WO2016000636A1 - Communications processing method and system - Google Patents

Communications processing method and system Download PDF

Info

Publication number
WO2016000636A1
WO2016000636A1 PCT/CN2015/083176 CN2015083176W WO2016000636A1 WO 2016000636 A1 WO2016000636 A1 WO 2016000636A1 CN 2015083176 W CN2015083176 W CN 2015083176W WO 2016000636 A1 WO2016000636 A1 WO 2016000636A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
communication
peer
terminal
module
Prior art date
Application number
PCT/CN2015/083176
Other languages
French (fr)
Chinese (zh)
Inventor
谭少卿
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2016000636A1 publication Critical patent/WO2016000636A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a communication processing method and system.
  • the communication request of the unknown communication identifier is often received, and some unknown communication identifiers are saved by the user.
  • the unknown communication identifier is a newly recognized current user. Friends, the two exchange their respective communication logos with each other. At this time, the user needs to save the unknown communication identifier, but there are many problems in the process of saving the communication identifier.
  • the user when storing an unknown communication identifier, the user needs to perform a series of click operations to open the contact addition page in the address book, and needs to frequently switch between different interfaces, which is cumbersome, time consuming, and efficient. Low; affects the user's experience, and also increases the operation and processing burden of the terminal system. Further, the user needs to input the communication identifier by himself, and the input process takes a long time, and the input result has poor reliability and low accuracy.
  • the present invention has been made in order to provide a communication processing method and a corresponding communication processing system that overcome the above problems or at least partially solve the above problems.
  • a communication processing method including:
  • the communication information includes: a communication identifier
  • a communication processing system comprising:
  • the monitoring module is configured to monitor the communication in the terminal, and obtain the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
  • the comparison module is configured to compare the obtained communication identifier of the peer end with the contact information in the address book application;
  • Generating a module configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information
  • the first adding module is configured to add the obtained communication identifier of the peer end to a corresponding location of the newly created contact page.
  • a computer program comprising computer readable code, when said computer readable code is run on a terminal, causing said terminal to perform according to any one of claims 1-15 The communication processing method described.
  • a computer readable medium storing the computer program according to claim 31 is provided.
  • the communication processing method and system provided by the present invention by monitoring the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information; When the communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified, and the operation is simplified.
  • the communication processing efficiency saves time and reduces the operation and processing burden of the terminal system. Further, the communication standard The automatic addition to the corresponding position of the newly created contact page avoids the manual input process of the user, improves the efficiency, and ensures the accuracy of the result.
  • FIG. 1 is a flow chart of a communication processing method in a first embodiment of the present invention
  • FIG. 2 is a flow chart of a communication processing method in a second embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for determining current communication security in a second embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a newly created contact page in a second embodiment of the present invention.
  • Figure 5 is a flowchart of a communication processing method in a third embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a newly created contact page in a third embodiment of the present invention.
  • Figure 7 is a block diagram showing the structure of a communication processing system in a fourth embodiment of the present invention.
  • Figure 8 is a block diagram showing the structure of a communication processing system in a fifth embodiment of the present invention.
  • FIG. 9 is a structural block diagram of a terminal for performing a communication processing method according to an embodiment of the present invention.
  • Figure 10 is a memory unit of the present invention for holding or carrying program code implementing a communication processing method in accordance with an embodiment of the present invention.
  • the communication processing method includes:
  • Step 102 Monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
  • the communication between the terminal and the peer end includes, but is not limited to, a telephone call, a short message, and a voice call and an instant message through IM (Instant Messaging) software.
  • IM Instant Messaging
  • commonly used IM software includes: QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wangwang and so on.
  • the monitoring of the communication situation in the terminal may include: monitoring the access communication and monitoring the outgoing communication.
  • the opposite end is the receiving side, and the terminal is the sending side; when the current communication is initiated by the opposite end side, the terminal is the receiving side, and the opposite end is sender.
  • the communication information includes: a communication identifier.
  • the terminal is a mobile phone terminal, and the communication is performed by making a call/answering a call and transmitting and receiving a short message
  • the communication identifier of the opposite end may be the mobile phone number of the opposite end.
  • the terminal is a PC (Personal Computer) or a mobile phone terminal
  • the communication is an instant communication session (eg, QQ voice, QQ video, WeChat, etc.)
  • the communication identifier of the peer end may be corresponding to the peer end.
  • the user's instant communication number eg, QQ number, micro signal, etc.).
  • Step 104 Compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • Step 106 When the acquired communication identifier of the peer does not match the contact information, generate a new contact page.
  • the acquired communication identifier of the peer is not in the terminal's address book, or when the obtained communication identifier of the peer is not the friend number in the user's instant communication (eg, QQ friend number) When the WeChat friend number, etc.), determine the communication identity of the obtained peer Does not match the contact information, that is, an unfamiliar communication identifier.
  • Step 108 Add the obtained communication identifier of the peer end to the corresponding location of the newly created contact page.
  • the acquired communication identifier of the peer end may be automatically added to the corresponding location of the newly created contact page.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the third party application installed on the terminal side may be used to execute the communication processing method.
  • the method for executing the communication processing method is not limited to a third-party application on the terminal side, and a function module for executing the communication processing method may also be a function module of the terminal, for example, The function module is set in the operating system of the terminal or the address book application of the terminal.
  • the method for executing the communication processing method may also be a function module in a third-party application on the terminal side, such as a function module in a security application (for example, 360 mobile phone security guard) in the terminal.
  • the communication processing method includes:
  • Step 202 The third-party application monitors communications in the terminal, and obtains communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the communication between the terminal and the peer end may be voice communication (eg, telephone communication, QQ voice communication, etc.), or may be video communication (eg, video call, QQ video call). Etc.), it can also be text communication (eg, text message, text chat using QQ, etc.).
  • voice communication eg, telephone communication, QQ voice communication, etc.
  • video communication eg, video call, QQ video call.
  • Etc. it can also be text communication (eg, text message, text chat using QQ, etc.).
  • the communication processing method described in this embodiment may be, but is not limited to, performed in the following situations:
  • the communication processing method is executed after the terminal is turned on and then hangs up the communication; or the communication processing method is executed after the communication is not turned on and then hang up.
  • the communication processing method is executed after the terminal dials and then hangs up the communication; or the communication processing method is executed after the communication is not dialed and then hangs up.
  • Step 204 The third-party application compares the acquired communication identifier of the peer end with the contact information in the address book application.
  • the process may be directly ended.
  • step 206 is performed.
  • Step 206 When the obtained communication identifier of the opposite end does not match the contact information, the third-party application determines the security of the current communication.
  • the third-party application may directly judge through the security judgment module in the third-party application, or may invoke other security applications (eg, 360 mobile security guards). Judging, this embodiment does not limit this.
  • the step 206 may specifically include:
  • Sub-step S302 when the obtained communication identifier of the opposite end does not match the contact information, the third-party application compares the communication identifier of the opposite end with the data in the preset black/white list.
  • the data stored in the white list is a communication identifier corresponding to the communication that has been determined to be secure.
  • the data stored in the blacklist is a communication identifier corresponding to communication that has been determined to be fraud, and/or communication of a fake message, and/or communication of phishing, and/or communication of a Trojan, and/or communication of a pseudo base station.
  • the communication identifier of the peer matches the data in the blacklist, it may be determined that the current communication is a high-risk risk communication (eg, fraud communication, pseudo base station communication, etc.), and at this time, the third-party application directly intercepts the current communication. , end this process.
  • a high-risk risk communication eg, fraud communication, pseudo base station communication, etc.
  • the sub-step S304 may be continued.
  • the sub-step S304 may be further performed.
  • Sub-step S304 The third-party application acquires call information and tag information of the peer end that communicates with the terminal.
  • the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair Time distribution information when the terminal performs communication, the number of times the peer end sends and receives information, the communication identifier of the peer end is added to at least one of a contact and a number of times added to the blacklist; the tag information includes The number of times the communication identifier of the peer is marked as malicious and/or spam, the number of times the communication identifier of the peer appears on a page determined to be malicious and/or spam, sent using the communication identifier of the peer At least one of the number of times the information is marked as malicious and/or spam.
  • Sub-step S306 the third-party application matches the call information and/or the tag information with a preset interception policy to determine a matching result.
  • the preset interception policy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  • the third-party application matches the call information and/or the tag information with the preset interception policy, and determining the matching result may specifically include: determining, according to the call information and/or the tag information, the current call. The number of matching subintercept strategies.
  • Sub-step S308 the third-party application determines the risk of the current communication according to the matching result. level.
  • the determining the risk level of the current communication according to the matching result may include: determining a risk level of the current communication according to the number of the sub-interception policies that match the current communication. among them,
  • the third-party application may directly intercept the current communication, and end the current process.
  • the third-party application may load the display risk prompt information to prompt the user that the current communication is at risk, and may perform step 208.
  • step 208 is performed.
  • step 208 the third party application generates a new contact page.
  • the distance between the terminal and the peer end can be determined before the new contact page is generated.
  • the specific process is as follows:
  • the third-party application separately obtains location information of the terminal and the peer.
  • the location information may be obtained by using any known location information acquisition method.
  • the third-party application determines the distance between the terminal and the opposite end according to the location information of the terminal and the peer.
  • the above step 208 is performed, and the third party application generates a new contact page.
  • the third-party application may separately obtain the network information of the terminal and the peer before generating the newly created contact page.
  • the network information includes, but is not limited to, at least one of wireless fidelity (WIFI) information, base station information, and local area network information.
  • WIFI wireless fidelity
  • the third-party application determines whether the terminal and the peer have the same network information, and when the terminal and the peer have the same network information, perform the step of generating a new contact page.
  • the third-party application separately obtains the WIFI information of the terminal and the peer from the cloud server. Then, the third-party application determines, according to the WIFI information of the terminal and the peer, whether the terminal and the peer share the same WIFI. Finally, when it is determined that the terminal and the peer share the same WIFI, the third-party application performs the step of generating a new contact page.
  • the generating, by the third-party application, the newly created contact page may include: the third-party application generates the newly created contact page according to the set format.
  • the third-party application generates the new contact page according to the set format.
  • the new contact page may be generated according to the default format corresponding to the address book application by calling the address book application.
  • the address book application may be a system address book application on the terminal side.
  • the setting format is a template of a newly created contact page corresponding to the system address book application.
  • the address book application may also be a template in the third-party application or other application, and the format of the template matches the format of the newly created contact page, so as to make the format of the generated new contact page more diverse. Enriched to meet user needs.
  • the setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • FIG. 4 it is a schematic diagram of a newly created contact page in the second embodiment of the present invention.
  • the format of the new contact page includes four options: communication identifier, name, gender, and email.
  • Step 210 The third-party application adds the acquired communication identifier of the peer to the new contact. The corresponding location of the page.
  • the third party application adds the acquired communication identifier of the peer to the corresponding location of the communication identification option shown in FIG. 4.
  • Step 212 The third-party application acquires personal information of the user corresponding to the peer end from the cloud.
  • the third-party application can obtain the current connection with the terminal, in addition to monitoring the communication in the terminal.
  • the communication identifier of the peer end of the communication can also obtain more information of the peer end, that is, the personal information of the user from the cloud.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • Step 214 The third party application adds the acquired personal information to a corresponding option location in the set format.
  • step 216 the third party application responds to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
  • Step 218 The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
  • the third party application adds the information corresponding to the name information addition request to the position corresponding to the name option shown in FIG. 4, and adds the information corresponding to the gender information addition request to the position corresponding to the gender option shown in FIG. ,Wait.
  • Step 220 The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • the mobile phone call is taken as an example, that is, the terminal and the opposite end are mobile phone terminals, and the communication performed is a mobile phone call, and the current communication is a call request initiated by the opposite end to the terminal.
  • the communication processing method is executed. Specifically, the flow of the communication processing method is as follows:
  • the communication processing method includes:
  • Step 502 The third-party application monitors the communication in the terminal, and obtains the phone number of the peer currently communicating with the terminal.
  • the third-party application is an application installed in a terminal (eg, a mobile phone terminal).
  • step 504 the third party application compares the obtained phone number with the contact information.
  • the user corresponding to the peer that initiates the call request to the terminal is the contact of the user corresponding to the terminal, which is a known number. End this process directly.
  • step 506 is performed.
  • step 506 the third party application determines the security of the current communication.
  • the current communication can be divided into high-risk level, risk level, suspicious level and security level. It should be noted here that the level of current communication may include, but is not limited to, the above four levels.
  • the current communication is directly intercepted, and the process ends.
  • step 508 is performed.
  • step 510 is performed.
  • step 508 the third party application generates a risk prompt page.
  • the third party application loads the display risk prompt information on the risk prompt page to prompt the user that the current communication is a risk communication or a suspicious communication.
  • the risk prompt page further includes: a first trigger operation option and a second trigger operation option. If the user triggers the first trigger operation option after browsing the risk prompt information, canceling the generate new contact page ends the current process; if the user triggers the second trigger operation option after browsing the risk prompt information, Then step 510 is performed.
  • Step 510 When the user triggers the second trigger operation option, the third party application generates a new contact page.
  • the third party application generates the new contact page according to the set format.
  • the setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • the newly created contact page may be a newly created contact page in the system address book of the mobile terminal, or may be a newly created contact page different from the system address book set by the third party application, but the same as the system address book, the third party
  • the newly created contact page of the application settings can also save the contact information to the system for use, or the contact information can be transmitted to the system address book and saved and used through the system address book. Referring to FIG.
  • the format of the new contact page includes four options: communication identifier, name, gender, and email.
  • the format of the page may be the same as or different from the newly created contact page of the system address book.
  • Step 512 The third-party application acquires personal information of the user corresponding to the peer end from the cloud, and Adding the personal information and the acquired phone number of the opposite end to the corresponding location of the newly created contact page.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • the third party application adds the acquired name information "Zhang San” to the corresponding name option, and adds the phone number "123456" acquired in step 502 to the corresponding phone number option.
  • step 514 the third party application responds to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
  • Step 516 The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
  • the user can directly input “male” at the position corresponding to the gender option, and input “123@456.com” at the position corresponding to the email option.
  • Step 518 The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
  • the processing may be performed by referring to the flow of the communication processing method in this embodiment.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, and the various items in the newly created contact page are improved.
  • the content of the newly created contact page is improved, and the operation of verifying the search by the user is reduced.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • FIG. 7 a block diagram of a communication processing system in a fourth embodiment of the present invention is shown.
  • the communication processing system includes:
  • the monitoring module 702 is configured to monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the comparison module 704 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • the generating module 706 is configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information.
  • the first adding module 708 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
  • the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the communication processing system includes:
  • the monitoring module 802 is configured to monitor communications in the terminal to obtain communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the comparison module 804 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • the determining module 806 is configured to determine the security of the current communication when the acquired communication identifier of the peer does not match the contact information.
  • the determining module 806 includes:
  • the data comparison module 8062 is configured to compare the communication identifier of the peer end with the data in the preset black/white list.
  • the first determining module 8064 is configured to determine that the current communication is a secure communication when the communication identifier of the peer matches the data in the whitelist.
  • the information acquisition module 8068 may continue to be executed.
  • the second determining module 8066 is configured to determine that the current communication is a high-risk communication when the communication identifier of the peer end matches the data in the blacklist.
  • the current communication may be directly intercepted by the intercepting module, and the current process is received.
  • the information obtaining module 8068 is configured to acquire call information and tag information of the peer end that communicates with the terminal.
  • the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair End Time distribution information during communication, the number of times the peer sends and receives information, the communication identifier of the peer is added to at least one of a contact and a number of times added to the blacklist;
  • the tag information includes: The number of times the communication identifier of the peer end is marked as malicious and/or spam communication, the number of times the communication identifier of the peer end appears on the page determined to be malicious and/or spam, and the information sent using the communication identifier of the peer is At least one of the number of times marked as malicious and/or spam.
  • the matching module 80610 is configured to match the call information and/or the tag information with a preset interception policy to determine a matching result.
  • the preset interception strategy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  • the matching module 80610 is specifically configured to determine, according to the call information and/or the tag information, the number of sub-interception strategies that match the current incoming call.
  • the risk level determination module 80612 is configured to determine a risk level of the current communication based on the matching result.
  • the risk level determining module 80612 is specifically configured to determine a risk level of the current communication according to the number of sub-intercepting strategies that match the current communication. among them,
  • the security determining module 80614 is configured to determine that the current communication is a secure communication when it is determined that the risk level of the current communication is a security level according to the matching result.
  • the location information acquisition module 808 can be executed.
  • the location information obtaining module 808 is configured to separately obtain location information of the terminal and the peer end.
  • the distance determining module 810 is configured to determine a distance between the terminal and the opposite end according to location information of the terminal and the opposite end.
  • the generating module 816 is executed when the distance determining module 810 determines that the distance is less than or equal to the set distance.
  • the network information acquisition module 812 can be executed when it is determined that the current communication is a secure communication.
  • the network information obtaining module 812 is configured to acquire network information of the terminal and the peer end before the generating module generates a new contact page.
  • the network information includes at least one of the following: wireless fidelity WIFI information, base station information, and local area network information.
  • the network information determining module 814 is configured to determine whether the terminal and the peer end have the same network information; and when the terminal and the peer end are determined to have the same network information, the generating module 816 is executed.
  • a generation module 816 is configured to generate a new contact page.
  • the generating module 816 is configured to generate the newly created contact page according to a set format when the acquired peer communication identifier does not match the contact information.
  • the setting format includes at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • the generating module 816 is configured to: when the obtained peer communication identifier does not match the contact information, invoke the address book application, and generate according to a default format corresponding to the address book application. Create a new contact page.
  • the personal information obtaining module 818 is configured to acquire personal information of the user corresponding to the peer end from the cloud.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • the third adding module 820 is configured to add the acquired personal information to a corresponding option location in the set format.
  • the first adding module 822 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
  • the first response module 824 is configured to respond to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one
  • the second adding module 826 is configured to add information corresponding to the adding request to a corresponding option location in the setting format.
  • the second response module 828 is configured to save the newly added new contact page update to the address book application in response to the save operation request.
  • the communication processing system may be executed after the current communication is not connected to hang up, or after the hang up.
  • the current communication includes at least one of voice communication, video communication, and text communication.
  • the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, the various contents in the newly created contact page are improved, and the newly created contact page is improved. Content integrity reduces the user's ability to verify the search.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the communication processing device in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • FIG. 9 shows a structural block diagram of a terminal for executing a communication processing method according to an embodiment of the present invention.
  • the terminal conventionally includes a processor 910 and a computer program product or computer readable medium in the form of a memory 920.
  • the memory 920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above.
  • storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the terminal of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 931', code that can be read by a processor, such as 910, which, when executed by a server, causes the server to perform various steps in the methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed are a communications processing method and system. The method comprises: monitoring the communications in a terminal and obtaining the communication information of the opposite end with which the terminal is currently in communication; the communications information comprises: a communications identifier; comparing the obtained communications identifier of the opposite end with contact person information in an address book application; if the obtained communications identifier of the opposite end does not match the contact person information, generating a new contact person page; adding the obtained communications identifier of the opposite end to the corresponding position on the new contact person page. The present invention solves the problem of tedious and inefficient operation when a user stores an unknown communications identifier.

Description

一种通信处理方法和系统Communication processing method and system 技术领域Technical field
本发明涉及通信技术领域,具体涉及一种通信处理方法和系统。The present invention relates to the field of communications technologies, and in particular, to a communication processing method and system.
背景技术Background technique
随着通信技术的不断发展,通信的方式也越来越多,如,用户可以使用手机进行电话通信,使用即时聊天软件进行即时交流。用户在使用各种通信方式进行通信时,经常会接收到一些未知通信标识的通信请求,其中,一些未知通信标识是用户需要进行保存的,如,所述未知通信标识是当前用户新认识的一个朋友,两人彼此之间在交换各自的通信标识。此时,用户需要对所述未知通信标识进行保存,然而在保存所述通信标识过程中,会存在很多问题。With the continuous development of communication technology, there are more and more ways of communication. For example, users can use mobile phones for telephone communication and instant chat software for instant communication. When the user communicates by using various communication methods, the communication request of the unknown communication identifier is often received, and some unknown communication identifiers are saved by the user. For example, the unknown communication identifier is a newly recognized current user. Friends, the two exchange their respective communication logos with each other. At this time, the user needs to save the unknown communication identifier, but there are many problems in the process of saving the communication identifier.
以手机通信为例,用户A在接听一个未知来电后,确定所述未知来电是自己的好友用户B在更换手机号后,使用新的手机号拨打来的。当挂断电话后,用户A想保存所述未知来电对应的号码,此时,用户需要通过一系列的点击选择操作打开通讯录中的联系人添加页面,然后将手机号码手动输入到联系人添加页面中,又或者,在添加过程中通过页面之间的来回切换,先切换至通信记录查看所述手机号码,然后再切换至联系人添加页面输入所述手机号码。Taking mobile communication as an example, after answering an unknown call, user A determines that the unknown call is his friend B. After replacing the mobile phone number, the user dials the new mobile phone number. After hanging up the phone, user A wants to save the number corresponding to the unknown call. At this time, the user needs to open the contact add page in the address book through a series of click selection operations, and then manually input the mobile phone number to the contact to add. In the page, or in the process of adding, by switching back and forth between the pages, first switch to the communication record to view the mobile phone number, and then switch to the contact adding page to input the mobile phone number.
由此可见,用户在存储一个未知通信标识时,需要进行一系列的点击操作打开通讯录中的联系人添加页面,且需要在不同的界面之间进行频繁的切换,操作繁琐、浪费时间、效率低;影响用户的使用体验,而且也增加了终端系统的操作和处理负担。进一步地,需要用户自行进行通信标识的输入,输入过程耗时久,输入结果可靠性差、准确度低。Therefore, when storing an unknown communication identifier, the user needs to perform a series of click operations to open the contact addition page in the address book, and needs to frequently switch between different interfaces, which is cumbersome, time consuming, and efficient. Low; affects the user's experience, and also increases the operation and processing burden of the terminal system. Further, the user needs to input the communication identifier by himself, and the input process takes a long time, and the input result has poor reliability and low accuracy.
发明内容Summary of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的一种通信处理方法和相应的一种通信处理系统。 In view of the above problems, the present invention has been made in order to provide a communication processing method and a corresponding communication processing system that overcome the above problems or at least partially solve the above problems.
依据本发明的一个方面,提供了一种通信处理方法,包括:According to an aspect of the present invention, a communication processing method is provided, including:
对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息;其中,所述通信信息包括:通信标识;Monitoring the communication in the terminal, and acquiring the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
将获取的对端的通信标识与通讯录应用中的联系人信息进行比较;Comparing the obtained communication identifier of the peer end with the contact information in the address book application;
当获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面;Generating a new contact page when the obtained communication identifier of the peer does not match the contact information;
将获取的对端的通信标识添加至所述新建联系人页面的对应位置。Adding the acquired communication identifier of the peer end to the corresponding location of the new contact page.
根据本发明的另一方面,提供了一种通信处理系统,包括:According to another aspect of the present invention, a communication processing system is provided, comprising:
监测模块,配置为对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息;其中,所述通信信息包括:通信标识;The monitoring module is configured to monitor the communication in the terminal, and obtain the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
比较模块,配置为将获取的对端的通信标识与通讯录应用中的联系人信息进行比较;The comparison module is configured to compare the obtained communication identifier of the peer end with the contact information in the address book application;
生成模块,配置为在获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面;Generating a module, configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information;
第一添加模块,配置为将获取的对端的通信标识添加至所述新建联系人页面的对应位置。The first adding module is configured to add the obtained communication identifier of the peer end to a corresponding location of the newly created contact page.
根据本发明的又一方面,提供了一种计算机程序,包括计算机可读代码,当所述计算机可读代码在终端上运行时,导致所述终端执行根据权利要求1-15中的任一个所述的通信处理方法。According to still another aspect of the present invention, there is provided a computer program comprising computer readable code, when said computer readable code is run on a terminal, causing said terminal to perform according to any one of claims 1-15 The communication processing method described.
根据本发明的再一方面,提供了一种计算机可读介质,其中存储了如权利要求31所述的计算机程序。According to still another aspect of the present invention, a computer readable medium storing the computer program according to claim 31 is provided.
本发明的有益效果为:The beneficial effects of the invention are:
本发明提供的一种通信处理方法和系统,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率,节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标 识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。The communication processing method and system provided by the present invention, by monitoring the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information; When the communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified, and the operation is simplified. The communication processing efficiency saves time and reduces the operation and processing burden of the terminal system. Further, the communication standard The automatic addition to the corresponding position of the newly created contact page avoids the manual input process of the user, improves the efficiency, and ensures the accuracy of the result.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1是本发明第一实施例中一种通信处理方法的流程图;1 is a flow chart of a communication processing method in a first embodiment of the present invention;
图2是本发明第二实施例中一种通信处理方法的流程图;2 is a flow chart of a communication processing method in a second embodiment of the present invention;
图3是本发明第二实施例中一种判断当前通信安全性的方法的流程图;3 is a flowchart of a method for determining current communication security in a second embodiment of the present invention;
图4是本发明第二实施例中一种新建联系人页面的示意图;4 is a schematic diagram of a newly created contact page in a second embodiment of the present invention;
图5是本发明第三实施例中一种通信处理方法的流程图;Figure 5 is a flowchart of a communication processing method in a third embodiment of the present invention;
图6是本发明第三实施例中一种新建联系人页面的示意图;6 is a schematic diagram of a newly created contact page in a third embodiment of the present invention;
图7是本发明第四实施例中一种通信处理系统的结构框图;Figure 7 is a block diagram showing the structure of a communication processing system in a fourth embodiment of the present invention;
图8是本发明第五实施例中一种通信处理系统的结构框图;Figure 8 is a block diagram showing the structure of a communication processing system in a fifth embodiment of the present invention;
图9是本发明一种用于执行根据本发明实施例的通信处理方法的终端的结构框图;以及,9 is a structural block diagram of a terminal for performing a communication processing method according to an embodiment of the present invention; and
图10是本发明一种用于保持或者携带实现根据本发明实施例的通信处理方法的程序代码的存储单元。Figure 10 is a memory unit of the present invention for holding or carrying program code implementing a communication processing method in accordance with an embodiment of the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更 透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Instead, these embodiments are provided to enable The disclosure is to be thoroughly understood and the scope of the disclosure may be fully conveyed to those skilled in the art.
实施例一Embodiment 1
参照图1,示出了本发明第一实施例中一种通信处理方法的流程图。在本实施例中,所述通信处理方法,包括:Referring to Fig. 1, there is shown a flow chart of a communication processing method in the first embodiment of the present invention. In this embodiment, the communication processing method includes:
步骤102,对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息。Step 102: Monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
在本实施例中,终端与对端的通信包括但不仅限于:通过终端进行的电话通话、短信,和通过IM(Instant Messaging,即时通讯)软件进行的语音通话、即时消息。其中,常用的IM软件包括:QQ、MSN Messenger、飞信、Skype、新浪UC、Google Talk、阿里旺旺等。In this embodiment, the communication between the terminal and the peer end includes, but is not limited to, a telephone call, a short message, and a voice call and an instant message through IM (Instant Messaging) software. Among them, commonly used IM software includes: QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wangwang and so on.
其中,对终端中的通信情况进行监测可以包括:监测接入的通信和监测呼出的通信。在当前通信是由终端侧发起时,则所述对端是接收方,所述终端是发送方;在当前通信是由对端侧发起时,则所述终端是接收方,所述对端是发送方。The monitoring of the communication situation in the terminal may include: monitoring the access communication and monitoring the outgoing communication. When the current communication is initiated by the terminal side, the opposite end is the receiving side, and the terminal is the sending side; when the current communication is initiated by the opposite end side, the terminal is the receiving side, and the opposite end is sender.
在本实施例中,所述通信信息包括:通信标识。较佳地,当终端是手机终端时,且进行的通信是拨打电话/接听电话以及收发短信时,所述对端的通信标识可以是所述对端的手机号码。当终端是PC端(Personal Computer,个人计算机)或手机终端,且进行的通信是即时通信会话(如,QQ语音、QQ视频、微信等)时,所述对端的通信标识可以是对端对应的用户的即时通信号码(如,QQ号、微信号等)。In this embodiment, the communication information includes: a communication identifier. Preferably, when the terminal is a mobile phone terminal, and the communication is performed by making a call/answering a call and transmitting and receiving a short message, the communication identifier of the opposite end may be the mobile phone number of the opposite end. When the terminal is a PC (Personal Computer) or a mobile phone terminal, and the communication is an instant communication session (eg, QQ voice, QQ video, WeChat, etc.), the communication identifier of the peer end may be corresponding to the peer end. The user's instant communication number (eg, QQ number, micro signal, etc.).
步骤104,将获取的对端的通信标识与通讯录应用中的联系人信息进行比较。Step 104: Compare the acquired communication identifier of the peer end with the contact information in the address book application.
步骤106,当获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面。Step 106: When the acquired communication identifier of the peer does not match the contact information, generate a new contact page.
较佳地,可以在当获取的所述对端的通信标识不在终端的通讯录中时,或,在当获取的所述对端的通信标识不是用户的即时通信中的好友号码(如,QQ好友号码,微信好友号码等)时,确定获取的对端的通信标识 与所述联系人信息不匹配,即是一个陌生通信标识。Preferably, when the acquired communication identifier of the peer is not in the terminal's address book, or when the obtained communication identifier of the peer is not the friend number in the user's instant communication (eg, QQ friend number) When the WeChat friend number, etc.), determine the communication identity of the obtained peer Does not match the contact information, that is, an unfamiliar communication identifier.
步骤108,将获取的对端的通信标识添加至所述新建联系人页面的对应位置。Step 108: Add the obtained communication identifier of the peer end to the corresponding location of the newly created contact page.
在本实施例中,可以将获取的对端的通信标识自动添加到所述新建联系人页面的对应位置。In this embodiment, the acquired communication identifier of the peer end may be automatically added to the corresponding location of the newly created contact page.
综上所述,本实施例所述的通信处理方法,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率,节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。In summary, the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information. When the acquired communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. The communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced. Further, the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
实施例二Embodiment 2
在本实施例中,用于执行所述通信处理方法的可以是安装在终端侧的第三方应用。但是,本领域技术人员应当明了的是,用于执行所述通信处理方法的并不仅限于终端侧的第三方应用,用于执行所述通信处理方法的也可以是终端的一个功能模块,如,该功能模块设置于终端的操作系统或者终端的通讯录应用中。或者,用于执行所述通信处理方法的还可以是终端侧的第三方应用中的一个功能模块,如:终端中的安全应用(如,360手机安全卫士)中的一个功能模块。In this embodiment, the third party application installed on the terminal side may be used to execute the communication processing method. However, it should be understood by those skilled in the art that the method for executing the communication processing method is not limited to a third-party application on the terminal side, and a function module for executing the communication processing method may also be a function module of the terminal, for example, The function module is set in the operating system of the terminal or the address book application of the terminal. Alternatively, the method for executing the communication processing method may also be a function module in a third-party application on the terminal side, such as a function module in a security application (for example, 360 mobile phone security guard) in the terminal.
参照图2,示出了本发明第二实施例中一种通信处理方法的流程图。在本实施例中,所述通信处理方法,包括:Referring to Figure 2, there is shown a flow chart of a communication processing method in a second embodiment of the present invention. In this embodiment, the communication processing method includes:
步骤202,第三方应用对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息。其中,所述通信信息包括:通信标识。Step 202: The third-party application monitors communications in the terminal, and obtains communication information of the peer currently communicating with the terminal. The communication information includes: a communication identifier.
在本实施例中,终端与对端之间进行的通信可以是语音通信(如,电话通信,QQ语音通信等),也可以是视频通信(如,视频电话,QQ视频通话 等),还可以是文本通信(如,短信,使用QQ进行的文本聊天等)。In this embodiment, the communication between the terminal and the peer end may be voice communication (eg, telephone communication, QQ voice communication, etc.), or may be video communication (eg, video call, QQ video call). Etc.), it can also be text communication (eg, text message, text chat using QQ, etc.).
较佳地,本实施例所述的通信处理方法可以但不仅限于在如下几种情况下执行:Preferably, the communication processing method described in this embodiment may be, but is not limited to, performed in the following situations:
在当前通信是由所述对端向所述终端发起时,When the current communication is initiated by the opposite end to the terminal,
当所述终端接通然后挂断该通信后执行所述通信处理方法;或在未接通然后挂断该通信后执行所述通信处理方法。The communication processing method is executed after the terminal is turned on and then hangs up the communication; or the communication processing method is executed after the communication is not turned on and then hang up.
在当前通信是由所述终端向所述对端发起时,When the current communication is initiated by the terminal to the opposite end,
当所述终端拨通然后挂断该通信后执行所述通信处理方法;或在未拨通然后挂断该通信后执行所述通信处理方法。The communication processing method is executed after the terminal dials and then hangs up the communication; or the communication processing method is executed after the communication is not dialed and then hangs up.
步骤204,第三方应用将获取的对端的通信标识与通讯录应用中的联系人信息进行比较。Step 204: The third-party application compares the acquired communication identifier of the peer end with the contact information in the address book application.
在本实施例中,当获取的对端的通信标识与所述联系人信息相匹配时,则所述对端对应的用户是所述终端对应的用户的联系人或好友,可以直接结束本次流程。In this embodiment, when the obtained communication identifier of the peer end matches the contact information, the user corresponding to the peer end is a contact or friend of the user corresponding to the terminal, and the process may be directly ended. .
当获取的对端的通信标识与所述联系人信息不匹配时,执行步骤206。When the acquired communication identifier of the peer does not match the contact information, step 206 is performed.
步骤206,当获取的对端的通信标识与所述联系人信息不匹配时,第三方应用判断当前通信的安全性。Step 206: When the obtained communication identifier of the opposite end does not match the contact information, the third-party application determines the security of the current communication.
较佳地,所述第三方应用在判断当前通信的安全性时,可以直接通过所述第三方应用中的安全判断模块直接进行判断,也可以通过调用其它安全应用(如,360手机安全卫士)进行判断,本实施例对此不作限制。Preferably, when determining the security of the current communication, the third-party application may directly judge through the security judgment module in the third-party application, or may invoke other security applications (eg, 360 mobile security guards). Judging, this embodiment does not limit this.
具体地,参照图3,示出了本发明第二实施例中一种判断当前通信安全性的方法的流程图。在本实施例中,所述步骤206,具体可以包括:Specifically, referring to FIG. 3, a flow chart of a method for determining current communication security in a second embodiment of the present invention is shown. In this embodiment, the step 206 may specifically include:
子步骤S302,当获取的对端的通信标识与所述联系人信息不匹配时,第三方应用将所述对端的通信标识与预置黑/白名单中数据进行比较。Sub-step S302, when the obtained communication identifier of the opposite end does not match the contact information, the third-party application compares the communication identifier of the opposite end with the data in the preset black/white list.
较佳地,白名单中存储的数据是已经确定为是安全的通信对应的通信标识。黑名单中存储的数据是已经确定为是诈骗的通信、和/或虚假消息的通信、和/或钓鱼的通信、和/或木马的通信、和/或伪基站的通信对应的通信标识。Preferably, the data stored in the white list is a communication identifier corresponding to the communication that has been determined to be secure. The data stored in the blacklist is a communication identifier corresponding to communication that has been determined to be fraud, and/or communication of a fake message, and/or communication of phishing, and/or communication of a Trojan, and/or communication of a pseudo base station.
在本实施例中, In this embodiment,
若所述对端的通信标识与黑名单中的数据相匹配,则可以确定所述当前通信是高危的风险通信(如,诈骗通信、伪基站通信等),此时,第三方应用直接拦截当前通信,结束本次流程。If the communication identifier of the peer matches the data in the blacklist, it may be determined that the current communication is a high-risk risk communication (eg, fraud communication, pseudo base station communication, etc.), and at this time, the third-party application directly intercepts the current communication. , end this process.
若所述对端的通信标识与白名单中的数据相匹配,则确定所述当前通信是安全通信。较佳地,为了进一步保证当前通信是安全通信,提高当前通信安全性判断结果的准确性,在所述对端的通信标识与白名单中的数据相匹配时,可以继续执行子步骤S304。If the communication identifier of the peer matches the data in the whitelist, it is determined that the current communication is a secure communication. Preferably, in order to further ensure that the current communication is a secure communication, and the accuracy of the current communication security judgment result is improved, when the communication identifier of the opposite end matches the data in the white list, the sub-step S304 may be continued.
这里需要说明的是,当所述对端的通信标识既不在所述黑名单中也不在所述白名单中时,为了提高当前通信安全性判断结果的准确性,也可以继续执行子步骤S304。It should be noted that, when the communication identifier of the peer end is neither in the blacklist nor in the whitelist, in order to improve the accuracy of the current communication security judgment result, the sub-step S304 may be further performed.
子步骤S304、第三方应用获取与所述终端进行通信的对端的呼叫信息和标记信息。Sub-step S304: The third-party application acquires call information and tag information of the peer end that communicates with the terminal.
较佳地,所述呼叫信息包括:所述对端的呼出和呼入次数,所述对端呼出和呼入时的通信时长,所述对端呼出和呼入时的响铃时长,所述对端进行通信时的时间分布信息,所述对端发送和接收信息的次数,所述对端的通信标识被添加至联系人和被添加至黑名单的次数中的至少一种;所述标记信息包括:所述对端的通信标识被标记为恶意和/或垃圾通信的次数,所述对端的通信标识在确定为恶意和/或垃圾网址的页面上出现的次数,使用所述对端的通信标识发送的信息被标记为恶意和/或垃圾信息的次数中的至少一种。Preferably, the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair Time distribution information when the terminal performs communication, the number of times the peer end sends and receives information, the communication identifier of the peer end is added to at least one of a contact and a number of times added to the blacklist; the tag information includes The number of times the communication identifier of the peer is marked as malicious and/or spam, the number of times the communication identifier of the peer appears on a page determined to be malicious and/or spam, sent using the communication identifier of the peer At least one of the number of times the information is marked as malicious and/or spam.
子步骤S306,第三方应用将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果。Sub-step S306, the third-party application matches the call information and/or the tag information with a preset interception policy to determine a matching result.
在本实施例中,所述预置拦截策略包括多个子拦截策略;其中,每个子拦截策略分别与对应的呼叫信息和标记信息相匹配。较佳地,所述第三方应用将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果具体可以包括:根据所述呼叫信息和/或标记信息确定与所述当前来电相匹配的子拦截策略的数量。In this embodiment, the preset interception policy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively. Preferably, the third-party application matches the call information and/or the tag information with the preset interception policy, and determining the matching result may specifically include: determining, according to the call information and/or the tag information, the current call. The number of matching subintercept strategies.
子步骤S308,第三方应用根据所述匹配结果确定所述当前通信的风险 级别。Sub-step S308, the third-party application determines the risk of the current communication according to the matching result. level.
在本实施例中,所述根据所述匹配结果确定当前通信的风险级别,具体可以包括:根据与所述当前通信相匹配的子拦截策略的数量确定当前通信的风险级别。其中,In this embodiment, the determining the risk level of the current communication according to the matching result may include: determining a risk level of the current communication according to the number of the sub-interception policies that match the current communication. among them,
当相匹配的子拦截策略的数量大于等于第一阈值时,确定所述当前通信是高危级别;Determining that the current communication is a high-risk level when the number of matched sub-interception strategies is greater than or equal to the first threshold;
当相匹配的子拦截策略的数量大于等于第二阈值且小于第一阈值时,确定所述当前通信是风险级别;Determining that the current communication is a risk level when the number of matched sub-interception strategies is greater than or equal to a second threshold and less than the first threshold;
当相匹配的子拦截策略的数量大于等于第三阈值且小于第二阈值时,确定所述当前通信是可疑级别;Determining that the current communication is a suspicious level when the number of matched sub-interception strategies is greater than or equal to a third threshold and less than a second threshold;
当相匹配的子拦截策略的数量小于第三阈值时,确定所述当前通信是安全级别。When the number of matched sub-interception strategies is less than a third threshold, it is determined that the current communication is a security level.
较佳地,Preferably,
当根据所述匹配结果确定所述当前通信的风险级别是高危级别时,第三方应用可以直接拦截当前通信,结束本次流程。When it is determined that the risk level of the current communication is a high-risk level according to the matching result, the third-party application may directly intercept the current communication, and end the current process.
当根据所述匹配结果确定所述当前通信的风险级别是风险级别或可疑级别时,第三方应用可以加载显示风险提示信息,以提示用户当前通信存在风险,同时可以执行步骤208。When it is determined that the risk level of the current communication is a risk level or a suspicious level according to the matching result, the third-party application may load the display risk prompt information to prompt the user that the current communication is at risk, and may perform step 208.
当根据所述匹配结果确定所述当前通信的风险级别是安全级别时,确定所述当前通信是安全通信,执行步骤208。When it is determined that the current communication risk level is a security level according to the matching result, it is determined that the current communication is a secure communication, and step 208 is performed.
步骤208,第三方应用生成新建联系人页面。In step 208, the third party application generates a new contact page.
较佳地,为了保证所述新建联系人页面的生成过程符合用户的期望,可以在生成新建联系人页面之前,对终端和对端之间的距离进行判断,具体过程如下:Preferably, in order to ensure that the process of generating the newly created contact page meets the user's expectation, the distance between the terminal and the peer end can be determined before the new contact page is generated. The specific process is as follows:
首先,第三方应用分别获取所述终端和对端的位置信息。其中,所述位置信息的获取可以采用任意一种已知的位置信息获取方法。First, the third-party application separately obtains location information of the terminal and the peer. The location information may be obtained by using any known location information acquisition method.
然后,第三方应用根据所述终端和对端的位置信息确定所述终端和所述对端的距离。 Then, the third-party application determines the distance between the terminal and the opposite end according to the location information of the terminal and the peer.
最后,当所述距离小于等于设定距离时,执行上述步骤208,第三方应用生成新建联系人页面。Finally, when the distance is less than or equal to the set distance, the above step 208 is performed, and the third party application generates a new contact page.
又一较佳地,为了保证所述新建联系人页面的生成过程符合用户的期望,第三方应用可以在生成新建联系人页面之前,分别获取所述终端和对端的网络信息。其中,所述网络信息包括但不限于:无线保真WIFI(WIreless-FIdelity,无线保真)信息、基站信息和局域网信息中的至少一种。第三方应用确定所述终端和所述对端是否具有相同的网络信息,当确定所述终端和所述对端具有相同的网络信息时,执行所述生成新建联系人页面的步骤。In another example, in order to ensure that the process of generating the newly created contact page meets the user's expectations, the third-party application may separately obtain the network information of the terminal and the peer before generating the newly created contact page. The network information includes, but is not limited to, at least one of wireless fidelity (WIFI) information, base station information, and local area network information. The third-party application determines whether the terminal and the peer have the same network information, and when the terminal and the peer have the same network information, perform the step of generating a new contact page.
例如,第三方应用从云端服务器分别获取终端和对端的WIFI信息。然后,第三方应用根据所述终端和对端的WIFI信息确定所述终端和所述对端是否共用同一WIFI。最后,当确定所述终端和所述对端共用同一WIFI时,第三方应用执行所述生成新建联系人页面的步骤。For example, the third-party application separately obtains the WIFI information of the terminal and the peer from the cloud server. Then, the third-party application determines, according to the WIFI information of the terminal and the peer, whether the terminal and the peer share the same WIFI. Finally, when it is determined that the terminal and the peer share the same WIFI, the third-party application performs the step of generating a new contact page.
在本实施例中,所述第三方应用生成新建联系人页面具体可以包括:第三方应用按照设定格式生成所述新建联系人页面。In this embodiment, the generating, by the third-party application, the newly created contact page may include: the third-party application generates the newly created contact page according to the set format.
较佳地,所述第三方应用按照设定格式生成所述新建联系人页面,在具体实现时,可以通过调用所述通讯录应用,按照所述通讯录应用对应的默认格式生成新建联系人页面。其中,所述通讯录应用可以是终端侧的系统通讯录应用,此时,设定格式则为系统通讯录应用所对应的新建联系人页面的模板。所述通讯录应用也可以是所述第三方应用或其它应用中的模板,该模板的格式与所述新建联系人页面的格式相匹配,以使生成的述新建联系人页面的格式更加多样化、丰富化,满足用户需求。Preferably, the third-party application generates the new contact page according to the set format. In a specific implementation, the new contact page may be generated according to the default format corresponding to the address book application by calling the address book application. . The address book application may be a system address book application on the terminal side. At this time, the setting format is a template of a newly created contact page corresponding to the system address book application. The address book application may also be a template in the third-party application or other application, and the format of the template matches the format of the newly created contact page, so as to make the format of the generated new contact page more diverse. Enriched to meet user needs.
较佳地,所述设定格式包括但不仅限于:通信标识、姓名、性别、公司信息、电子邮件、生日、地址、爱好和头像选项中的至少一种。Preferably, the setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
如,参照图4,是本发明第二实施例中一种新建联系人页面的示意图。所述新建联系人页面的格式包括:通信标识、姓名、性别和电子邮件四个选项。For example, referring to FIG. 4, it is a schematic diagram of a newly created contact page in the second embodiment of the present invention. The format of the new contact page includes four options: communication identifier, name, gender, and email.
步骤210,第三方应用将获取的对端的通信标识添加至所述新建联系人 页面的对应位置。Step 210: The third-party application adds the acquired communication identifier of the peer to the new contact. The corresponding location of the page.
如,第三方应用将获取的对端的通信标识添加至图4中所示的通信标识选项的对应位置处。For example, the third party application adds the acquired communication identifier of the peer to the corresponding location of the communication identification option shown in FIG. 4.
步骤212,第三方应用从云端获取所述对端对应的用户的个人信息。Step 212: The third-party application acquires personal information of the user corresponding to the peer end from the cloud.
较佳地,如果所述对端对应的用户将自己的个人信息上传到了云端服务器侧,此时,所述第三方应用除了可以在对终端中的通信进行监测时,获取当前与所述终端进行通信的对端的通信标识,还可以从云端获取所述对端的更多信息,即,用户的个人信息。其中,所述个人信息包括:姓名信息、性别信息、公司信息、电子邮件地址、生日信息、地址信息、爱好信息和头像信息中的至少一种。Preferably, if the user corresponding to the peer end uploads his/her personal information to the cloud server side, the third-party application can obtain the current connection with the terminal, in addition to monitoring the communication in the terminal. The communication identifier of the peer end of the communication can also obtain more information of the peer end, that is, the personal information of the user from the cloud. The personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
步骤214,第三方应用将获取的个人信息添加至所述设定格式中的对应选项位置处。Step 214: The third party application adds the acquired personal information to a corresponding option location in the set format.
步骤216,第三方应用响应用户的添加请求。In step 216, the third party application responds to the user's add request.
其中,所述添加请求包括:姓名信息添加请求、性别信息添加请求、公司信息添加请求、电子邮件地址添加请求、生日信息添加请求、地址信息添加请求、爱好信息添加请求和头像信息添加请求中的至少一种。The adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
步骤218,第三方应用将所述添加请求对应的信息添加至所述设定格式中的对应选项位置处。Step 218: The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
如,第三方应用将姓名信息添加请求对应的信息添加至图4中所示的姓名选项对应的位置处,将性别信息添加请求对应的信息添加至图4中所示的性别选项对应的位置处,等。For example, the third party application adds the information corresponding to the name information addition request to the position corresponding to the name option shown in FIG. 4, and adds the information corresponding to the gender information addition request to the position corresponding to the gender option shown in FIG. ,Wait.
步骤220,第三方应用响应保存操作请求,将完成添加的新建联系人页面更新保存至通讯录应用中。Step 220: The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
综上所述,本实施例所述的通信处理方法,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率, 节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。In summary, the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information. When the acquired communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system. Further, the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
同时,在保存未知通信标识之前,还对当前通信的安全性进行了判断,保证了存储的通信标识的安全性和可靠性,减少了用户上当受骗的可能性,保障了用户的权益,提高了安全性。At the same time, before the unknown communication identifier is saved, the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
实施例三Embodiment 3
结合上述实施例,下面通过一个具体实例对一种通信处理方法进行详细说明。In conjunction with the above embodiments, a communication processing method will be described in detail below through a specific example.
在本实施例中,以手机通话为例,即,终端和对端均为手机终端,进行的通信是手机通话,且,当前通信是由对端向终端发起的通话请求。在终端接通对端的通话请求、挂断电话之后,或在终端没有接听对端的通话请求、通话请求结束之后执行该通信处理方法,具体地,该通信处理方法的流程如下:In this embodiment, the mobile phone call is taken as an example, that is, the terminal and the opposite end are mobile phone terminals, and the communication performed is a mobile phone call, and the current communication is a call request initiated by the opposite end to the terminal. After the terminal connects the call request of the opposite end, hangs up the call, or after the terminal does not answer the call request of the opposite end, and the call request ends, the communication processing method is executed. Specifically, the flow of the communication processing method is as follows:
参照图5,示出了本发明第三实施例中一种通信处理方法的流程图。在本实施例中,所述通信处理方法,包括:Referring to Figure 5, there is shown a flow chart of a communication processing method in a third embodiment of the present invention. In this embodiment, the communication processing method includes:
步骤502,第三方应用对终端中的通信进行监测,获取当前与所述终端进行通信的对端的电话号码。Step 502: The third-party application monitors the communication in the terminal, and obtains the phone number of the peer currently communicating with the terminal.
其中,所述第三方应用是安装在终端(如,手机终端)中的应用。The third-party application is an application installed in a terminal (eg, a mobile phone terminal).
步骤504,第三方应用将获取的电话号码与联系人信息进行比较。In step 504, the third party application compares the obtained phone number with the contact information.
较佳地,当获取的电话号码与联系人信息相匹配时,可以确定向终端发起通话请求的对端对应的用户是所述终端对应的用户的联系人,是一个已知号码,此时可以直接结束本次流程。Preferably, when the obtained phone number matches the contact information, the user corresponding to the peer that initiates the call request to the terminal is the contact of the user corresponding to the terminal, which is a known number. End this process directly.
当获取的电话号码与联系人信息不相匹配时,即来电是陌生号码,此时执行步骤506。When the obtained phone number does not match the contact information, that is, the incoming call is a strange number, step 506 is performed.
步骤506,第三方应用判断当前通信的安全性。In step 506, the third party application determines the security of the current communication.
第三方应用判断当前通信的安全性的方法可以参照前述实施例中的方 法,可以将当前通信划分为高危级别、风险级别、可疑级别和安全级别。这里需要说明的是,当前通信的级别可以包括但不仅限于上述四种级别。For the method for the third party application to judge the security of the current communication, refer to the method in the foregoing embodiment. The current communication can be divided into high-risk level, risk level, suspicious level and security level. It should be noted here that the level of current communication may include, but is not limited to, the above four levels.
当确定当前通信是高危级别时,直接拦截当前通信,结束本次流程。When it is determined that the current communication is a high-risk level, the current communication is directly intercepted, and the process ends.
当确定当前通信是风险级别或可疑级别时,执行步骤508。When it is determined that the current communication is a risk level or a suspicious level, step 508 is performed.
当确定当前通信是安全级别,即当前通信是安全通信时,执行步骤510。When it is determined that the current communication is a security level, that is, the current communication is a secure communication, step 510 is performed.
步骤508,第三方应用生成风险提示页面。In step 508, the third party application generates a risk prompt page.
较佳地,第三方应用在所述风险提示页面上加载显示风险提示信息,提示用户当前通信是风险通信或可疑通信。同时,所述风险提示页面中还包括:第一触发操作选项和第二触发操作选项。其中,若用户在浏览风险提示信息之后触发所述第一触发操作选项,则取消生成新建联系人页面,即结束本次流程;若用户在浏览风险提示信息之后触发所述第二触发操作选项,则执行步骤510。Preferably, the third party application loads the display risk prompt information on the risk prompt page to prompt the user that the current communication is a risk communication or a suspicious communication. At the same time, the risk prompt page further includes: a first trigger operation option and a second trigger operation option. If the user triggers the first trigger operation option after browsing the risk prompt information, canceling the generate new contact page ends the current process; if the user triggers the second trigger operation option after browsing the risk prompt information, Then step 510 is performed.
步骤510,当用户触发所述第二触发操作选项时,第三方应用生成新建联系人页面。Step 510: When the user triggers the second trigger operation option, the third party application generates a new contact page.
较佳地,第三方应用按照设定格式生成所述新建联系人页面。其中,所述设定格式包括但不仅限于:通信标识、姓名、性别、公司信息、电子邮件、生日、地址、爱好和头像选项中的至少一种。新建联系人页面可以是手机终端的系统通讯录中的新建联系人页面,也可以是第三方应用设置的不同于系统通讯录的新建联系人页面,但与系统通讯录相同的是,该第三方应用设置的新建联系人页面同样可以将联系人信息保存至系统中使用,或者,也可以将联系人信息传递给系统通讯录,通过系统通讯录保存并使用。参照图6,是本发明第三实施例中一种新建联系人页面的示意图。在本实施例中。所述新建联系人页面的格式包括:通信标识、姓名、性别和电子邮件四个选项。其中,当新建联系人页面为第三方应用设置的新建联系人页面时,该页面的格式可以与系统通讯录的新建联系人页面的格式相同,也可以不同。Preferably, the third party application generates the new contact page according to the set format. The setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option. The newly created contact page may be a newly created contact page in the system address book of the mobile terminal, or may be a newly created contact page different from the system address book set by the third party application, but the same as the system address book, the third party The newly created contact page of the application settings can also save the contact information to the system for use, or the contact information can be transmitted to the system address book and saved and used through the system address book. Referring to FIG. 6, which is a schematic diagram of a newly created contact page in a third embodiment of the present invention. In this embodiment. The format of the new contact page includes four options: communication identifier, name, gender, and email. When the newly created contact page is a new contact page set by the third-party application, the format of the page may be the same as or different from the newly created contact page of the system address book.
步骤512,第三方应用从云端获取所述对端对应的用户的个人信息,并 将所述个人信息和获取的对端的电话号码添加至所述新建联系人页面的对应位置。其中,所述个人信息包括:姓名信息、性别信息、公司信息、电子邮件地址、生日信息、地址信息、爱好信息和头像信息中的至少一种。Step 512: The third-party application acquires personal information of the user corresponding to the peer end from the cloud, and Adding the personal information and the acquired phone number of the opposite end to the corresponding location of the newly created contact page. The personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
如,参照图6,第三方应用将获取的姓名信息“张三”添加至对应的姓名选项中,将在步骤502中获取的电话号码“123456”添加至对应的电话号码选项中。For example, referring to FIG. 6, the third party application adds the acquired name information "Zhang San" to the corresponding name option, and adds the phone number "123456" acquired in step 502 to the corresponding phone number option.
步骤514,第三方应用响应用户的添加请求。In step 514, the third party application responds to the user's add request.
其中,所述添加请求包括:姓名信息添加请求、性别信息添加请求、公司信息添加请求、电子邮件地址添加请求、生日信息添加请求、地址信息添加请求、爱好信息添加请求和头像信息添加请求中的至少一种。The adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
步骤516,第三方应用将所述添加请求对应的信息添加至所述设定格式中的对应选项位置处。Step 516: The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
如,参照图6,用户可以直接在性别选项对应的位置处输入“男”,在电子邮件选项对应的位置处输入“123@456.com”。For example, referring to FIG. 6, the user can directly input "male" at the position corresponding to the gender option, and input "123@456.com" at the position corresponding to the email option.
步骤518,第三方应用响应保存操作请求,将完成添加的新建联系人页面更新保存至通讯录应用中。Step 518: The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
这里需要说明的是,在所述当前通信是由终端向对端发起的通话请求时,可以参照本实施例的通信处理方法的流程进行处理。It should be noted that, when the current communication is a call request initiated by the terminal to the opposite end, the processing may be performed by referring to the flow of the communication processing method in this embodiment.
综上所述,本实施例所述的通信处理方法,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率,节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。In summary, the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information. When the acquired communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. The communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced. Further, the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
而且,当进行交互的终端和对端对应的用户的个人信息保存在云端时,可以直接从云端获取用户的详细个人信息,完善新建联系人页面中的各项内 容,提高了新建联系人页面的内容完整度,减少了用户查证搜寻的操作。Moreover, when the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, and the various items in the newly created contact page are improved. The content of the newly created contact page is improved, and the operation of verifying the search by the user is reduced.
同时,在保存未知通信标识之前,还对当前通信的安全性进行了判断,保证了存储的通信标识的安全性和可靠性,减少了用户上当受骗的可能性,保障了用户的权益,提高了安全性。At the same time, before the unknown communication identifier is saved, the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
需要说明的是,对于前述的方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明所必需的。It should be noted that, for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence, because In accordance with the present invention, certain steps may be performed in other sequences or concurrently. In addition, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions involved are not necessarily required by the present invention.
实施例四Embodiment 4
基于与上述方法实施例同一发明构思,参照图7,示出了本发明第四实施例中一种通信处理系统的结构框图。在本实施例中,所述通信处理系统,包括:Based on the same inventive concept as the above method embodiment, referring to FIG. 7, a block diagram of a communication processing system in a fourth embodiment of the present invention is shown. In this embodiment, the communication processing system includes:
监测模块702,配置为对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息。The monitoring module 702 is configured to monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
其中,所述通信信息包括:通信标识。The communication information includes: a communication identifier.
比较模块704,配置为将获取的对端的通信标识与通讯录应用中的联系人信息进行比较。The comparison module 704 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
生成模块706,配置为在获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面。The generating module 706 is configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information.
第一添加模块708,配置为将获取的对端的通信标识添加至所述新建联系人页面的对应位置。The first adding module 708 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
综上所述,本实施例所述的通信处理系统,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率, 节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。In summary, the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information. When the acquired communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system. Further, the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
实施例五Embodiment 5
参照图8,示出了本发明第五实施例中一种通信处理系统的结构框图。在本实施例中,所述通信处理系统,包括:Referring to Fig. 8, there is shown a block diagram showing the configuration of a communication processing system in a fifth embodiment of the present invention. In this embodiment, the communication processing system includes:
监测模块802,配置为对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息。其中,所述通信信息包括:通信标识。The monitoring module 802 is configured to monitor communications in the terminal to obtain communication information of the peer currently communicating with the terminal. The communication information includes: a communication identifier.
比较模块804,配置为将获取的对端的通信标识与通讯录应用中的联系人信息进行比较。The comparison module 804 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
判断模块806,配置为在获取的对端的通信标识与所述联系人信息不匹配时,判断当前通信的安全性。The determining module 806 is configured to determine the security of the current communication when the acquired communication identifier of the peer does not match the contact information.
较佳地,所述判断模块806,包括:Preferably, the determining module 806 includes:
数据比较模块8062,配置为将所述对端的通信标识与预置黑/白名单中数据进行比较。The data comparison module 8062 is configured to compare the communication identifier of the peer end with the data in the preset black/white list.
第一确定模块8064,配置为在所述对端的通信标识与白名单中的数据相匹配时,确定所述当前通信是安全通信。The first determining module 8064 is configured to determine that the current communication is a secure communication when the communication identifier of the peer matches the data in the whitelist.
较佳地,在确定所述当前通信是安全通信之后,可以继续执行信息获取模块8068。Preferably, after determining that the current communication is a secure communication, the information acquisition module 8068 may continue to be executed.
第二确定模块8066,配置为在所述对端的通信标识与黑名单中的数据相匹配时,确定所述当前通信是高危通信。The second determining module 8066 is configured to determine that the current communication is a high-risk communication when the communication identifier of the peer end matches the data in the blacklist.
较佳地,在确定当前通信是高危通信时,可以直接通过拦截模块对当前通信进行拦截,接收本次流程。Preferably, when it is determined that the current communication is a high-risk communication, the current communication may be directly intercepted by the intercepting module, and the current process is received.
信息获取模块8068,配置为获取与所述终端进行通信的对端的呼叫信息和标记信息。The information obtaining module 8068 is configured to acquire call information and tag information of the peer end that communicates with the terminal.
较佳地,所述呼叫信息包括:所述对端的呼出和呼入次数,所述对端呼出和呼入时的通信时长,所述对端呼出和呼入时的响铃时长,所述对端进行 通信时的时间分布信息,所述对端发送和接收信息的次数,所述对端的通信标识被添加至联系人和被添加至黑名单的次数中的至少一种;所述标记信息包括:所述对端的通信标识被标记为恶意和/或垃圾通信的次数,所述对端的通信标识在确定为恶意和/或垃圾网址的页面上出现的次数,使用所述对端的通信标识发送的信息被标记为恶意和/或垃圾信息的次数中的至少一种。Preferably, the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair End Time distribution information during communication, the number of times the peer sends and receives information, the communication identifier of the peer is added to at least one of a contact and a number of times added to the blacklist; the tag information includes: The number of times the communication identifier of the peer end is marked as malicious and/or spam communication, the number of times the communication identifier of the peer end appears on the page determined to be malicious and/or spam, and the information sent using the communication identifier of the peer is At least one of the number of times marked as malicious and/or spam.
匹配模块80610,配置为将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果。The matching module 80610 is configured to match the call information and/or the tag information with a preset interception policy to determine a matching result.
较佳地,所述预置拦截策略包括多个子拦截策略;其中,每个子拦截策略分别与对应的呼叫信息和标记信息相匹配。Preferably, the preset interception strategy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
在本实施例中,所述匹配模块80610,具体配置为根据所述呼叫信息和/或标记信息确定与所述当前来电相匹配的子拦截策略的数量。In this embodiment, the matching module 80610 is specifically configured to determine, according to the call information and/or the tag information, the number of sub-interception strategies that match the current incoming call.
风险级别确定模块80612,配置为根据所述匹配结果确定所述当前通信的风险级别。The risk level determination module 80612 is configured to determine a risk level of the current communication based on the matching result.
在本实施例中,所述风险级别确定模块80612,具体配置为根据与所述当前通信相匹配的子拦截策略的数量确定当前通信的风险级别。其中,In this embodiment, the risk level determining module 80612 is specifically configured to determine a risk level of the current communication according to the number of sub-intercepting strategies that match the current communication. among them,
在相匹配的子拦截策略的数量大于等于第一阈值时,确定所述当前通信是高危级别;Determining that the current communication is a high-risk level when the number of matched sub-interception strategies is greater than or equal to the first threshold;
在相匹配的子拦截策略的数量大于等于第二阈值且小于第一阈值时,确定所述当前通信是风险级别;Determining that the current communication is a risk level when the number of matched sub-interception strategies is greater than or equal to a second threshold and less than the first threshold;
在相匹配的子拦截策略的数量大于等于第三阈值且小于第二阈值时,确定所述当前通信是可疑级别;Determining that the current communication is a suspicious level when the number of matched sub-interception strategies is greater than or equal to a third threshold and less than a second threshold;
在相匹配的子拦截策略的数量小于第三阈值时,确定所述当前通信是安全级别。When the number of matched sub-interception strategies is less than a third threshold, it is determined that the current communication is a security level.
安全确定模块80614,配置为在根据所述匹配结果确定所述当前通信的风险级别是安全级别,则确定所述当前通信是安全通信。The security determining module 80614 is configured to determine that the current communication is a secure communication when it is determined that the risk level of the current communication is a security level according to the matching result.
较佳地,当确定所述当前通信是安全通信时,可以执行位置信息获取模块808。Preferably, when it is determined that the current communication is a secure communication, the location information acquisition module 808 can be executed.
位置信息获取模块808,配置为分别获取所述终端和对端的位置信息。 The location information obtaining module 808 is configured to separately obtain location information of the terminal and the peer end.
距离确定模块810,配置为根据所述终端和对端的位置信息确定所述终端和所述对端的距离。The distance determining module 810 is configured to determine a distance between the terminal and the opposite end according to location information of the terminal and the opposite end.
较佳地,当所述距离确定模块810确定所述距离小于等于设定距离时,执行所述生成模块816。Preferably, the generating module 816 is executed when the distance determining module 810 determines that the distance is less than or equal to the set distance.
又一较佳地,当确定所述当前通信是安全通信时,可以执行网络信息获取模块812。Still preferably, the network information acquisition module 812 can be executed when it is determined that the current communication is a secure communication.
网络信息获取模块812,配置为在所述生成模块生成新建联系人页面之前,分别获取所述终端和对端的网络信息。其中,所述网络信息包括以下至少一项:无线保真WIFI信息、基站信息、局域网信息。The network information obtaining module 812 is configured to acquire network information of the terminal and the peer end before the generating module generates a new contact page. The network information includes at least one of the following: wireless fidelity WIFI information, base station information, and local area network information.
网络信息确定模块814,配置为确定所述终端和所述对端是否具有相同的网络信息;当确定所述终端和所述对端具有相同的网络信息时,执行所述生成模块816。The network information determining module 814 is configured to determine whether the terminal and the peer end have the same network information; and when the terminal and the peer end are determined to have the same network information, the generating module 816 is executed.
生成模块816,配置为生成新建联系人页面。较佳地,所述生成模块816,具体配置为在获取的对端通信标识与所述联系人信息不匹配时,按照设定格式生成所述新建联系人页面。其中,所述设定格式包括:通信标识、姓名、性别、公司信息、电子邮件、生日、地址、爱好和头像选项中的至少一种。A generation module 816 is configured to generate a new contact page. Preferably, the generating module 816 is configured to generate the newly created contact page according to a set format when the acquired peer communication identifier does not match the contact information. The setting format includes at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
另一较佳地,所述生成模块816,具体配置为在获取的对端通信标识与所述联系人信息不匹配时,调用所述通讯录应用,按照所述通讯录应用对应的默认格式生成新建联系人页面。In another example, the generating module 816 is configured to: when the obtained peer communication identifier does not match the contact information, invoke the address book application, and generate according to a default format corresponding to the address book application. Create a new contact page.
个人信息获取模块818,配置为从云端获取所述对端对应的用户的个人信息。The personal information obtaining module 818 is configured to acquire personal information of the user corresponding to the peer end from the cloud.
其中,所述个人信息包括:姓名信息、性别信息、公司信息、电子邮件地址、生日信息、地址信息、爱好信息和头像信息中的至少一种。The personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
第三添加模块820,配置为将获取的个人信息添加至所述设定格式中的对应选项位置处。The third adding module 820 is configured to add the acquired personal information to a corresponding option location in the set format.
第一添加模块822,配置为将获取的对端的通信标识添加至所述新建联系人页面的对应位置。The first adding module 822 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
第一响应模块824,配置为响应用户的添加请求。 The first response module 824 is configured to respond to the user's add request.
其中,所述添加请求包括:姓名信息添加请求、性别信息添加请求、公司信息添加请求、电子邮件地址添加请求、生日信息添加请求、地址信息添加请求、爱好信息添加请求和头像信息添加请求中的至少一种;The adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one
第二添加模块826,配置为将所述添加请求对应的信息添加至所述设定格式中的对应选项位置处。The second adding module 826 is configured to add information corresponding to the adding request to a corresponding option location in the setting format.
第二响应模块828,配置为响应保存操作请求,将完成添加的新建联系人页面更新保存至通讯录应用中。The second response module 828 is configured to save the newly added new contact page update to the address book application in response to the save operation request.
在本实施例中,所述通信处理系统可以在当前通信未接通挂断后、或接通挂断之后执行。其中,所述当前通信包括:语音通信、视频通信和文本通信中的至少一种。In this embodiment, the communication processing system may be executed after the current communication is not connected to hang up, or after the hang up. The current communication includes at least one of voice communication, video communication, and text communication.
综上所述,本实施例所述的通信处理系统,通过对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信标识,并判断所述通信标识是否与联系人信息匹配;当获取的对端的通信标识与所述联系人信息不匹配时,直接生成新建联系人页面;避免了用户通过繁杂冗长的触发操作手动去打开通讯录,建立联系人添加页面;简化了操作步骤,提高了通信处理效率,节约了时间,同时也降低了终端系统的操作和处理负担。进一步地,通信标识自动添加至所述新建联系人页面的对应位置,避免了用户的手动输入过程,提高了效率,同时保证了结果的准确性。In summary, the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information. When the acquired communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. The communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced. Further, the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
而且,当进行交互的终端和对端对应的用户的个人信息保存在云端时,可以直接从云端获取用户的详细个人信息,完善新建联系人页面中的各项内容,提高了新建联系人页面的内容完整度,减少了用户查证搜寻的操作。Moreover, when the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, the various contents in the newly created contact page are improved, and the newly created contact page is improved. Content integrity reduces the user's ability to verify the search.
同时,在保存未知通信标识之前,还对当前通信的安全性进行了判断,保证了存储的通信标识的安全性和可靠性,减少了用户上当受骗的可能性,保障了用户的权益,提高了安全性。At the same time, before the unknown communication identifier is saved, the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
对于上述装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。For the above device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备 固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided here are not associated with any particular computer, virtual system, or other device Inherently related. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下 面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, under In the claims, any of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的通信处理设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components of the communication processing device in accordance with embodiments of the present invention. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
例如,图9示出了用于执行根据本发明实施例的通信处理方法的终端的结构框图。该终端传统上包括处理器910和以存储器920形式的计算机程序产品或者计算机可读介质。存储器920可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器920具有用于执行上述方法中的任何方法步骤的程序代码931的存储空间930。例如,用于程序代码的存储空间930可以包括分别用于实现上面的方法中的各种步骤的各个程序代码931。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图10所述的便携式或者固定存储单元。该存储单元可以具有与图9的终端中的存储器920类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码931’,即可以由例如诸如910之类的处理器读取的代码,这些代码当由服务器运行时,导致该服务器执行上面所描述的方法中的各个步骤。For example, FIG. 9 shows a structural block diagram of a terminal for executing a communication processing method according to an embodiment of the present invention. The terminal conventionally includes a processor 910 and a computer program product or computer readable medium in the form of a memory 920. The memory 920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above. For example, storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the terminal of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit includes computer readable code 931', code that can be read by a processor, such as 910, which, when executed by a server, causes the server to perform various steps in the methods described above.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出 替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。 It should be noted that the above-described embodiments are illustrative of the present invention and are not intended to limit the invention, and may be devised by those skilled in the art without departing from the scope of the appended claims Alternative embodiment. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.

Claims (32)

  1. 一种通信处理方法,包括:A communication processing method includes:
    对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息;其中,所述通信信息包括:通信标识;Monitoring the communication in the terminal, and acquiring the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
    将获取的对端的通信标识与通讯录应用中的联系人信息进行比较;Comparing the obtained communication identifier of the peer end with the contact information in the address book application;
    当获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面;Generating a new contact page when the obtained communication identifier of the peer does not match the contact information;
    将获取的对端的通信标识添加至所述新建联系人页面的对应位置。Adding the acquired communication identifier of the peer end to the corresponding location of the new contact page.
  2. 如权利要求1所述的方法,其中,在所述生成新建联系人页面的步骤之前,所述方法还包括:The method of claim 1, wherein before the step of generating a new contact page, the method further comprises:
    分别获取所述终端和对端的位置信息;Obtaining location information of the terminal and the peer end respectively;
    根据所述终端和对端的位置信息确定所述终端和所述对端的距离;Determining a distance between the terminal and the opposite end according to the location information of the terminal and the peer end;
    当所述距离小于等于设定距离时,执行所述生成新建联系人页面的步骤。When the distance is less than or equal to the set distance, the step of generating a new contact page is performed.
  3. 如权利要求1所述的方法,其中,所述生成新建联系人页面,包括:The method of claim 1 wherein said generating a new contact page comprises:
    按照设定格式生成所述新建联系人页面;其中,所述设定格式包括:通信标识、姓名、性别、公司信息、电子邮件、生日、地址、爱好和头像选项中的至少一种。The new contact page is generated according to a set format; wherein the setting format includes at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  4. 如权利要求3所述的方法,其中,所述按照设定格式生成所述建联系人页面,包括:The method of claim 3, wherein the generating the built-in contact page according to the set format comprises:
    调用所述通讯录应用,按照所述通讯录应用对应的默认格式生成新建联系人页面。The address book application is invoked, and a new contact page is generated according to a default format corresponding to the address book application.
  5. 如权利要求3所述的方法,其中,在所述将获取的对端的通信标识添加至所述新建联系人页面的对应位置的步骤之后,所述方法还包括:The method of claim 3, wherein after the step of adding the obtained communication identifier of the peer to the corresponding location of the new contact page, the method further comprises:
    响应用户的添加请求;其中,所述添加请求包括:姓名信息添加请求、性别信息添加请求、公司信息添加请求、电子邮件地址添加请求、生日信息添加请求、地址信息添加请求、爱好信息添加请求和头像信息添加请求中的至少一种;Responding to the user's add request; wherein the add request includes: a name information addition request, a gender information addition request, a company information addition request, an email address addition request, a birthday information addition request, an address information addition request, a hobby information addition request, and At least one of an avatar information addition request;
    将所述添加请求对应的信息添加至所述设定格式中的对应选项位置处。 Information corresponding to the addition request is added to a corresponding option location in the set format.
  6. 如权利要求3所述的方法,其中,在所述生成新建联系人页面的步骤之后,所述方法还包括:The method of claim 3, wherein after the step of generating a new contact page, the method further comprises:
    从云端获取所述对端对应的用户的个人信息;其中,所述个人信息包括:姓名信息、性别信息、公司信息、电子邮件地址、生日信息、地址信息、爱好信息和头像信息中的至少一种;Obtaining personal information of the user corresponding to the peer end from the cloud; wherein the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information. Species
    将获取的个人信息添加至所述设定格式中的对应选项位置处。The acquired personal information is added to the corresponding option location in the set format.
  7. 如权利要求1所述的方法,其中,在所述将获取的对端的通信标识添加至所述新建联系人页面的对应位置的步骤之后,所述方法还包括:The method of claim 1, wherein after the step of adding the obtained communication identifier of the peer to the corresponding location of the new contact page, the method further comprises:
    响应保存操作请求,将完成添加的新建联系人页面更新保存至通讯录应用中。In response to the save operation request, the newly added new contact page update is saved to the contacts application.
  8. 如权利要求1所述的方法,其中,在所述生成新建联系人页面的步骤之前,所述方法还包括:The method of claim 1, wherein before the step of generating a new contact page, the method further comprises:
    判断当前通信的安全性;Determine the security of the current communication;
    当判断所述当前通信是安全通信时,执行所述生成新建联系人页面的步骤。When it is determined that the current communication is a secure communication, the step of generating a new contact page is performed.
  9. 如权利要求8所述的方法,其中,所述判断当前通信的安全性,包括:The method of claim 8 wherein said determining the security of the current communication comprises:
    将所述对端的通信标识与预置黑/白名单中数据进行比较;Comparing the communication identifier of the peer end with the data in the preset black/white list;
    若所述对端的通信标识与白名单中的数据相匹配,则确定所述当前通信是安全通信;If the communication identifier of the peer matches the data in the whitelist, determining that the current communication is a secure communication;
    若所述对端的通信标识与黑名单中的数据相匹配,则确定所述当前通信是高危通信。If the communication identifier of the peer matches the data in the blacklist, it is determined that the current communication is a high-risk communication.
  10. 如权利要求8所述的方法,其中,所述判断当前通信的安全性,包括:The method of claim 8 wherein said determining the security of the current communication comprises:
    获取与所述终端进行通信的对端的呼叫信息和标记信息;其中,所述呼叫信息包括:所述对端的呼出和呼入次数,所述对端呼出和呼入时的通信时长,所述对端呼出和呼入时的响铃时长,所述对端进行通信时的时间分布信息,所述对端发送和接收信息的次数,所述对端的通信标识被添加至联系人 和被添加至黑名单的次数中的至少一种;所述标记信息包括:所述对端的通信标识被标记为恶意和/或垃圾通信的次数,所述对端的通信标识在确定为恶意和/或垃圾网址的页面上出现的次数,使用所述对端的通信标识发送的信息被标记为恶意和/或垃圾信息的次数中的至少一种;Acquiring the call information and the tag information of the peer end that communicates with the terminal; wherein the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the pair End time of the outgoing call and the incoming call, the time distribution information when the opposite end communicates, the number of times the opposite end sends and receives the information, and the communication identifier of the opposite end is added to the contact And at least one of the number of times added to the blacklist; the tag information includes: the number of times the communication identifier of the peer is marked as malicious and/or spam, and the communication identifier of the peer is determined to be malicious and/or Or the number of occurrences on the page of the spam URL, using at least one of the number of times the information sent by the peer communication identifier is marked as malicious and/or spam;
    将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果;Matching the call information and/or the tag information with a preset interception strategy to determine a matching result;
    根据所述匹配结果确定所述当前通信的风险级别;Determining a risk level of the current communication according to the matching result;
    若根据所述匹配结果确定所述当前通信的风险级别是安全级别,则确定所述当前通信是安全通信。And determining, according to the matching result, that the current communication risk level is a security level, determining that the current communication is a secure communication.
  11. 如权利要求10所述的方法,其中,所述预置拦截策略包括多个子拦截策略;其中,每个子拦截策略分别与对应的呼叫信息和标记信息相匹配。The method of claim 10, wherein the preset interception policy comprises a plurality of sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  12. 如权利要求11所述的方法,其中,所述将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果,包括:The method of claim 11, wherein the matching the call information and/or the tag information with a preset interception policy to determine a matching result comprises:
    根据所述呼叫信息和/或标记信息确定与所述当前来电相匹配的子拦截策略的数量。A number of sub-interception strategies that match the current incoming call is determined based on the call information and/or the tag information.
  13. 如权利要求12所述的方法,其中,所述根据所述匹配结果确定当前通信的风险级别,包括:The method of claim 12, wherein the determining a risk level of the current communication based on the matching result comprises:
    根据与所述当前通信相匹配的子拦截策略的数量确定当前通信的风险级别;其中,Determining a risk level of the current communication according to the number of sub-interception strategies that match the current communication; wherein
    当相匹配的子拦截策略的数量大于等于第一阈值时,确定所述当前通信是高危级别;Determining that the current communication is a high-risk level when the number of matched sub-interception strategies is greater than or equal to the first threshold;
    当相匹配的子拦截策略的数量大于等于第二阈值且小于第一阈值时,确定所述当前通信是风险级别;Determining that the current communication is a risk level when the number of matched sub-interception strategies is greater than or equal to a second threshold and less than the first threshold;
    当相匹配的子拦截策略的数量大于等于第三阈值且小于第二阈值时,确定所述当前通信是可疑级别;Determining that the current communication is a suspicious level when the number of matched sub-interception strategies is greater than or equal to a third threshold and less than a second threshold;
    当相匹配的子拦截策略的数量小于第三阈值时,确定所述当前通信是安全级别。When the number of matched sub-interception strategies is less than a third threshold, it is determined that the current communication is a security level.
  14. 如权利要求1所述的方法,其中,在所述生成新建联系人页面的步 骤之前,所述方法还包括:The method of claim 1 wherein said step of generating a new contact page Before the method, the method further includes:
    分别获取所述终端和对端的网络信息;其中,所述网络信息包括以下至少一项:无线保真WIFI信息、基站信息、局域网信息;Obtaining network information of the terminal and the peer end respectively, where the network information includes at least one of the following: wireless fidelity WIFI information, base station information, and local area network information;
    确定所述终端和所述对端是否具有相同的网络信息;Determining whether the terminal and the peer end have the same network information;
    当确定所述终端和所述对端具有相同的网络信息时,执行所述生成新建联系人页面的步骤。When it is determined that the terminal and the peer end have the same network information, the step of generating a new contact page is performed.
  15. 如权利要求1-14任一所述的方法,其中,所述通信处理方法在当前通信未接通挂断后、或接通挂断之后执行;其中,所述当前通信包括:语音通信、视频通信和文本通信中的至少一种。The method according to any one of claims 1 to 14, wherein the communication processing method is executed after the current communication is not turned on or off, or after the hanging is turned off; wherein the current communication includes: voice communication, video At least one of communication and text communication.
  16. 一种通信处理系统,包括:A communication processing system comprising:
    监测模块,配置为对终端中的通信进行监测,获取当前与所述终端进行通信的对端的通信信息;其中,所述通信信息包括:通信标识;The monitoring module is configured to monitor the communication in the terminal, and obtain the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
    比较模块,配置为将获取的对端的通信标识与通讯录应用中的联系人信息进行比较;The comparison module is configured to compare the obtained communication identifier of the peer end with the contact information in the address book application;
    生成模块,配置为在获取的对端的通信标识与所述联系人信息不匹配时,生成新建联系人页面;Generating a module, configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information;
    第一添加模块,配置为将获取的对端的通信标识添加至所述新建联系人页面的对应位置。The first adding module is configured to add the obtained communication identifier of the peer end to a corresponding location of the newly created contact page.
  17. 如权利要求16所述的系统,其中,所述系统还包括:The system of claim 16 wherein said system further comprises:
    位置信息获取模块,配置为在所述生成模块生成新建联系人页面之前,分别获取所述终端和对端的位置信息;a location information obtaining module, configured to acquire location information of the terminal and the peer end respectively before the generating module generates a new contact page;
    距离确定模块,配置为根据所述终端和对端的位置信息确定所述终端和所述对端的距离;在所述距离小于等于设定距离时,执行所述生成模块。The distance determining module is configured to determine a distance between the terminal and the opposite end according to location information of the terminal and the opposite end, and execute the generating module when the distance is less than or equal to a set distance.
  18. 如权利要求16所述的系统,其中,The system of claim 16 wherein
    所述生成模块,具体配置为在获取的对端通信标识与所述联系人信息不匹配时,按照设定格式生成所述新建联系人页面;其中,所述设定格式包括:通信标识、姓名、性别、公司信息、电子邮件、生日、地址、爱好和头像选项中的至少一种。 The generating module is configured to: when the obtained peer communication identifier does not match the contact information, generate the new contact page according to a set format; wherein the setting format includes: a communication identifier, a name At least one of gender, company information, email, birthday, address, hobby, and avatar options.
  19. 如权利要求18所述的系统,其中,The system of claim 18, wherein
    所述生成模块,具体配置为在获取的对端通信标识与所述联系人信息不匹配时,调用所述通讯录应用,按照所述通讯录应用对应的默认格式生成新建联系人页面。The generating module is configured to: when the obtained peer communication identifier does not match the contact information, invoke the address book application, and generate a new contact page according to a default format corresponding to the address book application.
  20. 如权利要求18所述的系统,其中,所述系统还包括:The system of claim 18 wherein said system further comprises:
    第一响应模块,配置为在所述第一添加模块将获取的对端的通信标识添加至所述新建联系人页面的对应位置之后,响应用户的添加请求;其中,所述添加请求包括:姓名信息添加请求、性别信息添加请求、公司信息添加请求、电子邮件地址添加请求、生日信息添加请求、地址信息添加请求、爱好信息添加请求和头像信息添加请求中的至少一种;a first response module, configured to respond to a user's add request after the first add module adds the acquired communication identifier of the peer to the corresponding location of the new contact page, where the add request includes: name information At least one of a request for adding, a gender information addition request, a company information addition request, an email address addition request, a birthday information addition request, an address information addition request, a hobby information addition request, and an avatar information addition request;
    第二添加模块,配置为将所述添加请求对应的信息添加至所述设定格式中的对应选项位置处。And a second adding module configured to add information corresponding to the adding request to a corresponding option location in the setting format.
  21. 如权利要求18所述的系统,其中,所述系统还包括:The system of claim 18 wherein said system further comprises:
    个人信息获取模块,配置为在所述生成模块生成新建联系人页面之后,从云端获取所述对端对应的用户的个人信息;其中,所述个人信息包括:姓名信息、性别信息、公司信息、电子邮件地址、生日信息、地址信息、爱好信息和头像信息中的至少一种;The personal information obtaining module is configured to: after the generating module generates the newly created contact page, obtain the personal information of the user corresponding to the peer end from the cloud; wherein the personal information includes: name information, gender information, company information, At least one of an email address, birthday information, address information, hobby information, and avatar information;
    第三添加模块,配置为将获取的个人信息添加至所述设定格式中的对应选项位置处。And a third adding module configured to add the acquired personal information to a corresponding option location in the setting format.
  22. 如权利要求16所述的系统,其中,所述系统还包括:The system of claim 16 wherein said system further comprises:
    第二响应模块,配置为在所述第一添加模块将获取的对端的通信标识添加至所述新建联系人页面的对应位置之后,响应保存操作请求,将完成添加的新建联系人页面更新保存至通讯录应用中。a second response module, configured to: after the first adding module adds the acquired communication identifier of the peer end to the corresponding location of the newly created contact page, in response to the save operation request, save the newly added new contact page update to the In the address book application.
  23. 如权利要求16所述的系统,其中,所述系统还包括:The system of claim 16 wherein said system further comprises:
    判断模块,配置为在所述生成模块生成新建联系人页面之前,判断当前通信的安全性;在判断所述当前通信是安全通信时,执行所述生成模块。The determining module is configured to determine the security of the current communication before the generating module generates the newly created contact page, and execute the generating module when determining that the current communication is a secure communication.
  24. 如权利要求23所述的系统,其中,所述判断模块,包括:The system of claim 23, wherein the determining module comprises:
    数据比较模块,配置为将所述对端的通信标识与预置黑/白名单中数据进 行比较;a data comparison module configured to enter the communication identifier of the peer end and the data in the preset black/white list Line comparison
    第一确定模块,配置为在所述对端的通信标识与白名单中的数据相匹配时,确定所述当前通信是安全通信;a first determining module, configured to determine, when the communication identifier of the peer end matches data in the whitelist, that the current communication is a secure communication;
    第二确定模块,配置为在所述对端的通信标识与黑名单中的数据相匹配时,确定所述当前通信是高危通信。The second determining module is configured to determine that the current communication is a high-risk communication when the communication identifier of the peer matches the data in the blacklist.
  25. 如权利要求23所述的系统,其中,所述判断模块,包括:The system of claim 23, wherein the determining module comprises:
    信息获取模块,配置为获取与所述终端进行通信的对端的呼叫信息和标记信息;其中,所述呼叫信息包括:所述对端的呼出和呼入次数,所述对端呼出和呼入时的通信时长,所述对端呼出和呼入时的响铃时长,所述对端进行通信时的时间分布信息,所述对端发送和接收信息的次数,所述对端的通信标识被添加至联系人和被添加至黑名单的次数中的至少一种;所述标记信息包括:所述对端的通信标识被标记为恶意和/或垃圾通信的次数,所述对端的通信标识在确定为恶意和/或垃圾网址的页面上出现的次数,使用所述对端的通信标识发送的信息被标记为恶意和/或垃圾信息的次数中的至少一种;The information obtaining module is configured to acquire the call information and the tag information of the peer end that communicates with the terminal, where the call information includes: the number of outgoing calls and incoming calls of the opposite end, and the time of the opposite end call and incoming call The communication duration, the length of the ringing of the opposite end call and the incoming call, the time distribution information when the opposite end communicates, the number of times the opposite end sends and receives the information, and the communication identifier of the opposite end is added to the contact At least one of the number of times the person and the blacklist are added; the tag information includes: the number of times the communication identifier of the peer is marked as malicious and/or spam, and the communication identifier of the peer is determined to be malicious and And the number of occurrences on the page of the spam URL, at least one of the number of times the information sent using the communication identifier of the peer is marked as malicious and/or spam;
    匹配模块,配置为将所述呼叫信息和/或标记信息与预置拦截策略进行匹配,确定匹配结果;a matching module, configured to match the call information and/or the tag information with a preset interception policy to determine a matching result;
    风险级别确定模块,配置为根据所述匹配结果确定所述当前通信的风险级别;a risk level determining module, configured to determine a risk level of the current communication according to the matching result;
    安全确定模块,配置为在根据所述匹配结果确定所述当前通信的风险级别是安全级别,则确定所述当前通信是安全通信。And a security determining module configured to determine, according to the matching result, that the current communication risk level is a security level, and determine that the current communication is a secure communication.
  26. 如权利要求25所述的系统,其中,所述预置拦截策略包括多个子拦截策略;其中,每个子拦截策略分别与对应的呼叫信息和标记信息相匹配。The system of claim 25, wherein the preset interception policy comprises a plurality of sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  27. 如权利要求26所述的系统,其中,The system of claim 26, wherein
    所述匹配模块,具体配置为根据所述呼叫信息和/或标记信息确定与所述当前来电相匹配的子拦截策略的数量。The matching module is specifically configured to determine, according to the call information and/or the tag information, the number of sub-blocking policies that match the current incoming call.
  28. 如权利要求27所述的系统,其中,The system of claim 27, wherein
    所述风险级别确定模块,具体配置为根据与所述当前通信相匹配的子拦截策略的数量确定当前通信的风险级别;其中, The risk level determining module is specifically configured to determine a risk level of the current communication according to the number of the sub-blocking policies that match the current communication;
    在相匹配的子拦截策略的数量大于等于第一阈值时,确定所述当前通信是高危级别;Determining that the current communication is a high-risk level when the number of matched sub-interception strategies is greater than or equal to the first threshold;
    在相匹配的子拦截策略的数量大于等于第二阈值且小于第一阈值时,确定所述当前通信是风险级别;Determining that the current communication is a risk level when the number of matched sub-interception strategies is greater than or equal to a second threshold and less than the first threshold;
    在相匹配的子拦截策略的数量大于等于第三阈值且小于第二阈值时,确定所述当前通信是可疑级别;Determining that the current communication is a suspicious level when the number of matched sub-interception strategies is greater than or equal to a third threshold and less than a second threshold;
    在相匹配的子拦截策略的数量小于第三阈值时,确定所述当前通信是安全级别。When the number of matched sub-interception strategies is less than a third threshold, it is determined that the current communication is a security level.
  29. 如权利要求16所述的系统,其中,所述系统还包括:The system of claim 16 wherein said system further comprises:
    网络信息获取模块,配置为在所述生成模块生成新建联系人页面之前,分别获取所述终端和对端的网络信息;其中,所述网络信息包括以下至少一项:无线保真WIFI信息、基站信息、局域网信息;The network information acquiring module is configured to acquire the network information of the terminal and the peer end before the generating module generates the newly created contact page, where the network information includes at least one of the following: wireless fidelity WIFI information, base station information , LAN information;
    网络信息确定模块,配置为确定所述终端和所述对端是否具有相同的网络信息;当确定所述终端和所述对端具有相同的网络信息时,执行所述生成模块。The network information determining module is configured to determine whether the terminal and the peer end have the same network information; and when the terminal and the peer end are determined to have the same network information, the generating module is executed.
  30. 如权利要求16-29任一所述的系统,其中,所述通信处理系统在当前通信未接通挂断后、或接通挂断之后执行;其中,所述当前通信包括:语音通信、视频通信和文本通信中的至少一种。A system according to any one of claims 16 to 29, wherein said communication processing system is executed after the current communication is not turned "on" or after the "on" is disconnected; wherein said current communication comprises: voice communication, video At least one of communication and text communication.
  31. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在终端上运行时,导致所述终端执行根据权利要求1-15中的任一个所述的通信处理方法。A computer program comprising computer readable code causing the terminal to perform the communication processing method according to any one of claims 1-15 when the computer readable code is run on a terminal.
  32. 一种计算机可读介质,其中存储了如权利要求31所述的计算机程序。 A computer readable medium storing the computer program of claim 31.
PCT/CN2015/083176 2014-07-04 2015-07-02 Communications processing method and system WO2016000636A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (en) 2014-07-04 2014-07-04 A kind of communication processing method and system
CN201410319218.3 2014-07-04

Publications (1)

Publication Number Publication Date
WO2016000636A1 true WO2016000636A1 (en) 2016-01-07

Family

ID=51808083

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/083176 WO2016000636A1 (en) 2014-07-04 2015-07-02 Communications processing method and system

Country Status (2)

Country Link
CN (1) CN104135563B (en)
WO (1) WO2016000636A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878522A (en) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 Contact person's adding method, contact person's adding set and terminal
CN113098898A (en) * 2021-04-29 2021-07-09 王小平 Service data monitoring and early warning platform and early warning method

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135563B (en) * 2014-07-04 2017-03-15 北京奇虎科技有限公司 A kind of communication processing method and system
CN105657138B (en) * 2014-11-14 2021-09-03 中兴通讯股份有限公司 Call processing method and communication terminal
CN104410693B (en) * 2014-11-28 2019-06-21 北京搜狗科技发展有限公司 A kind of data transmission method, information acquisition method, server and electronic equipment
CN104618874B (en) * 2015-01-29 2019-01-29 北京搜狗科技发展有限公司 A kind of data capture method and electronic equipment
CN104836893B (en) * 2015-03-30 2016-09-28 北京奇虎科技有限公司 A kind of add the method for contact person, device, system and mobile terminal
CN105553679A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information push method and system, and server
CN105245674A (en) * 2015-09-10 2016-01-13 陈包容 Method of creating address book according to note information of newly-added email account and device
CN105120045A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new contact name
CN105120046A (en) * 2015-09-10 2015-12-02 陈包容 Method and device for creating address book according to note information of new number
CN106874254A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of business card generation method and equipment
CN105472090A (en) * 2016-01-13 2016-04-06 陈包容 Address list contact person merging method and device
CN106657528B (en) * 2016-12-29 2020-01-24 浙江吉利控股集团有限公司 Incoming call management method and device
CN107370863B (en) * 2017-08-11 2020-07-10 北京安云世纪科技有限公司 Connection information updating method and device based on Bluetooth connection
CN110753158B (en) * 2019-10-12 2020-10-23 上海赛连信息科技有限公司 Intelligent call recording method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (en) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 Method and device for automatically adding contact information and mobile terminal
CN101976265A (en) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 Method for automatically judging telephone number and adding contact
CN102892087A (en) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 Method and mobile terminal for adding contact information
CN104135563A (en) * 2014-07-04 2014-11-05 北京奇虎科技有限公司 A communication processing method and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951425A (en) * 2010-09-30 2011-01-19 宇龙计算机通信科技(深圳)有限公司 Processing method and system of contact information and mobile terminal
CN103167089A (en) * 2011-12-15 2013-06-19 中国移动通信集团江苏有限公司 Mobile terminal and maintaining method for address book of mobile terminal
CN102594918B (en) * 2012-03-19 2018-07-24 中兴通讯股份有限公司 A kind of method, terminal and system that terminal contact is realized
CN103051765A (en) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 Method and device for displaying personal information in text information
CN103078949B (en) * 2013-01-17 2015-09-23 北京奇虎科技有限公司 The method and system of display telephone number information
CN103167500B (en) * 2013-02-01 2016-08-03 杭州东信北邮信息技术有限公司 A kind of realize the method and system that call-in of mobile telephone set is uniformly processed
CN103249034A (en) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 Method and device for acquiring contact information
CN103595547B (en) * 2013-11-15 2016-07-13 北京奇虎科技有限公司 The broadcast hold-up interception method of smart machine and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (en) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 Method and device for automatically adding contact information and mobile terminal
CN101976265A (en) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 Method for automatically judging telephone number and adding contact
CN102892087A (en) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 Method and mobile terminal for adding contact information
CN104135563A (en) * 2014-07-04 2014-11-05 北京奇虎科技有限公司 A communication processing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878522A (en) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 Contact person's adding method, contact person's adding set and terminal
CN113098898A (en) * 2021-04-29 2021-07-09 王小平 Service data monitoring and early warning platform and early warning method

Also Published As

Publication number Publication date
CN104135563B (en) 2017-03-15
CN104135563A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
WO2016000636A1 (en) Communications processing method and system
US11689656B2 (en) Computing device and system for rendering contact information that is retrieved from a network service
EP2852106B1 (en) Real time communication method, terminal device, real time communication server and system
US9402170B1 (en) Method and system for providing informative incoming call alerts
US11283919B2 (en) Caller ID verification using call identification and block lists
US8543144B2 (en) Automated caller identifier from contact lists of a user's contacts
WO2012065381A1 (en) Method and apparatus for preventing malicious softwares from transmitting data
US10601762B2 (en) Techniques for coordinating a messaging experience across platforms
US8953471B2 (en) Counteracting spam in voice over internet protocol telephony systems
US11165899B1 (en) Techniques to manage contact records
CN103312888A (en) Priority telephonic communications
EP2761847B1 (en) Method and system for managing the communication between two users
US9716796B2 (en) Managing communication events
CN106385516B (en) A kind of method, apparatus and terminal of the transfer of setting business
US9338112B2 (en) Safety protocols for messaging service-enabled cloud services
WO2016019488A1 (en) Communication interception method, device, server and user equipment
CN104580070A (en) Method, device and system for confirming network conversations
US11070677B1 (en) Techniques for media call multiway relay escalation
EP2804411A1 (en) Method and system for authenticating an application for a mobile data processing terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15814687

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15814687

Country of ref document: EP

Kind code of ref document: A1