CN113612886A - Strange number processing method and computer-readable storage medium - Google Patents

Strange number processing method and computer-readable storage medium Download PDF

Info

Publication number
CN113612886A
CN113612886A CN202110777286.4A CN202110777286A CN113612886A CN 113612886 A CN113612886 A CN 113612886A CN 202110777286 A CN202110777286 A CN 202110777286A CN 113612886 A CN113612886 A CN 113612886A
Authority
CN
China
Prior art keywords
application
application program
strange
unfamiliar
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110777286.4A
Other languages
Chinese (zh)
Other versions
CN113612886B (en
Inventor
刘锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202110777286.4A priority Critical patent/CN113612886B/en
Publication of CN113612886A publication Critical patent/CN113612886A/en
Application granted granted Critical
Publication of CN113612886B publication Critical patent/CN113612886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/56Arrangements for indicating or recording the called number at the calling subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Abstract

The application relates to the field of communication and discloses a strange number processing method and a computer-readable storage medium. The method comprises the following steps: obtaining an unfamiliar number from the first application, the unfamiliar number being for a communication event and not present in a contacts database of the electronic device; generating and storing number marking information for the unfamiliar number according to the related data of the first application program, wherein the number marking information is used for identifying the incidence relation between the unfamiliar number and the first application program; and detecting that a communication event relative to the unfamiliar number occurs in the second application program, and displaying the number mark information in an interface of the second application program. The user can be prompted to accurately identify the unfamiliar number, and the use experience of the user is improved.

Description

Strange number processing method and computer-readable storage medium
Technical Field
The present application relates to the field of electronic devices, and in particular, to a method for processing a strange number and a computer-readable storage medium.
Background
With the development of science and technology, the APP (application software) of the mobile phone is also rapidly developed, and in order to meet different requirements of users, more and more APPs are installed in the mobile phone. The mobile phone APP is, for example, a take-out application, an express application, a shopping application, a transportation application, or the like. When a user uses a mobile phone APP to carry out shopping, express delivery, car booking and other experiences, manufacturers corresponding to the APPs can provide corresponding contact ways of service personnel in the APPs so that the user can contact the service personnel conveniently.
By taking a shopping APP as an example for explanation, after a user places an order in the shopping APP, the APP can provide logistics express information, and the logistics express information comprises an express company, a courier name and a courier contact mode. When a user wants to contact with a courier in the order, the courier phone is clicked in logistics express information of a shopping APP, and the mobile phone jumps to a dialing interface. After the user finishes the call with the courier, the call records after dialing only display a string of numbers, which belong to strange numbers.
After the user communicates with different couriers, the dialed call record displays a plurality of strange numbers. The user is difficult to distinguish the meaning of each strange number from a plurality of strange numbers in the call records, so that the user is difficult to quickly call back the correct number when calling back. For example, when a user wants to contact a courier again, it is difficult to quickly find the correct number from a plurality of strange numbers. This results in a poor user experience.
Disclosure of Invention
The embodiment of the application provides a method for processing unfamiliar numbers, which can prompt a user to accurately identify unfamiliar numbers.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, the application provides a strange number processing method applied to an electronic device installed with a first application program and a second application program. The processing method of the strange number comprises the following steps: obtaining an unfamiliar number from the first application, the unfamiliar number being for a communication event and not present in a contacts database of the electronic device; generating and storing number marking information for the unfamiliar number according to the related data of the first application program, wherein the number marking information is used for identifying the incidence relation between the unfamiliar number and the first application program; and detecting that a communication event relative to the unfamiliar number occurs in the second application program, and displaying the number mark information in an interface of the second application program.
According to the embodiment of the application, when a communication event (such as an incoming call, an outgoing call and the like) relative to the strange number occurs in the second application program, number mark information is displayed on an interface of the second application program. In addition, after the second application program generates the communication record with the unfamiliar number, the number mark information corresponding to the communication record is automatically given, so that the communication with the unfamiliar number is conveniently searched for again in the follow-up process, and the experience of the user is improved.
In one possible implementation of the first aspect, the obtaining the strange number from the first application comprises: detecting a first operation from a user for an unfamiliar number displayed in an interface of a first application program; and responding to the first operation, and acquiring the strange number from the first application program. Equivalently, the triggering of the electronic device to generate number marking information identifying the association between the unfamiliar number and the application is triggered by user operation.
In one possible implementation of the first aspect, acquiring the strange number from the first application in response to the first operation includes: the second application program responds to the first operation and acquires the strange number from the first application program.
In one possible implementation of the first aspect, the first operation performed on the strange number displayed in the interface of the first application includes: clicking the strange number and jumping to the second application program. Illustratively, clicking on a strange number is a call-making operation that is performed.
In one possible implementation of the first aspect, the first operation performed on the strange number displayed in the interface of the first application includes: the strange number is copied and pasted to the second application. Copying and pasting the strange number is illustratively a call-making operation that is performed.
In one possible implementation of the first aspect, the obtaining the strange number from the first application comprises: detecting that a first application program generates text information, wherein the text information comprises strange numbers; and extracting the strange number from the text information according to a preset keyword extraction rule. Equivalently, the triggering of the electronic device to generate number marking information identifying the association between the unfamiliar number and the application is automatically triggered by the application. The user does not need to perform triggering operation, and after the application of the electronic equipment detects that the text information containing the strange number is generated in the application, the system automatically generates the number marking information. The user does not sense, and when the electronic equipment has a communication event, the user can be prompted with relevant information about the unfamiliar number. The application may refer to a system application (e.g., a cell phone manager) preset by the electronic device system or an application installed on the electronic device by the user.
In one possible implementation of the first aspect, extracting the strange number from the text information according to a preset keyword extraction rule includes: and the first application program or the second application program extracts the strange number from the text information according to a preset keyword extraction rule.
In one possible implementation of the first aspect, obtaining the strange number from the first application includes: and extracting the strange number from the text information generated by the first application program by using a third application program installed in the electronic equipment according to a preset keyword extraction rule. Equivalently, the process of acquiring the strange number is acquired through a third application different from the first application and the second application. Illustratively, the third application is a stand-alone application or a sub-module of the first application or the second application. The third application is for example a cell phone housekeeper.
In a possible implementation of the first aspect, the preset keyword extraction rule includes: short message templates, regular expressions or natural language analysis algorithms.
In one possible implementation of the first aspect, the strange number is obtained from the first application, and the data related to the first application is obtained at the same time.
In one possible implementation of the first aspect, the obtaining data related to the first application includes: and acquiring related data of the first application program by using the second application program.
In one possible implementation of the first aspect, the obtaining data related to the first application includes: and acquiring related data of the first application program by using a third application program installed in the electronic equipment.
In a possible implementation of the first aspect, the relevant data of the first application includes any one or more of the following: the application name of the first application program, the contact name corresponding to the strange number and the company name corresponding to the strange number.
In one possible implementation of the first aspect, generating and storing number marking information for the strange number according to the relevant data of the first application includes: and generating and storing number marking information for the strange number by using the first application program or the second application program according to the related data of the first application program.
In one possible implementation of the first aspect, generating and storing number marking information for the strange number according to the relevant data of the first application includes: and generating and storing number marking information for the strange number according to the related data of the first application program by using a third application program installed in the electronic equipment.
In a possible implementation of the first aspect, the number marking information includes a text or an icon, where the icon is an icon of the first application program, and the text includes any one or a combination of more than one of the following: the application name of the first application program, the contact name corresponding to the strange number and the company name corresponding to the strange number.
In one possible implementation of the first aspect, detecting that a communication event occurs in the second application program relative to the strange number, and displaying number mark information in an interface of the second application program includes: detecting that a communication event relative to the unfamiliar number occurs to the second application program; and querying the number marking information by using the second application program, determining that the strange number is matched with the strange number in the number marking information, and displaying the number marking information in an interface of the second application program. Illustratively, the first application program, the second application program or the third application program stores the number marking information, the second application program inquires the number marking information by itself, and displays the number marking information on an interface of the second application program.
In one possible implementation of the first aspect, detecting that a communication event with an unfamiliar number occurs in the second application, and displaying number mark information in an interface of the second application includes: and querying the number marking information by using a third application program installed in the electronic equipment, determining that the unfamiliar number is matched with the unfamiliar number in the number marking information, sending the number marking information to the second application program by using the third application program, and displaying the number marking information in an interface of the second application program.
Illustratively, the first application program, the second application program, or the third application program stores the number marking information, the second application program queries the number marking information through the third application program, after the third application program queries the number marking information, the second application program communicates with the second application program, and the number marking information is displayed on an interface of the second application program.
In one possible implementation of the first aspect, the first application includes a shopping application (e.g., glory mall), a transportation application (e.g., car park), an instant messaging application (e.g., WeChat), a note application (e.g., memo), or an intelligent services application (e.g., intelligent assistant). The interfaces of these applications can display strange numbers.
In one possible implementation of the first aspect, the second application program includes a phone application or a text message application. These applications can have communication events that occur with respect to unfamiliar numbers.
In one possible implementation of the first aspect, the communication event comprises: an incoming communication event, an outgoing communication event, a receiving short message communication event, and a sending short message communication event.
In a second aspect, embodiments of the present application disclose a computer-readable storage medium having instructions stored thereon, which, when executed on a computer, cause the computer to perform the method of the first aspect described above.
Drawings
FIG. 1 illustrates a user interface diagram one of an electronic device, according to some embodiments of the present application;
FIG. 2 illustrates a user interface diagram two of an electronic device, according to some embodiments of the present application;
FIG. 3 illustrates a user interface diagram three of an electronic device, according to some embodiments of the present application;
FIG. 4 illustrates a user interface diagram four of an electronic device, according to some embodiments of the present application;
FIG. 5 illustrates a user interface diagram of an electronic device five, according to some embodiments of the present application;
FIG. 6 shows a user interface diagram six of an electronic device, according to some embodiments of the present application;
fig. 7 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 8 is a block diagram of a software structure of an electronic device according to an embodiment of the present disclosure;
FIG. 9 is a first flowchart illustrating a method for processing a strange number according to an embodiment of the present application;
FIG. 10 shows a user interface diagram seven of an electronic device, according to some embodiments of the present application;
FIG. 11 illustrates a user interface diagram eight of an electronic device, according to some embodiments of the present application;
FIG. 12 illustrates a user interface diagram nine of an electronic device, according to some embodiments of the present application;
FIG. 13 is a flowchart illustrating a second method for processing a strange number according to an embodiment of the present application;
FIG. 14 shows a user interface diagram ten of an electronic device, according to some embodiments of the present application;
FIG. 15 is a flow chart diagram of a strange number processing method provided by an embodiment of the present application;
FIG. 16 shows a user interface diagram eleven of an electronic device, according to some embodiments of the present application;
FIG. 17 shows a user interface diagram twelve of an electronic device, according to some embodiments of the present application;
FIG. 18 shows a user interface diagram thirteen of an electronic device, according to some embodiments of the present application;
FIG. 19 illustrates a block diagram of an electronic device provided by an embodiment of the present application;
fig. 20 shows a block diagram of a system on chip (SoC) provided by an embodiment of the present application.
Detailed Description
Hereinafter, specific embodiments of the present application will be described in detail with reference to the accompanying drawings.
The application provides a strange number processing method which can store the mapping relation between strange numbers in an application and the application, generate number mark information, automatically give information corresponding to a call record as a number mark after the call record of the strange numbers is generated, and facilitate finding in subsequent call back.
It should be noted that the strange numbers described in the present application refer to phone numbers that do not exist in a contact database of an electronic device (e.g., a mobile phone). Therefore, when a communication event (such as an incoming call, an outgoing call or a short message receiving and sending) occurs to the mobile phone, the strange number is displayed on the display interface of the mobile phone in the form of a string of numbers, and the display interface cannot prompt the user about the strange number, such as which contact person specifically corresponds.
Taking a mobile phone as an example, as shown in fig. 1 (a), the screen of the mobile phone is lighted, and after the screen of the mobile phone is lighted, the mobile phone will display a desktop. The desktop displays a plurality of Applications (APPs) installed on the mobile phone, such as APPs of a clock, a calendar, a memo, e-mail, a video call, Huanyi video, sports health, weather, a browser, smart life, a glory mall, a camera, an address book, a telephone, and information.
The operation of "lighting up" the screen of the mobile phone may be to unlock the mobile phone in the screen locking state (e.g., fingerprint unlocking), turn off the screen of the mobile phone in the screen locking state, and turn on the screen in the unlocking state, so as to light up the screen of the mobile phone.
Several scenes of displaying strange numbers on a display interface of a mobile phone APP will be described below with reference to the accompanying drawings, which generally include scenes of using APPs such as shopping APPs, traffic APPs, instant messaging APPs, note APPs, and intelligent service APPs.
Shopping APP means that a user can place a shopping order on the APP, and a contact way of a service person is generated in the order. Examples of the mobile phone APP used by the user are a glory mall, a jingdong mall, and a treasure house. Logistics information can be displayed in the shopping order, and the logistics information comprises an express company name, a courier contact way and the like. Wherein the courier contact address is an example of a strange number of the present application.
The traffic APP means that a user can place a traffic order on the traffic APP, and a contact way of a service person is generated in the order. The mobile phone APP used by the user is, for example, a dripping trip, a beauty team vehicle and the like. The traffic order displays traffic information, which includes driver name, driver contact information, etc. Where driver contact is an example of a strange number.
The instant messaging APP means that a user can send and receive text information with other users on the APP, and the text information can contain contacts, contact ways and the like. The mobile phone APP used by the user is, for example, WeChat application, short message application, and the like. Among them, the contact address transmitted in the text information is an example of the strange number.
Note type APPs refer to applications in which a user can record notes at any time, such as contact names, contact addresses of contacts, and the like. The mobile phone APP used by the user is, for example, a memo or the like. Where the contact details contained in the note are examples of strange numbers.
However, the application is not limited to this, and all scenes in which the display interface of the mobile phone APP can display an unfamiliar number belong to the protection scope of the application.
When the user uses the various mobile phone APPs, the user can jump to a dialing interface by clicking the strange number in the APP to contact the contact person (such as a courier, a driver and the like) corresponding to the strange number, so that the communication with the contact person corresponding to the strange number is realized. Or the user copies the telephone number in the APP and pastes the telephone number to the dialing interface; so as to realize the communication with the contact corresponding to the strange number.
And under each use scene, after the user finishes the communication with different strange numbers, the display interface of the telephone application displays a plurality of strings of strange numbers. Since these strange numbers do not exist in the contacts database of the handset. Therefore, it is difficult for the user to recognize the meaning of each strange number, and it is difficult to quickly find the correct number from a plurality of strange numbers. Therefore, the user experience is not good.
Therefore, the application provides a strange number processing method, which is used for acquiring the strange number from an application containing the strange number, storing the mapping relation between the strange number in the application and the application according to relevant data of the application and generating number mark information. When a communication event (such as an incoming call, an outgoing call, and the like) occurs with respect to the strange number by an application such as a telephone application or a short message application, the application such as the telephone application or the short message application displays number mark information. In addition, after the mobile phone generates the communication record with the strange number, the number marking information corresponding to the communication record is automatically given, so that the mobile phone can be conveniently found when communicating with the strange number again in the follow-up process. The following first introduces a scenario in which a user jumps to a dialing interface by clicking an strange number in an APP with reference to fig. 1. Illustratively, in the scenario shown in fig. 1, the mobile phone APP used by the user is a glory mall.
As shown in fig. 1 (a), a user wants to use a glory mall application, click on the glory mall with a finger; as shown in fig. 1 (b), the mobile phone starts the application of the glory mall, and displays order tracking information of a certain order of the user in the glory mall, such as the transportation status of the current express, the name of the express company (shunfeng express), the name of the courier (wang di), and the contact phone of the courier (138xxxxx 123). The contact phone (138xxxxx123) can be displayed in the Rough mall application interface in a form that can be clicked on by the user, for example, the contact phone is displayed in the Rough mall application interface in a hyperlink form, and the user can contact the courier by clicking on the courier's contact phone "138 xxxxx 123"; as shown in fig. 1 (c), the user enters the interface to be dialed after clicking the contact phone "138 xxxxx 123", and enters the dialing interface after clicking the dialing button of the interface to be dialed, as shown in fig. 1 (d).
In some possible embodiments, the user may directly enter the conventional dialing interface after clicking the contact phone, that is, directly enter the dialing interface shown in (d) of fig. 1, and skip the interface to be dialed shown in (c) of fig. 1. In addition, the interface to be dialed shown in fig. 1 (c) may have other forms, such as a list-type small interface that floats or pops up, and the present application is not limited specifically.
In the scenario shown in fig. 2, the mobile phone APP used by the user is an information application. In this scenario, the user may jump to the dial interface by clicking on an unfamiliar number in the information application.
As shown in fig. 2 (a), the user wants to view a new short message, and clicks the message application with a finger; as shown in fig. 2 (b), the mobile phone starts the message application and displays detailed text messages, for example, a message for receiving a courier is displayed, the message includes a courier name (century express), a courier code (49000792), a courier contact phone (187xxxxx456) and the like, and the user can contact the courier by clicking the courier contact phone "187 xxxxx 456"; as shown in fig. 2 (c), the user enters the interface to be dialed after clicking the contact phone "187 xxxxx 456", and enters the dialing interface after clicking the dialing button of the interface to be dialed, as shown in fig. 2 (d).
In addition, FIG. 3 shows a scenario where a user uses an intelligent assistant application (i.e., minus one screen). As shown in fig. 3 (a), the user slides to the right along the screen at the blank of the desktop screen of the mobile phone; as shown in fig. 3 (b), the mobile phone starts the intelligent assistant application, the intelligent assistant application displays a courier message with a single number of "61247248 … …", the courier message displays the name of the courier (zhangwu) and the contact phone of the courier (158xxxxx256), and the user can contact the courier-zhangwu by clicking the number "158 xxxxx 256"; as shown in fig. 3 (c), the user enters the interface to be dialed after clicking the contact phone "158 xxxxx 256", and enters the dialing interface after clicking the dialing button of the interface to be dialed, as shown in fig. 3 (d).
The following describes a scenario in which a user copies a phone number in APP and pastes the phone number to a dialing interface with reference to fig. 4. In the scenario shown in fig. 3, the cell phone APP used by the user is a memo.
As shown in fig. 4 (a), the user wants to inquire about a certain phone number recorded once through the memo application, and clicks the memo through a finger; as shown in fig. 4 (b), the mobile phone starts a memo application and displays a plurality of memo contents (6 memo contents are displayed in fig. 4 (b)), and the user clicks "memo content 1", for example; as shown in fig. 4 (c), "memo content 1" shows that the content recorded by the user is "lie four 185xxxxx 456", and the user can contact lie four by clicking the number "185 xxxxx 456"; as shown in fig. 4 (d), after the user clicks the number "185 xxxxx 456", a pop-up box related to the number "185 xxxxx 456" is skipped, and the user may select "copy to paste board" or "call" to perform an operation related to the number "185 xxxxx 456".
The user may select "copy to paste board" as an example. As shown in fig. 5 (a), the user pastes the number "185 xxxxx 456" to the interface to be dialed, and enters the interface to be dialed after clicking the paste, as shown in fig. 5 (b); after clicking the dial button of the interface to be dialed, the user enters the dial interface, as shown in (c) of fig. 5.
The interface to be dialed shown in each scene (the interface shown in (c) in fig. 1, the interface shown in (c) in fig. 2, the interface shown in (c) in fig. 3 and the interface shown in (b) in fig. 5) and the dialing interface (the interface shown in (d) in fig. 1, the interface shown in (d) in fig. 2, the interface shown in (d) in fig. 3 and the interface shown in (c) in fig. 5)) only display a string of numbers (strange numbers) and do not display other information capable of identifying and distinguishing or prompting the numbers.
As shown in fig. 6 (a), after the user completes the call of the courier corresponding to different strange numbers in each of the above-mentioned usage scenarios, the display interface of the telephone application displays a plurality of strange numbers. As shown in fig. 6 (b), these strange numbers do not exist in the contact database of the cell phone. Therefore, it is difficult for the user to distinguish the meaning of each strange number, for example, which number corresponds to which courier, which makes it difficult for the user to quickly call back the correct number when calling back. For example, when a user wants to contact a courier again, it is difficult to quickly find the correct number from a plurality of strange numbers.
According to the strange number processing method provided by the application, the strange number is acquired from the application containing the strange number, the mapping relation between the strange number in the application and the application is stored according to the relevant data of the application, and the number mark information is generated. When a communication event (for example, an incoming call, an outgoing call, or the like) occurs with respect to the strange number in an application such as a phone application or a short message application, number mark information is displayed on an interface of the application such as the phone application or the short message application as shown in fig. 10, 12, 14, and 16 to 18 to be described later. In addition, after the communication record with the strange number is generated, the mobile phone automatically gives the number mark information corresponding to the communication record, so that the mobile phone can be conveniently searched when communicating with the strange number again subsequently, and the experience of a user is improved.
In the scenarios shown in fig. 1 to 6, a cell phone is provided as an example of the body of the electronic device. However, the present application is not limited thereto, and the body of the electronic device may be an electronic device having an application installed therein, such as a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a handheld computer, a netbook, a Personal Digital Assistant (PDA), a wearable device, and a virtual reality device, and the phone number may be displayed in the application.
Fig. 7 shows a schematic structural diagram of an electronic device 100 according to an embodiment of the present application.
The structure of the mobile phone in the above embodiment may be the same as that of the electronic device 100. Specifically, the method comprises the following steps:
the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) connector 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a key 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identification Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present application does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
The processor can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, and a Subscriber Identity Module (SIM) interface.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The storage data area may store data (such as audio data, phone book, etc.) created during use of the electronic device 100, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like. The processor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor. In this embodiment, the internal memory 121 stores instructions, and when the instructions are executed by the processor 110, the electronic device 100 may execute the processing method for the strange number provided in the embodiment of the present application.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A can be of a wide variety, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a sensor comprising at least two parallel plates having an electrically conductive material. When a force acts on the pressure sensor 180A, the capacitance between the electrodes changes. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the intensity of the touch operation according to the pressure sensor 180A. The electronic apparatus 100 may also calculate the touched position from the detection signal of the pressure sensor 180A. In some embodiments, the touch operations that are applied to the same touch position but different touch operation intensities may correspond to different operation instructions. For example: and when the touch operation with the touch operation intensity smaller than the first pressure threshold value acts on the short message application icon, executing an instruction for viewing the short message. And when the touch operation with the touch operation intensity larger than or equal to the first pressure threshold value acts on the short message application icon, executing an instruction of newly building the short message.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device 100 is stationary. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 can utilize the collected fingerprint characteristics to unlock the fingerprint, access the application lock, photograph the fingerprint, answer an incoming call with the fingerprint, and so on.
The touch sensor 180K is also called a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device 100, different from the position of the display screen 194.
The software system of the electronic device 100 may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present invention uses an Android system with a layered architecture as an example to exemplarily illustrate a software structure of the electronic device 100.
Fig. 8 is a block diagram of a software configuration of the electronic device 100 according to the embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages.
As shown in fig. 8, the application package may include camera, calendar, sms, address book, phone, music, memo, gallery, weather, bluetooth, etc. applications.
In this embodiment of the application, the application package may further include a core application of an Android system, which is SystemUI. Generally, the SystemUI runs in the Android system in the form of an application, i.e., the compiling SystemUI module will produce an apk file. The source code path of the SystemUI is: frame/base/packages/system UI/, the installation path is: system/priv-app/-systemUI.
The SystemUI can be used to manage a plurality of modules, such as Status bar, Navigation bar, Notification panel, Recents, and Keyguard, displayed in the electronic device.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
The various modules in the SystemUI typically reside at the application framework level in the form of services at runtime. For example, while displaying the lock screen interface, the systemin ui may initiate the Keyguard service to display a notification message (e.g., an incoming call notification message, a short message notification message) in the lock screen interface. Upon displaying the notification bar, the systemin ui may initiate a system services to display the notification message in the notification bar.
As shown in FIG. 8, the application framework layer may include a window manager, content provider, view system, phone manager, resource manager, notification manager, sticker board manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the electronic device 100. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
A sticker board Manager (Clipboard Manager) mainly provides a copy or paste function inside an application program or between application programs. For example, after the memo application copies the above-mentioned number "185 xxxxx 456", pastes the number to the interface to be dialed of the phone application, and clicks the paste, the interface to be dialed of the phone application is entered.
Android Runtime includes a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The following describes in detail a method for processing an unfamiliar number, which is provided by an embodiment of the present application, by taking a mobile phone as an example of an electronic device and referring to the accompanying drawings, and obtains the unfamiliar number from an application containing the unfamiliar number, and stores a mapping relationship between the unfamiliar number in the application and the application according to related data of the application, and generates number mark information. When a communication event (such as an incoming call, an outgoing call, and the like) occurs with respect to the strange number by an application such as a telephone application or a short message application, the application such as the telephone application or the short message application displays number mark information. In addition, after the mobile phone generates the communication record with the strange number, the number marking information corresponding to the communication record is automatically given, so that the mobile phone can be conveniently found when communicating with the strange number again in the follow-up process.
Taking the scenarios shown in fig. 1 to fig. 6 as examples, the following describes in detail the execution process of the strange number processing method in the mobile phone system in combination with the interaction flow chart between the modules in the mobile phone system. The strange number processing method can trigger the mobile phone to generate number marking information for marking the association relation between the strange number and the application. And triggering the mobile phone to generate the number marking information comprises user operation triggering and application automatic triggering.
[ user operation trigger ]
As described above, when the user uses the various mobile phone APPs, in order to contact the contact corresponding to the strange number, the user may jump to the dialing interface by clicking the strange number in the APP, and the user may realize the call with the contact corresponding to the strange number by clicking the dialing button. Or the user copies the telephone number in the APP and pastes the telephone number to the dialing interface; and the user can realize the communication with the contact corresponding to the unfamiliar number by clicking the dialing button.
The operation of "clicking an unfamiliar number" and the operation of "copying and pasting an unfamiliar number" described above belong to the "user operation trigger" referred to in this application. Two user-operated triggering modes will be described separately below.
Example one
Fig. 9 is a schematic view showing an interaction flow between modules in a system when a mobile phone executes a method for processing an unknown number according to an embodiment of the present application. As shown in fig. 9, the modules inside the handset system include a glory mall application 200, a number marking module 300, and a phone application 400. In this embodiment, the user operation triggering manner is: click the strange number.
As shown in fig. 9, the process of the mobile phone executing the strange number processing method of the present application includes the following steps:
201: the glory mall application 200 detects a user's operation of clicking on a strange number.
Specifically, the touch screen of the mobile phone detects that the user clicks an unfamiliar number on the display interface of the glory mall application 200, generates a corresponding input event, and the input event is received and processed by the phone application 400.
The operation of the user clicking the strange number is, for example, the operation shown in fig. 1 (a) in which the user clicks the "138 xxxxx 123" of the party wai displayed on the order tracking interface of the glory mall application 200. The phone "138 xxxxx 123" belongs to a strange number.
The "click" is an operation for the phone "138 xxxxx 123" such as a single click, a double click, a triple click, or the like.
202: jumps to the telephony application 400.
The user may jump to the phone application 400 after clicking a strange number on the display of the glory mall application 200. At this time, the display interface of the mobile phone is the interface to be dialed shown in (c) of fig. 1 or directly enters the dialing interface shown in (d) of fig. 1.
203: the phone application 400 obtains the strange number, the glory mall application 200 name.
The above-mentioned click strange number jumps to the phone application 400, which itself carries the application's own package name (i.e., the glory mall application 200 package name), and triggers the phone application 400 to call the interface. The phone application 400 may query the application name and the strange number using the existing application framework layer interface through the package name, and the phone application 400 may read the application name and the strange number. Thus, the phone application 400 acquires the glory mall application 200 name and the strange number (e.g., the strange number "138 xxxxx 123" described above).
However, the phone Application 400 of the present Application is not limited to acquiring an unknown number and an Application name, and in some possible embodiments, the operating system of the mobile phone may open an API (Application Programming Interface), the phone Application 400 may call the API, and if the phone Application 400 and the honor mall Application 200 agree on parameters in advance, the phone Application 400 may also obtain richer information such as a contact name, a company name, and a phone category. For example, the phone application 400 may also obtain a name of a courier company (shunfeng courier), a name of a courier (wang di), an application icon, and the like as shown in fig. 1 (b).
Data such as an application name, a name of an express company, a name of a courier, and an application icon belong to the relevant data of the application 200 in the glory mall. Thus, when the user clicks a strange number to jump to the phone application 400, the phone application 400 may obtain the strange number displayed on the interface of the glory mall application 200 and related data of the glory mall application 200. And preparing data for generating the number marking information.
Illustratively, while the user dials the strange number "138 xxxxx 123", the phone application 400 obtains the strange number and the application's related data. Alternatively, in the process of the user calling the strange number "138 xxxxx 123", the phone application 400 acquires the strange number and the related data of the application. Alternatively, after the user completes the call with the strange number "138 xxxxx 123" and hangs up the call, the phone application 400 acquires the strange number and the related data of the application.
204: the phone application 400 writes the strange number, the glory mall application 200 name.
Illustratively, after the phone application 400 obtains the above-mentioned related information such as the strange number, the name of the glory mall application 200, and the like, the related information is written into the number marking module 300. The number tagging module 300 may be a stand-alone third party application or may be a sub-module of the telephony application 400.
205: the number marking module 300 generates number marking information.
After the phone application 400 writes the related information such as the strange number and the name of the glory mall application 200 into the number marking module 300, the number marking module 300 generates and stores the number marking information. The number marking information is used to identify the association of the strange number with the glory mall application 200. That is, the unfamiliar number, which has an identification, establishes a mapping relationship with the glory mall application 200, so that the user can be prompted to accurately recognize the unfamiliar number.
There may be multiple occasions when the phone application 400 obtains the relevant information such as the strange number, the name of the honor mall application 200, and the like, as described in step 203. Accordingly, the number mark information may be generated when the user first makes a communication event (outgoing call or short message transmission shown in fig. 1) with an unfamiliar number, for example, the user may have generated the number mark information when dialing the unfamiliar number for the first time. Alternatively, the number marking information may be generated by the user during the first communication event with the strange number. Alternatively, the number mark information may be generated after the user first makes a communication event (outgoing call or short message transmission shown in fig. 1) with an unfamiliar number and combines the communication event.
Illustratively, the number marking information includes a text or an icon, or a combination of a text and an icon. The icon is an icon of an application (e.g., an icon of a glory mall application 200), and the text includes any one or more of the following: the application name of the application program, the contact name corresponding to the strange number, the company name corresponding to the strange number and the like.
For example, the strange number "138 xxxxx 123" shown in fig. 1 (b) is from a glory mall application 200, the corresponding courier is wang di, and the courier company is a shun feng courier. The strange number "138 xxxxx 123" is labeled by the name of the glory mall application, the name of the courier, and the name of the courier company.
When the number of the strange numbers is multiple, the number marking module 300 generates multiple number marking information accordingly. One or more pieces of number tag information are stored in a number tag database. Illustratively, the number tag database is stored locally on the handset. In some possible implementations, the number tag database is cloud storage.
206: the phone application 400 detects the receipt of an incoming call to a strange number.
For example, the mobile phone may receive an incoming call with the strange number "138 xxxxx 123", and may trigger the phone application 400 to call the interface. The incoming call of the strange number detected by the phone application 400 may be an incoming call of the user with the strange number for the first time or an incoming call of the user with the strange number again.
207: the phone application 400 queries the number tag information.
The telephony application 400 calls an interface to instruct the number tagging module 300 to query the number tagging information. The number marking module 300 may compare the strange incoming call number "138 xxxxx 123" with the number in the number marking database stored locally, and if the comparison is successful, send number marking information to the phone application 400.
207: the phone displays the number indicia information.
After receiving the number marking information, the phone application 400 displays the number marking information of the strange incoming call number on the answering interface to remind the user. Illustratively, when the user receives the incoming call of the strange number for the first time or receives the incoming call of the strange number again, the number marking information of the strange incoming call number is displayed on the answering interface to remind the user.
In some possible implementations, the phone application 400 obtains the application name of the glory mall application. Thus, as shown in fig. 10 (a), a strange number "138 xxxxx 123" and a text prompt message "from a glory mall" are displayed on the listening interface of the phone application 400. Thus, the user can accurately discern that the strange number is from the glory mall application 200. That is, the interface shown in fig. 10 (a) prompts the source application name of the strange number "138 xxxxx 123".
However, the content displayed by the number mark information in the present application is not limited thereto, and is displayed correspondingly according to the relevant data of the application acquired by the phone application 400. For example, as shown in fig. 10 (b), the phone application 400 further obtains the name of the delivery company (shun feng delivery) and the name of the courier (wang di) displayed on the interface of the royal mall application, and accordingly, text prompt information of the strange number "138 xxxxx 123" and "wang di shun feng delivery from the royal mall" are displayed on the answering interface of the phone application 400.
Illustratively, the telephony application 400 described above obtains an icon for a glory mall application. Thus, as shown in fig. 10 (c), the strange number "138 xxxxx 123" and the icon prompt information of the glory mall are displayed on the listening interface of the phone application 400. Alternatively, in some possible embodiments, the phone application 400 obtains the application icon and also obtains the name of the courier company (shun feng courier) and the name of the courier (wang di) displayed on the interface of the glory mall application, and accordingly, the answer interface of the phone application 400 displays the text prompt information of the strange numbers "138 xxxxx 123", "wang di shun feng courier" and the icon prompt information of the glory mall.
After the user completes the call with the strange number "138 xxxxx 123" and hangs up, the call log interface of the phone application 400 displays the number label information of the strange number "138 xxxxx 123". For example, referring to fig. 12 (a), the call log list is displayed in the fourth row from top to bottom: point 08, point 02, the user has finished talking to the strange number "138 xxxxx 123" and the number label information is displayed: "Shunfeng express delivery comes from a glory mall".
In step 206, the communication event of the phone application 400 is: and receiving an incoming call of the strange number. But the communication event is not limited to this, and in some possible embodiments, the communication event that occurs by the phone application 400 may also be: and calling the unfamiliar number. As shown in fig. 12 (a), when the user contacts the shun-feng courier who sends a product in honor mall again after completing the call with the strange number "138 xxxxx 123", it can be accurately recognized that the contact way of the courier is the strange number "138 xxxxx 123" according to the number marking information, and thus, the courier corresponding to the strange number "138 xxxxx 123" can be called again by clicking the strange number "138 xxxxx 123". Also, the dial interface shown in fig. 12 (b) displays number label information of the strange number "138 xxxxx 123": "Shunfeng express delivery comes from a glory mall". Thereby obtaining good use experience.
In some possible embodiments, the communication event may also be the sending and receiving of a short message by an information application. For example, after the number marking information is generated, when the information application sends and receives a short message, the number marking information is queried (refer to the related description of step 207), that is, the information application sends a command for querying the number marking information to the number marking module 300. After the number marking module 300 successfully compares the number marking information, the number marking module sends the marking information to the information application, and after the information application receives the number marking information, the number marking information is displayed in the information list. For example, as shown in fig. 11 (a), the information list display of the information application: 2021/07/02 receives a message from strange number "138 xxxxx 123", and displays the number mark information of strange number "138 xxxxx 123": "from a glory mall". Therefore, the user can accurately identify which number the short message is sent from, and good use experience is obtained.
Also, as described above, the number mark information may display different prompt information according to the information about the application acquired by the phone application 400. For example, as shown in fig. 11 (b), the information list of the information application displays number mark information of a strange number "138 xxxxx 123": "Wang Er shun Feng express from Rong Yao Shang City". Therefore, the user can accurately identify that the short message is sent by the Shunfeng courier Wang-Shuangfeng courier of the goods delivered to the glory shopping mall, and good use experience is obtained.
In addition, in the above step 201, the operation of clicking the strange number by the user is completed on the interface of the glory mall application 200. The application is not limited to the above, and the user may click a strange number on an interface of other applications (any one of the above shopping APP, the traffic APP, the instant messaging APP, the note APP, the intelligent service APP, and the like). For example, the operation of clicking the strange number by the user is completed on the interface of the short message application, i.e. the scenario shown in fig. 2. Thus, when the phone application 400 or the sms application or other applications have the above-mentioned communication event, the number mark information is displayed on the interface thereof. For example, (c) in fig. 11 shows that a strange number "187 xxxxx 456" and number label information are displayed on the listening interface of the phone application 400: "century express delivery comes from: short message ". Alternatively, in some possible embodiments, the information list of the information application displays: 2021/07/02 receives a short message from the strange number "187 xxxxx 456", and displays the number label information of the strange number "187 xxxxx 456": "century express delivery comes from: short message ".
In conclusion, the user triggers the mobile phone to generate number marking information by clicking the strange number of the application. When communication events occur in applications such as the telephone application 400 and the short message application, number marking information is displayed on interfaces (interfaces such as a call interface, a call record interface, a dialing interface and a short message list) of the applications, so that a user can identify the strange number, and the APP use experience of the user is improved.
Example two
Fig. 13 is a schematic view showing an interaction flow between modules in a system when a mobile phone executes a method for processing an unknown number according to an embodiment of the present application. As shown in fig. 13, each module inside the mobile phone system includes a memo application 500, a sticker sheet 600, a number marking module 300, and a phone application 400. In this embodiment, the user operation triggering manner is: and copying and pasting the strange number.
As shown in fig. 13, the process of the mobile phone executing the strange number processing method of the present application includes the following steps:
301: the memo application 500 detects an operation of the user to copy a strange number.
Specifically, the touch screen of the mobile phone detects an operation of the user to copy a strange number on the interface of the memo application 500, generates a corresponding input event, and the input event is received and processed by the phone application 400. Referring to the operation shown in fig. 4 (d), for example, after the user clicks the number "185 xxxxx 456", a pop-up box related to the number "185 xxxxx 456" is skipped, and the user may select "copy to the sticker sheet 600" to complete the operation of copying the strange number "185 xxxxx 456". The phone "185 xxxxx 456" belongs to a strange number.
Illustratively, the sticker board 600 architecture of the operating system stored in the memory of the cell phone includes a ClipboardManager, ClipData. Wherein the ClipboardManager is a sticker 600 (also called a CLIPBOARD) of the global system of the mobile phone, and can be obtained through a function getsysteservice (CLIPBOARD _ SERVICE), and the mobile phone manages the copying or pasting of data between two application programs or inside the application programs, for example, manages the copying and pasting of data between the memo application 500 and the phone application 400 through the ClipboardManager.
The sticky-pad 600 has only one Clip data object at a time, and when another Clip object is acquired, the previous Clip object is not stored in the sticky-pad 600. One Clip object may contain one or more.
The Clip description object contains metadata (Clip metadata) related to a Clip. Adding an Item to a Clip object can be realized by a function addItem (Clip data.
Item, i.e., a data type (data item) in the sticker board 600, the data type may contain text, Uniform Resource Identifier (URI), or Intent. Item objects can be added to one Clip, so that a user can copy a plurality of selected contents to the same Clip; for example, if there is a list Widget that allows the user to select multiple options at a time, all the selected options can be copied to the sticker board 600 at a time. For example, "li four" and "185 xxxxx 456" as shown in fig. 4 (d) can be copied to the pasting board 600 at a time.
302: obtain the strange number, memo application 500 name.
When the user selects "copy to sticker sheet 600", sticker sheet 600 of the mobile phone automatically records the copied contents together with the currently applied packet name (i.e., the packet name of memo application 500). The operation itself carries the application's own package name (i.e., the package name of the memo application 500) and triggers the sticker 600 to call the interface.
303: and pasting a strange number.
Illustratively, the user puts the ClipData object into the sticker board 600 of the ClipboardManager by the memo application 500 when the memo application 500 copies the strange number "185 xxxxx 456"; when the telephone application 400 pastes the strange number "185 xxxxx 456", the telephone application 400 acquires the ClipData object from the sticker board 600, reads the Multipurpose Internet Mail Extensions (MIME) type thereof from the ClipDescription object, and reads data from the ClipData.
304: the phone application 400 reads the sticker sheet 600.
Pasting the strange number "185 xxxxx 456" from the sticker sheet 600 to the phone application 400 triggers the phone application 400 to call an interface. The phone application 400 can query the application name and the strange number through the package name by using the existing application program framework layer interface, and the related information of the memo application 500 such as the application name and the strange number can be read by the phone application 400.
Thus as shown in step 305: the phone application 400 obtains the strange number "185 xxxxx 456", and also obtains the package name (i.e., the memo application 500 name) from the system clipboard from which the application originated.
Also, as mentioned above, the phone Application 400 of the present Application is not limited to acquiring an unknown number and an Application name, and in some possible embodiments, the operating system of the mobile phone may open an API (Application Programming Interface), the phone Application 400 may call the API, and if the phone Application 400 and the sticker sheet 600 agree on parameters in advance, the phone Application 400 may further obtain richer information such as a contact name, a company name, and a phone category. See the previous description of step 203.
After the related information such as the unfamiliar number, the name of the memo application 500, and the like is obtained in the above step 305, a process of generating number mark information is performed. Specifically, step 306 and step 307 correspond to step 204 and step 205 of the foregoing embodiment, respectively. The difference between step 306 and step 204 is that the relevant information of the application is different (the relevant information about the memo application 500 is written in step 306), and the rest is the same. Accordingly, step 307 differs from step 205 in that step 307 generates an association identifying the strange number and the memo application 500, the rest being the same. Specifically, refer to the related descriptions of step 204 and step 205, which are not described herein again.
Further, the process of displaying number stamp information by the phone application 400 shown in fig. 13 includes steps 308 to 311, which is also the same as the process of displaying number stamp information by the phone application 400 in the first embodiment described above (steps 206 to 209). Specifically, reference may be made to the related descriptions of step 206 to step 209 in the first embodiment, which are not described herein again.
Illustratively, as shown in fig. 14 (a), a text prompt message of a strange number "185 xxxxx 456" and "li-si from memo" is displayed on the listening interface of the phone application 400. Thus, the user can accurately recognize that the strange number is from the memo application 500. When the number label shows "lie four from: when the memo "indicates a message, the message" copy to the sticker sheet 600 "indicates that" Liqu "and the strange number" 185xxxxx456 "are copied. In some possible embodiments, the "copy to paste board 600" just copies the strange number "185 xxxxx 456". Thus, the strange numbers "185 xxxxx 456" and "from: the text prompt information of the memorandum.
Similarly, in the present embodiment, the number mark information is not limited to the text prompt information as described in the foregoing embodiments, but may be icon prompt information or a combination of the two.
Further, the application is also not limited to the memo application 500, and is, for example, an application in which other numbers can be copied, such as an application for short message, WeChat, or the like. Illustratively, the operation of copying the strange number by the user is completed on an interface of the short message application. For example, (b) in fig. 11 shows that a strange number "187 xxxxx 456" and number label information are displayed on the listening interface of the phone application 400: "is derived from: short message ".
In conclusion, the user triggers the mobile phone to generate number marking information through the operation of copying and pasting the strange number of the application. When a communication event occurs in applications such as the phone application 400 and the short message application, number marking information is displayed on interfaces (interfaces such as a call interface, a call record interface, a dialing interface and a short message list) of the applications, so that a user can identify the strange number and prompt the user of APP use experience.
[ application triggering ]
The first embodiment and the second embodiment describe that the user operation triggers the mobile phone to generate number marking information so as to prompt the user about the strange number when a communication event occurs on the mobile phone. The application triggering means that after the mobile phone application detects that text information containing strange numbers is generated in the application without the triggering operation of a user, the system automatically generates number marking information. The user can be prompted with the relevant information about the unfamiliar number when the mobile phone has a communication event without perception. The application may refer to a system application (e.g., a cell phone housekeeper) preset by a cell phone system or an application installed on a cell phone by a user. The specific process is described in the third embodiment.
EXAMPLE III
Fig. 15 is a schematic view showing an interaction flow between modules in a system when a mobile phone executes a method for processing an unknown number according to an embodiment of the present application. As shown in fig. 15, the modules inside the mobile phone system include an intelligent assistant 700, a keyword extraction module 800, a number marking module 300, and a phone application 400.
As shown in fig. 15, the process of the mobile phone executing the strange number processing method of the present application includes the following steps:
401: the generation of text information containing strange numbers is detected.
Specifically, as shown in the scenario of fig. 3 (b), the intelligent assistant 700 displays a courier message with a single number "61247248 … …", which shows the name of the courier (zhang wu) and the contact phone of the courier (158xxxxx 256). Wherein, "[ shanghai city ] xuhui hu south courier: zhang Wu 158xxxxx256 is giving you a "text message belonging to the wisdom assistant 700 containing the strange number" 158xxxxx256 ".
Illustratively, the mobile phone system detects the text message containing the strange number "158 xxxxx 256" generated in the intelligent assistant 700. Alternatively, in some possible embodiments the smart assistant 700 itself detects that the above-mentioned text message containing the strange number "158 xxxxx 256" is generated. Alternatively, the other three-party application detects the text message containing the strange number "158 xxxxx 256" generated in the intelligent assistant 700.
402: and sending the text information.
The intelligent assistant 700 sends the text information content containing the strange number to the keyword extraction module 800, and the keyword extraction module 800 may be used as a stand-alone application or as a sub-module of other applications (such as the intelligent assistant 700, the short message application or the phone application 400). Illustratively, the keyword extraction module 800 is a cell phone steward as one example of a standalone application.
403: and acquiring a strange number and an application name of the intelligent assistant 700.
An Application Programming Interface (API) may be opened by an operating system of the mobile phone, and the keyword extraction module 800 may call the API Interface, and send the unfamiliar number or the identification name of the smart assistant 700 to the keyword extraction module 800.
Illustratively, the keyword extraction module 800 may extract strange numbers from the text information according to preset keyword extraction rules, and may further extract information such as a name of a courier, a name of a courier company, and the like.
The implementation method for the keyword extraction module 800 to acquire the strange number includes, but is not limited to, the following forms:
1. directly matching the number, the name of the courier and the name of the express company in the text by using the existing short message template, such as a short message template of the express company; for example, if the short message template of the express company is "dispatcher xx phone xx", the text information is matched according to the short message template: "[ Shanghai City ] Xuhui Hunan Party: zhang Wu 158xxxxx256 is giving your part, "get strange number" 158xxxxx256 ", and the person giving your part is" Zhang Wu.
2. Extracting numbers by using a regular expression in a manner of matching a mobile phone number format and a fixed phone number format; matching the parenthesis characters, and extracting the content in the parenthesis as marking information; characters such as 'delivery person XX', 'XX telephone' and the like are matched, and names of couriers and express companies are extracted. The above text information is matched, for example, using a regular expression: "[ Shanghai City ] Xuhui Hunan Party: zhang Wu 158xxxxx256 is giving you the characters "quick courier XX", "XX phone", etc. the number of strangers is "158 xxxxx 256", and the courier is "Zhang Wu".
3. And extracting key information such as numbers and the like by using the existing natural language analysis algorithm.
In some possible embodiments, a tag information editing function may be additionally provided. The user can edit the content as the mark information to store in the number mark database.
After acquiring the strange number, the application name of the intelligent assistant 700, and other relevant information, the keyword extraction module 800 writes the information into the number marking module 300 to perform a process of generating number marking information. Specifically, step 404 and step 405 correspond to step 204 and step 205 of the foregoing embodiment, respectively. Step 404 is different from step 204 in that the relevant information of the application is different (the relevant information about the intelligent assistant 700 is written in step 404), and the rest is the same. Accordingly, step 405 differs from step 205 in that step 405 generates an association identifying the unfamiliar number and the intelligent assistant 700, the rest being the same. Specifically, refer to the related descriptions of step 204 and step 205, which are not described herein again.
Further, the process of displaying the number mark information by the phone application 400 shown in fig. 15 includes steps 406 to 409, which is also the same as the process of displaying the number mark information by the phone application 400 in the first embodiment described above (steps 206 to 209). Specifically, reference may be made to the related descriptions of step 206 to step 209 in the first embodiment, which are not described herein again.
Illustratively, as shown in fig. 16 (a), the strange numbers "187 xxxxx 456" and "zhangwu from: the intelligent assistant 700 "prompts information with text. Thus, the user can accurately recognize that the strange number is from the intelligent assistant 700.
Similarly, in the present embodiment, the number mark information is not limited to the text prompt information as described in the foregoing embodiments, but may be icon prompt information or a combination of the two.
In addition, the application is not limited to the intelligent assistant 700, such as other applications capable of generating text information containing strange numbers, such as short messages, WeChat applications, and the like. For example, in the scenario shown in fig. 2, the short message application receives a short message text message for taking a courier, where the text message includes a courier company name (century courier), a pickup code (49000792), a courier contact phone (187xxxxx456), and the like. The keyword extraction module 800 extracts the strange number "187 xxxxx 456" and the name of the delivery company (century express), and generates number label information about the strange number "187 xxxxx 456". Illustratively, the short message application automatically sends the text message to the keyword extraction module 800, or the keyword extraction module 00 automatically monitors the generation of the text message and extracts strange numbers in the text message. Fig. 16 (b) shows that the strange number "187 xxxxx 456" and the number label information are displayed on the listening interface of the phone application 400: "century express delivery comes from: short message ".
In addition, the communication event is not limited to an incoming call, and the communication event can also be a communication event such as an outgoing call of a short message or a strange number sent and received by an information application. Illustratively, the dialing interface shown in fig. 17 (a) also displays number label information of the strange number "187 xxxxx 456": "the century express zhang wuge comes from: the intelligent assistant 700 ". Alternatively, as shown in fig. 17 (b), the information list display of the information application: 2021/07/02 receives a short message from the strange number "187 xxxxx 456", and displays the number label information of the strange number "187 xxxxx 456": "the century express zhang wuge comes from: the intelligent assistant 700 ". Therefore, the user can accurately identify which number the short message is sent from, and the user experience is good.
In summary, in this embodiment, a user does not need to perform a trigger operation, and after the mobile phone system detects that text information including an unfamiliar number is generated in the application, the system automatically generates number marking information. The user can be prompted with the relevant information about the unfamiliar number when the mobile phone has a communication event without perception.
As described in the above embodiments, the present application may prompt the user about the characteristics of the unfamiliar number by generating number label information about the unfamiliar number and the application. Illustratively, after the user hangs up the call with the corresponding strange number, the number mark information is displayed on the call log of the phone application 400. For example, as shown in fig. 18 (a), the call log list of the phone application 400 displays four lines of number mark information, respectively, from top to bottom. Wherein the first row displays: 15 minutes ago, the user completed the call with the strange number "158 xxxxx 256", and the number mark information is displayed: "Zhang Wu Ge from: the intelligent assistant 700 ". The second row shows: point 08, point 40, the user has finished the call with the strange number "187 xxxxx 456", and number label information is displayed: "century express delivery comes from: short message ". The third row shows: 09 point 03, the user has completed the call with the strange number "185 xxxxx 456", and number mark information is displayed: "Liquan comes from: memorandum ". The fourth row shows: point 08, point 02, the user has finished talking to the strange number "138 xxxxx 123" and the number label information is displayed: "Shunfeng express delivery comes from a glory mall".
In some possible embodiments, this number tagging information about strange numbers is not stored in the contacts database of the handset. As shown in fig. 18 (b), four lines of number mark information from top to bottom shown in fig. 18 (a) are not displayed on the contact list of the mobile phone.
In some possible embodiments, the above process of generating number marking information about an unfamiliar number may further be combined with the cloud number marking information to provide richer marking information for the unfamiliar number. For example, the mobile phone may interact with the cloud, for example, report information of the incoming call number, where the information may be an identity, a home location, whether the incoming call number is a fraud number, a promotion number, and the like, and the information may be marked or edited by the user. The cloud end can collect and store information of the unfamiliar calls reported by the mobile terminals, and can also send the stored information to each mobile terminal, so that each mobile terminal can share the information of other mobile terminals. When the mobile phone receives an unfamiliar call, particularly in the condition that the unfamiliar number is marked by other terminal equipment, the mobile phone can display the information that the unfamiliar number is marked, for example, the unfamiliar number is marked as an advertising promotion telephone by most people, and therefore when the user receives the unfamiliar call, the mobile phone can remind the user.
In conclusion, the method for processing the unfamiliar number integrates the existing information (from short messages, shopping applications, life service applications and other applications) in the mobile phone, interacts with the telephone applications, the short message applications and other applications, enriches the sources of unfamiliar number marking information, ensures the accuracy of the information, and ensures the privacy of the user without networking.
Compared with the traditional yellow page type number marking mode, the method has the following advantages:
1. the number range is expanded, so that some strange numbers used in a small range can be marked.
2. The strange number marking process is completed locally at the terminal, and the data security is ensured without depending on a network.
3. The known number which is not stored as the contact can be displayed and displayed on interfaces such as a call interface, a call record interface, a dialing interface, a short message list and the like, and the user experience is obviously improved.
Referring now to FIG. 19, shown is a block diagram of an electronic device 400 in accordance with one embodiment of the present application. The electronic device 400 may include one or more processors 401 coupled to a controller hub 403. For at least one embodiment, the controller hub 403 communicates with the processor 401 via a multi-drop Bus such as a Front Side Bus (FSB), a point-to-point interface such as a QuickPath Interconnect (QPI), or similar connection 406. Processor 401 executes instructions that control general types of data processing operations. In one embodiment, the Controller Hub 403 includes, but is not limited to, a Graphics Memory Controller Hub (GMCH) (not shown) and an Input/Output Hub (IOH) (which may be on separate chips) (not shown), where the GMCH includes a Memory and a Graphics Controller and is coupled to the IOH.
The electronic device 400 may also include a coprocessor 402 and memory 404 coupled to the controller hub 403. Alternatively, one or both of the memory and GMCH may be integrated within the processor (as described herein), with the memory 404 and coprocessor 402 coupled directly to the processor 401 and controller hub 403, with the controller hub 403 and IOH in a single chip.
The Memory 404 may be, for example, a Dynamic Random Access Memory (DRAM), a Phase Change Memory (PCM), or a combination of the two. Memory 404 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions therein. A computer-readable storage medium has stored therein instructions, and in particular, temporary and permanent copies of the instructions. The instructions may include: instructions that, when executed by at least one of the processors, cause the electronic device 400 to implement the methods shown in fig. 9, 13, and 15. The instructions, when executed on a computer, cause the computer to perform the methods disclosed in any one or combination of the embodiments above.
In one embodiment, the coprocessor 402 is a special-purpose processor, such as, for example, a high-throughput MIC (man Integrated Core) processor, a network or communication processor, compression engine, graphics processor, GPGPU (General-purpose computing on graphics processing unit), embedded processor, or the like. The optional nature of coprocessor 402 is represented in FIG. 19 by dashed lines.
In one embodiment, the electronic device 400 may further include a Network Interface Controller (NIC) 406. Network interface 406 may include a transceiver to provide a radio interface for electronic device 400 to communicate with any other suitable device (e.g., front end module, antenna, etc.). In various embodiments, the network interface 406 may be integrated with other components of the electronic device 400. The network interface 406 may implement the functions of the communication unit in the above-described embodiments.
The electronic device 400 may further include an Input/Output (I/O) device 405. I/O405 may include: a user interface designed to enable a user to interact with the electronic device 400; the design of the peripheral component interface enables peripheral components to also interact with the electronic device 400; and/or sensors are designed to determine environmental conditions and/or location information associated with electronic device 400.
It is noted that fig. 19 is merely exemplary. That is, although fig. 19 shows that the electronic device 400 includes a plurality of devices, such as a processor 401, a controller hub 403, a memory 404, etc., in practical applications, the device using the methods of the present application may include only a part of the devices of the electronic device 400, for example, may include only the processor 401 and the network interface 406. The nature of the alternative device in fig. 19 is shown in dashed lines.
Referring now to fig. 20, shown is a block diagram of a SoC (System on Chip) 500 in accordance with an embodiment of the present application. In fig. 20, like parts have the same reference numerals. In addition, the dashed box is an optional feature of more advanced socs. In fig. 20, the SoC500 includes: an interconnect unit 550 coupled to the processor 510; a system agent unit 580; a bus controller unit 590; an integrated memory controller unit 540; a set or one or more coprocessors 520 which may include integrated graphics logic, an image processor, an audio processor, and a video processor; a Static Random-Access Memory (SRAM) unit 530; a Direct Memory Access (DMA) unit 560. In one embodiment, coprocessor 520 comprises a special-purpose processor, such as, for example, a network or communication processor, compression engine, GPGPU (General-purpose computing on graphics processing units, General-purpose computing on a graphics processing unit), high-throughput MIC processor, or embedded processor, among others.
Static Random Access Memory (SRAM) unit 530 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions. A computer-readable storage medium has stored therein instructions, and in particular, temporary and permanent copies of the instructions. The instructions may include: instructions that when executed by at least one of the processors cause the SoC to implement the method as shown in fig. 9, 13, and 15. The instructions, when executed on a computer, cause the computer to perform the methods disclosed in the embodiments described above.
The method embodiments of the present application may be implemented in software, magnetic, firmware, etc.
Program code may be applied to input instructions to perform the functions described herein and generate output information. The output information may be applied to one or more output devices in a known manner. For purposes of this application, a processing system includes any system having a Processor such as, for example, a Digital Signal Processor (DSP), a microcontroller, an Application Specific Integrated Circuit (ASIC), or a microprocessor.
The program code may be implemented in a high level procedural or object oriented programming language to communicate with a processing system. The program code can also be implemented in assembly or machine language, if desired. Indeed, the mechanisms described herein are not limited in scope to any particular programming language. In any case, the language may be a compiled or interpreted language.
One or more aspects of at least one embodiment may be implemented by representative instructions stored on a computer-readable storage medium, which represent various logic in a processor, which when read by a machine causes the machine to fabricate logic to perform the techniques herein. These representations, known as "IP (Intellectual Property) cores," may be stored on a tangible computer-readable storage medium and provided to a number of customers or production facilities to load into the manufacturing machines that actually manufacture the logic or processors.
In some cases, an instruction converter may be used to convert instructions from a source instruction set to a target instruction set. For example, the instruction converter may transform (e.g., using a static binary transform, a dynamic binary transform including dynamic compilation), morph, emulate, or otherwise convert the instruction into one or more other instructions to be processed by the core. The instruction converter may be implemented in software, hardware, firmware, or a combination thereof. The instruction converter may be on the processor, off-processor, or partially on and partially off-processor.

Claims (22)

1. A strange number processing method is applied to electronic equipment provided with a first application program and a second application program; characterized in that the method comprises:
obtaining an unfamiliar number from the first application, the unfamiliar number being for a communication event and not present in a contacts database of the electronic device;
generating and storing number marking information for the unfamiliar number according to the related data of the first application program, wherein the number marking information is used for identifying the incidence relation between the unfamiliar number and the first application program;
and detecting that a communication event relative to the unfamiliar number occurs in the second application program, and displaying the number marking information in an interface of the second application program.
2. The processing method of claim 1, wherein the obtaining the strange number from the first application comprises:
detecting a first operation from a user for an unfamiliar number displayed in an interface of the first application program;
and responding to the first operation, and acquiring the unfamiliar number from the first application program.
3. The processing method of claim 2, wherein said obtaining the strange number from the first application in response to the first operation comprises: the second application program responds to the first operation and acquires the strange number from the first application program.
4. The processing method according to claim 2 or 3, wherein the first operation performed on the strange number displayed in the interface of the first application program comprises: clicking the unfamiliar number and jumping to the second application program.
5. The processing method according to claim 2 or 3, wherein the first operation performed on the strange number displayed in the interface of the first application program comprises: the strange number is copied and pasted to the second application.
6. The processing method of claim 1, wherein the obtaining the strange number from the first application comprises:
detecting that the first application program generates text information, wherein the text information comprises the unfamiliar number;
and extracting the unfamiliar number from the text information according to a preset keyword extraction rule.
7. The processing method of claim 6, wherein the extracting the unfamiliar number from the text information according to a preset keyword extraction rule comprises: and the first application program or the second application program extracts the unfamiliar number from the text information according to the preset keyword extraction rule.
8. The processing method of claim 1, wherein the obtaining of the strange number from the first application comprises: and extracting the unfamiliar number from the text information generated by the first application program according to a preset keyword extraction rule by using a third application program installed in the electronic equipment.
9. The processing method according to any one of claims 6 to 8, wherein the preset keyword extraction rule comprises: short message templates, regular expressions or natural language analysis algorithms.
10. The processing method according to any one of claims 1 to 9, characterized in that the strange number is acquired from the first application while acquiring data related to the first application.
11. The processing method of claim 10, wherein said obtaining data related to the first application comprises: and acquiring related data of the first application program by using the second application program.
12. The processing method of claim 10, wherein said obtaining data related to the first application comprises: and acquiring related data of the first application program by utilizing a third application program installed in the electronic equipment.
13. A process according to any one of claims 10 to 12 in which the relevant data for the first application comprises any one or a combination of: the application name of the first application program, the contact name corresponding to the unfamiliar number, and the company name corresponding to the unfamiliar number.
14. The processing method according to any one of claims 1 to 13, wherein the generating and saving number marking information for the strange number according to the data related to the first application comprises:
and generating and storing number marking information for the unfamiliar number by using the first application program or the second application program according to the related data of the first application program.
15. The processing method according to any one of claims 1 to 13, wherein the generating and saving number marking information for the strange number according to the data related to the first application comprises:
and generating and storing number marking information for the unfamiliar number according to the related data of the first application program by using a third application program installed in the electronic equipment.
16. The processing method according to any one of claims 1 to 15, wherein the number marking information includes a text or an icon, the icon is an icon of the first application program, and the text includes any one or a combination of more than one of: the application name of the first application program, the contact name corresponding to the unfamiliar number, and the company name corresponding to the unfamiliar number.
17. The processing method of any of claims 1 to 16, wherein the detecting that the second application has a communication event with respect to the unfamiliar number displays the number label information in an interface of the second application, including:
detecting that a communication event relative to the unfamiliar number occurs to the second application;
and querying the number marking information by using the second application program, determining that the unfamiliar number is matched with an unfamiliar number in the number marking information, and displaying the number marking information in an interface of the second application program.
18. The processing method of any one of claims 1 to 16, wherein the detecting that the second application program has a communication event with the unfamiliar number displays the number mark information in an interface of the second application program, including:
and querying the number marking information by using a third application program installed in the electronic equipment, determining that the unfamiliar number is matched with an unfamiliar number in the number marking information, sending the number marking information to the second application program by using the third application program, and displaying the number marking information in an interface of the second application program.
19. The process of any one of claims 1 to 18, wherein the first application comprises a shopping-type application, a transportation-type application, an instant messaging-type, a note-type application, or a smart services-type application.
20. The processing method of any one of claims 1 to 18, wherein the second application program comprises a telephone application or a text messaging application.
21. The processing method according to any of the claims 1 to 18, wherein the communication event comprises: an incoming communication event, an outgoing communication event, a receiving short message communication event, and a sending short message communication event.
22. A computer-readable storage medium having stored thereon instructions that, when executed on a computer, cause the computer to perform the processing method of any one of claims 1 to 21.
CN202110777286.4A 2021-07-09 2021-07-09 Strange number processing method and computer-readable storage medium Active CN113612886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110777286.4A CN113612886B (en) 2021-07-09 2021-07-09 Strange number processing method and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110777286.4A CN113612886B (en) 2021-07-09 2021-07-09 Strange number processing method and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN113612886A true CN113612886A (en) 2021-11-05
CN113612886B CN113612886B (en) 2023-04-11

Family

ID=78304272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110777286.4A Active CN113612886B (en) 2021-07-09 2021-07-09 Strange number processing method and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN113612886B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116881481A (en) * 2022-01-20 2023-10-13 华为技术有限公司 Pre-caching method, user interface and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104836924A (en) * 2015-03-31 2015-08-12 小米科技有限责任公司 Number marking method and device
CN105376419A (en) * 2015-12-18 2016-03-02 广州三星通信技术研究有限公司 Method and equipment for performing telephone communication in electronic terminal
CN105472581A (en) * 2015-11-19 2016-04-06 珠海市小源科技有限公司 Temporary address book setting method and apparatus
CN106101464A (en) * 2016-05-26 2016-11-09 北京小米移动软件有限公司 Number mark method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104836924A (en) * 2015-03-31 2015-08-12 小米科技有限责任公司 Number marking method and device
CN105472581A (en) * 2015-11-19 2016-04-06 珠海市小源科技有限公司 Temporary address book setting method and apparatus
CN105376419A (en) * 2015-12-18 2016-03-02 广州三星通信技术研究有限公司 Method and equipment for performing telephone communication in electronic terminal
CN106101464A (en) * 2016-05-26 2016-11-09 北京小米移动软件有限公司 Number mark method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116881481A (en) * 2022-01-20 2023-10-13 华为技术有限公司 Pre-caching method, user interface and electronic equipment

Also Published As

Publication number Publication date
CN113612886B (en) 2023-04-11

Similar Documents

Publication Publication Date Title
WO2020211709A1 (en) Method and electronic apparatus for adding annotation
CN110286976B (en) Interface display method, device, terminal and storage medium
US20220075518A1 (en) Fast Data Copying Method and Electronic Device
CN114466102B (en) Method for displaying application interface, related device and traffic information display system
CN114816167B (en) Application icon display method, electronic device and readable storage medium
WO2020259554A1 (en) Learning-based keyword search method, and electronic device
CN109981881B (en) Image classification method and electronic equipment
CN111881315A (en) Image information input method, electronic device, and computer-readable storage medium
US20230418630A1 (en) Operation sequence adding method, electronic device, and system
CN113612886B (en) Strange number processing method and computer-readable storage medium
CN112835495B (en) Method and device for opening application program and terminal equipment
CN109684022A (en) Word input processing method, device and electronic equipment
US20210405767A1 (en) Input Method Candidate Content Recommendation Method and Electronic Device
CN115016704A (en) Express delivery prompting method and electronic equipment
CN111949350A (en) Interface display method and equipment
CN115033318B (en) Character recognition method for image, electronic device and storage medium
CN114020197B (en) Cross-application message processing method, electronic device and readable storage medium
CN106469178B (en) Information processing method, terminal and electronic equipment
CN115097993A (en) Express delivery prompting method and electronic equipment
CN113467961A (en) Copy and paste method, electronic equipment and system
CN116033064B (en) Card display method, electronic device and readable storage medium
CN117176850B (en) Interface display method and related device
CN117273687B (en) Card punching recommendation method and electronic equipment
CN116069219B (en) Method for acquiring schedule information and electronic equipment
CN116709339A (en) Detection method of application notification message and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant