CN108023806A - The invalid method and apparatus of flag event - Google Patents
The invalid method and apparatus of flag event Download PDFInfo
- Publication number
- CN108023806A CN108023806A CN201610943195.2A CN201610943195A CN108023806A CN 108023806 A CN108023806 A CN 108023806A CN 201610943195 A CN201610943195 A CN 201610943195A CN 108023806 A CN108023806 A CN 108023806A
- Authority
- CN
- China
- Prior art keywords
- object event
- invalid
- invalid flag
- customer
- labeled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The disclosure is directed to a kind of invalid method and apparatus of flag event.Wherein, the invalid method of the flag event, including:The invalid flag for object event from starting client is received to ask;Invalid flag order is requested to generate according to the invalid flag;The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used to the object event is labeled as disarmed state on the customer in response end.In the embodiments of the present disclosure, after the invalid flag request for object event for receiving starting client, the invalid flag order requested to generate according to the invalid flag can be sent to the customer in response end of object event, so as to which object event is labeled as disarmed state on the customer in response end of object event, reduce the interference to the customer in response end of object event, the unnecessary response in customer in response end is reduced, saves the time of receiving-transmitting sides.
Description
Technical field
This disclosure relates to Internet technical field, more particularly to the method and apparatus that a kind of flag event is invalid.
Background technology
In correlation technique, some application programs, which provide, recalls function.Mail is recalled for example, being provided in Outlook
Function.The function of revocation information is provided in wechat.
Wherein, revocation information must be in 2 minutes in wechat.Even if mail can be recalled in Outlook and wechat
Or information, mail or the information content, which are also possible to be received people, to be seen, and causes to perplex.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of flag event invalid method and apparatus.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of invalid method of flag event, including:
The invalid flag for object event from starting client is received to ask;
Invalid flag order is requested to generate according to the invalid flag;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state on the customer in response end.
For the above method, in a kind of possible implementation, the object event is mail,
The invalid flag for object event from starting client is received to ask, including:Reception comes from mail applications
Starting client for targeted mails mail invalid flag ask;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state on the customer in response end, including:To each addressee of the targeted mails
Customer in response end sends the mail invalid flag order, and the mail invalid flag order is used in each of the targeted mails
The targeted mails are labeled as disarmed state on the customer in response end of addressee.
For the above method, in a kind of possible implementation, the object event is message,
The invalid flag for object event from starting client is received to ask, including:Reception comes from chat tool
Starting client for target message message invalid mark request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state on the customer in response end, including:To each recipient of the target message
Customer in response end sends the message invalid tab command, and the message invalid tab command is used in each of the target message
The target message is labeled as disarmed state in the client of recipient.
For the above method, in a kind of possible implementation, the object event is call,
The invalid flag for object event from starting client is received to ask, including:Reception comes from talk application
Starting client for destination call talk inactivity mark request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state on the customer in response end, including:To the sound of the contact person of the destination call
Client is answered to send the talk inactivity tab command, the talk inactivity tab command is used for the contact in the destination call
The destination call is labeled as disarmed state in the client of people.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of invalid method of flag event, including:
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
What the invalid flag for object event of client requested to generate;
The object event is labeled as disarmed state on customer in response end.
For the above method, in a kind of possible implementation, the object event is mail,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
What the invalid flag for object event of client requested to generate, including:Receive being directed to for the server transmission of mail applications
The mail invalid flag order of targeted mails, the mail invalid flag order are to be directed to the target according to starting client
What the mail invalid flag of mail requested to generate;
The object event is labeled as disarmed state on customer in response end, including:Each in the targeted mails is received
The targeted mails are labeled as disarmed state on the customer in response end of part people.
For the above method, in a kind of possible implementation, the object event is message,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
What the invalid flag for object event of client requested to generate, including:Receive being directed to for the server transmission of chat tool
The message invalid tab command of target message, the message invalid tab command are to be directed to the target according to starting client
What the message invalid mark of message requested to generate;
The object event is labeled as disarmed state on customer in response end, including:In respectively connecing for the target message
Receive and the target message is labeled as disarmed state on the customer in response end of people.
For the above method, in a kind of possible implementation, the object event is call,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
What the invalid flag for object event of client requested to generate, including:The server transmission for receiving talk application is directed to mesh
The talk inactivity tab command of call is marked, the talk inactivity tab command is leading to for the target according to starting client
What the talk inactivity mark of words requested to generate;
The object event is labeled as disarmed state on customer in response end, including:In the contact of the destination call
The destination call is labeled as disarmed state on the customer in response end of people.
For the above method, in a kind of possible implementation, the object event is labeled as disarmed state, including
Following at least one mode:
The object event is marked to belong to disarmed state on the corresponding interactive interface of the object event;
In the case where detecting the operation of the response to the object event, invalid prompting is sent;
The object event is arranged to forbid responding.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of invalid device of flag event, including:
First receiving module, is asked for receiving the invalid flag for object event from starting client;
First generation module, for requesting to generate invalid flag order according to the invalid flag;
First sending module, it is described for sending the invalid flag order to the customer in response end of the object event
Invalid flag order is used to the object event is labeled as disarmed state on the customer in response end.
For above device, in a kind of possible implementation, the object event is mail,
First receiving module includes:First receiving submodule, for receiving the starting client from mail applications
For targeted mails mail invalid flag ask;
First sending module includes:First sending submodule, the sound for each addressee to the targeted mails
Client is answered to send the mail invalid flag order, the mail invalid flag order is used to receive in each of the targeted mails
The targeted mails are labeled as disarmed state on the customer in response end of part people.
For above device, in a kind of possible implementation, the object event is message,
First receiving module includes:Second receiving submodule, for receiving the starting client from chat tool
For target message message invalid mark request;
First sending module includes:Second sending submodule, the sound for each recipient to the target message
Client is answered to send the message invalid tab command, the message invalid tab command is used for respectively connecing in the target message
Receive and the target message is labeled as disarmed state in the client of people.
For above device, in a kind of possible implementation, the object event is call,
First receiving module includes:3rd receiving submodule, for receiving the starting client from talk application
For destination call talk inactivity mark request;
First sending module includes:3rd sending submodule, the response for the contact person to the destination call
Client sends the talk inactivity tab command, and the talk inactivity tab command is used for the contact person in the destination call
Client on the destination call is labeled as disarmed state.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of invalid device of flag event, including:
Second receiving module is described invalid for receiving the invalid flag order for object event of server transmission
Tab command is requested to generate according to the invalid flag for object event of starting client;
Mark module, for the object event to be labeled as disarmed state on customer in response end.
For above device, in a kind of possible implementation, the object event is mail,
Second receiving module includes:4th receiving submodule, the pin that the server for receiving mail applications is sent
Mail invalid flag order to targeted mails, the mail invalid flag order are to be directed to the mesh according to starting client
What the mail invalid flag of mark mail requested to generate;
The mark module includes:First mark submodule, the response visitor for each addressee in the targeted mails
The targeted mails are labeled as disarmed state on the end of family.
For above device, in a kind of possible implementation, the object event is message,
Second receiving module includes:5th receiving submodule, the pin that the server for receiving chat tool is sent
To the message invalid tab command of target message, the message invalid tab command is to be directed to the mesh according to starting client
What the message invalid mark of mark message requested to generate;
The mark module includes:Second mark submodule, the response visitor for each recipient in the target message
The target message is labeled as disarmed state on the end of family.
For above device, in a kind of possible implementation, the object event is call,
Second receiving module includes:6th receiving submodule, the server for receiving talk application, which is sent, to be directed to
The talk inactivity tab command of destination call, the talk inactivity tab command are to be directed to the target according to starting client
What the talk inactivity mark of call requested to generate;
The mark module includes:3rd mark submodule, the customer in response for the contact person in the destination call
The destination call is labeled as disarmed state on end.
For above device, in a kind of possible implementation, the mark module further includes following at least one son
Module:
4th mark submodule, for marking the object event to belong on the corresponding interactive interface of the object event
Disarmed state;
Submodule is reminded, in the case where detecting the operation of the response to the object event, sending invalid prompting;
Forbid responding submodule, for the object event to be arranged to forbid responding.
According to a fifth aspect of the embodiments of the present disclosure, there is provided a kind of invalid device of flag event, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
The invalid flag for object event from starting client is received to ask;
Invalid flag order is requested to generate according to the invalid flag;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state on the customer in response end.
According to the 6th of the embodiment of the present disclosure the aspect, there is provided a kind of invalid device of flag event, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
What the invalid flag for object event of client requested to generate;
The object event is labeled as disarmed state on customer in response end.
The technical scheme provided by this disclosed embodiment can include the following benefits:Receive client and be directed to target thing
After the invalid flag of part, which can be sent to the client of the Related Contact of object event, so that in target
Object event is labeled as disarmed state in the client of the Related Contact of event, reduces the Related Contact to object event
Interference, reduce the unnecessary response of Related Contact, save time of receiving-transmitting sides.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of the invalid method of flag event according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the invalid method of the flag event shown according to another exemplary embodiment.
Fig. 3 is a kind of flow chart of the invalid method of the flag event shown according to another exemplary embodiment.
Fig. 4 is a kind of block diagram of the invalid device of flag event according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.
Fig. 6 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.
Fig. 7 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.
Fig. 8 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of the invalid method of flag event according to an exemplary embodiment, such as Fig. 1 institutes
Show, the invalid method of the flag event can be used in server, may comprise steps of.
In a step 101, the invalid flag for object event from starting client is received to ask.
In a step 102, invalid flag order is requested to generate according to the invalid flag.
In step 103, the invalid flag order, the no criterion are sent to the customer in response end of the object event
Note order is used to the object event is labeled as disarmed state on the customer in response end.
In the embodiments of the present disclosure, object event can include a variety of, such as:Mail, message, call etc..Wherein, pass through
The client of mail applications on the terminal device of user, and the server of mail applications, it is possible to achieve mail
Transmitting-receiving.Pass through the server of the client of the chat tool on the terminal device of user, and chat tool, Ke Yishi
The transmitting-receiving of existing message.Pass through the service of the client of the talk application on the terminal device of user, and talk application
Device, it is possible to achieve call connection.Wherein, chat tool can include but is not limited to short message, Michat, QQ, wechat, Fetion etc..
Talk application includes but not limited to mobile phone communication, Internet phone-calling etc..
Wherein, if user wants the object event having been sent from being labeled as disarmed state, it can pass through the user's
Client (starting client) sends the invalid flag request for object event to server.By server according to invalid flag
Invalid flag order is requested to generate, and the invalid flag order is sent to the visitor of the Related Contact involved by the object event
Family end (customer in response end).For different object events, server can use different processing, referring to following example.
Example one, object event are mail.
Receive the invalid flag for object event from starting client and ask (step 101), can include:Receive
The mail invalid flag for targeted mails of starting client from mail applications is asked;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state (step 103) on the customer in response end, can be included:To the targeted mails
The customer in response end of each addressee send the mail invalid flag order, the mail invalid flag order is used for described
The targeted mails are labeled as disarmed state on the customer in response end of each addressee of targeted mails.
Example two, object event are message.
Receive the invalid flag for object event from starting client and ask (step 101), can include:Receive
The message invalid for target message of starting client from chat tool marks request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state (step 103) on the customer in response end, can be included:To the target message
The customer in response end of each recipient send the message invalid tab command, the message invalid tab command is used for described
The target message is labeled as disarmed state in the client of each recipient of target message.
Example three, object event are call.
Receive the invalid flag for object event from starting client and ask (step 101), can include:Receive
The talk inactivity for destination call of starting client from talk application marks request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for
The object event is labeled as disarmed state (step 103) on the customer in response end, can be included:To the destination call
The customer in response end of contact person send the talk inactivity tab command, the talk inactivity tab command is used in the mesh
Mark and the destination call is labeled as disarmed state in the client of the contact person of call.
In a kind of possible implementation, by the target in the client of the Related Contact of the object event
Event flag is disarmed state, can include following at least one mode:
Mode one, mark the object event to belong to disarmed state on the corresponding interactive interface of the object event.
For example, in the client of each addressee of targeted mails, which is labeled as disarmed state.
For another example, in the client of each recipient of target message, target message is labeled as disarmed state.
For another example, in the client of the contact person of destination call, destination call is labeled as disarmed state.
Wherein, on interactive interface, the word such as mode marked invalid shape such as " need not reply ", engineering noise can be used
State;The mode marked invalid states such as color, symbol, voice can also be used.Mark mode can include it is a variety of, be not limited to above-mentioned
Example.
Mode two, detect the response to the object event operation in the case of, send invalid prompting.
For example, detection instruction can be set on the customer in response end of each addressee of targeted mails in advance, detecting
User carries out the targeted mails " replys ", " all reply " when response operates, and the customer in response end of each addressee can be to
Addressee sends the invalid prompting of mail.
For another example, detection instruction can be set on the customer in response end of each recipient of target message in advance, detected
User carries out the target message " reply " when response operates, and the customer in response end of each recipient can be sent to recipient to disappear
Cease invalid prompting.
For another example, detection instruction can be set on the customer in response end of the contact person of destination call in advance, detecting use
Family carries out the destination call " clawback " when response operates, and the customer in response end of the contact person can send logical to the contact person
Talk about invalid prompting.
Wherein, on interactive interface, word can be used for example " marked no longer to need to reply, if to continue to reply”
Invalid prompting is sent etc. mode;The modes such as color, symbol, voice can also be used to send invalid prompting.Alerting pattern can be
It is a variety of, it is not limited to above-mentioned example.
Mode three, by the object event be arranged to forbid responding.
For example, the targeted mails can be arranged to " prohibit in advance on the customer in response end of each addressee of targeted mails
Non-return is answered " etc. forbid responding.When detecting that user carries out " reply ", " all replying " operates when response, the sound of each addressee
Answer client to be sent to addressee and forbid the prompting for responding the mail.
For another example, the target message can be arranged to " prohibit in advance on the customer in response end of each recipient of target message
Non-return is answered " etc. forbid responding.When detecting that user operates target message progress " reply " when response, the sound of each recipient
Answer client to be sent to recipient and forbid the prompting for responding the message.
For another example, the destination call can be arranged to " forbid in advance on the customer in response end of the contact person of destination call
Clawback " etc. is forbidden responding.When detecting that user operates destination call progress " clawback " when response, the response of the contact person
Client can be sent to the contact person forbids the prompting for responding the call.
Wherein, on interactive interface, it the mode such as example " can forbid replying " using word and send and forbid response to remind;
The modes such as color, symbol, voice can be used, which to send, forbids response to remind.Alerting pattern can be a variety of, be not limited to above-mentioned show
Example.
In the present embodiment, can be by basis after the invalid flag request for object event for receiving starting client
The invalid flag order that the invalid flag requests to generate is sent to the customer in response end of object event, so that in the sound of object event
Answer and object event is labeled as disarmed state in client, reduce the interference to the customer in response end of object event, reduce response
The unnecessary response of client, saves the time of receiving-transmitting sides.
Fig. 2 is a kind of flow chart of the invalid method of the flag event shown according to another exemplary embodiment, such as Fig. 2 institutes
Show, the invalid method of the flag event can be used in terminal, may comprise steps of.
In step 201, the invalid flag order for object event that server is sent, the invalid flag life are received
Order is requested to generate according to the invalid flag for object event of starting client.
In step 202, the object event is labeled as disarmed state on customer in response end.
Wherein, if user wants the object event having been sent from being labeled as disarmed state, it can pass through the user's
Client (starting client) sends the invalid flag request for object event to server.Server is according to the invalid flag
After requesting to generate invalid flag order, which can be sent to the Related Contact involved by the object event
Client (customer in response end).For different object events, customer in response end can use different processing, referring to as follows
Example.
Example one, object event are mail.
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
(the step 201) requested to generate for the invalid flag of object event of client, can include:Receive the service of mail applications
The mail invalid flag order for targeted mails that device is sent, the mail invalid flag order is according to starting client
Requested to generate for the mail invalid flag of the targeted mails;
The object event is labeled as disarmed state (step 202) on customer in response end, can be included:In the mesh
Mark and the targeted mails are labeled as disarmed state on the customer in response end of each addressee of mail.
Example two, object event are message.
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
(the step 201) requested to generate for the invalid flag of object event of client, can include:Receive the service of chat tool
The message invalid tab command for target message that device is sent, the message invalid tab command is according to starting client
Requested to generate for the message invalid mark of the target message;
The object event is labeled as disarmed state (step 202) on customer in response end, can be included:In the mesh
Mark and the target message is labeled as disarmed state on the customer in response end of each recipient of message.
Example three, object event are call.
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation
(the step 201) requested to generate for the invalid flag of object event of client, can include:Receive the service of talk application
Device sends the talk inactivity tab command for destination call, and the talk inactivity tab command is the pin according to starting client
The talk inactivity mark of the destination call is requested to generate;
The object event is labeled as disarmed state (step 202) on customer in response end, can be included:In the mesh
Mark and the destination call is labeled as disarmed state on the customer in response end of the contact person of call.
In a kind of possible implementation, by the target in the client of the Related Contact of the object event
Event flag is disarmed state, can include various ways.For example, see the phase of the mode one in above-described embodiment to mode three
Description is closed, details are not described herein.
In the present embodiment, if necessary to which object event is labeled as disarmed state, it can be sent to server and be directed to mesh
Mark event invalid flag request, with by server by the invalid flag order requested to generate according to the invalid flag send to
The customer in response end of object event, so that the object event is labeled as disarmed state on the customer in response end of object event,
Reduce the interference to the customer in response end of object event, reduce the unnecessary response in customer in response end, save receiving-transmitting sides when
Between.
Fig. 3 is a kind of flow chart of the invalid method of the flag event shown according to another exemplary embodiment, such as Fig. 3 institutes
Show, the invalid method of the flag event may comprise steps of.
In step 301, user sends various events by starting client to server.For example, mail, message, logical
Words etc..
In step 302, server sends the events to the customer in response end of Related Contact.
In step 303, user may receive the reply to some events, or user is no longer desire to receive to some
The reply of event.At this moment, user can be using these events as object event, and these are led on the starting client of oneself
Some UI (User Interface, user interface) modes are crossed by these object events labeled as invalid.For example, in client electricity
" the invalid button " of the object event is clicked on the display interface of brain, right button selects invalid option etc..For another example, touched in client
Corresponding gesture is performed to the object event on the display interface of screen.For another example, using phonetic symbol, the object event is invalid.
In step 304, user is sent for object event without criterion by the starting client of oneself to server
Note request.
In step 305, can be according to the invalid flag after server receives the invalid flag request for object event
Request to generate invalid flag order.
Within step 306, server can will send the nothing to the customer in response end of the Related Contact of the object event
Imitate tab command.
In step 307, the customer in response end of the Related Contact of the object event is received for the invalid of object event
During tab command, which can be labeled as disarmed state.Wherein, different types of customer in response end is by event flag
It is different for the form of disarmed state.
The disclosure is used to repeat to reply to reduce by event flag in the example below for disarmed state.
Example one, morning user U have made a call several to solve the problems, such as one, but because of some reason A to colleague A
The phone of the user U is not replied.U is solved the problems, such as to another colleague B helps made a phone call and obtained B again.It is several small
Shi Hou, A have found the missed calls dialed of U, and to U clawbacks, there occurs what for telephone questionnaireU have to spend the time to be explained to A and dial
The reason for making a phone call, this is all waste of time to U and A.
Example two, user U are badly in need of an e-file or some information, but U is not clear that who can help him.Institute
Information have sent to many people in chat tool with U or mail has been mass-sended in mailbox.When U receives the information or file of needs
Afterwards, U is not intended to receive the file or information of repetition again, is also not intended to waste other people time to help oneself to have solved
The problem of.
Separately below with for the following application scenarios of above-mentioned example differentiation, the side invalid to the flag event of the disclosure
Method is illustrative.
Application scenarios one:Email.
User has mass-sended a mail by mail applications (starting client) and has wished to obtain a file.When user receives
To at least one e-mail response and after having obtained desired file, if the time that user is not intended to take other addressees again goes
Find file and reply user, while be also not intended to by the reply holding time of other addressees.
Mail applications (starting client) can provide a user whether the mail that option has been sent to mark " no longer needs
Reply " or " being still required for replying ".User can mark the mail sent by some UI mode of the starting client, and
(such as being asked by invalid flag) is by the marker passing to mail server., can be with after server receives the mark of user
The mark is distributed to all addressees (customer in response end) sent in mail by (such as passing through invalid flag order).And
The customer in response end of each addressee is included the mark in mail applications to notify all addressees using certain UI mode.Such as
The mark of user is no longer to need to reply ", then if when some addressee selects " reply " or " all replying ", each addressee
Mail applications (customer in response end) can then prompt that " the marked mail of sender no longer needs to reply, if continues back
It is multiple”.Then, before mail applications (customer in response end) can enter mail editing interface or return according to the selection of user
Interface.
Application scenarios two:Chat tool.
User wishes to obtain some problem by having mass-sended message to some people in chat tool (starting client)
Answer.After user has received effective reply, the time that user is not intended to take other contact persons again looks for answer simultaneously
User is replied, while is also not intended to take screen by the reply of other contact persons.
Chat tool (starting client) can provide a user whether the message that option has been sent to mark " no longer needs
Reply " or " being still required for replying ".User can mark the message sent by some UI mode of the starting client, and
(such as being asked by invalid flag) is by the marker passing to chat tool server.After server receives the mark of user,
Can (such as passing through invalid flag order) by the mark be distributed to group existing for transmitted message (each recipient response visitor
Family end) in.And the mark is included in chat work using certain UI mode in the group (the customer in response end of each recipient)
To notify All Contacts in tool.Mark such as user is no longer to need to reply ", then it is somebody's turn to do if some contact person attempts to reply
During bar message, the chat tool (customer in response end) of each recipient can then prompt that " hair marked message of message people no longer needs
Reply, if continue to reply”.Then, chat tool (customer in response end) can enter copy editor according to the selection of user
Interface before interface or return.
Application scenarios three:Phone.
User has made a call some to ask for help to contact person A.Because a variety of causes A does not receive calls such as mobile phone bell
Sound be set as it is noiseless, A mobile phone forget be in it is medium.User has obtained effective answer by other contact persons such as B.User is not
Wish that the time for taking contact person A again goes to reply user.
Talk application (starting client) can provide a user whether the message that option has been sent to mark " no longer needs
Reply " or " being still required for replying ".User can mark the message sent by some UI mode of the starting client, and
The telephone number of the mark and corresponding contact person A is delivered to server by (such as being asked by invalid flag).Work as server
After the mark for receiving user, can (such as passing through invalid flag order) by the mark be distributed to the contact person A mobile phone (response
Client), and include prompting in converse relevant application such as message registration, missed call by the mark using certain UI mode
In to notify the contact person A.Mark such as user is no longer to need to reply ", then if contact person A attempts the electricity of clawback user
During words, the talk application (customer in response end) of contact person A can prompt that " the marked call of phone initiator no longer needs back
It is multiple, if to continue to call”.Then, which can enter dialing circle according to the selection of user
Interface before face or return.
In the present embodiment, after the Email as user, the social event such as message or phone are no longer valid, user
The Email, social message or phone can be labeled as " no longer needing to reply ", and all phases are distributed to by server
The customer in response end of addressee or contact person are closed, gives up the puzzlement of related addressee or contact person, avoids related addressee from continuing
Reply, save the time of both sides.
In the present embodiment, if user needs object event being labeled as disarmed state, user can by itself
Starting client sends the invalid flag request for object event to server, and server will please seek survival according to the invalid flag
Into invalid flag order send to the customer in response end of object event so that by the mesh on the customer in response end of object event
Mark event flag is disarmed state, reduces the interference to the customer in response end of object event, and it is unnecessary to reduce customer in response end
Response, saves the time of receiving-transmitting sides.
Fig. 4 is a kind of block diagram of the invalid device of flag event according to an exemplary embodiment., should with reference to Fig. 4
Device can include the first receiving module 41, the first generation module 42 and the first sending module 43.
Wherein, the first receiving module 41, please for receiving the invalid flag for object event from starting client
Ask.First generation module, for requesting to generate invalid flag order according to the invalid flag.First sending module 43, is used for
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used in the response
The object event is labeled as disarmed state in client.
In the present embodiment, can be by basis after the invalid flag request for object event for receiving starting client
The invalid flag order that the invalid flag requests to generate is sent to the customer in response end of object event, so that in the sound of object event
Answer and object event is labeled as disarmed state in client, reduce the interference to the customer in response end of object event, reduce response
The unnecessary response of client, saves the time of receiving-transmitting sides.
Fig. 5 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.Fig. 5 and Fig. 4
The identical component of label has identical implication, and details are not described herein.
With reference to Fig. 5, difference lies in referring to the object event of above method embodiment showing for mail with a upper embodiment
Example.
First receiving module 41 can include:First receiving submodule 411, for receiving the hair from mail applications
The mail invalid flag for targeted mails for playing client is asked;
First sending module 43 can include:First sending submodule 431, for being received to each of the targeted mails
The customer in response end of part people sends the mail invalid flag order, and the mail invalid flag order is used in the target postal
The targeted mails are labeled as disarmed state on the customer in response end of each addressee of part.
In a kind of possible implementation, the object event referring to above method embodiment is the example of message.
First receiving module 41 can include:Second receiving submodule 412, for receiving the hair from chat tool
The message invalid for target message for playing client marks request;
First sending module 43 can include:Second sending submodule 432, for respectively connecing to the target message
The customer in response end for receiving people sends the message invalid tab command, and the message invalid tab command is used to disappear in the target
The target message is labeled as disarmed state in the client of each recipient of breath.
In a kind of possible implementation, the example referring to the object event of above method embodiment for call.
First receiving module 41 can include:3rd receiving submodule 413, for receiving the hair from talk application
The talk inactivity for destination call for playing client marks request;
First sending module 43 can include:3rd sending submodule 433, for the contact to the destination call
The customer in response end of people sends the talk inactivity tab command, and the talk inactivity tab command is used in the destination call
Contact person client on the destination call is labeled as disarmed state.
In the present embodiment, receive starting client for object event such as mail, message, call without criterion
After note request, the invalid flag order requested to generate according to the invalid flag can be sent to the customer in response of object event
End, so that object event is labeled as disarmed state on the customer in response end of object event, reduces the response to object event
The interference of client, reduces the unnecessary response in customer in response end, saves the time of receiving-transmitting sides.
Fig. 6 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.Reference Fig. 6,
The device can include the second receiving module 61 and mark module 63.
Wherein, the second receiving module 61, for receiving the invalid flag order for object event of server transmission, institute
Stating invalid flag order is requested to generate according to the invalid flag for object event of starting client.Mark module 63,
For the object event to be labeled as disarmed state on customer in response end.
In the present embodiment, if necessary to which object event is labeled as disarmed state, it can be sent to server and be directed to mesh
Mark event invalid flag request, with by server by the invalid flag order requested to generate according to the invalid flag send to
The customer in response end of object event, so that the object event is labeled as disarmed state on the customer in response end of object event,
Reduce the interference to the customer in response end of object event, reduce the unnecessary response in customer in response end, save receiving-transmitting sides when
Between.
Fig. 7 is a kind of block diagram of the invalid device of the flag event shown according to another exemplary embodiment.Fig. 7 and Fig. 6
The identical component of label has identical implication, and details are not described herein.
With reference to Fig. 7, difference lies in referring to the object event of above method embodiment showing for mail with a upper embodiment
Example.
Second receiving module 61 can include:4th receiving submodule 611, for receiving the server of mail applications
The mail invalid flag order for targeted mails sent, the mail invalid flag order is the pin according to starting client
The mail invalid flag of the targeted mails is requested to generate;
The mark module 63 can include:First mark submodule 631, for each addressee in the targeted mails
Customer in response end on the targeted mails are labeled as disarmed state.
In a kind of possible implementation, the object event referring to above method embodiment is the example of message.
Second receiving module 61 can include:5th receiving submodule 612, for receiving the server of chat tool
The message invalid tab command for target message sent, the message invalid tab command is the pin according to starting client
The message invalid mark of the target message is requested to generate;
The mark module 63 can include:Second mark submodule 632, for each recipient in the target message
Customer in response end on the target message is labeled as disarmed state.
In a kind of possible implementation, the example referring to the object event of above method embodiment for call.
Second receiving module 61 can include:6th receiving submodule 613, for receiving the server of talk application
The talk inactivity tab command for destination call is sent, the talk inactivity tab command is being directed to according to starting client
What the talk inactivity mark of the destination call requested to generate;
The mark module 63 can include:3rd mark submodule 633, for the contact person's in the destination call
The destination call is labeled as disarmed state on customer in response end.
In a kind of possible implementation, the mark module 63 further includes following at least one submodule:
4th mark submodule 634, for marking the object event on the corresponding interactive interface of the object event
Belong to disarmed state;
Submodule 635 is reminded, in the case where detecting the operation of the response to the object event, sending invalid carry
Wake up;
Forbid responding submodule 636, for the object event to be arranged to forbid responding.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
In the present embodiment, can if necessary to which object event is labeled as disarmed state such as mail, message, call
To send the invalid flag request for object event to server, will be requested to generate by server according to the invalid flag
Invalid flag order send to the customer in response end of object event so that by the target on the customer in response end of object event
Event flag is disarmed state, reduces the interference to the customer in response end of object event, reduces the unnecessary sound in customer in response end
Answer, save the time of receiving-transmitting sides.
Fig. 8 is a kind of block diagram of the invalid device 800 of the flag event shown according to another exemplary embodiment.For example,
Device 800 can be mobile phone, and computer, digital broadcast terminal, messaging devices, game console, tablet device, is cured
Treat equipment, body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 800 can include following one or more assemblies:Processing component 802, memory 804, power supply
Component 806, multimedia component 808, audio component 810, the interface 812 of input/output (I/O), sensor component 814, and
Communication component 816.
The integrated operation of the usual control device 800 of processing component 802, such as with display, call, data communication, phase
The operation that machine operates and record operation is associated.Processing component 802 can refer to including one or more processors 820 to perform
Order, to complete all or part of step of above-mentioned method.In addition, processing component 802 can include one or more modules, just
Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, it is more to facilitate
Interaction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown
Example includes the instruction of any application program or method for being operated on device 800, and contact data, telephone book data, disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM) are erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 800.
Multimedia component 808 is included in the screen of one output interface of offer between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slip and touch panel.The touch sensor can not only sense touch or sliding action
Border, but also detect and the duration and pressure associated with the touch or slide operation.In certain embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 800 is in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive exterior multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication set
Part 816 is sent.In certain embodiments, audio component 810 further includes a loudspeaker, for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor component 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented
Estimate.For example, sensor component 814 can detect opening/closed mode of device 800, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 800, and sensor component 814 can be with 800 1 components of detection device 800 or device
Position change, the existence or non-existence that user contacts with device 800,800 orientation of device or acceleration/deceleration and device 800
Temperature change.Sensor component 814 can include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor component 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 further includes near-field communication (NFC) module, to promote junction service.Example
Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be believed by one or more application application-specific integrated circuit (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-metioned instruction can be performed to complete the above method by the processor 820 of device 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
Claims (20)
1. a kind of invalid method of flag event, it is characterised in that including:
The invalid flag for object event from starting client is received to ask;
Invalid flag order is requested to generate according to the invalid flag;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for described
The object event is labeled as disarmed state on customer in response end.
2. according to the method described in claim 1, it is characterized in that, the object event is mail,
The invalid flag for object event from starting client is received to ask, including:Receive the hair from mail applications
The mail invalid flag for targeted mails for playing client is asked;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for described
The object event is labeled as disarmed state on customer in response end, including:Response to each addressee of the targeted mails
Client sends the mail invalid flag order, and the mail invalid flag order is used for each addressee in the targeted mails
The targeted mails are labeled as disarmed state on the customer in response end of people.
3. according to the method described in claim 1, it is characterized in that, the object event is message,
The invalid flag for object event from starting client is received to ask, including:Receive the hair from chat tool
The message invalid for target message for playing client marks request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for described
The object event is labeled as disarmed state on customer in response end, including:Response to each recipient of the target message
Client sends the message invalid tab command, and the message invalid tab command is used to receive in each of the target message
The target message is labeled as disarmed state in the client of people.
4. according to the method described in claim 1, it is characterized in that, the object event for call,
The invalid flag for object event from starting client is received to ask, including:Receive the hair from talk application
The talk inactivity for destination call for playing client marks request;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for described
The object event is labeled as disarmed state on customer in response end, including:To the response visitor of the contact person of the destination call
Family end sends the talk inactivity tab command, and the talk inactivity tab command is for the contact person's in the destination call
The destination call is labeled as disarmed state in client.
5. a kind of invalid method of flag event, it is characterised in that including:
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation client
What the invalid flag for object event at end requested to generate;
The object event is labeled as disarmed state on customer in response end.
6. according to the method described in claim 5, it is characterized in that, the object event is mail,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation client
What the invalid flag for object event at end requested to generate, including:Receive the server transmission of mail applications is directed to target
The mail invalid flag order of mail, the mail invalid flag order are to be directed to the targeted mails according to starting client
Mail invalid flag request to generate;
The object event is labeled as disarmed state on customer in response end, including:In each addressee of the targeted mails
Customer in response end on the targeted mails are labeled as disarmed state.
7. according to the method described in claim 5, it is characterized in that, the object event is message,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation client
What the invalid flag for object event at end requested to generate, including:Receive the server transmission of chat tool is directed to target
The message invalid tab command of message, the message invalid tab command are to be directed to the target message according to starting client
Message invalid mark request to generate;
The object event is labeled as disarmed state on customer in response end, including:In each recipient of the target message
Customer in response end on the target message is labeled as disarmed state.
8. according to the method described in claim 5, it is characterized in that, the object event for call,
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation client
What the invalid flag for object event at end requested to generate, including:The server transmission for receiving talk application is led to for target
The talk inactivity tab command of words, the talk inactivity tab command are to be directed to the destination call according to starting client
Talk inactivity mark requests to generate;
The object event is labeled as disarmed state on customer in response end, including:In the contact person of the destination call
The destination call is labeled as disarmed state on customer in response end.
9. method according to any one of claim 1 to 8, it is characterised in that by the object event labeled as invalid
State, including following at least one mode:
The object event is marked to belong to disarmed state on the corresponding interactive interface of the object event;
In the case where detecting the operation of the response to the object event, invalid prompting is sent;
The object event is arranged to forbid responding.
A kind of 10. invalid device of flag event, it is characterised in that including:
First receiving module, is asked for receiving the invalid flag for object event from starting client;
First generation module, for requesting to generate invalid flag order according to the invalid flag;
First sending module is described invalid for sending the invalid flag order to the customer in response end of the object event
Tab command is used to the object event is labeled as disarmed state on the customer in response end.
11. device according to claim 10, it is characterised in that the object event is mail,
First receiving module includes:First receiving submodule, for receiving the pin of the starting client from mail applications
The mail invalid flag of targeted mails is asked;
First sending module includes:First sending submodule, the response visitor for each addressee to the targeted mails
Family end sends the mail invalid flag order, and the mail invalid flag order is used for each addressee in the targeted mails
Customer in response end on the targeted mails are labeled as disarmed state.
12. device according to claim 10, it is characterised in that the object event is message,
First receiving module includes:Second receiving submodule, for receiving the pin of the starting client from chat tool
Request is marked to the message invalid of target message;
First sending module includes:Second sending submodule, the response visitor for each recipient to the target message
Family end sends the message invalid tab command, and the message invalid tab command is used for each recipient in the target message
Client on the target message is labeled as disarmed state.
13. device according to claim 10, it is characterised in that the object event is call,
First receiving module includes:3rd receiving submodule, for receiving the pin of the starting client from talk application
Request is marked to the talk inactivity of destination call;
First sending module includes:3rd sending submodule, the customer in response for the contact person to the destination call
End sends the talk inactivity tab command, and the talk inactivity tab command is used for the visitor in the contact person of the destination call
The destination call is labeled as disarmed state on the end of family.
A kind of 14. invalid device of flag event, it is characterised in that including:
Second receiving module, for receiving the invalid flag order for object event of server transmission, the invalid flag
Order is requested to generate according to the invalid flag for object event of starting client;
Mark module, for the object event to be labeled as disarmed state on customer in response end.
15. device according to claim 14, it is characterised in that the object event is mail,
Second receiving module includes:4th receiving submodule, what the server for receiving mail applications was sent is directed to mesh
The mail invalid flag order of mail is marked, the mail invalid flag order is to be directed to the target postal according to starting client
What the mail invalid flag of part requested to generate;
The mark module includes:First mark submodule, the customer in response end for each addressee in the targeted mails
On the targeted mails are labeled as disarmed state.
16. device according to claim 14, it is characterised in that the object event is message,
Second receiving module includes:5th receiving submodule, what the server for receiving chat tool was sent is directed to mesh
The message invalid tab command of message is marked, the message invalid tab command is disappearing for the target according to starting client
What the message invalid mark of breath requested to generate;
The mark module includes:Second mark submodule, the customer in response end for each recipient in the target message
On the target message is labeled as disarmed state.
17. device according to claim 14, it is characterised in that the object event is call,
Second receiving module includes:6th receiving submodule, the server for receiving talk application, which is sent, is directed to target
The talk inactivity tab command of call, the talk inactivity tab command are to be directed to the destination call according to starting client
Talk inactivity mark request to generate;
The mark module includes:3rd mark submodule, the customer in response end for the contact person in the destination call
The destination call is labeled as disarmed state.
18. the device according to any one of claim 14 to 17, it is characterised in that the mark module further includes following
At least one submodule:
4th mark submodule, for marking the object event to belong to invalid on the corresponding interactive interface of the object event
State;
Submodule is reminded, in the case where detecting the operation of the response to the object event, sending invalid prompting;
Forbid responding submodule, for the object event to be arranged to forbid responding.
A kind of 19. invalid device of flag event, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
The invalid flag for object event from starting client is received to ask;
Invalid flag order is requested to generate according to the invalid flag;
The invalid flag order is sent to the customer in response end of the object event, the invalid flag order is used for described
The object event is labeled as disarmed state on customer in response end.
A kind of 20. invalid device of flag event, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
The invalid flag order for object event that server is sent is received, the invalid flag order is according to initiation client
What the invalid flag for object event at end requested to generate;
The object event is labeled as disarmed state on customer in response end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610943195.2A CN108023806B (en) | 2016-10-31 | 2016-10-31 | Method and device for marking event invalidation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610943195.2A CN108023806B (en) | 2016-10-31 | 2016-10-31 | Method and device for marking event invalidation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108023806A true CN108023806A (en) | 2018-05-11 |
CN108023806B CN108023806B (en) | 2020-10-30 |
Family
ID=62070015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610943195.2A Active CN108023806B (en) | 2016-10-31 | 2016-10-31 | Method and device for marking event invalidation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108023806B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090182824A1 (en) * | 2008-01-16 | 2009-07-16 | Thomas R Haynes | System and method for follow-on message processing |
CN101931916A (en) * | 2010-09-03 | 2010-12-29 | 中兴通讯股份有限公司 | Method and system for controlling sending of electronic mail (E-mail) of wireless communication terminal |
CN102223392A (en) * | 2010-04-16 | 2011-10-19 | 佳能株式会社 | Print server and printing apparatus, network printing system, and printing method |
CN104869051A (en) * | 2015-03-18 | 2015-08-26 | 广东时代互联科技有限公司 | Method and system for revoking e-mail |
CN106027788A (en) * | 2016-06-21 | 2016-10-12 | 珠海市魅族科技有限公司 | Method and device for processing popup message |
-
2016
- 2016-10-31 CN CN201610943195.2A patent/CN108023806B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090182824A1 (en) * | 2008-01-16 | 2009-07-16 | Thomas R Haynes | System and method for follow-on message processing |
CN102223392A (en) * | 2010-04-16 | 2011-10-19 | 佳能株式会社 | Print server and printing apparatus, network printing system, and printing method |
CN101931916A (en) * | 2010-09-03 | 2010-12-29 | 中兴通讯股份有限公司 | Method and system for controlling sending of electronic mail (E-mail) of wireless communication terminal |
CN104869051A (en) * | 2015-03-18 | 2015-08-26 | 广东时代互联科技有限公司 | Method and system for revoking e-mail |
CN106027788A (en) * | 2016-06-21 | 2016-10-12 | 珠海市魅族科技有限公司 | Method and device for processing popup message |
Non-Patent Citations (1)
Title |
---|
丁鼎: "基于kano模型的顺风车服务设计研究", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108023806B (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105607883B (en) | The processing method and processing device of instant message | |
EP3113466B1 (en) | Method and device for warning | |
CN105162937B (en) | Method for processing message of incoming call and device | |
CN108810283A (en) | Equipment, method and graphic user interface for providing notice and being interacted with notice | |
CN104156204B (en) | Set up the method and device of calendar entry | |
CN107222391A (en) | Group's based reminding method, device and equipment | |
CN104156848B (en) | The method and apparatus of schedule management | |
CN105892810A (en) | Message display method and device | |
CN105337839A (en) | Exchange group control method and device | |
CN108132813A (en) | Function locking method, device and the electronic equipment of application program | |
CN103945065A (en) | Message reminding method and device | |
CN110113251A (en) | Message coalescing method and device | |
CN106453774B (en) | Contact information methods of exhibiting and device | |
EP3160112B1 (en) | Reminding method and device | |
US20150271650A1 (en) | Communication device, non-transitory storage medium, and call control method | |
CN107493366A (en) | Address list information update method, device and storage medium | |
CN107404429A (en) | Circle of friends answering method, device and computer-readable recording medium | |
US20160379172A1 (en) | Method and device for creating event reminder | |
WO2017016145A1 (en) | State notification method and apparatus | |
CN109842543A (en) | The store method and device of instant communicating method and device, instant communication message | |
WO2017071081A1 (en) | Method and device for making call connection | |
CN107295167A (en) | Method for information display and device | |
CN105306751A (en) | Reply prompting method and device | |
CN112083983A (en) | Reminding message sending method, reminding message receiving method, terminal, reminding message sending device, reminding message receiving device and reminding message receiving medium | |
CN107087077A (en) | Treating method and apparatus when alarm clock calling is invalid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |