CN109890030B - Method for establishing first communication - Google Patents

Method for establishing first communication Download PDF

Info

Publication number
CN109890030B
CN109890030B CN201811567693.7A CN201811567693A CN109890030B CN 109890030 B CN109890030 B CN 109890030B CN 201811567693 A CN201811567693 A CN 201811567693A CN 109890030 B CN109890030 B CN 109890030B
Authority
CN
China
Prior art keywords
roles
role
matters
communication
actions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811567693.7A
Other languages
Chinese (zh)
Other versions
CN109890030A (en
Inventor
孙勋悦
张嘉佩
韩建蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Transtek Medical Electronics Co Ltd
Original Assignee
Guangdong Transtek Medical Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Transtek Medical Electronics Co Ltd filed Critical Guangdong Transtek Medical Electronics Co Ltd
Priority to CN201811567693.7A priority Critical patent/CN109890030B/en
Publication of CN109890030A publication Critical patent/CN109890030A/en
Application granted granted Critical
Publication of CN109890030B publication Critical patent/CN109890030B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A method of establishing a first communication, comprising the steps of: s100, when attempting to establish a first communication between a first device in a first role and other devices in other roles, determining whether the other roles are implementing or have completed the first role: limb movement or things to do; and S200, if the judgment result is yes, establishing first communication between the first device and the other devices. Through the technical scheme, the information security of the first role can be effectively improved, illegal behaviors such as fraud and harassment are restrained, and various losses of the first role are reduced.

Description

Method for establishing first communication
Technical Field
The disclosure belongs to the field of information security, and in particular relates to a method for establishing first communication.
Background
On one hand, with the continuous development of information technology, the information security of people is difficult to be ensured, such as the massive leakage and buying and selling of contact ways, so that people are subjected to more and more telecom fraud and advertising disturbance. On the other hand, with the development of machine technology, whether the machine is in a physical form or a machine which does not have the physical form but has a software form, the value of the information processed by the machine will become more and more important, and the machine will face a threat in information security.
In the prior art, a large number of firewall technologies and intelligent identification harassment or potential hacker technologies exist, but how to design a novel scheme for establishing communication becomes a technical problem to be solved urgently.
Disclosure of Invention
In order to solve the above technical problem, the present disclosure discloses a method for establishing a first communication, including the following steps:
s100, when attempting to establish a first communication between a first device in a first role and other devices in other roles, determining whether the other roles are implementing or have completed the first role: limb movements and/or to-do matters;
s200, if the judgment result is yes, establishing first communication between the first device and the other devices.
By the technical scheme, the information security of the first role can be effectively improved, illegal behaviors such as fraud or harassment are restrained, and loss of the first role is reduced.
Drawings
Fig. 1 is a schematic illustration of a method in one embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art understand the technical solutions disclosed in the present disclosure, the technical solutions of the various embodiments will be described below with reference to the embodiments and the related drawings, and the described embodiments are a part of the embodiments of the present disclosure, but not all of the embodiments. The terms "first," "second," and the like as used in this disclosure are used for distinguishing between different objects and not for describing a particular order. Furthermore, "include" and "have," as well as any variations thereof, are intended to cover and not to exclude inclusions. For example, a process, method, system, or article or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, system, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the disclosure. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It will be appreciated by those skilled in the art that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 is a method for establishing a first communication according to an embodiment of the present disclosure, including the following steps:
s100, when attempting to establish a first communication between a first device in a first role and other devices in other roles, determining whether the other roles are implementing or have completed the first role: limb movements and/or to-do matters;
s200, if the judgment result is yes, establishing first communication between the first device and the other devices.
For the above embodiment, it screens other roles and other devices through the body actions and/or pending events, because: in one aspect, the other device attempts to establish a first communication with the first device; on the other hand, the first communication between the first device and the other device is established only when it is determined that the other character is indeed performing or has completed the body movements and/or to-do matters required by the first character. Obviously, this raises the threshold for establishing communication, and is beneficial to ensuring information security and communication security, especially means for jointly using body actions and things to do.
In another embodiment, in step S100, the first device or the other devices include any one of: personal computer, server, cell-phone, panel computer, intelligent bracelet, intelligent wrist-watch, smart television, intelligent STB, intelligent glasses, other smart machine.
It will be appreciated that this embodiment is primarily based on the perspective of a natural person, with the first device or other devices being selected, for example smart glasses are typically worn by a natural person, as are smart bracelets or smart watches, while smart televisions or smart set-top boxes are typically used for audiovisual entertainment of a natural person.
The technical solution disclosed in the present disclosure can be used to ensure information security of not only natural persons but also machines.
In another embodiment, in step S100, the first role or the other roles include any one of the following: a natural person, a machine having a physical form, a machine having no physical form but having a software form.
On the one hand, with the development of information technology, the contact information (such as telephone numbers, mailboxes, network IDs, etc.) of every natural person is at great risk of leakage and business, and therefore, people suffer from more and more telecom fraud and advertising disturbance. In order to reduce the cost of telecom fraud or advertising harassment, for example, common telephone fraud or telephone promotion, illegal persons are more inclined to play a section of natural people for telecom fraud or advertising harassment by using an automatic call-dialing program. If the embodiments disclosed in the present disclosure are adopted, since the automatic call-making program does not know in advance that the natural person may set the body action or the to-do event, and only after the body action or the to-do event is implemented or has been completed, the call can be established, the automatic call-making program cannot pass the judgment of the step S100, and thus the call cannot be successfully connected.
On the other hand, with the continuous development of machine technology, whether a machine with a physical form (for example, a machine with a physical form and a software system, such as a robot, a drone, etc.) or a machine without a physical form but with a software form (for example, a personal assistant, such as Cortana of Microsoft, Siri of Apple, etc.), the value of the information processed by the machine will become more and more important, and the machine will face a threat in information security. If the above-mentioned embodiment disclosed in the present disclosure is adopted, when a lawless person tries to establish communication with a machine through a hacking program thereof to find a program bug of the machine, the party can establish communication only after the physical action or the to-do event is being implemented or has been completed, and thus the hacking program cannot pass the judgment of the above-mentioned step S100, and thus cannot establish communication smoothly.
On the other hand, even if the lawless person has time to perform the body movement or the event to be dealt with, it is difficult to have power or motivation to perform the body movement or the event because the lawless person attaches importance to the time cost and other costs for performing the acts.
In summary, the embodiments disclosed in the present disclosure significantly improve information security.
Furthermore, as machine technology advances, no matter whether communication is performed between people, or between machines, implementations of the present disclosure are not hindered. Further, the present disclosure can effectively maintain communication security of both the natural human and machine roles, regardless of whether the machine is a machine having a physical form or a machine not having a physical form but having a software form.
In another embodiment, the present disclosure provides an exemplary enumeration of the first communication:
in step S100, the first communication includes any one of or any combination of the following:
(1) the first role and other roles are called;
(2) the first role and other roles are subjected to voice talkback or real-time voice chat or real-time video chat;
it can be understood that the (1) and (2) belong to the common situation of performing communication in various roles, and besides the (1) and (2), short messages, clients or APPs send various messages such as texts or pictures, other first communications such as spam mails are also serious disaster areas of telecom fraud and advertisement harassment, and now, many illegal behaviors of using calls, real-time voices or even real-time videos have been used for fraud or harassment. For those skilled in the art, the disturbance is not limited to advertising disturbance, but also includes endless disturbance, sexual disturbance, and the like.
(3) Delivering the virtual drift bottles between the first role and other roles;
the method and the device for delivering the virtual drift bottles are equivalent to improving the technical threshold of delivering the virtual drift bottles through the body actions or the matters to be handled, so that the virtual drift bottles cannot be directly delivered to related roles, and the incidence rate of the acts of transmitting fraud or other illegal information through the virtual drift bottles is greatly reduced.
(4) The first role and other roles are mutually added into a friend relationship or other types of trust relationships;
another type of illegal action in reality occurs in situations where an unfamiliar role seeks to become a friend or other type of trust: for example, a situation where a stranger initiates the addition of a friend to a certain user is typical on Facebook; as another example, with the development of machine technology, when multiple machines (e.g., robots, drones, virtual personal assistants, etc.) legitimately build a team of machines themselves, there are situations where other third party machines attempt to join the team and obtain the trust of a member or members of the team. The present disclosure is equivalent to improving the technical thresholds in the following communication establishment procedures through the body actions or the to-do matters: the first role and the other roles are added to each other as a friend relationship or other types of trust relationships.
(5) The first role shares files or establishes other data connections with other roles.
Another type of nefarious activity may occur with respect to data leakage, particularly where a first persona shares files or establishes other data connections with other personas. Similar to the type of first communication described above, the present disclosure can also improve the threshold for sharing files through the body actions or things to do, and if other roles refuse to implement the body actions or things to do, or do not complete the body actions or things to do, or do not meet the standards (or guarantee), then the present disclosure will not share files or establish other data connections between the first role and the other roles.
It should be noted that the first communication of the present disclosure should be taken as the broadest understanding, including but not limited to any one of the above (1) to (5) or any combination thereof; in addition, the other data connections should be understood in the broadest sense, and include connection and transmission of various potential data, such as data in social, financial, consumption behavior, everything from the internet, and so on.
In another embodiment, the present disclosure provides an exemplary listing of limb movements:
in step S100, the limb movement includes any one or any combination of the following: taiji boxing action, yoga action, and other limb actions.
For the embodiment, the limb action may be for the case that the other role is a natural person, or for the case that the other role is a robot or a drone or other machine capable of performing some actions. For a robot, in particular a humanoid robot, the robot can complete limb actions; for an unmanned aerial vehicle, the limb actions of the unmanned aerial vehicle are equivalent to anthropomorphic actions, such as rolling, climbing and the like of the unmanned aerial vehicle; for other machines, if they have an avatar, their avatar may also implement anthropomorphic actions.
In another embodiment, the present disclosure provides an exemplary list of the notification manners of the limb actions and/or the to-do matters:
in step S100, the body movement or the to-do matters include any one of or any combination of the following:
(1) information about the first limb action and/or the first to-do event, which is previously broadcast/announced by the first persona;
in this case, the first role is broadcast/announced in advance on a related channel or column of Facebook, Wechat, so that other roles in their social circles can all be made aware of the first physical action and/or the first to-do;
for example, one party of a couple: a to-do event is published in his Wechat circle of friends: com, or an off-line store, for which the other party needs to purchase an item, etc.; and/or: the information of a limb movement is released in the friend circle, and the other party needs to finish various limb movements such as a certain dance or running for 400 m.
(2) When attempting to establish a first communication between a first device of the first persona and other devices of other personas, the first persona informs the other personas of information about the second limb action and/or the second to-do event;
this situation implies the possibility of: when other roles dial the mobile phone of the first role, the first role sends information about the second body action and/or the second to-do affair to the first role through the short message of the mobile phone or the voice prompt information when the first role dials the mobile phone, and hangs up the incoming call. Unless the first persona can verify that the other persona is implementing or has completed the second to-do event, the party may access the other persona to dial the handset of the first persona to establish the first communication: and (5) calling.
(3) The first role is preset or temporarily set on a first server which has a data connection relation with the first device, and the first server is used for storing information about the third limb action and/or the third to-do matters.
In this case, when the other device in the other role needs to establish the first communication with the first device, the other device needs to query the information of the third body action and/or the third to-do event from the first server. This means that the presence of the first device in the first server in a covert manner, rather than in a broadcast or public manner, can make it difficult for any other character with which to attempt to establish the first communication to fraudulently or harass the first character;
for example, a party to a couple has set up a to-do event on his calendar server: the other party needs to connect the server to obtain the to-do matters: com, buy one item for it from a taobao or off-line store, etc.
It should be noted that, if the first role is the accessed party of the first communication, it can be not only preset or temporarily set, or the specific indication/information of the to-do matters and the body actions described above is informed in advance or temporarily when the request of the first communication is received, moreover, the specific indication/information of the to-do matters or the body actions can be changed temporarily, even different specific indications/information of the to-do matters or the body actions can be set for different other roles, and even one or more of a plurality of different to-do matters or body actions can be randomly selected (through an optional first server and an optional white list and/or a black list and/or a mechanism of a specific list established based on big data or artificial intelligence) to serve as specific indications/information that specific or unspecific other roles need to complete. For example, a first persona may typically set different limb actions and/or things to do for different other personas (e.g., within a white list or within a black list, or within or outside of other specified lists, or simply for other personas that are not known) based on their contact list or list of various trust relationships.
Furthermore, if the first role is an accessed party of the first communication, it may set a respective specified time/first role for implementing the to-do event and/or the body action to be reserved for the investigation time of other roles, and other roles exceed the specified time/investigation time when implementing the body action and/or the to-do event, the first role may directly reject the access request of the first communication, release a certain communication resource or all communication resources of the first device, and so on. In addition, the first role is a role that has authority over the first device, and has the right to pull in a blacklist for other roles. In addition, if the first device is an intelligent device, the first device can autonomously decide whether to directly reject the first communication and whether to pull other roles into a blacklist according to credit conditions of the other roles.
In another embodiment of the present invention, the substrate is,
in step S100, it is determined whether the other characters are performing or have completed the actions required by the first character and/or the actions involved in the to-do matters by any one of the following manners or combinations thereof:
(1) the other equipment records or broadcasts other roles in a live mode and sends the roles to the first equipment or a first server which has a data connection relation with the first equipment;
for example, typically, the limb movements are taken as 100 push-ups, which not only exercises but also effectively discourages fraud or harassment. Due to the popularization of the camera, the means of making 100 push-ups for video recording or live broadcasting is enough to make illegal activities difficult to continue. The service operator can better implement the technical scheme of the present disclosure through the first server. For example, the first role called by the other roles is switched on after 100 push-ups are completed.
(2) The other devices share data of one or more sensors in the other devices to the first device or the first server with data connection relation with the first device.
For example, typically, the limb movement is 800 meters running, which can also effectively prevent fraud or harassment. Due to the popularization of sensors such as a gyroscope, a pedometer, a gravimeter and the like, the real-time data of the sensors can be shared, and illegal behaviors can be well discriminated. For another example, for the above-mentioned to-do matters such as going to a certain store for shopping, the data of the GPS sensor can be used to determine whether the lovers go to the target store for shopping, which can be used to determine whether other characters meet the standards to implement the to-do matters.
It should be noted that the actions related to the body actions or the to-do matters in the present disclosure are mainly actions called in english, and on one hand, the actions are not limited to physical actions that can be implemented by natural people, humanoid robots, unmanned aerial vehicles, and the like; on the other hand, the method is not limited to slow motion or high motion and the like; on the other hand, the method is not limited to micro action or action with larger amplitude; on the other hand, the method is not limited to daily actions or certain sports; on the other hand, the method is not limited to the data of the motion which can be sensed by the sensor of one other device, and can be the data of the motion which can be sensed by all the sensors of other devices in other roles; yet another aspect is not limited to actions being performed or performed by one of the human or machine parties, but also input actions or output actions made by the human or machine as the other party in different scenarios (e.g., a third party in a trading scenario) (e.g., the other party returns associated data confirming a 100-dollar trade action, such as order information or logistics information, for the input action to the one party and for the output action to the other party), which still do not list all of the actions involved in all of the limb actions or to-do matters, in general, as long as the actions involved in the various broadly-directed limb actions or to-do matters are applicable to the present disclosure.
It is understood that the sensor may be a software-level or virtual sensor in the case of sensing the input or output behavior (e.g., the aforementioned order information, logistics information); in the case of a software-level, or virtual, sensor, it may be implemented by a software-level interface, and more specifically, it may be sensed by some processor whether the software-level interface senses the input behavior or the output behavior.
In another embodiment of the present invention, the substrate is,
in step S100, the other devices include one or more devices, and the other roles include one role or multiple roles.
It can be understood that the technical solution of the present disclosure can be implemented between two roles and their devices, and can also be implemented between more roles and their devices.
In another embodiment of the present invention, the substrate is,
in step S100, the first device determines, by a third party, whether other roles are implemented or have completed the body actions and/or to-do matters required by the first role; wherein the third party comprises any one or any combination of the following: a natural person, a machine having a physical form, a machine having no physical form but having a software form.
Obviously, the third party may be a service provider, which is advantageous for the technical solution of the present disclosure to take into account technical reserves and computing power of the parties in the implementation process. Generally, third parties tend to have more time and/or more computing power to make the determination. It can be appreciated that a third party can utilize human-computer interaction and/or various data connection means to establish an association with the first device to determine whether other characters are performing or have completed the body movements and/or things to do required by the first character.
In another embodiment of the present invention, the substrate is,
the to-do matters comprise any one or any combination of the following matters:
(1) facilitating the first persona's relationship to other personas or third parties;
(2) the matter that other characters watch or trigger a piece of advertisement information;
(3) charitable or fair affairs;
(4) cultural affairs;
(5) others are used to try out the patience of other characters or help prevent harassment of the first character.
It can be understood that the foregoing embodiments of the present disclosure can promote the transportation of natural people through limb actions, and can effectively avoid the occurrence of illegal actions, which will not cause the first role to be maliciously reported. The matters to be dealt with in the embodiment are beneficial to building a healthy social relationship, and are beneficial to generating positive benefits (such as advertisements, charities, public benefits, cultures and the like) or other matters for checking the patience of other characters or helping to prevent harassment of the first character, so that a healthy ecological chain is more beneficial to building, and all of the matters are high incidence of illegal behaviors such as fraud, harassment and the like by using technical means.
By way of example and not by way of limitation,
(1) the matters of facilitating the relationship of the first persona to other personas or third parties may include the matters of: instructing the other character to purchase a birthday present for the first character birthday; or instruct other roles to explore the elder or a specified friend;
(2) the matter of other characters watching or triggering a piece of advertisement information may include the following matters: instructing a designated website to click on a commercial advertisement on the website or watch a complete advertisement;
(3) charitable or commonweal matters may include the following: instructing other roles to go to a company or website related to charity and handle a donation; or instruct other roles to go to a company or website related to public welfare, sign support under a banner or banner advocating green travel;
(4) cultural matters may include the following matters: instructing other roles to go to a live broadcast platform to recite a poem or other article of Chinese or foreign language; indicating other roles to go to a certain social platform to record a small video of a song, uploading and publishing;
(5) other matters for challenging other characters or helping to prevent harassment of the first character, such as: the first persona indicates to other personas a non-specific to-do matter without a specific purpose.
It is understood that the present disclosure is not intended to list all kinds of backlog, however, preferably, the backlog is intended to: those that promote interpersonal relationships; those matters that benefit him; those that promote commercial health and facilitate the sustainable implementation of the construction of the ecological chain of the present disclosure; those that promote culture; others to try out the patience of other characters or help prevent harassment of the first character, etc.
Further, the present disclosure also discloses a computer-readable storage medium, wherein:
the computer readable storage medium includes one or more programs for performing any of the methods described above.
In addition, the present disclosure also discloses a data processing apparatus, including:
a processor and a memory, wherein the processor is connected with the memory,
the memory has stored thereon one or more programs,
the processor is configured to execute the program on the memory to perform any of the methods described above.
The above-described embodiments are merely illustrative of the principles of the present disclosure. It is to be understood that modifications and variations of the arrangements and details described herein will be apparent to those skilled in the art. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto, and not by the specific details presented by way of description and illustration of the embodiments presented herein.

Claims (10)

1. A method of establishing a first communication, comprising the steps of:
s100, when attempting to establish a first communication between a first device in a first role and other devices in other roles, determining whether the other roles are implementing or have completed the first role: the method comprises the following steps of (1) limb actions and events to be dealt with, wherein the limb actions and the events to be dealt with comprise: the first role is preset or temporarily set on a first server which has a data connection relation with the first equipment, and the first server is used for storing information about the third limb action and the third to-do affairs;
s200, if the judgment result is yes, establishing first communication between the first equipment and the other equipment;
the method combines the limb actions and the matters to be dealt with so as to ensure the information safety and the communication safety; wherein the content of the first and second substances,
for the method, the first role can be preset or temporarily set, or the specific indication/information of the to-do matters and the body actions can be temporarily informed in advance or when a request of the first communication is received at the moment, the specific indication/information of the to-do matters or the body actions can also be temporarily changed, different specific indications/information of the to-do matters or the body actions can also be set aiming at different other roles, and one or more of a plurality of different to-do matters or body actions can be randomly selected to be used as specific indications/information that specific or unspecific other roles need to complete through a first server and a mechanism of a white list, a black list and a specific list established based on big data or artificial intelligence.
2. The method of claim 1, wherein,
in step S100, the first device or the other devices include any one of the following: personal computer, server, cell-phone, panel computer, intelligent bracelet, intelligent wrist-watch, intelligent TV, intelligent STB, intelligent glasses, other smart machine.
3. The method of claim 1, wherein:
in step S100, the first role or the other roles include any one of: a natural person, a machine having a physical form, a machine having no physical form but having a software form.
4. The method of claim 1, wherein:
in step S100, the first communication includes any one of or any combination of the following:
(1) the first role and other roles are called;
(2) the first role and other roles are subjected to voice talkback or real-time voice chat or real-time video chat;
(3) delivering the virtual drift bottles between the first role and other roles;
(4) the first role and other roles are mutually added into a friend relationship or other types of trust relationships;
(5) the first persona shares files or establishes other data connections with other personas.
5. The method of claim 1, wherein:
in step S100, the limb movement includes any one or any combination of the following: taiji boxing action, yoga action, and other limb actions.
6. The method of claim 1, wherein:
in step S100, the body movement and the to-do matters further include any one of the following items or any combination thereof:
(1) information about the first limb action and the first to-do event, which is broadcast/announced in advance by the first character;
(2) when attempting to establish a first communication between a first device in a first persona and other devices in other personas, the first persona informs the other personas of information about a second limb action and a second to-do event.
7. The method of claim 1, wherein:
in step S100, it is determined whether the other characters are performing or have completed the body actions and actions related to the to-do matters by any one or a combination of the following methods:
(1) the other equipment records or broadcasts other roles in a live mode and sends the roles to the first equipment or a first server which has a data connection relation with the first equipment;
(2) the other devices share data of one or more sensors in the other devices to the first device or the first server with data connection relation with the first device.
8. The method of claim 1, wherein:
in step S100, the other devices include one or more devices, and the other roles include one role or multiple roles.
9. The method of claim 1, wherein:
in step S100, the first device determines, through the third party, whether other roles are being implemented or have completed the body actions and the to-do matters required by the first role; wherein the third party comprises any one or any combination of the following: a natural person, a machine having a physical form, a machine having no physical form but having a software form.
10. The method of claim 6, wherein:
the matters to be dealt with comprise any one or any combination of the following matters:
(1) facilitating the first persona's relationship to other personas or third parties;
(2) the matter that other characters watch or trigger a piece of advertisement information;
(3) charitable or fair affairs;
(4) cultural affairs;
(5) others are used to try out the patience of other characters or help prevent harassment of the first character.
CN201811567693.7A 2018-12-20 2018-12-20 Method for establishing first communication Active CN109890030B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811567693.7A CN109890030B (en) 2018-12-20 2018-12-20 Method for establishing first communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811567693.7A CN109890030B (en) 2018-12-20 2018-12-20 Method for establishing first communication

Publications (2)

Publication Number Publication Date
CN109890030A CN109890030A (en) 2019-06-14
CN109890030B true CN109890030B (en) 2022-05-06

Family

ID=66925137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811567693.7A Active CN109890030B (en) 2018-12-20 2018-12-20 Method for establishing first communication

Country Status (1)

Country Link
CN (1) CN109890030B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933398A (en) * 2005-09-16 2007-03-21 腾讯科技(深圳)有限公司 Method and system for automatic right-discriminating plusing good friend in immediate communication
CN102508914A (en) * 2011-11-17 2012-06-20 广州多益网络科技有限公司 Dating website sincerity testing task interaction system and method
CN102932752A (en) * 2012-11-19 2013-02-13 东莞宇龙通信科技有限公司 Terminal and terminal communication method
CN105763417A (en) * 2015-12-31 2016-07-13 陈戈 Communication method and system thereof
CN106227347A (en) * 2016-07-26 2016-12-14 北京光年无限科技有限公司 The means of communication, equipment and communication system towards intelligent robot
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859602A (en) * 2006-04-25 2006-11-08 董家富 Precisely positioned interactive making friends method
US9275211B2 (en) * 2013-03-15 2016-03-01 Telesign Corporation System and method for utilizing behavioral characteristics in authentication and fraud prevention
CN106789548B (en) * 2015-11-24 2020-04-24 腾讯科技(深圳)有限公司 Method for processing user relationship chain, method and device for realizing near-field social contact
SG11201806047TA (en) * 2016-01-15 2018-10-30 Lin Hui Lung Systems and methods for object analysis and exploration on social networks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933398A (en) * 2005-09-16 2007-03-21 腾讯科技(深圳)有限公司 Method and system for automatic right-discriminating plusing good friend in immediate communication
CN102508914A (en) * 2011-11-17 2012-06-20 广州多益网络科技有限公司 Dating website sincerity testing task interaction system and method
CN102932752A (en) * 2012-11-19 2013-02-13 东莞宇龙通信科技有限公司 Terminal and terminal communication method
CN105763417A (en) * 2015-12-31 2016-07-13 陈戈 Communication method and system thereof
CN106227347A (en) * 2016-07-26 2016-12-14 北京光年无限科技有限公司 The means of communication, equipment and communication system towards intelligent robot
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN109890030A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
Paat et al. Digital crime, trauma, and abuse: Internet safety and cyber risks for adolescents and emerging adults in the 21st century
KR101825781B1 (en) Session establishment method, server, device, system, apparatus, program and storage medium
US10558789B2 (en) Creating and implementing scalable and effective multimedia objects with human interaction proof (HIP) capabilities, with challenges comprising different levels of difficulty based on the degree on suspiciousness
US20160072748A1 (en) Method and System for Secure Messaging in Social Network
US20130198273A1 (en) Methods, devices, and systems for video gaming
WO2022017071A1 (en) Communication method and apparatus based on avatar interaction interface, and computer device
US10625854B2 (en) Drone interacting with a stranger having a cellphone
CN113760145B (en) Interaction method, device, electronic equipment and storage medium
US20110307565A1 (en) Group messaging integration system, method and apparatus
CN111130986A (en) Message sending method, device, equipment and storage medium
CN105323537B (en) Use the video conference of mobile platform
Woolley Manufacturing consensus: Understanding propaganda in the era of automation and anonymity
CN114390011B (en) Message processing method and device and readable storage medium
US9338112B2 (en) Safety protocols for messaging service-enabled cloud services
Hyppönen If it's smart, it's vulnerable
CN109890030B (en) Method for establishing first communication
Javed et al. Detecting nuisance calls over internet telephony using caller reputation
CN112311750B (en) Interaction method and device and electronic equipment
Namiot Twitter as a transport layer platform
Claypoole et al. Protecting Your Internet Identity: Are You Naked Online?
JP2002032510A (en) Device and method for supporting meeting
JP6734276B2 (en) Position-based mobile game management system
US20160080898A1 (en) Proximity communication method
CN115484502B (en) Live broadcast team forming method, device and system
de Souza e Silva Cell phones and places: The use of mobile technologies in Brazil

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant