CN107026788B - Message shielding method in discussion group of terminal application and terminal - Google Patents

Message shielding method in discussion group of terminal application and terminal Download PDF

Info

Publication number
CN107026788B
CN107026788B CN201710043584.4A CN201710043584A CN107026788B CN 107026788 B CN107026788 B CN 107026788B CN 201710043584 A CN201710043584 A CN 201710043584A CN 107026788 B CN107026788 B CN 107026788B
Authority
CN
China
Prior art keywords
terminal
discussion group
message
phrase
current message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710043584.4A
Other languages
Chinese (zh)
Other versions
CN107026788A (en
Inventor
汤付康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fise Technology Holding Co ltd
Original Assignee
Shenzhen Fise Technology Holding Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fise Technology Holding Co ltd filed Critical Shenzhen Fise Technology Holding Co ltd
Priority to CN201710043584.4A priority Critical patent/CN107026788B/en
Publication of CN107026788A publication Critical patent/CN107026788A/en
Application granted granted Critical
Publication of CN107026788B publication Critical patent/CN107026788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method for shielding messages in a discussion group of terminal application and a terminal, wherein the method comprises the following steps: the terminal acquires the name of the first discussion group; the terminal counts the historical information of the first discussion group and the historical information of each member of the discussion group; the terminal obtains a shielding phrase of the first discussion group according to the name of the first discussion group and the historical information of each member; the terminal receives the current message of the first discussion group, detects whether the current message has a shielding phrase, if so, the current message is shielded. The invention has the advantage of good user experience.

Description

Message shielding method in discussion group of terminal application and terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a method and a terminal for message shielding in a discussion group of a terminal application.
Background
The intelligent terminal is like a personal computer, has an independent operating system and an independent running space, can be used for a user to install programs provided by third-party service providers such as software, games, navigation and the like, and can realize the general name of the type of the wireless network access terminal through a mobile communication network.
The application range of the intelligent terminal is distributed all over the world, but people do not know and use the keyboard type terminal in the last years because the intelligent terminal has three characteristics of excellent operating system, free installation of various types of software (only android system) and full touch screen type operation feeling of a full large screen.
Among them, five major brands of Google (Google), apple, samsung, nokia, HTC are known most widely all over the world, and the brands of millet, huashi, charm, association, zhongxing, kupai, yijia terminal, jinzhu, sky, etc. are receiving much attention in china.
The existing intelligent terminals are all installed with instant messaging software (such as WeChat, facebook, QQ), and the instant messaging software has discussion groups (also called as groups), so that partial messages cannot be shielded in the discussion groups, and only the whole messages of the discussion groups can be shielded, which causes inconvenience for users.
Disclosure of Invention
The message shielding method in the discussion group applied by the terminal is provided, and the intelligent terminal adopts the scheme of message shielding of the discussion group, thereby improving the advantage of convenient use for users.
In one aspect, a method for message masking in a discussion group of terminal applications is provided, the method comprising the steps of:
the terminal acquires the name of the first discussion group;
the terminal counts the historical information of the first discussion group and the historical information of each member of the discussion group;
the terminal obtains a shielding phrase of the first discussion group according to the name of the first discussion group and the historical information of each member;
the terminal receives the current message of the first discussion group, detects whether the current message has a shielding phrase, if so, the current message is shielded.
Optionally, the method further includes:
and the current message is not shielded without the shielding phrase.
Optionally, the method further includes:
if the terminal does not have the shielding phrase, the terminal calculates the association index of the current unmasked message, if the association index is lower than a set threshold, the current message is shielded, and if the association index is higher than the set threshold, the current message is not shielded;
the correlation index is n1+ n2-c 1;
where n1 is the total number of messages sent by the terminal in the discussion group, n2 is the number of times the terminal clicks the discussion group, and c1 is the coefficient corresponding to the mask phrase approximating word.
Optionally, the method further includes:
if the message is not shielded, the terminal searches for the WeChat friends in the discussion and establishes the association relationship of the WeChat friends in the discussion group, and if the user sending the message in the discussion group is the WeChat friends, the message is not shielded.
Optionally, the method further includes:
and the terminal counts the communication frequency in the WeChat friend, if the communication frequency is higher than a frequency threshold value, the WeChat friend is added to the associated friend, and the message sent by the associated friend in the discussion group is not shielded.
In a second aspect, a terminal is provided, which includes:
a processing unit for obtaining a name of the first discussion group; counting historical information of the first discussion group and historical information of each member of the discussion group; obtaining a shielding phrase of the first discussion group according to the name of the first discussion group and the historical information of each member;
a transceiving unit for receiving a current message of the first discussion group;
the processing unit is further configured to detect whether the current message has a mask word group, and if so, mask the current message.
Optionally, the processing unit is further configured to not have a mask phrase, and not mask the current message.
Optionally, the processing unit is further configured to, if the terminal does not have the masking phrase, calculate, by the terminal, a correlation index for the unmasked current message, if the correlation index is lower than a set threshold, mask the current message, and if the correlation index is higher than the set threshold, not mask the current message;
the correlation index is n1+ n2-c 1;
where n1 is the total number of messages sent by the terminal in the discussion group, n2 is the number of times the terminal clicks the discussion group, and c1 is the coefficient corresponding to the mask phrase approximating word.
Optionally, the processing unit is further configured to, if the terminal does not have the masking phrase, search for the wechat friend in the discussion, and establish an association relationship between the wechat friends in the discussion group, and if the user sending the message in the discussion group is the wechat friend, not mask the message.
Optionally, the processing unit is further configured to count, by the terminal, a communication frequency in the WeChat friend, and if the communication frequency is higher than a frequency threshold, add the WeChat friend to the associated friend, where a message sent by the associated friend in the discussion group is not masked. .
According to the method and the device for adjusting the ring tone of the terminal equipment and the intelligent terminal provided by the embodiments, the technical scheme provided by the invention can establish different shielding word groups through different discussion groups, so that the method and the device have the advantage of good user experience.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without any creative effort.
FIG. 1 is a flow chart of a method for message masking in a discussion group of terminal applications according to a first preferred embodiment of the present invention;
fig. 2 is a flowchart of a method for message screening in a discussion group of an application of a terminal according to a second preferred embodiment of the present invention;
fig. 3 is a block diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. In addition, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The term "computer device", also referred to as "computer", refers to an intelligent electronic device capable of executing predetermined processes such as numerical calculation and/or logic calculation by running predetermined programs or instructions, and may include a processor and a memory, wherein the processor executes the pre-stored instructions in the memory to execute the predetermined processes, or the predetermined processes are executed by hardware such as ASIC, FPGA, DSP, or a combination thereof. Computer devices include, but are not limited to, servers, personal computers, laptops, tablets, smart terminals, and the like.
The methods discussed below, some of which are illustrated by flow diagrams, may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium such as a storage medium. The processor(s) may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative and are provided for purposes of describing example embodiments of the present invention. The present invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms "first", "second", etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element may be termed a second element, and, similarly, a second element may be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
Referring to fig. 1, fig. 1 is a method for message shielding in a discussion group of terminal applications provided in an embodiment of the present application, where the terminal is installed with an application, such as instant messaging software, and this embodiment is described by taking a micro-message as an example, in practical applications, the micro-message may also be replaced by other instant messaging software, such as QQ or facebook. The terminal may specifically be: the method is shown in fig. 1 and comprises the following steps:
step S101, the terminal acquires the name of the first discussion group.
The first discussion group may be a simplified name or a refined name, for example, year plus professional, 00 computers, and a classmate group, for example, school plus professional, for example, shenzhen university computers, or a classmate group, for example, the first discussion group may be named with surname, for example, cao, family group, for example, wenjiabao, or family group, for example, wenjiabao, and may be named as family group, for example, with professional name, for example, 05 attorney group, accountant examination group, and so on.
Step S102, the terminal counts the history information of the first discussion group and the history information of each member of the discussion group.
The history information in step S102 may be all the messages in the group, and also needs to be counted by the members.
Step S103, the terminal obtains the shielding phrase of the first discussion group according to the name of the first discussion group and the history information of each member.
Step S104, the terminal receives the current message of the first discussion group, detects whether the current message has a shielding phrase, if so, the current message is shielded.
The analysis algorithm of the current message in step S104 may adopt an existing algorithm, for example, a natural language analysis algorithm.
The technology provided by the invention determines the mask phrase of each discussion group through the history message of each discussion group and the name of each discussion group, and determines the mask phrase for each discussion group, so that the mask phrase is respectively masked according to the discussion groups which do not pass through, and the technology has the advantage of masking the message of the discussion group.
Referring to fig. 2, fig. 2 is a method for message shielding in a discussion group of a terminal application according to an embodiment of the present application, where the terminal is installed with instant messaging software, and this embodiment is described by taking a micro-message as an example, in practical applications, the micro-message may also be replaced with other instant messaging software, for example, QQ or facebook. The method, as shown in fig. 2, includes the following steps:
step S201, the terminal acquires the name of the first discussion group.
The first discussion group may be a simplified name or a refined name, for example, year plus professional, 00 computers, and a classmate group, for example, school plus professional, for example, shenzhen university computers, or a classmate group, for example, the first discussion group may be named with surname, for example, cao, family group, for example, wenjiabao, or family group, for example, wenjiabao, and may be named as family group, for example, with professional name, for example, 05 attorney group, accountant examination group, and so on.
Step S202, the terminal counts the history information of the first discussion group and the history information of each member of the discussion group.
The history information in step S202 may be all the messages in the group, and also needs to be counted by the members.
Step S203, the terminal obtains the mask phrase of the first discussion group according to the name of the first discussion group and the history information of each member.
Step S204, the terminal receives the current message of the first discussion group, detects whether the current message has a shielding phrase, if so, the current message is shielded.
The analysis algorithm of the current message in step S204 may adopt an existing algorithm, for example, a natural language analysis algorithm.
Step S205, the terminal calculates the association index for the unmasked current message, if the association index is lower than the set threshold, the current message is masked, if the association index is higher than the set threshold, the current message is not masked.
The correlation index is n1+ n2-c 1.
Where n1 is the total number of messages sent by the terminal in the discussion group, n2 is the number of times the terminal clicks on the discussion group, and c1 is the coefficient corresponding to the mask phrase approximation word (which can be obtained by the approximation word and coefficient list).
The technology provided by the invention determines the mask phrase of each discussion group through the history message of each discussion group and the name of each discussion group, and determines the mask phrase for each discussion group, so that the mask phrase is respectively masked according to the discussion groups which do not pass through, and the technology has the advantage of masking the message of the discussion group.
Optionally, after step S205, the method may further include:
the terminal searches for the WeChat friends in the discussion, establishes the association relationship of the WeChat friends in the discussion group, and does not shield the message if the user sending the message in the discussion group is the WeChat friends.
This way, unnecessary people in the group (i.e. non-friends) are prevented from disturbing themselves.
Optionally, the terminal counts communication frequencies in the WeChat friends, and if the communication frequency is higher than a frequency threshold, the WeChat friends are added to the associated friends, and messages sent by the associated friends in the discussion group are not shielded.
The technical scheme mainly aims at the situation that a plurality of people in a large group discuss some problems with each other, the people are returned all the time, and for other people, the discussed matters have no relation at all, so that the technical scheme can shield other people and only display the discussed people.
This masking scheme can be implemented in accordance with different scenarios.
Referring to fig. 3, fig. 3 is a simplified schematic diagram of a terminal 30 according to an embodiment of the present application, and as shown in fig. 3, the terminal 30 includes: a processor 501, a memory 502, a transceiver 503, and a bus 504. The transceiver 503 is used for transmitting and receiving data to and from an external device. The number of processors 501 in the device 50 may be one or more. In some embodiments of the present application, the processor 501, the memory 502, and the transceiver 503 may be connected by a bus system or other means. The apparatus 50 may be used to perform the methods shown in fig. 1 and 2. With regard to the meaning and examples of the terms related to the present embodiment, reference may be made to the corresponding descriptions of fig. 1 and 2. And will not be described in detail herein.
Wherein the memory 502 stores program code therein. The processor 501 is used to call the program code stored in the memory 502 for executing the operations shown in fig. 1 or fig. 2:
it should be noted that the processor 501 may be a single processing element or may be a general term for multiple processing elements. For example, the Processing element may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present Application, such as: one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
The memory 502 may be a storage device or a combination of storage elements, and is used for storing executable program codes or parameters, data, etc. required by the running device of the application program. And the memory 703 or 803 may include a Random Access Memory (RAM) or a non-volatile memory (non-volatile memory), such as a magnetic disk memory, Flash memory (Flash), or the like.
The bus 504 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The terminal 30 may also include input and output devices coupled to the bus 504 for coupling to other components, such as the processor 501, via the bus. The input and output device can provide an input interface for an operator so that the operator can select a control item through the input interface, and can also be other interfaces through which other equipment can be connected.
It should be noted that, for the sake of simplicity, the foregoing method embodiments or examples are described as a series of action combinations, but those skilled in the art should understand that the time for store query is reduced, and in addition, the method may better meet the user's preference, because the invention, which is generally interested in the user-bound shopping id, is not limited by the described action sequence, because some steps may be performed in other sequences or simultaneously according to the invention. Further, those skilled in the art should also appreciate that the embodiments or examples described in this specification are presently preferred, and that no acts or elements are necessarily required of the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs. Those skilled in the art may combine or combine features of different embodiments and features of different embodiments described in this specification.
From the above description of the embodiments, it is clear for a person skilled in the art that the present invention can be implemented by hardware, firmware, or a combination thereof. When implemented in software, the functions described above may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. Taking this as an example but not limiting: the computer-readable medium may include Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), compact disk Read-Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Furthermore, the method is simple. Any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the fixation of the medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy Disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
In short, the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for message masking in a discussion group of terminal applications, the method comprising the steps of:
the terminal acquires the name of the first discussion group;
the terminal counts the historical information of the first discussion group and the historical information of each member of the discussion group;
the terminal obtains a shielding phrase of the first discussion group according to the name of the first discussion group and the historical information of each member;
the terminal receives the current message of the first discussion group, detects whether the current message has a shielding phrase, if so, shields the current message;
if the terminal does not have the shielding phrase, the terminal calculates the association index of the current unmasked message, if the association index is lower than a set threshold, the current message is shielded, and if the association index is higher than the set threshold, the current message is not shielded;
the correlation index is n1+ n2-c 1;
where n1 is the total number of messages sent by the terminal in the discussion group, n2 is the number of times the terminal clicks the discussion group, and c1 is the coefficient corresponding to the mask phrase approximating word.
2. The method of claim 1, further comprising:
and the current message is not shielded without the shielding phrase.
3. The method of claim 1, further comprising:
if the message is not shielded, the terminal searches for the WeChat friends in the discussion and establishes the association relationship of the WeChat friends in the discussion group, and if the user sending the message in the discussion group is the WeChat friends, the message is not shielded.
4. The method of claim 1, further comprising:
and the terminal counts the communication frequency in the WeChat friend, if the communication frequency is higher than a frequency threshold value, the WeChat friend is added to the associated friend, and the message sent by the associated friend in the discussion group is not shielded.
5. A terminal, characterized in that the terminal comprises:
a processing unit for obtaining a name of the first discussion group; counting historical information of the first discussion group and historical information of each member of the discussion group; obtaining a shielding phrase of the first discussion group according to the name of the first discussion group and the historical information of each member;
a transceiving unit for receiving a current message of the first discussion group;
the processing unit is further configured to detect whether the current message has a mask phrase, and if so, mask the current message;
the processing unit is further configured to, if the terminal does not have the masking phrase, calculate a correlation index for the unmasked current message by the terminal, mask the current message if the correlation index is lower than a set threshold, and not mask the current message if the correlation index is higher than the set threshold;
the correlation index is n1+ n2-c 1;
where n1 is the total number of messages sent by the terminal in the discussion group, n2 is the number of times the terminal clicks the discussion group, and c1 is the coefficient corresponding to the mask phrase approximating word.
6. The terminal of claim 5, wherein the processing unit is further configured to not mask the current message without a mask phrase.
7. The terminal according to claim 5, wherein the processing unit is further configured to, if the terminal does not have the masking phrase, search for the WeChat friend in discussion, and establish an association relationship between the WeChat friend in the discussion group, and if the user sending the message in the discussion group is the WeChat friend, not mask the message.
8. The terminal of claim 5, wherein the processing unit is further configured to count a communication frequency in the WeChat friend, and if the communication frequency is higher than a frequency threshold, add the WeChat friend to the associated friend, where the associated friend in the discussion group sends the message without blocking.
CN201710043584.4A 2017-01-19 2017-01-19 Message shielding method in discussion group of terminal application and terminal Active CN107026788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710043584.4A CN107026788B (en) 2017-01-19 2017-01-19 Message shielding method in discussion group of terminal application and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710043584.4A CN107026788B (en) 2017-01-19 2017-01-19 Message shielding method in discussion group of terminal application and terminal

Publications (2)

Publication Number Publication Date
CN107026788A CN107026788A (en) 2017-08-08
CN107026788B true CN107026788B (en) 2020-07-07

Family

ID=59526098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710043584.4A Active CN107026788B (en) 2017-01-19 2017-01-19 Message shielding method in discussion group of terminal application and terminal

Country Status (1)

Country Link
CN (1) CN107026788B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395199B (en) * 2020-02-27 2024-01-26 阿尔派株式会社 Electronic device and message playing method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980140A (en) * 2005-12-07 2007-06-13 腾讯科技(深圳)有限公司 Discussion group realizing method based on reciprocal mode
CN101079823A (en) * 2006-06-09 2007-11-28 腾讯科技(深圳)有限公司 A method and system for originating and creating virtual discussion group
CN105468695A (en) * 2015-11-17 2016-04-06 小米科技有限责任公司 Information display method and apparatus
CN105634921A (en) * 2015-12-23 2016-06-01 努比亚技术有限公司 Message filtering reminding method and terminal device
CN105956038A (en) * 2016-04-26 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Notification message management method and apparatus as well as terminal
CN106161203A (en) * 2015-04-28 2016-11-23 阿里巴巴集团控股有限公司 Group message processing method and processing device
CN106302108A (en) * 2016-08-03 2017-01-04 努比亚技术有限公司 Group's information management method and device
CN106330685A (en) * 2016-09-18 2017-01-11 依偎科技(南昌)有限公司 Group message prompt method and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980140A (en) * 2005-12-07 2007-06-13 腾讯科技(深圳)有限公司 Discussion group realizing method based on reciprocal mode
CN101079823A (en) * 2006-06-09 2007-11-28 腾讯科技(深圳)有限公司 A method and system for originating and creating virtual discussion group
CN106161203A (en) * 2015-04-28 2016-11-23 阿里巴巴集团控股有限公司 Group message processing method and processing device
CN105468695A (en) * 2015-11-17 2016-04-06 小米科技有限责任公司 Information display method and apparatus
CN105634921A (en) * 2015-12-23 2016-06-01 努比亚技术有限公司 Message filtering reminding method and terminal device
CN105956038A (en) * 2016-04-26 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Notification message management method and apparatus as well as terminal
CN106302108A (en) * 2016-08-03 2017-01-04 努比亚技术有限公司 Group's information management method and device
CN106330685A (en) * 2016-09-18 2017-01-11 依偎科技(南昌)有限公司 Group message prompt method and terminal

Also Published As

Publication number Publication date
CN107026788A (en) 2017-08-08

Similar Documents

Publication Publication Date Title
US10831802B2 (en) Techniques to respond to user requests using natural-language machine learning based on example conversations
US11194822B2 (en) Search ranking method and apparatus, electronic device and storage medium
US11677704B1 (en) Techniques for scam detection and prevention
US10339034B2 (en) Dynamically generated device test pool for staged rollouts of software applications
US10491548B2 (en) Techniques to configure bot flow
EP2948875B1 (en) Method and system for using a recursive event listener on a node in hierarchical data structure
US10241772B1 (en) Recommending substitute applications
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
US10423651B2 (en) Analysis of mobile application reviews based on content, reviewer credibility, and temporal and geographic clustering
CN103906012A (en) Information sending method and device
KR20130066901A (en) Apparatus and method for analyzing malware in data analysis system
CN111314063A (en) Big data information management method, system and device based on Internet of things
CN107026788B (en) Message shielding method in discussion group of terminal application and terminal
KR101858544B1 (en) Information processing method and apparatus
CN112487765B (en) Method and device for generating notification text
CN110740074B (en) Network address detection method and device and electronic equipment
US11651246B2 (en) Question inference device
JPWO2020075364A1 (en) Check-in judgment device
JP7471145B2 (en) Presentation device
WO2022230311A1 (en) Determination device
US20220292506A1 (en) Authorization device
US9705732B2 (en) Method and apparatus for sharing time information in an electronic device
US20220179669A1 (en) Information generation apparatus and control system
CN107766329B (en) Blacklist configuration method and device
CN117914932A (en) Prompt message determining method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant