than first time threshold using time and the time difference of current time, determine that the first contact method is the mistake of the first contact person
Imitate contact method;Wherein, the first contact method is any contact method to conform to a predetermined condition, and first contacts in artificial relation chain
With any contact person of the first contact method in the address list of each terminal user.
On the basis of the above embodiments, screening module 404 are specifically used for: the second contact method of parsing corresponding second
It is the associated application data of people, determines that the second contact method is not used as the association contact method that the second contact person uses application
When, determine that the second contact method is the failure contact method of the second contact person;Wherein, the second contact method be it is any meet it is predetermined
The contact method of condition, second contacts any in the address list of each terminal user in artificial relation chain with the second contact method
Contact person.
On the basis of the above embodiments, screening module 404 are specifically used for: parsing third contact method corresponds to third connection
It is the communication log data of people, obtains the call duration time of third contact method;The call duration time that determines third contact method with
When the time difference of current time is greater than second time threshold, determine third contact method for the failure correspondent party of third contact person
Formula;Wherein, third contact method is any contact method to conform to a predetermined condition, and third contacts each terminal in artificial relation chain and uses
With any contact person of third contact method in the address list at family.
On the basis of Fig. 9 shows structure, the present embodiment also records another contact person's processing server, referring to Figure 10,
Contact person's processing server 42 shown in Figure 10 also includes: to obtain module 401, searching module 402, the first determining module 403, sieve
Modeling block 404, and each module also has the function of shown in Fig. 9 and connection relationship;Meanwhile contact person's processing server 42 is also
Include:
Second determining module 501, for the communication log data of each contact person in the address list based on third terminal user,
Determine the use frequent degree that each contact person is communicated using different contact methods in the address list of third terminal user;
First transceiver module 502, for third terminal send third terminal user address list in each contact person not
With the use frequent degree information of contact method, identify each contact person's in the address list of third terminal user for third terminal
The use frequent degree information of different contact methods;
First update module 503 is identified for being directed in the address list of third terminal user in response to third terminal user
Each contact person different contact methods the operation using frequent degree information, the third for updating synchronous storage in network side is whole
The different contact methods of each contact person in the address list of end subscriber.
Optionally, contact person's processing server 42 further include:
Second transceiver module 504, the failure correspondent party in address list for sending the 4th terminal user to the 4th terminal
Formula, for the 4th terminal in the address list of the 4th terminal user indicating failure contact method;
Second update module 505 is identified for being directed in the address list of the 4th terminal user in response to the 4th terminal user
Failure contact method operation, update the correspondent party that fails in the address list of the 4th terminal user of synchronous storage in network side
Formula.
In practical application, it is true to obtain module 401, searching module 402, the first determining module 403, screening module 404, second
Cover half block 501, the first transceiver module 502, the first update module 503, the second transceiver module 504, the second update module 505
By central processing unit (Central Processing Unit, CPU), the microprocessor of contact person's processing server
(Microprocessor Unit, MPU), specific integrated circuit (Application Specific Integrated
Circuit, ASIC) or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realize.
Embodiment six
The present embodiment records a kind of computer-readable medium, can for read-only memory (Read-Only Memory,
ROM), flash memory (FLASH) memory, transfer device etc., can also be magnetic storage medium (for example, tape, disc driver etc.),
Optical storage medium is (for example, CD-ROM (Compact Disc-ROM, CD-ROM), digital video disc-ROM (Digital
Video Disc-ROM, DVD-ROM), paper card, paper tape etc.) and other well-known types program storage;Computer-readable Jie
Computer executable instructions are stored in matter, when executing an instruction, causing at least one processor to execute includes operation below:
The address list of terminal user is obtained, address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on direct each other
The terminal user of contact person constructs at least one relation chain;
Determine same correspondents based on the address list of terminal user each in relation chain, to the contact methods of same correspondents into
Row compares the contact method to be conformed to a predetermined condition;
Use data based on the contact method to conform to a predetermined condition, analyze the contact method respectively to conform to a predetermined condition
Feature, filtering out and matching the contact method of default feature is failure contact method.
To sum up, pass through the communication of each terminal user in the relation chain to terminal user's building based on direct contact person each other
The contact method of same correspondents in record is compared, and filters out the contact method to conform to a predetermined condition, and pre- according to meeting
The Feature Selection of the contact method of fixed condition goes out the failure contact method for matching default feature, i.e., by multiple terminal users'
The contact method of the contact person of address list is analyzed, and failure contact method, terminal user are identified from all contact methods
It is directly communicated using other contact methods other than the contact method that fails, avoiding terminal user in the prior art needs
Multiple contact methods including failure contact method are attempted to communicate one by one, thus save time of user with
Energy improves the use effect of address list in this way, the embodiment of the present invention can automatically identify the failure number in address list
Rate improves the communication efficiency of user.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (18)
1. a kind of contact person's processing method, which is characterized in that the described method includes:
The address list of terminal user is obtained, the address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on directly connection each other
The terminal user of people constructs at least one relation chain, wherein respectively includes in the address list of the both sides of direct contact person each other pair
The contact method of side;
Same correspondents are determined based on the address list of each terminal user in the relation chain, to the correspondent party of the same correspondents
The contact method to be conformed to a predetermined condition is compared in formula;
Based on the use data of the contact method to conform to a predetermined condition, each correspondent party to conform to a predetermined condition is analyzed
The feature of formula, filtering out and matching the contact method of default feature is failure contact method;
The terminal user based on direct contact person each other constructs at least one relation chain, comprising: with described direct each other
It is any terminal user in the terminal user of people is node, with other with any terminal user direct contact person each other
Terminal user is tandem node, constructs the relation chain based on the cascade node.
2. the method according to claim 1, wherein the address list for searching any two terminal user obtains
The terminal user of direct contact person each other, comprising:
Obtain the contact method of first terminal user and the contact method of second terminal user;
The contact method of the second terminal user is searched in the address list of the first terminal user, and, described
The contact method of the first terminal user is searched in the address list of two terminal users;
When determination is found, the first terminal user and the second terminal user direct contact person each other are determined.
3. the method according to claim 1, wherein the communication based on each terminal user in the relation chain
It records and determines same correspondents, the contact method of the same correspondents is compared the correspondent party to be conformed to a predetermined condition
Formula, comprising:
The contact person in the address list of each terminal user in the relation chain with same names is searched, is compared described with identical
The contact method of the contact person of title, if it is different, then determining that the contact method of the contact person with same names is described
The contact method to conform to a predetermined condition.
4. according to the method described in claim 3, it is characterized in that, the communication based on each terminal user in the relation chain
It records and determines same correspondents, the contact method of the same correspondents is compared the correspondent party to be conformed to a predetermined condition
Formula, comprising:
The contact person in the address list of each terminal user in the relation chain with identical contact method is searched, is had described in comparison
The title of the contact person of identical contact method conforms to a predetermined condition if it is different, then determining that the identical contact method is described
Contact method.
5. method according to claim 1 to 4, which is characterized in that described to be conformed to a predetermined condition based on described
Contact method use data, analyze the feature of each contact method to conform to a predetermined condition, it is default to filter out matching
The contact method of feature is failure contact method, comprising:
The use data for parsing corresponding first contact person of the first contact method, obtain first contact method by described first
It is use time of the people for Information Authentication mode;
Determine it is described be greater than first time threshold using time and the time difference of current time when, determine first correspondent party
Formula is the failure contact method of first contact person;
Wherein, first contact method is any contact method to conform to a predetermined condition, the artificial institute of first connection
State any contact person in the address list of each terminal user in relation chain with first contact method.
6. according to claim require any one of 1 to 4 described in method, which is characterized in that it is described based on it is described meet it is predetermined
The use data of the contact method of condition analyze the feature of each contact method to conform to a predetermined condition, filter out feature
Meet the contact method of default feature for failure contact method, comprising:
The associated application data for parsing corresponding second contact person of the second contact method, determine that second contact method is not used as institute
When stating the second contact person and using the association contact method of application, determine that second contact method is second contact person's
Fail contact method;
Wherein, second contact method is any contact method to conform to a predetermined condition, the artificial institute of second connection
State any contact person in the address list of each terminal user in relation chain with second contact method.
7. according to claim require any one of 1 to 4 described in method, which is characterized in that it is described based on it is described meet it is predetermined
The use data of the contact method of condition analyze the feature of each contact method to conform to a predetermined condition, filter out feature
Meet the contact method of default feature for failure contact method, comprising:
Parsing third contact method corresponds to the communication log data of third contact person, when obtaining the communication of the third contact method
Between;
When the time difference of the call duration time and current time that determine the third contact method being greater than second time threshold, determine
The third contact method is the failure contact method of the third contact person;
Wherein, the third contact method is any contact method to conform to a predetermined condition, and the third contacts artificial institute
State any contact person in the address list of each terminal user in relation chain with the third contact method.
8. the method according to any one of claim requirement 1 to 4, which is characterized in that the method also includes:
The communication log data of each contact person in address list based on third terminal user determine that the third terminal user's is logical
The use frequent degree that each contact person is communicated using different contact methods in news record;
The use of the different contact methods of each contact person in the address list of the third terminal user is sent frequently to third terminal
Degree information identifies the different contact methods of each contact person for the third terminal in the address list of the third terminal user
Use frequent degree information;
In response to the third terminal user for the difference of each contact person identified in the address list of the third terminal user
The operation using frequent degree information of contact method updates the communication of the third terminal user of synchronous storage in network side
The different contact methods of each contact person in record.
9. the method according to any one of claim requirement 1 to 4, which is characterized in that the method also includes:
The failure contact method in the address list of the 4th terminal user is sent to the 4th terminal, for the 4th terminal described the
The failure contact method is identified in the address list of four terminal users;
In response to the 4th terminal user for the failure contact method identified in the address list of the 4th terminal user
Operation updates the contact method that fails described in the address list of the 4th terminal user of synchronous storage in network side.
10. a kind of contact person's processing server, which is characterized in that the server includes:
Module is obtained, for obtaining the address list of terminal user, the address list includes the correspondent party of the contact person of terminal user
Formula;
Searching module, the address list for searching any two terminal user obtain the terminal user of direct contact person each other, base
At least one relation chain is constructed in the terminal user of direct contact person each other, wherein the communication of the both sides of direct contact person each other
The contact method of other side is respectively included in record;
First determining module, the address list of each terminal user determines in the relation chain for being constructed based on the searching module
Same correspondents the contact method of the same correspondents are compared the contact method to be conformed to a predetermined condition;
Screening module, for the use number based on the contact method to conform to a predetermined condition described in first determining module determination
According to analyzing the feature of each contact method to conform to a predetermined condition, filter out and match the contact method of default feature to lose
Imitate contact method;
The searching module, is specifically used for: being section with any terminal user in the terminal user of the contact person direct each other
Point, using other terminal users with any terminal user direct contact person each other as tandem node, based on cascade described
Node constructs the relation chain.
11. server according to claim 10, which is characterized in that the searching module is specifically used for: obtaining first eventually
The contact method of end subscriber and the contact method of second terminal user;Described in being searched in the address list of the first terminal user
The contact method of second terminal user, and, the first terminal user is searched in the address list of the second terminal user
Contact method;When determination is found, determine that the first terminal user and the second terminal user directly contact each other
People.
12. server according to claim 10, which is characterized in that first determining module is specifically used for: searching institute
The contact person in the address list of each terminal user in relation chain with same names is stated, the connection with same names is compared
The contact method of people, if it is different, then determining that the contact method of the contact person with same names meets predetermined item described in being
The contact method of part.
13. server according to claim 12, which is characterized in that first determining module is specifically used for: searching institute
The contact person in the address list of each terminal user in relation chain with identical contact method is stated, is compared described with identical correspondent party
The title of the contact person of formula, if it is different, then determining that the identical contact method is the contact method to conform to a predetermined condition.
14. server according to any one of claims 10 to 13, which is characterized in that the screening module is specifically used for:
The use data for parsing corresponding first contact person of the first contact method, obtain first contact method by first contact person
The time is used for Information Authentication mode;Described it is greater than first time threshold using time and the time difference of current time determining
When value, determine that first contact method is the failure contact method of first contact person;Wherein, first contact method
The communication of each terminal user in the artificial relation chain is contacted for any contact method to conform to a predetermined condition, described first
With any contact person of first contact method in record.
15. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the screening module, specifically
For: the associated application data of corresponding second contact person of the second contact method of parsing determine that second contact method is not used as
When second contact person uses the association contact method of application, determine that second contact method is second contact person
Failure contact method;Wherein, second contact method is any contact method to conform to a predetermined condition, described second
Contact any contact person in the address list of each terminal user in the artificial relation chain with second contact method.
16. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the screening module, specifically
For: parsing third contact method corresponds to the communication log data of third contact person, obtains the communication of the third contact method
Time;When the time difference of the call duration time and current time that determine the third contact method being greater than second time threshold, sentence
The fixed third contact method is the failure contact method of the third contact person;Wherein, the third contact method is any
The contact method to conform to a predetermined condition, the third contacts in the artificial relation chain to be had in the address list of each terminal user
There is any contact person of the third contact method.
17. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the server further include:
Second determining module determines institute for the communication log data of each contact person in the address list based on third terminal user
State the use frequent degree that each contact person is communicated using different contact methods in the address list of third terminal user;
First transceiver module, the different connection of each contact person in the address list for sending the third terminal user to third terminal
It is the use frequent degree information of mode, identifies each connection in the address list of the third terminal user for the third terminal
The use frequent degree information of the different contact methods of people;
First update module is identified for being directed in the address list of the third terminal user in response to the third terminal user
Each contact person different contact methods the operation using frequent degree information, update described the of synchronous storage in network side
The different contact methods of each contact person in the address list of three terminal users.
18. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the server further include:
Second transceiver module, the failure contact method in address list for sending the 4th terminal user to the 4th terminal, for institute
It states the 4th terminal and identifies the failure contact method in the address list of the 4th terminal user;
Second update module is identified for being directed in the address list of the 4th terminal user in response to the 4th terminal user
Failure contact method operation, update in network side and fail described in the address list of the 4th terminal user of synchronous storage
Contact method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610377964.7A CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
PCT/CN2017/084032 WO2017206696A1 (en) | 2016-05-31 | 2017-05-11 | Contact information processing method and apparatus, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610377964.7A CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106095814A CN106095814A (en) | 2016-11-09 |
CN106095814B true CN106095814B (en) | 2019-09-20 |
Family
ID=57230603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610377964.7A Active CN106095814B (en) | 2016-05-31 | 2016-05-31 | Contact person's processing method and server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106095814B (en) |
WO (1) | WO2017206696A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106095814B (en) * | 2016-05-31 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Contact person's processing method and server |
CN106682223B (en) * | 2017-01-04 | 2020-03-10 | 上海智臻智能网络科技股份有限公司 | Data validity detection method and device and intelligent interaction method and device |
CN106713676B (en) * | 2017-01-23 | 2019-08-06 | 北京安云世纪科技有限公司 | Communicating number identifies control method, device and communication terminal |
CN106850926B (en) * | 2017-02-21 | 2019-03-05 | 维沃移动通信有限公司 | A kind of failure contact person processing method, server and mobile terminal |
CN107295118A (en) * | 2017-06-28 | 2017-10-24 | 西安万像电子科技有限公司 | Contact searching method and device |
CN110166637B (en) * | 2018-02-12 | 2021-07-23 | 深圳市六度人和科技有限公司 | Empty number identification method and device |
CN110198286A (en) * | 2018-02-24 | 2019-09-03 | 阿里巴巴集团控股有限公司 | A kind of data processing method and calculate equipment |
CN110417926A (en) * | 2018-04-28 | 2019-11-05 | 冯泽 | Contact method for building up, system and computer readable storage medium |
CN110851453B (en) * | 2018-08-01 | 2022-09-20 | 国网辽宁招标有限公司 | Dynamic generation method of project address list |
CN111310538B (en) * | 2019-11-18 | 2020-11-17 | 万金芬 | Content management system based on big data server |
CN113885954A (en) * | 2021-09-26 | 2022-01-04 | 湖南于一科技有限公司 | Method, device and equipment for detecting zombie powder in WeChat address book and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781035A (en) * | 2014-01-10 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for communication processing based on mobile terminal |
CN104394258A (en) * | 2014-12-01 | 2015-03-04 | 广州三星通信技术研究有限公司 | Method and device for processing contact change of communication object |
CN104410694A (en) * | 2014-11-28 | 2015-03-11 | 东莞中国科学院云计算产业技术创新与育成中心 | Autonomous update method for cloud address book contact information based on data mining |
CN105357357A (en) * | 2015-10-14 | 2016-02-24 | 北京乐动卓越科技有限公司 | Telephone number management method and cloud server |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882953A (en) * | 2012-09-18 | 2013-01-16 | 李建成 | Communication number synchronization method and system |
CN103095884A (en) * | 2013-01-17 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Processing method and processing system for numbers of contact persons |
CN105141648B (en) * | 2014-06-09 | 2020-06-09 | 西安中兴新软件有限责任公司 | Address book updating method and terminal |
CN104023108B (en) * | 2014-06-18 | 2016-08-24 | 中国联合网络通信集团有限公司 | The method and apparatus removing terminal failure contact person |
CN106095814B (en) * | 2016-05-31 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Contact person's processing method and server |
-
2016
- 2016-05-31 CN CN201610377964.7A patent/CN106095814B/en active Active
-
2017
- 2017-05-11 WO PCT/CN2017/084032 patent/WO2017206696A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781035A (en) * | 2014-01-10 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for communication processing based on mobile terminal |
CN104410694A (en) * | 2014-11-28 | 2015-03-11 | 东莞中国科学院云计算产业技术创新与育成中心 | Autonomous update method for cloud address book contact information based on data mining |
CN104394258A (en) * | 2014-12-01 | 2015-03-04 | 广州三星通信技术研究有限公司 | Method and device for processing contact change of communication object |
CN105357357A (en) * | 2015-10-14 | 2016-02-24 | 北京乐动卓越科技有限公司 | Telephone number management method and cloud server |
Also Published As
Publication number | Publication date |
---|---|
CN106095814A (en) | 2016-11-09 |
WO2017206696A1 (en) | 2017-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106095814B (en) | Contact person's processing method and server | |
CN107291862A (en) | Business datum storage method, device, storage medium and electronic equipment | |
US20160006868A1 (en) | Method and System for Marking a Phone Number | |
CN110011988A (en) | Based on the certification authentication method and device of block chain, storage medium, electronic device | |
CN104618312B (en) | A kind of remote login methods, devices and systems of M2M application | |
CN108696511A (en) | A kind of public notification of information method, apparatus and relevant device based on block chain | |
CN105847288B (en) | A kind of identifying code treating method and apparatus | |
CN110602217B (en) | Block chain-based alliance management method, device, equipment and storage medium | |
CN110135194B (en) | Block chain-based industrial internet digital object management method | |
CN103164416A (en) | Identification method and device of user relationship | |
CN110266872B (en) | Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium | |
CN108710681A (en) | File acquisition method, device, equipment and storage medium | |
EP3961448A1 (en) | Method and system for detecting an infrastructure of malware or a cybercriminal | |
CN103150637A (en) | Express receiving terminal real-name management system and implementation method based on bar code technology | |
CN114780301B (en) | Disaster recovery method and system supporting multi-cloud production environment | |
CN106161406B (en) | The method and apparatus for obtaining user account | |
CN107070891A (en) | Service calling method and device | |
CN106060097A (en) | Management system and management method for information security competition | |
CN106682146B (en) | Method and system for retrieving scenic spot evaluation according to keywords | |
CN107579990A (en) | Measure of managing contract and server | |
CN110708309A (en) | Anti-crawler system and method | |
CN111818025B (en) | User terminal detection method and device | |
CN111461687B (en) | Application system of block chain service platform based on terminal equipment and implementation method thereof | |
CN110071966B (en) | Block chain networking and data processing method based on cloud platform | |
CN105530386B (en) | The determination method and its application process and system of a kind of communication identifier type of number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |