CN106790915B - Number Reorganization control method, device and corresponding server and mobile terminal - Google Patents
Number Reorganization control method, device and corresponding server and mobile terminal Download PDFInfo
- Publication number
- CN106790915B CN106790915B CN201611126365.4A CN201611126365A CN106790915B CN 106790915 B CN106790915 B CN 106790915B CN 201611126365 A CN201611126365 A CN 201611126365A CN 106790915 B CN106790915 B CN 106790915B
- Authority
- CN
- China
- Prior art keywords
- telephone number
- security
- contact
- information
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
- H04M1/27457—Management thereof, e.g. manual editing of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/2753—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
- H04M1/2757—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Library & Information Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to field of communication security, specifically disclose a kind of Number Reorganization control method, device and corresponding server and mobile terminal, described method includes following steps: receiving the contact name and its telephone number that terminal is submitted;The security type marker number for determining the telephone number is inquired from security number database, and associated storage has the data record quantity of the telephone number and contact name in terminal user's address list corresponding with each contact person in terminal user's address list;The terminal is fed back to using the security type marker number and data record quantity as security information.The present invention after user completes contact information editor when that will save to address list, the safety of the contact information is inquired to cloud server, record quantity of the quantity and number being labeled by comparing telephone number in the good friend's address list of user for submitting inquiry, the security information for determining the contact information avoids user that false number is stored in address list.
Description
[technical field]
The present invention relates to field of communication security, and in particular to a kind of Number Reorganization control method, device and corresponding service
Device and mobile terminal.
[background technique]
With the continuous development of the communication technology and Internet technology, people can use mobile phone and carry out whenever and wherever possible with other people
It converses, send short messages, can also be contacted by social software with other people, bring many conveniences for daily life.And
On the other hand, due to the leakage of personal information, all kinds of strange, false numbers bring many puzzlements to life, work, more have
Notably, swindle molecule implements telecommunication fraud to victim by the family members that disguise oneself as, leader, bank clerk etc., gives people group
Crowd causes huge loss;Meanwhile a large amount of subscriber data and contact method are stored in social software, when the social activity of user
After account is stolen, the social account identity that swindle molecule can use user implements swindle.
A kind of current common fraud tactics are that swindle molecule steals the social account of user, then utilize the user's
The false number for being used to implement swindle is sent in the good friend in the user social contact account by social account, and passes through the user
Social account get the telephone number of its good friend, user good friend is stored in the falseness number without knowing it, subsequent
Molecule is swindled to implement to swindle to user good friend using the falseness number.For example, having multiple relative in the social account of user A
The social account of (B, C, D), and do not have to store the telephone number of user C in the address list of user A, when swindle molecule is stolen
The social account rear line A of user C sends the message of " my telephone number is changed to XXX, please present to so-and-so ", and user A is not having
In the case where security provisions by telephone number XXX and user C associated storage in address list, subsequent swindle molecule can utilize phone
Number XXX implements to swindle to user A.
Therefore, how to be effectively prevented from user and be stored in false number, how preferably the safety of identification number, is current
Under internet environment in field of communication security the problem of urgent need to resolve.
[summary of the invention]
The primary purpose of the present invention is that providing a kind of Number Reorganization control method, device and the service for executing this method
Device;
Another object of the present invention is to provide a kind of Number Reorganization control method, device and the mobile ends for executing this method
End.
To realize the purpose, the present invention adopts the following technical scheme:
In a first aspect, the present invention provides a kind of Number Reorganization control method, this method is executed by server, including is walked as follows
It is rapid:
Receive the contact name and its telephone number that terminal is submitted;
The security type marker number for determining the telephone number is inquired from security number database, and logical with terminal user
Associated storage has the telephone number and contact name in the corresponding terminal user's address list of each contact person in news record
Data record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information.
Further, the security information further includes sentencing according to the security type marker number and data record quantity
Trust degree between the fixed telephone number and contact name is normal class degree of belief or exception class degree of belief.
Specifically, determining institute when the security type marker number is greater than one preset value of data recording number flow control
Stating the trust degree between telephone number and contact name is exception class degree of belief;It otherwise, then is normal class degree of belief.
Further, when the security type marker number is greater than the second preset value, the security information further includes
The detailed description information of the telephone number.
Specifically, the security type label includes the security type label of intermediary, distribution, swindle.
Preferably, the address book data of multiple terminal users, and the end are stored in the security number database
End subscriber is associated with its address book data using telephone number as its identity information and is stored in security number database.
Second aspect, the present invention provide a kind of Number Reorganization control method, and this method is including as follows by mobile terminal execution
Step:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the safety letter that server carries out the characterization telephone number fed back after safe sex determination and contact name
Breath;
It parses the security information and is presented to the user it.
Further, the method also includes previous steps:
Terminal user is received after address book contact editing interface completes input contact name and its telephone number
Instruction is saved, to start the step of executing the method.
Specifically, the data record quantity is terminal corresponding with each contact person in terminal user's address list use
Associated storage has the data record quantity of the telephone number and contact name in the address list of family.
Further, the method also includes subsequent steps:
It exports contact information confirmation and saves window, and by the contact information after the confirmation instruction for receiving user
It saves to local address book, while the contact name and its telephone number is uploaded to server to complete the terminal user and lead to
Interrogate the update of record.
Corresponding with first aspect, the present invention provides a kind of Number Reorganization control device, comprising:
Receiving module: for receiving the contact name and its telephone number of terminal submission;
Enquiry module: for inquiring the security type marker number for determining the telephone number from security number database,
There is the telephone number with associated storage in terminal user's address list corresponding with each contact person in terminal user's address list
With the data record quantity of contact name;
Feedback module: for feeding back to institute using the security type marker number and data record quantity as security information
State terminal.
Further, the security information further includes sentencing according to the security type marker number and data record quantity
Trust degree between the fixed telephone number and contact name is normal class degree of belief or exception class degree of belief.
Specifically, determining institute when the security type marker number is greater than one preset value of data recording number flow control
Stating the trust degree between telephone number and contact name is exception class degree of belief;It otherwise, then is normal class degree of belief.
Further, when the security type marker number is greater than the second preset value, the security information further includes
The detailed description information of the telephone number.
Specifically, the security type label includes the security type label of intermediary, distribution, swindle.
Preferably, the address book data of multiple terminal users, and the end are stored in the security number database
End subscriber is associated with its address book data using telephone number as its identity information and is stored in security number database.
Corresponding with second aspect, the present invention provides a kind of Number Reorganization control device, comprising:
Obtain module: for obtaining the contact name and its telephone number at editing address list interface;
Submit module: for submitting the telephone number and contact name to carry out safe sex determination to server;
It collects module: carrying out the characterization fed back after the safe sex determination telephone number and contact person for receiving server
The security information of title;
Display module: for parsing the security information and being presented to the user it.
Further, described device further include:
Execution module: for receive terminal user address book contact editing interface complete input contact name and its
Preservation instruction after telephone number, to start to execute the function of other modules of described device.
Specifically, the data record quantity is terminal corresponding with each contact person in terminal user's address list use
Associated storage has the data record quantity of the telephone number and contact name in the address list of family.
Further, described device further include:
Memory module: window is saved for exporting contact information confirmation, and will after the confirmation instruction for receiving user
The contact information is saved to local address book, while the contact name and its telephone number are uploaded to server with complete
At the update of terminal user's address list.
With reference to first aspect, the present invention also provides a kind of servers, comprising:
Memory: the candidate intermediate data and result that the method for storing above-mentioned first aspect generates during realizing
Data;
One or more processors: for being configured as the step of executing above-mentioned first aspect any one the method.
In conjunction with second aspect, the present invention also provides a kind of mobile terminals, comprising:
Touch-sensitive display: the average information and result letter that the method for showing above-mentioned second aspect generates during realizing
Breath;
Memory: the candidate intermediate data and result that the method for storing above-mentioned second aspect generates during realizing
Data;
One or more processors: for being configured as the step of executing above-mentioned second aspect any one the method.
Compared with prior art, the present invention has following advantage:
The present invention is based on the address book data of multiple users under the big data of cloud, the connection submitted according to terminal user
Name claims and telephone number query, determine the labeled security type of the telephone number and quantity and the contact name and
Whether telephone number stores relevant contact information record in good friend's address list of terminal user, and then determining should
The security information of number simultaneously feeds back to terminal user, is selected with allowing terminal user to make safer judgement according to security information.
Meanwhile the security information of the invention further includes the detailed description information to the data record, description letter
Breath can allow terminal user to become apparent from, intuitively understand the connection to the contact person to be stored in the address list of oneself good friend
People's information can clearly recognize the safety for the contact information to be stored according to the details.
Furthermore the security information further includes the detailed description information to telephone number, it is more intuitive, in detail will inquiry,
The security information of telephone number after confirmation is presented to the user, and user is allowed to be more easier to distinguish the true and false of telephone number.
To sum up, the present invention after user completes contact information editor when that will save to address list, by taking to cloud
Business device, which is inquired, determines that the safety of the contact information avoids user will be false based on the safe sex determination under the big data of cloud
Swindle molecule is set to have an opportunity to take advantage of in number deposit address list.
Obviously, it is subsequent to be that recapitulative, more advantage description will be embodied in for the above-mentioned description in relation to advantage of the present invention
During embodiment discloses, and, the content that those skilled in the art can also be disclosed reasonably finds of the invention its
His plurality of advantages.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
[Detailed description of the invention]
Fig. 1 is an embodiment flow diagram of Number Reorganization control method of the present invention;
Fig. 2 is another embodiment flow diagram of Number Reorganization control method of the present invention;
Fig. 3 is an embodiment schematic diagram of Number Reorganization control device of the present invention;
Fig. 4 is another embodiment schematic diagram of Number Reorganization control device of the present invention;
One embodiment schematic block diagram of Fig. 5 mobile terminal part-structure provided in an embodiment of the present invention.
[specific embodiment]
The present invention is further described with exemplary embodiment with reference to the accompanying drawing, wherein identical label in attached drawing
All refer to identical component.In addition, if the detailed description of known technology is for showing the invention is characterized in that unnecessary
, then it omits it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware
Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment
It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can
With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " mobile terminal ", " terminal device " can be it is portable, can transport, be mounted on traffic
In tool (aviation, sea-freight and/or land), or it is suitable for and/or is configured in local runtime, and/or with distribution form,
Operate in any other position operation in the earth and/or space." terminal " used herein above, " mobile terminal ", " terminal is set
It is standby " it can also be communication terminal, access terminals, music/video playback terminal, such as can be PDA, MID (Mobile
Internet Device, mobile internet device) and/or mobile phone with music/video playing function, it is also possible to
The equipment such as smart television, set-top box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above comprising but be not limited to count
The cloud that calculation machine, network host, single network server, multiple network server collection or multiple servers are constituted.Here, Yun Youji
It is constituted in a large number of computers or network servers of cloud computing (Cloud Computing), wherein cloud computing is distributed computing
One kind, a super virtual computer consisting of a loosely coupled set of computers.In the embodiment of the present invention, distal end
It can be realized and be communicated by any communication mode between the network equipment, terminal device and WNS server, including but not limited to, is based on
The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared
The low coverage wireless transmission method of transmission standard.
Those skilled in the art of the present technique are appreciated that interface of the present invention/user interface/operation interface refers to can
For sending the display interface of control instruction to intelligent terminal, for example, can be one in the setting page of android system
Option (or key, wherein by application program addition, similarly hereinafter), is also possible to the notification bar breathed out from desktop or interaction page
An option in face can also be an option in the page that a movable component of the application program is constructed.
In a first aspect, being an embodiment flow diagram of Number Reorganization control method of the present invention, this method as shown in Figure 1
It is executed by the network equipment (i.e. server), the network equipment includes but is not limited to single network server, multiple network services
The server group of device composition or being made of a large amount of hosts or network server based on cloud computing (Cloud Computing)
Cloud includes the following steps:
Step S100: the contact name and its telephone number that terminal is submitted are received.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal
Deposit " operation, when progress " preservation " operation, terminal obtains the contact person that inputs in address book contact editing interface of user
The contact informations such as title and telephone number are committed to service through remote interface by ICP/IP protocol after being then wrapped into
Device, while the safety decision request to the telephone number and contact name is initiated to server.In general, contact person believes
Breath includes contact name and telephone number, further includes the information such as contact addresses, mailbox, company, every in editing interface
One contact information is equipped with respective editor's input frame, and terminal preferably only obtains contact name and electricity in the present embodiment
Talk about the data in number editor input frame.Server receives the contact data of terminal submission and responds the safe sex determination
Request analysis obtains contact name therein and telephone number.
Step S110: the security type marker number of the determining telephone number of inquiry from security number database, and with
Associated storage has the telephone number and contact person in the corresponding address book data of each contact person in terminal user's address list
The data record quantity of title.
Each security type label and quantity, multiple terminals of each telephone number are stored in the security number database
The address book data of user is deposited wherein the terminal user is associated with its address book data using telephone number as its identity information
Storage can determine a unique terminal user in security number database, through a telephone number, and then determine the end
The address book data of end subscriber.
It is marked specifically, the security type is marked including security types such as intermediary, distribution, swindles, wherein security type
It is usually that certain operating personnels using the telephone number that user leaves in the network platform carry out phone and disturb labeled as " intermediary "
It disturbs;Security type is usually that the business that carries out to sell certain commodity of the business personnel of certain companies pushes away labeled as " distribution "
Pin;Security type is usually operating personnel labeled as " swindle " to be disguised oneself as relative, friend, the leader etc. of user using false number
Deceptive information is spread to user to implement to swindle.The quantity of security type label is time that the telephone number is marked by other people
Number, such as a telephone number are labeled as " intermediary " 20 times by other people, then security number database of the number in server
In " intermediary " security type marker number be 20.
There is associated storage in terminal user's address list corresponding with each contact person in terminal user's address list
The data record quantity of the telephone number and contact name, specifically, being stored in security number database multiple with electricity
Talk about address book data of the number as the terminal user of its identity information, for example, stored in security number database user A, B,
C, the address book data of D, when user A submits contact name N and telephone number T to server to inquire its security information,
Server inquires the address book data of user A first, if having the contact information of user B, C, D in the address list of user A, service
Whether the contact person of contact name N and/or telephone number T is stored in the address book data of device and then inquiry user B, C, D
To count the data record quantity, the statistical of the data record quantity includes: information
1. using contact name N and telephone number T as distinguishing characteristics, if storage is related in the address list of user B, C
Name claims the contact information of N and telephone number T, then the data record quantity is 2;
2. using telephone number T as distinguishing characteristics, if being stored with the contact person of telephone number T in the address list of user B, C
Information, then the data record quantity is 2;This mode stores the connection of the same telephone number T mainly for different terminals user
It is that name claims that different fuzzy queries may be carried out, such as since user's A, B, C identity difference stores the connection of the same telephone number
It is also different to be that name claims, and the contact name that user B stores telephone number T is known as " second elder brother ", and user C stores telephone number T
Contact name be known as " two younger brothers ", and user A submit, inquiry telephone number T contact name N be " di-primary ", in the party
Under formula, the contact name and user A that telephone number T no matter is stored in user B, C submit the contact name inquired whether phase
Together, the data record quantity is still denoted as 2.
3. using contact name N as distinguishing characteristics, if being stored with the connection of contact name N in the address list of user B, C
It is people's information, then the data record quantity is 2;This mode can preferably allow user A judge submitted telephone number T and
Whether contact name N corresponds to, such as the telephone number of contact person of contact name N of user B, C storage is T1, at this time institute
It states data record quantity and is still denoted as 2, and increase corresponding description for the data record quantity in subsequent security information to allow
User A preferably judges whether submitted telephone number T and contact name N correspond to.
Step S120: the end is fed back to using the security type marker number and data record quantity as security information
End.
Server inquiry after determine the contact person security type marker number and data record quantity, then as
Security information is packaged, feeds back to the terminal.
Preferably, the security information further includes the trust degree of the telephone number, specifically, server is according to the peace
Universal class phenotypic marker quantity and data record quantity determine that the trust degree between the telephone number and contact name is normal
Class degree of belief or exception class degree of belief.Specifically, judging a kind of embodiment of trust degree is, when the security type marks
When quantity is greater than one preset value of data recording number flow control, the trusted between the telephone number and contact name is determined
Degree is exception class degree of belief;It otherwise, then is normal class degree of belief.For example, the first preset value is 30, in security number database
In, when the quantity (such as 50) that a certain telephone number is labeled is greater than the data record quantity (such as 10) 30 of terminal user
When a, it is determined that the trust degree of the telephone number is exception class degree of belief.
Further, when the security type marker number of the telephone number is greater than the second preset value, the safety letter
Breath further includes the detailed description information of the telephone number.It is greater than the second preset value in the number that a telephone number is labeled
When, the main application of the number can be determined roughly, it is assumed that the second preset value is then that 30, such as telephone number is labeled
For " distribution " 32 times, then it can determine that the number is the sale call of certain company.Specifically, detailed description information can be phone number
Company belonging to code, such as safety label type can be " distribution of XX company " for the detailed description information of the number of " distribution ",
Introduce the number be the said firm business personnel carry out promote use;Detailed description information can also be the possibility content of call,
Such as swindle molecule is once implemented swindle by a telephone number in the way of pretending leader and is " swindle " and is added by user's mark
Detailed description information is added, which can be " cheat, which pretends leader, allows you help to transfer accounts ".
Further, the security information further includes the detailed description information to the data record quantity, is corresponded to not
The statistical of same data record quantity, detailed description information is different, specifically, corresponding to above-mentioned data recording number
1. the of amount plants statistical, such as " your address list good friend B, C is stored the detailed description information of the data record quantity
There are the contact information of telephone number T and contact name N ";2. corresponding to above-mentioned data record quantity plants statistical,
Such as " contact name of your address list good friend B record number T is known as two to the detailed description information of the data record quantity
Brother, you address list good friend C record number T contact name be known as two younger brothers ";3. corresponding to above-mentioned data record quantity plants
Statistical, the detailed description information of the data record quantity such as " the contact name N of your address list good friend B record
Telephone number be T1, your telephone number of contact name N of address list good friend C record is T1 ".
Server according to the security type marker number and data record quantity inquired, by security type marker number,
Data record quantity, the trust degree to the detailed description information of the data record quantity and when meeting judgment rule, phone
Any one or more of the detailed description information of number is used as security information to feed back to the terminal.
Second aspect is an embodiment flow diagram of Number Reorganization control method of the present invention, this method as shown in Figure 2
By mobile terminal execution, also can be regarded as being executed by the application program in mobile terminal, one kind of the present embodiment is achieved in that
It relies on the functional module being built in the system application " address list " of terminal operating system and realizes;The another kind of the present embodiment
Implementation is to rely on independent Three-Part protocol record application program and realizes such as the functional module in " 360 safety communications record "
's;It both can be configured to have the function of executing, realize this method step, in addition those skilled in the art can also be according to this
The realization principle of invention is by the functional application into other executable programs.
Preferably, the present embodiment further includes for triggering the previous step for executing the method, and the previous step is specific
To receive terminal user and completing the preservation after input contact name and its telephone number in address book contact editing interface
Instruction.It is well known that storing contact information needs to carry out " addition -> editor -> preservation " in address list application at the terminal
Operation, the previous step correspond to " preservations " this operation, when terminal user address list contact person's editing interface completion
Preservation operation is carried out after contact information editor, triggers the preservation instruction, and terminal receives and responds to the preservation instruction execution
Following steps.For example, user completes the title and electricity of input contact person in contact person's editing interface of " 360 safety communications record "
Number (certainly can also include other contact informations such as mailbox, address) be talked about, then clicks and is provided such as on editing interface
" preservation " button, triggers the preservation instruction, and terminal receives and responds to preservation instruction and starts to execute following steps.
Step S200: the contact name and its telephone number of address book contact editing interface are obtained.
After completing above-mentioned previous step, terminal obtains the contact person that user inputs in address book contact editing interface
The contact informations such as title and telephone number, in general, contact information includes contact name and telephone number, it further include connection
It is the information such as people address, mailbox, company, each single item contact information in editing interface is equipped with respective editor's input
Frame preferably only obtains the data in contact name and telephone number editor's input frame in the present embodiment.
Step S210: the telephone number and contact name is submitted to carry out safe sex determination to server.
Terminal is led to after being wrapped into after getting telephone number and the contact name data in contact person's editing interface
It crosses ICP/IP protocol and is committed to server through remote interface, while initiating to server to the telephone number and contact name
Safety decision request.
Step S220: it receives server and carries out the characterization fed back after the safe sex determination telephone number and contact name
Security information.
The telephone number and contact name that server is submitted according to terminal are inquired from security number database, determine it
Security information, the security information include security type marker number, data record quantity, to the detailed of the data record quantity
Thin description information, further include the detailed description information of trust degree when meeting judgment rule, telephone number any one or
Multinomial information.
It is marked specifically, the security type is marked including security types such as intermediary, distribution, swindles, wherein security type
It is usually that certain operating personnels using the telephone number that user leaves in the network platform carry out phone and disturb labeled as " intermediary "
It disturbs;Security type is usually that the business that carries out to sell certain commodity of the business personnel of certain companies pushes away labeled as " distribution "
Pin;Security type is usually operating personnel labeled as " swindle " to be disguised oneself as relative, friend, the leader etc. of user using false number
Deceptive information is spread to user to implement to swindle.The quantity of security type label is time that the telephone number is marked by other people
Number, such as a telephone number are labeled as " intermediary " 20 times by other people, then " intermediary " security type marker number of the number
It is 20.
Specifically, the data record quantity is address list corresponding with each contact person in terminal user's address list
Associated storage has the data record quantity of the telephone number and contact name in data.It is stored in security number database
The address book data of multiple terminal users using telephone number as its identity information, such as stored in security number database
The address book data of user A, B, C, D, when user A submits contact name N and telephone number T to inquire its safety to server
When information, server inquires the address book data of user A first, if having the contact person of user B, C, D to believe in the address list of user A
Whether it is stored with contact name N's and/or telephone number T in breath, server and then the address book data of inquiry user B, C, D
Contact information is to count the data record quantity.
Specifically, the detailed description information of the data record quantity is that different data record quantity statistics mode is corresponding
The statistical of different description informations, the data record quantity includes:
1. being stored using contact name N and telephone number T as distinguishing characteristics, such as in the address list of above-mentioned user B, C
Name of being related claims the contact information of N and telephone number T, then the data record quantity is 2;
2. being stored with telephone number T's using telephone number T as distinguishing characteristics, such as in the address list of above-mentioned user B, C
Contact information, then the data record quantity is 2;This mode stores the same telephone number mainly for different terminals user
The contact name of T different may carry out fuzzy query, such as since user's A, B, C identity difference stores the same telephone number
Contact name it is also different, user B store telephone number T contact name be known as " second elder brother ", user C store phone number
The contact name of code T is known as " two younger brothers ", and user A is submitted, the contact name N of the telephone number T of inquiry is " di-primary ", at this
Under mode, the contact name and user A that telephone number T no matter is stored in user B, C submit inquiry contact name whether
Identical, the data record quantity is still denoted as 2.
3. being stored with contact name using contact name N as distinguishing characteristics, such as in the address list of above-mentioned user B, C
The contact information of N, then the data record quantity is 2;This mode can preferably allow user A to judge submitted phone number
Code T and contact name N whether correspond to, such as user B, C storage contact name N contact person telephone number be T1,
The data record quantity is still denoted as 2 at this time, and retouches accordingly in subsequent security information for data record quantity increase
It states to allow user A preferably to judge whether submitted telephone number T and contact name N correspond to.
Corresponding to the statistical of different data record quantity, information is described in detail specifically, corresponding to above-mentioned number
Statistical, the detailed description information of the data record quantity such as " your address list good friend are 1. planted according to the of record quantity
B, C is stored with the contact information of telephone number T and contact name N ";2. corresponding to above-mentioned data record quantity plants
Statistical, the detailed description information of the data record quantity such as " contact person of your address list good friend B record number T
Entitled second elder brother, you address list good friend C record number T contact name be known as two younger brothers ";Corresponding to above-mentioned data record quantity
The 3. plant statistical, such as " connection of your address list good friend B record of the detailed description information of the data record quantity
It is T1 " that the telephone number of name N, which is referred to as T1, your telephone number of contact name N of address list good friend C record,.
Specifically, the trust degree refer to server according to the security type marker number and data record quantity,
Determine that the trust degree between the telephone number and contact name is normal class degree of belief or exception class degree of belief;Server
Judging a kind of embodiment of trust degree is, when the security type marker number is greater than the data recording number flow control one in advance
If determining the trust degree between the telephone number and contact name for exception class degree of belief when value;It otherwise, then is normal
Class degree of belief.For example, the first preset value is 30, in security number database, when the quantity (example that a certain telephone number is labeled
Such as 50) when being greater than data record quantity (such as 10) 30 of terminal user, it is determined that the trust degree of the telephone number
For exception class degree of belief.
Specifically, the detailed description information of telephone number can be company belonging to telephone number, such as safety label class
Type is that the detailed description information of the number of " distribution " can be company belonging to telephone number, such as safety label type is " to push away
The detailed description information of the number of pin " can be " distribution of XX company ", and introducing the number is that the said firm business personnel promotes
It uses;Detailed description information can also be that the possibility content of call, such as swindle molecule once utilized a telephone number with vacation
The mode of dress leader implements swindle and is " swindle " by user's mark and is added to detailed description information, which can be with
It is " cheat, which pretends leader, allows you help to transfer accounts ".
Terminal, which receives after server carries out safe sex determination, remembers the security type marker number of the telephone number, data
Record quantity, the trust degree to the detailed description information of the data record quantity and when meeting judgment rule, telephone number
Any one or more security information data packet as security information feedback of information is described in detail.
Step S230: parsing the security information and is presented to the user it.
Terminal is parsed after receiving the security information of server feedback and obtains security type label therein
Quantity, data record quantity and the detailed description information to data record quantity, it is also possible to including trust degree, telephone number
Information is described in detail, then window is saved in the output contact information confirmation of address book contact editing interface, preferably by institute
It states security information to be shown in the window, then protects the contact information after the confirmation instruction for receiving terminal user
It deposits to local address book, while it is uploaded to server to complete the terminal user and lead to by the contact name and its telephone number
The update of news record data.
It is corresponding with first aspect, it is an embodiment schematic diagram of Number Reorganization control device of the present invention as shown in Figure 3,
Include:
Receiving module 100: for receiving the contact name and its telephone number of terminal submission.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal
Deposit " operation, when progress " preservation " operation, terminal obtains the contact person that inputs in address book contact editing interface of user
The contact informations such as title and telephone number are committed to service through remote interface by ICP/IP protocol after being then wrapped into
Device, while the safety decision request to the telephone number and contact name is initiated to server.In general, contact person believes
Breath includes contact name and telephone number, further includes the information such as contact addresses, mailbox, company, every in editing interface
One contact information is equipped with respective editor's input frame, and terminal preferably only obtains contact name and electricity in the present embodiment
Talk about the data in number editor input frame.The receiving module 100 of server receives the contact data of terminal submission and response
The safety decision request parses to obtain contact name therein and telephone number.
Enquiry module 110: for inquiring the security type reference numerals for determining the telephone number from security number database
Amount, and in address book data corresponding with each contact person in terminal user's address list associated storage have the telephone number with
The data record quantity of contact name.
Each security type label and quantity, multiple terminals of each telephone number are stored in the security number database
The address book data of user is deposited wherein the terminal user is associated with its address book data using telephone number as its identity information
Storage can determine a unique terminal user in security number database, through a telephone number, and then determine the end
The address book data of end subscriber.The contact name and telephone number that enquiry module 110 is received according to receiving module 100, into
And it inquires and determines its security type marker number and data record quantity.
Feedback module 120: for being fed back using the security type marker number and data record quantity as security information
To the terminal.
Enquiry module 110 determines the security type marker number and data record quantity of the contact person after inquiring, then instead
Feedback module 120 is packaged as security information, feeds back to the terminal.
Preferably, the security information can also include telephone number trust degree, specifically, enquiry module 110 according to
According to the security type marker number and data record quantity, the trusted between the telephone number and contact name is determined
Degree is normal class degree of belief or exception class degree of belief.Wherein, when the security type marker number is greater than the data recording number
When one preset value of flow control, enquiry module 110 determines the trust degree between the telephone number and contact name for exception class
Degree of belief;It otherwise, then is normal class degree of belief.
In addition, when enquiry module 110 determines the security type marker number of the telephone number greater than the second preset value,
The security information further includes the detailed description information of the telephone number.
Further, the security information further includes the number of the statistical corresponding to different data record quantity
According to the detailed description information of record quantity.
It is corresponding with second aspect, it is an embodiment schematic diagram of Number Reorganization control device of the present invention as shown in Figure 4,
Include:
Execution module: for receive terminal user address book contact editing interface complete input contact name and its
Preservation instruction after telephone number, to start to execute the function of other modules of described device.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal
Deposit " operation, when user address list contact person's editing interface complete contact information editor after click editing interface above mention
What is supplied such as " saves " button, triggers the preservation instruction, execution module receives and responds to preservation instruction, to start to execute
The function of other modules of described device.
Obtain module 200: for obtaining the contact name and its telephone number of address book contact editing interface.
It obtains module 200 and obtains the contact name and telephone number that user inputs in address book contact editing interface
Etc. contact informations, in general, contact information includes contact name and telephone number, further include contact addresses, mailbox,
The information such as company, each single item contact information in editing interface are equipped with respective editor's input frame, in the present embodiment
Obtain the data in module 200 preferably acquisition contact name and telephone number editor's input frame.
Submit module 210: for submitting the telephone number and contact name to carry out safe sex determination to server.
After obtaining module 200 and getting contact data, passed through after submitting module 210 to be wrapped by ICP/IP protocol
Remote interface is committed to server, while asking to server initiation to the safe sex determination of the telephone number and contact name
It asks.
It collects module 220: carrying out the characterization fed back after the safe sex determination telephone number and connection for receiving server
It is the security information that name claims.
The telephone number and contact name that server is submitted according to terminal are inquired from security number database, determine it
Security information, the security information include security type marker number, data record quantity, to the detailed of the data record quantity
Thin description information, further include the detailed description information of trust degree when meeting judgment rule, telephone number any one or
Multinomial information.
After server carries out safe sex determination, collects module 220 and receive server and carry out the electricity after safe sex determination
Talk about security type marker number, the data record quantity, detailed description information and satisfaction to the data record quantity of number
The detailed description information of trust degree, telephone number when judgment rule it is any one or more as security information feedback and
The security information data packet come.
Display module 230: for parsing the security information and being presented to the user it.
After collecting module 220 and receiving the security information of server feedback, display module 230 is parsed acquisition
Security type marker number, data record quantity and the detailed description information to data record quantity therein, it is also possible to including
The detailed description information of trust degree, telephone number;Then memory module exports contact person in address book contact editing interface
Validation of information saves window, and saves the contact information to local communication after the confirmation instruction for receiving terminal user
Record, while it is uploaded to server to complete terminal user's address book data more by the contact name and its telephone number
Newly.
In addition, corresponding with first aspect, the present invention also provides a kind of terminals for executing first aspect the method to set
It is standby, a kind of server, comprising: memory;One or more processors;The memory is used to store the side of above-mentioned first aspect
The candidate intermediate data and result data that method generates during realizing;One or more of processors, which are configured with, to be held
The function of row following steps:
Receive the contact name and its telephone number that terminal is submitted;
The security type marker number for determining the telephone number is inquired from security number database, and logical with terminal user
Associated storage has the telephone number and contact name in the corresponding terminal user's address list of each contact person in news record
Data record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information.
Likewise, corresponding with second aspect, the present invention also provides a kind of movements for executing second aspect the method
Terminal, as shown in figure 5, for ease of description, only parts related to embodiments of the present invention are shown, particular technique details is not taken off
Show, please refers to present invention method part.The mobile terminal can be include any terminal such as mobile phone, tablet computer,
It is following to be illustrated so that mobile terminal is mobile phone as an example:
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided in an embodiment of the present invention.Ginseng
Fig. 5 is examined, mobile phone includes: baseband processing module 510, memory 520, input unit 530, display unit 540, sensor 550, sound
The portions such as frequency circuit 560, Wireless Fidelity (wireless fidelity, WiFi) module 570, processor 580 and power supply 590
Part.It will be understood by those skilled in the art that handset structure shown in Fig. 5 does not constitute the restriction to mobile phone, it may include ratio
More or fewer components are illustrated, certain components or different component layouts are perhaps combined.
Baseband processing module 510 can be used for synthesizing the baseband signal that will emit, or carry out to the baseband signal received
Decoding.Specifically, being exactly that audio signal is compiled into the base band code for emitting when emitting;When reception, the base band received
Code is interpreted as audio signal.Meanwhile being also responsible for address information (cell-phone number, station address), text information (news in brief text, website
Text), the compiling of pictorial information (multimedia message).
Memory 520 can be used for storing software program and module, and processor 580 is stored in memory 520 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 520 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 520 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 530 may include that touch panel 531 and other inputs are set
Standby 532.Touch panel 531, also referred to as touch screen, collect user on it or nearby touch operation (such as user use
The operation of any suitable object or attachment such as finger, stylus on touch panel 531 or near touch panel 531), and root
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 531 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinate, then gives processor 580, and can receive order that processor 580 is sent and be executed.Furthermore, it is possible to using electricity
The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input
Unit 530 can also include other input equipments 532.Specifically, other input equipments 532 can include but is not limited to secondary or physical bond
One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 540 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 540 may include display panel 541, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 541.Further, touch panel 531 can cover display panel 541, when touch panel 531 detect it is on it or attached
After close touch operation, processor 580 is sent to determine the type of touch event, is followed by subsequent processing device 580 according to touch event
Type corresponding visual output is provided on display panel 541.Although in Fig. 5, touch panel 531 and display panel 541
It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control
Panel 531 and display panel 541 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 541, proximity sensor can close display panel 541 when mobile phone is moved in one's ear
And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions
Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 560, loudspeaker 561, microphone 562 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 561, be converted to sound by loudspeaker 561 by road 560
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 562, is turned after being received by voicefrequency circuit 560
It is changed to audio data, then by after the processing of audio data output processor 580, such as another mobile phone is sent to through RF circuit 510,
Or audio data is exported to memory 520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 570
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown
WiFi module 570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 520, and call and be stored in memory 520
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 580 can wrap
Include one or more processing units;Preferably, processor 580 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 580.
Mobile phone further includes the power supply 590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 580 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In embodiments of the present invention, processor 580 included by the terminal is also with the following functions:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the safety letter that server carries out the characterization telephone number fed back after safe sex determination and contact name
Breath;
It parses the security information and is presented to the user it.
The present invention is based on the address book data of multiple users under the big data of cloud, the connection submitted according to terminal user
Name claims and telephone number query, determine the labeled security type of the telephone number and quantity and the contact name and
Whether telephone number stores relevant contact information record in good friend's address list of terminal user, and then determining should
The security information of number simultaneously feeds back to terminal user, is selected with allowing terminal user to make safer judgement according to security information;
Meanwhile the security information of the invention further includes the detailed description information to the data record, which can allow
Terminal user becomes apparent from, intuitively understands contact information to the contact person to be stored in the address list of oneself good friend,
The safety for the contact information to be stored can be clearly recognized according to the details;Furthermore the safety
Information further includes the detailed description information to telephone number, it is more intuitive, in detail by inquiry, confirmation after telephone number safety
Information is presented to the user, and user is allowed to be more easier to distinguish the true and false of telephone number;To sum up, the present invention completes contact person's letter in user
When will save after breath editor to address list, the safety of the contact information is determined by inquiring to cloud server, is based on
Safe sex determination under the big data of cloud, avoiding user that false number is stored in address list makes swindle molecule have an opportunity to take advantage of.
Although having been illustrated with some exemplary embodiments of the invention above, those skilled in the art will be managed
Solution, in the case where not departing from the principle of the present invention or spirit, can make a change these exemplary embodiments, of the invention
Range is defined by the claims and their equivalents.
Claims (18)
1. a kind of Number Reorganization control method, which comprises the steps of:
Receive the contact name and its telephone number that terminal is submitted;
From security number database inquire determine the telephone number security type marker number, and with terminal user's address list
In the corresponding terminal user's address list of each contact person in associated storage have the data of the telephone number and contact name
Record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information;When the safety
When type mark quantity is greater than the second preset value, the security information further includes the detailed description information of the telephone number.
2. the method according to claim 1, wherein the security information further includes according to the security type mark
Numeration amount and data record quantity determine that the trust degree between the telephone number and contact name is normal class degree of belief
Or exception class degree of belief.
3. according to the method described in claim 2, it is characterized in that, when the security type marker number is remembered greater than the data
When recording the first preset value of quantity, determine the trust degree between the telephone number and contact name for exception class degree of belief;
It otherwise, then is normal class degree of belief.
4. the method according to claim 1, wherein security type label includes intermediary, distribution, swindle
Security type label.
5. being used the method according to claim 1, wherein being stored with multiple terminals in the security number database
The address book data at family, and the terminal user is associated with the storage of its address book data using telephone number as its identity information
In security number database.
6. a kind of Number Reorganization control method, which comprises the steps of:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the security information that server carries out the characterization telephone number and contact name that feed back after safe sex determination;Institute
State the security type marker number that security information includes the telephone number, and with each contact person in terminal user's address list
Associated storage has the data record quantity of the telephone number and contact name in corresponding terminal user's address list;When described
When security type marker number is greater than the second preset value, the security information further includes the detailed description letter of the telephone number
Breath;
It parses the security information and is presented to the user it.
7. according to the method described in claim 6, it is characterized in that, the method also includes previous steps:
Receive preservation of the terminal user after address book contact editing interface completes input contact name and its telephone number
Instruction, to start the step of executing the method.
8. according to the method described in claim 6, it is characterized in that, the method also includes subsequent steps:
It exports contact information confirmation and saves window, and save the contact information after the confirmation instruction for receiving user
To local address book, while the contact name and its telephone number are uploaded to server to complete terminal user's address list
Update.
9. a kind of Number Reorganization control device characterized by comprising
Receiving module: for receiving the contact name and its telephone number of terminal submission;
Enquiry module: for the security type marker number of the determining telephone number of inquiry from security number database, and with
Associated storage has the telephone number and connection in the corresponding terminal user's address list of each contact person in terminal user's address list
It is the data record quantity that name claims;
Feedback module: for feeding back to the end using the security type marker number and data record quantity as security information
End;When the security type marker number is greater than the second preset value, the security information further includes the detailed of the telephone number
Thin description information.
10. device according to claim 9, which is characterized in that the security information further includes according to the security type
Marker number and data record quantity determine the trust degree between the telephone number and contact name for normal class trust
Degree or exception class degree of belief.
11. device according to claim 10, which is characterized in that when the security type marker number is greater than the data
When recording the first preset value of quantity, determine the trust degree between the telephone number and contact name for exception class trust
Degree;It otherwise, then is normal class degree of belief.
12. device according to claim 9, which is characterized in that the security type label includes intermediary, distribution, swindle
Security type label.
13. device according to claim 9, which is characterized in that be stored with multiple terminals in the security number database
The address book data of user, and the terminal user is associated with its address book data using telephone number as its identity information and deposits
Storage is in security number database.
14. a kind of Number Reorganization control device characterized by comprising
Obtain module: for obtaining the contact name and its telephone number at editing address list interface;
Submit module: for submitting the telephone number and contact name to carry out safe sex determination to server;
It collects module: carrying out the characterization fed back after the safe sex determination telephone number and contact name for receiving server
Security information;The security information includes the security type marker number of the telephone number, and in terminal user's address list
The corresponding terminal user's address list of each contact person in associated storage have the data of the telephone number and contact name note
Record quantity;When the security type marker number is greater than the second preset value, the security information further includes the telephone number
Detailed description information;
Display module: for parsing the security information and being presented to the user it.
15. device according to claim 14, which is characterized in that further include:
Execution module: input contact name and its phone are completed in address book contact editing interface for receiving terminal user
Preservation instruction after number, to start to execute the function of other modules of described device.
16. device according to claim 14, which is characterized in that further include:
Memory module: window is saved for exporting contact information confirmation, and will be described after the confirmation instruction for receiving user
Contact information is saved to local address book, while the contact name and its telephone number are uploaded to server to complete this
The update of terminal user's address list.
17. a kind of server characterized by comprising
Memory;
One or more processors;
One or more of processors are configurable for executing any one the method as described in Claims 1 to 5
Step.
18. a kind of mobile terminal characterized by comprising
Touch-sensitive display;
Memory;
One or more processors;
One or more of processors are configurable for executing any one the method as described in claim 6~8
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611126365.4A CN106790915B (en) | 2016-12-09 | 2016-12-09 | Number Reorganization control method, device and corresponding server and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611126365.4A CN106790915B (en) | 2016-12-09 | 2016-12-09 | Number Reorganization control method, device and corresponding server and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106790915A CN106790915A (en) | 2017-05-31 |
CN106790915B true CN106790915B (en) | 2019-07-26 |
Family
ID=58881835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611126365.4A Active CN106790915B (en) | 2016-12-09 | 2016-12-09 | Number Reorganization control method, device and corresponding server and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790915B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107026831B (en) | 2016-09-26 | 2020-03-10 | 阿里巴巴集团控股有限公司 | Identity recognition method and device |
CN107454275B (en) * | 2017-07-05 | 2019-08-13 | 北京辰安信息科技有限公司 | A kind of processing method and its system of warning message |
CN107395847A (en) * | 2017-08-17 | 2017-11-24 | 深圳天珑无线科技有限公司 | Associated person information amending method, mobile terminal and computer-readable recording medium |
CN114048339B (en) * | 2021-08-19 | 2022-08-05 | 广西东信易通科技有限公司 | Intelligent AI (Artificial intelligence) query method and system for privacy number marking |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8340651B1 (en) * | 2010-03-26 | 2012-12-25 | Sprint Communications Company L.P. | Reconciling contact information between users |
CN104243288A (en) * | 2014-09-30 | 2014-12-24 | 小米科技有限责任公司 | Message transmission method, message transmission device and electronic device |
CN104836893A (en) * | 2015-03-30 | 2015-08-12 | 北京奇虎科技有限公司 | Method, device and system for adding contact persons and mobile terminal |
CN105657130A (en) * | 2015-11-30 | 2016-06-08 | 东莞酷派软件技术有限公司 | Crank call intercepting method and system |
CN106060220A (en) * | 2016-05-30 | 2016-10-26 | 维沃移动通信有限公司 | Contact information creation method and mobile terminal |
-
2016
- 2016-12-09 CN CN201611126365.4A patent/CN106790915B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8340651B1 (en) * | 2010-03-26 | 2012-12-25 | Sprint Communications Company L.P. | Reconciling contact information between users |
CN104243288A (en) * | 2014-09-30 | 2014-12-24 | 小米科技有限责任公司 | Message transmission method, message transmission device and electronic device |
CN104836893A (en) * | 2015-03-30 | 2015-08-12 | 北京奇虎科技有限公司 | Method, device and system for adding contact persons and mobile terminal |
CN105657130A (en) * | 2015-11-30 | 2016-06-08 | 东莞酷派软件技术有限公司 | Crank call intercepting method and system |
CN106060220A (en) * | 2016-05-30 | 2016-10-26 | 维沃移动通信有限公司 | Contact information creation method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106790915A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10182101B2 (en) | Method, apparatus and system for sharing webpage | |
CN106201553B (en) | In the control method of desktop pushing application program, device and terminal device | |
CN106332020B (en) | Short message merging method, device and terminal device | |
CN106790915B (en) | Number Reorganization control method, device and corresponding server and mobile terminal | |
CN109769065A (en) | Message display method, device, mobile terminal and storage medium | |
CN111597542B (en) | Verification information sharing method and device, electronic equipment and storage medium | |
CN109905545A (en) | A kind of message treatment method and terminal, computer readable storage medium | |
US10621259B2 (en) | URL error-correcting method, server, terminal and system | |
CN110321474A (en) | Recommended method, device, terminal device and storage medium based on search term | |
CN110888705B (en) | Method for processing unread message corner marks and electronic equipment | |
CN109656510A (en) | The method and terminal of voice input in a kind of webpage | |
CN112540996A (en) | Service data verification method and device, electronic equipment and storage medium | |
CN109271779A (en) | A kind of installation packet inspection method, terminal device and server | |
CN104702674B (en) | Geographical position exchange method and device | |
CN104750722B (en) | A kind of acquisition of information and methods of exhibiting and device | |
US20080282199A1 (en) | Cross taxonomy navigation from a bread crumb in a graphical user interface | |
CN109710338A (en) | A kind of searching method of mobile terminal, mobile terminal and storage medium | |
CN109257731A (en) | Emergency call realization method, electronic device and computer readable storage medium | |
CN107102913B (en) | Data back up method, device and computer equipment | |
CN106791074B (en) | Song information display methods, device and mobile terminal | |
CN108491502A (en) | A kind of method, terminal, server and the storage medium of news tracking | |
CN109191147B (en) | Information processing method, device, equipment and medium | |
CN106339402B (en) | Method, device and system for pushing recommended content | |
CN106850928B (en) | Incoming call and SMS processing method, device and mobile terminal | |
CN108600356B (en) | Message pushing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170719 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |