CN106304082B - Method and device for identifying malicious number - Google Patents

Method and device for identifying malicious number Download PDF

Info

Publication number
CN106304082B
CN106304082B CN201510272004.XA CN201510272004A CN106304082B CN 106304082 B CN106304082 B CN 106304082B CN 201510272004 A CN201510272004 A CN 201510272004A CN 106304082 B CN106304082 B CN 106304082B
Authority
CN
China
Prior art keywords
attribute information
opposite
telephone number
terminal
malicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510272004.XA
Other languages
Chinese (zh)
Other versions
CN106304082A (en
Inventor
吴鸣
詹远
王珏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510272004.XA priority Critical patent/CN106304082B/en
Publication of CN106304082A publication Critical patent/CN106304082A/en
Application granted granted Critical
Publication of CN106304082B publication Critical patent/CN106304082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to a method and a device for identifying malicious numbers, and belongs to the field of mobile communication. The method comprises the following steps: when a local terminal communicates with an opposite terminal, acquiring an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number; acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information; and determining whether the opposite-end telephone number is a malicious number or not according to the second attribute information. The device includes: the device comprises a first acquisition module, a second acquisition module and an identification module. According to the method and the device, even if the opposite terminal modifies the opposite terminal telephone number into a number out of the blacklist, whether the telephone number is a malicious number can be accurately identified, and therefore identification accuracy is improved.

Description

Method and device for identifying malicious number
Technical Field
The present disclosure relates to the field of mobile communications, and in particular, to a method and an apparatus for identifying a malicious number.
Background
At present, more and more lawbreakers conduct malicious acts by means of communication tools such as mobile phones or fixed phones, for example, phone fraud or short message fraud is conducted on other people, so that economic loss is brought to other people; therefore, when a user receives an unfamiliar telephone call, dials an unfamiliar telephone call or receives a short message sent by the unfamiliar telephone call, whether a telephone number corresponding to the unfamiliar telephone call is a malicious number or not needs to be identified, and if the telephone number is the malicious number, the user is prompted in time, so that the economic loss of the user is avoided.
The current method for identifying the malicious number can be as follows: storing a blacklist, wherein the blacklist comprises at least one malicious number; and acquiring the telephone number of the current communication, determining whether the telephone number exists in the blacklist, and if so, determining that the telephone number of the current communication is a malicious number.
BRIEF SUMMARY OF THE PRESENT DISCLOSURE
To overcome the problems of the related art, the present disclosure provides a method and apparatus for identifying a malicious number.
In one aspect, the present disclosure provides a method for identifying a malicious number according to a first aspect of an embodiment of the present disclosure, including:
when a local terminal communicates with an opposite terminal, acquiring an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number;
acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
and determining whether the opposite-end telephone number is a malicious number or not according to the second attribute information.
Optionally, the obtaining, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number includes:
sending the opposite-end telephone number and the first attribute information to a server, so that the server acquires second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
and receiving the second attribute information sent by the server.
Optionally, the determining, according to the second attribute information, whether the opposite-end phone number is a malicious number includes:
extracting mark information corresponding to the opposite terminal telephone number from the second attribute information;
and if the marking information is the marking information corresponding to the preset malicious number, determining that the opposite-end telephone number is the malicious number.
Optionally, the method further includes:
receiving marking information corresponding to the opposite-end telephone number input by a user;
and sending the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information to a server, so that the server stores the corresponding relation among the opposite-end telephone number, the first attribute information, the user identification and the mark information.
In another aspect, the present disclosure provides a method for identifying a malicious phone according to a second aspect of embodiments of the present disclosure, including:
when a home terminal communicates with an opposite terminal, receiving an opposite terminal telephone number of the opposite terminal sent by the home terminal and first attribute information corresponding to the opposite terminal telephone number;
acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
and sending the second attribute information to the home terminal, so that the home terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information.
Optionally, the obtaining, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number includes:
and acquiring second attribute information corresponding to the opposite-end telephone number from the corresponding relation among the telephone number, the first attribute information and the second attribute information according to the opposite-end telephone number and the first attribute information.
Optionally, the obtaining, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number includes:
acquiring a user identifier of a user;
acquiring corresponding mark information from the corresponding relation among the telephone number, the first attribute information, the user identifier and the mark information according to the opposite-end telephone number, the first attribute information and the user identifier;
and taking the mark information as second attribute information corresponding to the opposite-end telephone number.
Optionally, the method further includes:
receiving the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information corresponding to the opposite-end telephone number, which are sent by the local end;
and storing the opposite-end telephone number, the first attribute information, the user identifier and the mark information in the corresponding relation of the telephone number, the first attribute information, the user identifier and the mark information.
In another aspect, the present disclosure provides an apparatus for identifying a malicious phone according to a third aspect of embodiments of the present disclosure, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring an opposite-end telephone number of an opposite end and first attribute information corresponding to the opposite-end telephone number when a local end communicates with the opposite end;
a second obtaining module, configured to obtain, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number;
and the identification module is used for determining whether the opposite-end telephone number is a malicious number according to the second attribute information.
Optionally, the second obtaining module includes:
a sending unit, configured to send the opposite-end phone number and the first attribute information to a server, so that the server obtains, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number;
a receiving unit, configured to receive the second attribute information sent by the server.
Optionally, the identification module includes:
a first obtaining unit, configured to extract tag information corresponding to the opposite-end phone number from the second attribute information;
and the determining unit is used for determining that the opposite-end telephone number is a malicious number if the marking information is the marking information corresponding to the preset malicious number.
Optionally, the apparatus further comprises:
the first receiving module is used for receiving the marking information corresponding to the opposite-end telephone number input by the user;
a first sending module, configured to send the opposite-end phone number, the first attribute information, the user identifier of the user, and the tag information to a server, so that the server stores a correspondence between the opposite-end phone number, the first attribute information, the user identifier, and the tag information.
In another aspect, the present disclosure provides an apparatus for identifying a malicious phone according to a fourth aspect of embodiments of the present disclosure, including:
the second receiving module is used for receiving the opposite-end telephone number of the opposite end sent by the home terminal and the first attribute information corresponding to the opposite-end telephone number when the home terminal communicates with the opposite end;
a third obtaining module, configured to obtain, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number;
and the second sending module is used for sending the second attribute information to the home terminal, so that the home terminal determines whether the opposite-terminal telephone number is a malicious number according to the second attribute information.
Optionally, the third obtaining module includes:
and the second obtaining unit is used for obtaining second attribute information corresponding to the opposite-end telephone number from the corresponding relation among the telephone number, the first attribute information and the second attribute information according to the opposite-end telephone number and the first attribute information.
Optionally, the third obtaining module includes:
a third obtaining unit, configured to obtain a user identifier of a user;
a fourth obtaining unit, configured to obtain corresponding tag information from a correspondence between the telephone number, the first attribute information, the user identifier, and the tag information according to the opposite-end telephone number, the first attribute information, and the user identifier;
and the unit is used for taking the mark information as second attribute information corresponding to the opposite-end telephone number.
Optionally, the apparatus further comprises:
a third receiving module, configured to receive the opposite-end telephone number, the first attribute information, the user identifier of the user, and tag information corresponding to the opposite-end telephone number, which are sent by the home terminal;
and the storage module is used for storing the opposite-end telephone number, the first attribute information, the user identifier and the mark information in the corresponding relation among the telephone number, the first attribute information, the user identifier and the mark information.
In another aspect, the present disclosure provides an apparatus for identifying a malicious phone according to a fifth aspect of embodiments of the present disclosure, including:
a first processor;
a first memory for storing first processor-executable instructions;
wherein the first processor is configured to:
when a local terminal communicates with an opposite terminal, acquiring an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number;
acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
and determining whether the opposite-end telephone number is a malicious number or not according to the second attribute information.
In another aspect, the present disclosure provides an apparatus for identifying a malicious phone according to a sixth aspect of embodiments of the present disclosure, including:
a second processor;
a second memory for storing second processor-executable instructions;
wherein the second processor is configured to:
when a home terminal communicates with an opposite terminal, receiving an opposite terminal telephone number of the opposite terminal sent by the home terminal and first attribute information corresponding to the opposite terminal telephone number;
acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
and sending the second attribute information to the home terminal, so that the home terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information.
Some benefits of the present disclosure may include: the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, whether the opposite-end telephone number is a malicious number or not is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end terminal modifies the opposite-end telephone number into a number outside a blacklist, whether the telephone number is the malicious number or not can be accurately identified, so that the identification accuracy is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, are incorporated in and constitute a part of this application, and are not intended to limit the disclosure. In the drawings:
FIG. 1-1 is a flow diagram illustrating a method of identifying malicious numbers in accordance with an exemplary embodiment;
1-2 are flow diagrams illustrating another method of identifying malicious numbers according to an example embodiment;
FIG. 2 is a flow diagram illustrating another method of identifying malicious numbers in accordance with an example embodiment;
fig. 3-1 is a schematic diagram illustrating an apparatus for identifying a malicious number according to an exemplary embodiment;
fig. 3-2 is a schematic diagram illustrating an alternative apparatus for identifying malicious numbers according to an exemplary embodiment;
fig. 4-1 is a schematic diagram illustrating an apparatus for identifying a malicious number according to an exemplary embodiment;
fig. 4-2 is a schematic diagram illustrating an alternative apparatus for identifying malicious numbers according to an exemplary embodiment;
FIG. 5 is a block diagram illustrating a terminal in accordance with an exemplary embodiment;
FIG. 6 is a block diagram illustrating a server in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1-1 is a flowchart illustrating a method of identifying a malicious number according to an exemplary embodiment, where the method of identifying a malicious number is used in a terminal, as shown in fig. 1-1, and includes the following steps.
In step 101a, when a terminal communicates with an opposite terminal, an opposite terminal phone number of the opposite terminal and first attribute information corresponding to the opposite terminal phone number are acquired;
in step 102a, acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
in step 103a, it is determined whether the opposite-end phone number is a malicious number according to the second attribute information.
Fig. 1-2 are flowcharts illustrating a method of identifying a malicious number, which is used in a server as shown in fig. 1-2, according to an exemplary embodiment, and includes the following steps.
In step 101b, when the home terminal communicates with an opposite terminal, receiving an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number, which are sent by the home terminal;
in step 102b, acquiring second attribute information corresponding to the opposite-end telephone number according to the opposite-end telephone number and the first attribute information;
in step 103b, the second attribute information is sent to the home terminal, so that the home terminal determines whether the phone number of the opposite terminal is a malicious number according to the second attribute information.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Fig. 2 is a flowchart illustrating a method for identifying a malicious number according to an exemplary embodiment, where the method for identifying a malicious number is used in a terminal and a server, as shown in fig. 2, and includes the following steps.
In step S201, when the terminal communicates with an opposite terminal, the terminal acquires an opposite-terminal phone number of the opposite terminal and first attribute information corresponding to the opposite-terminal phone number;
the opposite terminal is another terminal which communicates with the terminal; at present, the communication mode of the terminal and the opposite terminal can be that the terminal dials the opposite terminal telephone number of the opposite terminal, the opposite terminal dials the terminal telephone number of the terminal, the terminal sends a short message to the opposite terminal telephone number, or the terminal receives a short message sent by the opposite terminal telephone number.
The first attribute information at least includes a communication state, and the communication state is incoming call, outgoing call, message receiving or message sending, and the like. The first attribute information may further include an area code of the opposite-end telephone number and/or an operator of the opposite-end telephone number.
For example, when the opposite terminal dials the terminal phone number of the terminal with the opposite terminal phone number of 010-: 11185, the first attribute information includes that the communication status is incoming call and the area code is 010.
In step S202, the terminal sends the user identifier of the user, the opposite-end phone number, and the first attribute information to the server;
the user identifier may be a user account registered in the server in advance by the user or a terminal phone number of the terminal.
For example, the user id is 123456, the terminal sends the opposite-end phone number of 11185, the first attribute information is an incoming call, the area code of 010, and the user id of 123456 to the server.
In step S203, the server receives the user identifier, the opposite-end phone number, and the first attribute information sent by the terminal;
for example, the server receives that the opposite-end phone number sent by the terminal is 11185, the first attribute information is that the communication state is an incoming call, the area code is 010, and the user identifier is 123456.
In step S204, the server obtains second attribute information corresponding to the opposite-end phone number according to the opposite-end phone number and the first attribute information;
the second attribute information at least includes tag information, and may further include a tag name and/or a user identifier. The marking information is a category to which the telephone number belongs, for example, the marking information can be fraud, intermediation, express delivery and/or sale, etc.; the tag name can be a fraud phone that is counterfeit to postal mail or an intermediary phone that is counterfeit to a public security bureau, etc.
The method comprises the following steps: and the server acquires second attribute information corresponding to the opposite-end telephone from the corresponding relation among the telephone number, the first attribute information and the second attribute information according to the opposite-end telephone number and the first attribute information.
For example, the correspondence relationship between the telephone number, the first attribute information, and the second attribute information stored by the server is shown in table 1 below:
TABLE 1
Telephone number First attribute information Second attribute information
11185 Incoming call Fraud
11185 Removing electricity Post customer service telephone
…… …… ……
The server is according to the opposite terminal telephone number: 11185, the first attribute information is an incoming call, and the second attribute information corresponding to the opposite-end telephone number is obtained from table 1 as "fraud".
Optionally, if the correspondence between the telephone number and the third attribute information is not stored in the server, the third attribute information includes the first attribute information and the second attribute information; step S204 may be:
the server acquires third attribute information corresponding to the opposite-end telephone number from the corresponding relation between the telephone number and the third attribute information according to the opposite-end telephone number; and acquiring second attribute information corresponding to the opposite-end telephone number from the third attribute information according to the first attribute information.
For example, the correspondence between the telephone number and the third attribute information stored in the server is shown in table 2 below:
TABLE 2
Figure BDA0000723988020000091
The server is according to the opposite terminal telephone number: 11185, obtaining the third attribute information from table 2 is: "incoming-fraud" and "outgoing-postal customer service call", based on the first attribute information: and when the call comes, extracting the second attribute information corresponding to the opposite-end telephone number from the third attribute information as the mark information which is 'fraud'.
And marking information in the corresponding relation among the telephone number, the first attribute information and the second attribute information by the user. The user labeling process is as follows:
for any user, for convenience of explanation, the user is referred to as a first user, and when the first user uses his terminal to communicate, if the telephone number with which the first user is found or suspected to communicate is a malicious telephone, such as a fraud telephone number, an intermediary telephone number, a courier telephone number, and/or a sales telephone number, the telephone number may be marked, such as a fraud, an intermediary, a courier, and/or a sales, etc. The terminal of the first user acquires the marking information obtained by marking the telephone number by the first user and the first attribute information of the telephone number, and sends the user identification of the first user, the telephone number, the marking information and the first attribute information to the server. The server stores the user identification of the first user, the telephone number, the first attribute information and the tag information in the corresponding relation among the user identification, the telephone number, the first attribute information and the tag information.
The server reads any telephone number and the first attribute information of the telephone number from the corresponding relation among the user identification, the telephone number, the first attribute information and the marking information regularly or irregularly; according to the telephone number and the first attribute information of the telephone number, acquiring corresponding mark information from the corresponding relation of the user identification, the telephone number, the first attribute information and the mark information, counting the number of each acquired mark information from the acquired mark information, selecting one or more mark information with the largest number, forming the selected mark information and other information corresponding to the telephone number into second attribute information of the telephone number, wherein the other information can be the area code or the operator of the telephone number, searching the second attribute information corresponding to the telephone number and the first attribute information from the corresponding relation of the telephone number, the first attribute information and the second attribute information, and replacing the searched second attribute information with the second attribute information formed into the second attribute information; or replacing the mark information in the searched second attribute information with the selected mark information.
In this step, before the server obtains the second attribute information corresponding to the opposite-end phone from the corresponding relationship between the phone number, the first attribute information, and the second attribute information, it may be further detected whether the user marked the opposite-end phone number, if so, the marked information that the user marked once is obtained as the second attribute information and returned to the terminal, and if it is detected that the user does not mark the opposite-end phone number, the second attribute information corresponding to the opposite-end phone is obtained from the corresponding relationship between the phone number, the first attribute information, and the second attribute information. The implementation process can be as follows:
the server acquires the user identification of the user, and searches whether the mark information corresponding to the user identification, the opposite-end telephone number and the first attribute information exists in the corresponding relation among the user identification, the telephone number, the first attribute information and the mark information according to the user identification, the opposite-end telephone number and the first attribute information; if the attribute information exists, the searched mark information is obtained, the searched mark information and other information form second attribute information, or the searched mark information is directly used as the second attribute information; and if the attribute information does not exist, acquiring a second attribute corresponding to the opposite-end telephone number from the corresponding relation among the telephone number, the first attribute information and the second attribute information according to the opposite-end telephone number and the first attribute information.
The server searches whether the mark information corresponding to the opposite-end telephone number, the first attribute information and the user identification exists in the corresponding relation among the telephone number, the first attribute information, the user identification and the mark information according to the user identification of the user; and if so, acquiring mark information corresponding to the opposite-end telephone number, the first attribute information and the user identification, and taking the acquired mark information as second attribute information corresponding to the opposite-end telephone number.
For example, the user marks the opposite-end phone number 11185 in advance, and the correspondence between the phone number, the first attribute information, the user identifier, and the mark information stored in the server is shown in table 3 below:
TABLE 3
Telephone number First attribute information User identification Marking information
11185 Incoming call 123456 Intermediary agent
11185 Incoming call 234567 Post customer service telephone
…… …… …… ……
The server is according to the opposite terminal telephone number: 11185. first attribute information: incoming call, user identification: 123456, obtaining the corresponding label information as "intermediary" from table 3, and using "intermediary" as the opposite-end phone number: 11185 corresponding second attribute information.
In step S205, the server transmits the second attribute information to the terminal;
and the server sends the second attribute information to the terminal, so that the terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information.
For example, the server transmits the second attribute information: "intermediary" to the terminal.
In step S206, the terminal receives the second attribute information sent by the server, and determines whether the opposite-end phone number is a malicious number according to the second attribute information;
wherein, this step can be: extracting mark information corresponding to the opposite-end telephone number from the second attribute information; and if the marking information is the marking information corresponding to the preset malicious number, determining that the telephone number of the opposite terminal is the malicious number. And if the marking information is not the marking information corresponding to the preset malicious number, determining that the telephone number of the opposite terminal is not the malicious number, and normally communicating the terminal and the opposite terminal.
The marking information corresponding to the preset malicious number can be fraud, express delivery, intermediary and/or sale and the like. If the phone number of the opposite terminal is determined to be a malicious number, step S207 is executed.
In step S207, if the opposite-end phone number is a malicious number, the user is prompted.
The prompt mode for prompting the user can be to play voice information or display prompt information, and the voice information or the prompt information includes mark information corresponding to the opposite-end telephone number. For example, playing the voice message with the voice message content of "010-"
Alternatively, if the user has not marked the opposite-end phone number once and the user considers that the marking information provided by the server is incorrect, the user may mark the opposite-end phone number at this time, and the specific marking process is the same as the marking process in step S204, and will not be described in detail here.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Fig. 3-1 is a schematic diagram illustrating an apparatus for identifying malicious numbers according to an example embodiment. Referring to fig. 3-1, the apparatus comprises:
a first obtaining module 301, configured to obtain an opposite-end phone number of an opposite end and first attribute information corresponding to the opposite-end phone number when a home end communicates with the opposite end;
a second obtaining module 302, configured to obtain, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number;
the identifying module 303 is configured to determine whether the opposite-end phone number is a malicious number according to the second attribute information.
Optionally, referring to fig. 3-2, the second obtaining module 302 includes:
a sending unit 3021, configured to send the opposite-end phone number and the first attribute information to the server, so that the server obtains second attribute information corresponding to the opposite-end phone number according to the opposite-end phone number and the first attribute information;
a receiving unit 3022, configured to receive the second attribute information sent by the server.
Optionally, the identifying module 303 includes:
a first obtaining unit 3031, configured to extract tag information corresponding to the opposite-end phone number from the second attribute information;
a determining unit 3032, configured to determine that the phone number of the opposite end is a malicious number if the tag information is tag information corresponding to a preset malicious number.
Optionally, the apparatus further comprises:
a first receiving module 304, configured to receive tag information corresponding to an opposite-end phone number input by a user;
a first sending module 305, configured to send the opposite-end phone number, the first attribute information, the user identifier of the user, and the tag information to the server, so that the server stores a corresponding relationship between the opposite-end phone number, the first attribute information, the user identifier, and the tag information.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Fig. 4-1 is a schematic diagram illustrating an apparatus for identifying malicious numbers according to an example embodiment. Referring to fig. 4-1, the apparatus includes:
a second receiving module 401, configured to receive, when a home terminal communicates with an opposite terminal, an opposite terminal phone number of the opposite terminal and first attribute information corresponding to the opposite terminal phone number, where the first attribute information is sent by the home terminal;
a third obtaining module 402, configured to obtain, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number;
a second sending module 403, configured to send the second attribute information to the home terminal, so that the home terminal determines whether the phone number of the opposite terminal is a malicious number according to the second attribute information.
Optionally, referring to fig. 4-2, the third obtaining module 402 includes:
the second obtaining unit 4021 is configured to obtain, according to the opposite-end phone number and the first attribute information, second attribute information corresponding to the opposite-end phone number from a correspondence between the phone number, the first attribute information, and the second attribute information.
Optionally, the third obtaining module 402 includes:
a third obtaining unit 4022, configured to obtain a user identifier of the user;
a fourth obtaining unit 4023, configured to obtain corresponding tag information from a corresponding relationship between the phone number, the first attribute information, the user identifier, and the tag information according to the phone number of the opposite terminal, the first attribute information, and the user identifier;
a unit 4024, configured to use the label information as second attribute information corresponding to the opposite-end phone number.
Optionally, the apparatus further comprises:
a third receiving module 404, configured to receive an opposite-end phone number, first attribute information, a user identifier of a user, and tag information corresponding to the opposite-end phone number, which are sent by a home terminal;
a storage module 405, configured to store the opposite-end phone number, the first attribute information, the user identifier, and the tag information in a corresponding relationship between the phone number, the first attribute information, the user identifier, and the tag information.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Fig. 5 is a block diagram illustrating an apparatus 500 for identifying malicious numbers, according to an example embodiment. For example, the apparatus 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, the apparatus 500 may include one or more of the following components: a processing component 502, a memory 504, a power component 506, a multimedia component 508, an audio component 510, an input/output (I/O) interface 512, a sensor component 514, and a communication component 516.
The processing component 502 generally controls overall operation of the device 500, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 502 may include one or more processors 520 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 502 can include one or more modules that facilitate interaction between the processing component 502 and other components. For example, the processing component 502 can include a multimedia module to facilitate interaction between the multimedia component 508 and the processing component 502.
The memory 504 is configured to store various types of data to support operation at the device 500. Examples of such data include instructions for any application or method operating on device 500, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 504 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 506 provides power to the various components of device 500. The power components 506 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the apparatus 500.
The multimedia component 508 includes a screen that provides an output interface between the device 500 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 508 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 500 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 510 is configured to output and/or input audio signals. For example, audio component 510 includes a Microphone (MIC) configured to receive external audio signals when apparatus 500 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 504 or transmitted via the communication component 516. In some embodiments, audio component 510 further includes a speaker for outputting audio signals.
The I/O interface 512 provides an interface between the processing component 502 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 514 includes one or more sensors for providing various aspects of status assessment for the device 500. For example, the sensor assembly 514 may detect an open/closed state of the device 500, the relative positioning of the components, such as a display and keypad of the apparatus 500, the sensor assembly 514 may also detect a change in the position of the apparatus 500 or a component of the apparatus 500, the presence or absence of user contact with the apparatus 500, orientation or acceleration/deceleration of the apparatus 500, and a change in the temperature of the apparatus 500. The sensor assembly 514 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 514 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 514 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 516 is configured to facilitate communication between the apparatus 500 and other devices in a wired or wireless manner. The apparatus 500 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 516 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 516 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 504 comprising instructions, executable by the processor 520 of the apparatus 500 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Fig. 6 is a block diagram illustrating an apparatus 600 for identifying malicious numbers according to an example embodiment. For example, the apparatus 600 may be provided as a server. Referring to fig. 6, the apparatus 600 includes a processing component 622 that further includes one or more processors and memory resources, represented by memory 632, for storing instructions, such as applications, that are executable by the processing component 622. The application programs stored in memory 632 may include one or more modules that each correspond to a set of instructions. Further, the processing component 622 is configured to execute instructions to perform the above-described methods.
The apparatus 600 may also include a power component 626 configured to perform power management of the apparatus 600, a wired or wireless network interface 650 configured to connect the apparatus 600 to a network, and an input/output (I/O) interface 658. The apparatus 600 may operate based on an operating system stored in the memory 632, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In the embodiment of the disclosure, the second attribute information corresponding to the opposite-end telephone number is obtained according to the opposite-end telephone number and the first attribute information, and whether the opposite-end telephone number is a malicious number is determined according to the second attribute information, so that the query condition is expanded to the opposite-end telephone number and the first attribute information, the obtained second attribute information is more accurate, and even if the opposite-end telephone number is modified to a number outside a blacklist by the opposite-end terminal, whether the telephone number is a malicious number can be accurately identified, so that the identification accuracy is improved.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of identifying a malicious number, the method comprising:
when a local terminal communicates with an opposite terminal, acquiring an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number, wherein the first attribute information comprises a communication state, an area code of the opposite terminal telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
receiving marking information corresponding to the opposite-end telephone number input by a user;
sending the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information to a server, so that the server stores the corresponding relation between the opposite-end telephone number, the first attribute information, the user identification and the mark information;
sending the opposite-end telephone number and the first attribute information to a server, so that the server obtains third attribute information corresponding to the opposite-end telephone number from a corresponding relation between the telephone number and the third attribute information according to the opposite-end telephone number, and obtains second attribute information corresponding to the opposite-end telephone number from the third attribute information according to the first attribute information, wherein the server stores the corresponding relation between the telephone number and the third attribute information, and the third attribute information comprises the first attribute information and the second attribute information corresponding to the first attribute information;
receiving second attribute information sent by the server, wherein the second attribute information comprises mark information, a mark name and/or a user identifier, and the mark information is a category to which a telephone number belongs;
and determining whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the local terminal.
2. The method of claim 1, wherein the determining whether the opposite-end phone number is a malicious number according to the second attribute information comprises:
extracting mark information corresponding to the opposite terminal telephone number from the second attribute information;
and if the marking information is the marking information corresponding to the preset malicious number, determining that the opposite-end telephone number is the malicious number.
3. A method of identifying a malicious number, the method comprising:
when a home terminal communicates with an opposite terminal, receiving an opposite terminal telephone number of the opposite terminal sent by the home terminal and first attribute information corresponding to the opposite terminal telephone number, wherein the first attribute information comprises a communication state, an area code of the opposite terminal telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
receiving the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information corresponding to the opposite-end telephone number, which are sent by the local end;
storing the opposite-end telephone number, the first attribute information, the user identifier and the mark information in a corresponding relation among the telephone number, the first attribute information, the user identifier and the mark information;
receiving the opposite-end telephone number and the first attribute information sent by the home terminal, acquiring third attribute information corresponding to the opposite-end telephone number from a corresponding relation between the telephone number and the third attribute information according to the opposite-end telephone number, acquiring second attribute information corresponding to the opposite-end telephone number from the third attribute information according to the first attribute information, wherein the server stores the corresponding relation between the telephone number and the third attribute information, the third attribute information comprises first attribute information and the second attribute information corresponding to the first attribute information, the second attribute information comprises mark information, a mark name and/or a user identifier, and the mark information is a category to which the telephone number belongs;
and sending the second attribute information to the home terminal, so that the home terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the home terminal.
4. The method of claim 3, wherein the obtaining second attribute information corresponding to the opposite-end phone number according to the opposite-end phone number and the first attribute information comprises:
acquiring a user identifier of a user;
acquiring corresponding mark information from the corresponding relation among the telephone number, the first attribute information, the user identifier and the mark information according to the opposite-end telephone number, the first attribute information and the user identifier;
and taking the mark information as second attribute information corresponding to the opposite-end telephone number.
5. An apparatus for identifying a malicious number, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring an opposite-end telephone number of an opposite end and first attribute information corresponding to the opposite-end telephone number when the local end communicates with the opposite end, the first attribute information comprises a communication state, an area code of the opposite-end telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
the first receiving module is used for receiving the marking information corresponding to the opposite-end telephone number input by the user;
a first sending module, configured to send the opposite-end phone number, the first attribute information, the user identifier of the user, and the tag information to a server, so that the server stores a correspondence between the opposite-end phone number, the first attribute information, the user identifier, and the tag information;
a second obtaining module, configured to send the opposite-end phone number and the first attribute information to a server, so that the server obtains, according to the opposite-end phone number, third attribute information corresponding to the opposite-end phone number from a correspondence between phone numbers and third attribute information, and obtains, according to the first attribute information, second attribute information corresponding to the opposite-end phone number from the third attribute information, where the server stores the correspondence between phone numbers and third attribute information, the third attribute information includes first attribute information and the second attribute information corresponding to the first attribute information, the second attribute information includes tag information, a tag name, and/or a user identifier, and the tag information is a category to which the phone number belongs;
and the identification module is used for determining whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the local terminal.
6. The apparatus of claim 5, wherein the identification module comprises:
a first obtaining unit, configured to extract tag information corresponding to the opposite-end phone number from the second attribute information;
and the determining unit is used for determining that the opposite-end telephone number is a malicious number if the marking information is the marking information corresponding to the preset malicious number.
7. An apparatus for identifying a malicious number, the apparatus comprising:
the second receiving module is used for receiving an opposite-end telephone number of an opposite end and first attribute information corresponding to the opposite-end telephone number, wherein the first attribute information is sent by a home end when the home end communicates with the opposite end, and comprises a communication state, an area code of the opposite-end telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
a third receiving module, configured to receive the opposite-end telephone number, the first attribute information, the user identifier of the user, and tag information corresponding to the opposite-end telephone number, which are sent by the home terminal;
a storage module, configured to store the opposite-end phone number, the first attribute information, the user identifier, and the tag information in a correspondence relationship between the phone number, the first attribute information, the user identifier, and the tag information;
a third obtaining module, configured to receive the opposite-end phone number and the first attribute information sent by the home terminal, obtain, according to the opposite-end phone number, third attribute information corresponding to the opposite-end phone number from a correspondence between phone numbers and third attribute information, and obtain, according to the first attribute information, second attribute information corresponding to the opposite-end phone number from the third attribute information, where a server stores the correspondence between phone numbers and third attribute information, where the third attribute information includes the first attribute information and the second attribute information corresponding to the first attribute information, the second attribute information includes tag information, a tag name, and/or a user identifier, and the tag information is a category to which the phone number belongs;
and the second sending module is used for sending the second attribute information to the home terminal, so that the home terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the home terminal.
8. The apparatus of claim 7, wherein the third obtaining module comprises:
a third obtaining unit, configured to obtain a user identifier of a user;
a fourth obtaining unit, configured to obtain corresponding tag information from a correspondence between the telephone number, the first attribute information, the user identifier, and the tag information according to the opposite-end telephone number, the first attribute information, and the user identifier;
and the unit is used for taking the mark information as second attribute information corresponding to the opposite-end telephone number.
9. An apparatus for identifying a malicious number, comprising:
a first processor;
a first memory for storing first processor-executable instructions;
wherein the first processor is configured to:
when a local terminal communicates with an opposite terminal, acquiring an opposite terminal telephone number of the opposite terminal and first attribute information corresponding to the opposite terminal telephone number, wherein the first attribute information comprises a communication state, an area code of the opposite terminal telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
receiving marking information corresponding to the opposite-end telephone number input by a user;
sending the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information to a server, so that the server stores the corresponding relation between the opposite-end telephone number, the first attribute information, the user identification and the mark information;
sending the opposite-end telephone number and the first attribute information to a server, so that the server obtains third attribute information corresponding to the opposite-end telephone number from a corresponding relation between the telephone number and the third attribute information according to the opposite-end telephone number, obtains second attribute information corresponding to the opposite-end telephone number from the third attribute information according to the first attribute information, stores the corresponding relation between the telephone number and the third attribute information, and the third attribute information comprises the first attribute information and the second attribute information corresponding to the first attribute information, and the second attribute information comprises mark information, a mark name and/or a user identifier, and the mark information is a category to which the telephone number belongs;
and determining whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the local terminal.
10. An apparatus for identifying a malicious number, comprising:
a second processor;
a second memory for storing second processor-executable instructions;
wherein the second processor is configured to:
when a home terminal communicates with an opposite terminal, receiving an opposite terminal telephone number of the opposite terminal sent by the home terminal and first attribute information corresponding to the opposite terminal telephone number, wherein the first attribute information comprises a communication state, an area code of the opposite terminal telephone number and/or an operator, and the communication state is an incoming call, an outgoing call, a message receiving or a message sending;
receiving the opposite-end telephone number, the first attribute information, the user identification of the user and the mark information corresponding to the opposite-end telephone number, which are sent by the local end;
storing the opposite-end telephone number, the first attribute information, the user identifier and the mark information in a corresponding relation among the telephone number, the first attribute information, the user identifier and the mark information;
receiving the opposite-end telephone number and the first attribute information sent by the home terminal, acquiring third attribute information corresponding to the opposite-end telephone number from a corresponding relation between the telephone number and the third attribute information according to the opposite-end telephone number, acquiring second attribute information corresponding to the opposite-end telephone number from the third attribute information according to the first attribute information, wherein the server stores the corresponding relation between the telephone number and the third attribute information, the third attribute information comprises first attribute information and the second attribute information corresponding to the first attribute information, the second attribute information comprises mark information, a mark name and/or a user identifier, and the mark information is a category to which the telephone number belongs;
and sending the second attribute information to the home terminal, so that the home terminal determines whether the telephone number of the opposite terminal is a malicious number according to the second attribute information, wherein the malicious number is a malicious number preset by the home terminal.
CN201510272004.XA 2015-05-25 2015-05-25 Method and device for identifying malicious number Active CN106304082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510272004.XA CN106304082B (en) 2015-05-25 2015-05-25 Method and device for identifying malicious number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510272004.XA CN106304082B (en) 2015-05-25 2015-05-25 Method and device for identifying malicious number

Publications (2)

Publication Number Publication Date
CN106304082A CN106304082A (en) 2017-01-04
CN106304082B true CN106304082B (en) 2022-03-18

Family

ID=57634476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510272004.XA Active CN106304082B (en) 2015-05-25 2015-05-25 Method and device for identifying malicious number

Country Status (1)

Country Link
CN (1) CN106304082B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741958A (en) * 2008-11-19 2010-06-16 英华达(南京)科技有限公司 Incoming call displaying method for communication device
CN102148889A (en) * 2010-02-09 2011-08-10 阿里巴巴集团控股有限公司 Method, device and system for identifying harassing object
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120253805A1 (en) * 2005-04-21 2012-10-04 Anthony Rajakumar Systems, methods, and media for determining fraud risk from audio signals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741958A (en) * 2008-11-19 2010-06-16 英华达(南京)科技有限公司 Incoming call displaying method for communication device
CN102148889A (en) * 2010-02-09 2011-08-10 阿里巴巴集团控股有限公司 Method, device and system for identifying harassing object
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls

Also Published As

Publication number Publication date
CN106304082A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
US9716789B2 (en) Method, device, terminal and server for replying call
EP3076646B1 (en) Methods and devices for labeling a number
US10783459B2 (en) Method and device for providing ticket information
CN106445189B (en) Candidate word display method and device
CN107423386B (en) Method and device for generating electronic card
US10242678B2 (en) Friend addition using voiceprint analysis method, device and medium
EP3176999A1 (en) Method and device for processing information
CN107454204B (en) User information labeling method and device
CN106331328B (en) Information prompting method and device
CN108011990B (en) Contact management method and device
CN107493366B (en) Address book information updating method and device and storage medium
US20160349947A1 (en) Method and device for sending message
US10244367B2 (en) Short message identification method and device, and storage medium
US10154128B2 (en) Methods and apparatuses for interpreting a phone number
CN104951522B (en) Method and device for searching
CN105488074B (en) Photo clustering method and device
CN106506808B (en) Method and device for prompting communication message
CN109842688B (en) Content recommendation method and device, electronic equipment and storage medium
CN110213062B (en) Method and device for processing message
CN108491535B (en) Information classified storage method and device
CN106790584B (en) Information synchronization method and device
CN106712960B (en) Processing method and device of verification code information
CN106304082B (en) Method and device for identifying malicious number
CN110941670B (en) Mark state detection method, device, equipment and storage medium
CN107147633B (en) Password input method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant