CN106095814B - Contact person's processing method and server - Google Patents

Contact person's processing method and server Download PDF

Info

Publication number
CN106095814B
CN106095814B CN201610377964.7A CN201610377964A CN106095814B CN 106095814 B CN106095814 B CN 106095814B CN 201610377964 A CN201610377964 A CN 201610377964A CN 106095814 B CN106095814 B CN 106095814B
Authority
CN
China
Prior art keywords
contact
contact method
terminal user
address list
contact person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610377964.7A
Other languages
Chinese (zh)
Other versions
CN106095814A (en
Inventor
林立
邓雨星
林�也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610377964.7A priority Critical patent/CN106095814B/en
Publication of CN106095814A publication Critical patent/CN106095814A/en
Priority to PCT/CN2017/084032 priority patent/WO2017206696A1/en
Application granted granted Critical
Publication of CN106095814B publication Critical patent/CN106095814B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42144Administration or customisation of services by service provider
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a kind of contact person's processing method and server, and method includes: the address list for obtaining terminal user, and address list includes the contact method of the contact person of terminal user;The address list for searching any two terminal user obtains the terminal user of direct contact person each other, and the terminal user based on direct contact person each other constructs at least one relation chain;Same correspondents are determined based on the address list of terminal user each in relation chain, the contact method of same correspondents are compared the contact method to be conformed to a predetermined condition;Use data based on the contact method to conform to a predetermined condition, analyze the feature of the contact method respectively to conform to a predetermined condition, and filtering out and matching the contact method of default feature is failure contact method.Using the present invention, it can recognize that the failure number in address list, improve the service efficiency of address list, improve the communication efficiency of user.

Description

Contact person's processing method and server
Technical field
The present invention relates to the data mining technology of technical field of information communication more particularly to a kind of contact person's processing method and Server.
Background technique
With popularizing for people's communication, many users used or were used multiple and different phone numbers, thus In the cell phone address book of user, multiple phone numbers may be stored with for the same contact person, however, these cell-phone numbers One or more may be currently in shutdown status or be changed hands by operator's recycling in code, this allows for the hand of user There is failures number (such as shut down or change hands) in the corresponding multiple numbers of same contact person in machine address list, when user will give When contact person makes a phone call or sends out message, can not accurately tell which or which number from the corresponding multiple numbers of contact person is Available number can only be attempted to dial one by one or be contacted, in this way, the time and efforts of user can be expended, reduce the use of address list Efficiency.
Summary of the invention
In view of this, can recognize that logical an embodiment of the present invention is intended to provide a kind of contact person's processing method and server Failure number in news record, improves the service efficiency of address list, improves the communication efficiency of user.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
In a first aspect, the embodiment of the present invention provides a kind of contact person's processing method, method includes:
The address list of terminal user is obtained, the address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on direct each other The terminal user of contact person constructs at least one relation chain;
Same correspondents are determined based on the address list of each terminal user in the relation chain, to the connection of the same correspondents It is that the contact method to be conformed to a predetermined condition is compared in mode;
Based on the use data of the contact method to conform to a predetermined condition, each connection to conform to a predetermined condition is analyzed It is the feature of mode, filtering out and matching the contact method of default feature is failure contact method.
Second aspect, the embodiment of the present invention provide a kind of contact person's processing server, and server includes:
Module is obtained, for obtaining the address list of terminal user, the address list includes the connection of the contact person of terminal user It is mode;
Searching module, the terminal that the address list for searching any two terminal user obtains direct contact person each other are used Family, the terminal user based on direct contact person each other construct at least one relation chain;
First determining module, the address list of each terminal user in the relation chain for being constructed based on the searching module It determines same correspondents, the contact method of the same correspondents is compared the contact method to be conformed to a predetermined condition;
Screening module, for making based on the contact method to conform to a predetermined condition described in first determining module determination With data, the feature of each contact method to conform to a predetermined condition is analyzed, the contact method for matching default feature is filtered out For the contact method that fails.
In the embodiment of the present invention, pass through each terminal in the relation chain to terminal user's building based on direct contact person each other The contact method of same correspondents in the address list of user is compared, and filters out the contact method to conform to a predetermined condition, and The failure contact method for going out to match default feature according to the Feature Selection of the contact method to conform to a predetermined condition, i.e., by multiple The contact method of the contact person of the address list of terminal user is analyzed, and failure correspondent party is identified from all contact methods Formula, terminal user directly use other contact methods other than the contact method that fails to communicate, avoid the prior art Middle terminal user needs to attempt to communicate one by one to multiple contact methods including failure contact method, to save The time and efforts of user improves address list in this way, the embodiment of the present invention can automatically identify the failure number in address list Service efficiency, improve the communication efficiency of user.
Detailed description of the invention
Fig. 1 is an optional configuration diagram of contact person's processing method in the embodiment of the present invention;
Fig. 2 is an optional flow diagram of contact person's processing method in the embodiment of the present invention;
Fig. 3 is an optional schematic diagram for implementing contact person's processing method in the embodiment of the present invention based on Fig. 1;
Fig. 4 is another optional flow diagram of contact person's processing method in the embodiment of the present invention;
Fig. 5 is the control schematic diagram in the embodiment of the present invention in address list before and after indicating failure contact method;
Fig. 6 is that mark uses the control schematic diagram before and after frequent degree information in address list in the embodiment of the present invention;
Fig. 7 a, which is that one of cleaning failure number function switch in the embodiment of the present invention is optional, realizes schematic diagram;
Fig. 7 b is another optional realization schematic diagram of cleaning failure number function switch in the embodiment of the present invention;
Fig. 7 c is the optional schematic diagram that a contact person corresponds to multiple telephone numbers in the embodiment of the present invention;
Fig. 7 d, which is that one of identification failure number function switch in the embodiment of the present invention is optional, realizes schematic diagram;
Fig. 7 e is an optional interface schematic diagram of cleaning failure number in the embodiment of the present invention;
Fig. 8 a is the optional flow diagram that failure telephone number is determined in the embodiment of the present invention;
Fig. 8 b is an optional schematic diagram of contact person's degree in the embodiment of the present invention;
Fig. 8 c is the optional data flow schematic diagram that failure telephone number is determined in the embodiment of the present invention;
Fig. 9 is an optional structural schematic diagram of contact person's processing server in the embodiment of the present invention;
Figure 10 is another optional structural schematic diagram of contact person's processing server in the embodiment of the present invention.
Specific embodiment
As follows to DESCRIPTION OF THE PRIOR ART first: there are following situations for the address list of terminal user: for the same connection People is stored with multiple telephone numbers, but one or more has been in shutdown status or has been returned by operator Receipts change hands and (have such as replaced service user), i.e., one or more of numbers are invalid number.When terminal user will give this position When the contact person for being stored with multiple telephone numbers makes a phone call or sends out message, terminal user faces this connection stored in address list Multiple telephone numbers of people, can not quickly, accurately tell which or which number is available number, can only attempt to dial one by one Or connection, the waste of the multiple time and efforts for attempting will lead to user to dial during this, in this way, the prior art can expend The excessive time and efforts of user, reduces the service efficiency of address list, reduces the communication efficiency of user.
The present invention is further described in detail below with reference to the accompanying drawings and embodiments.It should be appreciated that described herein Specific embodiment is only used to explain the present invention, is not intended to limit the present invention.In addition, embodiment provided below is to be used for Implement section Example of the invention, rather than provide and implement whole embodiments of the invention, is not paid in those skilled in the art Under the premise of creative work, the technical solution of following embodiment is carried out to recombinate resulting embodiment and based on to invention The other embodiments implemented all belong to the scope of protection of the present invention.
It should be noted that in embodiments of the present invention, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that including the method for a series of elements or device not only includes wanting of being expressly recited Element, but also including other elements that are not explicitly listed, or further include for implementation method or device intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Method or device in there is also other relevant factor (such as the step in method or units in device).For example, Contact person's processing method provided in an embodiment of the present invention contains a series of step, but connection provided in an embodiment of the present invention People's processing method is not limited to documented step, and similarly, contact person's processing server provided in an embodiment of the present invention includes A series of modules, but contact person's processing server provided in an embodiment of the present invention is not limited to include module be expressly recited, also Module/unit of required setting when may include to obtain relevant information or being handled based on information.
It should be noted that it is area that term " first " involved in the embodiment of the present invention/" second "/" third " etc., which is only, Not similar object does not represent the particular sorted for object, it is possible to understand that ground, " first "/" second "/" third " is in permission In the case of specific sequence or precedence can be interchanged.It should be understood that the object that " first "/" second "/" third " is distinguished is suitable It can be interchanged in the case of, so that the embodiment of the present invention described herein can be in addition to those of illustrating or describing herein Sequence in addition is implemented.
It should be pointed out that terminal can be smart phone, tablet computer, desktop computer, notes in the embodiment of the present invention This computer, wearable device (such as smartwatch) can support wired or wireless communication or support the various applications for communication Or the equipment of social software.
The technical solution that the embodiment of the present invention is recorded can be used for identifying that same contact person is corresponding multiple in address list Failure number in number;Show referring to an optional framework of contact person's processing method in the embodiment of the present invention shown in fig. 1 Meaning, includes: terminal 11, contact person's processing server 12 and the network 13 for supporting address list in framework shown in FIG. 1, terminal 11 with Contact person's processing server 12 carries out data interaction by network 13, and terminal 11 can be multiple;When user will give contact person When Lee * * makes a phone call or sends out message, when the address list of user query terminal 11, discovery is stored with corresponding to Lee * * in address list Three telephone numbers, respectively telephone number 1, telephone number 2 and telephone number 3 may still lose in this 3 numbers It imitates number (such as shut down or change hands), however, user is not aware that in this 3 numbers which is significant number in the prior art, uses Family can only attempt to dial one by one or contact, and the multiple trial dialled during this will expend the excessive time and efforts of user, drop The service efficiency of low address list reduces the communication efficiency of user.
It should be noted that application scenarios shown in Fig. 1 are only one of the technical solution that the embodiment of the present invention is recorded Possible example architecture, other application scenarios may include the terminal that Fig. 1 is not directed to or be installed in terminal for communication Using or social software etc..The technical solution that the embodiment of the present invention is recorded can be applied in above-mentioned scene, existing to help to overcome There is the existing time and efforts for expending user of technology, reduce the service efficiency of address list, reduces lacking for the communication efficiency of user It falls into.
Based on the application scenarios of above-mentioned record, following specific embodiment is proposed.
Embodiment one
The present embodiment provides a kind of contact person's processing methods, can be used for identifying the failure number of contact person in address list Code overcomes the time and efforts of the existing technology for expending user, reduces the service efficiency of address list, reduce the communication of user The defect of efficiency.
Referring to fig. 2, contact person's processing method that the present embodiment is recorded can be handled server implementation, method packet by contact person Include following steps:
Step 101, the address list for obtaining terminal user, address list includes the contact method of the contact person of terminal user.
Here, contact person's processing server obtains the address list of multiple terminal users from multiple terminals, for example, opening/making Network side, such as cloud server, contact person can be stored in the address list of the terminal user of address list synchronization function Server is managed after the authorization for obtaining each terminal user, the address list of these terminal users can be obtained from network side;It is optional , the implementation of the authorization of terminal user can be with are as follows: whether terminal user is arranged in address list synchronization function allows to contact People's processing server obtains the address list of terminal user, if then indicating that contact person's processing server obtains awarding for terminal user Power;Otherwise it is unauthorized;It should be noted that contact person's processing server can be same equipment with network side, or Different equipment;Here, the address list of a terminal user may include the title and correspondent party of the contact person of the terminal user Formula;Wherein, the contact method of contact person includes but is not limited to: telephone number, E-mail address, mailing address or user's using terminal Using the user identity voucher of (such as mobile phone assistant, wechat, QQ).
Step 102, the address list for searching any two terminal user obtain the terminal user of direct contact person each other, are based on The terminal user of direct contact person constructs at least one relation chain each other.
Here, the contact method of other side is respectively included in the address list of the both sides of direct contact person each other;Contact person's processing The address list that server searches any two terminal user obtains a kind of feasible reality of the terminal user of direct contact person each other Now mode includes:
Contact person's processing server obtains the contact method of first terminal user and the correspondent party of second terminal user respectively Formula;Here, first terminal user and second terminal user are the terminal user that any two in multiple terminal users are different;? The contact method of second terminal user is searched in the address list of first terminal user, and, in the address list of second terminal user The middle contact method for searching first terminal user;I.e. by searching for the address list of first terminal user to determine first terminal user Address list whether include second terminal user contact method, and by searching for the address list of second terminal user to determine The address list of two terminal users whether include first terminal user contact method, however, it is determined that when finding, that is, determine first The address list of terminal user includes that the address list of the contact method of second terminal user and second terminal user include first terminal When the contact method of user, first terminal user and second terminal user direct contact person each other are determined.
Terminal user based on direct contact person each other constructs a kind of feasible implementation packet of at least one relation chain Include: contact person's processing server using any terminal user in the terminal user of direct contact person each other as node, with it is any Terminal user each other direct contact person other terminal users be tandem node, based on cascade node construct relation chain;Assuming that First terminal user and second terminal user are judged as direct contact person, then contact person's processing server is with first terminal user For node, using second terminal user as tandem node, based on cascade node construct relation chain.
It should be noted that contact person's processing server needs to be traversed in the above-mentioned multiple terminal users of lookup in step 102 Any two terminal user, it is assumed that contact person's processing server obtains 3 different terminal users in total, such as user A, use The address list of family B and user C, then the following operations need to be performed for contact person's processing server: 1) searching the communication of user A, user B Whether each other record determines user A and user B direct contact person;2) address list for searching user A, user C, determines user A and use Family C whether each other direct contact person;3) address list for searching user B, user C determines whether user B and user C is direct each other Contact person;4) based on above-mentioned steps 1) construct at least one relationship to the terminal user of contact person direct each other determined by 3) Chain.
Step 103 determines same correspondents based on the address list of terminal user each in relation chain, to the connection of same correspondents It is that the contact method to be conformed to a predetermined condition is compared in mode.
A kind of feasible implementation of above-mentioned steps 103 includes: each end in contact person's processing server search relationship chain The title and contact method of each contact person in the address list of end subscriber, in search relationship chain in the address list of each terminal user With the presence or absence of the contact person with same names, if it is not, then process terminates;If so, comparing each terminal user in relation chain Whether the corresponding contact method of contact person in address list with same names is identical, if it is different, then determining with identical The corresponding contact method of the contact person of title is the contact method to conform to a predetermined condition.
The feasible implementation of another kind of above-mentioned steps 103 includes: each in contact person's processing server search relationship chain The title and contact method of each contact person in the address list of terminal user, the address list of each terminal user in search relationship chain In with the presence or absence of with identical contact method contact person, if it is not, then process terminates;If so, comparing each terminal in relation chain Whether the corresponding title of contact person in the address list of user with identical contact method is identical, if it is different, then determining phase It is the contact method to conform to a predetermined condition with contact method.
Step 104, the use data based on the contact method to conform to a predetermined condition, analyze the connection respectively to conform to a predetermined condition It is the feature of mode, filtering out and matching the contact method of default feature is failure contact method.
Here, be equivalent to and increase new attribute for each contact method: failure contact method or effective connection mode are (such as Be not screened (identification) be fail contact method contact method), in this, as user judge whether using, modification or delete connection It is one of the foundation of mode.
Optionally, contact person's processing server stores the failure contact method filtered out, such as will filter out Fail contact method write-in user failure contact method record sheet or database.
Here, based on the use data of the contact method to conform to a predetermined condition, the connection respectively to conform to a predetermined condition is analyzed The feature of mode, filtering out and matching the implementation that the contact method for presetting feature is failure contact method may include following It anticipates a kind of or combines:
Implementation 1:
The use data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, determination respectively meet predetermined What the contact method of condition was used for Information Authentication mode uses the time, determine using time and current time time difference whether Greater than first time threshold, if so, determining corresponding contact method for the contact method that fails;Otherwise, it is determined that corresponding connection Mode is effective connection mode.Optionally, Information Authentication mode is for example including based on the login of verifying short message, user's application registration etc. Mode;Here, first time threshold can be based on the progress such as historical data, actual demand by user/contact person's processing server Setting.
On the basis of implementation 1, correspond at least two contact persons for same contact method, for example, same electricity Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service Device parses the use data of corresponding first contact person of the first contact method, obtains the first contact method by the first contact person for believing Cease verification mode uses the time;Here, the first contact method is any contact method to conform to a predetermined condition, the first contact person To have any contact person of the first contact method in the address list of terminal user each in relation chain;Contact person's processing server is sentenced Surely whether it is greater than first time threshold using the time difference of time and current time, if so, determining that the first contact method is the The failure contact method of one contact person;Otherwise, it is determined that the first contact method is the effective connection mode of the first contact person.It needs It is bright, contact person's processing server need to parse respectively in relation chain in the address list of each terminal user have it is any meet it is pre- Any contact person of the contact method of fixed condition.
Implementation 2:
The associated application data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, judgement respectively meet Whether the contact method of predetermined condition is used as the association contact method of application, if it is not, then determining corresponding contact method for failure Contact method;If so, determining corresponding contact method for effective connection mode.Here, associated application data may include connection It is that mode is bound with application;The association contact method of application, for example, contact method are bound for verifying number, with connection Mode apply registration, bind contact method and the account of application etc..
On the basis of implementation 2, correspond at least two contact persons for same contact method, for example, same electricity Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service Device parses the associated application data of corresponding second contact person of the second contact method, judges whether the second contact method is used as second Contact person uses the association contact method of application, if it is not, then determining that the failure that the second contact method is the second contact person contacts Mode;If so, determining that the second contact method is the effective connection mode of the second contact person;Here, the second contact method is to appoint One contact method to conform to a predetermined condition has the second connection in the address list of each terminal user in the second artificial relation chain of connection Any contact person of mode.It should be noted that contact person's processing server needs to parse each terminal user in relation chain respectively Address list in any contact method to conform to a predetermined condition any contact person.
Implementation 3:
The communication log data for the contact method that the parsing of contact person's processing server respectively conforms to a predetermined condition, determination respectively meet The call duration time of the contact method of predetermined condition, determines whether the time difference of call duration time and current time is greater than the second time threshold Value, if so, determining corresponding contact method for the contact method that fails;Otherwise, it is determined that corresponding contact method is effective connection Mode.Optionally, call duration time for example can for the last communication occasions (such as the last transmitting-receiving short message, make a phone call or At the time of mail) etc.;Here, second time threshold can be based on historical data by user/contact person's processing server, reality needs It asks etc. and to be set.
On the basis of implementation 3, correspond at least two contact persons for same contact method, for example, same electricity Words number is recycled the scene to change hands by operator, and contact person's processing server is not only it needs to be determined that failure contact method, it is also necessary to Determine that the failure contact method corresponds to which of at least two contact persons or whole;Specifically, contact person handles service Device parsing third contact method corresponds to the communication log data of third contact person, obtains the call duration time of third contact method;This In, third contact method is any contact method to conform to a predetermined condition, and third contacts each terminal user in artificial relation chain With any contact person of third contact method in address list;When contact person's processing server determines the communication of third contact method Between with time difference of current time whether be greater than second time threshold, if so, determining that third contact method is third contact person Failure contact method;Otherwise, it is determined that third contact method is the effective connection mode of third contact person.It should be noted that Contact person's processing server, which needs to parse respectively, has any conform to a predetermined condition in the address list of each terminal user in relation chain Contact method any contact person.
Optionally, contact person's processing server determines that terminal user's is logical when satisfaction failure contact method issues condition Failure contact method in news record, and the failure contact method into the address list of terminal transmission terminal user, for terminal at end Indicating failure contact method in the address list of end subscriber.Here, contact person's processing server meets clockwork spring under failure contact method The implementation of part may include any one following or combination:
1) terminal receive user triggering be directed to address list failure number cleaning operation when, to contact person processing service Device sends the request of the address list for management of end-user;Contact person's processing server is used to manage in response to what terminal was sent Failure contact method in the address list of terminal user is sent to terminal by the request of the address list of terminal user.
2) when the failure Number Reorganization for designated contact in address list that terminal receives user's triggering operates, Xiang Lian It is the request for the contact person in address list that people's processing server is sent for management of end-user, specified connection is carried in the request The title of people or contact method to be identified;The leading to for management of end-user that contact person's processing server is sent in response to terminal The request for interrogating record, is sent to terminal for the failure contact method of the designated contact in the address list of terminal user.
3) it periodically issues.
4) active of event triggering issues, such as contact person's processing server detects the mistake in the address list of terminal user The absolute quantity or relative populations for imitating contact method are more than preset quantity thresholding.
Contact person's processing server determines a kind of feasible realization of the failure contact method in the address list of terminal user Mode includes: contact person's processing server by the contact method of contact person each in the address list of terminal user, respectively with it is above-mentioned The failure contact method filtered out is matched, and the failure contact method in the address list of terminal user is obtained;Optionally, it contacts People's processing server saves the failure contact method in the address list of determining terminal user.
Failure contact method in the address list for the terminal user that terminal is sent according to contact person's processing server, in terminal Indicating failure contact method in the address list of user;So that terminal user is for the failure connection identified in the address list of terminal user It is that mode is operated, for example, the failure contact method that terminal user will identify in address list is completely or partially deleted, alternatively, Terminal user cancels the mark that some or all of failure contact method contact method is identified as in address list, for example, user Know that being identified as one or more contact methods of failure contact method is effective contact method in fact.
After terminal user is operated for the failure contact method identified in the address list of terminal user, contact person Processing server, for the operation of the failure contact method identified in the address list of terminal user, updates net in response to terminal user Fail in the address list of the terminal user of synchronous storage contact method in network side;Optionally, in terminal user by terminal user's When being identified as the mark cancellation of the contact method of failure contact method in address list, contact person's processing server will be from above-mentioned screening The contact method for being cancelled mark is deleted in failure contact method out.
Below with reference to application scenarios shown in fig. 1, the contact person's processing method recorded to the present embodiment is illustrated: The optional schematic diagram that contact person is handled is implemented based on framework shown in FIG. 1 referring in the embodiment of the present invention shown in Fig. 3, Contact person's processing method shown in Fig. 3 includes:
Step 201, when the terminal user of terminal 11 wants to make a phone call to Lee * * or send out message, end user query terminal 11 Address list, discovery in address list Lee * * is stored with 3 telephone numbers, respectively telephone number 1, telephone number 2 and electricity under one's name Number 3 is talked about, at this point, terminal user faces the corresponding multiple telephone numbers of Lee contact person * *, it is not known which phone should be used Number.
Step 202, terminal 11 detect that terminal user is inquiring address list and resting on the corresponding letter of Lee contact person * * The page is ceased, and terminal 11 finds that Lee contact person * * when being corresponding with multiple telephone numbers, is then sent to contact person's processing server 12 The request of the address list of terminal user for management terminal 11 carries the title of Lee contact person * * in the request, or carries The corresponding multiple telephone numbers of Lee contact person * *.
Step 203, contact person's processing server 12 are according to the title of Lee contact person * *, from the end of predetermined terminal 11 The failure telephone number of Lee contact person * * is found in the failure contact method of the address list of end subscriber;Alternatively, contact person is handled Server 12 carries out the corresponding multiple telephone numbers of Lee * * in the address list of terminal user with the failure contact method filtered out Matching, determines the failure telephone number of Lee * *.Here, suppose that the failure telephone number of Lee * * is telephone number 1 and telephone number 3。
Step 204, contact person's processing server 12 are by the failure telephone number (telephone number 1 and telephone number 3) of Lee * * It is sent to terminal 11.
Failure telephone number (the telephone number for Lee * * that step 205, terminal 11 are sent according to contact person's processing server 12 1 and telephone number 3), the corresponding telephone number 1 of Lee * * and telephone number 3 are divided in the address list of the terminal user of terminal 11 It is not identified as " failure ", to identify the failure telephone number (telephone number 1 and telephone number 3) of Lee * *.
So, terminal user can directly select the telephone number 2 for not being identified as to fail and make a phone call to Lee * * Or hair message, thus avoiding user from attempting the feelings dialed or contacted one by one to multiple numbers including failure telephone number Under condition, the failure number in address list is automatically identified, overcomes consuming user time of the existing technology and energy, is reduced logical The service efficiency for interrogating record, reduces the defect of the communication efficiency of user.
In the present embodiment, pass through each terminal user in the relation chain to terminal user's building based on direct contact person each other Address list in the contact methods of same correspondents be compared, filter out the contact method to conform to a predetermined condition, and according to The Feature Selection of the contact method to conform to a predetermined condition goes out the failure contact method for matching default feature, i.e., by multiple terminals The contact method of the contact person of the address list of user is analyzed, and failure contact method is identified from all contact methods, eventually End subscriber directly uses other contact methods (i.e. effective connection mode) other than the contact method that fails to be communicated, and avoids Terminal user needs to including that multiple contact methods including failing contact method are attempted to communicate one by one in the prior art, To save the time and efforts of user, in this way, the present embodiment can automatically identify the failure number in address list, improve The service efficiency of address list improves the communication efficiency of user.
Embodiment two
Based on the above embodiment, the present embodiment receives the connection that fails in the cleaning address list of terminal user's triggering for terminal Processing scheme when being the operation instruction of mode is illustrated.
Referring to fig. 4, contact person's processing method that the present embodiment is recorded can be with terminal and contact person's processing server Implement, method the following steps are included:
Step 301, terminal detection terminal user are directed to the operation of address list.
Step 302, terminal detect the behaviour of terminal user's triggering cleared up for the contact method that fails in address list When indicating, the message of the failure contact method for obtaining each contact person in address list is sent to contact person's processing server; The contact method of all contact persons in mark, contact method or address list in the message including terminal user.
Step 303, contact person's processing server are used to obtain each contact person in address list in response to what terminal user sent Failure contact method message, obtain screening determining multiple terminal users' in advance by inquiring pre-generated database Fail contact method, and the contact method of contact person each in the address list of the terminal user is more with preparatory screening determination respectively The failure contact method of a terminal user matches, and obtains the failure correspondent party of each contact person in the address list of the terminal user Formula, or the mistake of each contact person in the address list of the predetermined terminal user is obtained by inquiring pre-generated database Imitate contact method.
Step 304, contact person's processing server join the failure of contact person each in the address list of the obtained terminal user It is that mode is sent to the terminal.
Step 305, terminal handle the failure contact method of each contact person in the address list of server feedback according to contact person, Contact method corresponding in address list is identified as failure contact method, referring to the mistake of each contact person in the address list shown in Fig. 5 The control schematic diagram that contact method (illustrating in Fig. 5 with telephone number) is identified front and back is imitated, so that terminal user is directed to address list In be identified as failure contact method contact method operation, for example, the failure correspondent party that terminal user will identify in address list Formula is completely or partially deleted, alternatively, terminal user will be identified as some or all of failure contact method correspondent party in address list The mark of formula is cancelled, for example, user knows that being identified as one or more contact methods of failure contact method is effective in fact Contact method.
In the present embodiment, when terminal user needs the failure contact method to address list to clear up, terminal takes from terminal Business device is requested to obtain the failure contact method of each contact person in address list and is identified in address list, and it is each for being equivalent to Be that mode increases new attribute: failure contact method or effective connection mode (are not identified as failure contact method in such as address list Contact method), in this, as user judge whether using, modification or delete contact method foundation one of, save user's Time and efforts improves the accuracy and efficiency that terminal user arranges address list.
Embodiment three
Based on the above embodiment, the present embodiment wishes the difference that each contact person is identified in address list for terminal user The demand using frequent degree information of contact method proposes the technical solution solved, specifically includes:
The different contact methods for being used to request each contact person that contact person's processing server actively or in response to terminal is sent The message using frequent degree information, the communication log data of each contact person in the address list based on terminal user determine eventually The use frequent degree that each contact person is communicated using different contact methods in the address list of end subscriber;Here, using frequency Numerous degree may include the information such as commonly using, being of little use;
Contact person's processing server sends the different contact methods of each contact person in the address list of terminal user to terminal Use frequent degree information.
The use frequent degree that terminal identifies the different contact methods of each contact person in the address list of terminal user is believed Breath;Here, it is equivalent to and increases new attribute for each contact method: commonly using or be of little use, judge whether to make in this, as user With, modification or delete contact method foundation one of;It should be noted that the present embodiment is based on the above embodiment, the present embodiment In contact method use frequent degree information (commonly use, be of little use), refer to that contact person is communicated (electricity using contact method Words, short message, associated application) use frequent degree;The contact method for being not labeled as failure (or being noted as effectively) may It is identified as commonly using, it is also possible to be identified as being of little use;Referring to each contact person in the address list shown in Fig. 6 contact method (with Telephone number citing) it is marked using the control schematic diagram before and after frequent degree information, while checking that Fig. 5 and Fig. 6 can be sent out It is existing:
1) in Fig. 5 the telephone number 2 of Lee * *, money * * telephone number 7 be not labeled as failing, and, in Fig. 6 The telephone number 2 of Lee * *, the telephone number 7 of money * * are noted as commonly using;That is, the telephone number 2 of Lee * *, money * * Telephone number 7 is effective and commonly used telephone number;
2) telephone number 4, the telephone number 5 of * * are not labeled as failing in Fig. 5, and, the * * in Fig. 6 Telephone number 4 is noted as commonly using, and still, the telephone number 5 of * * is noted as being of little use;That is, the phone of * * Number 4 is effective and commonly used telephone number, and the telephone number 5 of * * is the telephone number effectively but being of little use.
Terminal user is frequent for the use of the different contact methods of each contact person identified in the address list of terminal user The operation of degree information, for example, being deleted the contact method being of little use is identified as in address list, alternatively, by being identified in address list Cancel for " being of little use " mark for the one or more contact methods being of little use, for example, user, which knows, is identified as " being of little use " One or more contact methods be authentic and valid and common contact method in fact;Here, terminal user can also will be marked Note is that the contact method of " being of little use " is purged as failure contact method, for example, terminal user can be based in address list The use frequent degree information of the different contact methods of each contact person of mark clears up the failure contact method in address list.
Contact person's processing server is in response to terminal user for each contact person's identified in the address list of terminal user The operation using frequent degree information of different contact methods updates in network side in the address list of the terminal user of synchronous storage The different contact methods of each contact person;For example, updating the mark of corresponding contact method, or corresponding contact method is deleted.
Example IV
The present embodiment is based on above-mentioned any embodiment, respectively from product side and technology side to contact person's processing method above-mentioned Realization process be illustrated.
1, product side:
A) operation interface
Referring to Fig. 7 a, user can detect whether the machine has failure number in address list doctor's physical examination, and prompt user It is arranged;Alternatively,
Referring to Fig. 7 b, user can also voluntarily enter from address list sorting module, arrange failure number;Alternatively,
Referring to Fig. 7 c, when user searches the telephone number of contact person from address list, the corresponding multiple electricity of contact person are faced Should number be talked about, it is not known which be used? the contact person that terminal is corresponding with multiple telephone numbers in showing address list is (right Answer multiple) the page, the button or operation entry for increasing sign failure number are selected for user, referring to Fig. 7 d, alternatively, eventually End actively prompts user's end when detecting user and searching the information for being corresponding with the contact person of multiple telephone numbers from address list Rectify the failure number in the corresponding multiple telephone numbers of identification contact person, and recognition result is presented to user.
B) function
After cloud server (such as above-mentioned contact person's processing server) analysis, it will judge that label (recognition result) is in Now to user referring to Fig. 7 e, user can independently choose whether to handle these numbers.
2, technology side:
Failure telephone number calculating be divided into off-line calculation part and online service part, due to processing data volume very Greatly, therefore off-line calculation can be carried out in Hadoop platform, then the result of off-line calculation is imported into storage, online service Inquiry storage, has the part of calculated result to return to user when handling user's request;Referring to the failure phone shown in Fig. 8 a Number calculation process.
It is imported into computing platform firstly the need of by the data of any active ues, computing platform used herein is Hadoop Platform.When user uses address list synchronization function, system background can be imported the contact data of the user in the form of log To computing platform (since the data of synchronous assistant are related to privacy, data all storing in a manner of encryption in computing platform).
1) customer relationship circle is established:
Centered on active user, by the contact person in his address list, if the contact person of he and address list is same Step assistant deposits the number of both sides, then they can establish 1 degree of contact person.For all 1 degree of contact persons, them are successively taken out Contact person in address list resettles 1 degree of contact person, at this point, central user just has 2 degree of human connection circle, these Information Numbers User -> telephone number form imported into computing platform accordingly.Here, the degree of contact person specifically: if two users are mutual Phone number is deposited, then claiming the two users 1 degree of contact person each other, if all there is 1 degree of common connection between two users It is people, then claim the two users 2 degree of contact persons each other, and so on.Referring to Fig. 8 b, user A and B and C are respectively 1 degree and contact People, user A and D are 2 degree of contact persons, and user A and E are 3 degree of contact persons.
The calculating of human connection circle is partially established offline, and offline part uses Hadoop system, establishes connection human connection in systems Table can establish human connection circle using the computing capability of Hadoop in global data, establish the condition and previous step phase of human connection circle Seemingly: mutually depositing number people can establish relationship, and it is spare to establish human connection table in this approach.
2) suspicion number is filtered out:
The number for thinking user may be failure there are two types of situation: a kind of situation is this user in circle of friends, he Name deposit number by multiple friends, and the number deposited is different;Another situation is that the same number, is deposited not Same name, and under this different name, and include multiple numbers.Both of these case will be considered as suspicion number.Certainly Rate that such case is that there is a certain error, but some Restoration Mechanisms will be used to prevent user's mistake from having deleted number, but can look for It returns.
The identification of suspicion number: use a plurality of ways to whether one number of identification is used recently: for example, joint hand The flow short-message verification of machine house keeper, is had be used using the explanation of flux modification recently;Alternatively, whether phone number has binding Synchronous assistant, has the number of binding to be largely used;Alternatively, whether the number has the record of call recently, have logical Words record is used.Frequent above-mentioned several investigation steps, can find whether corresponding number is most recently used, if very It is not used for a long time, is then considered as failure number.
3) it the definition for the period of failure number: for example, original number in continuous 3 months is considered as failure number, beats The label of upper failure, it is for reference.Show that user uses the rear not used time from the last time simultaneously.If because judging item Part is insufficient, data deficiency, and what can not be judged does not show failure label then.
It after offline platform is calculated, will imported into line platform, online service with quick search and can return to use Family;The data flow of whole flow process is as shown in Figure 8 c.
The present embodiment solves for user by big data background analysis and identifies that a contact person has more in cell phone address book Pain spot of a number comprising the number that failed improves user and finds the number call of needs in address list or send information Operating efficiency has evaded the multiple waste for attempting to lead to time and efforts dialled during this;Based on the present embodiment, it is able to achieve Automatically authentic and valid and common telephone number in the multiple numbers of contact person is identified for user, further promote the use of user Experience.
The present embodiment proposes the failure telephone number people that user is found using contact person's circle, from contact person's circle, The stored multiple cell-phone numbers of contact person are found out, failure number is identified from these numbers.The use data of synthetic user, can To form contact person's circle from the contact relationship data of user, and for the user in contact person's circle, contact person's phase is calculated Close data be synchronized using time, to judge whether number is being used or not used duration in the recent period, from for a long time not It synchronizes and searches out no longer valid number in the contact person used, show user, whether delete failure with for reference Contact number.
Embodiment five
Corresponding with the record of previous embodiment one, the present embodiment records a kind of contact person's processing server, referring to Fig. 9, Contact person's processing server 41 shown in Fig. 9 includes:
Module 401 is obtained, for obtaining the address list of terminal user, address list includes the connection of the contact person of terminal user Mode;
Searching module 402, the address list for searching any two terminal user obtain the terminal of direct contact person each other User, the terminal user based on direct contact person each other construct at least one relation chain;
First determining module 403, the address list of each terminal user is true in the relation chain for being constructed based on searching module 402 Determine same correspondents, the contact method of same correspondents is compared the contact method to be conformed to a predetermined condition;
Screening module 404, the use of the contact method to conform to a predetermined condition for being determined based on the first determining module 403 Data analyze the feature of the contact method respectively to conform to a predetermined condition, and filtering out and matching the contact method of default feature is failure Contact method.
The present embodiment is analyzed by the contact method of the contact person of the address list to multiple terminal users, from all It is that failure contact method is identified in mode, terminal user can directly use other connections other than the contact method that fails Mode is communicated, and is avoided terminal user in the prior art and is needed to multiple contact methods including failure contact method It attempts to be communicated one by one, to save the time and efforts of user, improves the communication efficiency of user.
On the basis of the above embodiments, searching module 402 are specifically used for: obtaining the contact method of first terminal user And the contact method of second terminal user;The contact method of second terminal user is searched in the address list of first terminal user, And the contact method of first terminal user is searched in the address list of second terminal user;It determines when finding, determines the One terminal user and second terminal user direct contact person each other.
On the basis of the above embodiments, searching module 402 are specifically used for: with the terminal user of direct contact person each other In any terminal user be node, with other terminal users with any terminal user direct contact person be each other a grade interlink Point constructs relation chain based on cascade node.
On the basis of the above embodiments, the first determining module 403, is specifically used for: each terminal user in search relationship chain Address list in same names contact person, compare have same names contact person contact method, if it is different, then really Surely the contact method of the contact person with same names is the contact method to conform to a predetermined condition.
On the basis of the above embodiments, the first determining module 403, is specifically used for: each terminal user in search relationship chain Address list in identical contact method contact person, compare have identical contact method contact person title, if it is different, Then determine that identical contact method is the contact method to conform to a predetermined condition.
On the basis of the above embodiments, screening module 404 are specifically used for: the first contact method of parsing corresponding first It is the use data of people, obtains the first contact method by the first contact person and use the time for Information Authentication mode;In determination When being greater than first time threshold using time and the time difference of current time, determine that the first contact method is the mistake of the first contact person Imitate contact method;Wherein, the first contact method is any contact method to conform to a predetermined condition, and first contacts in artificial relation chain With any contact person of the first contact method in the address list of each terminal user.
On the basis of the above embodiments, screening module 404 are specifically used for: the second contact method of parsing corresponding second It is the associated application data of people, determines that the second contact method is not used as the association contact method that the second contact person uses application When, determine that the second contact method is the failure contact method of the second contact person;Wherein, the second contact method be it is any meet it is predetermined The contact method of condition, second contacts any in the address list of each terminal user in artificial relation chain with the second contact method Contact person.
On the basis of the above embodiments, screening module 404 are specifically used for: parsing third contact method corresponds to third connection It is the communication log data of people, obtains the call duration time of third contact method;The call duration time that determines third contact method with When the time difference of current time is greater than second time threshold, determine third contact method for the failure correspondent party of third contact person Formula;Wherein, third contact method is any contact method to conform to a predetermined condition, and third contacts each terminal in artificial relation chain and uses With any contact person of third contact method in the address list at family.
On the basis of Fig. 9 shows structure, the present embodiment also records another contact person's processing server, referring to Figure 10, Contact person's processing server 42 shown in Figure 10 also includes: to obtain module 401, searching module 402, the first determining module 403, sieve Modeling block 404, and each module also has the function of shown in Fig. 9 and connection relationship;Meanwhile contact person's processing server 42 is also Include:
Second determining module 501, for the communication log data of each contact person in the address list based on third terminal user, Determine the use frequent degree that each contact person is communicated using different contact methods in the address list of third terminal user;
First transceiver module 502, for third terminal send third terminal user address list in each contact person not With the use frequent degree information of contact method, identify each contact person's in the address list of third terminal user for third terminal The use frequent degree information of different contact methods;
First update module 503 is identified for being directed in the address list of third terminal user in response to third terminal user Each contact person different contact methods the operation using frequent degree information, the third for updating synchronous storage in network side is whole The different contact methods of each contact person in the address list of end subscriber.
Optionally, contact person's processing server 42 further include:
Second transceiver module 504, the failure correspondent party in address list for sending the 4th terminal user to the 4th terminal Formula, for the 4th terminal in the address list of the 4th terminal user indicating failure contact method;
Second update module 505 is identified for being directed in the address list of the 4th terminal user in response to the 4th terminal user Failure contact method operation, update the correspondent party that fails in the address list of the 4th terminal user of synchronous storage in network side Formula.
In practical application, it is true to obtain module 401, searching module 402, the first determining module 403, screening module 404, second Cover half block 501, the first transceiver module 502, the first update module 503, the second transceiver module 504, the second update module 505 By central processing unit (Central Processing Unit, CPU), the microprocessor of contact person's processing server (Microprocessor Unit, MPU), specific integrated circuit (Application Specific Integrated Circuit, ASIC) or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realize.
Embodiment six
The present embodiment records a kind of computer-readable medium, can for read-only memory (Read-Only Memory, ROM), flash memory (FLASH) memory, transfer device etc., can also be magnetic storage medium (for example, tape, disc driver etc.), Optical storage medium is (for example, CD-ROM (Compact Disc-ROM, CD-ROM), digital video disc-ROM (Digital Video Disc-ROM, DVD-ROM), paper card, paper tape etc.) and other well-known types program storage;Computer-readable Jie Computer executable instructions are stored in matter, when executing an instruction, causing at least one processor to execute includes operation below:
The address list of terminal user is obtained, address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on direct each other The terminal user of contact person constructs at least one relation chain;
Determine same correspondents based on the address list of terminal user each in relation chain, to the contact methods of same correspondents into Row compares the contact method to be conformed to a predetermined condition;
Use data based on the contact method to conform to a predetermined condition, analyze the contact method respectively to conform to a predetermined condition Feature, filtering out and matching the contact method of default feature is failure contact method.
To sum up, pass through the communication of each terminal user in the relation chain to terminal user's building based on direct contact person each other The contact method of same correspondents in record is compared, and filters out the contact method to conform to a predetermined condition, and pre- according to meeting The Feature Selection of the contact method of fixed condition goes out the failure contact method for matching default feature, i.e., by multiple terminal users' The contact method of the contact person of address list is analyzed, and failure contact method, terminal user are identified from all contact methods It is directly communicated using other contact methods other than the contact method that fails, avoiding terminal user in the prior art needs Multiple contact methods including failure contact method are attempted to communicate one by one, thus save time of user with Energy improves the use effect of address list in this way, the embodiment of the present invention can automatically identify the failure number in address list Rate improves the communication efficiency of user.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (18)

1. a kind of contact person's processing method, which is characterized in that the described method includes:
The address list of terminal user is obtained, the address list includes the contact method of the contact person of terminal user;
The address list for searching any two terminal user obtains the terminal user of direct contact person each other, based on directly connection each other The terminal user of people constructs at least one relation chain, wherein respectively includes in the address list of the both sides of direct contact person each other pair The contact method of side;
Same correspondents are determined based on the address list of each terminal user in the relation chain, to the correspondent party of the same correspondents The contact method to be conformed to a predetermined condition is compared in formula;
Based on the use data of the contact method to conform to a predetermined condition, each correspondent party to conform to a predetermined condition is analyzed The feature of formula, filtering out and matching the contact method of default feature is failure contact method;
The terminal user based on direct contact person each other constructs at least one relation chain, comprising: with described direct each other It is any terminal user in the terminal user of people is node, with other with any terminal user direct contact person each other Terminal user is tandem node, constructs the relation chain based on the cascade node.
2. the method according to claim 1, wherein the address list for searching any two terminal user obtains The terminal user of direct contact person each other, comprising:
Obtain the contact method of first terminal user and the contact method of second terminal user;
The contact method of the second terminal user is searched in the address list of the first terminal user, and, described The contact method of the first terminal user is searched in the address list of two terminal users;
When determination is found, the first terminal user and the second terminal user direct contact person each other are determined.
3. the method according to claim 1, wherein the communication based on each terminal user in the relation chain It records and determines same correspondents, the contact method of the same correspondents is compared the correspondent party to be conformed to a predetermined condition Formula, comprising:
The contact person in the address list of each terminal user in the relation chain with same names is searched, is compared described with identical The contact method of the contact person of title, if it is different, then determining that the contact method of the contact person with same names is described The contact method to conform to a predetermined condition.
4. according to the method described in claim 3, it is characterized in that, the communication based on each terminal user in the relation chain It records and determines same correspondents, the contact method of the same correspondents is compared the correspondent party to be conformed to a predetermined condition Formula, comprising:
The contact person in the address list of each terminal user in the relation chain with identical contact method is searched, is had described in comparison The title of the contact person of identical contact method conforms to a predetermined condition if it is different, then determining that the identical contact method is described Contact method.
5. method according to claim 1 to 4, which is characterized in that described to be conformed to a predetermined condition based on described Contact method use data, analyze the feature of each contact method to conform to a predetermined condition, it is default to filter out matching The contact method of feature is failure contact method, comprising:
The use data for parsing corresponding first contact person of the first contact method, obtain first contact method by described first It is use time of the people for Information Authentication mode;
Determine it is described be greater than first time threshold using time and the time difference of current time when, determine first correspondent party Formula is the failure contact method of first contact person;
Wherein, first contact method is any contact method to conform to a predetermined condition, the artificial institute of first connection State any contact person in the address list of each terminal user in relation chain with first contact method.
6. according to claim require any one of 1 to 4 described in method, which is characterized in that it is described based on it is described meet it is predetermined The use data of the contact method of condition analyze the feature of each contact method to conform to a predetermined condition, filter out feature Meet the contact method of default feature for failure contact method, comprising:
The associated application data for parsing corresponding second contact person of the second contact method, determine that second contact method is not used as institute When stating the second contact person and using the association contact method of application, determine that second contact method is second contact person's Fail contact method;
Wherein, second contact method is any contact method to conform to a predetermined condition, the artificial institute of second connection State any contact person in the address list of each terminal user in relation chain with second contact method.
7. according to claim require any one of 1 to 4 described in method, which is characterized in that it is described based on it is described meet it is predetermined The use data of the contact method of condition analyze the feature of each contact method to conform to a predetermined condition, filter out feature Meet the contact method of default feature for failure contact method, comprising:
Parsing third contact method corresponds to the communication log data of third contact person, when obtaining the communication of the third contact method Between;
When the time difference of the call duration time and current time that determine the third contact method being greater than second time threshold, determine The third contact method is the failure contact method of the third contact person;
Wherein, the third contact method is any contact method to conform to a predetermined condition, and the third contacts artificial institute State any contact person in the address list of each terminal user in relation chain with the third contact method.
8. the method according to any one of claim requirement 1 to 4, which is characterized in that the method also includes:
The communication log data of each contact person in address list based on third terminal user determine that the third terminal user's is logical The use frequent degree that each contact person is communicated using different contact methods in news record;
The use of the different contact methods of each contact person in the address list of the third terminal user is sent frequently to third terminal Degree information identifies the different contact methods of each contact person for the third terminal in the address list of the third terminal user Use frequent degree information;
In response to the third terminal user for the difference of each contact person identified in the address list of the third terminal user The operation using frequent degree information of contact method updates the communication of the third terminal user of synchronous storage in network side The different contact methods of each contact person in record.
9. the method according to any one of claim requirement 1 to 4, which is characterized in that the method also includes:
The failure contact method in the address list of the 4th terminal user is sent to the 4th terminal, for the 4th terminal described the The failure contact method is identified in the address list of four terminal users;
In response to the 4th terminal user for the failure contact method identified in the address list of the 4th terminal user Operation updates the contact method that fails described in the address list of the 4th terminal user of synchronous storage in network side.
10. a kind of contact person's processing server, which is characterized in that the server includes:
Module is obtained, for obtaining the address list of terminal user, the address list includes the correspondent party of the contact person of terminal user Formula;
Searching module, the address list for searching any two terminal user obtain the terminal user of direct contact person each other, base At least one relation chain is constructed in the terminal user of direct contact person each other, wherein the communication of the both sides of direct contact person each other The contact method of other side is respectively included in record;
First determining module, the address list of each terminal user determines in the relation chain for being constructed based on the searching module Same correspondents the contact method of the same correspondents are compared the contact method to be conformed to a predetermined condition;
Screening module, for the use number based on the contact method to conform to a predetermined condition described in first determining module determination According to analyzing the feature of each contact method to conform to a predetermined condition, filter out and match the contact method of default feature to lose Imitate contact method;
The searching module, is specifically used for: being section with any terminal user in the terminal user of the contact person direct each other Point, using other terminal users with any terminal user direct contact person each other as tandem node, based on cascade described Node constructs the relation chain.
11. server according to claim 10, which is characterized in that the searching module is specifically used for: obtaining first eventually The contact method of end subscriber and the contact method of second terminal user;Described in being searched in the address list of the first terminal user The contact method of second terminal user, and, the first terminal user is searched in the address list of the second terminal user Contact method;When determination is found, determine that the first terminal user and the second terminal user directly contact each other People.
12. server according to claim 10, which is characterized in that first determining module is specifically used for: searching institute The contact person in the address list of each terminal user in relation chain with same names is stated, the connection with same names is compared The contact method of people, if it is different, then determining that the contact method of the contact person with same names meets predetermined item described in being The contact method of part.
13. server according to claim 12, which is characterized in that first determining module is specifically used for: searching institute The contact person in the address list of each terminal user in relation chain with identical contact method is stated, is compared described with identical correspondent party The title of the contact person of formula, if it is different, then determining that the identical contact method is the contact method to conform to a predetermined condition.
14. server according to any one of claims 10 to 13, which is characterized in that the screening module is specifically used for: The use data for parsing corresponding first contact person of the first contact method, obtain first contact method by first contact person The time is used for Information Authentication mode;Described it is greater than first time threshold using time and the time difference of current time determining When value, determine that first contact method is the failure contact method of first contact person;Wherein, first contact method The communication of each terminal user in the artificial relation chain is contacted for any contact method to conform to a predetermined condition, described first With any contact person of first contact method in record.
15. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the screening module, specifically For: the associated application data of corresponding second contact person of the second contact method of parsing determine that second contact method is not used as When second contact person uses the association contact method of application, determine that second contact method is second contact person Failure contact method;Wherein, second contact method is any contact method to conform to a predetermined condition, described second Contact any contact person in the address list of each terminal user in the artificial relation chain with second contact method.
16. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the screening module, specifically For: parsing third contact method corresponds to the communication log data of third contact person, obtains the communication of the third contact method Time;When the time difference of the call duration time and current time that determine the third contact method being greater than second time threshold, sentence The fixed third contact method is the failure contact method of the third contact person;Wherein, the third contact method is any The contact method to conform to a predetermined condition, the third contacts in the artificial relation chain to be had in the address list of each terminal user There is any contact person of the third contact method.
17. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the server further include:
Second determining module determines institute for the communication log data of each contact person in the address list based on third terminal user State the use frequent degree that each contact person is communicated using different contact methods in the address list of third terminal user;
First transceiver module, the different connection of each contact person in the address list for sending the third terminal user to third terminal It is the use frequent degree information of mode, identifies each connection in the address list of the third terminal user for the third terminal The use frequent degree information of the different contact methods of people;
First update module is identified for being directed in the address list of the third terminal user in response to the third terminal user Each contact person different contact methods the operation using frequent degree information, update described the of synchronous storage in network side The different contact methods of each contact person in the address list of three terminal users.
18. requiring 10 to 13 described in any item servers according to claim, which is characterized in that the server further include:
Second transceiver module, the failure contact method in address list for sending the 4th terminal user to the 4th terminal, for institute It states the 4th terminal and identifies the failure contact method in the address list of the 4th terminal user;
Second update module is identified for being directed in the address list of the 4th terminal user in response to the 4th terminal user Failure contact method operation, update in network side and fail described in the address list of the 4th terminal user of synchronous storage Contact method.
CN201610377964.7A 2016-05-31 2016-05-31 Contact person's processing method and server Active CN106095814B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610377964.7A CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server
PCT/CN2017/084032 WO2017206696A1 (en) 2016-05-31 2017-05-11 Contact information processing method and apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610377964.7A CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server

Publications (2)

Publication Number Publication Date
CN106095814A CN106095814A (en) 2016-11-09
CN106095814B true CN106095814B (en) 2019-09-20

Family

ID=57230603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610377964.7A Active CN106095814B (en) 2016-05-31 2016-05-31 Contact person's processing method and server

Country Status (2)

Country Link
CN (1) CN106095814B (en)
WO (1) WO2017206696A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106095814B (en) * 2016-05-31 2019-09-20 腾讯科技(深圳)有限公司 Contact person's processing method and server
CN106682223B (en) * 2017-01-04 2020-03-10 上海智臻智能网络科技股份有限公司 Data validity detection method and device and intelligent interaction method and device
CN106713676B (en) * 2017-01-23 2019-08-06 北京安云世纪科技有限公司 Communicating number identifies control method, device and communication terminal
CN106850926B (en) * 2017-02-21 2019-03-05 维沃移动通信有限公司 A kind of failure contact person processing method, server and mobile terminal
CN107295118A (en) * 2017-06-28 2017-10-24 西安万像电子科技有限公司 Contact searching method and device
CN110166637B (en) * 2018-02-12 2021-07-23 深圳市六度人和科技有限公司 Empty number identification method and device
CN110198286A (en) * 2018-02-24 2019-09-03 阿里巴巴集团控股有限公司 A kind of data processing method and calculate equipment
CN110417926A (en) * 2018-04-28 2019-11-05 冯泽 Contact method for building up, system and computer readable storage medium
CN110851453B (en) * 2018-08-01 2022-09-20 国网辽宁招标有限公司 Dynamic generation method of project address list
CN111310538B (en) * 2019-11-18 2020-11-17 万金芬 Content management system based on big data server
CN113885954A (en) * 2021-09-26 2022-01-04 湖南于一科技有限公司 Method, device and equipment for detecting zombie powder in WeChat address book and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781035A (en) * 2014-01-10 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Method and system for communication processing based on mobile terminal
CN104394258A (en) * 2014-12-01 2015-03-04 广州三星通信技术研究有限公司 Method and device for processing contact change of communication object
CN104410694A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Autonomous update method for cloud address book contact information based on data mining
CN105357357A (en) * 2015-10-14 2016-02-24 北京乐动卓越科技有限公司 Telephone number management method and cloud server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882953A (en) * 2012-09-18 2013-01-16 李建成 Communication number synchronization method and system
CN103095884A (en) * 2013-01-17 2013-05-08 东莞宇龙通信科技有限公司 Processing method and processing system for numbers of contact persons
CN105141648B (en) * 2014-06-09 2020-06-09 西安中兴新软件有限责任公司 Address book updating method and terminal
CN104023108B (en) * 2014-06-18 2016-08-24 中国联合网络通信集团有限公司 The method and apparatus removing terminal failure contact person
CN106095814B (en) * 2016-05-31 2019-09-20 腾讯科技(深圳)有限公司 Contact person's processing method and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781035A (en) * 2014-01-10 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Method and system for communication processing based on mobile terminal
CN104410694A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Autonomous update method for cloud address book contact information based on data mining
CN104394258A (en) * 2014-12-01 2015-03-04 广州三星通信技术研究有限公司 Method and device for processing contact change of communication object
CN105357357A (en) * 2015-10-14 2016-02-24 北京乐动卓越科技有限公司 Telephone number management method and cloud server

Also Published As

Publication number Publication date
CN106095814A (en) 2016-11-09
WO2017206696A1 (en) 2017-12-07

Similar Documents

Publication Publication Date Title
CN106095814B (en) Contact person's processing method and server
CN107291862A (en) Business datum storage method, device, storage medium and electronic equipment
US20160006868A1 (en) Method and System for Marking a Phone Number
CN110011988A (en) Based on the certification authentication method and device of block chain, storage medium, electronic device
CN104618312B (en) A kind of remote login methods, devices and systems of M2M application
CN108696511A (en) A kind of public notification of information method, apparatus and relevant device based on block chain
CN105847288B (en) A kind of identifying code treating method and apparatus
CN110602217B (en) Block chain-based alliance management method, device, equipment and storage medium
CN110135194B (en) Block chain-based industrial internet digital object management method
CN103164416A (en) Identification method and device of user relationship
CN110266872B (en) Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
CN108710681A (en) File acquisition method, device, equipment and storage medium
EP3961448A1 (en) Method and system for detecting an infrastructure of malware or a cybercriminal
CN103150637A (en) Express receiving terminal real-name management system and implementation method based on bar code technology
CN114780301B (en) Disaster recovery method and system supporting multi-cloud production environment
CN106161406B (en) The method and apparatus for obtaining user account
CN107070891A (en) Service calling method and device
CN106060097A (en) Management system and management method for information security competition
CN106682146B (en) Method and system for retrieving scenic spot evaluation according to keywords
CN107579990A (en) Measure of managing contract and server
CN110708309A (en) Anti-crawler system and method
CN111818025B (en) User terminal detection method and device
CN111461687B (en) Application system of block chain service platform based on terminal equipment and implementation method thereof
CN110071966B (en) Block chain networking and data processing method based on cloud platform
CN105530386B (en) The determination method and its application process and system of a kind of communication identifier type of number

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant