CN106161358B - Contact information management method and device - Google Patents

Contact information management method and device Download PDF

Info

Publication number
CN106161358B
CN106161358B CN201510152923.3A CN201510152923A CN106161358B CN 106161358 B CN106161358 B CN 106161358B CN 201510152923 A CN201510152923 A CN 201510152923A CN 106161358 B CN106161358 B CN 106161358B
Authority
CN
China
Prior art keywords
person
contact information
requested
request
requesting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510152923.3A
Other languages
Chinese (zh)
Other versions
CN106161358A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510152923.3A priority Critical patent/CN106161358B/en
Publication of CN106161358A publication Critical patent/CN106161358A/en
Application granted granted Critical
Publication of CN106161358B publication Critical patent/CN106161358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a management method and device of contact information. The method comprises the following steps: receiving a first request for acquiring contact information of a requested person, which is sent by a requesting person; sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person; receiving a processing result of the requested person for the second request; and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result. By the method, the real contact information of the personnel in the enterprise can not be leaked before the real contact information is not allowed, and meanwhile, smooth communication can be guaranteed.

Description

Contact information management method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for managing contact information.
Background
At present, the contact information of the staff in the enterprise, especially the contact information of the staff in the important department in the enterprise, is generally not expected to be revealed to the outside of the enterprise, and the enterprise can not publish outwards either in order to avoid the information disclosure of the staff in the enterprise, however, in order to communicate conveniently in the enterprise, the staff in the enterprise can all directly inquire and see the real contact information of the staff in other enterprises. Therefore, personnel outside the enterprise still obtain contact information through the internal staff of the enterprise, so that the problem of staff contact information leakage is caused, and the safety of the contact information cannot be protected.
Disclosure of Invention
The embodiment of the application provides a management method of contact information for the safety of the contact information of the personnel in the enterprise is protected, leakage is avoided, and the problem of unsmooth communication is solved simultaneously.
The embodiment of the application provides a management device of contact information for the safety of the contact information of the inside personnel of protection enterprise avoids revealing, solves the problem of not unobstructed of communication simultaneously.
The management method for the contact information provided by the embodiment of the application comprises the following steps:
receiving a first request for acquiring contact information of a requested person, which is sent by a requesting person;
sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person;
receiving a processing result of the requested person for the second request;
and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
The management device of contact information that this application embodiment provided includes:
the first receiving unit is used for receiving a first request for acquiring the contact information of a requested person from a requesting person;
the sending unit is used for sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person;
the second receiving unit is used for receiving a processing result of the requested person for the second request;
and the determining unit is used for determining whether the contact information of the requested person is transmitted to the requesting person according to the processing result.
According to the method and the device for managing the contact information, before the contact information of the requested person is obtained, the contact information of the requested person can be obtained only by the agreement of the requested person.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic diagram illustrating relationships among a requester, a requester and a client in a contact information management method provided in various embodiments of the present application;
fig. 2 is a process diagram of a method for managing contact information according to a first embodiment of the present application;
fig. 3 is a process diagram of a method for managing contact information according to a second embodiment of the present application;
fig. 4 is a process diagram of a method for managing contact information according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a device for managing contact information provided in the present application;
fig. 6 is a schematic structural diagram of another contact information management apparatus provided in the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 2 is a management method of contact information provided in a first embodiment of the present application, which specifically includes the following steps:
s10: a first request for obtaining contact information of a requested person is received from a requesting person.
In the first embodiment of the present application, the requester and the requested person belong to a communication group, for example, the communication group is a communication group established by a company for its internal personnel to facilitate mutual communication, as shown in fig. 1.
Therefore, optionally, before S10, the method may further include: and distributing virtual contact information to all the objects belonging to the same group.
Each user in the communication group is distributed with virtual contact information corresponding to the real contact information, and the contact among the users in the communication group can be realized through the virtual contact information. Because the users in the communication group do not know the real contact information of other users, the problem that the real contact information of the staff in the enterprise is revealed by the internal staff can be avoided.
It should be noted that all users in the communication group form a white list, and the contact between all users in the white list can be completed through the virtual contact information. The virtual contact information comprises a virtual telephone number, a virtual instant messaging account and a virtual email address. For example, users who are white-listed with each other can dial a virtual number through a mobile phone or a system APP, and then can dial the number directly. However, if the true contact information is to be obtained, authorization of the requested person needs to be obtained.
Thus, when the outside staff needs to contact the inside staff, namely the outside staff needs to contact the users in the communication group, the outside staff does not have a contact way to directly contact the users in the communication group. Therefore, in order to realize the contact between the person outside the communication group and the user inside the communication group, the person outside the communication group needs to obtain the contact information of the user inside the communication group. The contact information is the real contact information of the users in the communication group. In the embodiment of the present application, a person who wants to acquire contact information of a user in a communication group, among persons outside the communication group, is referred to as a principal, and the principal does not belong to the communication group, as shown in fig. 1.
It should be further noted that the client requests contact information from a target user to be contacted through a user that can be contacted in the communication group, where the user that can be contacted is a user that the client already knows or has a contact mode, that is, the user is called a requestor in this step, and the target user is called a requested person in this step.
When the client needs to communicate with the requested person because of the business relationship, the request of the contact information of the requested person to be acquired is sent to the users known in the communication group, namely the requesting person. When the requester receives the request of the client to obtain the contact information of the users in the communication group, the requester applies for obtaining the contact information of the requested person from the requested person. It should be noted that, the application of the contact information of the requested person from the requested person by the requesting person needs to be completed through an information obtaining platform. The information acquisition platform can be a separate platform or can be integrated with an existing contact platform for the staff to contact.
After the requester sends a first request for acquiring contact information of the requester to the requester through the information acquisition platform, the information acquisition platform background server receives the first request. It should be noted that the first request carries user information of the requester and the requester, and information of the principal. The user information of the requester and the requester is pre-stored in a background server of the information acquisition platform. The user information includes: the name of the user, the work department, the virtual contact information, the real contact information corresponding to the virtual contact information and the like. The information of the consignor includes its work unit, contact purpose, real contact information, and the like.
Specifically, receiving a first request for obtaining contact information of a requested person, which is sent by a requester, specifically includes: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
For example, after the requester dials the virtual phone number of the requested person, the requester enters the voice prompt system to prompt the requester to perform a plurality of operation options including an operation option for acquiring the real phone number of the requested person, if the requester selects the operation option for acquiring the real phone number of the requested person, the requester continues to prompt the requester to submit relevant information including the requester and the offeror, and after the requester submits information of the requester and the offeror in a voice or short message manner, the server receives a first request of the requester for acquiring contact information of the requested person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
In the first embodiment of the application, after receiving a first request of a requester for obtaining contact information of a requested person, the server sends a second request to the requested person. Specifically, the second request is a request for obtaining the authorization of the requested person to provide the contact information of the requested person to the requesting person. The second request carries user information of the requester and information of the principal.
S50: and receiving a processing result of the requested person for the second request.
In the first embodiment of the present application, the requested person can process the received second request according to the information of the offeror in the second request, that is, decide whether to provide the real contact information thereof to the requesting person according to the information of the offeror. When the requested person considers that the service contact requirement is certainly met with the requesting person, the requested person can provide the real contact information of the requested person to the requesting person. When the requested person does not think that the service contact requirement exists with the requesting person, the requested person does not provide the real contact information of the requested person to the requesting person. And after the requested person returns the confirmation result, the server receives the processing result of the requested person for the second request.
For example, the requested person receives a telephone call of the information acquisition platform, and the requested person can hear the related voice about the second request after receiving the telephone call and prompt the requested person for the next operation. As the 1-key can be pressed for agreeing to provide real contact information, the 2-key can be pressed for disagreement. In another case, the requested person may also receive a short message prompt of the information acquisition platform about acquiring the real contact information of the requested person, and the requested person may perform the next operation according to the specific content of the short message.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
In the first embodiment of the present application, determining whether to transmit the contact information of the requested person to the requesting person according to the received processing result of the requested person specifically includes:
if receiving the message that the requested person provides the contact information confirmation, transmitting the contact information of the requested person to the requesting person;
if the message that the requested person provides the contact information confirmation is not received, the contact information of the requested person is not transmitted to the requesting person.
In the first embodiment of the application, after receiving the message for confirming provision of the contact information returned by the requested person, the server searches for the real contact information which corresponds to the virtual contact information of the requested person and can be directly contacted, and sends the searched real contact information to the requesting person. In this way, the requester can send the obtained real contact information to the requester, thereby realizing the contact between the requester and the requested person.
Fig. 3 is a method for managing contact information according to a second embodiment of the present application, including the following steps:
s10: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person.
S20: and determining whether the requester has the acquisition right of directly acquiring the contact information of the requested person.
If the requestor has the acquisition right, step S22 is executed. If the requestor does not have the acquisition authority, step S30 is performed.
S22: directly sending the contact information of the requested person to the requesting person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
S50: and receiving a processing result of the requested person for the second request.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
Compared with the method for managing contact information provided in the first embodiment of the present application, the method for managing contact information provided in the second embodiment of the present application further includes steps S20 and S22 after step S10, and the following steps S20 and S22 are described in detail.
Step S20 is used to confirm whether the requester has the right to directly acquire the contact information of the requested person. In the communication group, if the requester is the direct person of the requested person, the requester has the right to obtain the real contact information of the requested person.
When the requester has the right to acquire, step S22 is executed, so that the server only needs to search the real contact information of the requester stored in the server in advance and directly send the real contact information of the requester to the requester without sending the second request to the requester. Therefore, the real contact information of the requested person can be quickly transmitted to the requesting person, the information acquisition time is saved, and the information acquisition efficiency is improved. When the requester has no acquisition right, the process proceeds to step S30.
Fig. 4 is a method for managing contact information according to a third embodiment of the present application, including the following steps:
s10: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person.
S24: and confirming whether the requester has the request authority for acquiring the contact information to the requested person.
If the requestor has the request right, step S30 is performed. If the requestor does not have the request right, step S26 is executed.
S26: and returning a prompt of not obtaining the contact information of the requested person to the requesting person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
S50: and receiving a processing result of the requested person for the second request.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
In the third embodiment of the present application, in order to better protect the real contact information of users in a communication group, there is a limit to the requesters who obtain the contact information of the requested people, and not all requesters can obtain the contact information of the requested people. For example, the requester and the requested person belong to different departments without correlation, and the requester and the requested person may be set to have no request right. If the requester and the requested person belong to the same department or have an association, the requester can be set to have the request authority. Therefore, before executing step S30, step S24 is executed to confirm whether the requester has the right to initiate a request for obtaining contact information to the requester.
When the requester has the request right, the process proceeds to step S30.
When the requester does not have the request right, the process continues to step S26, and the requester cannot obtain the contact information of the requester.
In the method for managing contact information provided in the third embodiment of the present application, due to the existence of step S24, some requesters not related to the requested person can be prevented from easily obtaining the contact information of the requested person, so that the contact information of the users in the communication group can be well protected.
Based on the same idea, the method for managing contact information provided in the first to third embodiments of the present application is as shown in fig. 5 and 6.
Fig. 5 is a schematic structural diagram of a management apparatus for contact information provided in the present application, which specifically includes:
a first receiving unit 101, configured to receive a first request from a requester for obtaining contact information of a requested person;
a sending unit 103, configured to send a second request to the requested person, where the second request is a request for obtaining authorization of the requested person, so as to provide contact information of the requested person to the requesting person;
a second receiving unit 105, configured to receive a processing result of the requested person for the second request;
optionally, the apparatus further comprises: a determining unit 107, configured to determine whether to transmit the contact information of the requested person to the requesting person according to the processing result.
The contact information is real contact information which can be directly contacted with a requested person.
The contact information comprises at least one of a telephone number, an instant messaging account and an email address.
Optionally, the apparatus further comprises: and an assigning unit (not shown) for assigning virtual contact information to each object belonging to the same group.
The first receiving unit 101 is specifically configured to:
and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
Optionally, the determining unit 107 is specifically configured to:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
Fig. 6 is a schematic structural diagram of another contact information management apparatus provided in the present application, which specifically includes:
a first receiving unit 101, configured to receive a first request from a requester for obtaining contact information of a requested person;
a confirming unit 102, configured to confirm whether the requesting person has an acquisition right to directly acquire the contact information of the requested person, or confirm whether the requesting person has a request right to initiate acquisition of the contact information to the requested person
A sending unit 103, configured to send a second request to the requested person, where the second request is a request for obtaining authorization of the requested person, so as to provide contact information of the requested person to the requesting person;
a second receiving unit 105, configured to receive a processing result of the requested person for the second request;
a determining unit 107, configured to determine whether to transmit the contact information of the requested person to the requesting person according to the processing result.
The contact information is real contact information which can be directly contacted with a requested person.
The contact information comprises at least one of a telephone number, an instant messaging account and an email address.
The first receiving unit 101 is specifically configured to:
and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
The determining unit 107 is specifically configured to:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
According to the method and the device for managing the contact information, before the contact information of the requested person is obtained, the contact information of the requested person can be obtained only by the agreement of the requested person.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (9)

1. A method for managing contact information, comprising:
receiving a first request for acquiring contact information of a requested person, which is sent by a requesting person through virtual contact information of the requested person, wherein the first request carries user information of the requesting person and the requested person and information of an requesting person, the requesting person and the requested person belong to the same group, each object belonging to the same group is distributed with the virtual contact information, and the requesting person does not belong to the same group;
sending a second request to the requested person, wherein the second request is a request for obtaining authorization of the requested person so as to provide contact information of the requested person for the requesting person, and the second request carries user information of the requesting person and information of the requesting person;
receiving a processing result of the requested person for the information of the principal in the second request;
and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
2. The method of claim 1, wherein the contact information is real contact information that can be directly contacted with the requested person.
3. The method of claim 2, wherein the real contact information comprises at least one of a phone number, an instant messaging account number, and an email address.
4. The method of claim 1, wherein after receiving a first request for obtaining contact information of a requested person from a requesting person, the method further comprises:
and confirming whether the requester has the acquisition permission for directly acquiring the contact information of the requested person, and if so, directly sending the contact information of the requested person to the requester.
5. The method of claim 1, wherein after receiving a first request from a requestor for contact information from a requested person, the method further comprises:
and determining whether the requester has a request permission for acquiring contact information to the requested person, and if so, sending a second request to the requested person.
6. The method of claim 1, wherein the determining whether to transmit the contact information of the requested person to the requesting person according to the processing result comprises:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
7. An apparatus for managing contact information, comprising:
the distribution unit is used for distributing virtual contact information for each object belonging to the same group, the requesting person and the requested person belong to the same group, and the requesting person does not belong to the same group;
the first receiving unit is used for receiving a first request for acquiring contact information of a requested person, which is sent by the requesting person through virtual contact information of the requested person, wherein the first request carries user information of the requesting person and the requested person and information of an requesting person;
a sending unit, configured to send a second request to the requested person, where the second request is a request for obtaining authorization of the requested person, so as to provide contact information of the requested person to the requesting person, and the second request carries user information of the requesting person and information of the requesting person;
a second receiving unit configured to receive a result of processing of the requester on the information of the principal in the second request;
and the determining unit is used for determining whether the contact information of the requested person is transmitted to the requesting person according to the processing result.
8. The apparatus of claim 7, wherein the apparatus further comprises:
and the confirming unit is used for confirming whether the requester has the acquisition right for directly acquiring the contact information of the requested person or whether the requester has the request right for initiating the acquisition of the contact information to the requested person.
9. The apparatus of claim 7, wherein the determining unit is specifically configured to:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
CN201510152923.3A 2015-04-01 2015-04-01 Contact information management method and device Active CN106161358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510152923.3A CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510152923.3A CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Publications (2)

Publication Number Publication Date
CN106161358A CN106161358A (en) 2016-11-23
CN106161358B true CN106161358B (en) 2020-02-04

Family

ID=57338066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510152923.3A Active CN106161358B (en) 2015-04-01 2015-04-01 Contact information management method and device

Country Status (1)

Country Link
CN (1) CN106161358B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465652B (en) * 2016-06-06 2020-09-11 腾讯科技(深圳)有限公司 Operation behavior detection method, server and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703917A (en) * 2002-10-09 2005-11-30 诺基亚有限公司 Method and arrangement for concealing true identity of user in communications system
CN102333299A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for providing information of contact
CN103856324A (en) * 2012-11-28 2014-06-11 联想(北京)有限公司 Identity confirmation method, communication request method, and electronic device
CN103916469A (en) * 2014-03-26 2014-07-09 北京奇虎科技有限公司 Method for acquiring contact person information, client end and server
CN104009955A (en) * 2013-02-21 2014-08-27 腾讯科技(深圳)有限公司 Contact information processing method, contact information processing apparatus, and system
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703917A (en) * 2002-10-09 2005-11-30 诺基亚有限公司 Method and arrangement for concealing true identity of user in communications system
CN102333299A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for providing information of contact
CN103856324A (en) * 2012-11-28 2014-06-11 联想(北京)有限公司 Identity confirmation method, communication request method, and electronic device
CN104009955A (en) * 2013-02-21 2014-08-27 腾讯科技(深圳)有限公司 Contact information processing method, contact information processing apparatus, and system
CN103916469A (en) * 2014-03-26 2014-07-09 北京奇虎科技有限公司 Method for acquiring contact person information, client end and server
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform

Also Published As

Publication number Publication date
CN106161358A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
CN108337677B (en) Network authentication method and device
CN105592011B (en) Account login method and device
US10237272B2 (en) Methods, apparatus, and systems for identity authentication
US11093482B2 (en) Managing access by third parties to data in a network
CN110222533A (en) Distributed data security application method, system and electronic equipment
CN106529851B (en) Order data processing method, communication data query method and server
CN110020854B (en) Data evidence storage method and system based on multiple block chain networks
CN107104923B (en) Account binding and service processing method and device
US10623560B2 (en) Method and server for securing communication number
CN111221484B (en) Screen projection method and device
CN106603262A (en) Method and system of distribution of customer service modes
CN107276970B (en) Unbinding and binding method and device
CN110020945B (en) Data reading method and system based on multiple block chain networks
CN110060153B (en) Data evidence storage method and system based on multiple block chain networks
CN111010527B (en) Method and related device for establishing video call through short message link
CN107203882B (en) Service processing method and device
EP3308496B1 (en) System, apparatus and method for secure coordination of a rendezvous point for distributed devices using entropy multiplexing
WO2020042801A1 (en) Insurance policy information processing method, device and block chain data storage system
CN110958278B (en) API gateway-based data processing method and system and API gateway
EP3125162A1 (en) Method and device for marking unknown number
US10033858B2 (en) Method and server for securing communication number
CN106921708B (en) Group management method and device
JP2018500694A (en) Request transmission method and apparatus
CN116647567A (en) Privacy protection set intersection method and device
CN108696864B (en) Virtual number request and transmission method, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right