CN106161358A - The management method of contact information and device - Google Patents

The management method of contact information and device Download PDF

Info

Publication number
CN106161358A
CN106161358A CN201510152923.3A CN201510152923A CN106161358A CN 106161358 A CN106161358 A CN 106161358A CN 201510152923 A CN201510152923 A CN 201510152923A CN 106161358 A CN106161358 A CN 106161358A
Authority
CN
China
Prior art keywords
contact information
claimant
requested people
request
people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510152923.3A
Other languages
Chinese (zh)
Other versions
CN106161358B (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510152923.3A priority Critical patent/CN106161358B/en
Publication of CN106161358A publication Critical patent/CN106161358A/en
Application granted granted Critical
Publication of CN106161358B publication Critical patent/CN106161358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses management method and the device of a kind of contact information.The method includes: receive the first request obtaining requested people's contact information that claimant sends;Second request that sends is to described requested people, and described second request is to obtain the request that described requested people authorizes, to provide the contact information of described requested people to described claimant;Receive the described requested people result for described second request;According to described result, it is determined whether send the contact information of described requested people to described claimant.The true contact information being made the personnel of enterprises by the method will not be compromised before without permission, also is able to ensure that communication is smooth and easy simultaneously.

Description

The management method of contact information and device
Technical field
The application relates to communication technical field, particularly relates to management method and the device of a kind of contact information.
Background technology
At present, the contact information of enterprises employee, particularly relate to employee in enterprises important department Contact information, is usually not intended to be leaked to enterprise external, and enterprise is in order to avoid the information of interior employee Reveal, also will not outwards announce, but, in enterprises in order to link up conveniently, internal staff can be straight Connect inquiry and see the true contact information of other enterprises employee.Therefore, still there is the people outside enterprise Member obtains contact information by enterprises employee, causes the problem that employee's contact information is revealed, contact information Safety can not get protection.
Summary of the invention
The management method of a kind of contact information that the embodiment of the present application provides, in order to protect internal staff's The safety of contact information, it is to avoid reveal, solves to link up obstructed problem simultaneously.
The managing device of a kind of contact information that the embodiment of the present application provides, in order to protect internal staff's The safety of contact information, it is to avoid reveal, solves to link up obstructed problem simultaneously.
The management method of a kind of contact information that the embodiment of the present application provides, including:
Receive the first request obtaining requested people's contact information that claimant sends;
Second request that sends is to described requested people, and described second request is for obtaining what described requested people authorized Request, to provide the contact information of described requested people to described claimant;
Receive the described requested people result for described second request;
According to described result, it is determined whether send the contact information of described requested people to described request People.
The managing device of a kind of contact information that the embodiment of the present application provides, including:
First receives unit, asks for receiving the first of the requested people's contact information that obtains from claimant Ask;
Transmitting element, asks to described requested people for sending second, and described second request is described for obtaining The request that requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit, for receiving the described requested people result for described second request;
Determine unit, for according to described result, it is determined whether by the contact information of described requested people Send described claimant to.
The management method of a kind of contact information that the embodiment of the present application provides and device, obtaining requested people's connection Before network information, need could obtain the contact information of requested people through the agreement of requested people, by this The method and device that application provides so that the true contact information of the personnel of enterprises is before without permission Will not be compromised, it also is able to ensure that communication is smooth and easy simultaneously.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application Point, the schematic description and description of the application is used for explaining the application, is not intended that to the application not Work as restriction.In the accompanying drawings:
Fig. 1 in the various embodiment of the application provide contact information management method in claimant, asked someone And relation schematic diagram between trustee;
The process schematic of the management method of the contact information that Fig. 2 provides for the application first embodiment;
The process schematic of the management method of the contact information that Fig. 3 provides for the application the second embodiment;
The process schematic of the management method of the contact information that Fig. 4 provides for the application the 3rd embodiment;
The structural representation of the managing device of the contact information that Fig. 5 provides for the application;
The structural representation of the managing device of the another kind of contact information that Fig. 6 provides for the application.
Detailed description of the invention
For making the purpose of the application, technical scheme and advantage clearer, specifically real below in conjunction with the application Execute example and technical scheme is clearly and completely described by corresponding accompanying drawing.Obviously, described Embodiment is only some embodiments of the present application rather than whole embodiments.Based on the enforcement in the application Example, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of the application protection.
The management method of the contact information that Fig. 2 provides for the application first embodiment, specifically includes following step Rapid:
S10: receive the first request obtaining requested people's contact information from claimant.
In the application first embodiment, claimant and requested people belong in a communication group jointly, Such as this communication group be company be the communication group got in touch with each other of convenience that its internal staff sets up, as Shown in Fig. 1.
Therefore, alternatively, can also include before S10: each object for belonging in same group divides Join the step of virtual contact information.
Each using in communication group is assigned the virtual contact corresponding with its true contact information per family Information, can realize in communication group the contact between user by virtual contact information.Due to communication group In user be not aware that the true contact information of other users, therefore can avoid that employee's in enterprise is true The problem that contact information is leaked out by internal staff.
It should be noted that all users formed one white list, institute in white list in communication group There is the contact between user can be completed by virtual contact information.This virtual contact information includes virtual telephony Number, virtual instant messaging account number, virtual electronic mail box address.Such as, the user of white list is permissible each other Virtual-number is dialed, it is possible to directly put through number by mobile phone or system APP.But, if it is desired to Obtain true contact information and then need to obtain the mandate of requested people.
So, when company external staff needs to get in touch with intra-company personnel, i.e. personnel outside communication group When needing to get in touch with the user in communication group, the personnel outside communication group then do not have contact information with logical User in letter group directly gets in touch with.Therefore, to realize the personnel outside communication group and communication group In user between contact, the personnel outside communication group need to obtain the contact letter of user in communication group Breath.This contact information is the true contact information of user in communication group.In the embodiment of the present application, communication Personnel outside group want to obtain the personnel of user's contact information in communication group and is referred to as trustee, trustee It is not belonging in communication group, as shown in Figure 1.
Need to be it is further noted that trustee passes through a user that can get in touch with in communication group to needing Targeted customer to be got in touch with asks for contact information, the user that said one can be got in touch with recognized for trustee or Having the user of contact information, be in this step alleged claimant, targeted customer is alleged in this step Requested people.
During as trustee because business relations need to carry out business communication with requested people, the quilt that can will obtain The user that the request of claimant's contact information recognizes in being sent to communication group, i.e. claimant.When claimant connects In trustee's communication group to be obtained during the contact information of user, claimant can apply for obtaining to requested people The contact information of requested people.It should be noted that claimant applies for obtaining requested people's to requested people Contact information needs to be completed by an information acquisition platform.This information acquisition platform can be the most flat Platform, it is also possible to be integrated with the already present contact platform for employee's contact.
The of requested people's contact information is obtained when claimant is sent to requested people by information acquisition platform After one request, information acquisition platform background server can receive this first request.It should be noted that should First request carries the user profile of claimant and requested people, and the information of trustee.Claimant with The user profile of requested people pre-saves the background server in information acquisition platform.User profile includes: The true contact information that the name of user, department, virtual contact information and virtual contact information are corresponding Deng.The information of trustee includes its work unit, contact purpose, true contact information etc..
Specifically, receive the first request obtaining requested people's contact information that claimant sends, particularly as follows: Receive claimant and obtain the of requested people's contact information by what the virtual contact information of requested people sent One request.
Such as, after claimant dials the virtual phone number of requested people, claimant can enter voice message system System, prompting claimant can carry out some option of operation, including obtaining requested people's actual telephone number Option of operation, if claimant select requested people to be obtained actual telephone number option of operation after, then May proceed to point out claimant to submit the relevant information including claimant and trustee to, claimant passes through language After the mode such as sound or note submits the information of claimant and trustee to, server has been received by obtaining of claimant Take the first request of requested people's contact information.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people The request authorized, to provide the contact information of described requested people to described claimant.
In the application first embodiment, server gets in touch with letter the acquisition requested people that have received claimant After first request of breath, second request that will send is to requested people.Specifically, the second request is for obtaining quilt Claimant authorizes the request of the contact information to provide requested people to claimant.Wherein, the second request is carried The user profile of claimant and the information of trustee.
S50: receive the described requested people result for described second request.
In the application first embodiment, requested people can according to second request in trustee information at The second request that reason receives, i.e. decides whether to provide its true contact information according to the information of trustee To claimant.When requested people thinks and truly has business contact demand with trustee, requested people then can be by it True contact information is supplied to claimant.When requested people is not considered as having business contact demand with trustee Time, its true contact information then will not be supplied to claimant by requested people.Confirm when requested people returns it After result, server can receive requested people's result for the second request.
Such as, requested people receives information acquisition platform call, and requested people receives above-mentioned call After can hear about second request related voice, and point out requested people next step operation.As agreed to carry 1 key can be pressed for true contact information, dissenting 2 keys can be pressed.Another kind of situation, requested people Can also receive the short message prompt about its true contact information of acquisition of information acquisition platform, requested people can Next step operation is carried out with the particular content according to note.
S70: according to described result, it is determined whether send the contact information of described requested people to institute State claimant.
In the application first embodiment, according to the result of the requested people received, it is determined whether will The contact information of requested people sends claimant to, specifically includes:
If receiving the message that requested people provides contact information to confirm, then the contact information of requested people is passed Give claimant;
If not receiving the message that requested people provides contact information to confirm, the contact of requested people is not believed Breath sends claimant to.
In the application first embodiment, server receives the confirmation offer contact information that requested people returns Message after, the true connection that can directly contact that contact information virtual with requested people is corresponding will be searched Network information, and the true contact information found is sent to claimant.So, claimant can will obtain again The true contact information obtained is sent to trustee, thus realizes the contact between trustee and requested people.
The management method of the contact information that Fig. 3 provides for the application the second embodiment, comprises the following steps:
S10: receive the first request obtaining requested people's contact information that claimant sends.
Whether S20: confirmation request people has the acquisition authority of the contact information directly obtaining requested people.
If claimant has acquisition authority, then perform step S22.If claimant does not have acquisition authority, then Perform step S30.
S22: directly the contact information of requested people is sent to claimant.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people The request authorized, to provide the contact information of described requested people to described claimant.
S50: receive the described requested people result for described second request.
S70: according to described result, it is determined whether send the contact information of requested people to claimant.
Compared with the management method of the contact information that the application first embodiment provides, the application the second embodiment The management method of contact information provided S20, S22 the most in steps after step S10, it is below for step Rapid S20, S22 elaborate.
Whether step S20 has the acquisition power of the contact information directly obtaining requested people for confirmation request people Limit.In above-mentioned communication group, if claimant be requested people directly under supervisor, then claimant then has There is the acquisition authority of the true contact information obtaining requested people.
When claimant has acquisition authority, then performing step S22, such server is no need for please by second Ask and be sent to requested people, it is only necessary to find the requested people that pre-saves in server truly gets in touch with letter Cease, and the true contact information of direct requested people is sent to claimant.So, it is possible quickly will to be asked The true contact information asked for help sends claimant to, has saved the time of acquisition of information, has improve acquisition of information Efficiency.When claimant does not have acquisition authority, then continue executing with step S30.
The management method of the contact information that Fig. 4 provides for the application the 3rd embodiment, comprises the following steps:
S10: receive the first request obtaining requested people's contact information that claimant sends.
Whether S24: confirmation request people has has the request permissions initiating to obtain contact information to requested people.
If claimant has request permissions, then perform step S30.If claimant does not have request permissions, then Perform step S26.
S26: return have no right obtain requested people's contact information be prompted to claimant.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people The request authorized, to provide the contact information of described requested people to described claimant.
S50: receive the described requested people result for described second request.
S70: according to described result, it is determined whether send the contact information of requested people to claimant.
In the application the 3rd embodiment, in order to preferably protect user's in communication group truly to get in touch with letter Breath, has permission restriction, and not all claimant for obtaining the claimant of the contact information of requested people The contact information of requested people can be obtained.Such as, claimant adheres to different departments separately from requested people, And onrelevant therebetween, then claimant then can be set to do not have request permissions.If claimant Belong to identical department with requested people or there is relatedness, then claimant then can be set with please Seek authority.Therefore before performing step S30, needing to first carry out step S24, i.e. whether confirmation request people Have and there is the request permissions initiating to obtain contact information to requested people.
When claimant has request permissions, then continue executing with step S30.
When claimant does not has request permissions, then continuing executing with step S26, claimant then cannot obtain quilt The contact information of claimant.
In the management method of the contact information of the application the 3rd embodiment offer, due to depositing of step S24 , some and the not related claimant of requested people can be avoided can to obtain the contact of requested people easily Information, so that the contact information of the user in communication group can be protected well.
The management method of the contact information that example provides is executed above, based on same think of for the application first to the 3rd Road, the managing device of the contact information that the application provides, as shown in Figures 5 and 6.
The structural representation of the managing device of a kind of contact information that Fig. 5 provides for the application, specifically includes:
First receives unit 101, for receiving first of the acquisition requested people's contact information from claimant Request;
Transmitting element 103, asks to described requested people for sending second, and described second request is for obtaining The request that described requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit 105, for receiving the described requested people result for described second request;
Alternatively, described device also comprises determining that unit 107, for according to described result, determines Whether send the contact information of described requested people to described claimant.
Described contact information be can directly and requested people contact true contact information.
Described contact information includes at least one in telephone number, instant messaging account, E-mail address.
Alternatively, described device also includes: allocation unit (not shown), for for belonging in same group Each object distribute virtual contact information.
Described first receives unit 101, specifically for:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people First request of contact information.
Alternatively, described determine unit 107, specifically for:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed Breath sends claimant to.
The structural representation of the managing device of the another kind of contact information that Fig. 6 provides for the application, specifically wraps Include:
First receives unit 101, for receiving first of the acquisition requested people's contact information from claimant Request;
Whether confirmation unit 102, have obtaining of the direct contact information obtaining requested people for confirmation request people Weighting limit, or for confirmation request people whether have have to requested people initiate obtain contact information request Authority
Transmitting element 103, asks to described requested people for sending second, and described second request is for obtaining The request that described requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit 105, for receiving the described requested people result for described second request;
Determine unit 107, for according to described result, it is determined whether by the contact of described requested people Information sends described claimant to.
Described contact information be can directly and requested people contact true contact information.
Described contact information includes at least one in telephone number, instant messaging account, E-mail address.
Described first receives unit 101, specifically for:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people First request of contact information.
Described determine unit 107, specifically for:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed Breath sends claimant to.
The management method of a kind of contact information that the embodiment of the present application provides and device, obtaining requested people's connection Before network information, need could obtain the contact information of requested people through the agreement of requested people, by this The method and device that application provides so that the true contact information of the personnel of enterprises is before without permission Will not be compromised, it also is able to ensure that communication is smooth and easy simultaneously.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more Computer-usable storage medium containing computer usable program code (include but not limited to disk memory, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
In a typical configuration, calculating equipment includes one or more processor (CPU), input/defeated Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be by appointing Where method or technology realize information storage.Information can be computer-readable instruction, data structure, program Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment accesses.According to defining herein, computer-readable medium does not include temporary computer-readable matchmaker Body (transitory media), such as data signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non- Comprising of exclusiveness, so that include that the process of a series of key element, method, commodity or equipment not only wrap Include those key elements, but also include other key elements being not expressly set out, or also include for this process, The key element that method, commodity or equipment are intrinsic.In the case of there is no more restriction, statement " include One ... " key element that limits, it is not excluded that including the process of described key element, method, commodity or setting Other identical element is there is also in Bei.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can use complete hardware embodiment, complete software implementation or combine software and The form of the embodiment of hardware aspect.And, the application can use and wherein include calculating one or more The computer-usable storage medium of machine usable program code (include but not limited to disk memory, CD-ROM, Optical memory etc.) form of the upper computer program implemented.
The foregoing is only embodiments herein, be not limited to the application.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvement etc. made, within the scope of should be included in claims hereof.

Claims (11)

1. the management method of a contact information, it is characterised in that including:
Receive the first request obtaining requested people's contact information that claimant sends;
Second request that sends is to described requested people, and described second request is for obtaining what described requested people authorized Request, to provide the contact information of described requested people to described claimant;
Receive the described requested people result for described second request;
According to described result, it is determined whether send the contact information of described requested people to described request People.
2. the method for claim 1, it is characterised in that described contact information be can directly with The true contact information of requested people's contact.
3. method as claimed in claim 2, it is characterised in that described true contact information includes phone At least one in number, instant messaging account, E-mail address.
4. the method for claim 1, it is characterised in that receiving the acquisition quilt that claimant sends After first request of claimant's contact information, described method also includes:
Confirm whether described claimant has the acquisition authority of the contact information directly obtaining requested people, if State acquisition authority, then directly the contact information of requested people is sent to claimant.
5. the method for claim 1, it is characterised in that receiving the acquisition quilt from claimant After first request of claimant's contact information, described method also includes:
Confirm whether described claimant has the request permissions initiating to obtain contact information to requested people, if having Described request permissions, then second request that sends is to requested people.
6. method as claimed in claim 2, it is characterised in that described claimant belongs to requested people Same group, before the first request obtaining requested people's contact information that the described claimant of reception sends, Also include:
Virtual contact information is distributed for belonging to each object in same group;
What the described claimant of reception sent obtains the first request of requested people's contact information, particularly as follows:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people First request of contact information.
7. the method for claim 1, it is characterised in that described according to described result, really Determine whether send the contact information of requested people to claimant, specifically include:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed Breath sends claimant to.
8. the managing device of a contact information, it is characterised in that including:
First receives unit, asks for receiving the first of the requested people's contact information that obtains from claimant Ask;
Transmitting element, asks to described requested people for sending second, and described second request is described for obtaining The request that requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit, for receiving the described requested people result for described second request;
Determine unit, for according to described result, it is determined whether by the contact information of described requested people Send described claimant to.
9. device as claimed in claim 8, it is characterised in that described device also includes:
Whether confirmation unit, have the acquisition power of the contact information directly obtaining requested people for confirmation request people Limit, or for confirmation request people whether have have to requested people initiate obtain contact information the right of asking for Limit.
10. device as claimed in claim 8, it is characterised in that described claimant belongs to requested people Same group, described device also includes:
Allocation unit, for for belonging to each object virtual contact information of distribution in same group;
Described first receives unit, specifically for:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people First request of contact information.
11. devices as claimed in claim 8, it is characterised in that described determine unit, specifically for:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed Breath sends claimant to.
CN201510152923.3A 2015-04-01 2015-04-01 Contact information management method and device Active CN106161358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510152923.3A CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510152923.3A CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Publications (2)

Publication Number Publication Date
CN106161358A true CN106161358A (en) 2016-11-23
CN106161358B CN106161358B (en) 2020-02-04

Family

ID=57338066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510152923.3A Active CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Country Status (1)

Country Link
CN (1) CN106161358B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465652A (en) * 2016-06-06 2017-12-12 腾讯科技(深圳)有限公司 A kind of operation behavior detection method, server and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703917A (en) * 2002-10-09 2005-11-30 诺基亚有限公司 Method and arrangement for concealing true identity of user in communications system
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN102333299A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for providing information of contact
CN103856324A (en) * 2012-11-28 2014-06-11 联想(北京)有限公司 Identity confirmation method, communication request method, and electronic device
CN103916469A (en) * 2014-03-26 2014-07-09 北京奇虎科技有限公司 Method for acquiring contact person information, client end and server
CN104009955A (en) * 2013-02-21 2014-08-27 腾讯科技(深圳)有限公司 Contact information processing method, contact information processing apparatus, and system
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703917A (en) * 2002-10-09 2005-11-30 诺基亚有限公司 Method and arrangement for concealing true identity of user in communications system
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN102333299A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for providing information of contact
CN103856324A (en) * 2012-11-28 2014-06-11 联想(北京)有限公司 Identity confirmation method, communication request method, and electronic device
CN104009955A (en) * 2013-02-21 2014-08-27 腾讯科技(深圳)有限公司 Contact information processing method, contact information processing apparatus, and system
CN103916469A (en) * 2014-03-26 2014-07-09 北京奇虎科技有限公司 Method for acquiring contact person information, client end and server
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465652A (en) * 2016-06-06 2017-12-12 腾讯科技(深圳)有限公司 A kind of operation behavior detection method, server and system
CN107465652B (en) * 2016-06-06 2020-09-11 腾讯科技(深圳)有限公司 Operation behavior detection method, server and system

Also Published As

Publication number Publication date
CN106161358B (en) 2020-02-04

Similar Documents

Publication Publication Date Title
US11244393B2 (en) Credit blockchain system, credit data storage method, device, and medium
CN104270386B (en) Across application system user (asu) information integrating method and identity information management server
US8769621B2 (en) Method and system for providing permission-based access to sensitive information
MX2011003795A (en) Authenticating a mobile device based on geolocation and user credential.
CN107430666A (en) Tenant's lock box
US9147084B2 (en) Method and system for isolating secure communication events from a non-secure application
US20150244822A1 (en) Location based network usage policies
CN102724647A (en) Method and system for access capability authorization
CN110546935B (en) Personal identifier login for organizational users
CN105450581A (en) Authority control method and device
EP2073138A1 (en) System and method for setting application permissions
CN101808094A (en) Identity authentication system and method
US20210328999A1 (en) Techniques involving a security heat map
CN112202708A (en) Identity authentication method and device, electronic equipment and storage medium
CN107944291A (en) Information acquisition method, system and computer-readable recording medium
CN105262780A (en) Authority control method and system
WO2018194856A1 (en) Organizational sign-in across sovereign environments
EP2732594A1 (en) System and method for alternative distribution of a pin code
CN103778379B (en) Application in management equipment performs and data access
CN110348237A (en) Data managing method and device, storage medium, electronic equipment based on block chain
CN107104923A (en) A kind of account binding and the method and device of business processing
US11714920B1 (en) Security object management system
US20170034177A1 (en) System and method for sharing restricted customer data with an enterprise user during customer interaction
CN109756469A (en) A kind of public account management method, device and computer readable storage medium
US20090320089A1 (en) Policy-based user brokered authorization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right