CN106790915B - Number Reorganization control method, device and corresponding server and mobile terminal - Google Patents

Number Reorganization control method, device and corresponding server and mobile terminal Download PDF

Info

Publication number
CN106790915B
CN106790915B CN201611126365.4A CN201611126365A CN106790915B CN 106790915 B CN106790915 B CN 106790915B CN 201611126365 A CN201611126365 A CN 201611126365A CN 106790915 B CN106790915 B CN 106790915B
Authority
CN
China
Prior art keywords
telephone number
security
contact
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611126365.4A
Other languages
Chinese (zh)
Other versions
CN106790915A (en
Inventor
汪伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Anyun Century Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anyun Century Technology Co Ltd filed Critical Beijing Anyun Century Technology Co Ltd
Priority to CN201611126365.4A priority Critical patent/CN106790915B/en
Publication of CN106790915A publication Critical patent/CN106790915A/en
Application granted granted Critical
Publication of CN106790915B publication Critical patent/CN106790915B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/2753Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
    • H04M1/2757Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Library & Information Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to field of communication security, specifically disclose a kind of Number Reorganization control method, device and corresponding server and mobile terminal, described method includes following steps: receiving the contact name and its telephone number that terminal is submitted;The security type marker number for determining the telephone number is inquired from security number database, and associated storage has the data record quantity of the telephone number and contact name in terminal user's address list corresponding with each contact person in terminal user's address list;The terminal is fed back to using the security type marker number and data record quantity as security information.The present invention after user completes contact information editor when that will save to address list, the safety of the contact information is inquired to cloud server, record quantity of the quantity and number being labeled by comparing telephone number in the good friend's address list of user for submitting inquiry, the security information for determining the contact information avoids user that false number is stored in address list.

Description

Number Reorganization control method, device and corresponding server and mobile terminal
[technical field]
The present invention relates to field of communication security, and in particular to a kind of Number Reorganization control method, device and corresponding service Device and mobile terminal.
[background technique]
With the continuous development of the communication technology and Internet technology, people can use mobile phone and carry out whenever and wherever possible with other people It converses, send short messages, can also be contacted by social software with other people, bring many conveniences for daily life.And On the other hand, due to the leakage of personal information, all kinds of strange, false numbers bring many puzzlements to life, work, more have Notably, swindle molecule implements telecommunication fraud to victim by the family members that disguise oneself as, leader, bank clerk etc., gives people group Crowd causes huge loss;Meanwhile a large amount of subscriber data and contact method are stored in social software, when the social activity of user After account is stolen, the social account identity that swindle molecule can use user implements swindle.
A kind of current common fraud tactics are that swindle molecule steals the social account of user, then utilize the user's The false number for being used to implement swindle is sent in the good friend in the user social contact account by social account, and passes through the user Social account get the telephone number of its good friend, user good friend is stored in the falseness number without knowing it, subsequent Molecule is swindled to implement to swindle to user good friend using the falseness number.For example, having multiple relative in the social account of user A The social account of (B, C, D), and do not have to store the telephone number of user C in the address list of user A, when swindle molecule is stolen The social account rear line A of user C sends the message of " my telephone number is changed to XXX, please present to so-and-so ", and user A is not having In the case where security provisions by telephone number XXX and user C associated storage in address list, subsequent swindle molecule can utilize phone Number XXX implements to swindle to user A.
Therefore, how to be effectively prevented from user and be stored in false number, how preferably the safety of identification number, is current Under internet environment in field of communication security the problem of urgent need to resolve.
[summary of the invention]
The primary purpose of the present invention is that providing a kind of Number Reorganization control method, device and the service for executing this method Device;
Another object of the present invention is to provide a kind of Number Reorganization control method, device and the mobile ends for executing this method End.
To realize the purpose, the present invention adopts the following technical scheme:
In a first aspect, the present invention provides a kind of Number Reorganization control method, this method is executed by server, including is walked as follows It is rapid:
Receive the contact name and its telephone number that terminal is submitted;
The security type marker number for determining the telephone number is inquired from security number database, and logical with terminal user Associated storage has the telephone number and contact name in the corresponding terminal user's address list of each contact person in news record Data record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information.
Further, the security information further includes sentencing according to the security type marker number and data record quantity Trust degree between the fixed telephone number and contact name is normal class degree of belief or exception class degree of belief.
Specifically, determining institute when the security type marker number is greater than one preset value of data recording number flow control Stating the trust degree between telephone number and contact name is exception class degree of belief;It otherwise, then is normal class degree of belief.
Further, when the security type marker number is greater than the second preset value, the security information further includes The detailed description information of the telephone number.
Specifically, the security type label includes the security type label of intermediary, distribution, swindle.
Preferably, the address book data of multiple terminal users, and the end are stored in the security number database End subscriber is associated with its address book data using telephone number as its identity information and is stored in security number database.
Second aspect, the present invention provide a kind of Number Reorganization control method, and this method is including as follows by mobile terminal execution Step:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the safety letter that server carries out the characterization telephone number fed back after safe sex determination and contact name Breath;
It parses the security information and is presented to the user it.
Further, the method also includes previous steps:
Terminal user is received after address book contact editing interface completes input contact name and its telephone number Instruction is saved, to start the step of executing the method.
Specifically, the data record quantity is terminal corresponding with each contact person in terminal user's address list use Associated storage has the data record quantity of the telephone number and contact name in the address list of family.
Further, the method also includes subsequent steps:
It exports contact information confirmation and saves window, and by the contact information after the confirmation instruction for receiving user It saves to local address book, while the contact name and its telephone number is uploaded to server to complete the terminal user and lead to Interrogate the update of record.
Corresponding with first aspect, the present invention provides a kind of Number Reorganization control device, comprising:
Receiving module: for receiving the contact name and its telephone number of terminal submission;
Enquiry module: for inquiring the security type marker number for determining the telephone number from security number database, There is the telephone number with associated storage in terminal user's address list corresponding with each contact person in terminal user's address list With the data record quantity of contact name;
Feedback module: for feeding back to institute using the security type marker number and data record quantity as security information State terminal.
Further, the security information further includes sentencing according to the security type marker number and data record quantity Trust degree between the fixed telephone number and contact name is normal class degree of belief or exception class degree of belief.
Specifically, determining institute when the security type marker number is greater than one preset value of data recording number flow control Stating the trust degree between telephone number and contact name is exception class degree of belief;It otherwise, then is normal class degree of belief.
Further, when the security type marker number is greater than the second preset value, the security information further includes The detailed description information of the telephone number.
Specifically, the security type label includes the security type label of intermediary, distribution, swindle.
Preferably, the address book data of multiple terminal users, and the end are stored in the security number database End subscriber is associated with its address book data using telephone number as its identity information and is stored in security number database.
Corresponding with second aspect, the present invention provides a kind of Number Reorganization control device, comprising:
Obtain module: for obtaining the contact name and its telephone number at editing address list interface;
Submit module: for submitting the telephone number and contact name to carry out safe sex determination to server;
It collects module: carrying out the characterization fed back after the safe sex determination telephone number and contact person for receiving server The security information of title;
Display module: for parsing the security information and being presented to the user it.
Further, described device further include:
Execution module: for receive terminal user address book contact editing interface complete input contact name and its Preservation instruction after telephone number, to start to execute the function of other modules of described device.
Specifically, the data record quantity is terminal corresponding with each contact person in terminal user's address list use Associated storage has the data record quantity of the telephone number and contact name in the address list of family.
Further, described device further include:
Memory module: window is saved for exporting contact information confirmation, and will after the confirmation instruction for receiving user The contact information is saved to local address book, while the contact name and its telephone number are uploaded to server with complete At the update of terminal user's address list.
With reference to first aspect, the present invention also provides a kind of servers, comprising:
Memory: the candidate intermediate data and result that the method for storing above-mentioned first aspect generates during realizing Data;
One or more processors: for being configured as the step of executing above-mentioned first aspect any one the method.
In conjunction with second aspect, the present invention also provides a kind of mobile terminals, comprising:
Touch-sensitive display: the average information and result letter that the method for showing above-mentioned second aspect generates during realizing Breath;
Memory: the candidate intermediate data and result that the method for storing above-mentioned second aspect generates during realizing Data;
One or more processors: for being configured as the step of executing above-mentioned second aspect any one the method.
Compared with prior art, the present invention has following advantage:
The present invention is based on the address book data of multiple users under the big data of cloud, the connection submitted according to terminal user Name claims and telephone number query, determine the labeled security type of the telephone number and quantity and the contact name and Whether telephone number stores relevant contact information record in good friend's address list of terminal user, and then determining should The security information of number simultaneously feeds back to terminal user, is selected with allowing terminal user to make safer judgement according to security information.
Meanwhile the security information of the invention further includes the detailed description information to the data record, description letter Breath can allow terminal user to become apparent from, intuitively understand the connection to the contact person to be stored in the address list of oneself good friend People's information can clearly recognize the safety for the contact information to be stored according to the details.
Furthermore the security information further includes the detailed description information to telephone number, it is more intuitive, in detail will inquiry, The security information of telephone number after confirmation is presented to the user, and user is allowed to be more easier to distinguish the true and false of telephone number.
To sum up, the present invention after user completes contact information editor when that will save to address list, by taking to cloud Business device, which is inquired, determines that the safety of the contact information avoids user will be false based on the safe sex determination under the big data of cloud Swindle molecule is set to have an opportunity to take advantage of in number deposit address list.
Obviously, it is subsequent to be that recapitulative, more advantage description will be embodied in for the above-mentioned description in relation to advantage of the present invention During embodiment discloses, and, the content that those skilled in the art can also be disclosed reasonably finds of the invention its His plurality of advantages.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
[Detailed description of the invention]
Fig. 1 is an embodiment flow diagram of Number Reorganization control method of the present invention;
Fig. 2 is another embodiment flow diagram of Number Reorganization control method of the present invention;
Fig. 3 is an embodiment schematic diagram of Number Reorganization control device of the present invention;
Fig. 4 is another embodiment schematic diagram of Number Reorganization control device of the present invention;
One embodiment schematic block diagram of Fig. 5 mobile terminal part-structure provided in an embodiment of the present invention.
[specific embodiment]
The present invention is further described with exemplary embodiment with reference to the accompanying drawing, wherein identical label in attached drawing All refer to identical component.In addition, if the detailed description of known technology is for showing the invention is characterized in that unnecessary , then it omits it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " mobile terminal ", " terminal device " can be it is portable, can transport, be mounted on traffic In tool (aviation, sea-freight and/or land), or it is suitable for and/or is configured in local runtime, and/or with distribution form, Operate in any other position operation in the earth and/or space." terminal " used herein above, " mobile terminal ", " terminal is set It is standby " it can also be communication terminal, access terminals, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile internet device) and/or mobile phone with music/video playing function, it is also possible to The equipment such as smart television, set-top box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above comprising but be not limited to count The cloud that calculation machine, network host, single network server, multiple network server collection or multiple servers are constituted.Here, Yun Youji It is constituted in a large number of computers or network servers of cloud computing (Cloud Computing), wherein cloud computing is distributed computing One kind, a super virtual computer consisting of a loosely coupled set of computers.In the embodiment of the present invention, distal end It can be realized and be communicated by any communication mode between the network equipment, terminal device and WNS server, including but not limited to, is based on The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared The low coverage wireless transmission method of transmission standard.
Those skilled in the art of the present technique are appreciated that interface of the present invention/user interface/operation interface refers to can For sending the display interface of control instruction to intelligent terminal, for example, can be one in the setting page of android system Option (or key, wherein by application program addition, similarly hereinafter), is also possible to the notification bar breathed out from desktop or interaction page An option in face can also be an option in the page that a movable component of the application program is constructed.
In a first aspect, being an embodiment flow diagram of Number Reorganization control method of the present invention, this method as shown in Figure 1 It is executed by the network equipment (i.e. server), the network equipment includes but is not limited to single network server, multiple network services The server group of device composition or being made of a large amount of hosts or network server based on cloud computing (Cloud Computing) Cloud includes the following steps:
Step S100: the contact name and its telephone number that terminal is submitted are received.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal Deposit " operation, when progress " preservation " operation, terminal obtains the contact person that inputs in address book contact editing interface of user The contact informations such as title and telephone number are committed to service through remote interface by ICP/IP protocol after being then wrapped into Device, while the safety decision request to the telephone number and contact name is initiated to server.In general, contact person believes Breath includes contact name and telephone number, further includes the information such as contact addresses, mailbox, company, every in editing interface One contact information is equipped with respective editor's input frame, and terminal preferably only obtains contact name and electricity in the present embodiment Talk about the data in number editor input frame.Server receives the contact data of terminal submission and responds the safe sex determination Request analysis obtains contact name therein and telephone number.
Step S110: the security type marker number of the determining telephone number of inquiry from security number database, and with Associated storage has the telephone number and contact person in the corresponding address book data of each contact person in terminal user's address list The data record quantity of title.
Each security type label and quantity, multiple terminals of each telephone number are stored in the security number database The address book data of user is deposited wherein the terminal user is associated with its address book data using telephone number as its identity information Storage can determine a unique terminal user in security number database, through a telephone number, and then determine the end The address book data of end subscriber.
It is marked specifically, the security type is marked including security types such as intermediary, distribution, swindles, wherein security type It is usually that certain operating personnels using the telephone number that user leaves in the network platform carry out phone and disturb labeled as " intermediary " It disturbs;Security type is usually that the business that carries out to sell certain commodity of the business personnel of certain companies pushes away labeled as " distribution " Pin;Security type is usually operating personnel labeled as " swindle " to be disguised oneself as relative, friend, the leader etc. of user using false number Deceptive information is spread to user to implement to swindle.The quantity of security type label is time that the telephone number is marked by other people Number, such as a telephone number are labeled as " intermediary " 20 times by other people, then security number database of the number in server In " intermediary " security type marker number be 20.
There is associated storage in terminal user's address list corresponding with each contact person in terminal user's address list The data record quantity of the telephone number and contact name, specifically, being stored in security number database multiple with electricity Talk about address book data of the number as the terminal user of its identity information, for example, stored in security number database user A, B, C, the address book data of D, when user A submits contact name N and telephone number T to server to inquire its security information, Server inquires the address book data of user A first, if having the contact information of user B, C, D in the address list of user A, service Whether the contact person of contact name N and/or telephone number T is stored in the address book data of device and then inquiry user B, C, D To count the data record quantity, the statistical of the data record quantity includes: information
1. using contact name N and telephone number T as distinguishing characteristics, if storage is related in the address list of user B, C Name claims the contact information of N and telephone number T, then the data record quantity is 2;
2. using telephone number T as distinguishing characteristics, if being stored with the contact person of telephone number T in the address list of user B, C Information, then the data record quantity is 2;This mode stores the connection of the same telephone number T mainly for different terminals user It is that name claims that different fuzzy queries may be carried out, such as since user's A, B, C identity difference stores the connection of the same telephone number It is also different to be that name claims, and the contact name that user B stores telephone number T is known as " second elder brother ", and user C stores telephone number T Contact name be known as " two younger brothers ", and user A submit, inquiry telephone number T contact name N be " di-primary ", in the party Under formula, the contact name and user A that telephone number T no matter is stored in user B, C submit the contact name inquired whether phase Together, the data record quantity is still denoted as 2.
3. using contact name N as distinguishing characteristics, if being stored with the connection of contact name N in the address list of user B, C It is people's information, then the data record quantity is 2;This mode can preferably allow user A judge submitted telephone number T and Whether contact name N corresponds to, such as the telephone number of contact person of contact name N of user B, C storage is T1, at this time institute It states data record quantity and is still denoted as 2, and increase corresponding description for the data record quantity in subsequent security information to allow User A preferably judges whether submitted telephone number T and contact name N correspond to.
Step S120: the end is fed back to using the security type marker number and data record quantity as security information End.
Server inquiry after determine the contact person security type marker number and data record quantity, then as Security information is packaged, feeds back to the terminal.
Preferably, the security information further includes the trust degree of the telephone number, specifically, server is according to the peace Universal class phenotypic marker quantity and data record quantity determine that the trust degree between the telephone number and contact name is normal Class degree of belief or exception class degree of belief.Specifically, judging a kind of embodiment of trust degree is, when the security type marks When quantity is greater than one preset value of data recording number flow control, the trusted between the telephone number and contact name is determined Degree is exception class degree of belief;It otherwise, then is normal class degree of belief.For example, the first preset value is 30, in security number database In, when the quantity (such as 50) that a certain telephone number is labeled is greater than the data record quantity (such as 10) 30 of terminal user When a, it is determined that the trust degree of the telephone number is exception class degree of belief.
Further, when the security type marker number of the telephone number is greater than the second preset value, the safety letter Breath further includes the detailed description information of the telephone number.It is greater than the second preset value in the number that a telephone number is labeled When, the main application of the number can be determined roughly, it is assumed that the second preset value is then that 30, such as telephone number is labeled For " distribution " 32 times, then it can determine that the number is the sale call of certain company.Specifically, detailed description information can be phone number Company belonging to code, such as safety label type can be " distribution of XX company " for the detailed description information of the number of " distribution ", Introduce the number be the said firm business personnel carry out promote use;Detailed description information can also be the possibility content of call, Such as swindle molecule is once implemented swindle by a telephone number in the way of pretending leader and is " swindle " and is added by user's mark Detailed description information is added, which can be " cheat, which pretends leader, allows you help to transfer accounts ".
Further, the security information further includes the detailed description information to the data record quantity, is corresponded to not The statistical of same data record quantity, detailed description information is different, specifically, corresponding to above-mentioned data recording number 1. the of amount plants statistical, such as " your address list good friend B, C is stored the detailed description information of the data record quantity There are the contact information of telephone number T and contact name N ";2. corresponding to above-mentioned data record quantity plants statistical, Such as " contact name of your address list good friend B record number T is known as two to the detailed description information of the data record quantity Brother, you address list good friend C record number T contact name be known as two younger brothers ";3. corresponding to above-mentioned data record quantity plants Statistical, the detailed description information of the data record quantity such as " the contact name N of your address list good friend B record Telephone number be T1, your telephone number of contact name N of address list good friend C record is T1 ".
Server according to the security type marker number and data record quantity inquired, by security type marker number, Data record quantity, the trust degree to the detailed description information of the data record quantity and when meeting judgment rule, phone Any one or more of the detailed description information of number is used as security information to feed back to the terminal.
Second aspect is an embodiment flow diagram of Number Reorganization control method of the present invention, this method as shown in Figure 2 By mobile terminal execution, also can be regarded as being executed by the application program in mobile terminal, one kind of the present embodiment is achieved in that It relies on the functional module being built in the system application " address list " of terminal operating system and realizes;The another kind of the present embodiment Implementation is to rely on independent Three-Part protocol record application program and realizes such as the functional module in " 360 safety communications record " 's;It both can be configured to have the function of executing, realize this method step, in addition those skilled in the art can also be according to this The realization principle of invention is by the functional application into other executable programs.
Preferably, the present embodiment further includes for triggering the previous step for executing the method, and the previous step is specific To receive terminal user and completing the preservation after input contact name and its telephone number in address book contact editing interface Instruction.It is well known that storing contact information needs to carry out " addition -> editor -> preservation " in address list application at the terminal Operation, the previous step correspond to " preservations " this operation, when terminal user address list contact person's editing interface completion Preservation operation is carried out after contact information editor, triggers the preservation instruction, and terminal receives and responds to the preservation instruction execution Following steps.For example, user completes the title and electricity of input contact person in contact person's editing interface of " 360 safety communications record " Number (certainly can also include other contact informations such as mailbox, address) be talked about, then clicks and is provided such as on editing interface " preservation " button, triggers the preservation instruction, and terminal receives and responds to preservation instruction and starts to execute following steps.
Step S200: the contact name and its telephone number of address book contact editing interface are obtained.
After completing above-mentioned previous step, terminal obtains the contact person that user inputs in address book contact editing interface The contact informations such as title and telephone number, in general, contact information includes contact name and telephone number, it further include connection It is the information such as people address, mailbox, company, each single item contact information in editing interface is equipped with respective editor's input Frame preferably only obtains the data in contact name and telephone number editor's input frame in the present embodiment.
Step S210: the telephone number and contact name is submitted to carry out safe sex determination to server.
Terminal is led to after being wrapped into after getting telephone number and the contact name data in contact person's editing interface It crosses ICP/IP protocol and is committed to server through remote interface, while initiating to server to the telephone number and contact name Safety decision request.
Step S220: it receives server and carries out the characterization fed back after the safe sex determination telephone number and contact name Security information.
The telephone number and contact name that server is submitted according to terminal are inquired from security number database, determine it Security information, the security information include security type marker number, data record quantity, to the detailed of the data record quantity Thin description information, further include the detailed description information of trust degree when meeting judgment rule, telephone number any one or Multinomial information.
It is marked specifically, the security type is marked including security types such as intermediary, distribution, swindles, wherein security type It is usually that certain operating personnels using the telephone number that user leaves in the network platform carry out phone and disturb labeled as " intermediary " It disturbs;Security type is usually that the business that carries out to sell certain commodity of the business personnel of certain companies pushes away labeled as " distribution " Pin;Security type is usually operating personnel labeled as " swindle " to be disguised oneself as relative, friend, the leader etc. of user using false number Deceptive information is spread to user to implement to swindle.The quantity of security type label is time that the telephone number is marked by other people Number, such as a telephone number are labeled as " intermediary " 20 times by other people, then " intermediary " security type marker number of the number It is 20.
Specifically, the data record quantity is address list corresponding with each contact person in terminal user's address list Associated storage has the data record quantity of the telephone number and contact name in data.It is stored in security number database The address book data of multiple terminal users using telephone number as its identity information, such as stored in security number database The address book data of user A, B, C, D, when user A submits contact name N and telephone number T to inquire its safety to server When information, server inquires the address book data of user A first, if having the contact person of user B, C, D to believe in the address list of user A Whether it is stored with contact name N's and/or telephone number T in breath, server and then the address book data of inquiry user B, C, D Contact information is to count the data record quantity.
Specifically, the detailed description information of the data record quantity is that different data record quantity statistics mode is corresponding The statistical of different description informations, the data record quantity includes:
1. being stored using contact name N and telephone number T as distinguishing characteristics, such as in the address list of above-mentioned user B, C Name of being related claims the contact information of N and telephone number T, then the data record quantity is 2;
2. being stored with telephone number T's using telephone number T as distinguishing characteristics, such as in the address list of above-mentioned user B, C Contact information, then the data record quantity is 2;This mode stores the same telephone number mainly for different terminals user The contact name of T different may carry out fuzzy query, such as since user's A, B, C identity difference stores the same telephone number Contact name it is also different, user B store telephone number T contact name be known as " second elder brother ", user C store phone number The contact name of code T is known as " two younger brothers ", and user A is submitted, the contact name N of the telephone number T of inquiry is " di-primary ", at this Under mode, the contact name and user A that telephone number T no matter is stored in user B, C submit inquiry contact name whether Identical, the data record quantity is still denoted as 2.
3. being stored with contact name using contact name N as distinguishing characteristics, such as in the address list of above-mentioned user B, C The contact information of N, then the data record quantity is 2;This mode can preferably allow user A to judge submitted phone number Code T and contact name N whether correspond to, such as user B, C storage contact name N contact person telephone number be T1, The data record quantity is still denoted as 2 at this time, and retouches accordingly in subsequent security information for data record quantity increase It states to allow user A preferably to judge whether submitted telephone number T and contact name N correspond to.
Corresponding to the statistical of different data record quantity, information is described in detail specifically, corresponding to above-mentioned number Statistical, the detailed description information of the data record quantity such as " your address list good friend are 1. planted according to the of record quantity B, C is stored with the contact information of telephone number T and contact name N ";2. corresponding to above-mentioned data record quantity plants Statistical, the detailed description information of the data record quantity such as " contact person of your address list good friend B record number T Entitled second elder brother, you address list good friend C record number T contact name be known as two younger brothers ";Corresponding to above-mentioned data record quantity The 3. plant statistical, such as " connection of your address list good friend B record of the detailed description information of the data record quantity It is T1 " that the telephone number of name N, which is referred to as T1, your telephone number of contact name N of address list good friend C record,.
Specifically, the trust degree refer to server according to the security type marker number and data record quantity, Determine that the trust degree between the telephone number and contact name is normal class degree of belief or exception class degree of belief;Server Judging a kind of embodiment of trust degree is, when the security type marker number is greater than the data recording number flow control one in advance If determining the trust degree between the telephone number and contact name for exception class degree of belief when value;It otherwise, then is normal Class degree of belief.For example, the first preset value is 30, in security number database, when the quantity (example that a certain telephone number is labeled Such as 50) when being greater than data record quantity (such as 10) 30 of terminal user, it is determined that the trust degree of the telephone number For exception class degree of belief.
Specifically, the detailed description information of telephone number can be company belonging to telephone number, such as safety label class Type is that the detailed description information of the number of " distribution " can be company belonging to telephone number, such as safety label type is " to push away The detailed description information of the number of pin " can be " distribution of XX company ", and introducing the number is that the said firm business personnel promotes It uses;Detailed description information can also be that the possibility content of call, such as swindle molecule once utilized a telephone number with vacation The mode of dress leader implements swindle and is " swindle " by user's mark and is added to detailed description information, which can be with It is " cheat, which pretends leader, allows you help to transfer accounts ".
Terminal, which receives after server carries out safe sex determination, remembers the security type marker number of the telephone number, data Record quantity, the trust degree to the detailed description information of the data record quantity and when meeting judgment rule, telephone number Any one or more security information data packet as security information feedback of information is described in detail.
Step S230: parsing the security information and is presented to the user it.
Terminal is parsed after receiving the security information of server feedback and obtains security type label therein Quantity, data record quantity and the detailed description information to data record quantity, it is also possible to including trust degree, telephone number Information is described in detail, then window is saved in the output contact information confirmation of address book contact editing interface, preferably by institute It states security information to be shown in the window, then protects the contact information after the confirmation instruction for receiving terminal user It deposits to local address book, while it is uploaded to server to complete the terminal user and lead to by the contact name and its telephone number The update of news record data.
It is corresponding with first aspect, it is an embodiment schematic diagram of Number Reorganization control device of the present invention as shown in Figure 3, Include:
Receiving module 100: for receiving the contact name and its telephone number of terminal submission.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal Deposit " operation, when progress " preservation " operation, terminal obtains the contact person that inputs in address book contact editing interface of user The contact informations such as title and telephone number are committed to service through remote interface by ICP/IP protocol after being then wrapped into Device, while the safety decision request to the telephone number and contact name is initiated to server.In general, contact person believes Breath includes contact name and telephone number, further includes the information such as contact addresses, mailbox, company, every in editing interface One contact information is equipped with respective editor's input frame, and terminal preferably only obtains contact name and electricity in the present embodiment Talk about the data in number editor input frame.The receiving module 100 of server receives the contact data of terminal submission and response The safety decision request parses to obtain contact name therein and telephone number.
Enquiry module 110: for inquiring the security type reference numerals for determining the telephone number from security number database Amount, and in address book data corresponding with each contact person in terminal user's address list associated storage have the telephone number with The data record quantity of contact name.
Each security type label and quantity, multiple terminals of each telephone number are stored in the security number database The address book data of user is deposited wherein the terminal user is associated with its address book data using telephone number as its identity information Storage can determine a unique terminal user in security number database, through a telephone number, and then determine the end The address book data of end subscriber.The contact name and telephone number that enquiry module 110 is received according to receiving module 100, into And it inquires and determines its security type marker number and data record quantity.
Feedback module 120: for being fed back using the security type marker number and data record quantity as security information To the terminal.
Enquiry module 110 determines the security type marker number and data record quantity of the contact person after inquiring, then instead Feedback module 120 is packaged as security information, feeds back to the terminal.
Preferably, the security information can also include telephone number trust degree, specifically, enquiry module 110 according to According to the security type marker number and data record quantity, the trusted between the telephone number and contact name is determined Degree is normal class degree of belief or exception class degree of belief.Wherein, when the security type marker number is greater than the data recording number When one preset value of flow control, enquiry module 110 determines the trust degree between the telephone number and contact name for exception class Degree of belief;It otherwise, then is normal class degree of belief.
In addition, when enquiry module 110 determines the security type marker number of the telephone number greater than the second preset value, The security information further includes the detailed description information of the telephone number.
Further, the security information further includes the number of the statistical corresponding to different data record quantity According to the detailed description information of record quantity.
It is corresponding with second aspect, it is an embodiment schematic diagram of Number Reorganization control device of the present invention as shown in Figure 4, Include:
Execution module: for receive terminal user address book contact editing interface complete input contact name and its Preservation instruction after telephone number, to start to execute the function of other modules of described device.
It is well known that storing contact information needs to carry out " addition -> editor -> guarantor in address list application at the terminal Deposit " operation, when user address list contact person's editing interface complete contact information editor after click editing interface above mention What is supplied such as " saves " button, triggers the preservation instruction, execution module receives and responds to preservation instruction, to start to execute The function of other modules of described device.
Obtain module 200: for obtaining the contact name and its telephone number of address book contact editing interface.
It obtains module 200 and obtains the contact name and telephone number that user inputs in address book contact editing interface Etc. contact informations, in general, contact information includes contact name and telephone number, further include contact addresses, mailbox, The information such as company, each single item contact information in editing interface are equipped with respective editor's input frame, in the present embodiment Obtain the data in module 200 preferably acquisition contact name and telephone number editor's input frame.
Submit module 210: for submitting the telephone number and contact name to carry out safe sex determination to server.
After obtaining module 200 and getting contact data, passed through after submitting module 210 to be wrapped by ICP/IP protocol Remote interface is committed to server, while asking to server initiation to the safe sex determination of the telephone number and contact name It asks.
It collects module 220: carrying out the characterization fed back after the safe sex determination telephone number and connection for receiving server It is the security information that name claims.
The telephone number and contact name that server is submitted according to terminal are inquired from security number database, determine it Security information, the security information include security type marker number, data record quantity, to the detailed of the data record quantity Thin description information, further include the detailed description information of trust degree when meeting judgment rule, telephone number any one or Multinomial information.
After server carries out safe sex determination, collects module 220 and receive server and carry out the electricity after safe sex determination Talk about security type marker number, the data record quantity, detailed description information and satisfaction to the data record quantity of number The detailed description information of trust degree, telephone number when judgment rule it is any one or more as security information feedback and The security information data packet come.
Display module 230: for parsing the security information and being presented to the user it.
After collecting module 220 and receiving the security information of server feedback, display module 230 is parsed acquisition Security type marker number, data record quantity and the detailed description information to data record quantity therein, it is also possible to including The detailed description information of trust degree, telephone number;Then memory module exports contact person in address book contact editing interface Validation of information saves window, and saves the contact information to local communication after the confirmation instruction for receiving terminal user Record, while it is uploaded to server to complete terminal user's address book data more by the contact name and its telephone number Newly.
In addition, corresponding with first aspect, the present invention also provides a kind of terminals for executing first aspect the method to set It is standby, a kind of server, comprising: memory;One or more processors;The memory is used to store the side of above-mentioned first aspect The candidate intermediate data and result data that method generates during realizing;One or more of processors, which are configured with, to be held The function of row following steps:
Receive the contact name and its telephone number that terminal is submitted;
The security type marker number for determining the telephone number is inquired from security number database, and logical with terminal user Associated storage has the telephone number and contact name in the corresponding terminal user's address list of each contact person in news record Data record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information.
Likewise, corresponding with second aspect, the present invention also provides a kind of movements for executing second aspect the method Terminal, as shown in figure 5, for ease of description, only parts related to embodiments of the present invention are shown, particular technique details is not taken off Show, please refers to present invention method part.The mobile terminal can be include any terminal such as mobile phone, tablet computer, It is following to be illustrated so that mobile terminal is mobile phone as an example:
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided in an embodiment of the present invention.Ginseng Fig. 5 is examined, mobile phone includes: baseband processing module 510, memory 520, input unit 530, display unit 540, sensor 550, sound The portions such as frequency circuit 560, Wireless Fidelity (wireless fidelity, WiFi) module 570, processor 580 and power supply 590 Part.It will be understood by those skilled in the art that handset structure shown in Fig. 5 does not constitute the restriction to mobile phone, it may include ratio More or fewer components are illustrated, certain components or different component layouts are perhaps combined.
Baseband processing module 510 can be used for synthesizing the baseband signal that will emit, or carry out to the baseband signal received Decoding.Specifically, being exactly that audio signal is compiled into the base band code for emitting when emitting;When reception, the base band received Code is interpreted as audio signal.Meanwhile being also responsible for address information (cell-phone number, station address), text information (news in brief text, website Text), the compiling of pictorial information (multimedia message).
Memory 520 can be used for storing software program and module, and processor 580 is stored in memory 520 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 520 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 520 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 530 may include that touch panel 531 and other inputs are set Standby 532.Touch panel 531, also referred to as touch screen, collect user on it or nearby touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 531 or near touch panel 531), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 531 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinate, then gives processor 580, and can receive order that processor 580 is sent and be executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input Unit 530 can also include other input equipments 532.Specifically, other input equipments 532 can include but is not limited to secondary or physical bond One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 540 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 540 may include display panel 541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 541.Further, touch panel 531 can cover display panel 541, when touch panel 531 detect it is on it or attached After close touch operation, processor 580 is sent to determine the type of touch event, is followed by subsequent processing device 580 according to touch event Type corresponding visual output is provided on display panel 541.Although in Fig. 5, touch panel 531 and display panel 541 It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 531 and display panel 541 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 541, proximity sensor can close display panel 541 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 560, loudspeaker 561, microphone 562 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 561, be converted to sound by loudspeaker 561 by road 560 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 562, is turned after being received by voicefrequency circuit 560 It is changed to audio data, then by after the processing of audio data output processor 580, such as another mobile phone is sent to through RF circuit 510, Or audio data is exported to memory 520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 570 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown WiFi module 570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 520, and call and be stored in memory 520 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 580 can wrap Include one or more processing units;Preferably, processor 580 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 580.
Mobile phone further includes the power supply 590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 580 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In embodiments of the present invention, processor 580 included by the terminal is also with the following functions:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the safety letter that server carries out the characterization telephone number fed back after safe sex determination and contact name Breath;
It parses the security information and is presented to the user it.
The present invention is based on the address book data of multiple users under the big data of cloud, the connection submitted according to terminal user Name claims and telephone number query, determine the labeled security type of the telephone number and quantity and the contact name and Whether telephone number stores relevant contact information record in good friend's address list of terminal user, and then determining should The security information of number simultaneously feeds back to terminal user, is selected with allowing terminal user to make safer judgement according to security information; Meanwhile the security information of the invention further includes the detailed description information to the data record, which can allow Terminal user becomes apparent from, intuitively understands contact information to the contact person to be stored in the address list of oneself good friend, The safety for the contact information to be stored can be clearly recognized according to the details;Furthermore the safety Information further includes the detailed description information to telephone number, it is more intuitive, in detail by inquiry, confirmation after telephone number safety Information is presented to the user, and user is allowed to be more easier to distinguish the true and false of telephone number;To sum up, the present invention completes contact person's letter in user When will save after breath editor to address list, the safety of the contact information is determined by inquiring to cloud server, is based on Safe sex determination under the big data of cloud, avoiding user that false number is stored in address list makes swindle molecule have an opportunity to take advantage of.
Although having been illustrated with some exemplary embodiments of the invention above, those skilled in the art will be managed Solution, in the case where not departing from the principle of the present invention or spirit, can make a change these exemplary embodiments, of the invention Range is defined by the claims and their equivalents.

Claims (18)

1. a kind of Number Reorganization control method, which comprises the steps of:
Receive the contact name and its telephone number that terminal is submitted;
From security number database inquire determine the telephone number security type marker number, and with terminal user's address list In the corresponding terminal user's address list of each contact person in associated storage have the data of the telephone number and contact name Record quantity;
The terminal is fed back to using the security type marker number and data record quantity as security information;When the safety When type mark quantity is greater than the second preset value, the security information further includes the detailed description information of the telephone number.
2. the method according to claim 1, wherein the security information further includes according to the security type mark Numeration amount and data record quantity determine that the trust degree between the telephone number and contact name is normal class degree of belief Or exception class degree of belief.
3. according to the method described in claim 2, it is characterized in that, when the security type marker number is remembered greater than the data When recording the first preset value of quantity, determine the trust degree between the telephone number and contact name for exception class degree of belief; It otherwise, then is normal class degree of belief.
4. the method according to claim 1, wherein security type label includes intermediary, distribution, swindle Security type label.
5. being used the method according to claim 1, wherein being stored with multiple terminals in the security number database The address book data at family, and the terminal user is associated with the storage of its address book data using telephone number as its identity information In security number database.
6. a kind of Number Reorganization control method, which comprises the steps of:
Obtain the contact name and its telephone number at editing address list interface;
The telephone number and contact name is submitted to carry out safe sex determination to server;
Receive the security information that server carries out the characterization telephone number and contact name that feed back after safe sex determination;Institute State the security type marker number that security information includes the telephone number, and with each contact person in terminal user's address list Associated storage has the data record quantity of the telephone number and contact name in corresponding terminal user's address list;When described When security type marker number is greater than the second preset value, the security information further includes the detailed description letter of the telephone number Breath;
It parses the security information and is presented to the user it.
7. according to the method described in claim 6, it is characterized in that, the method also includes previous steps:
Receive preservation of the terminal user after address book contact editing interface completes input contact name and its telephone number Instruction, to start the step of executing the method.
8. according to the method described in claim 6, it is characterized in that, the method also includes subsequent steps:
It exports contact information confirmation and saves window, and save the contact information after the confirmation instruction for receiving user To local address book, while the contact name and its telephone number are uploaded to server to complete terminal user's address list Update.
9. a kind of Number Reorganization control device characterized by comprising
Receiving module: for receiving the contact name and its telephone number of terminal submission;
Enquiry module: for the security type marker number of the determining telephone number of inquiry from security number database, and with Associated storage has the telephone number and connection in the corresponding terminal user's address list of each contact person in terminal user's address list It is the data record quantity that name claims;
Feedback module: for feeding back to the end using the security type marker number and data record quantity as security information End;When the security type marker number is greater than the second preset value, the security information further includes the detailed of the telephone number Thin description information.
10. device according to claim 9, which is characterized in that the security information further includes according to the security type Marker number and data record quantity determine the trust degree between the telephone number and contact name for normal class trust Degree or exception class degree of belief.
11. device according to claim 10, which is characterized in that when the security type marker number is greater than the data When recording the first preset value of quantity, determine the trust degree between the telephone number and contact name for exception class trust Degree;It otherwise, then is normal class degree of belief.
12. device according to claim 9, which is characterized in that the security type label includes intermediary, distribution, swindle Security type label.
13. device according to claim 9, which is characterized in that be stored with multiple terminals in the security number database The address book data of user, and the terminal user is associated with its address book data using telephone number as its identity information and deposits Storage is in security number database.
14. a kind of Number Reorganization control device characterized by comprising
Obtain module: for obtaining the contact name and its telephone number at editing address list interface;
Submit module: for submitting the telephone number and contact name to carry out safe sex determination to server;
It collects module: carrying out the characterization fed back after the safe sex determination telephone number and contact name for receiving server Security information;The security information includes the security type marker number of the telephone number, and in terminal user's address list The corresponding terminal user's address list of each contact person in associated storage have the data of the telephone number and contact name note Record quantity;When the security type marker number is greater than the second preset value, the security information further includes the telephone number Detailed description information;
Display module: for parsing the security information and being presented to the user it.
15. device according to claim 14, which is characterized in that further include:
Execution module: input contact name and its phone are completed in address book contact editing interface for receiving terminal user Preservation instruction after number, to start to execute the function of other modules of described device.
16. device according to claim 14, which is characterized in that further include:
Memory module: window is saved for exporting contact information confirmation, and will be described after the confirmation instruction for receiving user Contact information is saved to local address book, while the contact name and its telephone number are uploaded to server to complete this The update of terminal user's address list.
17. a kind of server characterized by comprising
Memory;
One or more processors;
One or more of processors are configurable for executing any one the method as described in Claims 1 to 5 Step.
18. a kind of mobile terminal characterized by comprising
Touch-sensitive display;
Memory;
One or more processors;
One or more of processors are configurable for executing any one the method as described in claim 6~8 Step.
CN201611126365.4A 2016-12-09 2016-12-09 Number Reorganization control method, device and corresponding server and mobile terminal Active CN106790915B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611126365.4A CN106790915B (en) 2016-12-09 2016-12-09 Number Reorganization control method, device and corresponding server and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611126365.4A CN106790915B (en) 2016-12-09 2016-12-09 Number Reorganization control method, device and corresponding server and mobile terminal

Publications (2)

Publication Number Publication Date
CN106790915A CN106790915A (en) 2017-05-31
CN106790915B true CN106790915B (en) 2019-07-26

Family

ID=58881835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611126365.4A Active CN106790915B (en) 2016-12-09 2016-12-09 Number Reorganization control method, device and corresponding server and mobile terminal

Country Status (1)

Country Link
CN (1) CN106790915B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026831B (en) 2016-09-26 2020-03-10 阿里巴巴集团控股有限公司 Identity recognition method and device
CN107454275B (en) * 2017-07-05 2019-08-13 北京辰安信息科技有限公司 A kind of processing method and its system of warning message
CN107395847A (en) * 2017-08-17 2017-11-24 深圳天珑无线科技有限公司 Associated person information amending method, mobile terminal and computer-readable recording medium
CN114048339B (en) * 2021-08-19 2022-08-05 广西东信易通科技有限公司 Intelligent AI (Artificial intelligence) query method and system for privacy number marking

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8340651B1 (en) * 2010-03-26 2012-12-25 Sprint Communications Company L.P. Reconciling contact information between users
CN104243288A (en) * 2014-09-30 2014-12-24 小米科技有限责任公司 Message transmission method, message transmission device and electronic device
CN104836893A (en) * 2015-03-30 2015-08-12 北京奇虎科技有限公司 Method, device and system for adding contact persons and mobile terminal
CN105657130A (en) * 2015-11-30 2016-06-08 东莞酷派软件技术有限公司 Crank call intercepting method and system
CN106060220A (en) * 2016-05-30 2016-10-26 维沃移动通信有限公司 Contact information creation method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8340651B1 (en) * 2010-03-26 2012-12-25 Sprint Communications Company L.P. Reconciling contact information between users
CN104243288A (en) * 2014-09-30 2014-12-24 小米科技有限责任公司 Message transmission method, message transmission device and electronic device
CN104836893A (en) * 2015-03-30 2015-08-12 北京奇虎科技有限公司 Method, device and system for adding contact persons and mobile terminal
CN105657130A (en) * 2015-11-30 2016-06-08 东莞酷派软件技术有限公司 Crank call intercepting method and system
CN106060220A (en) * 2016-05-30 2016-10-26 维沃移动通信有限公司 Contact information creation method and mobile terminal

Also Published As

Publication number Publication date
CN106790915A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US10182101B2 (en) Method, apparatus and system for sharing webpage
CN106201553B (en) In the control method of desktop pushing application program, device and terminal device
CN106332020B (en) Short message merging method, device and terminal device
CN106790915B (en) Number Reorganization control method, device and corresponding server and mobile terminal
CN109769065A (en) Message display method, device, mobile terminal and storage medium
CN111597542B (en) Verification information sharing method and device, electronic equipment and storage medium
CN109905545A (en) A kind of message treatment method and terminal, computer readable storage medium
US10621259B2 (en) URL error-correcting method, server, terminal and system
CN110321474A (en) Recommended method, device, terminal device and storage medium based on search term
CN110888705B (en) Method for processing unread message corner marks and electronic equipment
CN109656510A (en) The method and terminal of voice input in a kind of webpage
CN112540996A (en) Service data verification method and device, electronic equipment and storage medium
CN109271779A (en) A kind of installation packet inspection method, terminal device and server
CN104702674B (en) Geographical position exchange method and device
CN104750722B (en) A kind of acquisition of information and methods of exhibiting and device
US20080282199A1 (en) Cross taxonomy navigation from a bread crumb in a graphical user interface
CN109710338A (en) A kind of searching method of mobile terminal, mobile terminal and storage medium
CN109257731A (en) Emergency call realization method, electronic device and computer readable storage medium
CN107102913B (en) Data back up method, device and computer equipment
CN106791074B (en) Song information display methods, device and mobile terminal
CN108491502A (en) A kind of method, terminal, server and the storage medium of news tracking
CN109191147B (en) Information processing method, device, equipment and medium
CN106339402B (en) Method, device and system for pushing recommended content
CN106850928B (en) Incoming call and SMS processing method, device and mobile terminal
CN108600356B (en) Message pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170719

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant