CN108718271A - Processing method, device, storage medium and the terminal of good friend's request - Google Patents

Processing method, device, storage medium and the terminal of good friend's request Download PDF

Info

Publication number
CN108718271A
CN108718271A CN201810362277.7A CN201810362277A CN108718271A CN 108718271 A CN108718271 A CN 108718271A CN 201810362277 A CN201810362277 A CN 201810362277A CN 108718271 A CN108718271 A CN 108718271A
Authority
CN
China
Prior art keywords
requesting party
good friend
abnormal
request
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810362277.7A
Other languages
Chinese (zh)
Inventor
曾鸿坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810362277.7A priority Critical patent/CN108718271A/en
Publication of CN108718271A publication Critical patent/CN108718271A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses a kind of processing method, device, storage medium and the terminal of good friend's request, and this method includes:When receiving good friend's request, the abnormal reference information of requesting party is obtained;Judge whether the requesting party is abnormal user according to the abnormal reference information;If the requesting party is abnormal user, good friend's request is shielded, user information safety can be improved.

Description

Processing method, device, storage medium and the terminal of good friend's request
Technical field
The invention relates to technical field of mobile terminals more particularly to the processing method of good friend's request, device, storages Medium and terminal.
Background technology
As mobile terminal continues to develop, more and more users are mounted with social class application software in terminal.It is social Class application software includes good friend's addition function, can be chatted after adding good friend.
Currently, stranger can search user, right rear line hair by the approach such as " shaking " or " neighbouring people " Play good friend's request.After user has received good friend's request, the friend that system can prompt user new is with the presence or absence of threat.But It is added in the presence of after the good friend threatened, user information safety can be influenced.
Invention content
The purpose of the embodiment of the present application is to provide a kind of processing method, device, storage medium and the terminal of good friend's request, can To improve user information safety.
In a first aspect, the embodiment of the present application provides a kind of processing method of good friend's request, including:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Second aspect, the embodiment of the present application provide a kind of processing unit of good friend's request, including:
Acquisition module obtains the abnormal reference information of requesting party when for receiving good friend's request;
Whether judgment module, the abnormal reference information for being obtained according to the acquisition module judge the requesting party For abnormal user;
Request processing module shields good friend's request if being abnormal user for the requesting party.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes the processing method that the good friend as shown in first aspect asks when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal, including memory, and processor and storage are on a memory And the computer program that can be run in processor, the processor are realized when executing the computer program as shown in first aspect Good friend request processing method.
The processing scheme of the good friend's request provided in the embodiment of the present application obtains request when being firstly received good friend's request The abnormal reference information of side;Then, judge whether the requesting party is abnormal user according to the abnormal reference information;Finally, If the requesting party is abnormal user, good friend's request is shielded, user information safety can be improved.
Description of the drawings
Fig. 1 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 4 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 5 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 6 is the flow diagram of the processing method of another good friend's request provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of the processing unit of good friend's request provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application.
Specific implementation mode
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating , illustrate only for ease of description, in attached drawing and the relevant part of the application rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation The processing can be terminated when completion, it is also possible to the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
As mobile terminal continues to develop, more and more users are mounted with social class application software in terminal.It is social Class application software includes good friend's addition function, can be chatted after adding good friend.Currently, stranger can be by " shaking One shakes " or the approach such as " neighbouring people " search user, right rear line initiates good friend's request.Good friend's request is had received in user Afterwards, the friend that system can prompt user new is with the presence or absence of threat.User can psychologically generate uneasy after seeing prompt message And panic.And there is the user threatened and can be believed by the acquisition of information individual subscriber of the functions such as the circle of friends of checking user publication Breath, threatens to user information safety.
The embodiment of the present application provides a kind of processing method of good friend's request, can judge requesting party in good friend's request stage Whether it is abnormal user, good friend's request is then shielded if it is abnormal user, and then avoids user again will tool after adding good friend There is the good friend of threat to pull in blacklist, improves user information safety.Concrete scheme is as follows:
Fig. 1 is the flow diagram of the processing method of good friend provided by the embodiments of the present application request, and this method is used for terminal The case where carrying out the processing of good friend's request, this method can be executed by being equipped with the mobile terminal of social class application program, should Mobile terminal can be smart mobile phone, tablet computer, wearable device, laptop etc., wherein social class application package It includes instant chat and applies (such as wechat, Tencent QQ or MSN) and social networking application (such as microblogging or the game application with social attribute Deng), this method specifically comprises the following steps:
Step 110, receive good friend request when, obtain the abnormal reference information of requesting party.
Requesting party can by two-dimensional code scanning, shake the modes such as mobile phone searching keyword and find user, and to user Initiate good friend's request.Good friend's request is sent to server by requesting party's terminal, is then sent to the user terminal by server.User When terminal receives good friend's request of server transmission, the abnormal reference information of requesting party is obtained by server.Abnormal reference Information include the account information of requesting party, login position information, complained information, by drawing poison-pen letter cease and fraud information in one It is a or multiple.The abnormal reference information of each user can be stored by independent information storage server, user terminal receives When good friend asks, requesting party's mark is obtained, abnormal reference information is obtained from information storage server using requesting party's mark.
Step 120 judges whether requesting party is abnormal user according to abnormal reference information.
The abnormal reference information got is analyzed, judges whether recipient is abnormal user.
If step 130, requesting party are abnormal user, good friend's request is shielded.
When shielding good friend's request, cancellation shows that good friend asks in the interface of foreground.Meanwhile sending feedback letter to requesting party Breath.Feedback information may include shielding reason.
If step 140, requesting party are non-abnormal user, good friend's request is exported.
If requesting party is non-abnormal user, in the user interface of social class application program, increases good friend and ask mark Know.
The processing method of the good friend's request provided in the embodiment of the present application obtains request when being firstly received good friend's request The abnormal reference information of side;Then, judge whether requesting party is abnormal user according to abnormal reference information;Finally, if request Side is abnormal user, then shields good friend's request.Relative to after adding good friend, good friend's abnormal prompt is being carried out, the application is real Applying example can judge whether requesting party is abnormal user in good friend's request stage, and good friend's request is then shielded if it is abnormal user, Or there are account exceptions by prompt user requesting party.If it is non-abnormal user, good friend's request is exported to user, and then avoid Reresent after addition good friend, improves user information safety.
Fig. 2 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned The further explanation of embodiment, including:
Step 210, receive good friend request when, obtain the account information of requesting party.
Account information includes account title, phone card number and system of real name information of requesting party etc..Account information can be When requesting party sends good friend's request, account information is added in good friend's request.After user terminal receives good friend's request, parsing Good friend asks to obtain account information.
Step 220 judges whether the account information of requesting party is complete.
Optionally, judge whether account information lacks phone card number.When user is dialled by virtual telephonies such as IP phones When making a phone call or when the hiding incoming number of user setting, phone card number will be lacked in account information.Illustratively, user Whether having valid telephone card number in the cell phone system detection account information of terminal, (whether there is or not stay in movement, unicom, telecom operators Bottom data).If not provided, being abnormal.If so, being then non-exception.
Optionally, judge whether account information lacks system of real name authentication information.System of real name information can be whether to complete reality The message of name certification processed.It is identified as 1 if completing system of real name certification, 0 is identified if unfinished system of real name certification.Alternatively, System of real name information can also be the address name and identity card of requesting party.User terminal receives the address name and body of requesting party After part card, determine whether the system of real name information of requesting party is correct by system of real name certificate server.
Optionally, illustratively, whether real-name authentication has been carried out in the cell phone system detection account information of user terminal.Example Such as, if having the certification for carrying out identity card, driving license or passport.If not provided, being abnormal.If so, being then non-exception.
If step 230, the account information of requesting party are imperfect, decision request side is abnormal user, and account information is not Completely including lacking phone card number and/or lacking system of real name authentication information.
If step 240, requesting party are abnormal user, good friend's request is shielded.
If step 250, the account information of requesting party are complete, decision request side is non-abnormal user.
If step 260, requesting party are non-abnormal user, good friend's request is exported.
Whether the processing method of good friend's request provided by the embodiments of the present application can completely determine account according to account information It is whether abnormal, it determines that recipient is non-abnormal user when account information is complete, and export good friend's request, false account can be avoided Number initiate good friend request, improve safety.
Fig. 3 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned The further explanation of embodiment, including:
Step 310, receive good friend request when, obtain the login position information of requesting party.
Login position information may include the location information that requesting party currently logs in.
Step 320, judged according to login position information requesting party whether different-place login.
Judge whether the location information of requesting party is identical as the location information that user is current.The location information of requesting party can be with It logs in inquire in ground server from account and obtain.Optionally, the accuracy of location information can be as accurate as city or country.If Requesting party is identical with the city or country where user, it is determined that non-different-place login.Otherwise, if where requesting party and user City or country differs, it is determined that different-place login.
Optionally, the location sets where the contact person contacted in the user preset time are obtained, if the location sets Including the location information where requesting party, it is determined that the non-different-place login of requesting party.Otherwise, if the location sets do not include request Location information where side, it is determined that requesting party's different-place login.Wherein, preset time can be -6 months 1 month, be chosen as 3 A month.
Illustratively, judge whether the login place of requesting party's account is consistent with the login place of user.If user's All without the login place of requesting party's account or requesting party it is overseas anonymous login in nearest half a year contact person, then is determined as Different-place login.
If step 330, requesting party's different-place login, decision request side is abnormal user.
If step 340, requesting party are abnormal user, good friend's request is shielded.
If step 350, the non-different-place login of requesting party, decision request side is non-abnormal user.
If step 360, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application, can be according to the login position information of requesting party, really Determine requesting party whether different-place login, and then strange regional user is avoided to initiate to ask to user, improves safety.
Fig. 4 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned The further explanation of embodiment, including:
Step 410, receive good friend request when, pass through server obtain requesting party complained number.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access Device of being engaged in obtains the history of requesting party and complains record, and it includes time for being complained of requesting party and complaint reason that history, which complains record,.It can Choosing, it can be determined whether to shield good friend's request according to complained number.The default complaint for complaining reason can also met When record is more than preset times, shielding good friend's request.
Step 420 judges whether the complained number of requesting party is more than default complaint threshold.
Statistical history complains requesting party in record to be complained number.Default complaint threshold is more than or equal to 1, is chosen as 1 time or 3 It is secondary.
If the complained number of step 430, requesting party is more than default complaint threshold, decision request side is abnormal uses Family.
If step 440, requesting party are abnormal user, good friend's request is shielded.
If the complained number of step 450, requesting party is less than default complaint threshold, decision request side is non-abnormal use Family.
If step 460, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application, cell phone system is after receiving good friend's request, to clothes Business device sends out application, and the history that application issues requesting party's account complains record.If the account by customer complaint, is determined as It is abnormal, and then shield and be complained one or many threat users, improve safety.
Fig. 5 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned The further explanation of embodiment, including:
Step 510 when receiving good friend's request, judges whether requesting party by other users pulls in blacklist.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access Business device obtains requesting party and obtains the user list that requesting party is pulled in blacklist.
If step 520, requesting party pull in blacklist by other users, acquisition pulls in before blacklist requesting party and other The chat record quantity of user.
Obtain the chat record quantity of requesting party and user respectively according to user list.
Step 530 judges whether chat record quantity is more than default chat amount threshold.
Wherein, it presets chat amount threshold and is less than 20, be chosen as 10.By chat record quantity and default chat quantity Threshold value is compared, and statistics chat record quantity is more than the number of users of default chat amount threshold.If number of users is more than Equal to pre-set user quantity, it is determined that requesting party is abnormal user.No person, if number of users is less than pre-set user quantity, Determine that requesting party is non-abnormal user.Wherein, pre-set user quantity is 1 or 2.
If step 540, chat record quantity are more than default chat amount threshold, decision request side is abnormal user.
If step 550, requesting party are abnormal user, good friend's request is shielded.
If step 560, chat record quantity are less than default chat amount threshold, decision request side is that non-exception is used Family.
If step 570, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend's request provided by the embodiments of the present application can judge to ask when receiving good friend's request Whether side after the chat of default chat amount threshold pulls in blacklist by other users, and then judges whether requesting party is extremely Client improves safety.
Fig. 6 is a kind of flow diagram of the processing method of good friend's request provided by the embodiments of the present application, as to above-mentioned The further explanation of embodiment, including:
Step 610, receive good friend request when, obtain requesting party and other users chat record.
When terminal receives good friend's request, identified by good friend acquisition request requesting party.It is taken using requesting party's identification access Business device obtains requesting party and obtains the chat record of requesting party and other users.Other users are the use that requesting party communicated in the recent period Family.It is 1 day to 30 days in the recent period.Alternatively, other users are that requesting party is drawn to the user of black or complaint request side user.
Step 620 judges that requesting party whether there is fraudulent act according to chat record.
Chat record is analyzed, fraudulent act is determined whether there is by keyword lookup.
Illustratively, the history chat message of the cell phone system detection requesting party of user terminal, emphasis detection transaction and money The relative recording of wealth contact, when discovery, the account has speech to instigate to gain the behavior of user-pay information by cheating, then is determined as exception.
If step 630, requesting party are there are fraudulent act, decision request side is abnormal user.
If step 640, requesting party are abnormal user, good friend's request is shielded.
If fraudulent act is not present in step 650, requesting party, decision request side is non-abnormal user.
If step 660, requesting party are non-abnormal user, good friend's request is exported.
The processing method of good friend provided by the embodiments of the present application request can be by carrying out analysis determination to chat record No there are fraudulent acts, and then determine whether requesting party is abnormal user, improve safety.
Optionally, the processing method for good friend's request that above-described embodiment provides can also be executed by server.Server connects When receiving good friend's request, the abnormal reference information of requesting party is obtained.Judge whether requesting party is abnormal according to abnormal reference information User.If requesting party is abnormal user, good friend's request is shielded.If requesting party is non-abnormal user, sent out to recipient Good friend is sent to ask.
Fig. 7 is a kind of structural schematic diagram of the processing unit of good friend's request provided by the embodiments of the present application.As shown in fig. 7, The device includes:Acquisition module 710, judgment module 720, request processing module 730.
Acquisition module 710 obtains the abnormal reference information of requesting party when for receiving good friend's request;
Judgment module 720, the abnormal reference information for being obtained according to the acquisition module 710 judge the request Whether side is abnormal user;
Request processing module 730 shields good friend's request if being abnormal user for the requesting party.
Further, acquisition module 710 is used for, and obtains the account information of requesting party;
Correspondingly, judgment module 720 is used for, judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, acquisition module 710 is used for, and obtains the login position information of requesting party;
Correspondingly, judgment module 720 is used for, judging the requesting party according to the login position information, whether strange land is stepped on Record;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, acquisition module 710 is used for, and the complained number of the requesting party is obtained by server;
Correspondingly, judgment module 720 is used for, judge whether the complained number of the requesting party is more than default complaint threshold Value;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use Family.
Further, acquisition module 710 is used for, and judges whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described The chat record quantity of other users;
Correspondingly, judgment module 720 is used for, judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, acquisition module 710 is used for, and obtains the chat record of requesting party and other users;
Correspondingly, judgment module 720 is used for, judge that the requesting party goes with the presence or absence of swindle according to the chat record For;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, request processing module 730 is used for, if the requesting party is non-abnormal user, it is described good to export Friend's request.
The processing unit of the good friend's request provided in the embodiment of the present application, first acquisition module 710 receive good friend's request When, obtain the abnormal reference information of requesting party;Then, judgment module 720 according to abnormal reference information judge requesting party whether be Abnormal user;Finally, if requesting party is abnormal user, request processing module 730 shields good friend's request.Relative to adding After good friend, good friend's abnormal prompt is being carried out, the embodiment of the present application can judge whether requesting party is different in good friend's request stage Common family then shields good friend's request if it is abnormal user, or there are account exceptions by prompt user requesting party.If it is non-different Common family then exports good friend's request to user, and then reresents after avoiding addition good friend, improves user information safety.
Above-mentioned apparatus can perform the method that the aforementioned all embodiments of the application are provided, and it is corresponding to have the execution above method Function module and advantageous effect.The not technical detail of detailed description in the present embodiment, reference can be made to the aforementioned all implementations of the application The method that example is provided.
Fig. 8 is the structural schematic diagram of another terminal device provided by the embodiments of the present application.As shown in figure 8, the terminal can To include:Shell (not shown), memory 801, central processing unit (Central Processing Unit, CPU) 802 (also known as processor, hereinafter referred to as CPU), the computer program that is stored on memory 801 and can be run on processor 802, Circuit board (not shown) and power circuit (not shown).The circuit board is placed in the space that the shell surrounds Portion;The CPU802 and the memory 801 are arranged on the circuit board;The power circuit, for being the terminal Each circuit or device power supply;The memory 801, for storing executable program code;The CPU802 is by reading institute The executable program code that is stored in memory 801 is stated to run program corresponding with the executable program code.
The terminal further includes:Peripheral Interface 803, RF (Radio Frequency, radio frequency) circuit 805, voicefrequency circuit 806, loud speaker 811, power management chip 808, input/output (I/O) subsystem 809, touch screen 812, other input/controls Equipment 810 and outside port 804, these components are communicated by one or more communication bus or signal wire 807.
It should be understood that graphic terminal 800 is only an example of terminal, and terminal device 800 can be with With than shown in the drawings more or less component, two or more components can be combined, or can have Different component configurations.Various parts shown in the drawings can be including one or more signal processings and/or special integrated It is realized in the combination of hardware, software or hardware and software including circuit.
Just provided in this embodiment below to be described in detail for a kind of terminal device, the terminal device is with intelligent hand For machine.
Memory 801, the memory 801 can be by access such as CPU802, Peripheral Interfaces 803, and the memory 801 can Can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU802 and deposited by Peripheral Interface 803, the Peripheral Interface 803 Reservoir 801.
I/O subsystems 809, the I/O subsystems 809 can be by the input/output peripherals in equipment, such as touch screen 812 With other input/control devicess 810, it is connected to Peripheral Interface 803.I/O subsystems 809 may include 8091 He of display controller One or more input controllers 8092 for controlling other input/control devicess 810.Wherein, one or more input controls Device 8092 processed receives electric signal from other input/control devicess 810 or sends electric signal to other input/control devicess 810, Other input/control devicess 810 may include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole clicks idler wheel.It is worth noting that input controller 8092 can with it is following any one connect:Keyboard, infrared port, The indicating equipment of USB interface and such as mouse.
Wherein, according to the operation principle of touch screen and transmission information medium classification, touch screen 812 can be resistance-type, Capacitor induction type, infrared-type or surface acoustic wave type.Classify according to mounting means, touch screen 812 can be:It is external hanging type, built-in Formula or monoblock type.Classify according to technical principle, touch screen 812 can be:Vector pressure sensing technology touch screen, resistive technologies are touched Touch screen, capacitance technology touch screen, infrared technology touch screen or surface acoustic wave technique touch screen.
Touch screen 812, the touch screen 812 are the input interface and output interface between user terminal and user, can It is shown to user depending on output, visual output may include figure, text, icon, video etc..Optionally, touch screen 812 is by user The electric signal (electric signal of such as contact surface) triggered on touch screen curtain, is sent to processor 802.
Display controller 8091 in I/O subsystems 809 receives electric signal from touch screen 812 or is sent out to touch screen 812 Electric signals.Touch screen 812 detects the contact on touch screen, and the contact detected is converted to and is shown by display controller 8091 The interaction of user interface object on touch screen 812, that is, realize human-computer interaction, the user interface being shown on touch screen 812 Object can be the icon of running game, be networked to the icon etc. of corresponding network.It is worth noting that equipment can also include light Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuits 805 are mainly used for establishing the communication of intelligent sound box and wireless network (i.e. network side), realize intelligent sound box Data receiver with wireless network and transmission.Such as transmitting-receiving short message, Email etc..
Voicefrequency circuit 806 is mainly used for receiving audio data from Peripheral Interface 803, which is converted to telecommunications Number, and the electric signal is sent to loud speaker 811.
Loud speaker 811, the voice signal for receiving intelligent sound box from wireless network by RF circuits 805, is reduced to Sound simultaneously plays the sound to user.
Power management chip 808, the hardware for being connected by CPU802, I/O subsystem and Peripheral Interface are powered And power management.
In the present embodiment, central processing unit 802 is used for:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use Family.
Further, the abnormal reference information for obtaining requesting party, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described The chat record quantity of other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, it after judging whether the requesting party is abnormal user according to the abnormal reference information, also wraps It includes:
If the requesting party is non-abnormal user, good friend's request is exported.
The embodiment of the present application also provides a kind of storage medium including terminal device executable instruction, and the terminal device can It executes instruction when being executed by terminal device processor for executing a kind of processing method of good friend's request, this method includes:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account is believed It ceases imperfect including lacking phone card number and/or lacking system of real name authentication information.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal use Family.
Further, the abnormal reference information for obtaining requesting party, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described The chat record quantity of other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
Further, the abnormal reference information for obtaining requesting party, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
Further, it after judging whether the requesting party is abnormal user according to the abnormal reference information, also wraps It includes:
If the requesting party is non-abnormal user, good friend's request is exported.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present application Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or the arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool There are one or the electrical connection of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the application operation computer Program code, programming language include object oriented program language-such as Java, Smalltalk, C++, are also wrapped Include conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete Ground executes, partly executes on the user computer, being executed as an independent software package, partly being existed on the user computer Part executes or executes on a remote computer or server completely on the remote computer on subscriber computer.It is being related to In the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or wide area Net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as utilize ISP To be connected by internet).
Certainly, a kind of storage medium including computer executable instructions that the embodiment of the present application is provided, computer Operation is recommended in the application that executable instruction is not limited to the described above, and the application that the application any embodiment is provided can also be performed Relevant operation in recommendation method.
Note that above are only preferred embodiment and the institute's application technology principle of the application.It will be appreciated by those skilled in the art that The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation, The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out to the application by above example It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also May include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.

Claims (10)

1. a kind of processing method of good friend's request, which is characterized in that including:
When receiving good friend's request, the abnormal reference information of requesting party is obtained;
Judge whether the requesting party is abnormal user according to the abnormal reference information;
If the requesting party is abnormal user, good friend's request is shielded.
2. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party Information, including:
Obtain the account information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the account information of the requesting party is complete;
If the account information of the requesting party is imperfect, the requesting party is judged for abnormal user, the account information is not Completely including lacking phone card number and/or lacking system of real name authentication information.
3. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party Information, including:
Obtain the login position information of requesting party;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
According to the login position information judge the requesting party whether different-place login;
If requesting party's different-place login, judge the requesting party for abnormal user.
4. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party Information, including:
The complained number of the requesting party is obtained by server;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the complained number of the requesting party is more than default complaint threshold;
If the complained number of the requesting party is more than default complaint threshold, judge the requesting party for abnormal user.
5. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party Information, including:
Judge whether requesting party by other users pulls in blacklist;
If the requesting party pulls in blacklist by other users, acquisition pull in before blacklist the requesting party with it is described other The chat record quantity of user;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge whether the chat record quantity is more than default chat amount threshold;
If the chat record quantity is more than default chat amount threshold, judge the requesting party for abnormal user.
6. the processing method of good friend's request according to claim 1, which is characterized in that the abnormal reference for obtaining requesting party Information, including:
Obtain the chat record of requesting party and other users;
Correspondingly, described judge whether the requesting party is abnormal user according to the abnormal reference information, including:
Judge that the requesting party whether there is fraudulent act according to the chat record;
If there are fraudulent acts by requesting party, judge the requesting party for abnormal user.
7. according to the processing method of any one of claim 1-6 good friend's requests, which is characterized in that according to the exception After reference information judges whether the requesting party is abnormal user, further include:
If the requesting party is non-abnormal user, good friend's request is exported.
8. a kind of processing unit of good friend's request, which is characterized in that including:
Acquisition module obtains the abnormal reference information of requesting party when for receiving good friend's request;
Judgment module, the abnormal reference information for being obtained according to the acquisition module judge whether the requesting party is different Common family;
Request processing module shields good friend's request if being abnormal user for the requesting party.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The processing method that the good friend as described in any in claim 1-7 asks is realized when row.
10. a kind of terminal, including memory, processor and storage are on a memory and can be in the computer journey of processor operation Sequence, which is characterized in that realize that the good friend as described in claim 1-7 is any asks when the processor executes the computer program The processing method asked.
CN201810362277.7A 2018-04-20 2018-04-20 Processing method, device, storage medium and the terminal of good friend's request Pending CN108718271A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810362277.7A CN108718271A (en) 2018-04-20 2018-04-20 Processing method, device, storage medium and the terminal of good friend's request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810362277.7A CN108718271A (en) 2018-04-20 2018-04-20 Processing method, device, storage medium and the terminal of good friend's request

Publications (1)

Publication Number Publication Date
CN108718271A true CN108718271A (en) 2018-10-30

Family

ID=63899251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810362277.7A Pending CN108718271A (en) 2018-04-20 2018-04-20 Processing method, device, storage medium and the terminal of good friend's request

Country Status (1)

Country Link
CN (1) CN108718271A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495378A (en) * 2018-12-28 2019-03-19 广州华多网络科技有限公司 Detect method, apparatus, server and the storage medium of abnormal account number
CN109636656A (en) * 2018-10-31 2019-04-16 张建强 A kind of dating system
CN111726789A (en) * 2019-03-21 2020-09-29 上海博泰悦臻电子设备制造有限公司 First mobile terminal, friend adding method and system
CN112686767A (en) * 2020-12-31 2021-04-20 上海掌门科技有限公司 User management method, device and storage medium
CN115884167A (en) * 2022-03-25 2023-03-31 北京字跳网络技术有限公司 Data processing method, device, equipment and storage medium
CN117896184A (en) * 2024-03-14 2024-04-16 山西金冠同力信息技术有限公司 Network security monitoring method, device and equipment based on big data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795612A (en) * 2014-01-15 2014-05-14 五八同城信息技术有限公司 Method for detecting junk and illegal messages in instant messaging
CN104010064A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Networking number search method and device
CN104156447A (en) * 2014-08-14 2014-11-19 天格科技(杭州)有限公司 Intelligent social platform advertisement early warning and handling method
CN104636453A (en) * 2015-01-29 2015-05-20 小米科技有限责任公司 Illegal user data identification method and device
CN105323144A (en) * 2014-07-16 2016-02-10 腾讯科技(深圳)有限公司 Method and system for prompting message abnormity in instant messenger
US20160127282A1 (en) * 2014-10-31 2016-05-05 Avaya Inc. System and method of adding an anonymous participant to a chat session
CN105635048A (en) * 2014-10-28 2016-06-01 腾讯科技(深圳)有限公司 Service request processing method and service request processing device
CN106358220A (en) * 2015-07-17 2017-01-25 腾讯科技(深圳)有限公司 Detection method of abnormal contact person information, device and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795612A (en) * 2014-01-15 2014-05-14 五八同城信息技术有限公司 Method for detecting junk and illegal messages in instant messaging
CN104010064A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Networking number search method and device
CN105323144A (en) * 2014-07-16 2016-02-10 腾讯科技(深圳)有限公司 Method and system for prompting message abnormity in instant messenger
CN104156447A (en) * 2014-08-14 2014-11-19 天格科技(杭州)有限公司 Intelligent social platform advertisement early warning and handling method
CN105635048A (en) * 2014-10-28 2016-06-01 腾讯科技(深圳)有限公司 Service request processing method and service request processing device
US20160127282A1 (en) * 2014-10-31 2016-05-05 Avaya Inc. System and method of adding an anonymous participant to a chat session
CN104636453A (en) * 2015-01-29 2015-05-20 小米科技有限责任公司 Illegal user data identification method and device
CN106358220A (en) * 2015-07-17 2017-01-25 腾讯科技(深圳)有限公司 Detection method of abnormal contact person information, device and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636656A (en) * 2018-10-31 2019-04-16 张建强 A kind of dating system
CN109495378A (en) * 2018-12-28 2019-03-19 广州华多网络科技有限公司 Detect method, apparatus, server and the storage medium of abnormal account number
CN111726789A (en) * 2019-03-21 2020-09-29 上海博泰悦臻电子设备制造有限公司 First mobile terminal, friend adding method and system
CN112686767A (en) * 2020-12-31 2021-04-20 上海掌门科技有限公司 User management method, device and storage medium
CN115884167A (en) * 2022-03-25 2023-03-31 北京字跳网络技术有限公司 Data processing method, device, equipment and storage medium
CN115884167B (en) * 2022-03-25 2023-08-22 北京字跳网络技术有限公司 Data processing method, device, equipment and storage medium
CN117896184A (en) * 2024-03-14 2024-04-16 山西金冠同力信息技术有限公司 Network security monitoring method, device and equipment based on big data
CN117896184B (en) * 2024-03-14 2024-05-28 山西金冠同力信息技术有限公司 Network security monitoring method, device and equipment based on big data

Similar Documents

Publication Publication Date Title
CN108718271A (en) Processing method, device, storage medium and the terminal of good friend's request
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
CN106293751A (en) A kind of method showing information on the terminal device and terminal unit
CN104935744A (en) Verification code display method, verification code display device and mobile terminal
CN108268763A (en) terminal control method, device, storage medium and terminal
CN105701414A (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
CN107172196B (en) A kind of business interaction methods, devices and systems
CN108960839B (en) Payment method and device
CN106484547A (en) A kind of management method, device and terminal for opening application more
CN107026933A (en) A kind of information management method, device and intelligent terminal for opening application more
CN107729764A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN110765502B (en) Information processing method and related product
CN106815534B (en) Method and device for protecting user privacy and mobile terminal
CN105577375A (en) Identity authentication method and device
CN105471877A (en) Evidence data obtaining method and device
CN109495573A (en) Data transmission method, device, storage medium and terminal
CN107172258A (en) A kind of method, device, terminal and storage medium for preserving associated person information
CN110278273B (en) Multimedia file uploading method, device, terminal, server and storage medium
CN110334529B (en) Data processing method, device, equipment, system and audio equipment
CN105320885A (en) Method and device for detecting malicious website
CN106326768B (en) A kind of approaches to IM, device and intelligent terminal
CN111970298B (en) Application access method and device, storage medium and computer equipment
CN108418982B (en) Voice call data processing method and device, storage medium and mobile terminal
CN106101361B (en) Display methods, device and the mobile phone of cell phone address book
CN108427549A (en) Sound processing method, device, storage medium and the terminal of notification message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181030

RJ01 Rejection of invention patent application after publication