CN117119098A - Account shielding method, communication system and electronic equipment - Google Patents

Account shielding method, communication system and electronic equipment Download PDF

Info

Publication number
CN117119098A
CN117119098A CN202211062344.6A CN202211062344A CN117119098A CN 117119098 A CN117119098 A CN 117119098A CN 202211062344 A CN202211062344 A CN 202211062344A CN 117119098 A CN117119098 A CN 117119098A
Authority
CN
China
Prior art keywords
communication
server
communication identifier
message
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211062344.6A
Other languages
Chinese (zh)
Inventor
孟繁瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2023/094171 priority Critical patent/WO2023221917A1/en
Publication of CN117119098A publication Critical patent/CN117119098A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides an account shielding method, a communication system and electronic equipment. According to the account shielding method provided by the application, the communication identifications which are added into the shielding list by the user can be correlated, so that a plurality of other communication identifications are obtained; and when the communication identifiers added into the shielding list are associated with other communication identifiers, the newly added communication identifiers are also added into the shielding list, so that the server or the electronic equipment can intercept the communication corresponding to the shielding list. The account shielding method provided by the application can determine more communication identifications of the unwelcome person, so that the user is not disturbed by the unwelcome person.

Description

Account shielding method, communication system and electronic equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an account shielding method, a communication system, and an electronic device.
Background
Mobile phone asThe communication equipment can receive cellular telephones and/or cellular short messages of other users; meanwhile, the mobile phone is used as intelligent equipment, and the mobile phone can be operated withThe instant messaging application program can also receive the audio-video call and the information of other users (such as +. >Message), web phone, and/or web sms.
In everyday life, a user's electronic device may receive a cellular telephone and/or a cellular text message from an unwelcome person. After receiving the blackening operation of the user on the cellular number (telephone number), the electronic equipment can intercept the incoming call of the cellular number, and move the short message sent by the cellular number into the dustbin without reminding the user, but the unpopular can still dial a network telephone and/or send a network short message to the user through the account of the instant messaging application program.
Disclosure of Invention
The embodiment of the application provides an account shielding method, a communication system and electronic equipment. According to the account shielding method provided by the application, the communication identifications which are added into the shielding list by the user can be correlated, so that a plurality of other communication identifications are obtained; and when the communication identifiers added into the shielding list are associated with other communication identifiers, the newly added communication identifiers are also added into the shielding list, so that the server or the electronic equipment can intercept the communication corresponding to the shielding list. The account shielding method provided by the application can determine more communication identifications of the unwelcome person, so that the user is not disturbed by the unwelcome person.
In a first aspect, an embodiment of the present application provides an account shielding method, which is applied to a system including a first server and a first electronic device, where the method includes: after the first server receives the first message, the first server associates a first communication identifier with a second communication identifier based on the first message, wherein the first communication identifier is a communication identifier of a first user, before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant communication application program; when the first server determines that the first communication identifier belongs to a first shielding list, the first server adds the second communication identifier to the first shielding list, wherein the first shielding list is a shielding list of a second user; the first electronic equipment intercepts first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the first electronic equipment is the electronic equipment of the second user; or the first server intercepts a first communication, wherein the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
In the above embodiment, the account shielding method provided by the embodiment of the present application may determine one or more communication identifiers associated with the newly added shielding name list, and add the newly added one or more communication identifiers to the shielding list, so that the user is not disturbed by the unpopular person. Wherein the first communication identifier corresponds to the communication identifier 3001, and the second communication identifier corresponds to the communication identifier 3003.
With reference to some embodiments of the first aspect, in some embodiments, the method further includes: after the first server receives a second message, the first server associates the first communication identifier with a third communication identifier based on the second message, the second message is sent by an application server corresponding to an instant messaging application program, the second message is used for indicating that the third communication identifier is associated with the first communication identifier, and before the application server associates the third communication identifier with the first communication identifier, the third communication identifier does not exist or is not associated with the first communication identifier; the first server adds the third communication to the first blacklist.
In the above embodiment, the new communication identifier may also be from an application server, and after the application server determines the association, the application server may send the new communication identifier to the first server, so that the server may update the mask list, obtain the mask list as complete as possible, and further make the user not be disturbed by the unpopular person. The third communication identifier corresponds to the communication identifier 3003.
With reference to some embodiments of the first aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, wherein the third message comprises the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determining a fourth communication identity associated with the first communication identity; the first server adds the fourth beacon to the first blacklist.
In the above embodiment, after the user pulls the first communication identifier, the server may determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the mask list, so that the user is not disturbed by the unpopular person. Wherein the fourth communication identifier is communication identifier 3002.
With reference to some embodiments of the first aspect, in some embodiments, the first message is configured to instruct the first server to register the second communication identifier based on the first communication identifier.
In the above embodiment, when the unpopular registers a new account, the newly registered account is also added to the first mask list, so that the user is not disturbed by the unpopular.
With reference to some embodiments of the first aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logout a first account, wherein the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number.
In the above embodiment, in the case that the unpopular tries to escape from the mask list by the method of logout and re-registration, the account masking method provided by the embodiment of the present application can add the newly registered second account to the mask list, so that the user is not disturbed by the unpopular.
In combination with some embodiments of the first aspect, in some embodiments, the first communication is identified as a first cellular number, the first message is for instructing the first server to bind the first cellular number and a first account, and the second communication is identified as the first account.
In the above embodiment, after the unpopular binds the other communication identifier to the communication identifier in the mask list, the other identifier is also added to the mask list, so that the user is not disturbed by the unpopular.
In combination with some embodiments of the first aspect, in some embodiments, the first communication is identified as a first cellular number, and the second message is for informing the first server that the cellular number of the first user further includes a second cellular number, and the first message is sent after the electronic device of the first user detects the newly inserted SIM card.
In the above embodiment, after one cellular number of the unpopular is added to the mask list, if the electronic device of the unpopular is inserted into the new SIM card, the second cellular number corresponding to the new SIM card is also added to the mask list, so that the user is not disturbed by the unpopular.
With reference to some embodiments of the first aspect, in some embodiments, the system further includes a second server, the method further includes: the first server sends a fourth message to the second server, wherein the fourth message comprises a fifth communication identifier, and the fifth communication identifier is a communication identifier in the first shielding list; after the second server determines a sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server, where the fifth message includes the sixth communication identifier, and the first server adds the fifth communication identifier to the first mask list.
In the above embodiment, the communication identification of the diswelcome person as complete as possible may also be determined by a plurality of servers, so that the user is not disturbed by the diswelcome person.
In a second aspect, an embodiment of the present application provides an account shielding method, applied to a first server, where the method includes: after the first server receives the first message, the first server associates a first communication identifier with a second communication identifier based on the first message, wherein the first communication identifier is a communication identifier of a first user, before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant communication application program; when the first server determines that the first communication identifier belongs to a first shielding list, the first server adds the second communication identifier to the first shielding list, wherein the first shielding list is a shielding list of a second user; the first server intercepts a first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
In the above embodiment, the account shielding method provided by the embodiment of the present application may determine one or more communication identifiers associated with the newly added shielding name list, and add the newly added one or more communication identifiers to the shielding list, so that the user is not disturbed by the unpopular person. Wherein the first communication identifier corresponds to the communication identifier 3001, and the second communication identifier corresponds to the communication identifier 3003.
With reference to some embodiments of the second aspect, in some embodiments, after the first server receives a second message, the first server associates the first communication identifier with a third communication identifier based on the second message, where the second message is sent by an application server corresponding to an instant messaging application, and the second message is used to indicate that the third communication identifier is associated with the first communication identifier, where before the application server associates the third communication identifier with the first communication identifier, the third communication identifier does not exist or is not associated with the first communication identifier; the first server adds the third communication to the first blacklist.
In the above embodiment, the new communication identifier may also be from an application server, and after the application server determines the association, the application server may send the new communication identifier to the first server, so that the server may update the mask list, obtain the mask list as complete as possible, and further make the user not be disturbed by the unpopular person. The third communication identifier corresponds to the communication identifier 3003.
With reference to some embodiments of the second aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, wherein the third message comprises the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determining a fourth communication identity associated with the first communication identity; the first server adds the fourth beacon to the first blacklist.
In the above embodiment, after the user pulls the first communication identifier, the server may determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the mask list, so that the user is not disturbed by the unpopular person. Wherein the fourth communication identifier is communication identifier 3002.
With reference to some embodiments of the second aspect, in some embodiments, the first message is configured to instruct the first server to register the second communication identifier based on the first communication identifier.
In the above embodiment, when the unpopular registers a new account, the newly registered account is also added to the first mask list, so that the user is not disturbed by the unpopular.
With reference to some embodiments of the second aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logout a first account, wherein the first account is the first communication identifier; the first message is used for registering the second account number based on a first cellular number, the first cellular number is the fourth communication identifier, and the second account number is the second communication identifier.
In combination with some embodiments of the first aspect, in some embodiments, the first communication is identified as a first cellular number, the first message is for instructing the first server to bind the first cellular number and a first account, and the second communication is identified as the first account.
In the above embodiment, after the unpopular binds the other communication identifier to the communication identifier in the mask list, the other identifier is also added to the mask list, so that the user is not disturbed by the unpopular.
In combination with some embodiments of the first aspect, in some embodiments, the first communication is identified as a first cellular number, and the second message is for informing the first server that the cellular number of the first user further includes a second cellular number, and the first message is sent after the electronic device of the first user detects the newly inserted SIM card.
In the above embodiment, after one cellular number of the unpopular is added to the mask list, if the electronic device of the unpopular is inserted into the new SIM card, the second cellular number corresponding to the new SIM card is also added to the mask list, so that the user is not disturbed by the unpopular.
In a third aspect, an embodiment of the present application provides an account shielding method, applied to a system including a first server and a first electronic device, where the method includes: the first electronic device sends a first message to the first server, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program; the first server determining a first cellular number associated with the first communication identity; the first server sends a first cellular number to the first electronic device; the first electronic equipment intercepts first communication, wherein the first communication is a cellular call or a cellular short message corresponding to the first cellular number.
In the above embodiment, the account shielding method provided by the embodiment of the present application may determine the cellular numbers associated with the shielding name, and add the cellular numbers to the shielding list, so that the user is not disturbed by the unpopular person. The first communication identifier is a communication identifier 3001, and the first cellular number is a communication identifier 3002 and a communication identifier 3003.
With reference to some embodiments of the third aspect, in some embodiments, after the first server receives the first message, the method further includes: the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account; the first server intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account to the account of the first user.
In the above embodiment, the account shielding method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the shielding name list, and if so, add the newly added communication identifiers to the shielding name list, so that the user is not disturbed by the unpopular person.
With reference to some embodiments of the third aspect, in some embodiments the first server receives a second message, where the first server determines, based on the second message, that a second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account number based on the first cellular number, or the second message is used to instruct the first server to bind the first cellular number with the first account number; the first server sends a third message to the first electronic device, wherein the third message comprises a first account number; the first electronic equipment intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account.
In the above embodiment, the account shielding method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the shielding name list, and if so, add the newly added communication identifiers to the shielding name list, so that the user is not disturbed by the unpopular person.
In a fourth aspect, an embodiment of the present application provides an account shielding method, applied to a first server, where the method includes: the first server receives a first message sent by first electronic equipment, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program; the first server determining a first cellular number associated with the first communication identity; the first server sends a second message to the first electronic device, wherein the second message comprises the first cellular number, and a cellular call or a cellular short message corresponding to the first cellular number is intercepted by the first electronic device.
In the above embodiment, the account shielding method provided by the embodiment of the present application may determine the cellular numbers associated with the shielding name, and add the cellular numbers to the shielding list, so that the user is not disturbed by the unpopular person. The first communication identifier is a communication identifier 3001, and the first cellular number is a communication identifier 3002 and a communication identifier 3003.
With reference to some embodiments of the fourth aspect, in some embodiments, after the first server receives the first message sent by the first electronic device, the method further includes: the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account; the first server intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account to the account of the first user.
In the above embodiment, the account shielding method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the shielding name list, and if so, add the newly added communication identifiers to the shielding name list, so that the user is not disturbed by the unpopular person.
In a fifth aspect, an embodiment of the present application provides an account shielding method, applied to a first electronic device, where the method includes: after the first electronic device determines that the first communication identifier is in the first shielding list, the first electronic device determines a second communication identifier associated with the first communication identifier, wherein in the case that the first communication identifier is a first cellular number, the second communication identifier is a second cellular number; in the case that the first communication identifier is a first account, the second communication identifier is a first cellular number, and the communication identifier is a cellular number or an account number of an instant messaging application program; adding the second communication identity to the first masked list at the first electronic device; the first electronic device intercepts a first communication, an identification of an initiator of the first communication being a communication identification in the first masked list.
In the above embodiment, the account shielding method provided by the embodiment of the present application may determine the cellular numbers associated with the shielding name, and add the cellular numbers to the shielding list, so that the user is not disturbed by the unpopular person. The first communication identifier is a communication identifier 3001, and the second communication identifier is a communication identifier 3002 or a communication identifier 3003.
With reference to some embodiments of the fifth aspect, in some embodiments, the first electronic device determines a second communication identifier associated with the first communication identifier, specifically including: the system application sends a first message to one or more instant messaging applications, the first message including the first communication identifier, the one or more instant messaging applications including a first application; the first application program determines that the second communication identifier is associated with the first communication identifier; the first application program sends a second message to the system application, the second message including the second communication identification the system application determines that the second communication identification is associated with the first communication identification.
In the above embodiment, the system application may query other third party application programs for other communication identifiers associated with the first communication identifier, and further add the other communication identifiers to the mask list.
In a sixth aspect, an embodiment of the present application provides an account shielding method, which is applied to a system including a first electronic device, a second electronic device, and a first server, where the method includes: the first electronic device sends a first message to the first server, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program; the first server determines a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device; the first server sends a second communication identifier to the second electronic equipment, wherein the second communication identifier is a communication identifier of a user on the first electronic equipment; after receiving the second communication identifier, the second electronic device intercepts the first communication, and the identifier of the receiver of the first communication is the second communication identifier.
In the above embodiment, after determining that the first electronic device adds the first communication identifier to the mask list, the server notifies the second electronic device, so that the second electronic device intercepts a communication initiated by a user on the second electronic device to the user on the first electronic device. The first communication identifier is a communication identifier 3001, and the second communication identifier is a communication identifier 3002 or a communication identifier 3003.
In a seventh aspect, an embodiment of the present application provides an account shielding method, applied to a first server, where the method includes: the first server receives a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program; the first server determines a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device; the first server sends a second message to the second electronic device, wherein the second message comprises the second communication identifier, the second communication identifier is a communication identifier of a user on the first electronic device, the second message is used for indicating the second electronic device to intercept the first communication, and a communication identifier of a receiver of the first communication is the second communication identifier.
In the above embodiment, after determining that the first electronic device adds the first communication identifier to the mask list, the server notifies the second electronic device, so that the second electronic device intercepts a communication initiated by a user on the second electronic device to the user on the first electronic device.
In an eighth aspect, an embodiment of the present application provides an account shielding method, applied to a second electronic device, where the method includes: receiving a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program; a first communication is intercepted, and a communication identifier of a receiver of the first communication is the first communication identifier.
In the above embodiment, after the second electronic device receives the first message, it is determined that the user on the second electronic device is added to the mask list by the upper user of the other electronic device, and then the second electronic device intercepts communications to the user on the other electronic device.
In a ninth aspect, an embodiment of the present application provides a server, including: one or more processors and memory; the memory is coupled to the one or more processors, the memory for storing computer program code, the computer program code comprising computer instructions that the one or more processors call to cause the electronic device to perform: after the first server receives the first message, the first server associates a first communication identifier with a second communication identifier based on the first message, wherein the first communication identifier is a communication identifier of a first user, before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant communication application program; when the first server determines that the first communication identifier belongs to a first shielding list, the first server adds the second communication identifier to the first shielding list, wherein the first shielding list is a shielding list of a second user; the first server intercepts a first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
With reference to some embodiments of the ninth aspect, in some embodiments, the one or more processors are further configured to invoke the computer instructions to cause the electronic device to perform: after the first server receives a second message, the first server associates the first communication identifier with a third communication identifier based on the second message, the second message is sent by an application server corresponding to an instant messaging application program, the second message is used for indicating that the third communication identifier is associated with the first communication identifier, and before the application server associates the third communication identifier with the first communication identifier, the third communication identifier does not exist or is not associated with the first communication identifier; the first server adds the third communication to the first blacklist.
With reference to some embodiments of the ninth aspect, in some embodiments, the one or more processors are further configured to invoke the computer instructions to cause the electronic device to perform: the first server receives a third message sent by the first electronic device, wherein the third message comprises the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determining a fourth communication identity associated with the first communication identity; the first server adds the fourth beacon to the first blacklist.
With reference to some embodiments of the ninth aspect, in some embodiments, the first message is configured to instruct the first server to register the second communication identifier based on the first communication identifier.
With reference to some embodiments of the ninth aspect, in some embodiments, the one or more processors are further configured to invoke the computer instructions to cause the electronic device to perform: the first server receives a logout request, and the first server logout a first account, wherein the first account is the first communication identifier; the first message is used for registering the second account number based on a first cellular number, the first cellular number is the fourth communication identifier, and the second account number is the second communication identifier.
With reference to some embodiments of the ninth aspect, in some embodiments, the first communication is identified as a first cellular number, the first message is used to instruct the first server to bind the first cellular number and a first account, and the second communication is identified as the first account.
With reference to some embodiments of the ninth aspect, in some embodiments, the first communication is identified as a first cellular number, and the second message is for informing the first server that the cellular number of the first user further includes a second cellular number, and the first message is sent after the electronic device of the first user detects the newly inserted SIM card.
In a tenth aspect, an embodiment of the present application provides a server, including: one or more processors and memory; the memory is coupled to the one or more processors, the memory for storing computer program code, the computer program code comprising computer instructions that the one or more processors call to cause the electronic device to perform: the first server receives a first message sent by first electronic equipment, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program; the first server determining a first cellular number associated with the first communication identity; the first server sends a second message to the first electronic device, wherein the second message comprises the first cellular number, and a cellular call or a cellular short message corresponding to the first cellular number is intercepted by the first electronic device.
With reference to some embodiments of the tenth aspect, in some embodiments, the one or more processors are further configured to invoke the computer instructions to cause the electronic device to perform: the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account; the first server intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account to the account of the first user.
In an eleventh aspect, an embodiment of the present application provides an electronic device, including: one or more processors and memory; the memory is coupled to the one or more processors, the memory for storing computer program code, the computer program code comprising computer instructions that the one or more processors call to cause the electronic device to perform: after the first electronic device determines that the first communication identifier is in the first shielding list, the first electronic device determines a second communication identifier associated with the first communication identifier, wherein in the case that the first communication identifier is a first cellular number, the second communication identifier is a second cellular number; in the case that the first communication identifier is a first account, the second communication identifier is a first cellular number, and the communication identifier is a cellular number or an account number of an instant messaging application program; adding the second communication identity to the first masked list at the first electronic device; the first electronic device intercepts a first communication, an identification of an initiator of the first communication being a communication identification in the first masked list.
With reference to some embodiments of the eleventh aspect, in some embodiments, the one or more processors are specifically configured to invoke the computer instructions to cause the electronic device to perform: the system application sends a first message to one or more instant messaging applications, the first message including the first communication identifier, the one or more instant messaging applications including a first application; the first application program determines that the second communication identifier is associated with the first communication identifier; the first application program sends a second message to the system application, the second message including the second communication identification the system application determines that the second communication identification is associated with the first communication identification.
In a twelfth aspect, an embodiment of the present application provides a server, including: one or more processors and memory; the memory is coupled to the one or more processors, the memory for storing computer program code, the computer program code comprising computer instructions that the one or more processors call to cause the electronic device to perform: the first server receives a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program; the first server determines a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device; the first server sends a second message to the second electronic device, wherein the second message comprises the second communication identifier, the second communication identifier is a communication identifier of a user on the first electronic device, the second message is used for indicating the second electronic device to intercept the first communication, and a communication identifier of a receiver of the first communication is the second communication identifier.
In a thirteenth aspect, an embodiment of the present application provides an electronic device, including: one or more processors and memory; the memory is coupled to the one or more processors, the memory for storing computer program code, the computer program code comprising computer instructions that the one or more processors call to cause the electronic device to perform: receiving a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program; a first communication is intercepted, and a communication identifier of a receiver of the first communication is the first communication identifier.
In a fourteenth aspect, an embodiment of the present application provides a communication system including: the communication system comprises first electronic equipment and a first server, wherein the first server is used for associating a first communication identifier with a second communication identifier based on a first message after receiving the first message, the first communication identifier is a communication identifier of a first user, and before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by the electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant communication application program;
the first server is used for adding the second communication identifier to a first shielding list when the first communication identifier is determined to belong to the first shielding list, wherein the first shielding list is a shielding list of the second user
The first electronic device is used for intercepting first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the first electronic device is the electronic device of the second user; or the first server is used for intercepting the first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
In a fifteenth aspect, an embodiment of the present application provides a communication system, where the communication system includes a first electronic device and a first server, where the first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, where the communication identifier is a cellular number or an account of an instant messaging application; the first server is configured to determine a first cellular number associated with the first communication identity; the first server is configured to send a first cellular number to the first electronic device; the first electronic device is configured to intercept a first communication, where the first communication is a cellular call or a cellular sms corresponding to the first cellular number.
In a sixteenth aspect, an embodiment of the present application provides a communication system, where the communication system includes a first electronic device, a second electronic device, and a first server, where the first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, where the communication identifier is a cellular number or an account of an instant messaging application; the first server is used for determining a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device; the first server is used for sending a second communication identifier to the second electronic equipment, wherein the second communication identifier is a communication identifier of a user on the first electronic equipment; the second electronic device is configured to intercept a first communication after receiving the second communication identifier, where an identifier of a recipient of the first communication is the second communication identifier.
In a seventeenth aspect, embodiments of the present application provide a chip system, which is applied to an electronic device or a server, the chip system including one or more processors configured to invoke computer instructions to cause the electronic device to perform a method as described in the ninth aspect, the tenth aspect, the eleventh aspect, the twelfth aspect, and any possible implementation of the ninth aspect, the tenth aspect, the eleventh aspect, and the twelfth aspect.
An eighteenth aspect, an embodiment of the present application provides a computer program product comprising instructions which, when run on an electronic device, cause the electronic device to perform the method as described in the ninth aspect, the tenth aspect, the eleventh aspect, the twelfth aspect, and any one of the possible implementation manners of the ninth aspect, the tenth aspect, the eleventh aspect, and the twelfth aspect.
In a nineteenth aspect, an embodiment of the present application provides a computer readable storage medium, including instructions that, when executed on an electronic device, cause the electronic device to perform the method described in the ninth aspect, the tenth aspect, the eleventh aspect, the twelfth aspect, and any one of the possible implementation manners of the ninth aspect, the tenth aspect, the eleventh aspect, and the twelfth aspect.
It will be appreciated that the electronic device or the server provided in the ninth aspect, the tenth aspect, the eleventh aspect, the twelfth aspect and the thirteenth aspect, the system provided in the fourteenth aspect, the fifteenth aspect and the sixteenth aspect, the chip system provided in the seventeenth aspect, the computer program product provided in the eighteenth aspect and the computer storage medium provided in the nineteenth aspect are all configured to execute the method provided by the embodiment of the present application. Therefore, the advantages achieved by the method can be referred to as the advantages of the corresponding method, and will not be described herein.
Drawings
Fig. 1 is an exemplary schematic diagram of an applicable scenario of an account shielding method according to an embodiment of the present application.
Fig. 2 is an exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
Fig. 3 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
Fig. 4A is an exemplary schematic diagram of determining one or more second communication identifications provided by an embodiment of the present application.
Fig. 4B is an exemplary schematic diagram of a first server determining one or more second communication identifiers according to an embodiment of the present application.
Fig. 4C is an exemplary schematic diagram of a first electronic device determining one or more second communication identifiers according to an embodiment of the present application.
Fig. 4D is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
Fig. 5 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
Fig. 6 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
Fig. 7 is an exemplary schematic diagram of intercepting communications in an account shielding method according to an embodiment of the present application.
Fig. 8 is an exemplary schematic diagram of a communication system according to an embodiment of the present application.
Fig. 9 is an exemplary schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Fig. 10 is an exemplary schematic diagram of a software architecture of an electronic device according to an embodiment of the present application.
Fig. 11A is an exemplary schematic diagram of data flow in a process of adding a communication identifier to a blacklist library by a first electronic device according to an embodiment of the present application.
Fig. 11B is an exemplary schematic diagram of an instant messaging application intercepting an audio-video call or message according to an embodiment of the present application.
Fig. 11C is another exemplary schematic diagram of an instant messaging application program intercepting a web phone or a web sms according to an embodiment of the present application.
Detailed Description
The terminology used in the following embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," "the," and "the" are intended to include the plural forms as well, unless the context clearly indicates to the contrary. It should also be understood that the term "and/or" as used in this disclosure refers to and encompasses any or all possible combinations of one or more of the listed items.
The terms "first," "second," and the like, are used below for descriptive purposes only and are not to be construed as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature, and in the description of embodiments of the application, unless otherwise indicated, the meaning of "a plurality" is two or more.
The term "User Interface (UI)" in the following embodiments of the present application is a media interface for interaction and information exchange between an application program or an operating system and a user, which enables conversion between an internal form of information and a form acceptable to the user. The user interface is a source code written in a specific computer language such as java, extensible markup language (extensible markup language, XML) and the like, and the interface source code is analyzed and rendered on the electronic equipment to finally be presented as content which can be identified by a user. A commonly used presentation form of the user interface is a graphical user interface (graphic user interface, GUI), which refers to a user interface related to computer operations that is displayed in a graphical manner. It may be a visual interface element of text, icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, widgets, etc., displayed in a display of the electronic device.
Fig. 1 is an exemplary schematic diagram of an applicable scenario of an account shielding method according to an embodiment of the present application.
As shown in fig. 1, in stage 1, a user 1 dials a cellular phone to a handset 2 via handset 1. After receiving the cell phone, user 2 may determine that user 1 is an unwelcome person, and user 2 may then turn black the cell number corresponding to user 1, as shown in stage 2.
In stage 2, the interface displayed by the handset 2 may be as shown by interface 101. The content displayed by interface 101 includes the cellular number of user 1 and control 102. Wherein the cellular number of user 1 is 123456789. In response to receiving the user 2 clicking the control 102, the mobile phone 2 may hang up the incoming call to the cellular number in time after blackening the cellular number, and/or may not display an interface for the incoming call. The mobile phone 2 can also move the short message of the cellular number into the dustbin.
However, in stage 3, user 1 may pass through the handset 1The instant messaging software sends a network short message to the mobile phone 2 or initiates a network phone.
Alternatively, the user 1 may also pass through the mobile phone 1To user 2->The account (or account number) sends a message or initiates an audio-video call; alternatively, corresponding +.>Account corresponds to user 2- >In case the account is not a friend relationship, user 1 may add the function to user 2 corresponding +.>The account sends a buddy addition message.
In connection with the illustration of fig. 1, it will be appreciated that when the user 2 turns off his or her cellular number, it is also necessary to turn off his or her account for instant messaging software to avoid being disturbed by the undesired person. However, in many cases, before the user is disturbed, the user 2 cannot learn the account of all instant messaging software of the unwelcome person, and after the user is disturbed, the user can only be able to defeat the anti-splice account of the instant messaging software of the unwelcome person.
Furthermore, in the case that the unpopular holds more than one SIM card, i.e. holds a plurality of cellular numbers, the unpopular can only turn back the cellular numbers of the unpopular and the accounts of the instant messaging applications corresponding to different cellular numbers after being disturbed, so that the user 2 needs to manually execute more operations, and the user experience is poor.
Based on the problems, the embodiment of the application provides an account shielding method, an account shielding system and electronic equipment.
The account shielding method provided by the application can automatically inquire all communication identifiers of the unpopular by the electronic equipment or the server of the first user after the communication identifiers of any unpopular are blacked out by the first user (for example, the user 2 in fig. 1), and intercept communication initiated by the unpopular, such as a cellular telephone, a cellular short message, a network telephone, a network short message, a mail, a message and/or an audio-video call, at the end side or the server side after the all identifiers of the unpopular are inquired.
In this embodiment of the present application, the communication identifier may be a cellular number, an account of the instant messaging application (where the account of the instant messaging application may be an account of an undesired person, or a network number identifier displayed on the first electronic device, for example, an open account is xxxxx, but a network number displayed on an electronic device of an undesired person is yyyyyy, and then yyyyyyyyyy may also be an account of the instant messaging application), a system account, and so on. The interception at the end side may be to intercept communications initiated by electronic equipment of the unwelcome person at the electronic equipment side of the unwelcome person, or intercept communications initiated by the unwelcome person at the electronic equipment side of the first user.
Optionally, in some embodiments of the present application, after the unpopular goes to the newly added communication identifier in a different manner, the server detects the newly added communication identifier of the unpopular, and may add the newly added communication identifier to the blacklist of the first user in time.
The operation of newly adding communication identification of the diswelcome person can comprise that the diswelcome person registers an account of a new instant messaging application program by using the blacked cellular number, and the newly added communication identification is the account of the newly registered instant messaging application program; or, after the unwelcome person logs out of the account of the instant messaging application program, re-registering the account of the new instant messaging application program, wherein the newly added communication mark is the re-registered account of the instant messaging application program; or, the unpopular registers the account of the instant messaging application program by using the cellular number corresponding to the auxiliary card, and the registered account of the instant messaging application program is a newly added communication identifier, etc.
Optionally, in some embodiments of the present application, the cellular number may further comprise a virtual number, wherein the virtual number is a number in a virtual private mobile network (Virtual Private Mobile Network, VPMN).
Fig. 2 is an exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
The contents of stage 1 and stage 2 in fig. 2 are the same as those of stage 1 and stage 2 in fig. 1, and reference may be made to the corresponding text description in fig. 1, which is not repeated here.
In stage 3, the communication identity of the user 1 is associated by the first server and/or the handset 2 to discover other communication identities of the user 1. For example, the server associates the communication identifier of the cellular number "123456789", and determines that the result of the association is: instant messaging application account (e.gAccount) is Ab123456789, +.>The mailbox account is: 123456789@huawei.com, other cellular numbers: 987654321,The mailbox account is: 987654321@huawei.com.
In stage 4, the first server may synchronize part or all of the communication identifier of the user 1 to the mobile phone 2, and the first server and/or the mobile phone 2 may intercept communications originated from the user 1, such as a network phone, a network sms, a mail, a message, and/or an audio-video call. For example, the first server may intercept an audio/video call initiated by the user 1 through the instant messaging application, and a message sent by the user; for another example, the mobile phone 2 may intercept incoming calls and sms messages of cellular numbers 123456789 and 987654321; for another example, handset 2 or a server may intercept mail sent by 123456789@huawei.com and 987654321@huawei.com.
Optionally, in some embodiments of the present application, after detecting the operation of the newly added communication identifier of the user 1, the first server or the mobile phone 2 may update the newly added communication identifier of the user 1, and then intercept the communication initiated by the user 1 to the mobile phone 2 through the mobile phone 1 or other electronic devices; or after detecting the operation of the newly added communication identifier of the user 1, the first server or the mobile phone 1 can update the newly added communication identifier of the unwelcome person and update the newly added communication identifier of the user 2 to the mobile phone 2, so that the mobile phone 2 can intercept the communication initiated by the user 1 through the mobile phone 1 or other electronic equipment.
It can be understood that, in response to the blackening operation of the user 2 on any communication identifier of the user 1, the first server can correlate the communication identifier to obtain all communication identifiers of the unpopular person, so that all communication identifiers of the unpopular person are blacked by the mobile phone 2 and/or the first server, the user 2 is protected from being disturbed by the user 1, and complicated operation is not required by the user 2, so that user experience is improved.
Fig. 3 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
S301: optionally, the first electronic device determines that the communication identity 3001 is blacklisted.
In response to receiving the operation of the first user, the first electronic device determines that the communication identity 3001 is blacklisted (may also be referred to as a blacklist); alternatively, the first electronic device may obtain, from other servers including the first server or an instant messaging application on the first electronic device, a communication identifier 3001 that is labeled by other users as promotional or advertisement type, and further add the communication identifier 3001 to the blacklist.
The communication identifier 3001 may be a cellular number, an account of an instant messaging application, or a mailbox.
Alternatively, in some embodiments of the present application, synchronization of blacklists may be performed between multiple electronic devices logged into the same user account. Wherein the synchronization of the blacklist may be performed by the first server, or by another server.
Optionally, in some embodiments of the present application, after the first electronic device determines the communication identifier 3001, if the communication identifier 3001 is a cellular number, the first electronic device adds a blacklist; if the communication identifier 3001 is an account number or a cellular number of the instant messaging application, the first electronic device sends the communication identifier 3001 to the first server, and the server adds the communication identifier 3001 to the blacklist.
Optionally, in some embodiments of the present application, after the first electronic device determines the communication identifier 3001, the communication identifier 3001 may be added to the blacklist.
Optionally, in some embodiments of the present application, the adding and deleting of the communication identifier in the blacklist is performed only by the first server, and the first electronic device synchronizes the blacklist by the first server.
Optionally, in some embodiments of the present application, the adding and deleting of the communication identifier in the blacklist is performed by the first server and/or the first electronic device.
S302: the first electronic device sends a message 1 to the first server, the message 1 comprising a communication identity 3001.
Optionally, in some embodiments of the present application, the first server isSystem and->Servers corresponding to the system, e.g.)>And a server.
Optionally, in some embodiments of the present application, the first server is an application server corresponding to an instant messaging application program.
Alternatively, in some embodiments of the present application, if the communication identifier 3001 is a cellular number, the first server is an operator server.
Optionally, in some embodiments of the present application, the first server adds the communication identifier 3001 to the blacklist after receiving the message 1.
S303: the first server determines one or more communication identities 3002 associated with the communication identity 3001.
There are various ways for the first server to determine one or more communication identifiers 3002 associated with the communication identifier 3001, which is not limited herein.
Several methods for determining one or more communication identities 3002 by the first server are described below by way of example.
Optionally, in some embodiments of the present application, in a case where the first server is a server corresponding to an operating system, a communication identifier set of different users is stored on the first server; when the first server determines that the communication identity 3001 belongs to a communication identity set of an unwelcome person, each communication identity in the communication identity set of an unwelcome person may be treated as an associated one or more communication identities 3002. The first server may periodically obtain the communication identifier sets of different users.
Optionally, in some embodiments of the present application, in a case where the first server is a server corresponding to an operating system, the first server may further request, from an application server corresponding to the instant messaging application, a communication identifier 3002 associated with the communication identifier 3001. For example, the number of the cells to be processed, The server can go->Server or->The server sends a request 1, where the request 1 carries a communication identifier 3001, and the request 1 is a request for obtaining other communication identifiers associated with the communication identifier 3001.Server or->The server, upon receiving request 1, may send one or more communication identifications 3002 associated with the first identification to the first server.
Optionally, in some embodiments of the present application, after the user including the unwelcome person agrees to some privacy agreements, the first server may determine the second electronic device based on the communication identifier 3001, and then the first server queries the second electronic device for other communication identifiers on the second electronic device; then, after receiving the communication identifier sent by the second electronic device, the first server may determine one or more communication identifiers 3002. Wherein the other communication identifications on the second electronic device may have no direct association with the communication identification 3001, e.g., on the second electronic deviceThe account to which the application is logged in is not bound to the communication identifier 3001. Wherein +.>The account on which the application is logged is obtained by the first server instructing the system application on the second electronic device to execute the query.
Alternatively, in some embodiments of the present application, where communication identity 3001 is a cellular number, the server may be an operator server, such asServer or->And a server. The operator server may distinguish different electronic devices through parameters such as an international mobile equipment identifier (international mobile equipment identity, IMEI), an international mobile subscriber identifier (international mobile subscriber identification number, IMSI), etc., so as to determine one or more cellular numbers on the electronic devices, and further determine the communication identifier 3002. Alternatively, the operator server may determine the second user based on the communication identity 3001, and further determine the other cellular numbers of the second user based on the second user. The first electronic device and the operator server can be connected to exchange information, or the first electronic device can exchange information with the operator server through a server corresponding to the operating system. />
The above exemplary description describes a method of determining one or more communication identifiers 3002. In some embodiments of the application, the first server may perform more than one association to obtain as complete one or more communication identifiers 3002 as possible.
S304: optionally, the first server sends a message 2 to the first electronic device, the message 2 including part or all of the one or more communication identities 3002.
Optionally, in some embodiments of the present application, after the first server determines the one or more communication identities 3002 associated with the communication identity 3001, the first server sends the one or more communication identities 3002 to the first electronic device.
Alternatively, in some embodiments of the present application, the first server may not send message 2 to the first electronic device if the one or more communication identifications 3002 do not include a cellular number.
Alternatively, in some embodiments of the present application, if the one or more communication identities 3002 include a cellular number, the message 2 sent by the first server to the first electronic device includes the cellular number in the one or more communication identities 3002.
Optionally, in some embodiments of the present application, in step S302, the first electronic device may further send an identification of the first user, such as a communication identification of the first user, an ID of the user, a logged-in account on the first electronic device, or other parameters for distinguishing between different users, to the first server. In the case that the first server is an application server corresponding to the instant messaging application, the identification of the first user may also be an account of the instant messaging application of the first user. After determining the one or more communication identifications 3002, the first server may create a blacklist for the first user and add the account of the instant messaging application in the one or more communication identifications 3002 to the blacklist of the first user. When the first server determines that the unwelcome person initiates a network telephone, a network short message, a mail, a message and/or an audio-video call to the first user, the interception can be directly performed.
Alternatively, in some embodiments of the present application, if the first server is not an operator server, the first server may synchronize the cellular numbers in the one or more communication identifications 3002 with the operator server. The carrier server may intercept the cellular number in the one or more communication identifications 3002 initiating a cellular phone and/or a cellular text message to the cellular number on the first electronic device.
S305: optionally, the first electronic device updates the blacklist based on some or all of the one or more communication identifications 3002.
The first electronic device can update the blacklist upon receiving one or more communication identifications 3002. The first electronic device may intercept cellular telephones, cellular text messages, audio-video calls, messages, web phones, and/or web text messages based on the blacklist.
Alternatively, in some embodiments of the present application, a system application, such as a system administrator, on the first electronic device may obtain the cellular number in one or more communication identities 3002 and add the cellular number to the blacklist. When the first electronic equipment receives the incoming call or the short message, the system manager judges whether the number of the incoming call or the short message is in the blacklist, and if the number of the incoming call or the short message is in the blacklist, the system manager can intercept the incoming call and the short message.
Optionally, in some embodiments of the present application, after obtaining the cellular numbers in the one or more communication identifiers 3002, a system application, such as a system manager, on the first electronic device may send the instant messaging application account in the one or more communication identifiers 3002 to the corresponding instant messaging application through the agreed API; after receiving the corresponding communication identifier 3002, the instant messaging application program can intercept an audio/video call initiated by an account of the instant messaging application program corresponding to the communication identifier 3002 and intercept a network short message, a network telephone, a message and/or an audio/video call sent by an account of the instant messaging application program corresponding to the communication identifier 3002.
Optionally, in some embodiments of the present application, after determining the communication identifier of the undesired person, for example, the one or more communication identifiers 3002, the first electronic device and/or the first server may send the account of the different instant messaging application program in the one or more communication identifiers 3002 and the account of the first user logged in on the different instant messaging application program to the application server corresponding to the different instant messaging application program, so that the server of the different instant messaging application program may intercept the web sms, the web phone, the message, and/or the audio/video call initiated by the undesired person through the instant messaging application program.
S306: optionally, the first server updates the one or more communication identities 3002 to obtain one or more communication identities 3003.
Wherein the communication identifier 3003 is different from the communication identifier 3002 in that, when the first server performs step S303, the communication identifier 3003 is not associated with the communication identifier in the blacklist, or the communication identifier 3003 does not exist (is not registered); after the first server performs step S303, the communication identifier 3003 is associated with the communication identifier in the blacklist.
The association relationship between the communication identifier 3003 and the communication identifier in the blacklist may be established by an application server corresponding to the instant messaging application program, or may be established by an electronic device of an unwelcome person. For example, binding of different instant messaging application accounts is established by the application server, or the communication identity 3003 is a newly registered account. For another example, if the electronic device of the unwelcome person inserts a SIM card, the cellular number corresponding to the newly inserted SIM card is the communication identifier 3003.
There are a number of ways for the first server to determine one or more communication identifiers 3003, and a few are described below by way of example.
Alternatively, in some embodiments of the present application, the first server may periodically update the one or more communication identifiers 3002 to obtain the one or more communication identifiers 3003. For example, when an unwelcome person registers with cellular number 1 Account, the->If the account is account 1 and the cellular number 1 belongs to the one or more communication identifiers 3002, the first server updates the one or more communication identifiers 3003 obtained by the one or more communication identifiers 3002 to include account 1.
Optionally, in some embodiments of the present application, after detecting the operation of adding the communication identifier of the unwelcome person, the first server updates the communication identifier of the unwelcome person, and marks the communication identifier as the communication identifier 3003.
For example, in the case where the first server is a server corresponding to the operating system, after the disfavored person registers the account of the instant messaging application program using the cellular number 1, for example, the account 1 is opened, the application server corresponding to the instant messaging application program sends a message to the first server, where the message is used to indicate the association relationship between the cellular number 1 and the account of the instant messaging application program of the disfavored person. Upon receipt of the message by the first server, it may be determined that the one or more communication identifications 3003 include an account of the instant messaging application for the diswelcome person. Wherein, since the first server inquires the application server about the communication identifier of the unwelcome person in step S303, the application server may determine that the user of the newly added communication identifier 3003 is the unwelcome person.
For example, in the case where the first server is an application server corresponding to the instant messaging application, after the unpopular registers an account of the instant messaging application using the cellular number 1, for example, the open account 1, the first server determines that the communication identifier of the unpopular is newly added to the cellular number 1. Wherein the cellular number 1 belongs to the communication identifier 3003. Wherein, since the first server inquires the application server about the communication identifier of the unwelcome person in step S303, the application server may determine that the user of the newly added communication identifier 3003 is the unwelcome person.
For example, in the case that the first server is a server corresponding to the operating system, when the account of the instant messaging application of the unwelcome person is bound to the cellular number 2 after being unbound to the cellular number 1, the application server corresponding to the instant messaging application sends a message to the first server, where the message is used to instruct the cellular number 2 to be associated with the account of the instant messaging application of the unwelcome person. Upon receipt of the message by the first server, it may be determined that one or more of the communication identifications 3003 include the cellular number 2.
For example, in the case that the first server is an application server corresponding to the instant messaging application, when the account of the instant messaging application of the unwelcome person is bound with the cellular number 2 after being unbound with the cellular number 1, the first server determines that the communication identifier of the unwelcome person is newly added with the cellular number 2. Wherein the cellular number 2 belongs to the communication identity 3003.
For example, in the case that the first server is a server corresponding to the operating system, when the account of the instant messaging application of the unwelcome person is bound to the cellular number 2 after being unbound to the cellular number 1, the application server corresponding to the instant messaging application sends a message to the first server, where the message is used to instruct the cellular number 2 to be associated with the account of the instant messaging application of the unwelcome person. Upon receipt of the message by the first server, it may be determined that one or more of the communication identifications 3003 include the cellular number 2. The first server may interact with the application server, and the first server sends the communication identifier 3002 to the application server, and after determining that there is a new associated communication identifier 3003 to the communication identifier 3002, the application server sends the communication identifier 3003 to the first server, or the application server sends the communication identifier 3003 and the communication identifier 3002 to the first server. Where the application server sends the communication identifier 3003 to the first server, the application server may send or carry an identifier in a message through a specific interface, where the interface or the identifier is used to indicate that the communication identifier 3003 is associated with a certain communication identifier 3002. Alternatively, the message sent by the application server to the first server carries the communication identifier 3003 and the identifier of the unwelcome person. Wherein, since the first server inquires the application server about the communication identifier of the unwelcome person in step S303, the application server may determine that the user of the newly added communication identifier 3003 is the unwelcome person.
For example, in the case that the first server is a server corresponding to the operating system, when the unpopular inserts a new SIM card in the second electronic device, where the new SIM card corresponds to the cellular number 1, a system application on the second electronic device, such as a mobile phone manager, may send a message to the first server, where the message is used to inform the first server that the communication identifier of the unpopular is newly added to the cellular number 1; the first server may then determine that one or more communication identifications 3003 include the cellular number 1.
S307: optionally, the first server sends a message 3 to the first electronic device, the message 3 including part or all of the one or more communication identities 3003.
Alternatively, in some embodiments of the present application, the first server may send a message 3 to the first electronic device, the message 3 including a communication identity of the one or more communication identities 3003 that is different from the one or more communication identities 3002.
Alternatively, in some embodiments of the application, the first server may synchronize the cellular number in the one or more communication identities 3003 with the first electronic device.
Alternatively, in some embodiments of the present application, if the first server is not an operator server, the first server may synchronize the cellular numbers in the one or more communication identifications 3003 with the operator server. The carrier server may intercept the cellular number in the one or more communication identifications 3003 initiating a cellular phone and/or a cellular text message to the cellular number on the first electronic device.
S308: optionally, the first electronic device updates the blacklist based on some or all of the one or more communication identifications 3003.
The operation of updating the blacklist by the first electronic device may refer to the text description of step S305, which is not described herein.
In the content shown in fig. 3, the first server stores a blacklist, and the blacklist on the first server stores a complete communication identifier of the unpopular person. The blacklist on the first electronic device has a complete communication identification of the diswelcome person or the blacklist on the first electronic device has a cellular number of the diswelcome person.
The above describes the process that the first electronic device obtains the communication identifier of the unwelcome person through the first server, and adds the communication identifier of the unwelcome person to the blacklist. In the process that the first electronic device obtains the communication identifier of the unwelcome person, the first electronic device or the first server may obtain the communication identifier of the unwelcome person as complete as possible through multiple correlations, as shown in fig. 4A, fig. 4B and fig. 4C below.
In the content shown in fig. 4B and fig. 4C, the first server may be a server corresponding to an operating system, and the second server and the third server are application servers corresponding to an instant messaging application program.
Fig. 4A is an exemplary schematic diagram of determining one or more communication identifications 3002 provided by an embodiment of the application.
As shown in fig. 4A, the communication identifier 3001 is a cellular number 1. When the first server performs an association to determine the communication identity 3002 includes: account 1, mailbox 1, cellular number 2. Wherein account 1 is an instant messaging application account.
After the first server performs the association once, a second association is also performed.
As shown in fig. 4A, after the first server performs the second association, determining the communication identifier 3002 includes: account 1, mailbox 1, cellular number 2, mailbox 2.
It should be noted that, in the content shown in fig. 4A, the association may be performed multiple times by the first electronic device.
Fig. 4B is an exemplary schematic diagram of a first server determining one or more communication identifiers 3002 according to an embodiment of the present application.
S4B01: the first server sends a query request 1 to the second server, the query request 1 comprising a communication identity 1.
Wherein the communication identifier 1 belongs to the communication identifier 3001 or the communication identifier 3002; the second server is an application server corresponding to the instant messaging application program.
S4B02: the first server sends a query request 2 to the third server, the query request 2 comprising the communication identity 1.
The third server is an application server corresponding to the instant messaging application program.
Optionally, in some embodiments of the present application, the instant messaging application programs corresponding to the second server and the third server are different.
S4B03: the second server determines one or more communication identities 2 based on the communication identity 1.
Wherein one or more communication identities 2 belong to communication identity 3002.
S4B04: the third server determines one or more communication identities 3 based on the communication identity 1.
Wherein one or more communication identities 3 belong to communication identity 3002.
S4B05: the second server sends a query result 1 to the first server, the query result 1 comprising one or more communication identities 2.
S4B06: the third server sends a query result 2 to the first server, the query result 2 comprising one or more communication identities 3.
S4B07: the first server sends a query request 3 to the third server, the query request 3 comprising one or more communication identities 2.
S4B08: the third server determines one or more communication identities 4 based on the one or more communication identities 2.
Wherein one or more communication identities 4 belong to the communication identity 3002.
S4B09: the third server sends a query result 3 to the first server, the query result 3 comprising one or more communication identities 4.
In conjunction with the description of fig. 4B, it is understood that steps S4B01 to S4B06 may be associated for the first time; steps S4B07 to S4B09 may be a second association, so that the first server may determine as complete as possible the communication identifier belonging to the diswelcome person.
Fig. 4C is an exemplary schematic diagram of a first electronic device determining one or more communication identifiers 3002 according to an embodiment of the present application.
S4C01: the first electronic device sends a query request 1 to the second server, the query request 1 comprising a communication identity 1.
S4C02: the first electronic device sends a query request 2 to the third server, the query request 2 comprising the communication identity 1.
S4C03: the second server determines one or more communication identities 2 based on the communication identity 1.
S4C04: the third server determines one or more communication identities 3 based on the communication identity 1.
S4C05: the second server sends a query result 1 to the first electronic device, the query result 1 comprising one or more communication identities 2.
S4C06: the third server sends a query result 2 to the first electronic device, the query result 2 comprising one or more communication identities 3.
S4C07: the first electronic device sends a query request 3 to the third server, the query request 3 comprising one or more communication identities 2.
S4C08: the third server determines one or more communication identities 4 based on the one or more communication identities 2.
S4C09: the third server sends a query result 3 to the first electronic device, the query result 3 comprising one or more communication identities 4.
In conjunction with the description of fig. 4C, it is understood that steps S4C01 to S4C06 may be associated for the first time; the step S4C07 to the step S4C09 may be a second association, so that the first electronic device may determine the communication identifier belonging to the diswelcome person as complete as possible.
For the content shown in fig. 4C, the first server serves as a server for querying the association relationship, and the first electronic device serves as an interceptor of the communication.
It should be noted that, in the content shown in fig. 3 to fig. 4C above, the first electronic device interacts with the first server to obtain the communication identifier of the unwelcome person. Alternatively, in some embodiments of the present application, the first electronic device may independently determine the communication identifier of the disfavored person, as shown in fig. 4D in the following figure.
Fig. 4D is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
S4D01: instant messaging application 1 determines that account 1 is blacklisted.
Wherein account 1 is communication identity 3001.
S4D02: instant messaging application 1 sends message 1 to the system application, message 1 including cellular number 1.
Wherein the cellular number 1 is the communication identifier 3002.
Alternatively, in some embodiments of the present application, instant messaging application 1 may communicate with a server to which the application corresponds to determine that the communication identification associated with account 1 includes account 1. For example, the number of the cells to be processed,the contact means of the contact in the application includes the cellular number of the contact.
Optionally, in some embodiments of the application, message 1 further comprises account 1.
S4D03: optionally, the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the blacklist of the first user.
The blacklist of the first user is a blacklist of an account logged in by the first user in the instant messaging application 1.
S4D04: optionally, the system application adds account 1 to the blacklist of the first user.
S4D05: the system application adds cell number 1 to the first user's blacklist.
S4D06: the system application sends message 2 to instant messaging application 2, message 2 including cellular number 1.
S4D07: optionally, instant messaging application 1 adds account 2 corresponding to cellular number 1 to the first user's blacklist.
Alternatively, in some embodiments of the present application, instant messaging application 2 may communicate with a server to which the application corresponds to determine that the communication identification associated with account 1 includes account 1.
S4D08: optionally, the instant messaging application 2 sends a message 3 to the system application, the message 3 including the account 2.
S4D09: optionally, the system application adds account 2 to the blacklist of the first user.
It is noted that the system application on the first electronic device may also perform the association a plurality of times in case the first electronic device independently determines the communication identity of the diswelcome person.
For example, after the system application determines that cellular number 1 is the communication identification of the diswelcome, the instant messaging application 1 is queried for the association of cellular number 1 as account 1 and cellular number 2, and the instant messaging application 2 is queried for the association of cellular number 1 as account 2. The system application may then query instant messaging application 2 for the association of cellular number 2 as account 3. In this case, the result of the first electronic device performing the first association is account 1, account 2, cellular number 2; the result of the second electronic device performing the second association is account 3.
Fig. 5 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
In the content shown in fig. 5, the first electronic device is an electronic device of the user, and the second electronic device is an electronic device of the unwelcome person. The first server may be a server corresponding to operating systems of the first electronic device and the second electronic device, or may be an application server corresponding to an instant messaging application program.
S501: the first electronic device determines that communication identity 3001 is blacklisted.
The content of step S501 may refer to the text description in step S301, and will not be described herein.
S502: the first electronic device sends a communication identification 3001 to the first server.
S503: the first server determines the electronic device of the diswelcome person as the second electronic device based on the communication identification 3001.
Optionally, in some embodiments of the present application, a set of communication identifiers of different users is stored on the first server; when the first server determines that the communication identity 3001 belongs to a communication identity set of an unwelcome person, each communication identity in the communication identity set of an unwelcome person may be treated as an associated one or more communication identities 3002.
Alternatively, in some embodiments of the application, the first server may determine the second electronic device based on the communication identification 3001, such as an account of an instant messaging application of an unwelcome person.
S504: the first server sends an interception instruction to the second electronic equipment, wherein the interception instruction comprises a communication identifier of the first user.
Wherein the communication identification of the first user may include a cellular number on the first electronic device, an account of an instant messaging application on the first electronic device.
Optionally, the first server may also associate the communication identifier of the first user, so as to obtain the communication identifier of the first user that is as complete as possible, and specific content may refer to the text description in step S303 above, which is not repeated here.
S505: the second electronic device intercepts a communication initiated to the first user.
Alternatively, in some embodiments of the present application, the second electronic device may intercept communications initiated to the first user, such as cellular telephones, cellular text messages, audio-video calls, messages, web phones, and/or web notes, in the event that the unwelcome agrees to certain privacy agreements.
Alternatively, in some embodiments of the present application, in a case where the first server is an application server corresponding to the instant messaging application, the first server may determine an account of the instant messaging application to which the first user logs in. For example, in step S502, the first electronic device further transmits, to the first server, a parameter for determining an account of the user 'S instant messaging application, such as an account of the user' S instant messaging application. The first server sends the communication identification of the user to the second electronic device, wherein the identification comprises the identification of the account of the instant communication application program of the user.
Optionally, in some embodiments of the present application, in a case where the first server is a server corresponding to the operating system, the first server may determine a communication identifier of the user, such as a cellular number, an account of the instant messaging application, or the like. After the communication identifier of the user is obtained, the system application on the second electronic device, such as a mobile phone manager, can send the account of the instant communication application program in the communication identifier of the user to the corresponding instant communication application program through the agreed API, so that the instant communication application program can intercept network telephone, network short message, mail, message and/or audio/video call initiated by the unpopular to the user. And after the communication identification of the user is acquired, the system application such as a mobile phone manager on the second electronic equipment can intercept the cellular phone and the cellular short message initiated by the second electronic equipment.
Fig. 6 is another exemplary schematic diagram of a flow of an account shielding method according to an embodiment of the present application.
S601: the system application determines that cell number 1 is blacklisted.
The cellular number 1 belongs to the communication identifier 3001, and the specific content may refer to the text description of step S301, which is not repeated here.
S602: the system application sends a query request 1 to the instant messaging application 1, the query request 1 comprising the cellular number 1.
The system application can comprise an address book and a mobile phone manager.
Wherein the query request may be sent through a contracted API.
S603: optionally, the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the blacklist of the first user.
The blacklist of the first user is a blacklist of an account logged in by the first user in the instant messaging application 1.
Wherein the cellular number 1 and account 1 are identified for communication by an unwelcome person. Wherein account 1 is communication identity 3002.
S604: the instant messaging application 1 sends a query request 2 to the server 1, the query request 2 comprising the cellular number 1 and/or the account 1.
The server 1 is a server corresponding to the instant messaging application 1.
S605: server 1 determines mailbox 1 based on cellular number 1 and/or account 1.
S606: alternatively, the server 1 will add to the blacklist of the first user with account 1.
If step S603 has already been performed, step S606 may not be performed; if step S603 is not performed, step S606 needs to be performed.
S607: the server 1 sends a query result to the instant messaging application 1, the query result including the mailbox 1.
Wherein mailbox 1 is communication identity 3002.
S608: the instant messaging application 1 sends a query result to the system application, the query result including the mailbox 1.
After the system application receives mailbox 1, mailbox 1 may be blacklisted.
Optionally, in some embodiments of the present application, the query result further includes account 1.
Fig. 7 is an exemplary schematic diagram of intercepting communications in an account shielding method according to an embodiment of the present application.
S701: the instant messaging application 1 on the second electronic device initiates a communication to the instant messaging application 1 on the first electronic device.
The communication may be a network phone, a network short message, a mail, a message, and/or an audio/video call.
The second electronic device is electronic equipment of an unwelcome person, and an account logged in by the instant messaging application program 1 on the second electronic device is an account 2; the account logged in by the instant messaging application 1 on the first electronic device is account 1.
S702: the instant messaging application 1 sends a query request 1 to the system application, the query request including an account 2.
Alternatively, in some embodiments of the present application, step S702 and step S703 are optional steps in the case where the instant messaging application 1 maintains a blacklist.
S703: the system application sends a query result 1 to the instant messaging application 1, the query result 1 comprising the confirmation information.
The system application stores a blacklist, and the blacklist stores communication identifiers of unpopular people. Wherein account 2 belongs to the blacklist.
S704: the instant messaging application 1 intercepts the communication.
The instant messaging application program intercepts communication initiated by the instant messaging application program on the second electronic equipment based on the query result 1, such as network telephone, network short message, message and audio-video call.
It should be noted that, in the case of intercepting by the server corresponding to the instant messaging application program 1, if the server may send the query request 1 to the system application through the instant messaging application program 1, then the server corresponding to the instant messaging application program 1 intercepts after receiving the query result.
It should be noted that, in the case of intercepting by the server corresponding to the instant messaging application program 1, if the server may send the query request 1 to the server corresponding to the operating system, then the server corresponding to the instant messaging application program 1 may intercept after receiving the query result.
Finally, introducing the communication system provided by the embodiment of the application, and providing the hardware architecture and the software architecture of the first electronic device, the second electronic device and the server. The hardware architecture and the software architecture of the first electronic device and the second electronic device may be the same, so the electronic device will be referred to as the first electronic device and the second electronic device hereinafter.
Fig. 8 is an exemplary schematic diagram of a communication system according to an embodiment of the present application.
As shown in fig. 8, a communication system provided by an embodiment of the present application may include a first electronic device and a second electronic device.
The first electronic device is the electronic device of the first user, and the second electronic device is the electronic device of the unwelcome user.
Optionally, in some embodiments of the present application, the communication system may further comprise one or more servers. The one or more servers may include a server corresponding to an operating system and/or an application server corresponding to an instant messaging application.
Fig. 9 is an exemplary schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
The electronic device may be a cell phone, tablet, desktop, laptop, handheld, notebook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook, as well as a cellular telephone, personal digital assistant (personal digital assistant, PDA), augmented reality (augmented reality, AR) device, virtual Reality (VR) device, artificial intelligence (artificial intelligence, AI) device, wearable device, vehicle-mounted device, smart home device, and/or smart city device, with embodiments of the application not being particularly limited as to the particular type of electronic device.
The electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the structure illustrated in the embodiments of the present application does not constitute a specific limitation on the electronic device. In other embodiments of the application, the electronic device may include more or less components than illustrated, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The I2C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some embodiments, the processor 110 may contain multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, charger, flash, camera 193, etc., respectively, through different I2C bus interfaces. For example: the processor 110 may be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through an I2C bus interface to implement a touch function of the electronic device.
The I2S interface may be used for audio communication. In some embodiments, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through the I2S interface, to implement a function of answering a call through the bluetooth headset.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface to implement a function of answering a call through the bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through a UART interface, to implement a function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 to peripheral devices such as a display 194, a camera 193, and the like. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the photographing function of the electronic device. The processor 110 and the display screen 194 communicate via a DSI interface to implement the display functionality of the electronic device.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal or as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, an MIPI interface, etc.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge an electronic device, or may be used to transfer data between the electronic device and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other electronic devices, such as AR devices, etc.
It should be understood that the connection relationship between the modules illustrated in the embodiments of the present application is only illustrative, and does not limit the structure of the electronic device. In other embodiments of the present application, the electronic device may also use different interfacing manners, or a combination of multiple interfacing manners in the foregoing embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the electronic device. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied on an electronic device. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc. for application on an electronic device. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, the antenna 1 and the mobile communication module 150 of the electronic device are coupled, and the antenna 2 and the wireless communication module 160 are coupled, so that the electronic device can communicate with the network and other devices through wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device implements display functions via a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device may implement shooting functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also perform algorithm optimization on noise and brightness of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, the electronic device may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, and so on.
Video codecs are used to compress or decompress digital video. The electronic device may support one or more video codecs. In this way, the electronic device may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent cognition of electronic devices can be realized through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The internal memory 121 may include one or more random access memories (random access memory, RAM) and one or more non-volatile memories (NVM).
The random access memory may include a static random-access memory (SRAM), a dynamic random-access memory (dynamic random access memory, DRAM), a synchronous dynamic random-access memory (synchronous dynamic random access memory, SDRAM), a double data rate synchronous dynamic random-access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as fifth generation DDR SDRAM is commonly referred to as DDR5 SDRAM), etc.;
the nonvolatile memory may include a disk storage device, a flash memory (flash memory).
The FLASH memory may include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc. divided according to an operation principle, may include single-level memory cells (SLC), multi-level memory cells (MLC), triple-level memory cells (TLC), quad-level memory cells (QLC), etc. divided according to a storage specification, may include universal FLASH memory (english: universal FLASH storage, UFS), embedded multimedia memory cards (embedded multi media Card, eMMC), etc. divided according to a storage specification.
The random access memory may be read directly from and written to by the processor 110, may be used to store executable programs (e.g., machine instructions) for an operating system or other on-the-fly programs, may also be used to store data for users and applications, and the like.
The nonvolatile memory may store executable programs, store data of users and applications, and the like, and may be loaded into the random access memory in advance for the processor 110 to directly read and write.
The external memory interface 120 may be used to connect external non-volatile memory to enable expansion of the memory capabilities of the electronic device. The external nonvolatile memory communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music and video are stored in an external nonvolatile memory.
The electronic device may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The electronic device may listen to music, or to hands-free conversations, through speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When the electronic device picks up a phone call or voice message, the voice can be picked up by placing the receiver 170B close to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The electronic device may be provided with at least one microphone 170C. In other embodiments, the electronic device may be provided with two microphones 170C, and may implement a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device may also be provided with three, four, or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile electronic device platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a capacitive pressure sensor comprising at least two parallel plates with conductive material. The capacitance between the electrodes changes when a force is applied to the pressure sensor 180A. The electronics determine the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus detects the intensity of the touch operation according to the pressure sensor 180A. The electronic device may also calculate the location of the touch based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: and executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon. And executing an instruction for newly creating the short message when the touch operation with the touch operation intensity being greater than or equal to the first pressure threshold acts on the short message application icon.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (i.e., x, y, and z axes) may be determined by the gyro sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects the shake angle of the electronic device, calculates the distance to be compensated by the lens module according to the angle, and makes the lens counteract the shake of the electronic device through the reverse motion, thereby realizing anti-shake. The gyro sensor 180B may also be used for navigating, somatosensory game scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronics calculate altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation.
The magnetic sensor 180D includes a hall sensor. The electronic device may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device is a flip machine, the electronic device may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device is stationary. The electronic equipment gesture recognition method can also be used for recognizing the gesture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device may measure the distance by infrared or laser. In some embodiments, the scene is photographed and the electronic device can range using the distance sensor 180F to achieve quick focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device emits infrared light outwards through the light emitting diode. The electronic device uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it may be determined that an object is in the vicinity of the electronic device. When insufficient reflected light is detected, the electronic device may determine that there is no object in the vicinity of the electronic device. The electronic device may detect that the user holds the electronic device near the ear to talk using the proximity light sensor 180G, so as to automatically extinguish the screen for power saving purposes. The proximity light sensor 180G may also be used in holster mode, pocket mode to automatically unlock and lock the screen.
The ambient light sensor 180L is used to sense ambient light level. The electronic device can adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect if the electronic device is in a pocket to prevent false touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic equipment can utilize the collected fingerprint characteristics to realize fingerprint unlocking, access the application lock, fingerprint photographing, fingerprint incoming call answering and the like.
The temperature sensor 180J is for detecting temperature. In some embodiments, the electronic device performs a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, the electronics perform a reduction in performance of a processor located near temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other embodiments, when the temperature is below another threshold, the electronic device heats the battery 142 to avoid low temperatures causing the electronic device to shut down abnormally. In other embodiments, the electronic device performs boosting of the output voltage of the battery 142 when the temperature is below a further threshold to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal. In some embodiments, bone conduction sensor 180M may also be provided in a headset, in combination with an osteoinductive headset. The audio module 170 may analyze the voice signal based on the vibration signal of the sound portion vibration bone block obtained by the bone conduction sensor 180M, so as to implement a voice function. The application processor may analyze the heart rate information based on the blood pressure beat signal acquired by the bone conduction sensor 180M, so as to implement a heart rate detection function.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects by touching different areas of the display screen 194. Different application scenarios (such as time reminding, receiving information, alarm clock, game, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device. The electronic device may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic equipment interacts with the network through the SIM card, so that the functions of communication, data communication and the like are realized. In some embodiments, the electronic device employs esims, namely: an embedded SIM card. The eSIM card can be embedded in the electronic device and cannot be separated from the electronic device.
The software system of the electronic device may employ a layered architecture, an event driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture. In the embodiment of the application, an Android system with a layered architecture is taken as an example, and the software structure of the electronic equipment is illustrated.
Fig. 10 is an exemplary schematic diagram of a software architecture of an electronic device according to an embodiment of the present application.
The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, from top to bottom, an application layer, an application framework layer, an Zhuoyun row (Android run) and system libraries, and a kernel layer, respectively.
The application layer may include a series of application packages.
As shown in fig. 10, the application package may include applications for cameras, gallery, calendar, phone calls, maps, navigation, WLAN, bluetooth, music, video, short messages, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
As shown in fig. 10, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is for providing communication functions of the electronic device. Such as the management of call status (including on, hung-up, etc.).
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
Android run time includes a core library and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), etc.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
In some embodiments of the application, the phone manager may be responsible for performing the interception of the cell phone and cell phone messages of the undesired person.
Optionally, in some embodiments of the present application, the phone manager may also be responsible for performing email, web phone, web short message, messaging, short video communications for unwelcome people.
Fig. 11A is an exemplary schematic diagram of data flow in a process of adding a communication identifier to a blacklist library by a first electronic device according to an embodiment of the present application.
As shown in fig. 11A, after the first user turns off an account in the instant messaging application, the instant messaging application may send the account to the system application. Wherein the account is the communication identifier of the unpopular.
Alternatively, in some embodiments of the application, the system application may be a cell phone steward, or a service running on an operating system, such as a phone manager.
After the system application receives the communication identification of the unpopular, the system application writes the communication identification of the unpopular into the blacklist repository. Wherein the blacklist repository is located in the internal memory 121.
Alternatively, in some embodiments of the present application, the blacklist repository may also be located in a server corresponding to the operating system.
Optionally, in some embodiments of the present application, the blacklist repository is locally stored in the form of a configuration file.
Fig. 11B is an exemplary schematic diagram of an instant messaging application intercepting an audio-video call or message according to an embodiment of the present application.
After receiving the audio/video call or message, the instant messaging application program inquires whether the communication identifier of the opposite terminal is positioned in the blacklist library.
If the instant messaging application program determines that the communication identifier of the opposite terminal is positioned in the blacklist library, the audio-video call or the message is intercepted.
Wherein different instant messaging applications and system applications can access the blacklist library.
Fig. 11C is another exemplary schematic diagram of an instant messaging application program intercepting a web phone or a web sms according to an embodiment of the present application.
After receiving the network telephone or the network short message, the instant messaging application program or the system application sends a query request to the telephone manager, wherein the query request comprises the communication identification of the opposite terminal user. The telephone manager inquires whether the communication identification of the opposite terminal user belongs to a blacklist library.
After the phone manager determines that the communication identifier of the user belongs to the blacklist library, the phone manager sends an indication message to the instant messaging application program or the system application, wherein the indication message is used for indicating the communication application program or the system application to intercept the network phone or the network short message.
Optionally, in some embodiments of the present application, after the instant communication application receives the message and the audio-video call, the instant communication application may also determine whether to intercept in the manner of fig. 11C.
As used in the above embodiments, the term "when …" may be interpreted to mean "if …" or "after …" or "in response to determination …" or "in response to detection …" depending on the context. Similarly, the phrase "at the time of determination …" or "if detected (a stated condition or event)" may be interpreted to mean "if determined …" or "in response to determination …" or "at the time of detection (a stated condition or event)" or "in response to detection (a stated condition or event)" depending on the context.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk), etc.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described method embodiments may be accomplished by a computer program to instruct related hardware, the program may be stored in a computer readable storage medium, and the program may include the above-described method embodiments when executed. And the aforementioned storage medium includes: ROM or random access memory RAM, magnetic or optical disk, etc.

Claims (32)

1. An account shielding method applied to a system comprising a first server and a first electronic device, the method comprising:
after the first server receives a first message, the first server associates a first communication identifier with a second communication identifier based on the first message, wherein the first communication identifier is a communication identifier of a first user, and before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant messaging application program;
When the first server determines that the first communication identifier belongs to a first shielding list, the first server adds the second communication identifier to the first shielding list, wherein the first shielding list is a shielding list of a second user;
the first electronic equipment intercepts first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the first electronic equipment is the electronic equipment of the second user; or the first server intercepts first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
2. The method according to claim 1, wherein the method further comprises:
after the first server receives a second message, the first server associates the first communication identifier with a third communication identifier based on the second message, the second message is sent by an application server corresponding to an instant messaging application program, and the second message is used for indicating that the third communication identifier is associated with the first communication identifier, wherein before the application server associates the third communication identifier with the first communication identifier, the third communication identifier does not exist or is not associated with the first communication identifier;
The first server adds the third communication to the first blacklist.
3. The method of claim 1 or 2, wherein before the first server receives the first message, the method further comprises:
the first server receives a third message sent by the first electronic device, wherein the third message comprises the first communication identifier;
the first server adds the first communication identifier to the first shielding list;
the first server determines a fourth communication identifier associated with the first communication identifier;
the first server adds the fourth communication to the first masked list.
4. The method of claim 3, wherein the step of,
before the first server receives the first message, the method further comprises: the first server receives a logout request, and the first server logout a first account, wherein the first account is the first communication identifier;
the first message is used for registering the second account number based on a first cellular number, the first cellular number is the fourth communication identifier, and the second account number is the second communication identifier.
5. A method according to any one of claims 1 to 3, wherein,
the first message is used for indicating the first server to register the second communication identifier based on the first communication identifier.
6. A method according to any one of claims 1 to 3, wherein,
the first communication identifier is a first cellular number, the first message is used for indicating the first server to bind the first cellular number and a first account, and the second communication identifier is the first account.
7. A method according to any one of claims 1 to 3, wherein,
the first communication identifier is a first cellular number, the second message is used for informing the first server that the cellular number of the first user also comprises a second cellular number, and the first message is sent after the electronic equipment of the first user detects the newly inserted SIM card.
8. The method of any of claims 1-6, wherein the system further comprises a second server, the method further comprising:
the first server sends a fourth message to the second server, wherein the fourth message comprises a fifth communication identifier, and the fifth communication identifier is a communication identifier in the first shielding list;
After the second server determines a sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server, where the fifth message includes the sixth communication identifier,
the first server adds the fifth communication identifier to the first mask list.
9. An account shielding method, applied to a first server, comprising:
after the first server receives a first message, the first server associates a first communication identifier with a second communication identifier based on the first message, wherein the first communication identifier is a communication identifier of a first user, and before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by electronic equipment of the first user, and the communication identifier is a cellular number or an account of an instant messaging application program;
when the first server determines that the first communication identifier belongs to a first shielding list, the first server adds the second communication identifier to the first shielding list, wherein the first shielding list is a shielding list of a second user;
The first server intercepts first communication, communication identification of an initiator of the first communication is in the first shielding list, and communication identification of a receiver of the first communication is communication identification of the second user.
10. The method according to claim 9, wherein the method further comprises:
after the first server receives a second message, the first server associates the first communication identifier with a third communication identifier based on the second message, the second message is sent by an application server corresponding to an instant messaging application program, and the second message is used for indicating that the third communication identifier is associated with the first communication identifier, wherein before the application server associates the third communication identifier with the first communication identifier, the third communication identifier does not exist or is not associated with the first communication identifier;
the first server adds the third communication to the first blacklist.
11. The method according to claim 9 or 10, wherein before the first server receives the first message, the method further comprises:
The first server receives a third message sent by the first electronic device, wherein the third message comprises the first communication identifier;
the first server adds the first communication identifier to the first shielding list;
the first server determines a fourth communication identifier associated with the first communication identifier;
the first server adds the fourth communication to the first masked list.
12. The method of claim 11, wherein the step of determining the position of the probe is performed,
before the first server receives the first message, the method further comprises: the first server receives a logout request, and the first server logout a first account, wherein the first account is the first communication identifier;
the first message is used for registering the second account number based on a first cellular number, the first cellular number is the fourth communication identifier, and the second account number is the second communication identifier.
13. The method according to any one of claims 9 to 11, wherein,
the first message is used for indicating the first server to register the second communication identifier based on the first communication identifier.
14. The method according to any one of claims 9 to 11, wherein,
The first communication identifier is a first cellular number, the first message is used for indicating the first server to bind the first cellular number and a first account, and the second communication identifier is the first account.
15. The method according to any one of claims 9 to 11, wherein,
the first communication identifier is a first cellular number, the second message is used for informing the first server that the cellular number of the first user also comprises a second cellular number, and the first message is sent after the electronic equipment of the first user detects the newly inserted SIM card.
16. An account shielding method applied to a system comprising a first server and a first electronic device, the method comprising:
the first electronic equipment sends a first message to the first server, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program;
the first server determining a first cellular number associated with the first communication identity;
the first server sends a first cellular number to the first electronic device;
the first electronic equipment intercepts first communication, wherein the first communication is a cellular call or a cellular short message corresponding to the first cellular number.
17. The method of claim 16, wherein after the first server receives the first message, the method further comprises:
the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account;
the first server intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account to the account of the first user.
18. The method of claim 16, wherein after the first server receives the first message, the method further comprises:
the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account;
The first server sends a third message to the first electronic device, wherein the third message comprises a first account number;
the first electronic equipment intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account.
19. An account shielding method applied to a first server, the method comprising:
the method comprises the steps that a first server receives a first message sent by first electronic equipment, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program;
the first server determining a first cellular number associated with the first communication identity;
the first server sends a second message to the first electronic equipment, the second message comprises the first cellular number, and the cellular call or the cellular short message corresponding to the first cellular number is intercepted by the first electronic equipment.
20. The method of claim 19, wherein after the first server receives the first message sent by the first electronic device, the method further comprises:
the first server receives a second message, the first server determines that a second communication identifier is associated with the first cellular number based on the second message, the second message is used for instructing the first server to register the first account based on the first cellular number, or the second message is used for instructing the first server to bind the first cellular number and the first account;
The first server intercepts second communication, wherein the second communication is an audio-video call, a network telephone, a network short message or a message initiated by the first account to the account of the first user.
21. An account shielding method applied to a first electronic device, the method comprising:
after the first electronic device determines that a first communication identifier is in a first shielding list, the first electronic device determines a second communication identifier associated with the first communication identifier, wherein the second communication identifier is a second cellular number when the first communication identifier is a first cellular number; in the case that the first communication identifier is a first account, the second communication identifier is a first cellular number, and the communication identifier is a cellular number or an account number of an instant messaging application program;
adding the second communication identification to the first masked list at the first electronic device;
the first electronic equipment intercepts first communication, and the identification of an initiator of the first communication is a communication identification in the first shielding list.
22. The method according to claim 21, wherein the first electronic device determines a second communication identity associated with the first communication identity, in particular comprising:
The system application sends a first message to one or more instant messaging application programs, wherein the first message comprises the first communication identifier, and the one or more instant messaging application programs comprise a first application program;
the first application program determines that the second communication identifier is associated with the first communication identifier;
the first application program sends a second message to the system application, the second message including the second communication identity
The system application determines that the second communication identity is associated with the first communication identity.
23. An account shielding method, applied to a system including a first electronic device, a second electronic device, and a first server, the method comprising:
the first electronic equipment sends a first message to the first server, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program;
the first server determines a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device;
the first server sends a second communication identifier to the second electronic equipment, wherein the second communication identifier is a communication identifier of a user on the first electronic equipment;
After receiving the second communication identifier, the second electronic device intercepts the first communication, and the identifier of the receiver of the first communication is the second communication identifier.
24. An account shielding method, applied to a first server, comprising:
the first server receives a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program;
the first server determines a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device;
the first server sends a second message to the second electronic device, wherein the second message comprises the second communication identifier, the second communication identifier is a communication identifier of a user on the first electronic device, the second message is used for indicating the second electronic device to intercept the first communication, and a communication identifier of a receiver of the first communication is the second communication identifier.
25. An account shielding method, applied to a second electronic device, the method comprising:
receiving a first message, wherein the first message comprises a first communication identifier, and the communication identifier is a cellular number or an account number of an instant communication application program;
A first communication is intercepted, and a communication identifier of a receiver of the first communication is the first communication identifier.
26. A server, the server comprising: one or more processors and memory;
the memory is coupled to the one or more processors, the memory for storing computer program code comprising computer instructions that the one or more processors invoke to cause the electronic device to perform the method of any of claims 9-15, 19, 20, or 24.
27. An electronic device, the electronic device comprising: one or more processors and memory;
the memory is coupled to the one or more processors, the memory for storing computer program code comprising computer instructions that the one or more processors invoke to cause the electronic device to perform the method of claim 21, 22, or 25.
28. A chip system for application to an electronic device, the chip system comprising one or more processors configured to invoke computer instructions to cause the electronic device to perform the method of any of claims 9-15, 19-22, 24 or 25.
29. A computer readable storage medium comprising instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of claims 9-15, 19-22, 24 or 25.
30. A communication system comprising a first electronic device and a first server, wherein,
the first server is configured to associate a first communication identifier with a second communication identifier based on a first message after receiving the first message, where the first communication identifier is a communication identifier of a first user, and before the first server receives the first message, the second communication identifier does not exist or is not associated with the first communication identifier, the first message is sent by an electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application program;
the first server is configured to add the second communication identifier to a first mask list when it is determined that the first communication identifier belongs to the first mask list, where the first mask list is a mask list of a second user
The first electronic device is used for intercepting first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the first electronic device is the electronic device of the second user; or the first server is used for intercepting first communication, the communication identifier of the initiator of the first communication is in the first shielding list, and the communication identifier of the receiver of the first communication is the communication identifier of the second user.
31. A communication system comprising a first electronic device and a first server, wherein,
the first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program;
the first server is configured to determine a first cellular number associated with the first communication identity;
the first server is used for sending a first cellular number to the first electronic equipment;
the first electronic device is configured to intercept a first communication, where the first communication is a cellular call or a cellular short message corresponding to the first cellular number.
32. A communication system comprising a first electronic device, a second electronic device, and a first server, wherein,
the first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account number of an instant messaging application program;
the first server is used for determining a second electronic device based on the first communication identifier, wherein the first communication identifier is a communication identifier of a user on the second electronic device;
The first server is used for sending a second communication identifier to the second electronic equipment, wherein the second communication identifier is a communication identifier of a user on the first electronic equipment;
the second electronic device is configured to intercept a first communication after receiving the second communication identifier, where an identifier of a receiver of the first communication is the second communication identifier.
CN202211062344.6A 2022-05-16 2022-08-31 Account shielding method, communication system and electronic equipment Pending CN117119098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/094171 WO2023221917A1 (en) 2022-05-16 2023-05-15 Account shielding method, communication system, and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210529855 2022-05-16
CN2022105298558 2022-05-16

Publications (1)

Publication Number Publication Date
CN117119098A true CN117119098A (en) 2023-11-24

Family

ID=88807925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211062344.6A Pending CN117119098A (en) 2022-05-16 2022-08-31 Account shielding method, communication system and electronic equipment

Country Status (2)

Country Link
CN (1) CN117119098A (en)
WO (1) WO2023221917A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
US8913994B2 (en) * 2012-11-02 2014-12-16 Lookout, Inc. System and method for call blocking and SMS blocking
CN102970362B (en) * 2012-11-15 2015-12-09 小米科技有限责任公司 The method of a kind of high in the clouds data sharing and device
WO2016011614A1 (en) * 2014-07-23 2016-01-28 华为技术有限公司 Method and device for blocking harassment number
CN107580357A (en) * 2017-10-27 2018-01-12 努比亚技术有限公司 Limitation communication means, equipment and the computer-readable storage medium of a kind of black list user
CN107911530A (en) * 2017-11-27 2018-04-13 努比亚技术有限公司 Message prompt method, communication hold-up interception method, terminal and computer-readable storage medium

Also Published As

Publication number Publication date
WO2023221917A1 (en) 2023-11-23

Similar Documents

Publication Publication Date Title
CN114467297B (en) Video call display method and related device applied to electronic equipment
CN113806105B (en) Message processing method, device, electronic equipment and readable storage medium
CN113254409B (en) File sharing method, system and related equipment
CN116360725B (en) Display interaction system, display method and device
CN113973398B (en) Wireless network connection method, electronic equipment and chip system
WO2021052204A1 (en) Address book-based device discovery method, audio and video communication method, and electronic device
CN111615820B (en) Method and equipment for performing domain name resolution by sending key value to GRS server
CN113821767A (en) Application program authority management method and device and electronic equipment
CN116048358B (en) Method and related device for controlling suspension ball
CN116486500B (en) Mail sending method and electronic equipment
CN115017498B (en) Method for operating applet and electronic device
CN114338642B (en) File transmission method and electronic equipment
CN116527266A (en) Data aggregation method and related equipment
WO2020216144A1 (en) Method for adding mail contact, and electronic device
WO2023221917A1 (en) Account shielding method, communication system, and electronic device
CN116346982B (en) Method for processing audio, electronic device and readable storage medium
CN116743921B (en) Method for displaying number-carrying network number, electronic equipment and storage medium
CN114205318B (en) Head portrait display method and electronic equipment
CN116795476B (en) Wallpaper deleting method and electronic equipment
CN116709609B (en) Message delivery method, electronic device and storage medium
EP4290375A1 (en) Display method, electronic device and system
CN117251223A (en) Cloud function plug-in configuration and scheduling method, system and electronic equipment
CN116560535A (en) Application component management method and related equipment
CN117917632A (en) Display method, electronic equipment and system
CN117784990A (en) Method and related device for displaying icons of application programs in task bar

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination