CN113905134A - Address list blacklist management method, system, equipment and medium based on block chain - Google Patents

Address list blacklist management method, system, equipment and medium based on block chain Download PDF

Info

Publication number
CN113905134A
CN113905134A CN202111227575.3A CN202111227575A CN113905134A CN 113905134 A CN113905134 A CN 113905134A CN 202111227575 A CN202111227575 A CN 202111227575A CN 113905134 A CN113905134 A CN 113905134A
Authority
CN
China
Prior art keywords
blacklist
address book
user
types
incoming call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111227575.3A
Other languages
Chinese (zh)
Other versions
CN113905134B (en
Inventor
蒋成
龙岳
郭悦
张正明
张金玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111227575.3A priority Critical patent/CN113905134B/en
Publication of CN113905134A publication Critical patent/CN113905134A/en
Application granted granted Critical
Publication of CN113905134B publication Critical patent/CN113905134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • H04M3/4365Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Abstract

The present disclosure provides a block chain-based address book blacklist management method, system, terminal device and computer-readable storage medium, in order to at least solve the problems that the current blacklist recording efficiency is low and information is easily tampered, wherein the method includes: dividing a plurality of address list blacklist types; constructing a plurality of blacklist single block chains based on the plurality of address book blacklist types; and storing the address book blacklists of corresponding types in the plurality of blacklist block chains respectively. According to the method, the type of the address book blacklist is divided and stored in the corresponding blacklist block chain by using a block chain technology, so that on one hand, the address book blacklist is convenient to record and store, and the management efficiency of the address book blacklist is improved; on the other hand, the authenticity of the blacklist data is improved, the blacklist data is prevented from being tampered, meanwhile, the traceability of the blacklist data can be achieved, the safety of the blacklist data is guaranteed, and the rights and interests of the user are maintained to the maximum extent.

Description

Address list blacklist management method, system, equipment and medium based on block chain
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a block chain-based address book blacklist management method, a block chain-based address book blacklist management system, a terminal device, and a computer-readable storage medium.
Background
With the arrival of the information age, some lawbreakers gain benefits by spamming user communication modes, people often leak own communication modes such as mobile phone numbers, mailboxes and the like inadvertently, for example, a user reveals his mobile phone number to a certain intermediary person due to personal needs, the intermediary person leaks his communication mode to the crowd in the same or other industries, which causes the user to receive harassing calls frequently, and the user worries about that his privacy is leaked, and feels very unpleasant and troublesome because of receiving similar calls frequently.
At present, aiming at crank calls of users, a related technology provides a mode of creating a mobile phone address list blacklist to prevent crank calls, the mode usually needs the users to mark, a system adds telephone numbers into the blacklist according to factors such as the number of marks of the users, for example, the users mark when receiving a certain telephone number, when the marks reach a certain number, the telephone numbers are automatically listed in the blacklist, the blacklist recording mode of the mode is not efficient, on the other hand, due to the fact that the blacklist recording mode does not have a third party monitoring function, personnel in the blacklist can eliminate the situation of the personnel in the blacklist through artificial money or other modes, information is easy to be falsified, and blacklist data are not authoritative, and the blacklist recording mode is difficult to adapt to the existing rapidly-developing information era.
Therefore, it is desirable to provide a technical solution capable of efficiently managing the address book blacklist and simultaneously guaranteeing the authenticity and the security of the address book blacklist.
Disclosure of Invention
The disclosure provides a block chain-based address book blacklist management method, system, terminal device and computer readable storage medium, so as to at least solve the problems that the existing blacklist recording efficiency is low, information is easy to be tampered and the like.
According to an aspect of the present disclosure, a method for managing a blacklist of an address book based on a block chain is provided, including:
dividing a plurality of address list blacklist types;
constructing a plurality of blacklist single block chains based on the plurality of address book blacklist types; and storing the address book blacklists of corresponding types in the plurality of blacklist block chains respectively.
In one embodiment, the method further comprises:
acquiring basic information and behavior information of a user;
dividing a plurality of address book blacklist types, including: and dividing a plurality of address list blacklist types for the user based on the basic information and the behavior information of the user.
In one embodiment, the method further comprises:
constructing a user behavior database; and the number of the first and second groups,
storing the basic information and behavior information of each user in the user behavior database;
acquiring the basic information and the behavior information of the user, including: and acquiring the basic information and the behavior information of the user from the user behavior database.
In one embodiment, after building the blacklist blockchains based on the address book blacklist types and before storing the address book blacklists of corresponding types in the blockchains, respectively, the method further includes:
obtaining an address list blacklist of the user on each type;
respectively storing address book blacklists of corresponding types in the blacklist block chains, wherein the address book blacklists comprise: and storing the address book blacklists of the users on the corresponding types in the plurality of blacklist block chains respectively.
In one embodiment, obtaining the address list blacklist of the user on each type includes:
sending blacklist type push information to the user, wherein the blacklist type push information carries the plurality of address book blacklist types, so that the user selects the address book blacklist type to be shielded based on the blacklist type push information; and the number of the first and second groups,
acquiring an address book blacklist of the address book blacklist type to be shielded selected by the user;
respectively storing address book blacklists of corresponding types in the blacklist block chains, wherein the address book blacklists comprise: and storing the address book blacklists of the address book blacklist types to be shielded selected by the user in the plurality of blacklist block chains respectively.
In one embodiment, obtaining the address list blacklist of the user on each type includes:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the address list belongs to one of the plurality of address list blacklist types, sending a first blacklist confirmation instruction to the user so that the user can confirm whether the incoming call information is marked to be blackened or not based on the first blacklist confirmation instruction and obtain a first confirmation result;
and if the first confirmation result is that the incoming call information is marked to be blackened, confirming the incoming call information as the address list blacklist of the type.
In one embodiment, obtaining the address list blacklist of the user on each type includes:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the incoming call information belongs to one of the contact list blacklist types, sending a second blacklist confirmation instruction to the user so that the user can confirm whether to mark the incoming call information and all other incoming call information of the type corresponding to the incoming call information based on the second blacklist confirmation instruction, and obtaining a second confirmation result;
and if the second confirmation result is that the incoming call information and all other incoming call information of the type corresponding to the incoming call information are marked to be black, confirming the incoming call information and all other incoming call information of the type corresponding to the incoming call information as the address book blacklist of the type.
According to another aspect of the present disclosure, there is provided a block chain-based address book blacklist management system, including:
the division module is set to divide a plurality of address list blacklist types;
a building module configured to build a plurality of blacklist block chains based on the plurality of address book blacklist types; and the number of the first and second groups,
and the storage module is arranged for storing the address book blacklists of the corresponding types in the plurality of blacklist block chains respectively.
According to another aspect of the present disclosure, there is provided a terminal device, including a memory and a processor, where the memory stores a computer program, and when the processor runs the computer program stored in the memory, the processor executes the method for blacklist management of a blockchain-based address book.
According to still another aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the processor executes the method for blacklist management of a blockchain-based address book.
According to the block chain-based address book blacklist dividing method, system, terminal equipment and computer-readable storage medium provided by the disclosure, a plurality of address book blacklist types are divided, then a plurality of blacklist block chains are constructed based on the plurality of address book blacklist types, and finally, corresponding types of address book blacklists are stored in the plurality of blacklist block chains respectively. According to the method, the type of the address book blacklist is divided and stored in the corresponding blacklist block chain by using a block chain technology, so that on one hand, the address book blacklist is convenient to record and store, and the management efficiency of the address book blacklist is improved; on the other hand, the authenticity of the blacklist data is improved, the blacklist data is prevented from being tampered, meanwhile, the traceability of the blacklist data can be achieved, the safety of the blacklist data is guaranteed, and the rights and interests of the user are maintained to the maximum extent.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the disclosure. The objectives and other advantages of the disclosure may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosed embodiments and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the example serve to explain the principles of the disclosure and not to limit the disclosure.
Fig. 1 is a schematic flowchart of a block chain-based address book blacklist management method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a block chain-based address book blacklist management method according to a second embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a method for managing a blacklist of an address book based on a block chain according to a third embodiment of the present disclosure;
FIG. 4 is a schematic flowchart of step S301 in FIG. 3;
fig. 5 is a schematic structural diagram of an address book blacklist management system based on a block chain according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, specific embodiments of the present disclosure are described below in detail with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order; also, the embodiments and features of the embodiments in the present disclosure may be arbitrarily combined with each other without conflict.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of explanation of the present disclosure, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
In order to solve the problems, the embodiment of the disclosure utilizes the characteristics of the block chain, such as non-falsification, openness and transparency, and the like, and divides the type of the address book blacklist, creates different block chains according to the type of the address book blacklist, and then stores different types of blacklists into corresponding block chains, so that on one hand, the address book blacklist is conveniently recorded and stored, and the management efficiency of the address book blacklist is improved; on the other hand, the authenticity of the blacklist data is improved, the blacklist data is prevented from being tampered, the authority of the blacklist data is improved, meanwhile, the traceability of the blacklist data can be achieved, the safety of the blacklist data is guaranteed, and the rights and interests of users are maintained to the maximum extent.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for managing a blacklist of an address book based on a block chain according to an embodiment of the present disclosure, where the method includes steps S101 to S103.
In step S101, a number of contact blacklist types are divided.
It should be noted that, in this embodiment, the address book blacklist is only an example of a telephone address book, but is not a limitation to the present disclosure, and in some embodiments, the address book blacklist may not be limited to a telephone address book, for example, the address book blacklist may be a mailbox address book blacklist.
In practical application, crank calls usually come from various industries, and different industries can also carry out telephone popularization aiming at specific user groups, so that crank calls are all-sidedly for users, and sometimes even can not be identified as crank calls. In the embodiment, different telephone blacklists are classified by dividing the type of the address book blacklist, such as a house renting agency, a work hunting head, a product promotion, a house buying agency, an infant course registration and the like. In some embodiments of the present disclosure, the address book blacklist is divided and closely linked with user information, so that different users are divided into corresponding address book blacklist types, for example, a college student who just graduates leaves a rented house phone in one place, and receives a lot of rented house phones or finds a work phone and other related phones; for example, a mother can receive milk powder promotion, diaper promotion and infant massage when the mother has grown up, and the most important points are the recommendation of various courses of swimming, art, music and English; information is left when buying a house, and sales promotion of decoration, building materials, home furnishing and the like can be received.
In step S102, a plurality of blacklist block chains are constructed based on the plurality of address book blacklist types.
In the embodiment, a plurality of blacklist single block chains are established, and each block chain correspondingly stores one type of address book blacklist, so that efficient and ordered management of the address book blacklists is realized, and the problem that the address book blacklists are too mixed to cause difficulty in identification of users is avoided. In some embodiments, according to a change of user information (e.g., basic user information and behavior information), the type of the partitioned address book blacklist is updated accordingly, and at this time, a certain type of address book blacklist can be added or removed in a form of adding or deleting a block chain, so that the management efficiency of the address book blacklist is effectively improved.
In step S103, address book blacklists of corresponding types are stored in the blacklist block chains, respectively.
In one embodiment, the blacklist blockchain stores the corresponding address book blacklist and stores the number of times of pull black marking of the address book by the user, for example, when the user receives a telephone which she wants to mark, she marks the telephone and can select the mark type or input the mark type, when the same telephone is marked for more than a plurality of times, the blacklist telephone number is stored in the blockchain of the type together with the telephone numbers of the marked persons, and the marked times, and all the telephone marks on the blockchain are shielded when the user pushes the certain type to the user each time. In practice, there may be a situation where the person is always a real estate agency and her telephone is marked as a blacklist of contact lists of the type of real estate agency, and then she does not have to do so, for example, to promote other products, but starts to be marked as a blacklist of contact lists of promoted products, and at this time her contact list information will be stored in the blockchain of promoted products and the information on the blockchain of the original real estate agency is changed, and in one embodiment, the information on the blockchain of promoted products can be simultaneously entered through a relay platform, and the number-changing information on the blockchain of the real estate agency can be read, and the number of times of marking can be changed to 0.
Referring to fig. 2, fig. 2 is a schematic flow chart of a method for managing a blacklist of an address book based on a block chain according to a second embodiment of the present disclosure, which is different from the first embodiment, in order to solve the problem that adaptive management of a blacklist of an address book is difficult to implement due to different harassing calls received by different users, the present embodiment further includes a step S201 for dividing the blacklist of an address book by different users, specifically, on the basis of the first embodiment, and the step S101 is further divided into a step S101 a.
In step S201, basic information and behavior information of the user are acquired.
Specifically, the basic information of the user includes age, gender, work, life stage (for example, just graduation, buying room, marriage, birth, child, etc.), and the behavior information includes information of the user receiving an incoming call and behavior information of blacking out a mark of the incoming call.
In step S101a, a number of contact blacklist types are divided for the user based on the basic information and behavior information of the user.
Further, by constructing a user behavior database, managing and storing basic information and behavior information of each user, when the address book blacklist type needs to be divided for a user, corresponding information can be called from the user behavior database, so that the corresponding address book blacklist type can be conveniently divided for each user, and specifically, the method further comprises the following steps:
constructing a user behavior database; and the number of the first and second groups,
storing the basic information and behavior information of each user in the user behavior database;
acquiring the basic information and the behavior information of the user, including: and acquiring the basic information and the behavior information of the user from the user behavior database.
Referring to fig. 3, fig. 3 is a schematic flow chart of a method for managing a blacklist of an address book based on a block chain according to a third embodiment of the present disclosure, in order to avoid recording an address book that a user does not need to perform black pull as a blacklist, thereby affecting normal communication requirements of the user, different from the foregoing embodiments, in this embodiment, an address book blacklist of each type of the user is obtained, and recording and management of a corresponding address book blacklist are performed in a blacklist block chain, specifically, after a plurality of blacklist block chains are constructed based on a plurality of types of address book blacklists (step S102), and before the corresponding types of address book blacklists are stored in the plurality of block chains respectively (step S103), the present embodiment further includes step S301, and step S103 is further divided into step S103 a.
In step S301, an address list blacklist of the user in each type is obtained;
in step S103a, storing the address book blacklists of the user on corresponding types in the blacklist block chains, respectively.
In an embodiment, by pushing the divided types of the address book blacklists to the user, the user selects a corresponding type of the user needing to perform blacklist management according to the pushed information, and obtains the address book blacklists of the user in each type (step S301), as shown in fig. 4, including step S301a and step S301 b.
In step S301a, sending blacklist type push information to the user, where the blacklist type push information carries the plurality of address book blacklist types, so that the user selects an address book blacklist type to be masked based on the blacklist type push information; and the number of the first and second groups,
in step S301b, obtaining an address book blacklist on the address book blacklist type to be masked selected by the user;
step S103 is specifically to store the address book blacklists in the address book blacklist types to be masked, which are selected by the user, in the plurality of blacklist block chains, respectively.
It can be understood that the address book blacklist type which is not selected by the user does not need to be stored, and the user does not enter the blacklist when receiving the incoming call information of the type, wherein the address book blacklist on the address book blacklist type to be shielded selected by the user is stored on the corresponding blacklist block chain.
In one embodiment, after obtaining the user information, the system uses big data calculation and analysis to partition out the telephone type (i.e. address list blacklist type) that the user may want to shield, and when the user receives the telephone type, the user can push out whether the telephone is shielded in XX type, such as renting house intermediary type, and the user can choose to shield this time, and choose to shield all numbers stored in the whole type block chain, and does not ask any telephone any more later. If the user chooses to block all phones of a certain type, the relevant other phone types suitable for the user can be pushed simultaneously to see if blocking is required. In addition, the data can be used in the next data analysis by recording the shielding type selected by the user and returning the data to the system for analysis. In some embodiments, the relationship between the user behavior and the phone type may be further analyzed by big data, the phone blacklist type may include classifications of house renting agency, work hunting, product sales promotion, house buying agency, infant course registration, etc., and according to the user input information, the big data analyzes all classifications in the blacklist type to determine whether the classification is suitable for recommendation to the user, and the big data analysis is performed for each type, and the result may obtain an interval [0,1] from 0 to 1, and a corresponding predicted result value is provided according to the user input information and the classification of life stage and blacklist, and if the predicted result value is greater than 0.65, the blacklist type is pushed to the user. (when the user actively selects to view the blacklist type which is desired to be shielded, the user can view the basic information after the user enters the basic information).
In an embodiment, when a user receives incoming call information, a confirmation instruction is sent to the user, and then the address book blacklist of the user is determined, so that the address book blacklist is more accurate, and meanwhile, normal communication requirements of the user can be effectively guaranteed, specifically, the address book blacklists of the user on various types are obtained (step S301), which includes the following steps:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the address list belongs to one of the plurality of address list blacklist types, sending a first blacklist confirmation instruction to the user so that the user can confirm whether the incoming call information is marked to be blackened or not based on the first blacklist confirmation instruction and obtain a first confirmation result;
and if the first confirmation result is that the incoming call information is marked to be blackened, confirming the incoming call information as the address list blacklist of the type.
In another embodiment, obtaining the address book blacklists of the users on various types (step S301) includes the following steps:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the incoming call information belongs to one of the contact list blacklist types, sending a second blacklist confirmation instruction to the user so that the user can confirm whether to mark the incoming call information and all other incoming call information of the type corresponding to the incoming call information based on the second blacklist confirmation instruction, and obtaining a second confirmation result;
and if the second confirmation result is that the incoming call information and all other incoming call information of the type corresponding to the incoming call information are marked to be black, confirming the incoming call information and all other incoming call information of the type corresponding to the incoming call information as the address book blacklist of the type.
Specifically, according to the two embodiments of obtaining the address book blacklist, when the user receives a phone belonging to the address book blacklist type in the system analysis, the system pushes the type to inquire whether the user shields the phone, and whether the phone is a single-time shielding type or an overall type shielding type, if the user selects the overall type shielding type, each blacklist classification (not including the shielded phone) can be predicted again by using big data analysis according to the user input information and the user selection condition, the type with the prediction result value interval larger than 0.65 is pushed to the user, and whether the user needs to shield all phones in the types is checked.
Based on the same technical concept, the embodiment of the present disclosure correspondingly provides a block chain-based address book blacklist management system, as shown in fig. 5, the system includes a dividing module 51, a constructing module 52, and a first storage module 53, wherein,
the dividing module 51 is configured to divide a plurality of address book blacklist types;
the building module 52 is configured to build a plurality of blacklist block chains based on the plurality of address book blacklist types; and the number of the first and second groups,
the first storage module 53 is configured to store the address book blacklists of corresponding types in the blacklist block chains, respectively.
In one embodiment, the system further comprises:
the first acquisition module is used for acquiring basic information and behavior information of a user;
the dividing module 51 is specifically configured to divide a plurality of address book blacklist types for the user based on the basic information and the behavior information of the user.
In one embodiment, the system further comprises:
a construction module configured to construct a user behavior database; and the number of the first and second groups,
a second storage module configured to store the basic information and behavior information of each user in the user behavior database;
the obtaining module is specifically configured to obtain the basic information and the behavior information of the user from the user behavior database.
In one embodiment the system further comprises:
the second acquisition module is configured to acquire the address list blacklists of the users in various types;
the first storage module is specifically configured to store the address book blacklists of the users on the corresponding types in the plurality of blacklist block chains respectively.
In one embodiment, the second obtaining module comprises:
the pushing unit is configured to send blacklist type pushing information to the user, wherein the blacklist type pushing information carries the plurality of address book blacklist types, so that the user selects an address book blacklist type to be shielded based on the blacklist type pushing information; and the number of the first and second groups,
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring an address book blacklist of an address book blacklist type to be shielded selected by a user;
the first storage module is specifically configured to: and storing the address book blacklists of the address book blacklist types to be shielded selected by the user in the plurality of blacklist block chains respectively.
In one embodiment, the second obtaining module comprises:
the first judging unit is used for judging whether a user receives incoming call information or not, and if so, judging whether the incoming call information belongs to one of the contact list blacklist types or not;
a first confirming unit, configured to send a first blacklist confirmation instruction to the user if the first blacklist confirmation instruction belongs to one of the plurality of address book blacklist types, so that the user confirms whether to mark blacking of the incoming call information based on the first blacklist confirmation instruction, and obtains a first confirmation result;
the first confirming unit is further configured to, if the first confirming result is that the incoming call information is marked to be blackened, confirm the incoming call information as the address book blacklist of the type.
In one embodiment, the second obtaining module comprises:
the second judgment unit is used for judging whether a user receives incoming call information or not, and if so, judging whether the incoming call information belongs to one of the plurality of address list blacklist types or not;
a second confirming unit, configured to send a second blacklist confirmation instruction to the user if the blacklist is one of the plurality of address book blacklist types, so that the user confirms whether to mark the incoming call information and all other incoming call information of the type corresponding to the incoming call information based on the second blacklist confirmation instruction, and obtains a second confirmation result;
the second confirming unit is further configured to, if the second confirmation result is that the incoming call information and all other incoming call information of the type corresponding to the incoming call information are marked to be blackened, confirm the incoming call information and all other incoming call information of the type corresponding to the incoming call information as the address book blacklist of the type.
Based on the same technical concept, the embodiment of the present disclosure correspondingly provides a terminal device, as shown in fig. 6, the terminal device includes a memory 61 and a processor 62, the memory 61 stores a computer program, and when the processor 62 runs the computer program stored in the memory 61, the processor 62 executes the address book blacklist management method based on the block chain.
Based on the same technical concept, embodiments of the present disclosure correspondingly provide a computer-readable storage medium, on which a computer program is stored, where when the computer program is executed by a processor, the processor executes the block chain-based address book blacklist management method.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present disclosure, and not for limiting the same; while the present disclosure has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present disclosure.

Claims (10)

1. A blacklist management method for an address list based on a block chain is characterized by comprising the following steps:
dividing a plurality of address list blacklist types;
constructing a plurality of blacklist single block chains based on the plurality of address book blacklist types; and storing the address book blacklists of corresponding types in the plurality of blacklist block chains respectively.
2. The method of claim 1, further comprising:
acquiring basic information and behavior information of a user;
dividing a plurality of address book blacklist types, including: and dividing a plurality of address list blacklist types for the user based on the basic information and the behavior information of the user.
3. The method of claim 2, further comprising:
constructing a user behavior database; and the number of the first and second groups,
storing the basic information and behavior information of each user in the user behavior database;
acquiring basic information and behavior information of a user, comprising the following steps: and acquiring the basic information and the behavior information of the user from the user behavior database.
4. The method of claim 2 or 3, wherein after constructing the blacklist blockchains based on the address book blacklist types and before storing the address book blacklists of corresponding types in the blockchains, respectively, the method further comprises:
obtaining an address list blacklist of the user on each type;
respectively storing address book blacklists of corresponding types in the blacklist block chains, wherein the address book blacklists comprise: and storing the address book blacklists of the users on the corresponding types in the plurality of blacklist block chains respectively.
5. The method of claim 4, wherein obtaining the address book blacklist of the user on each type comprises:
sending blacklist type push information to the user, wherein the blacklist type push information carries the plurality of address book blacklist types, so that the user selects the address book blacklist type to be shielded based on the blacklist type push information; and the number of the first and second groups,
acquiring an address book blacklist of the address book blacklist type to be shielded selected by the user;
respectively storing address book blacklists of corresponding types in the blacklist block chains, wherein the address book blacklists comprise: and storing the address book blacklists of the address book blacklist types to be shielded selected by the user in the plurality of blacklist block chains respectively.
6. The method of claim 4, wherein obtaining the address book blacklist of the user on each type comprises:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the address list belongs to one of the plurality of address list blacklist types, sending a first blacklist confirmation instruction to the user so that the user can confirm whether the incoming call information is marked to be blackened or not based on the first blacklist confirmation instruction and obtain a first confirmation result;
and if the first confirmation result is that the incoming call information is marked to be blackened, confirming the incoming call information as the address list blacklist of the type.
7. The method of claim 4, wherein obtaining the address book blacklist of the user on each type comprises:
judging whether a user receives incoming call information, if so, judging whether the incoming call information belongs to one of the contact list blacklist types;
if the incoming call information belongs to one of the contact list blacklist types, sending a second blacklist confirmation instruction to the user so that the user can confirm whether to mark the incoming call information and all other incoming call information of the type corresponding to the incoming call information based on the second blacklist confirmation instruction, and obtaining a second confirmation result;
and if the second confirmation result is that the incoming call information and all other incoming call information of the type corresponding to the incoming call information are marked to be black, confirming the incoming call information and all other incoming call information of the type corresponding to the incoming call information as the address book blacklist of the type.
8. A blacklist management system for an address book based on a block chain is characterized by comprising:
the division module is set to divide a plurality of address list blacklist types;
a building module configured to build a plurality of blacklist block chains based on the plurality of address book blacklist types; and the number of the first and second groups,
and the storage module is arranged for storing the address book blacklists of the corresponding types in the plurality of blacklist block chains respectively.
9. A terminal device comprising a memory and a processor, wherein the memory stores a computer program, and when the processor runs the computer program stored in the memory, the processor executes the block chain based address book blacklist management method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, performs the blockchain-based address book blacklist management method of any one of claims 1 to 7.
CN202111227575.3A 2021-10-21 2021-10-21 Address book blacklist management method, system, equipment and medium based on block chain Active CN113905134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111227575.3A CN113905134B (en) 2021-10-21 2021-10-21 Address book blacklist management method, system, equipment and medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111227575.3A CN113905134B (en) 2021-10-21 2021-10-21 Address book blacklist management method, system, equipment and medium based on block chain

Publications (2)

Publication Number Publication Date
CN113905134A true CN113905134A (en) 2022-01-07
CN113905134B CN113905134B (en) 2023-06-02

Family

ID=79025965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111227575.3A Active CN113905134B (en) 2021-10-21 2021-10-21 Address book blacklist management method, system, equipment and medium based on block chain

Country Status (1)

Country Link
CN (1) CN113905134B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
WO2016184165A1 (en) * 2015-10-19 2016-11-24 中兴通讯股份有限公司 Method, transmitting terminal and receiving terminal for realizing information processing
CN106210239A (en) * 2016-09-14 2016-12-07 北京奇虎科技有限公司 The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
CN106878527A (en) * 2017-01-20 2017-06-20 腾讯科技(深圳)有限公司 Call control method and device
CN110266872A (en) * 2019-05-30 2019-09-20 世纪龙信息网络有限责任公司 Management-control method, device and the cloud address book system of address book data
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
US20190333097A1 (en) * 2018-04-30 2019-10-31 Affle (India) Limited METHOD AND SYSTEM FOR CREATING DECENTRALIZED REPOSITORY OF FRAUD IPs AND PUBLISHERS USING BLOCKCHAIN
CN110401779A (en) * 2018-04-24 2019-11-01 中国移动通信集团有限公司 A kind of method, apparatus and computer readable storage medium identifying telephone number
CN112616122A (en) * 2020-12-01 2021-04-06 一汽资本控股有限公司 Method and system for transmitting integrated multi-message

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
WO2016184165A1 (en) * 2015-10-19 2016-11-24 中兴通讯股份有限公司 Method, transmitting terminal and receiving terminal for realizing information processing
CN106210239A (en) * 2016-09-14 2016-12-07 北京奇虎科技有限公司 The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
CN106878527A (en) * 2017-01-20 2017-06-20 腾讯科技(深圳)有限公司 Call control method and device
CN110401779A (en) * 2018-04-24 2019-11-01 中国移动通信集团有限公司 A kind of method, apparatus and computer readable storage medium identifying telephone number
US20190333097A1 (en) * 2018-04-30 2019-10-31 Affle (India) Limited METHOD AND SYSTEM FOR CREATING DECENTRALIZED REPOSITORY OF FRAUD IPs AND PUBLISHERS USING BLOCKCHAIN
CN110266872A (en) * 2019-05-30 2019-09-20 世纪龙信息网络有限责任公司 Management-control method, device and the cloud address book system of address book data
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
CN112616122A (en) * 2020-12-01 2021-04-06 一汽资本控股有限公司 Method and system for transmitting integrated multi-message

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIN ZHAN: "《Research on Block Chain Network Intrusion Detection System》" *
音长丰: "《区块链技术在供应链金融中的应用研究》" *

Also Published As

Publication number Publication date
CN113905134B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN100478829C (en) Peer-to-peer neighbor detection for proximity-based command execution
US9015597B2 (en) Generation and implementation of a social utility grid
Church et al. A large-scale study of daily information needs captured in situ
US20210037141A1 (en) Call Processing System for Modifying Inmate Communication Limits
US20120290565A1 (en) Automatic social graph calculation
TWI477994B (en) Communication access control system and method
US20090288150A1 (en) Access control by testing for shared knowledge
US20120072358A1 (en) Customer care replies on social media
US20130294594A1 (en) Automating the identification of meeting attendees
US20070207773A1 (en) Remote personnel tracking
US20120290545A1 (en) Collection of intranet activity data
CN101919223A (en) Method and system for managing discourse in a virtual community
US20120157157A1 (en) Sharing Contact Information
CN105103181A (en) Persona chooser
CN107977416A (en) A kind of information prompting method, device and server
US20220201045A1 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US20190019127A1 (en) Smart meeting scheduler
US9838344B2 (en) Intelligent prevention of spam emails at share sites
CN113905134B (en) Address book blacklist management method, system, equipment and medium based on block chain
KR101095232B1 (en) Method of selectively preventing spam calls of mobile telecommunication terminal
US8229400B1 (en) Granular control over access to data by a device
CN109598481B (en) Conference management authority processing method and device, computer equipment and storage medium
Just et al. Personal safety app effectiveness
US11328092B2 (en) Data processing systems for processing and managing data subject access in a distributed environment
Yu et al. An edge computing based situation enabled crowdsourcing blacklisting system for efficient identification of scammer phone numbers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant