CN108718271A - Processing method, device, storage medium and the terminal of good friend's request - Google Patents
Processing method, device, storage medium and the terminal of good friend's request Download PDFInfo
- Publication number
- CN108718271A CN108718271A CN201810362277.7A CN201810362277A CN108718271A CN 108718271 A CN108718271 A CN 108718271A CN 201810362277 A CN201810362277 A CN 201810362277A CN 108718271 A CN108718271 A CN 108718271A
- Authority
- CN
- China
- Prior art keywords
- requesting party
- good friend
- abnormal
- request
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present application discloses a kind of processing method, device, storage medium and the terminal of good friend's request, and this method includes:When receiving good friend's request, the abnormal reference information of requesting party is obtained;Judge whether the requesting party is abnormal user according to the abnormal reference information;If the requesting party is abnormal user, good friend's request is shielded, user information safety can be improved.
Description
Technical field
The invention relates to technical field of mobile terminals more particularly to the processing method of good friend's request, device, storages
Medium and terminal.
Background technology
As mobile terminal continues to develop, more and more users are mounted with social class application software in terminal.It is social
Class application software includes good friend's addition function, can be chatted after adding good friend.
Currently, stranger can search user, right rear line hair by the approach such as " shaking " or " neighbouring people "
Play good friend's request.After user has received good friend's request, the friend that system can prompt user new is with the presence or absence of threat.But
It is added in the presence of after the good friend threatened, user information safety can be influenced.
Invention content
The purpose of the embodiment of the present application is to provide a kind of processing method, device, storage medium and the terminal of good friend's request, can
To improve user information safety.
In a first aspect, the embodiment of the present application provides a kind of processing method of good friend's request, including:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Second aspect, the embodiment of the present application provide a kind of processing unit of good friend's request, including:
Acquisition module obtains the abnormal reference information of requesting party when for receiving good friend's request;
Whether judgment module, the abnormal reference information for being obtained according to the acquisition module judge the requesting party
For abnormal user;
Request processing module shields good friend's request if being abnormal user for the requesting party.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes the processing method that the good friend as shown in first aspect asks when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal, including memory, and processor and storage are on a memory
And the computer program that can be run in processor, the processor are realized when executing the computer program as shown in first aspect
Good friend request processing method.
The processing scheme of the good friend's request provided in the embodiment of the present application obtains request when being firstly received good friend's request
The abnormal reference information of side;Then, judge whether the requesting party is abnormal user according to the abnormal reference information;Finally,
If the requesting party is abnormal user, good friend's request is shielded, user information safety can be improved.
Description of the drawings
Fig. 1 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 4 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 5 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 6 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of the processing unit of good friend's request provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application.
Specific implementation mode
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that
It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating
, illustrate only for ease of description, in attached drawing and the relevant part of the application rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation
The processing can be terminated when completion, it is also possible to the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
As mobile terminal continues to develop, more and more users are mounted with social class application software in terminal.It is social
Class application software includes good friend's addition function, can be chatted after adding good friend.Currently, stranger can be by " shaking
One shakes " or the approach such as " neighbouring people " search user, right rear line initiates good friend's request.Good friend's request is had received in user
Afterwards, the friend that system can prompt user new is with the presence or absence of threat.User can psychologically generate uneasy after seeing prompt message
And panic.And there is the user threatened and can be believed by the acquisition of information individual subscriber of the functions such as the circle of friends of checking user publication
Breath, threatens to user information safety.
The embodiment of the present application provides a kind of processing method of good friend's request, can judge requesting party in good friend's request stage
Whether it is abnormal user, good friend's request is then shielded if it is abnormal user, and then avoids user again will tool after adding good friend
There is the good friend of threat to pull in blacklist, improves user information safety.Concrete scheme is as follows:
Fig. 1 is the flow diagram of the processing method of good friend provided by the embodiments of the present application request, and this method is used for terminal
The case where carrying out the processing of good friend's request, this method can be executed by being equipped with the mobile terminal of social class application program, should
Mobile terminal can be smart mobile phone, tablet computer, wearable device, laptop etc., wherein social class application package
It includes instant chat and applies (such as wechat, Tencent QQ or MSN) and social networking application (such as microblogging or the game application with social attribute
Deng), this method specifically comprises the following steps:
Step 110, receive good friend request when, obtain the abnormal reference information of requesting party.
Requesting party can by two-dimensional code scanning, shake the modes such as mobile phone searching keyword and find user, and to user
Initiate good friend's request.Good friend's request is sent to server by requesting party's terminal, is then sent to the user terminal by server.User
When terminal receives good friend's request of server transmission, the abnormal reference information of requesting party is obtained by server.Abnormal reference
Information include the account information of requesting party, login position information, complained information, by drawing poison-pen letter cease and fraud information in one
It is a or multiple.The abnormal reference information of each user can be stored by independent information storage server, user terminal receives
When good friend asks, requesting party's mark is obtained, abnormal reference information is obtained from information storage server using requesting party's mark.
Step 120 judges whether requesting party is abnormal user according to abnormal reference information.
The abnormal reference information got is analyzed, judges whether recipient is abnormal user.
If step 130, requesting party are abnormal user, good friend's request is shielded.
When shielding good friend's request, cancellation shows that good friend asks in the interface of foreground.Meanwhile sending feedback letter to requesting party
Breath.Feedback information may include shielding reason.
If step 140, requesting party are non-abnormal user, good friend's request is exported.
If requesting party is non-abnormal user, in the user interface of social class application program, increases good friend and ask mark
Know.
The processing method of the good friend's request provided in the embodiment of the present application obtains request when being firstly received good friend's request
The abnormal reference information of side;Then, judge whether requesting party is abnormal user according to abnormal reference information;Finally, if request
Side is abnormal user, then shields good friend's request.Relative to after adding good friend, good friend's abnormal prompt is being carried out, the application is real
Applying example can judge whether requesting party is abnormal user in good friend's request stage, and good friend's request is then shielded if it is abnormal user,
Or there are account exceptions by prompt user requesting party.If it is non-abnormal user, good friend's request is exported to user, and then avoid
Reresent after addition good friend, improves user information safety.
Fig. 2 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned
The further explanation of embodiment, including:
Step 210, receive good friend request when, obtain the account information of requesting party.
Account information includes account title, phone card number and system of real name information of requesting party etc..Account information can be
When requesting party sends good friend's request, account information is added in good friend's request.After user terminal receives good friend's request, parsing
Good friend asks to obtain account information.
Step 220 judges whether the account information of requesting party is complete.
Optionally, judge whether account information lacks phone card number.When user is dialled by virtual telephonies such as IP phones
When making a phone call or when the hiding incoming number of user setting, phone card number will be lacked in account information.Illustratively, user
Whether having valid telephone card number in the cell phone system detection account information of terminal, (whether there is or not stay in movement, unicom, telecom operators
Bottom data).If not provided, being abnormal.If so, being then non-exception.
Optionally, judge whether account information lacks system of real name authentication information.System of real name information can be whether to complete reality
The message of name certification processed.It is identified as 1 if completing system of real name certification, 0 is identified if unfinished system of real name certification.Alternatively,
System of real name information can also be the address name and identity card of requesting party.User terminal receives the address name and body of requesting party
After part card, determine whether the system of real name information of requesting party is correct by system of real name certificate server.
Optionally, illustratively, whether real-name authentication has been carried out in the cell phone system detection account information of user terminal.Example
Such as, if having the certification for carrying out identity card, driving license or passport.If not provided, being abnormal.If so, being then non-exception.
If step 230, the account information of requesting party are imperfect, decision request side is abnormal user, and account information is not
Completely including lacking phone card number and/or lacking system of real name authentication information.
If step 240, requesting party are abnormal user, good friend's request is shielded.
If step 250, the account information of requesting party are complete, decision request side is non-abnormal user.
If step 260, requesting party are non-abnormal user, good friend's request is exported.
Whether the processing method of good friend's request provided by the embodiments of the present application can completely determine account according to account information
It is whether abnormal, it determines that recipient is non-abnormal user when account information is complete, and export good friend's request, false account can be avoided
Number initiate good friend request, improve safety.
Fig. 3 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned
The further explanation of embodiment, including:
Step 310, receive good friend request when, obtain the login position information of requesting party.
Login position information may include the location information that requesting party currently logs in.
Step 320, judged according to login position information requesting party whether different-place login.
Judge whether the location information of requesting party is identical as the location information that user is current.The location information of requesting party can be with
It logs in inquire in ground server from account and obtain.Optionally, the accuracy of location information can be as accurate as city or country.If
Requesting party is identical with the city or country where user, it is determined that non-different-place login.Otherwise, if where requesting party and user
City or country differs, it is determined that different-place login.
Optionally, the location sets where the contact person contacted in the user preset time are obtained, if the location sets
Including the location information where requesting party, it is determined that the non-different-place login of requesting party.Otherwise, if the location sets do not include request
Location information where side, it is determined that requesting party's different-place login.Wherein, preset time can be -6 months 1 month, be chosen as 3
A month.
Illustratively, judge whether the login place of requesting party's account is consistent with the login place of user.If user's
All without the login place of requesting party's account or requesting party it is overseas anonymous login in nearest half a year contact person, then is determined as
Different-place login.
If step 330, requesting party's different-place login, decision request side is abnormal user.
If step 340, requesting party are abnormal user, good friend's request is shielded.
If step 350, the non-different-place login of requesting party, decision request side is non-abnormal user.
If step 360, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application, can be according to the login position information of requesting party, really
Determine requesting party whether different-place login, and then strange regional user is avoided to initiate to ask to user, improves safety.
Fig. 4 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned
The further explanation of embodiment, including:
Step 410, receive good friend request when, pass through server obtain requesting party complained number.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access
Device of being engaged in obtains the history of requesting party and complains record, and it includes time for being complained of requesting party and complaint reason that history, which complains record,.It can
Choosing, it can be determined whether to shield good friend's request according to complained number.The default complaint for complaining reason can also met
When record is more than preset times, shielding good friend's request.
Step 420 judges whether the complained number of requesting party is more than default complaint threshold.
Statistical history complains requesting party in record to be complained number.Default complaint threshold is more than or equal to 1, is chosen as 1 time or 3
It is secondary.
If the complained number of step 430, requesting party is more than default complaint threshold, decision request side is abnormal uses
Family.
If step 440, requesting party are abnormal user, good friend's request is shielded.
If the complained number of step 450, requesting party is less than default complaint threshold, decision request side is non-abnormal use
Family.
If step 460, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application, cell phone system is after receiving good friend's request, to clothes
Business device sends out application, and the history that application issues requesting party's account complains record.If the account by customer complaint, is determined as
It is abnormal, and then shield and be complained one or many threat users, improve safety.
Fig. 5 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned
The further explanation of embodiment, including:
Step 510 when receiving good friend's request, judges whether requesting party by other users pulls in blacklist.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access
Business device obtains requesting party and obtains the user list that requesting party is pulled in blacklist.
If step 520, requesting party pull in blacklist by other users, acquisition pulls in before blacklist requesting party and other
The chat record quantity of user.
Obtain the chat record quantity of requesting party and user respectively according to user list.
Step 530 judges whether chat record quantity is more than default chat amount threshold.
Wherein, it presets chat amount threshold and is less than 20, be chosen as 10.By chat record quantity and default chat quantity
Threshold value is compared, and statistics chat record quantity is more than the number of users of default chat amount threshold.If number of users is more than
Equal to pre-set user quantity, it is determined that requesting party is abnormal user.No person, if number of users is less than pre-set user quantity,
Determine that requesting party is non-abnormal user.Wherein, pre-set user quantity is 1 or 2.
If step 540, chat record quantity are more than default chat amount threshold, decision request side is abnormal user.
If step 550, requesting party are abnormal user, good friend's request is shielded.
If step 560, chat record quantity are less than default chat amount threshold, decision request side is that non-exception is used
Family.
If step 570, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application can judge to ask when receiving good friend's request
Whether side after the chat of default chat amount threshold pulls in blacklist by other users, and then judges whether requesting party is extremely
Client improves safety.
Fig. 6 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned
The further explanation of embodiment, including:
Step 610, receive good friend request when, obtain requesting party and other users chat record.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access
Business device obtains requesting party and obtains the chat record of requesting party and other users.Other users are the use that requesting party communicated in the recent period
Family.It is 1 day to 30 days in the recent period.Alternatively, other users are that requesting party is drawn to the user of black or complaint request side user.
Step 620 judges that requesting party whether there is fraudulent act according to chat record.
Chat record is analyzed, fraudulent act is determined whether there is by keyword lookup.
Illustratively, the history chat message of the cell phone system detection requesting party of user terminal, emphasis detection transaction and money
The relative recording of wealth contact, when discovery, the account has speech to instigate to gain the behavior of user-pay information by cheating, then is determined as exception.
If step 630, requesting party are there are fraudulent act, decision request side is abnormal user.
If step 640, requesting party are abnormal user, good friend's request is shielded.
If fraudulent act is not present in step 650, requesting party, decision request side is non-abnormal user.
If step 660, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend provided by the embodiments of the present application request can be by carrying out analysis determination to chat record
No there are fraudulent acts, and then determine whether requesting party is abnormal user, improve safety.
Optionally, the processing method for good friend's request that above-described embodiment provides can also be executed by server.Server connects
When receiving good friend's request, the abnormal reference information of requesting party is obtained.Judge whether requesting party is abnormal according to abnormal reference information
User.If requesting party is abnormal user, good friend's request is shielded.If requesting party is non-abnormal user, sent out to recipient
Good friend is sent to ask.
Fig. 7 is a kind of structural schematic diagram of the processing unit of good friend's request provided by the embodiments of the present application.As shown in fig. 7,
The device includes:Acquisition module 710, judgment module 720, request processing module 730.
Acquisition module 710 obtains the abnormal reference information of requesting party when for receiving good friend's request;
Judgment module 720, the abnormal reference information for being obtained according to the acquisition module 710 judge the request
Whether side is abnormal user;
Request processing module 730 shields good friend's request if being abnormal user for the requesting party.
Further, acquisition module 710 is used for, and obtains the account information of requesting party;
Correspondingly, judgment module 720 is used for, judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed
It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, acquisition module 710 is used for, and obtains the login position information of requesting party;
Correspondingly, judgment module 720 is used for, judging the requesting party according to the login position information, whether strange land is stepped on
Record;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, acquisition module 710 is used for, and the complained number of the requesting party is obtained by server;
Correspondingly, judgment module 720 is used for, judge whether the complained number of the requesting party is more than default complaint threshold
Value;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use
Family.
Further, acquisition module 710 is used for, and judges whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described
The chat record quantity of other users;
Correspondingly, judgment module 720 is used for, judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, acquisition module 710 is used for, and obtains the chat record of requesting party and other users;
Correspondingly, judgment module 720 is used for, judge that the requesting party goes with the presence or absence of swindle according to the chat record
For;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, request processing module 730 is used for, if the requesting party is non-abnormal user, it is described good to export
Friend's request.
The processing unit of the good friend's request provided in the embodiment of the present application, first acquisition module 710 receive good friend's request
When, obtain the abnormal reference information of requesting party;Then, judgment module 720 according to abnormal reference information judge requesting party whether be
Abnormal user;Finally, if requesting party is abnormal user, request processing module 730 shields good friend's request.Relative to adding
After good friend, good friend's abnormal prompt is being carried out, the embodiment of the present application can judge whether requesting party is different in good friend's request stage
Common family then shields good friend's request if it is abnormal user, or there are account exceptions by prompt user requesting party.If it is non-different
Common family then exports good friend's request to user, and then reresents after avoiding addition good friend, improves user information safety.
Above-mentioned apparatus can perform the method that the aforementioned all embodiments of the application are provided, and it is corresponding to have the execution above method
Function module and advantageous effect.The not technical detail of detailed description in the present embodiment, reference can be made to the aforementioned all implementations of the application
The method that example is provided.
Fig. 8 is the structural schematic diagram of another terminal device provided by the embodiments of the present application.As shown in figure 8, the terminal can
To include:Shell (not shown), memory 801, central processing unit (Central Processing Unit, CPU) 802
(also known as processor, hereinafter referred to as CPU), the computer program that is stored on memory 801 and can be run on processor 802,
Circuit board (not shown) and power circuit (not shown).The circuit board is placed in the space that the shell surrounds
Portion;The CPU802 and the memory 801 are arranged on the circuit board;The power circuit, for being the terminal
Each circuit or device power supply;The memory 801, for storing executable program code;The CPU802 is by reading institute
The executable program code that is stored in memory 801 is stated to run program corresponding with the executable program code.
The terminal further includes:Peripheral Interface 803, RF (Radio Frequency, radio frequency) circuit 805, voicefrequency circuit
806, loud speaker 811, power management chip 808, input/output (I/O) subsystem 809, touch screen 812, other input/controls
Equipment 810 and outside port 804, these components are communicated by one or more communication bus or signal wire 807.
It should be understood that graphic terminal 800 is only an example of terminal, and terminal device 800 can be with
With than shown in the drawings more or less component, two or more components can be combined, or can have
Different component configurations.Various parts shown in the drawings can be including one or more signal processings and/or special integrated
It is realized in the combination of hardware, software or hardware and software including circuit.
Just provided in this embodiment below to be described in detail for a kind of terminal device, the terminal device is with intelligent hand
For machine.
Memory 801, the memory 801 can be by access such as CPU802, Peripheral Interfaces 803, and the memory 801 can
Can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU802 and deposited by Peripheral Interface 803, the Peripheral Interface 803
Reservoir 801.
I/O subsystems 809, the I/O subsystems 809 can be by the input/output peripherals in equipment, such as touch screen 812
With other input/control devicess 810, it is connected to Peripheral Interface 803.I/O subsystems 809 may include 8091 He of display controller
One or more input controllers 8092 for controlling other input/control devicess 810.Wherein, one or more input controls
Device 8092 processed receives electric signal from other input/control devicess 810 or sends electric signal to other input/control devicess 810,
Other input/control devicess 810 may include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour
Vertical pole clicks idler wheel.It is worth noting that input controller 8092 can with it is following any one connect:Keyboard, infrared port,
The indicating equipment of USB interface and such as mouse.
Wherein, according to the operation principle of touch screen and transmission information medium classification, touch screen 812 can be resistance-type,
Capacitor induction type, infrared-type or surface acoustic wave type.Classify according to mounting means, touch screen 812 can be:It is external hanging type, built-in
Formula or monoblock type.Classify according to technical principle, touch screen 812 can be:Vector pressure sensing technology touch screen, resistive technologies are touched
Touch screen, capacitance technology touch screen, infrared technology touch screen or surface acoustic wave technique touch screen.
Touch screen 812, the touch screen 812 are the input interface and output interface between user terminal and user, can
It is shown to user depending on output, visual output may include figure, text, icon, video etc..Optionally, touch screen 812 is by user
The electric signal (electric signal of such as contact surface) triggered on touch screen curtain, is sent to processor 802.
Display controller 8091 in I/O subsystems 809 receives electric signal from touch screen 812 or is sent out to touch screen 812
Electric signals.Touch screen 812 detects the contact on touch screen, and the contact detected is converted to and is shown by display controller 8091
The interaction of user interface object on touch screen 812, that is, realize human-computer interaction, the user interface being shown on touch screen 812
Object can be the icon of running game, be networked to the icon etc. of corresponding network.It is worth noting that equipment can also include light
Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuits 805 are mainly used for establishing the communication of intelligent sound box and wireless network (i.e. network side), realize intelligent sound box
Data receiver with wireless network and transmission.Such as transmitting-receiving short message, Email etc..
Voicefrequency circuit 806 is mainly used for receiving audio data from Peripheral Interface 803, which is converted to telecommunications
Number, and the electric signal is sent to loud speaker 811.
Loud speaker 811, the voice signal for receiving intelligent sound box from wireless network by RF circuits 805, is reduced to
Sound simultaneously plays the sound to user.
Power management chip 808, the hardware for being connected by CPU802, I/O subsystem and Peripheral Interface are powered
And power management.
In the present embodiment, central processing unit 802 is used for:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed
It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use
Family.
Further, the abnormal reference information for obtaining requesting party, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described
The chat record quantity of other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, it after judging whether the requesting party is abnormal user according to the abnormal reference information, also wraps
It includes:
If the requesting party is non-abnormal user, good friend's request is exported.
The embodiment of the present application also provides a kind of storage medium including terminal device executable instruction, and the terminal device can
It executes instruction when being executed by terminal device processor for executing a kind of processing method of good friend's request, this method includes:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed
It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use
Family.
Further, the abnormal reference information for obtaining requesting party, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described
The chat record quantity of other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, it after judging whether the requesting party is abnormal user according to the abnormal reference information, also wraps
It includes:
If the requesting party is non-abnormal user, good friend's request is exported.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present application
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or the arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool
There are one or the electrical connection of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the application operation computer
Program code, programming language include object oriented program language-such as Java, Smalltalk, C++, are also wrapped
Include conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete
Ground executes, partly executes on the user computer, being executed as an independent software package, partly being existed on the user computer
Part executes or executes on a remote computer or server completely on the remote computer on subscriber computer.It is being related to
In the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or wide area
Net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as utilize ISP
To be connected by internet).
Certainly, a kind of storage medium including computer executable instructions that the embodiment of the present application is provided, computer
Operation is recommended in the application that executable instruction is not limited to the described above, and the application that the application any embodiment is provided can also be performed
Relevant operation in recommendation method.
Note that above are only preferred embodiment and the institute's application technology principle of the application.It will be appreciated by those skilled in the art that
The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation,
The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out to the application by above example
It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also
May include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.
Claims (10)
1. a kind of processing method of good friend's request, which is characterized in that including:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
2. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party
Information, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account information is not
Completely including lacking phone card number and/or lacking system of real name authentication information.
3. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party
Information, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
4. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party
Information, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal user.
5. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party
Information, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described other
The chat record quantity of user;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
6. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party
Information, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
7. according to the processing method of any one of claim 1-6 good friend's requests, which is characterized in that according to the exception
After reference information judges whether the requesting party is abnormal user, further include:
If the requesting party is non-abnormal user, good friend's request is exported.
8. a kind of processing unit of good friend's request, which is characterized in that including:
Acquisition module obtains the abnormal reference information of requesting party when for receiving good friend's request;
Judgment module, the abnormal reference information for being obtained according to the acquisition module judge whether the requesting party is different
Common family;
Request processing module shields good friend's request if being abnormal user for the requesting party.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The processing method that the good friend as described in any in claim 1-7 asks is realized when row.
10. a kind of terminal, including memory, processor and storage are on a memory and can be in the computer journey of processor operation
Sequence, which is characterized in that realize that the good friend as described in claim 1-7 is any asks when the processor executes the computer program
The processing method asked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362277.7A CN108718271A (en) | 2018-04-20 | 2018-04-20 | Processing method, device, storage medium and the terminal of good friend's request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362277.7A CN108718271A (en) | 2018-04-20 | 2018-04-20 | Processing method, device, storage medium and the terminal of good friend's request |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108718271A true CN108718271A (en) | 2018-10-30 |
Family
ID=63899251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810362277.7A Pending CN108718271A (en) | 2018-04-20 | 2018-04-20 | Processing method, device, storage medium and the terminal of good friend's request |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108718271A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495378A (en) * | 2018-12-28 | 2019-03-19 | 广州华多网络科技有限公司 | Detect method, apparatus, server and the storage medium of abnormal account number |
CN109636656A (en) * | 2018-10-31 | 2019-04-16 | 张建强 | A kind of dating system |
CN111726789A (en) * | 2019-03-21 | 2020-09-29 | 上海博泰悦臻电子设备制造有限公司 | First mobile terminal, friend adding method and system |
CN112686767A (en) * | 2020-12-31 | 2021-04-20 | 上海掌门科技有限公司 | User management method, device and storage medium |
CN115884167A (en) * | 2022-03-25 | 2023-03-31 | 北京字跳网络技术有限公司 | Data processing method, device, equipment and storage medium |
CN117896184A (en) * | 2024-03-14 | 2024-04-16 | 山西金冠同力信息技术有限公司 | Network security monitoring method, device and equipment based on big data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795612A (en) * | 2014-01-15 | 2014-05-14 | 五八同城信息技术有限公司 | Method for detecting junk and illegal messages in instant messaging |
CN104010064A (en) * | 2014-05-14 | 2014-08-27 | 北京奇虎科技有限公司 | Networking number search method and device |
CN104156447A (en) * | 2014-08-14 | 2014-11-19 | 天格科技(杭州)有限公司 | Intelligent social platform advertisement early warning and handling method |
CN104636453A (en) * | 2015-01-29 | 2015-05-20 | 小米科技有限责任公司 | Illegal user data identification method and device |
CN105323144A (en) * | 2014-07-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and system for prompting message abnormity in instant messenger |
US20160127282A1 (en) * | 2014-10-31 | 2016-05-05 | Avaya Inc. | System and method of adding an anonymous participant to a chat session |
CN105635048A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Service request processing method and service request processing device |
CN106358220A (en) * | 2015-07-17 | 2017-01-25 | 腾讯科技(深圳)有限公司 | Detection method of abnormal contact person information, device and system |
-
2018
- 2018-04-20 CN CN201810362277.7A patent/CN108718271A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795612A (en) * | 2014-01-15 | 2014-05-14 | 五八同城信息技术有限公司 | Method for detecting junk and illegal messages in instant messaging |
CN104010064A (en) * | 2014-05-14 | 2014-08-27 | 北京奇虎科技有限公司 | Networking number search method and device |
CN105323144A (en) * | 2014-07-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and system for prompting message abnormity in instant messenger |
CN104156447A (en) * | 2014-08-14 | 2014-11-19 | 天格科技(杭州)有限公司 | Intelligent social platform advertisement early warning and handling method |
CN105635048A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Service request processing method and service request processing device |
US20160127282A1 (en) * | 2014-10-31 | 2016-05-05 | Avaya Inc. | System and method of adding an anonymous participant to a chat session |
CN104636453A (en) * | 2015-01-29 | 2015-05-20 | 小米科技有限责任公司 | Illegal user data identification method and device |
CN106358220A (en) * | 2015-07-17 | 2017-01-25 | 腾讯科技(深圳)有限公司 | Detection method of abnormal contact person information, device and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636656A (en) * | 2018-10-31 | 2019-04-16 | 张建强 | A kind of dating system |
CN109495378A (en) * | 2018-12-28 | 2019-03-19 | 广州华多网络科技有限公司 | Detect method, apparatus, server and the storage medium of abnormal account number |
CN111726789A (en) * | 2019-03-21 | 2020-09-29 | 上海博泰悦臻电子设备制造有限公司 | First mobile terminal, friend adding method and system |
CN112686767A (en) * | 2020-12-31 | 2021-04-20 | 上海掌门科技有限公司 | User management method, device and storage medium |
CN115884167A (en) * | 2022-03-25 | 2023-03-31 | 北京字跳网络技术有限公司 | Data processing method, device, equipment and storage medium |
CN115884167B (en) * | 2022-03-25 | 2023-08-22 | 北京字跳网络技术有限公司 | Data processing method, device, equipment and storage medium |
CN117896184A (en) * | 2024-03-14 | 2024-04-16 | 山西金冠同力信息技术有限公司 | Network security monitoring method, device and equipment based on big data |
CN117896184B (en) * | 2024-03-14 | 2024-05-28 | 山西金冠同力信息技术有限公司 | Network security monitoring method, device and equipment based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108718271A (en) | Processing method, device, storage medium and the terminal of good friend's request | |
CN108563933A (en) | Control method, device, storage medium and the mobile terminal of application program | |
CN106293751A (en) | A kind of method showing information on the terminal device and terminal unit | |
CN104935744A (en) | Verification code display method, verification code display device and mobile terminal | |
CN108268763A (en) | terminal control method, device, storage medium and terminal | |
CN105701414A (en) | Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment | |
CN107172196B (en) | A kind of business interaction methods, devices and systems | |
CN108960839B (en) | Payment method and device | |
CN106484547A (en) | A kind of management method, device and terminal for opening application more | |
CN107026933A (en) | A kind of information management method, device and intelligent terminal for opening application more | |
CN107729764A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
CN110765502B (en) | Information processing method and related product | |
CN106815534B (en) | Method and device for protecting user privacy and mobile terminal | |
CN105577375A (en) | Identity authentication method and device | |
CN105471877A (en) | Evidence data obtaining method and device | |
CN109495573A (en) | Data transmission method, device, storage medium and terminal | |
CN107172258A (en) | A kind of method, device, terminal and storage medium for preserving associated person information | |
CN110278273B (en) | Multimedia file uploading method, device, terminal, server and storage medium | |
CN110334529B (en) | Data processing method, device, equipment, system and audio equipment | |
CN105320885A (en) | Method and device for detecting malicious website | |
CN106326768B (en) | A kind of approaches to IM, device and intelligent terminal | |
CN111970298B (en) | Application access method and device, storage medium and computer equipment | |
CN108418982B (en) | Voice call data processing method and device, storage medium and mobile terminal | |
CN106101361B (en) | Display methods, device and the mobile phone of cell phone address book | |
CN108427549A (en) | Sound processing method, device, storage medium and the terminal of notification message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181030 |
|
RJ01 | Rejection of invention patent application after publication |