WO2018227785A1 - Method for updating business card of contact and terminal - Google Patents

Method for updating business card of contact and terminal Download PDF

Info

Publication number
WO2018227785A1
WO2018227785A1 PCT/CN2017/100518 CN2017100518W WO2018227785A1 WO 2018227785 A1 WO2018227785 A1 WO 2018227785A1 CN 2017100518 W CN2017100518 W CN 2017100518W WO 2018227785 A1 WO2018227785 A1 WO 2018227785A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
business card
blacklist
contact
Prior art date
Application number
PCT/CN2017/100518
Other languages
French (fr)
Chinese (zh)
Inventor
代栓青
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018227785A1 publication Critical patent/WO2018227785A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present application relates to the field of terminal applications, and in particular, to a method and a terminal for updating a business card of a contact.
  • the terminal can send update information to the friend's terminal through the system application (Wireless Local Area Networks (WLAN) direct connection, Bluetooth sharing, etc.) provided by itself or the third-party application (WeChat, QQ, etc.), which can realize real-time dynamic Share data with each other.
  • system application Wireless Local Area Networks (WLAN) direct connection, Bluetooth sharing, etc.
  • third-party application WeChat, QQ, etc.
  • the contacts stored in the existing terminal, the local business card, the blacklist, and the data stored in the cloud server are independent of each other, and are not managed and optimized. For example, after a contact card's business card (such as mobile phone number, email address, etc.) is updated, the friend in the address book does not know that the business card data has been updated, which may result in failure to contact, etc., and the contact card of the terminal is not updated in time, the user The experience is relatively poor.
  • a contact card's business card such as mobile phone number, email address, etc.
  • the embodiment of the present application provides a method, a terminal, and a server for updating a business card of a contact, which are used for data sharing between the terminal and the cloud server, so as to achieve the purpose of updating the business card of the local contact in time.
  • a first aspect of the present application provides a method for updating a business card of a contact, which may include: the first terminal sends a first business card request to the server, where the first business card request is used to obtain the first contact of the local contact
  • the latest business card is a business card obtained by the server from the second terminal, the second terminal is the terminal of the first contact, the latest business card may include a user name and a communication number;
  • the first terminal receives the sending by the server The latest business card;
  • the first terminal updates the historical business card of the first contact saved by the first terminal according to the latest business card. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact.
  • the latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server.
  • the updated local business card (the latest business card) is sent to the server.
  • the server can directly query the first business card.
  • the corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal.
  • the first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
  • the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts.
  • the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration.
  • the first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may both be empirical values, which are determined by the user.
  • the first contact is a contact in an inactive contact group
  • the inactive contact group is a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold
  • the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact.
  • the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server.
  • the first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server.
  • a common contact before the first favorite contact is received.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
  • the first terminal sends a first business card request to the server, where The method includes: if the communication initiated by the first terminal to the second terminal fails, the first terminal sends a first business card request to the server; the method may further include: the first terminal according to the latest business card and the second terminal Communicate. It should be understood that, when the first terminal initiates a communication request to the business card corresponding terminal that saves the first contact, the request fails, specifically, the call request is initiated; then, the first terminal may initiate a first business card request to the server, and the first business card Request the latest business card used to request the first contact.
  • the first terminal When the first terminal receives the latest business card sent by the server, the first terminal can communicate with the second terminal by using the communication number in the latest business card, which can provide a good communication service for the user, and does not change the business card of the contact. And can't contact each other.
  • the method may further include: if the first terminal is If the business card is updated, the first terminal sends the updated local business card to the server; the first terminal receives the local contact sent by the server, and the local contact is the contact of the first terminal saved by the server; The first terminal sends the updated local business card to the second terminal through the server.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: the first terminal is in the local a new business card of the second contact is set in the contact; if the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local device of the first terminal to the third terminal by using the server The business card, the third terminal is the terminal of the second contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal's local business card may be more easily found, and the first terminal The user of the terminal contacts.
  • the method may further include: the first terminal The communication number is added to the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal receives If the number of communications initiated by the fourth terminal is greater than the third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal can take the initiative Uploading the business card to the server, or receiving the business card request sent by the server, and then uploading the business card to the server provides an achievable way.
  • the second aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a first business card request sent by the first terminal, where the first business card request is used to obtain the first contact in the local contact
  • the latest business card, the latest business card may include a user name and a communication number; the server acquires the latest business card from the second terminal, the second terminal is the terminal of the first contact; the server sends the latest business card to the first terminal,
  • the latest business card is used to update the historical business card of the first contact saved by the first terminal. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact.
  • the latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server.
  • the updated local business card (the latest business card) is sent to the server.
  • the server can directly query the first business card.
  • the corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal.
  • the first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
  • the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts.
  • the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may be used. It is the experience value, which is determined by the user.
  • the first contact is a contact in an infrequent contact group, and the infrequent contact group a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold, and the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact.
  • the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server.
  • the first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server.
  • a common contact before the first favorite contact is received.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
  • the method may further include: the server receiving the first terminal Sending an updated local business card; the server sends a local contact to the first terminal, where the local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the first terminal to send The updated local business card, the updated local business card includes a username, a terminal communication number; the server sends the updated local to the second terminal business card.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: receiving, by the server, the first terminal The local business card; the server sends the local business card to the second terminal, where the local business card is used for saving the second terminal in the business card of the local contact.
  • the server sends the local business card to the second terminal, where the local business card is used for saving the second terminal in the business card of the local contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving the first terminal
  • the updated blacklist request is sent, and the update blacklist request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number in the local contact or Landline number.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal.
  • the first terminal can actively upload the local business card to the server, It can provide a business card request sent by the server, and then upload the local business card to the server, providing an achievable way.
  • the third aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: if the local business card of the first terminal is updated, the first terminal sends the updated local business card to the server; The first terminal receives a local contact sent by the server, and the local contact is a contact of the first terminal saved by the server; the first terminal sends the updated local business card to the second terminal by using the server.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: the first terminal newly creating a business card of the second contact in the local contact If the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the second The terminal of the contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the first terminal: the first communication
  • the number is added to the blacklist; it should be understood that the first communication number can be a strange number, or it can be a mobile number or a landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal updating the blacklist may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal may include: If the query result refers to If the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal And receiving, by the fourth terminal, the number of communications initiated by the fourth terminal is greater than a third threshold, the first terminal initiates a marked data request to the server, where the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • a fourth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: the server receiving an updated local business card sent by the first terminal; the server sending a local contact to the first terminal,
  • the local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the updated local business card sent by the first terminal, and the updated local business card includes the user name and the terminal communication. Number; the server sends the updated local business card to the second terminal.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: receiving, by the server, the local business card sent by the first terminal; Sending the local business card, the local business card is used for saving the second terminal in the business card of the local contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving the update black sent by the first terminal
  • the list request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact.
  • the server is based on the update black name
  • the single request, the cloud blacklist is updated; the server determines the target communication number, and the target communication number is the communication number of the blacklist in which the same communication number is added to the blacklist, and the number of times the blacklist is greater than the third threshold; the server serves the operator.
  • the terminal queries the first marked data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, where the first query result is used Update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server sending the second business card to the first terminal Request; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the fifth aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal newly creates a business card of the second contact in the local contact; if the first terminal and the third terminal occur The first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the terminal of the second contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the first terminal adds the first communication number to the blacklist;
  • a communication number can be a strange number, or it can be a mobile number or a landline number in a local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set.
  • the carrier server can return the query result.
  • the server sends the feedback to the first terminal, and the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal, according to the query result, updating the blacklist may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first And the first terminal sends a marked data request to the server, where the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner.
  • the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • a sixth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a local business card sent by the first terminal; the server sending the local business card to the second terminal, where the local business card is used The second terminal is saved in the business card of the local contact.
  • a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving an update blacklist request sent by the first terminal, the update black List request package
  • the first communication number that the first terminal joins the blacklist is included; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the seventh aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal adds a first communication number to a blacklist; it should be understood that the first communication number may be a strange number, or Is the mobile number or landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: if the query result indicates the If the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist; The terminal responds to the user input removal operation from the black The first communication number is removed from the list. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal, according to the query result, updating the blacklist may include: if the query result indicates The second communication number is added to the blacklist by the first terminal, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal receives the first When the number of communications initiated by the four terminals is greater than the third threshold, the first terminal initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the eighth aspect of the present application provides a method for updating a business card of a contact, which may include: the method further includes: receiving, by the server, an update blacklist request sent by the first terminal, where the update blacklist request includes the first A terminal joins the first communication number of the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, a second tagged data request sent by the first terminal, where Second number of markers A second communication number is included as requested; the server sends the second tagged data request to the carrier server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server sending the first terminal The second business card requests; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the ninth aspect of the embodiment of the present application provides a terminal, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the tenth aspect of the embodiment of the present application provides a server, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • An eleventh embodiment of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to send a first business card request to the server, where the first business card request is used to obtain a latest business card of the first contact in the local contact, where the latest business card is obtained by the server from the second terminal.
  • a business card the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number; and receives the latest business card sent by the server;
  • the processor is configured to invoke the operation instruction, and update a historical business card of the first contact saved by the first terminal according to the latest business card.
  • a twelfth aspect of the embodiments of the present application provides a terminal, which may include:
  • a memory a transceiver, and a bus, the memory and the transceiver being connected by the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to: if the communication number in the local business card of the first terminal is updated, the transceiver sends the updated local business card to the server; and receives the local contact sent by the server, the local The contact is a contact of the first terminal saved by the server; and the updated local business card is sent to the second terminal by the server.
  • a thirteenth aspect of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the storage operation instruction to create a second contact name in the local contact sheet
  • the transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
  • a fourteenth aspect of the embodiments of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the storage operation instruction to add a first communication number to a blacklist; and update the blacklist according to the query result;
  • the transceiver is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • a fifteenth aspect of the embodiments of the present application provides a computer readable storage medium having instructions stored therein that, when run on a computer, cause the computer to perform the methods described in the above aspects.
  • the technical solution of the present application or the part that contributes to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a computer software instruction for storing the above device, comprising a program designed to execute the above first aspect, the second aspect is a data node or a management node.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a sixteenth aspect of the present application provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform any of the optional implementations of the first aspect or the first aspect of the present application, or the present application The method of any of the alternative implementations of the second aspect or the second aspect.
  • the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the second business card.
  • a business card acquired by the terminal, the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number;
  • the first terminal receives a latest business card sent by the server;
  • the first terminal And updating, according to the latest business card, a historical business card of the first contact saved by the first terminal.
  • the data sharing between the terminal and the cloud server achieves the purpose of timely updating the business card of the local contact, and solves the problem that the user cannot contact the user because the user replaces the mobile phone number, and the terminal can save according to the updated business card of the contact.
  • the problem that the manual new contact operation is complicated can be solved.
  • the implementation of the present application can enhance the terminal characteristic competitiveness, improve the terminal usability, and improve the user experience.
  • FIG. 1 is a schematic diagram of a scenario applied to an embodiment of the present application
  • FIG. 2 is a schematic diagram of an embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • 3A is a schematic diagram of an interface of a first terminal logging in to a cloud server
  • 3B is a schematic diagram of a local business card displayed by the first terminal
  • 3C is a schematic diagram of a local contact displayed by the first terminal
  • FIG. 3D is a schematic diagram of the first terminal uploading a local business card and a local contact to the cloud server;
  • 3E is a schematic diagram of a first terminal uploading a local business card to a cloud server
  • 3F is a schematic diagram of a first terminal uploading a local contact to a cloud server
  • FIG. 3G is a schematic diagram showing a recommended upload period of the first terminal
  • FIG. 3H is a schematic diagram of the first terminal acquiring a frequently used contact in the current month
  • FIG. 3I is a schematic diagram of the first terminal acquiring a contact that is not commonly used in the current month
  • FIG. 3J is a schematic diagram of uploading the latest common contacts of the cloud server by the first terminal
  • FIG. 3K is a schematic diagram of uploading the latest unused contacts of the cloud server by the first terminal
  • FIG. 3L is a schematic diagram showing prompt information of a newly created contact by the first terminal
  • 3M is a schematic diagram of a first terminal sending a business card request of a first contact
  • FIG. 3N is a schematic diagram of the second terminal displaying whether to upload a local business card
  • FIG. 3O is a schematic diagram of updating a business card of a local contact by the first terminal
  • FIG. 4 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • 5A is a schematic diagram of a first terminal uploading an updated local business card to a cloud server
  • 5B is a schematic diagram of a first terminal receiving a local contact sent by a cloud server
  • 5C is a schematic diagram of other contacts that are not filtered by the first terminal and are not in the local contact;
  • 5D is a schematic diagram of contacts in a local contact filtered by the first terminal
  • 5E is a schematic diagram of the first terminal sending an updated local business card to other contacts not in the local contact;
  • 5F is a schematic diagram of the first terminal sending an updated local business card to a contact in a local contact
  • 5G is a schematic diagram of whether the second terminal saves the local business card that the first terminal has updated
  • FIG. 6 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • FIG. 7A is a schematic diagram of a first terminal call communication number
  • FIG. 7B is a schematic diagram of a first terminal sending a business card request to a cloud server
  • 7C is a schematic diagram showing the uploading of the local business card by the second terminal
  • 7D is a schematic diagram of a first terminal receiving a local business card of a second terminal
  • 7E is a schematic diagram of dialing the latest communication number of the first terminal to the second terminal
  • FIG. 8 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application.
  • 9A is a schematic diagram of a new contact of a first terminal
  • 9B is a schematic diagram of a business card of a newly created contact on the first terminal
  • 9C is a schematic diagram of communication records between a first terminal and a second terminal
  • 9D is a schematic diagram of a first terminal transmitting a local business card of a first terminal to a second terminal;
  • 9E is a schematic diagram of storing, by the second terminal, a local business card of the first terminal
  • FIG. 10 is a schematic diagram of an embodiment of a method for managing a blacklist in an embodiment of the present application.
  • 11A is a schematic diagram of a first terminal adding a first communication number to a blacklist
  • 11B is a schematic diagram of a blacklist on the first terminal
  • 11C is a schematic diagram of a first terminal uploading a blacklist to a cloud server
  • 11D is a schematic diagram of updating a blacklist by a first terminal
  • 11E is a schematic diagram of whether the first terminal updates the tag information in the blacklist
  • FIG. 12 is a schematic diagram of another embodiment of a method for managing a blacklist
  • FIG. 13A is a schematic diagram of a first terminal adding a first communication number to a blacklist
  • 13B is a schematic diagram of the first terminal detecting that the number of communications with the target number is greater than a preset threshold, and sending the tagged data request of the query target number to the cloud server;
  • 13C is a schematic diagram showing a result of a target query by a first terminal
  • FIG. 14 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application.
  • 15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 15B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 16B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 17B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the applied scenario is as shown in FIG. 1 , and the cloud server establishes a connection with multiple terminals.
  • the terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a vehicle-mounted computer, and the like.
  • the terminal may use a mobile phone as an example.
  • the cloud server program is deployed on the cloud server, and each terminal can communicate with each other.
  • Cloud servers are models of the addition, use, and delivery of Internet-based related services, often involving the provision of dynamically scalable and often virtualized resources over the Internet.
  • Embodiment 1 The cloud server optimizes the contacts saved by the terminal, as shown in FIG. 2 , which is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal uploads a local business card and/or a local contact to the cloud server.
  • the first user (user A) using the first terminal is taken as an example.
  • the user A is a cloud service user
  • the cloud server is not required to be registered, and the user can log in directly.
  • FIG. 3A it is a schematic diagram of an interface for logging in to the cloud server on the first terminal.
  • the local business card can also be referred to as the business card of the local user.
  • the local business card may include the user's mobile phone number and the landline number, and may also include any one of the user's name and/or nickname, avatar, email address, address (office address or home address), birthday, gender, and the like. Any combination of several.
  • the local business card can include: title: user A, mobile phone number: 18312345678, Office Address: Guomao Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com.
  • the information in the local business card corresponding to each terminal can be manually added or automatically generated.
  • the method for automatically generating the local business card of each terminal is: the first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), and obtains the number of the newly inserted SIM card.
  • SIM subscriber identification module
  • the user interface (UI) can pop up a prompt box for saving the user A business card. After the user selects to save, the UI can also pop up whether to upload the user A business card to the cloud server.
  • the manner of automatically generating the local business card of each terminal may also be as follows: for example, the automatic generation may be that the first terminal has more than 5 times of the same number according to the detected mobile phone number. (You can set it yourself), or the number of mobile phones that are connected to the same number is more than 5 times (you can set it yourself), you can think that this number is the mobile phone number in the business card of the machine, and it is saved in the user's A business card; Or, the number of emails received by the same email address is more than 5 times (can be set by yourself), or the number of emails sent by the same email address is more than 5 times (you can set it yourself). You can think of this number as the mailbox in your business card. The address is saved in the user's A business card.
  • the user A can also be prompted with a prompt message to prompt the user A whether the information is accurate. If it is not accurate, the user A can also manually modify it.
  • manually adding a user's A business card although the input may be a bit cumbersome, the user A's own input is more accurate.
  • FIG. 3C it is a schematic diagram of a local contact displayed on the first terminal. It should be understood that uploading a local business card and/or local contact may include, but is not limited to, the following implementations:
  • User A can select to upload the local business card and/or local contact to the cloud server on the login interface of the cloud service of the first terminal. That is, the first terminal generates an upload instruction according to the selected operation of the user A on the login interface of the cloud service on the display screen, and then uploads the user A business card and/or the local contact to the cloud server according to the upload instruction.
  • FIG. 3D a schematic diagram of uploading a local business card and a local contact to the cloud server for the first terminal is shown.
  • User A may also choose to upload a local business card and/or a local contact to the cloud server on the locality of the first terminal.
  • the display interface displaying the address book and the user A business card may have a cloud identifier to indicate that the user A may select an address book, upload a local contact, and/or a user A business card in the setting.
  • FIG. 3E a schematic diagram of uploading a local business card to a cloud server for the first terminal.
  • FIG. 3F a schematic diagram of uploading a local contact to a cloud server for the first terminal.
  • each terminal contact may have at least one identifier for the other party to uniquely determine the identity.
  • the terminal may carry at least one identifier that uniquely identifies the other party, and then the server may The identifier obtains the contact information of the peer user.
  • each contact in the contact saved by the cloud server has a unique identifier (ID), that is, a mapping table in which the contact information and the unique identifier are stored in the cloud server.
  • ID unique identifier
  • the unique identifier may be a letter, a number, a combination of letters and numbers, a serial number, a character, etc., and may uniquely indicate a different contact; or the unique identifier may also be an identity information or several identity information that is strongly related to the user identity.
  • the collection such as ID number, bank card number, micro-signal, QQ number, etc., under the premise of complying with laws and regulations and protecting user privacy, the cloud server with user identity data can obtain the requested end user according to the user identity information. Business card information, thereby improving user communication efficiency.
  • the server of the operator sends a request to obtain the contact information of the user B, and the request carries relevant information of the user B, such as a micro signal, an Alipay account number, a name, and the like.
  • relevant information of the user B such as a micro signal, an Alipay account number, a name, and the like.
  • the user who has checked the condition, that is, the user B is selected by the big data processing, and then the mobile phone number of the user B is obtained from the local server, and the mobile phone number is pushed to the mobile phone of the user A.
  • Table 1 below shows a mapping table of contacts and unique identifiers saved by the cloud server.
  • user A may also select other data such as uploading pictures and music files, which is not limited.
  • user A selects the uploaded data
  • the user can also set an automatic uploading period according to actual needs, or there are several recommended automatic uploading cycles on the first terminal, and user A can select it by himself.
  • FIG. 3G a schematic diagram of displaying a recommended upload period on the first terminal is shown.
  • the uploading period can be one month, two months or three months, or other time, user A can also set according to the actual needs of the user.
  • the first terminal may also have an active uploading period reminder, which may remind the user A to actively upload, for example, the user A business card and/or the local contact uploaded on the 15th of this month, and the uploading period reminder selected by the user A is one month. Then, by the 15th of next month, the first terminal will prompt the user A to re-upload the user A business card and/or local contact, in case the user A forgets.
  • an active uploading period reminder may remind the user A to actively upload, for example, the user A business card and/or the local contact uploaded on the 15th of this month, and the uploading period reminder selected by the user A is one month. Then, by the 15th of next month, the first terminal will prompt the user A to re-upload the user A business card and/or local contact, in case the user A forgets.
  • the first terminal acquires the latest frequently used contact and/or the latest unused contact.
  • the first terminal may obtain the latest frequently used contact and/or the latest unused contact by itself, or may obtain the latest frequently used contact and/or the latest unused contact through the cloud server.
  • the first terminal itself obtains the latest frequently used contacts and/or the latest unused contacts, as shown below:
  • the first terminal can acquire the latest frequently used contacts and/or the latest unused contacts according to the preset creation rules.
  • the preset creation rule may be that the first terminal calculates the same number and the local number (the number on the first terminal) according to the preset time (half month, one month or two months, etc.).
  • the number of communications eg, call, short message, etc.
  • the first threshold e.g, 10 times/month
  • the second threshold eg, 3 times /
  • the month is added, the number is added to the contacts that are not commonly used in the month.
  • the frequently used contacts of the month can be understood as the latest frequently used contacts, and the contacts that are not commonly used in the month can be understood as the latest unused contacts.
  • FIG. 3H a schematic diagram of acquiring the latest frequently used contacts for the first terminal is shown.
  • FIG. 3I a schematic diagram of obtaining the latest infrequent contacts for the first terminal is shown.
  • the first threshold and the second threshold may be the same or different, and the first threshold and the second threshold may be set by the user; the same number may be the contact that has been saved on the first terminal. The number can also be an unsaved strange number.
  • the first terminal obtains the latest frequently used contacts and/or the latest unused contacts through the cloud server, as shown below:
  • the first terminal may obtain the current preset time common contact and/or the current preset time unusable contact according to the preset creation rule; the first terminal may not use the current preset time common contact and/or the current preset time.
  • the contact is uploaded to the cloud server; the cloud server analyzes and calculates the latest common contacts and/or according to the currently preset preset contacts and/or current preset time infrequent contacts, preset calculation rules, and local contacts that have been uploaded. Or the latest unused contacts. It should be understood that, assuming that the preset time is one month, the current preset time is understood as the most recent month, and may also be referred to as the current month.
  • FIG. 3J a schematic diagram of uploading the latest common contacts of the cloud server for the first terminal is shown.
  • FIG. 3K a schematic diagram of uploading the latest unused contacts of the cloud server for the first terminal is shown.
  • the first terminal may create a monthly contact for the month and/or a contact that is not commonly used in the current month, when the first terminal is connected to a wireless fidelity (WIFI), or a network connected to the 3G/4G/5G, and
  • WIFI wireless fidelity
  • CPU central processing unit
  • the preset operation rule may take the union or the intersection of the common contacts uploaded before the first terminal saved by the common contact and the cloud server in the current month, or may be the first saved for the contacts and the cloud server that are not commonly used in the current month.
  • the infrequent contacts uploaded by the terminal before the collection take the union or take the intersection.
  • the cloud server obtains the latest frequently used contacts and/or the latest unused contacts, the latest frequently used contacts and/or the latest unused contacts are sent to the first terminal.
  • the cloud server calculates the latest common contact according to the first preset operation rule, and the first preset operation rule may be a union of the frequently used contacts uploaded by the common contacts and the cloud server saved in the current month. Or take the intersection. And/or, the cloud server calculates the latest infrequently used contacts according to the second preset operation rule, and the second preset operation rule may be not commonly used for uploading the first terminal saved by the contact and the cloud server in the current month.
  • the contact takes the union or takes the intersection.
  • the cloud server calculates the latest common contact according to the first preset operation rule; and then calculates the latest unused contact according to the third preset operation rule, and the third preset operation rule may be the latest for the cloud server.
  • the cloud server calculates the latest unusable contacts according to the second preset operation rule; and then calculates the latest common contacts according to the fourth preset operation rule, and the fourth preset operation rule may specifically be the cloud server to the latest one.
  • the cloud server may filter out the contacts that exist in the cloud server common contacts, but the first terminal uploads the common contacts in the current month, if the contact is for three consecutive months ( The user can set the time by himself. In this filtering set, the cloud server can delete the contact in the latest frequently used contact when generating the latest frequently used contact.
  • the cloud server can record a strange number, that is, if the same strange number is displayed for three consecutive months (the user can set the time) in the common contacts of the first terminal of the current month, when the cloud server generates the latest frequently used contacts, At the same time, the prompt message is sent to the first terminal. If the strange number is not saved in the first terminal phone book, the user is prompted to save.
  • the prompt information may be “136-1234-0000 is a frequent communication number, please confirm whether a new contact needs to be created?” as shown in FIG. 3L, which is a schematic diagram showing prompt information of a newly created contact on the first terminal.
  • the latest unused contacts and the latest frequently used contacts may also include a communication number that is not stored in the local contact, and the communication number may refer to a contact number such as a mobile phone number and a phone number.
  • the first terminal sends a first business card request to the cloud server, where the first business card request is used to obtain the latest business card of the first contact in the local contact.
  • the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal.
  • the second terminal is a terminal of the first contact, and the latest business card may include a username and a communication number.
  • the first business card request may include a username of the first contact, and a username of the first terminal.
  • the first contact may be a contact that has less than the first threshold for the number of communications with the first terminal within a preset duration.
  • the first contact may also be a contact in an infrequently used contact group, and the unused contact group is a union or intersection of the first common contact and the second common contact determined by the server, and the first common contact is
  • the first terminal sends to the server, within a preset duration, the number of communications with the first terminal is less than the first threshold, and the second less frequently used contact is saved by the server. People don't use contacts before.
  • the first business card request may also be referred to as a business card request of the first contact. If it is the latest unused contact obtained by the first terminal, the user A can confirm it, and send the first contact's business card request to the cloud server after confirming. For example, the user terminal E and the user F are not commonly used in the latest, and the first terminal may send a business card request for querying at least one of the user E and the user F to the cloud server. As shown in FIG. 3M, a schematic diagram of a business card request of a first contact is sent for the first terminal. The user A may select the latest latest infrequent contact to send a business card request for querying the first contact, or may send the first contact's business card request to at least one of the latest unused contacts.
  • the name of the first user may also be carried, indicating that the second user (user B) using the second terminal may know that Who requests his local business card, because for any user, not the business card request of any contact will send his own business card, if you know who is requesting your own business card, you can protect the security of user information.
  • the user B can know that the user A is requesting the business card of the contact, and if the user B knows the user A, or considers that the user A is reliable, You can choose to upload the user B business card; if you don't know, user B can choose not to upload the user B business card. Alternatively, User A can also delete some unwanted contacts in the latest unused contacts or the latest frequently used contacts.
  • the business card of the contact person can be obtained through the cloud server, or through SMS, MMS, WeChat, or Wireless Local Area Networks (Wireless Local Area Networks, WLAN) Direct connection, Bluetooth sharing, etc. to obtain the business card of their contact. If it is not a cloud service user, you cannot obtain the business card of its contact through the cloud server. You can use short message, WeChat, WIFI, Bluetooth sharing, etc. to obtain the business card of its contact.
  • the cloud server sends a first business card request to the second terminal.
  • the first business card request may be a business card request of at least one of the latest unused contacts, and the cloud server according to the saved contact And a unique identifier relationship mapping table, querying a unique identifier corresponding to at least one of the latest unused contacts. Then, the cloud server sends a first business card request to the second terminal that logs in to the unique identifiers.
  • the cloud server After receiving the business card request of the user E, the cloud server searches for the relationship between the saved contact and the unique identifier (Table 1 above), and finds that the unique identifier of the user E is "yun005", and the cloud server logs in to the second terminal.
  • User E which is uniquely identified as "yun005", sends a business card request.
  • the user F is used as an example.
  • the cloud server After receiving the business card request of the user F, the cloud server searches for the unique identifier of the user F as "yun006" according to the relationship mapping table between the saved contact and the unique identifier (Table 1 above).
  • the cloud server sends a business card request to the user F who is uniquely identified as "yun006" by using the second terminal.
  • the first business card request may carry user information of the first terminal, and is used to indicate that the user using the second terminal can know who requested his local business card.
  • the cloud server itself also stores the business card of the cloud service user, and can directly query the business card of at least one latest unused contact, and then feed back the business card of at least one latest unused contact to the first terminal.
  • the second terminal sends the local business card to the cloud server.
  • the second terminal may prompt the second user of the second terminal to upload the local business card, which may also be referred to as the local business card and the local business card.
  • the user E logs in as "yun005" on the second terminal.
  • the second terminal prompts the user E to upload the user E business card to the cloud server according to the business card request.
  • the user F logs in with the "yun006" on the second terminal.
  • the second terminal prompts the user F to upload the user F business card to the cloud server according to the business card request.
  • FIG. 3N a schematic diagram of displaying prompt information for uploading a local business card for the second terminal is shown.
  • the prompt information may be whether to upload the business card of the second contact to the cloud server or other prompt information.
  • the prompt information displayed on the second terminal may be “User A requests the local business card, please determine whether to upload the cloud server to inform the user A?”, or other prompt information indicating that the local business card is uploaded, and
  • the manner in which the second terminal displays the prompt information may be various, the manner of the notification bar, the manner of suspension, the manner of sliding in, the manner of jumping, and the like, and are not specifically limited.
  • the corresponding voice play may also be performed, in case the user locks the screen when the terminal is locked, or when the display screen is inconvenient, or other circumstances, the user may Determine the priority of the event and feedback the result of the request in time. If the user E and the user F select "Yes", the second terminal is instructed to upload the local business card to the cloud server.
  • the second terminal herein refers to the terminal corresponding to the user E and the terminal corresponding to the user F
  • the local business card corresponding to the user E of the user E refers to the user E business card
  • the local business card corresponding to the terminal of the user F refers to User F business card.
  • the cloud server sends the local business card of the second terminal to the first terminal.
  • the cloud server may directly return the local business card of the second terminal to the first terminal, or may be the business card and the cloud server according to the stored contact.
  • the local business card of the second terminal determines whether there is content update. If there is an update, the cloud server may update the stored local business card of the second terminal, and return the updated local business card of the second terminal to the first terminal. Exemplarily, the cloud server returns the user E business card and the user F business card to the first terminal.
  • the first terminal updates, according to the local business card of the second terminal, a historical business card of at least one of the latest unused contacts.
  • the first terminal updates the historical business card of at least one of the latest unused contacts according to the local business card of the first contact.
  • the first terminal saves the user E history card, the user F history name
  • the user E is not the same as the user's local business card and the user's F business card
  • the user's E business card and the user's F business card are fed back to the cloud server to implement the first terminal.
  • the purpose of the business card in the local contact is updated in time.
  • FIG. 3O a schematic diagram of updating the business card of the local contact for the first terminal is shown.
  • FIG. 3O illustrates the user E card as an example, and the same processing method is used for the user F. The details are not described herein.
  • the cloud server may also send the user E local business card and the user F local business card to the first terminal. .
  • the embodiment of the present application may obtain the latest common contact and/or the latest unused contact, and may also send a business card request of the first contact through the cloud server, where the first contact's business card request is at least one.
  • the cloud server may send a first business card request to the second terminal of the first contact, and the second terminal may feed back the local business card to the cloud server, and the cloud server feeds back to the first terminal.
  • the business card of each contact in the user's local phone book can be updated in time to ensure that the business card of the contact in the user's local phone book is up-to-date, and the user can be contacted in time. Infrequently used contacts play a key role.
  • the embodiment of the present application can also implement the data sharing between the terminal and the cloud server by using the cloud server, which can enhance the competitiveness of the terminal, improve the usability of the terminal, and improve the user experience.
  • Embodiment 2 The terminal and the cloud server share the business card information update
  • FIG. 4 is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal sends the updated local business card to the cloud server.
  • the first user (user A) using the first terminal is taken as an example.
  • the user A business card is updated as shown in FIG. 3B above, as shown in FIG. 5A, and the first terminal is updated.
  • the mobile phone number of user A is: 18312345678; in FIG. 5A, the mobile phone number of user A becomes: 18735778234, the office address and the email address have not changed, and the office address: Shenzhen Luohu District International Trade Center Building, email address: 123456789@qq.com. It should be understood that User A's cloud account does not change.
  • the updated content of the user A business card may also be information such as a landline number, a home address, an office address, a nickname, an avatar, an email address, and the like.
  • the first terminal uploads the updated first contact's business card to the cloud server, it may upload on the login cloud account interface, or click the cloud identifier next to the contact's business card to upload, or other uploading methods.
  • the specific is not limited.
  • the way in which the user A business card is updated may be an automatic update or a manual update.
  • Automatic update The first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), obtains the number of the newly inserted SIM card, and pops up the user interface (UI) to update the user.
  • SIM subscriber identification module
  • UI user interface
  • the prompt box of the A business card after the user selects to save, the UI can also pop up whether to upload the user A latest business card (the updated user A business card) to the cloud server.
  • Manual update Manually modify a certain information in the user's A business card. After the user chooses to save, the UI displays a prompt message asking the user whether to upload the latest business card of User A to the cloud server.
  • the cloud server sends a local contact of the first terminal to the first terminal.
  • the cloud server after receiving the updated first user (user A) business card, the cloud server analyzes the updated content and updates the user A business card stored on the cloud server.
  • the cloud server can also find the local contact corresponding to the cloud account "yun001" in the stored data according to the cloud account yun001 of the user A, and the cloud server sends the local contact to the first terminal.
  • FIG. 5B a schematic diagram of a local contact sent by the cloud server is displayed for the first terminal.
  • the first contact may be a local contact uploaded by the first terminal and updated by the user A.
  • the contacts in the first contact some are cloud service users, some are not cloud service users, and the contact person for the cloud service user may have an identifier, a text or other prompt information for indicating that the contact is a cloud. Service user.
  • the first terminal sends the updated local business card to the second terminal by using the cloud server.
  • the first terminal may filter the contacts in the local contact that are not sent by the cloud server, and select other manners to notify the contact, such as a short message. , MMS, WeChat, WLAN direct connection, Bluetooth sharing, etc.
  • FIG. 5C it is a schematic diagram of other contacts that are filtered out on the first terminal and are not in the local contact.
  • the contacts in the local contacts can be notified by selecting the cloud server, or they can be notified by SMS, MMS, WeChat, Wireless Local Area Networks (WLAN), Bluetooth sharing, etc.
  • FIG. 5D it is a schematic diagram of contacts in the local contacts filtered on the first terminal.
  • the cloud server when the cloud server sends the local business card that has been updated by the first terminal to the second terminal, the cloud server needs to first query and output the first business card according to the mapping relationship between the contact and the unique identifier (such as Table 1 above).
  • the target unique identifier corresponding to the local contact of the terminal, and then the updated local business card is sent to the second terminal uniquely identified by the login target.
  • FIG. 5E a schematic diagram of the updated local business card is sent to the other contacts that are not in the local contact for the first terminal.
  • FIG. 5F a schematic diagram of the updated local business card is sent to the contact of the local contact for the first terminal.
  • the updated local business card can be sent to the cloud server through the cloud server, or through short messages (SMS, MMS), WeChat, direct connection, Bluetooth sharing, etc.
  • SMS short messages
  • MMS mobile phone
  • WeChat direct connection
  • Bluetooth sharing etc.
  • the method sends the updated local business card to the contact; for the contact who is not the cloud service user in the local contact, the updated local machine can be sent to the short message (SMS, MMS), WeChat, WLAN direct connection, Bluetooth sharing, etc. business card.
  • SMS short message
  • MMS WeChat
  • WLAN direct connection
  • Bluetooth sharing etc. business card.
  • the contact for the cloud service user may be indicated by a specific identifier, such as a cloud identifier, or may be prompted by other means such as text, voice, or the like.
  • the first terminal may send the updated update to the local contact.
  • the local business card if the local contact is saved on the previous SIM card, the first terminal can obtain the local contact from the cloud server, and then send the updated local business card.
  • the second terminal receives and updates the saved historical business card of the first terminal.
  • the second terminal may refer to one terminal or multiple terminals, and the number of the second terminals may correspond to the number of local contacts of the first terminal.
  • the second terminal receives the updated local business card of the first terminal, and the UI interface of the second terminal may have a prompt message for selecting whether to update the business card of the local contact.
  • FIG. 5G a schematic diagram is displayed for the second terminal to receive the updated local business card of the first terminal and select whether to save to the local contact of the second terminal.
  • the local business card of the second terminal is saved on the first terminal, but the local business card of the first terminal may not be saved on the second terminal.
  • the corresponding user on the first terminal is user A
  • the user corresponding to the second terminal is user B. If the user A business card is not saved in the local contact of user B, the second terminal receives the updated user A business card.
  • the second terminal receives the updated user A business card, and the user B can select whether to update.
  • the first terminal when the first terminal local business card is updated, the first terminal may upload to the cloud server.
  • the updated local business card the cloud server may update the stored local business card of the first terminal, and the cloud server may also send its local contact to the first terminal, and then the first terminal may pass through the cloud server to the local contact
  • the contact sends the updated local business card
  • the second terminal receives the local business card that has been updated by the first terminal, and can select whether to update the local contact of the second terminal.
  • the embodiment of the present application can share the data of the terminal with the cloud server by using the terminal, and achieve the purpose of sharing the business card in time, and solve the problem that the user cannot contact the local user because the user replaces the mobile phone number, and the device can take the initiative when the device is updated.
  • the updated local business card is uploaded to the cloud server, and the cloud server sends the local contact of the user to the user's terminal. After the user confirms, the user can select whether to notify the updated local business card to the local contact.
  • the contacts in the local contact can be saved according to the updated business card, which can solve the complicated problem of manually creating a new contact, and the other party forgets to save my business card problem.
  • the implementation of the application can enhance the competitiveness of the terminal characteristics, improve the usability of the terminal, and improve the user experience.
  • FIG. 6 it is a schematic diagram of an embodiment of a method for the terminal to update the business card of the contact in the embodiment of the present application.
  • the first terminal sends a communication request to the second terminal, and the request fails, and prompts the first user whether to obtain the latest business card of the second terminal.
  • the first user (user A) using the first terminal and the second user (user B) using the second terminal are taken as an example for description.
  • Sending a call request to the second terminal that is the second mobile phone number, the call is failed, or the first terminal that is the first mobile phone number sends a short message to the second terminal that is the second mobile phone number or MMS, failed to send.
  • the mobile phone number of user A is 18312345678, and the mobile phone number of user B in the local contact saved on the first terminal is 13500001234, and the user A uses the mobile phone number of the first terminal as 18312345678 to use the second terminal of user B as 13500001234.
  • the mobile phone number sends a call request, and the first terminal prompts “The number you call is an empty number”, or “The user you are calling has been stopped”, or “The number you are calling is incorrect, please dial after verification” and other prompt information.
  • the prompt information may be a voice prompt during a call, or may be a voice prompt + a text prompt, or may be prompted by other methods, and is not limited.
  • FIG. 7A a schematic diagram of calling the first communication number for the first terminal.
  • the first terminal sends a business card request to the cloud server.
  • the first terminal sends a business card request to the cloud server in response to the operation of the user; If the information of the contact of the communication failure is not selected in the prompt information of the first terminal, the first user may use other methods to obtain the business card of the contact that failed the communication, for example, using WeChat, QQ, or playing with a friend who is commonly known. A phone (sms) or the like to obtain a business card of a contact that failed communication.
  • FIG. 7B a schematic diagram of sending a business card request to the cloud server for the first terminal. It should be understood that the business card request carries the information of the user A and the information of the user B, which may be the user A name or the user B name.
  • the cloud server sends a business card request to the second terminal.
  • the cloud server after the cloud server receives the business card request sent by the first terminal, the cloud server searches for the unique identifier corresponding to the second user as “yun002” according to the mapping relationship between the saved contact and the unique identifier, and the cloud server A business card request is sent to the user B who is logged in with the second terminal and uniquely identified as "yun002".
  • the cloud server will also store the business card of each contact, and the cloud server can directly store the business card. If the user B business card found by the cloud server is the same as the user B business card saved by the first terminal, the business card request is sent to the second terminal; if the user B business card found by the cloud server and the user B saved by the first terminal If the business card is different, the user B business card stored on the cloud server can be sent to the first terminal, and the first terminal can communicate by using the user B business card sent by the cloud server, for example, a phone, a short message, or the like.
  • the second terminal sends the local business card to the cloud server according to the business card request.
  • the second terminal receives the business card request sent by the cloud server, as shown in FIG. 7C, and displays a schematic diagram of whether the second terminal displays the prompt information of the local business card.
  • the second terminal may directly upload the updated user B business card (the latest business card) to the cloud server.
  • the second terminal displays a prompt message for confirming the user B business card, that is, the user B can confirm the specific information of the uploaded user B business card, and if there is inaccuracy, the user B can also Modify it in time, modify it and upload it to the cloud server.
  • the business card request may carry information of the first user, and the second user for using the second terminal may know who requested the business card of his contact. Then, if user B does not know user A, user B can choose not to upload user B business card, which can ensure user B's information security.
  • the user B business card information is: title: user B, mobile phone number: 13500123456, office address: Shenzhen Nanshan District Coastal City.
  • the second user's mobile number has been updated to "13500123456" instead of the previous "13500001234".
  • the cloud server sends, to the first terminal, the local business card that the second terminal has updated.
  • the cloud server after receiving the updated local business card sent by the second terminal, the cloud server sends the updated second user (user B) business card to the first terminal, and the cloud server may also be updated and stored in the cloud.
  • User B business card on the server.
  • the cloud server “yun002” of the user B may obtain the local contact of the user B, and the cloud server may send the updated user B business card to the local contact of the second terminal.
  • the first terminal sends a communication request to the second terminal according to the local business card that has been updated by the second terminal.
  • the first terminal receives the updated local business card of the second terminal sent by the cloud server, as shown in FIG. 7D, and is a schematic diagram of the first terminal receiving the updated local business card of the second terminal.
  • the first terminal may update the business card in the local contact corresponding to the locally saved second terminal.
  • the first terminal may send a communication request to the second terminal according to the updated local business card.
  • FIG. 7E a schematic diagram of dialing the first terminal to the updated second user. That is, the first terminal with the mobile phone number 18312345678 can send a call request, a short message, a multimedia message, and the like to the second terminal with the mobile phone number 13500123456.
  • the data sharing between the terminal and the cloud server solves the problem that the other party can change the mobile phone number or save the wrong mobile phone number, which makes it impossible to contact the other party, and plays a key role in timely contacting the user. Can enhance the user experience.
  • the embodiment of the present application is not limited to a scenario in which a new number is acquired by a call, and a series of other data (location information, office phone, office address, e-mail address, etc.) of the second terminal B are actively obtained from the first terminal A to the cloud server.
  • the scope of protection of this embodiment It can also solve the complicated problem of manually creating new contacts, enhance the competitiveness of the terminal features, improve the usability of the terminal, and improve the user experience.
  • the embodiment of the present invention is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal creates a business card of the second contact in the local contact.
  • the first user (user A) of the first terminal is used to create a new contact in the local phone book (address book), and the contact is described by taking the user K as an example.
  • FIG. 9A a schematic diagram of creating a new contact for the first terminal; in the business card of the contact of the newly created user, the name is user K, and the mobile phone number is 13587543321.
  • user A has a new friend in the waiting, dining, traveling, etc., and may store other people's contact information.
  • the first terminal uploads a business card of the second contact to the cloud server.
  • the business card of the second contact is uploaded to the cloud server.
  • FIG. 9B it is a schematic diagram of a business card of a second contact on the first terminal. That is, after the local save of the first terminal is completed, the business card (user K business card) of the newly created contact is uploaded to the cloud server, and the cloud server adds the business card of the second contact to the cloud contact. If the user K is a cloud service user, the cloud server also stores a mapping relationship between the user K and the unique identifier.
  • the second user (user K) using the second terminal is taken as an example for description.
  • the first terminal sends the first user (user A) business card of the first terminal to the second terminal used by the user K.
  • the communication can be a call, a text message or a multimedia message.
  • FIG. 9C a schematic diagram of a communication record between the first terminal and the second terminal is shown in FIG. 9C as an example of occurrence of a call.
  • the first terminal prompts the user A whether to send the user A business card to the user K. If the user A chooses to notify the user K to save the business card of my contact, the first terminal sends the user A business card to the second terminal.
  • a threshold for example, greater than 2 times
  • the manner in which the first terminal (the user A) notifies the second terminal (the user K) may include, but is not limited to, the following implementation manners: (1) the first terminal sends the local business card of the first terminal to the second terminal by using the cloud server, It should be understood that the user K is a cloud service user; (2) the first terminal may also send the local business card of the first terminal to the second terminal by using a short message, a multimedia message, a WeChat, a WLAN direct connection, or a Bluetooth sharing, etc., which is not limited. . As shown in FIG. 9D, it is a schematic diagram of the first terminal notifying the local business card to the second terminal.
  • the prompt information may not be displayed on the UI interface, and the user may select, which may be the default notification mode of the preset first terminal, for example, the user A and the user.
  • the K is a cloud service user
  • the first terminal can notify the second terminal of the user A business card through the cloud server (the default mode).
  • the user K is not the cloud service user
  • the first terminal can use the user A business card to send a text message or a multimedia message.
  • WeChat, QQ, WLAN direct connection, Bluetooth sharing, etc. are not limited.
  • the first terminal needs to send a request to the cloud server to send the user A business card to the user K, and after receiving the request, the cloud server queries the user K in the mapping relationship between the contact and the unique identifier.
  • the unique identifier for example, the unique identifier of the user K is "yun011", and the cloud server sends the user A business card to the second terminal that logs in the unique identifier "yun011".
  • the second terminal receives the local business card of the first terminal and saves the local business card in the second terminal.
  • the contact K of the second terminal after the contact K of the second terminal receives the user A business card sent by the cloud server, the contact K can be selected to be saved locally, and the save can be a shortcut saved by one button.
  • the user A business card includes: title: User A, mobile phone number: 18312345678, office address: International Trade Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com.
  • FIG. 9E a schematic diagram of saving the local business card of the first terminal for the second terminal is shown.
  • User K can also choose not to save user A business card, depending on actual needs.
  • a new contact (a business card of a second contact) is created on the first terminal by using the data sharing between the terminal and the cloud server.
  • the first terminal may only create a new contact, but may No more contact, so there is no need to send my local business card to the other party.
  • you can send my local business card to the other party so that the contact can store each other in time, solve the complicated operation of manually creating a new contact, the other party forgets to save my business card, and the elderly
  • the user group does not save the problem.
  • the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
  • Embodiment 4 Managing a blacklist by using a cloud server
  • Embodiment 1 is shown in FIG. 10 , which is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
  • the first terminal adds the first communication number to the blacklist.
  • the first user (user A) using the first terminal is taken as an example, and the user A may receive multiple calls or text messages from a salesperson who sells real estate, sells insurance, sells a car, etc. Without these requirements, User A can add his communication number (phone number or mobile number) to the blacklist. Alternatively, the user A adds the business card of a contact in the local contact saved on the first terminal to the blacklist, and the business card of a contact may include the user name, the communication number, and the like.
  • the business card of the second contact is the business card of the newly added contact, and the second user takes the user K as an example for description.
  • FIG. 11A a schematic diagram of adding a first communication number to a blacklist is displayed for the first terminal.
  • the user interface (UI) after the call ends has the option of “blacklisting”.
  • User A Select to add it, or you can click on the contact to be blacklisted in the address book, jump to the contact card's business card interface, pull down the contact's business card interface, you can have the option of "blacklist”, or Other operations add a communication number or a contact's business card to the blacklist, which is not described here.
  • the blacklist previously saved on the first terminal is user M and user N
  • the newly added blacklist is user K.
  • FIG. 11B it is a black list diagram displayed on the first terminal.
  • a certain number is added to the blacklist on the first terminal, it may be marked, such as a fraudulent call, an harassing call, an advertisement call, and the like.
  • user K's mobile number 13000043031 can be marked as an harassing call.
  • the user may be prompted to remove the blacklist.
  • the first terminal sends an update cloud blacklist request to the cloud server.
  • the blacklist of the first terminal has a new business card (user K business card) or a strange communication number, and the local blacklist of the first terminal is updated, then the corresponding blacklist is updated.
  • user A may choose to upload the entire blacklist, or may choose to upload the newly added blacklisted contact user K.
  • the first terminal responds to the user A's selection operation, and generates a request on the first terminal, where the request may be an update cloud blacklist request, and the first terminal sends an update cloud blacklist request to the cloud server, and the update cloud blacklist request may be carried.
  • FIG. 11C A schematic diagram of a terminal uploading a blacklist to a cloud server. It should be noted that the uploading of the blacklist to the cloud server is only one example of the method shown in FIG. 11C, and there may be other manners, which are not specifically limited.
  • the first terminal detects that the number of the user actively calls the user A exceeds a certain threshold within a certain period of time, or sends a short message to the user A actively. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
  • the cloud server updates the cloud blacklist according to the update cloud blacklist request.
  • the contact in the blacklist of the user A saved by the cloud server is the user M and the user N
  • the cloud server receives the updated blacklist request, and carries the blacklist updated by the user A (the user M, the user N, user K), or the newly added blacklisted contact (user K) in the blacklist of user A.
  • the cloud server updates the saved blacklist for user A, that is, the previous user M and user N are updated to user M, user N, and user K.
  • the cloud server determines, according to the blacklist reported by each terminal, that the number of users marked as blacklists is greater than a preset threshold as the target number set.
  • the cloud server collects the blacklist data uploaded by each terminal, and after the big data analysis, filters out the target number set that is added to the blacklist by 50% (the user can set the user).
  • the target number set may include the number of the contact in the blacklist of User A, and may not include the number of the contact in the blacklist of User A.
  • the cloud server may also use the union of the blacklists reported by each terminal as the target number set.
  • the cloud server sends a tagged data request for the target number set to the operator server.
  • the cloud server sends the tagged data request for the target number set to the operator server, and the operator server queries the number tag database for the number in the target number set.
  • the number tag library in the middle is similar to the blacklist on the terminal, but the number tag library of the operator server is more reliable than the blacklist of the terminal.
  • sending the marked data request of the target number set to the operator server can be understood as a process of secondary confirmation, that is, on the terminal, the user adds the number in the target number set to the blacklist, and the cloud server sets the target number. The set is sent to the operator server, and the operator server can further confirm and query the tag information of these numbers again in the number tag library.
  • the tag information found in the number tag database in the target number set is 13500004321 is a fraudulent phone
  • the tag information found in the number tag database is 1330,00011111 and 13400002222 is a trusted phone.
  • the tag information may also be other official trust numbers, such as numbers such as 110, 120, and may also be tagged information such as illegal numbers.
  • the tag information corresponding to the target number set queried by the operator server As shown in Table 2 below, the tag information corresponding to the target number set queried by the operator server.
  • Target number set Tag information 13500004321 Fraud phone 13300001111 Fraud phone 13300002222 Trusted phone 13300003333 Trusted phone 13300004444 Fraud phone 13300005555 Fraud phone 13300006666 Fraud phone
  • the operator server sends the query result to the cloud server.
  • the operator server sends the query result in the target number set to the cloud server.
  • the operator server sends the information of Table 2 above to the cloud server.
  • the tag information about one or more of the numbers may not be found in the operator server, and the number may be considered as a trusted phone.
  • the cloud server classifies the query result, and sends the classified query result to the first terminal.
  • the cloud server classifies the query result according to the rule, and sends the complete result to the terminal; taking the above Table 2 as an example, the cloud server may The numbers labeled "Scam Phones” fall into one category, and the numbers labeled "Trust Phones” fall into one category.
  • the cloud server may send the classified query result to each terminal, or may only send the classified query result to the first terminal, or may save the number in the above table 2 in the contact.
  • the terminal sends the classified query result, which is not limited.
  • the first terminal optimizes the local blacklist according to the classified query result.
  • the first terminal after receiving the cloud server, the first terminal queries the local contact (also called a phone book or address book) and the blacklist according to the classified query result sent by the cloud server, and is in the local contact.
  • the marked number is updated if it is different from the tag information of the query result; if the number in the local contact is not marked and the classified query result is marked, the number is smart tagged. You can also add the illegal number IDs identified in the local contacts to the local blacklist to optimize the local blacklist and cloud blacklist.
  • the first terminal updates the blacklist according to the first query result, and may include:
  • the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist;
  • the terminal removes the first communication number from the blacklist in response to the user input removal operation;
  • the first terminal adds the second communication number to the blacklist, and the second communication number is the communication number that is not in the blacklist of the first terminal.
  • FIG. 11D a schematic diagram of updating the blacklist for the first terminal is displayed.
  • the number 13300004444 is the mobile number of a contact in the local contact, or the first terminal detects that the mobile phone number of 13300004444 has communicated with the mobile phone number 18312345678 of the first terminal, but User A did not blacklist it.
  • the tag information of 13300004444 is a fraudulent phone. Therefore, the first terminal may automatically add the mobile phone number 13300004444 to the local blacklist, or may be the selected operation of user A, and add it to the local blacklist.
  • FIG. 11E it is a schematic diagram of whether the first terminal updates the tag information in the blacklist.
  • the user K business card is added to the blacklist on the first terminal, it is marked as an harassing call, but in the categorized query result fed back by the cloud server, the mobile phone number of the user K is 13500004321, which is marked as a fraudulent call, so the first terminal can A prompt message is displayed to prompt whether to update it as a fraudulent call, and the user can perform a selected operation, and the first terminal can perform a corresponding function in response to the user's operation.
  • the embodiment of the present application solves the problem that the blacklist of the terminal is inaccurate, the blacklisted number is not marked, and the number is incorrectly added to the blacklist, so that the number cannot be normally entered.
  • the terminal and the cloud server synchronize the blacklist, and the terminal and the cloud are used.
  • the server data is shared, and the cloud server interacts with the server of the carrier to manage and optimize the blacklist of the terminal.
  • FIG. 12 it is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
  • the first terminal adds the target communication number to the blacklist, and sends an update cloud blacklist request to the cloud server.
  • the first user (user A) using the first terminal is taken as an example. Because the user A mishandles, the first terminal adds a certain number or a business card of a contact to the blacklist. Except for the elderly, the elderly are unfamiliar with the use of the terminal, and accidentally add a number or a contact's business card to the blacklist when picking up/calling, and the child is not careful when playing games or picking up/calling on the terminal. Add a number or a contact's business card to the blacklist, or add a number or a contact's business card to the blacklist for other reasons such as accidental touch. As shown in FIG. 13A, a schematic diagram of adding a business card of a target contact to a blacklist for the first terminal.
  • the business card of the target contact is described by taking the user B as an example, and the mobile phone number of the user B business card is 13500123456. It should be understood that, when the first terminal adds a communication number or a business card of a contact to the blacklist, the first terminal sends an update cloud blacklist request to the cloud server, and the cloud blacklist request may carry the target communication number or target of the newly added blacklist. The communication number of the contact card or the business card of the target contact.
  • the cloud server updates the cloud blacklist according to the update cloud blacklist request.
  • the cloud server receives the update cloud blacklist request sent by the first terminal, and updates the cloud blacklist request to carry a blacklisted communication number, or a contact's business card, or a contact's business card.
  • the communication number in .
  • the cloud server can update the cloud blacklist request and update the cloud blacklist.
  • the cloud update blacklist request carries the mobile phone number 13500123456 of the user B. Then, the cloud server adds the number to the cloud blacklist.
  • the cloud update blacklist request carries the user B business card, and the cloud server adds the user B business card to the cloud blacklist.
  • the first terminal detects that the number of communications with the blacklisted target number exceeds a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server.
  • the first terminal detects that the number of communications with the target number of the blacklist is greater than or equal to a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server.
  • the mobile number of the first terminal is 18312345678, and the number of the user B that is blacklisted is 13500123456.
  • the mobile number of the first terminal receives the number 13500123456 and sends the short message more than 3 times (user can set it)
  • the first terminal detects that the number of communications with the target number is greater than a preset threshold, and sends a schematic request for the tagged data request of the query target number to the cloud server.
  • the first terminal detects that the number of the target number actively calls the user A exceeds a certain threshold in a certain period of time, or sends a short message to the user A. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
  • the cloud server sends a tagged data request for querying the target number to the operator server.
  • the cloud server after the cloud server receives the tagged data request of the query target number, the tagged data request of the query target number is used to query the operator server for the tag data of the target number. Then, the cloud server sends a tagged data request for the query target number to the operator server. Exemplarily, the cloud server sends a tagged data request for query 13500123456 to the carrier server.
  • the cloud server may determine, in the blacklist uploaded by each terminal, that the number of users whose target number is blacklisted is less than a specific threshold, for example, there are 100 cloud service users, and the cloud server is blacklisted. If only three users add the number to the blacklist, the cloud server can determine that the number is a trusted number, and return a prompt message to the first terminal.
  • the prompt information can be "13500123456 is a trusted number, whether it is black. Removed from the list?” Displayed on the display of the first terminal, the user can perform the selected operation and choose whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited.
  • the operator server queries the number tag database according to the tagged data request of the query target number, and obtains the target query result.
  • the operator server queries the number tag database according to the tagged data query request of the target number, and obtains the target query result.
  • the operator server queries the tagged data of 13500123456 in the number tag database, and the tagged data may be tag data such as "illegal number”, “scam number”, “trusted number”, “untrusted number”, and the like. If the marked data of the target number 13500123456 here is a trusted number, the query result is a trusted number.
  • the reliability of the number tag library of the operator server is not high for the reliability of the blacklist on the terminal. That is, the blacklist on the terminal is not necessarily a fraudulent call. Some may be mistakenly added. Some may be subjective and do not want to contact someone to blacklist.
  • the operator server sends the target query result to the cloud server.
  • the operator server after obtaining the target query result, the operator server sends the target query result to the cloud server.
  • the operator server will treat the target query result of the marked data query request with respect to the target number 13500123456 as a trusted number.
  • the cloud server sends the target query result to the first terminal.
  • the cloud server after receiving the target query result returned by the operator, the cloud server sends the target query result to the first terminal.
  • the cloud server can also save the target query result of the target number in the cloud.
  • the cloud server receives the target query result sent by the operator server: about the target number. 13500123456
  • the target query result of the marked data query request is a trusted number, and the target query result of the trusted number is sent to the first terminal.
  • the first terminal processes the target number according to the target query result.
  • the first terminal receives the target query result sent by the cloud server as: the target number 13500123456 is the trusted query number of the marked data query request.
  • the prompt message displayed on the display screen of the first terminal is "13500123456 is a trusted number, is it removed from the blacklist?"
  • the user can perform a selection operation and select whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited.
  • FIG. 13C it is a schematic diagram of prompt information for displaying a target query result by the first terminal in the embodiment of the present application.
  • the first terminal After receiving the query result sent by the cloud server, the first terminal appends the tag information of the cloud server to the prompt content, prompting the user that the number has been added to the blacklist, and whether the number needs to be removed from the blacklist; the cloud server tag The number type, the user performs recovery on the number or keeps the blacklist operation in combination with his own needs.
  • the cloud server is used to share data between the terminal and the cloud server, and the problem that the terminal blacklist identification is inaccurate, the blacklist number is not marked, and the number is incorrectly added to the blacklist causes the number to fail to be normally entered.
  • the current technology is that the terminal and the cloud server synchronize the blacklist, and the data sharing between the terminal and the cloud server is used, and the cloud server interacts with the server of the operator to manage and optimize the blacklist of the terminal.
  • the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
  • the display is implemented in a WIFI scenario, and may also be implemented in a 2G/3G/4G/5G or even a later higher-level communication network, and does not constitute a pair.
  • the definition of the solution provided by the embodiment is applied.
  • FIG. 14 it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application.
  • the sending module 1401 is configured to send a first business card request to the server, where the first business card is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal.
  • the second terminal is a terminal of the first contact, and the latest business card includes a user name and a communication number;
  • the receiving module 1402 is configured to receive the latest business card sent by the server;
  • the processing module 1403 is configured to update, according to the latest business card, a historical business card of the first contact saved by the first terminal.
  • the first contact is a contact that has a number of communications with the first terminal that is less than a first threshold within a preset duration.
  • the first contact is a contact in an infrequent contact group
  • the infrequent contact group is a first infrequent contact determined by the server.
  • the union or intersection of the second infrequent contacts wherein the first infrequent contact is within the preset duration sent by the first terminal to the server, and the number of communications with the first terminal is less than a first threshold contact, the second infrequent contact being an infrequent contact saved by the server before receiving the first infrequent contact.
  • the sending module 1401 is specifically configured to: if the communication initiated by the first terminal to the second terminal fails, the sending module 1401 sends a first business card request to the server;
  • the processing module 1403 is further configured to communicate with the second terminal according to the latest business card.
  • the sending module 1401 is further configured to: if the local business card of the first terminal is updated, the sending module 1401 sends the updated local business card to the server; and the sending, by the server, the Updated local business card;
  • the receiving module 1402 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
  • the processing module 1403 is further configured to create a business card of the second contact in the local contact;
  • the sending module 1401 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1401 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1403 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1401 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1403 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1403 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1403 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1403 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1401 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1401 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • the receiving module 1402 is further configured to receive a second business card request sent by the server;
  • the sending module 1401 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the sending module 1501 is further configured to: if the local business card of the first terminal is updated, the sending module 1501 sends the module Transmitting, by the server, the updated local business card; sending, by the server, the updated local business card to the second terminal;
  • the receiving module 1502 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
  • FIG. 15B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the processing module 1503 is further configured to create a business card of the second contact in the local contact.
  • the sending module 1501 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1501 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1503 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1501 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1503 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1503 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1503 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1503 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1501 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1501 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • the receiving module 1502 is further configured to receive a second business card request sent by the server;
  • the sending module 1501 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the processing module 1601 is further configured to create a business card of the second contact in the local contact.
  • the sending module 1602 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1602 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1601 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1602 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1601 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1601 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1601 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1601 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1602 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1602 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • FIG. 16B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the receiving module 1603 is further configured to receive a second business card request sent by the server;
  • the sending module 1602 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the processing module 1701 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1702 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1701 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1701 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1701 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1701 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1702 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal, is greater than a third threshold, Then, the sending module 1702 initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number.
  • FIG. 17B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the receiving module 1703 is further configured to receive a second business card request sent by the server;
  • the sending module 1702 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a car computer, and the like. Take the terminal as a mobile phone as an example:
  • FIG. 18 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 1810, a memory 1820, an input unit 1830, a display unit 1840, a sensor 1850, an audio circuit 1860, a wireless fidelity (WiFi) module 1870, and a processor 1880. And power supply 1890 and other components.
  • RF radio frequency
  • the RF circuit 1810 can be used for receiving and transmitting signals during and after the transmission or reception of information, in particular, after receiving the downlink information of the base station, and processing it to the processor 1880; in addition, transmitting the designed uplink data to the base station.
  • RF circuit 1810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 1810 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Pack
  • the memory 1820 can be used to store software programs and modules, and the processor 1880 can execute various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1820.
  • the memory 1820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1830 may include a touch panel 1831 and other input devices 1832.
  • the touch panel 1831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1831 or near the touch panel 1831. Fuck ()), and according to a preset program to drive the corresponding connection device.
  • the touch panel 1831 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1880 is provided and can receive commands from the processor 1880 and execute them.
  • the touch panel 1831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1830 may also include other input devices 1832.
  • other input devices 1832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1840 can include a display panel 1841.
  • the display panel 1841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1831 may cover the display panel 1841. After the touch panel 1831 detects a touch operation thereon or nearby, the touch panel 1831 transmits to the processor 1880 to determine the type of the touch event, and then the processor 1880 according to the touch event. The type provides a corresponding visual output on display panel 1841.
  • the touch panel 1831 and the display panel 1841 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1831 can be integrated with the display panel 1841. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 1850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1841 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 1860, a speaker 1861, and a microphone 1862 can provide an audio interface between the user and the handset.
  • the audio circuit 1860 can transmit the converted electrical data of the received audio data to the speaker 1861, and convert it into a sound signal output by the speaker 1861; on the other hand, the microphone 1862 converts the collected sound signal into an electrical signal, by the audio circuit 1860. After receiving, it is converted into audio data, and then processed by the audio data output processor 1880, transmitted to the other mobile phone via the RF circuit 1810, or outputted to the memory 1820 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1870 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 18 shows the WiFi module 1870, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1880 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1820, and by invoking data stored in the memory 1820, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1880 may include one or more processing units; preferably, the processor 1880 may integrate an application processor and a modem processor.
  • the application processor mainly processes an operating system, a user interface, an application, and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 1880.
  • the mobile phone also includes a power supply 1890 (such as a battery) for powering various components.
  • a power supply 1890 (such as a battery) for powering various components.
  • the power supply can be logically coupled to the processor 1880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the structure of the terminal in the foregoing method embodiment may be based on the structure shown in FIG. 18.
  • the terminal structure shown in FIG. 18 may perform the steps in the foregoing method embodiment, and details are not described herein again.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • wire eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).

Abstract

Provided in the embodiments of the present application are a method for updating the business card of a contact and a terminal, which are used for sharing data with the help of the terminal and a cloud server, thereby achieving the purpose of updating the business card of a local contact in time. The method may comprise: a first terminal sends a first business card request to a server, the first business card request being used for obtaining the latest business card of a first contact among local contacts, the latest business card being the business card obtained by the server from a second terminal, the second terminal being the terminal of the first contact, and the latest business card comprising a user name and a communication number; the first terminal receives the latest business card which is sent by the server; and the first terminal, according to the latest business card, updates the historical business card of the first contact that is saved by the first terminal.

Description

一种更新联系人的名片的方法及终端Method and terminal for updating contact card
本申请要求于2017年6月16日提交中国专利局、申请号为201710459555.6、申请名称为“一种共享联系人的方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese Patent Application filed on June 16, 2017, the Chinese Patent Application No. PCT Application No. In the application.
技术领域Technical field
本申请涉及终端应用领域,尤其涉及一种更新联系人的名片的方法及终端。The present application relates to the field of terminal applications, and in particular, to a method and a terminal for updating a business card of a contact.
背景技术Background technique
终端可以通过本身提供的系统应用(无线局域网络(Wireless Local Area Networks,WLAN)直连、蓝牙共享等)或第三方应用(微信、QQ等)发送更新信息给好友的终端,可以实现实时动态的相互间共享数据。The terminal can send update information to the friend's terminal through the system application (Wireless Local Area Networks (WLAN) direct connection, Bluetooth sharing, etc.) provided by itself or the third-party application (WeChat, QQ, etc.), which can realize real-time dynamic Share data with each other.
但是,现有终端上保存的联系人、本机名片、黑名单与云服务器中保存的数据各自独立,没有实现互相管理和优化。例如,某个联系人的名片(例如手机号码、邮箱地址等)更新后,通信录中的好友不知道其名片数据已更新,可能导致无法联系等,终端的联系人的名片更新不及时,用户体验相对较差。However, the contacts stored in the existing terminal, the local business card, the blacklist, and the data stored in the cloud server are independent of each other, and are not managed and optimized. For example, after a contact card's business card (such as mobile phone number, email address, etc.) is updated, the friend in the address book does not know that the business card data has been updated, which may result in failure to contact, etc., and the contact card of the terminal is not updated in time, the user The experience is relatively poor.
发明内容Summary of the invention
本申请实施例提供了一种更新联系人的名片的方法、终端以及服务器,用于借助终端与云服务器数据共享,达到了及时更新本地联系人的名片的目的。The embodiment of the present application provides a method, a terminal, and a server for updating a business card of a contact, which are used for data sharing between the terminal and the cloud server, so as to achieve the purpose of updating the business card of the local contact in time.
本申请实施例的第一方面提供一种更新联系人的名片的方法,可以包括:第一终端向服务器发送第一名片请求,该第一名片请求用于获取本地联系人中第一联系人的最新名片,该最新名片为该服务器从第二终端获取的名片,该第二终端为该第一联系人的终端,该最新名片可以包括用户名、通信号码;该第一终端接收该服务器发送的最新名片;该第一终端根据该最新名片,更新该第一终端保存的该第一联系人的历史名片。应理解,第一联系人的最新名片与第一联系人的历史名片可能相同,也可能不相同。如果相同,说明第一联系人的名片没发生更新,如果不相同,说明第一联系人的名片发生更新。第一联系人的最新名片可以是服务器向第二终端发送第一名片请求,第二终端上传给服务器的本机名片。也可以是每个终端的本机名片发生更新时,都会向服务器发送已更新的本机名片(最新名片),那么,第一终端向服务器发送第一名片请求时,服务器可以直接查询第一名片请求对应的名片,向第一终端返回第二终端上报给服务器的最新名片。第一终端可以根据第一联系人的最新名片,来更新本地保存的第一联系人的历史名片,使得第一终端保存的联系人的名片保持在最新状态,方便用户与本地联系人中的联系人联系。A first aspect of the present application provides a method for updating a business card of a contact, which may include: the first terminal sends a first business card request to the server, where the first business card request is used to obtain the first contact of the local contact The latest business card, the latest business card is a business card obtained by the server from the second terminal, the second terminal is the terminal of the first contact, the latest business card may include a user name and a communication number; the first terminal receives the sending by the server The latest business card; the first terminal updates the historical business card of the first contact saved by the first terminal according to the latest business card. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact. If they are the same, it indicates that the business card of the first contact has not been updated. If not, the business card of the first contact is updated. The latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server. Alternatively, when the local business card of each terminal is updated, the updated local business card (the latest business card) is sent to the server. Then, when the first terminal sends the first business card request to the server, the server can directly query the first business card. The corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal. The first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
结合本申请实施例的第一方面,在本申请实施例的第一方面的第一种实现方式中,该第一联系人为在预置时长内,与该第一终端发生的通信次数少于第一阈值的联系人。或者,该第一联系人为常用联系人与该本地联系人取补集得到的,该常用联系人为在预置时长内,与该第一终端发生的通信次数大于第二阈值的联系人。这里对第一联系人做了一个 说明,为本申请实施例提供了一个可选的实现方案,第一联系人可以是第一终端确定的,预置时长和第一阈值、第二阈值都可以是经验值,由用户自行确定。With reference to the first aspect of the embodiments of the present application, in a first implementation manner of the first aspect of the application, the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts. Or the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration. Here made a first contact An embodiment of the present application provides an optional implementation. The first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may both be empirical values, which are determined by the user.
结合本申请实施例的第一方面,在本申请实施例的第一方面的第二种实现方式中,该第一联系人为不常用联系人群组中的联系人,该不常用联系人群组为该服务器确定的第一不常用联系人和第二不常用联系人的并集或交集,该第一不常用联系人为该第一终端向该服务器发送的在预置时长内,与该第一终端发生的通信次数少于第一阈值的联系人,该第二不常用联系人为该服务器保存的在接收该第一不常用联系人之前的不常用联系人。或者,该第一联系人为常用联系人群组与该本地联系人取补集得到的,该常用联系人群组为该服务器确定的第一常用联系人和第二常用联系人的并集或交集,该第一常用联系人为该第一终端向该服务器发送的在预置时长内,与该第一终端发生的通信次数大于第二阈值的联系人,该第二常用联系人为该服务器保存的在接收该第一常用联系人之前的常用联系人。这里对第一联系人做了一个说明,为本申请实施例提供了一个可选的实现方案,第一联系人可以是服务器确定的,预置时长和第一阈值、第二阈值都可以是经验值,由用户自行确定。With reference to the first aspect of the embodiments of the present application, in a second implementation manner of the first aspect of the embodiments, the first contact is a contact in an inactive contact group, and the inactive contact group is a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold, and the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact. Or the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server. The first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server. A common contact before the first favorite contact is received. An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application. The first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
结合本申请实施例的第一方面或第一方面的任一种实现方式,在本申请实施例的第一方面的第三种实现方式中,该第一终端向服务器发送第一名片请求,可以包括:若该第一终端向该第二终端发起的通信失败,则该第一终端向该服务器发送第一名片请求;该方法还可以包括:该第一终端根据该最新名片与该第二终端进行通信。应理解,第一终端向保存第一联系人的名片对应终端发起通信请求时,请求失败,具体的,可以是发起呼叫请求;那么,第一终端可以向服务器发起第一名片请求,第一名片请求用于请求第一联系人的最新名片。当第一终端接收服务器发送的最新名片时,第一终端可以使用最新名片中的通信号码与第二终端进行通信,可以为用户提供很好的通信服务,不会因为联系人的名片发生更改,而联系不到对方。With reference to the first aspect of the embodiment of the present application, or any implementation manner of the first aspect, in a third implementation manner of the first aspect of the embodiment, the first terminal sends a first business card request to the server, where The method includes: if the communication initiated by the first terminal to the second terminal fails, the first terminal sends a first business card request to the server; the method may further include: the first terminal according to the latest business card and the second terminal Communicate. It should be understood that, when the first terminal initiates a communication request to the business card corresponding terminal that saves the first contact, the request fails, specifically, the call request is initiated; then, the first terminal may initiate a first business card request to the server, and the first business card Request the latest business card used to request the first contact. When the first terminal receives the latest business card sent by the server, the first terminal can communicate with the second terminal by using the communication number in the latest business card, which can provide a good communication service for the user, and does not change the business card of the contact. And can't contact each other.
结合本申请实施例的第一方面或第一方面的任一种实现方式,在本申请实施例的第一方面的第四种实现方式中,该方法还可以包括:若该第一终端的本机名片发生更新,则该第一终端向该服务器发送已更新的本机名片;该第一终端接收该服务器发送的本地联系人,该本地联系人为该服务器保存的该第一终端的联系人;该第一终端通过该服务器向该第二终端发送该已更新的本机名片。应理解,已更新的本机名片也可以称为最新名片,具体更新的内容可以包括座机号码、手机号码、邮箱地址、办公地址等信息。因为第一终端的本机名片发生更新,当第一终端通过服务器向第二终端发送已更新的本机名片后,可以有效避免第一终端保存的本地联系人联系不到第一终端对应的用户,第二终端可以为第一终端本地联系人中的至少一个联系人的终端。With reference to the first aspect of the embodiment of the present application, or any implementation manner of the first aspect, in a fourth implementation manner of the first aspect of the embodiment, the method may further include: if the first terminal is If the business card is updated, the first terminal sends the updated local business card to the server; the first terminal receives the local contact sent by the server, and the local contact is the contact of the first terminal saved by the server; The first terminal sends the updated local business card to the second terminal through the server. It should be understood that the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal. The second terminal may be a terminal of at least one of the first terminal local contacts.
结合本申请实施例的第一方面或第一方面的任一种实现方式,在本申请实施例的第一方面的第五种实现方式中,该方法还可以包括:该第一终端在该本地联系人中新建第二联系人的名片;若该第一终端与第三终端发生的通信次数大于第二阈值,则该第一终端通过该服务器向该第三终端发送该第一终端的本机名片,该第三终端为该第二联系人的终端。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与 新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。With reference to the first aspect of the embodiment of the present application, or any implementation manner of the first aspect, in a fifth implementation manner of the first aspect of the application, the method may further include: the first terminal is in the local a new business card of the second contact is set in the contact; if the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local device of the first terminal to the third terminal by using the server The business card, the third terminal is the terminal of the second contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . When the first terminal is After the newly created contact is communicated, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal's local business card may be more easily found, and the first terminal The user of the terminal contacts.
结合本申请实施例的第一方面或第一方面的任一种实现方式,在本申请实施例的第一方面的第六种实现方式中,该方法还可以包括:该第一终端将第一通信号码加入黑名单;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该第一终端向该服务器发送更新黑名单请求;该第一终端接收该服务器发送的查询结果,该查询结果为该服务器从运营商服务端确认的运营商黑名单;该第一终端根据该查询结果,更新该黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the first aspect of the embodiment of the present application, or any implementation manner of the first aspect, in a sixth implementation manner of the first aspect of the embodiments, the method may further include: the first terminal The communication number is added to the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact. The first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第一方面的第六种实现方式,在本申请实施例的第一方面的第七种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示该第一通信号码未在该运营商黑名单中,则该第一终端显示第一提示信息,该第一提示信息用于提示用户是否将该第一通信号码从该黑名单移除;该第一终端响应该用户输入的移除操作,从该黑名单中移除该第一通信号码。可以理解的是,第一通信号码在第一终端的黑名单中,但是没在运营商返回的运营商黑名单中,可以提醒用户,是否将其从黑名单中移除,有可能是用户误操作将其加入黑名单的。With reference to the sixth implementation manner of the first aspect of the embodiment of the present application, in a seventh implementation manner of the first aspect of the application, the first terminal, according to the query result, that the blacklist is updated, may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
结合本申请实施例的第一方面的第六种实现方式,在本申请实施例的第一方面的第八种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示第二通信号码在该运营商黑名单中,则该第一终端将该第二通信号码加入该黑名单,该第二通信号码为之前不在该第一终端的黑名单中的通信号码。可以理解的是,第二通信号码未在第一终端的黑名单中,但是在运营商返回的运营商黑名单中,可以提醒用户,将其加入黑名单,由运营商进一步确认的查询结果,可靠性比较高,可以避免用户上当受骗。With reference to the sixth implementation manner of the first aspect of the embodiments of the present application, in the eighth implementation manner of the first aspect of the application, the first terminal, according to the query result, that the blacklist is updated, may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
结合本申请实施例的第一方面的第六至第八种任一实现方式,在本申请实施例的第一方面的第九种实现方式中,该方法还可以包括:若该第一终端接收第四终端发起的通信次数大于第三阈值,则该第一终端向该服务器发起被标记数据请求,该第四终端的通信号码为该第一通信号码。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to any implementation of the sixth to eighth aspects of the first aspect of the present application, in a ninth implementation manner of the first aspect of the embodiments of the present application, the method may further include: if the first terminal receives If the number of communications initiated by the fourth terminal is greater than the third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第一方面或第一方面的任一种实现方式,在本申请实施例的第一方面的第十种实现方式中,该方法还可以包括:该第一终端接收该服务器发送的第二名片请求;该第一终端根据该第二名片请求,向该服务器上传该本机名片。第一终端可以主动 向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the first aspect of the embodiment of the present application, or any implementation manner of the first aspect, in a tenth implementation manner of the first aspect of the embodiments, the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request. The first terminal can take the initiative Uploading the business card to the server, or receiving the business card request sent by the server, and then uploading the business card to the server provides an achievable way.
本申请实施例第二方面提供了一种更新联系人的名片的方法,可以包括:服务器接收第一终端发送的第一名片请求,该第一名片请求用于获取本地联系人中第一联系人的最新名片,该最新名片可以包括用户名、通信号码;该服务器从第二终端获取最新名片,该第二终端为该第一联系人的终端;该服务器向该第一终端发送该最新名片,该最新名片用于更新该第一终端保存的该第一联系人的历史名片。应理解,第一联系人的最新名片与第一联系人的历史名片可能相同,也可能不相同。如果相同,说明第一联系人的名片没发生更新,如果不相同,说明第一联系人的名片发生更新。第一联系人的最新名片可以是服务器向第二终端发送第一名片请求,第二终端上传给服务器的本机名片。也可以是每个终端的本机名片发生更新时,都会向服务器发送已更新的本机名片(最新名片),那么,第一终端向服务器发送第一名片请求时,服务器可以直接查询第一名片请求对应的名片,向第一终端返回第二终端上报给服务器的最新名片。第一终端可以根据第一联系人的最新名片,来更新本地保存的第一联系人的历史名片,使得第一终端保存的联系人的名片保持在最新状态,方便用户与本地联系人中的联系人联系。The second aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a first business card request sent by the first terminal, where the first business card request is used to obtain the first contact in the local contact The latest business card, the latest business card may include a user name and a communication number; the server acquires the latest business card from the second terminal, the second terminal is the terminal of the first contact; the server sends the latest business card to the first terminal, The latest business card is used to update the historical business card of the first contact saved by the first terminal. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact. If they are the same, it indicates that the business card of the first contact has not been updated. If not, the business card of the first contact is updated. The latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server. Alternatively, when the local business card of each terminal is updated, the updated local business card (the latest business card) is sent to the server. Then, when the first terminal sends the first business card request to the server, the server can directly query the first business card. The corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal. The first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
结合本申请实施例的第二方面,在本申请实施例的第二方面的第一种实现方式中,该第一联系人为在预置时长内,与该第一终端发生的通信次数少于第一阈值的联系人。或者,该第一联系人为常用联系人与该本地联系人取补集得到的,该常用联系人为在预置时长内,与该第一终端发生的通信次数大于第二阈值的联系人。这里对第一联系人做了一个说明,为本申请实施例提供了一个可选的实现方案,第一联系人可以是第一终端确定的,预置时长和第一阈值、第二阈值都可以是经验值,由用户自行确定。With reference to the second aspect of the embodiments of the present application, in a first implementation manner of the second aspect of the embodiment, the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts. Or the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration. An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application. The first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may be used. It is the experience value, which is determined by the user.
结合本申请实施例的第二方面,在本申请实施例的第二方面的第二种实现方式中,该第一联系人为不常用联系人群组中的联系人,该不常用联系人群组为该服务器确定的第一不常用联系人和第二不常用联系人的并集或交集,该第一不常用联系人为该第一终端向该服务器发送的在预置时长内,与该第一终端发生的通信次数少于第一阈值的联系人,该第二不常用联系人为该服务器保存的在接收该第一不常用联系人之前的不常用联系人。或者,该第一联系人为常用联系人群组与该本地联系人取补集得到的,该常用联系人群组为该服务器确定的第一常用联系人和第二常用联系人的并集或交集,该第一常用联系人为该第一终端向该服务器发送的在预置时长内,与该第一终端发生的通信次数大于第二阈值的联系人,该第二常用联系人为该服务器保存的在接收该第一常用联系人之前的常用联系人。这里对第一联系人做了一个说明,为本申请实施例提供了一个可选的实现方案,第一联系人可以是服务器确定的,预置时长和第一阈值、第二阈值都可以是经验值,由用户自行确定。With reference to the second aspect of the embodiments of the present application, in a second implementation manner of the second aspect of the embodiment, the first contact is a contact in an infrequent contact group, and the infrequent contact group a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold, and the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact. Or the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server. The first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server. A common contact before the first favorite contact is received. An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application. The first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
结合本申请实施例的第二方面或第二方面的任一种实现方式,在本申请实施例的第二方面的第三种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的已更新的本机名片;该服务器向该第一终端发送本地联系人,该本地联系人为该第一终端的本机名片未发生更新前上传的联系人;该服务器接收该第一终端发送的已更新的本机名片,该已更新的本机名片包括用户名、终端通信号码;该服务器向该第二终端发送该已更新的本机 名片。应理解,已更新的本机名片也可以称为最新名片,具体更新的内容可以包括座机号码、手机号码、邮箱地址、办公地址等信息。因为第一终端的本机名片发生更新,当第一终端通过服务器向第二终端发送已更新的本机名片后,可以有效避免第一终端保存的本地联系人联系不到第一终端对应的用户,第二终端可以为第一终端本地联系人中的至少一个联系人的终端。With reference to the second aspect of the embodiment of the present application or the implementation of the second aspect, in a third implementation manner of the second aspect of the embodiment, the method may further include: the server receiving the first terminal Sending an updated local business card; the server sends a local contact to the first terminal, where the local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the first terminal to send The updated local business card, the updated local business card includes a username, a terminal communication number; the server sends the updated local to the second terminal business card. It should be understood that the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal. The second terminal may be a terminal of at least one of the first terminal local contacts.
结合本申请实施例的第二方面或第二方面的任一种实现方式,在本申请实施例的第二方面的第四种实现方式中,该方法还可以包括:服务器接收第一终端发送的本机名片;该服务器向第二终端发送该本机名片,该本机名片用于该第二终端保存在本地联系人的名片中。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。With reference to the second aspect of the embodiment of the present application or the implementation of the second aspect, in a fourth implementation manner of the second aspect of the application, the method may further include: receiving, by the server, the first terminal The local business card; the server sends the local business card to the second terminal, where the local business card is used for saving the second terminal in the business card of the local contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . After the first terminal communicates with the newly created contact, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found. A business card that contacts the user of the first terminal.
结合本申请实施例的第二方面或第二方面的任一种实现方式,在本申请实施例的第二方面的第五种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的更新黑名单请求,该更新黑名单请求包括该第一终端加入黑名单的第一通信号码;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该服务器根据该更新黑名单请求,更新云黑名单;该服务器确定目标通信号码,该目标通信号码为各个终端发送的黑名单中,同一通信号码加入黑名单的次数大于第三阈值的通信号码;该服务器向运营商服务端查询该目标通信号码的第一被标记数据请求;该服务器接收该运营商服务端发送的第一查询结果;该服务器向该第一终端发送该第一查询结果,该第一查询结果用于更新该第一终端的黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the second aspect of the embodiment of the present application, or any implementation manner of the second aspect, in a fifth implementation manner of the second aspect of the embodiments, the method may further include: the server receiving the first terminal The updated blacklist request is sent, and the update blacklist request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number in the local contact or Landline number. The server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold; The server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第二方面的第五种实现方式,在本申请实施例的第二方面的第六种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的第二被标记数据请求,该第二被标记数据请求包括第二通信号码;该服务器向该运营商服务端发送该第二被标记数据请求。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to the fifth implementation manner of the second aspect of the embodiment of the present application, in a sixth implementation manner of the second aspect of the application, the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第二方面或第二方面的任一种实现方式,在本申请实施例的第一方面的第七种实现方式中,该方法还可以包括:该服务器向该第一终端发送第二名片请求;该服务器接收该第一终端发送的本机名片。第一终端可以主动向服务器上传本机名片,也 可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the second aspect of the embodiment of the present application or the implementation of the second aspect, in a seventh implementation manner of the first aspect of the embodiments, the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal. The first terminal can actively upload the local business card to the server, It can provide a business card request sent by the server, and then upload the local business card to the server, providing an achievable way.
本申请实施例的第三方面提供一种更新联系人的名片的方法,可以包括:若该第一终端的本机名片发生更新,则该第一终端向该服务器发送已更新的本机名片;该第一终端接收该服务器发送的本地联系人,该本地联系人为该服务器保存的该第一终端的联系人;该第一终端通过该服务器向该第二终端发送该已更新的本机名片。应理解,已更新的本机名片也可以称为最新名片,具体更新的内容可以包括座机号码、手机号码、邮箱地址、办公地址等信息。因为第一终端的本机名片发生更新,当第一终端通过服务器向第二终端发送已更新的本机名片后,可以有效避免第一终端保存的本地联系人联系不到第一终端对应的用户,第二终端可以为第一终端本地联系人中的至少一个联系人的终端。The third aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: if the local business card of the first terminal is updated, the first terminal sends the updated local business card to the server; The first terminal receives a local contact sent by the server, and the local contact is a contact of the first terminal saved by the server; the first terminal sends the updated local business card to the second terminal by using the server. It should be understood that the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal. The second terminal may be a terminal of at least one of the first terminal local contacts.
结合本申请实施例的第三方面,在本申请实施例的第三方面的第一种实现方式中,该方法还可以包括:该第一终端在该本地联系人中新建第二联系人的名片;若该第一终端与第三终端发生的通信次数大于第二阈值,则该第一终端通过该服务器向该第三终端发送该第一终端的本机名片,该第三终端为该第二联系人的终端。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。With reference to the third aspect of the embodiments of the present application, in a first implementation manner of the third aspect of the embodiment, the method may further include: the first terminal newly creating a business card of the second contact in the local contact If the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the second The terminal of the contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . After the first terminal communicates with the newly created contact, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found. A business card that contacts the user of the first terminal.
结合本申请实施例的第三方面或第三方面第一种实现方式,在本申请实施例的第三方面的第二种实现方式中,该方法还可以包括:该第一终端将第一通信号码加入黑名单;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该第一终端向该服务器发送更新黑名单请求;该第一终端接收该服务器发送的查询结果,该查询结果为该服务器从运营商服务端确认的运营商黑名单;该第一终端根据该查询结果,更新该黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the third aspect of the embodiment of the present application or the first implementation manner of the third aspect, in a second implementation manner of the third aspect of the embodiment of the present application, the method may further include: the first terminal: the first communication The number is added to the blacklist; it should be understood that the first communication number can be a strange number, or it can be a mobile number or a landline number in the local contact. The first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第三方面的第二种实现方式,在本申请实施例的第三方面的第三种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示该第一通信号码未在该运营商黑名单中,则该第一终端显示第一提示信息,该第一提示信息用于提示用户是否将该第一通信号码从该黑名单移除;该第一终端响应该用户输入的移除操作,从该黑名单中移除该第一通信号码。可以理解的是,第一通信号码在第一终端的黑名单中,但是没在运营商返回的运营商黑名单中,可以提醒用户,是否将其从黑名单中移除,有可能是用户误操作将其加入黑名单的。With reference to the second implementation manner of the third aspect of the embodiment of the present application, in the third implementation manner of the third aspect of the embodiment of the present application, the first terminal, according to the query result, updating the blacklist may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
结合本申请实施例的第三方面的第二种实现方式,在本申请实施例的第三方面的第四种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指 示第二通信号码在该运营商黑名单中,则该第一终端将该第二通信号码加入该黑名单,该第二通信号码为之前不在该第一终端的黑名单中的通信号码。可以理解的是,第二通信号码未在第一终端的黑名单中,但是在运营商返回的运营商黑名单中,可以提醒用户,将其加入黑名单,由运营商进一步确认的查询结果,可靠性比较高,可以避免用户上当受骗。With reference to the second implementation manner of the third aspect of the embodiment of the present application, in the fourth implementation manner of the third aspect of the embodiment of the present application, the first terminal, according to the query result, that the blacklist is updated, may include: If the query result refers to If the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
结合本申请实施例的第三方面的第二种至第四种任一实现方式,在本申请实施例的第三方面的第五种实现方式中,该方法还可以包括:若该第一终端接收第四终端发起的通信次数大于第三阈值,则该第一终端向该服务器发起被标记数据请求,该第四终端的通信号码为该第一通信号码。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to any one of the second to fourth implementation manners of the third aspect of the present application, in a fifth implementation manner of the third aspect of the embodiments of the present application, the method may further include: if the first terminal And receiving, by the fourth terminal, the number of communications initiated by the fourth terminal is greater than a third threshold, the first terminal initiates a marked data request to the server, where the communication number of the fourth terminal is the first communication number. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第三方面或第三方面的任一种实现方式,在本申请实施例的第三方面的第六种实现方式中,该方法还可以包括:该第一终端接收该服务器发送的第二名片请求;该第一终端根据该第二名片请求,向该服务器上传该本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the implementation of the third aspect or the third aspect of the embodiments of the present application, in a sixth implementation manner of the third aspect of the embodiments, the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例第四方面提供了一种更新联系人的名片的方法,可以包括:该服务器接收该第一终端发送的已更新的本机名片;该服务器向该第一终端发送本地联系人,该本地联系人为该第一终端的本机名片未发生更新前上传的联系人;该服务器接收该第一终端发送的已更新的本机名片,该已更新的本机名片包括用户名、终端通信号码;该服务器向该第二终端发送该已更新的本机名片。应理解,已更新的本机名片也可以称为最新名片,具体更新的内容可以包括座机号码、手机号码、邮箱地址、办公地址等信息。因为第一终端的本机名片发生更新,当第一终端通过服务器向第二终端发送已更新的本机名片后,可以有效避免第一终端保存的本地联系人联系不到第一终端对应的用户,第二终端可以为第一终端本地联系人中的至少一个联系人的终端。A fourth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: the server receiving an updated local business card sent by the first terminal; the server sending a local contact to the first terminal, The local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the updated local business card sent by the first terminal, and the updated local business card includes the user name and the terminal communication. Number; the server sends the updated local business card to the second terminal. It should be understood that the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal. The second terminal may be a terminal of at least one of the first terminal local contacts.
结合本申请实施例的第四方面,在本申请实施例的第四方面的第一种实现方式中,该方法还可以包括:服务器接收第一终端发送的本机名片;该服务器向第二终端发送该本机名片,该本机名片用于该第二终端保存在本地联系人的名片中。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。With reference to the fourth aspect of the embodiments of the present application, in a first implementation manner of the fourth aspect of the embodiments of the present application, the method may further include: receiving, by the server, the local business card sent by the first terminal; Sending the local business card, the local business card is used for saving the second terminal in the business card of the local contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . After the first terminal communicates with the newly created contact, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found. A business card that contacts the user of the first terminal.
结合本申请实施例的第四方面的第一种实现方式,在本申请实施例的第四方面的第二种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的更新黑名单请求,该更新黑名单请求包括该第一终端加入黑名单的第一通信号码;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该服务器根据该更新黑名 单请求,更新云黑名单;该服务器确定目标通信号码,该目标通信号码为各个终端发送的黑名单中,同一通信号码加入黑名单的次数大于第三阈值的通信号码;该服务器向运营商服务端查询该目标通信号码的第一被标记数据请求;该服务器接收该运营商服务端发送的第一查询结果;该服务器向该第一终端发送该第一查询结果,该第一查询结果用于更新该第一终端的黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the first implementation manner of the fourth aspect of the embodiment of the present application, in a second implementation manner of the fourth aspect of the embodiments of the present application, the method may further include: the server receiving the update black sent by the first terminal The list request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact. The server is based on the update black name The single request, the cloud blacklist is updated; the server determines the target communication number, and the target communication number is the communication number of the blacklist in which the same communication number is added to the blacklist, and the number of times the blacklist is greater than the third threshold; the server serves the operator. The terminal queries the first marked data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, where the first query result is used Update the blacklist of the first terminal. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第四方面的第二种实现方式,在本申请实施例的第四方面的第三种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的第二被标记数据请求,该第二被标记数据请求包括第二通信号码;该服务器向该运营商服务端发送该第二被标记数据请求。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to the second implementation manner of the fourth aspect of the embodiment of the present application, in a third implementation manner of the fourth aspect of the embodiments of the present application, the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第四方面的第三种实现方式,在本申请实施例的第四方面的第四种实现方式中,该方法还可以包括:该服务器向该第一终端发送第二名片请求;该服务器接收该第一终端发送的本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the third implementation manner of the fourth aspect of the embodiments of the present application, in a fourth implementation manner of the fourth aspect of the application, the method may further include: the server sending the second business card to the first terminal Request; the server receives the local business card sent by the first terminal. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例的第五方面提供一种更新联系人的名片的方法,可以包括:该第一终端在该本地联系人中新建第二联系人的名片;若该第一终端与第三终端发生的通信次数大于第二阈值,则该第一终端通过该服务器向该第三终端发送该第一终端的本机名片,该第三终端为该第二联系人的终端。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。The fifth aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal newly creates a business card of the second contact in the local contact; if the first terminal and the third terminal occur The first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the terminal of the second contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . After the first terminal communicates with the newly created contact, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found. A business card that contacts the user of the first terminal.
结合本申请实施例的第五方面,在本申请实施例的第五方面的第一种实现方式中,该方法还可以包括:该第一终端将第一通信号码加入黑名单;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该第一终端向该服务器发送更新黑名单请求;该第一终端接收该服务器发送的查询结果,该查询结果为该服务器从运营商服务端确认的运营商黑名单;该第一终端根据该查询结果,更新该黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回 给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the fifth aspect of the embodiments of the present application, in a first implementation manner of the fifth aspect of the application, the method may further include: the first terminal adds the first communication number to the blacklist; A communication number can be a strange number, or it can be a mobile number or a landline number in a local contact. The first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The carrier server can return the query result. The server sends the feedback to the first terminal, and the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第五方面的第一种实现方式,在本申请实施例的第五方面的第二种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示该第一通信号码未在该运营商黑名单中,则该第一终端显示第一提示信息,该第一提示信息用于提示用户是否将该第一通信号码从该黑名单移除;该第一终端响应该用户输入的移除操作,从该黑名单中移除该第一通信号码。可以理解的是,第一通信号码在第一终端的黑名单中,但是没在运营商返回的运营商黑名单中,可以提醒用户,是否将其从黑名单中移除,有可能是用户误操作将其加入黑名单的。With reference to the first implementation manner of the fifth aspect of the embodiment of the present application, in the second implementation manner of the fifth aspect of the application, the first terminal, according to the query result, that the blacklist is updated, may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
结合本申请实施例的第五方面的第一种实现方式,在本申请实施例的第五方面的第三种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示第二通信号码在该运营商黑名单中,则该第一终端将该第二通信号码加入该黑名单,该第二通信号码为之前不在该第一终端的黑名单中的通信号码。可以理解的是,第二通信号码未在第一终端的黑名单中,但是在运营商返回的运营商黑名单中,可以提醒用户,将其加入黑名单,由运营商进一步确认的查询结果,可靠性比较高,可以避免用户上当受骗。With reference to the first implementation manner of the fifth aspect of the embodiment of the present application, in the third implementation manner of the fifth aspect of the embodiment of the present application, the first terminal, according to the query result, updating the blacklist may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
结合本申请实施例的第五方面的第一种至第三种任一的实现方式,在本申请实施例的第五方面的第四种实现方式中,该方法还可以包括:若该第一终端接收第四终端发起的通信次数大于第三阈值,则该第一终端向该服务器发起被标记数据请求,该第四终端的通信号码为该第一通信号码。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。In a fourth implementation manner of the fifth aspect of the embodiment of the present application, the method may further include: if the first And the first terminal sends a marked data request to the server, where the communication number of the fourth terminal is the first communication number. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第五方面至第五方面的任一种实现方式,在本申请实施例的第五方面的第五种实现方式中,该方法还可以包括:该第一终端接收该服务器发送的第二名片请求;该第一终端根据该第二名片请求,向该服务器上传该本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to any implementation of the fifth to fifth aspects of the embodiments of the present application, in a fifth implementation manner of the fifth aspect of the application, the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例第六方面提供了一种更新联系人的名片的方法,可以包括:服务器接收第一终端发送的本机名片;该服务器向第二终端发送该本机名片,该本机名片用于该第二终端保存在本地联系人的名片中。当第一终端的本地联系人中新建了一个联系人的名片,但可能新建后,不会与其发生通信,所以,新建后可以不向新建的联系人对应的终端发送第一终端的本机名片。当第一终端与新建的联系人发生通信后,第一终端可以向新建的联系人对应的终端发送第一终端的本机名片,下次进行通信时,可以更容易找到第一终端的本机名片,与第一终端的用户进行联系。A sixth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a local business card sent by the first terminal; the server sending the local business card to the second terminal, where the local business card is used The second terminal is saved in the business card of the local contact. When a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact. . After the first terminal communicates with the newly created contact, the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found. A business card that contacts the user of the first terminal.
结合本申请实施例的第六方面,在本申请实施例的第六方面的第一种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的更新黑名单请求,该更新黑名单请求包 括该第一终端加入黑名单的第一通信号码;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该服务器根据该更新黑名单请求,更新云黑名单;该服务器确定目标通信号码,该目标通信号码为各个终端发送的黑名单中,同一通信号码加入黑名单的次数大于第三阈值的通信号码;该服务器向运营商服务端查询该目标通信号码的第一被标记数据请求;该服务器接收该运营商服务端发送的第一查询结果;该服务器向该第一终端发送该第一查询结果,该第一查询结果用于更新该第一终端的黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。With reference to the sixth aspect of the embodiments of the present application, in a first implementation manner of the sixth aspect of the application, the method may further include: the server receiving an update blacklist request sent by the first terminal, the update black List request package The first communication number that the first terminal joins the blacklist is included; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact. The server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold; The server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第六方面的第一种实现方式,在本申请实施例的第六方面的第二种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的第二被标记数据请求,该第二被标记数据请求包括第二通信号码;该服务器向该运营商服务端发送该第二被标记数据请求。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to the first implementation manner of the sixth aspect of the embodiment of the present application, in a second implementation manner of the sixth aspect of the application, the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第六方面或第六方面的任意一种实现方式,在本申请实施例的第六方面的第三种实现方式中,该方法还可以包括:该服务器向该第一终端发送第二名片请求;该服务器接收该第一终端发送的本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the sixth aspect of the embodiment of the present application, or any implementation manner of the sixth aspect, in a third implementation manner of the sixth aspect of the embodiments of the present application, the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例的第七方面提供一种更新联系人的名片的方法,可以包括:该第一终端将第一通信号码加入黑名单;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该第一终端向该服务器发送更新黑名单请求;该第一终端接收该服务器发送的查询结果,该查询结果为该服务器从运营商服务端确认的运营商黑名单;该第一终端根据该查询结果,更新该黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。The seventh aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal adds a first communication number to a blacklist; it should be understood that the first communication number may be a strange number, or Is the mobile number or landline number in the local contact. The first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第七方面,在本申请实施例的第七方面的第一种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示该第一通信号码未在该运营商黑名单中,则该第一终端显示第一提示信息,该第一提示信息用于提示用户是否将该第一通信号码从该黑名单移除;该第一终端响应该用户输入的移除操作,从该黑 名单中移除该第一通信号码。可以理解的是,第一通信号码在第一终端的黑名单中,但是没在运营商返回的运营商黑名单中,可以提醒用户,是否将其从黑名单中移除,有可能是用户误操作将其加入黑名单的。With reference to the seventh aspect of the embodiment of the present application, in a first implementation manner of the seventh aspect of the application, the first terminal, according to the query result, updating the blacklist may include: if the query result indicates the If the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist; The terminal responds to the user input removal operation from the black The first communication number is removed from the list. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
结合本申请实施例的第七方面,在本申请实施例的第七方面的第二种实现方式中,该第一终端根据该查询结果,更新该黑名单,可以包括:若该查询结果指示第二通信号码在该运营商黑名单中,则该第一终端将该第二通信号码加入该黑名单,该第二通信号码为之前不在该第一终端的黑名单中的通信号码。可以理解的是,第二通信号码未在第一终端的黑名单中,但是在运营商返回的运营商黑名单中,可以提醒用户,将其加入黑名单,由运营商进一步确认的查询结果,可靠性比较高,可以避免用户上当受骗。With reference to the seventh aspect of the embodiments of the present application, in a second implementation manner of the seventh aspect of the application, the first terminal, according to the query result, updating the blacklist may include: if the query result indicates The second communication number is added to the blacklist by the first terminal, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
结合本申请实施例的第七方面或第七方面的任意一种实现方式,在本申请实施例的第七方面的第三种实现方式中,该方法还可以包括:若该第一终端接收第四终端发起的通信次数大于第三阈值,则该第一终端向该服务器发起被标记数据请求,该第四终端的通信号码为该第一通信号码。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to the seventh aspect of the embodiment of the present application, or any implementation manner of the seventh aspect, in a third implementation manner of the seventh aspect of the embodiments of the present application, the method may further include: if the first terminal receives the first When the number of communications initiated by the four terminals is greater than the third threshold, the first terminal initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第七方面或第七方面的任意一种实现方式,在本申请实施例的第七方面的第四种实现方式中,该方法还可以包括:该第一终端接收该服务器发送的第二名片请求;该第一终端根据该第二名片请求,向该服务器上传该本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the seventh aspect of the present application, or any implementation manner of the seventh aspect, in a fourth implementation manner of the seventh aspect of the embodiments, the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例第八方面提供了一种更新联系人的名片的方法,可以包括:该方法还可以包括:该服务器接收该第一终端发送的更新黑名单请求,该更新黑名单请求包括该第一终端加入黑名单的第一通信号码;应理解,第一通信号码可以是陌生的号码,也可以是本地联系人中的手机号码或座机号码。该服务器根据该更新黑名单请求,更新云黑名单;该服务器确定目标通信号码,该目标通信号码为各个终端发送的黑名单中,同一通信号码加入黑名单的次数大于第三阈值的通信号码;该服务器向运营商服务端查询该目标通信号码的第一被标记数据请求;该服务器接收该运营商服务端发送的第一查询结果;该服务器向该第一终端发送该第一查询结果,该第一查询结果用于更新该第一终端的黑名单。每个终端都会向服务器上传本地黑名单,服务器可以从各个终端上传的黑名单中,确定出被标记为黑名单的用户数量大于第三阈值的通信号码为目标号码集,服务器将目标号码集再向运营商服务端查询,进一步确定目标号码集的被标记信息。运营商服务端可以将查询结果返回给服务器,服务器再将其反馈给第一终端,第一终端可以根据查询结果,更新黑名单,有效的对终端的黑名单进行管理。The eighth aspect of the present application provides a method for updating a business card of a contact, which may include: the method further includes: receiving, by the server, an update blacklist request sent by the first terminal, where the update blacklist request includes the first A terminal joins the first communication number of the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact. The server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold; The server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal. Each terminal uploads a local blacklist to the server. The server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
结合本申请实施例的第八方面,在本申请实施例的第八方面的第一种实现方式中,该方法还可以包括:该服务器接收该第一终端发送的第二被标记数据请求,该第二被标记数 据请求包括第二通信号码;该服务器向该运营商服务端发送该第二被标记数据请求。本申请实施例提供了一个可选的实现方式,当第一终端将第一通信号码加入黑名单,但是第一通信号码向第一终端发起了多次通信,有可能是用户误把第一通信号码加入黑名单的,当发起的通信次数大于第三阈值时,第一终端可以向服务器发起被标记数据请求,服务器可以向运营商服务端去查询,向第一终端返回查询结果,第一终端可以根据查询结果更新黑名单。With reference to the eighth aspect of the embodiments of the present application, in a first implementation manner of the eighth aspect of the application, the method may further include: receiving, by the server, a second tagged data request sent by the first terminal, where Second number of markers A second communication number is included as requested; the server sends the second tagged data request to the carrier server. The embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication. When the number is added to the blacklist, when the number of initiated communications is greater than the third threshold, the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal The blacklist can be updated based on the results of the query.
结合本申请实施例的第八方面或第八方面的一种实现方式,在本申请实施例的第八方面的第二种实现方式中,该方法还可以包括:该服务器向该第一终端发送第二名片请求;该服务器接收该第一终端发送的本机名片。第一终端可以主动向服务器上传本机名片,也可以是接收到服务器发送的名片请求,再向服务器上传本机名片,提供了一种可实现的方式。With reference to the eighth aspect of the embodiment of the present application, or an implementation manner of the eighth aspect, in a second implementation manner of the eighth aspect of the embodiment, the method may further include: the server sending the first terminal The second business card requests; the server receives the local business card sent by the first terminal. The first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
本申请实施例第九方面提供了一种终端,具有借助终端与云服务器数据共享,达到了及时更新本地联系人的名片的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。The ninth aspect of the embodiment of the present application provides a terminal, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第十方面提供了一种服务器,具有借助终端与云服务器数据共享,达到了及时更新本地联系人的名片的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。The tenth aspect of the embodiment of the present application provides a server, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第十一方面提供一种终端,可以包括:存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;An eleventh embodiment of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述收发器,用于向服务器发送第一名片请求,所述第一名片请求用于获取本地联系人中第一联系人的最新名片,所述最新名片为所述服务器从第二终端获取的名片,所述第二终端为所述第一联系人的终端,所述最新名片包括用户名、通信号码;接收所述服务器发送的最新名片;The transceiver is configured to send a first business card request to the server, where the first business card request is used to obtain a latest business card of the first contact in the local contact, where the latest business card is obtained by the server from the second terminal. a business card, the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number; and receives the latest business card sent by the server;
所述处理器,用于调用所述操作指令,根据所述最新名片,更新所述第一终端保存的所述第一联系人的历史名片。The processor is configured to invoke the operation instruction, and update a historical business card of the first contact saved by the first terminal according to the latest business card.
本申请实施例第十二方面提供一种终端,可以包括:A twelfth aspect of the embodiments of the present application provides a terminal, which may include:
存储器、收发器和总线,所述存储器和所述收发器通过所述总线连接;a memory, a transceiver, and a bus, the memory and the transceiver being connected by the bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述收发器,用于若第一终端的本机名片中的通信号码发生更新,则所述收发器向服务器发送已更新的本机名片;接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人;通过所述服务器向所述第二终端发送所述已更新的本机名片。The transceiver is configured to: if the communication number in the local business card of the first terminal is updated, the transceiver sends the updated local business card to the server; and receives the local contact sent by the server, the local The contact is a contact of the first terminal saved by the server; and the updated local business card is sent to the second terminal by the server.
本申请实施例第十三方面提供一种终端,可以包括:存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;A thirteenth aspect of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述处理器,用于调用所述存储操作指令,在所述本地联系人中新建第二联系人的名 片;The processor is configured to invoke the storage operation instruction to create a second contact name in the local contact sheet;
所述收发器,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述收发器通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
本申请实施例第十四方面提供一种终端,可以包括:存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;A fourteenth aspect of the embodiments of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述处理器,用于调用所述存储操作指令,将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processor is configured to invoke the storage operation instruction to add a first communication number to a blacklist; and update the blacklist according to the query result;
所述收发器,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The transceiver is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
本申请实施例第十五方面提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。需要说明的是,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面为数据节点或者管理节点所设计的程序。A fifteenth aspect of the embodiments of the present application provides a computer readable storage medium having instructions stored therein that, when run on a computer, cause the computer to perform the methods described in the above aspects. It should be noted that the technical solution of the present application or the part that contributes to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. And a computer software instruction for storing the above device, comprising a program designed to execute the above first aspect, the second aspect is a data node or a management node.
该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
本申请实施例第十六方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式,或者,本申请第二方面或第二方面任一可选实现方式中所述的方法。A sixteenth aspect of the present application provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform any of the optional implementations of the first aspect or the first aspect of the present application, or the present application The method of any of the alternative implementations of the second aspect or the second aspect.
本申请实施例提供的技术方案中,具有如下有益效果:In the technical solution provided by the embodiment of the present application, the following beneficial effects are obtained:
在本申请实施例中,第一终端向服务器发送第一名片请求,所述第一名片请求用于获取本地联系人中第一联系人的最新名片,所述最新名片为所述服务器从第二终端获取的名片,所述第二终端为所述第一联系人的终端,所述最新名片包括用户名、通信号码;所述第一终端接收所述服务器发送的最新名片;所述第一终端根据所述最新名片,更新所述第一终端保存的所述第一联系人的历史名片。借助终端与云服务器数据共享,达到了及时更新本地联系人的名片的目的,解决了由于用户更换手机号,导致对方无法联系到用户的问题,终端可以按照已更新的联系人的名片进行保存,可以解决手动新建联系人操作复杂的问题,本申请实施可增强终端特性竞争力,改善终端易用性,提升用户体验。In the embodiment of the present application, the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the second business card. a business card acquired by the terminal, the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number; the first terminal receives a latest business card sent by the server; the first terminal And updating, according to the latest business card, a historical business card of the first contact saved by the first terminal. The data sharing between the terminal and the cloud server achieves the purpose of timely updating the business card of the local contact, and solves the problem that the user cannot contact the user because the user replaces the mobile phone number, and the terminal can save according to the updated business card of the contact. The problem that the manual new contact operation is complicated can be solved. The implementation of the present application can enhance the terminal characteristic competitiveness, improve the terminal usability, and improve the user experience.
附图说明DRAWINGS
图1为本申请实施例所应用的场景示意图;FIG. 1 is a schematic diagram of a scenario applied to an embodiment of the present application;
图2为本申请实施例中更新联系人的名片的方法的一个实施例示意图;2 is a schematic diagram of an embodiment of a method for updating a business card of a contact in an embodiment of the present application;
图3A为第一终端登录云服务器的界面示意图;3A is a schematic diagram of an interface of a first terminal logging in to a cloud server;
图3B为第一终端显示的本机名片的示意图; 3B is a schematic diagram of a local business card displayed by the first terminal;
图3C为第一终端显示的本地联系人的示意图;3C is a schematic diagram of a local contact displayed by the first terminal;
图3D为第一终端向云服务器上传本机名片和本地联系人的示意图;FIG. 3D is a schematic diagram of the first terminal uploading a local business card and a local contact to the cloud server;
图3E为第一终端向云服务器上传本机名片的示意图;3E is a schematic diagram of a first terminal uploading a local business card to a cloud server;
图3F为第一终端向云服务器上传本地联系人的示意图;3F is a schematic diagram of a first terminal uploading a local contact to a cloud server;
图3G为第一终端显示推荐上传周期的示意图;FIG. 3G is a schematic diagram showing a recommended upload period of the first terminal;
图3H为第一终端获取当月常用联系人的示意图;FIG. 3H is a schematic diagram of the first terminal acquiring a frequently used contact in the current month; FIG.
图3I为第一终端获取当月不常用联系人的示意图;FIG. 3I is a schematic diagram of the first terminal acquiring a contact that is not commonly used in the current month; FIG.
图3J为第一终端上传云服务器最新常用联系人的示意图;FIG. 3J is a schematic diagram of uploading the latest common contacts of the cloud server by the first terminal;
图3K为第一终端上传云服务器最新不常用联系人的示意图;FIG. 3K is a schematic diagram of uploading the latest unused contacts of the cloud server by the first terminal;
图3L为第一终端显示新建联系人的提示信息的示意图;FIG. 3L is a schematic diagram showing prompt information of a newly created contact by the first terminal;
图3M为第一终端发送第一联系人的名片请求的示意图;3M is a schematic diagram of a first terminal sending a business card request of a first contact;
图3N为第二终端显示是否上传本机名片的示意图;FIG. 3N is a schematic diagram of the second terminal displaying whether to upload a local business card;
图3O为第一终端更新本地联系人的名片的示意图;FIG. 3O is a schematic diagram of updating a business card of a local contact by the first terminal;
图4为本申请实施例中更新联系人的名片的方法的另一个实施例示意图;4 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application;
图5A为第一终端向云服务器上传已更新的本机名片的示意图;5A is a schematic diagram of a first terminal uploading an updated local business card to a cloud server;
图5B为第一终端接收云服务器发送的本地联系人的示意图;5B is a schematic diagram of a first terminal receiving a local contact sent by a cloud server;
图5C为第一终端过滤出的不在本地联系人中的其他联系人的示意图;5C is a schematic diagram of other contacts that are not filtered by the first terminal and are not in the local contact;
图5D为第一终端过滤出的在本地联系人中的联系人的示意图;5D is a schematic diagram of contacts in a local contact filtered by the first terminal;
图5E为第一终端向不在本地联系人中的其他联系人发送已更新的本机名片的示意图;5E is a schematic diagram of the first terminal sending an updated local business card to other contacts not in the local contact;
图5F为第一终端向在本地联系人中的联系人发送已更新的本机名片的示意图;5F is a schematic diagram of the first terminal sending an updated local business card to a contact in a local contact;
图5G为第二终端是否保存第一终端已更新的本机名片的示意图;5G is a schematic diagram of whether the second terminal saves the local business card that the first terminal has updated;
图6为本申请实施例中更新联系人的名片的方法的另一个实施例示意图;FIG. 6 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application;
图7A为第一终端呼叫通信号码的示意图;7A is a schematic diagram of a first terminal call communication number;
图7B为第一终端向云服务器发送名片请求的示意图;7B is a schematic diagram of a first terminal sending a business card request to a cloud server;
图7C为第二终端显示上传本机名片的示意图;7C is a schematic diagram showing the uploading of the local business card by the second terminal;
图7D为第一终端接收第二终端的本机名片的示意图;7D is a schematic diagram of a first terminal receiving a local business card of a second terminal;
图7E为第一终端向第二终端的最新通信号码拨号的示意图;7E is a schematic diagram of dialing the latest communication number of the first terminal to the second terminal;
图8为本申请实施例中更新联系人的名片的方法的另一个实施例示意图;FIG. 8 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application;
图9A为第一终端新建联系人的示意图;9A is a schematic diagram of a new contact of a first terminal;
图9B为第一终端上新建联系人的名片的示意图;9B is a schematic diagram of a business card of a newly created contact on the first terminal;
图9C为第一终端和第二终端发生通信记录的示意图;9C is a schematic diagram of communication records between a first terminal and a second terminal;
图9D为第一终端向第二终端发送第一终端的本机名片的示意图;9D is a schematic diagram of a first terminal transmitting a local business card of a first terminal to a second terminal;
图9E为第二终端保存第一终端的本机名片的示意图;9E is a schematic diagram of storing, by the second terminal, a local business card of the first terminal;
图10为本申请实施例中管理黑名单的方法的一个实施例示意图;FIG. 10 is a schematic diagram of an embodiment of a method for managing a blacklist in an embodiment of the present application;
图11A为第一终端将第一通信号码加入黑名单的示意图;11A is a schematic diagram of a first terminal adding a first communication number to a blacklist;
图11B为第一终端上的黑名单示意图;11B is a schematic diagram of a blacklist on the first terminal;
图11C为第一终端向云服务器上传黑名单的示意图; 11C is a schematic diagram of a first terminal uploading a blacklist to a cloud server;
图11D为第一终端更新黑名单的示意图;11D is a schematic diagram of updating a blacklist by a first terminal;
图11E为第一终端是否将黑名单中的标记信息进行更新的示意图;11E is a schematic diagram of whether the first terminal updates the tag information in the blacklist;
图12为管理黑名单的方法的另一个实施例示意图;12 is a schematic diagram of another embodiment of a method for managing a blacklist;
图13A为第一终端将第一通信号码加入黑名单的示意图;FIG. 13A is a schematic diagram of a first terminal adding a first communication number to a blacklist;
图13B为第一终端检测到与目标号码的通信次数大于预置阈值,并向云服务器发送查询目标号码的被标记数据请求的示意图;13B is a schematic diagram of the first terminal detecting that the number of communications with the target number is greater than a preset threshold, and sending the tagged data request of the query target number to the cloud server;
图13C为第一终端显示目标查询结果的示意图;13C is a schematic diagram showing a result of a target query by a first terminal;
图14为本申请实施例中终端的一个实施例示意图;FIG. 14 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application;
图15A为本申请实施例中终端的另一个实施例示意图;15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application;
图15B为本申请实施例中终端的另一个实施例示意图;15B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application;
图16A为本申请实施例中终端的另一个实施例示意图;16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application;
图16B为本申请实施例中终端的另一个实施例示意图;FIG. 16B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application; FIG.
图17A为本申请实施例中终端的另一个实施例示意图;17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application;
图17B为本申请实施例中终端的另一个实施例示意图;17B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application;
图18为本申请实施例中终端的另一个实施例示意图。FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application are described below with reference to the accompanying drawings in the embodiments of the present application. It is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments of the present application without creative efforts are within the scope of the present application.
在本申请实施例中,所应用的场景如图1所示,云服务器与多个终端建立连接。其中,终端可以包括手机、平板电脑、个人数字助理(personal digital assistant,PDA)、销售终端(point of sales,POS)、车载电脑等任意终端设备,在下述的实施例中终端可以以手机为例进行说明。云服务器上部署云服务器程序,与各个终端可以进行通信连接。云服务器是基于互联网的相关服务的增加、使用和交付模式,通常涉及通过互联网来提供动态易扩展且经常是虚拟化的资源。In the embodiment of the present application, the applied scenario is as shown in FIG. 1 , and the cloud server establishes a connection with multiple terminals. The terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a vehicle-mounted computer, and the like. In the following embodiments, the terminal may use a mobile phone as an example. Be explained. The cloud server program is deployed on the cloud server, and each terminal can communicate with each other. Cloud servers are models of the addition, use, and delivery of Internet-based related services, often involving the provision of dynamically scalable and often virtualized resources over the Internet.
实施例一:云服务器优化终端保存的联系人,如图2所示,为本申请实施例中更新联系人的名片的方法的一个实施例示意图。Embodiment 1: The cloud server optimizes the contacts saved by the terminal, as shown in FIG. 2 , which is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
201、第一终端向云服务器上传本机名片和/或本地联系人。201. The first terminal uploads a local business card and/or a local contact to the cloud server.
在本申请实施例中,以使用第一终端的第一用户(用户A)为例进行说明,若用户A为云服务用户,则不需要注册云服务器,直接登录即可,若用户A不是云服务用户,需要注册云服务器,再进行登录云服务器。如图3A所示,为第一终端上登录云服务器的界面示意图。应理解,本机名片也可以称呼为本机用户名片。其中,本机名片可以包括用户的手机号码、座机号码,还可以包括用户的姓名和/或昵称、头像、邮箱地址、地址(办公地址或家庭地址)、生日、性别等信息中的任意一个或任意几个的组合。如图3B所示,为第一终端上显示本机名片的示意图。本机名片可以包括:称呼:用户A,手机号码:18312345678, 办公地址:深圳市罗湖区国贸大厦,邮箱地址:123456789@qq.com。In the embodiment of the present application, the first user (user A) using the first terminal is taken as an example. If the user A is a cloud service user, the cloud server is not required to be registered, and the user can log in directly. To service users, you need to register with the cloud server and log in to the cloud server. As shown in FIG. 3A, it is a schematic diagram of an interface for logging in to the cloud server on the first terminal. It should be understood that the local business card can also be referred to as the business card of the local user. The local business card may include the user's mobile phone number and the landline number, and may also include any one of the user's name and/or nickname, avatar, email address, address (office address or home address), birthday, gender, and the like. Any combination of several. As shown in FIG. 3B, a schematic diagram of displaying a local business card on the first terminal is shown. The local business card can include: title: user A, mobile phone number: 18312345678, Office Address: Guomao Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com.
一般来说,每个终端对应的本机名片中的信息可以手动添加,也可以自动生成。可选择的,自动生成每个终端的本机名片的方式为:第一终端插入新的用户身份识别(subscriber identification module,SIM)卡(机卡配对发生变化时),获取新插入SIM卡的号码,用户界面(user interface,UI)上可以弹出是否保存用户A名片的提示框,用户选择保存后,UI上还可以弹出是否上传用户A名片至云服务器。Generally, the information in the local business card corresponding to each terminal can be manually added or automatically generated. Optionally, the method for automatically generating the local business card of each terminal is: the first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), and obtains the number of the newly inserted SIM card. The user interface (UI) can pop up a prompt box for saving the user A business card. After the user selects to save, the UI can also pop up whether to upload the user A business card to the cloud server.
可选择的,自动生成每个终端的本机名片的方式,还可以是如下所示的方式:例如,自动生成可以是第一终端根据检测拨出的手机号码为同一个号码的次数超过5次(可自行设定)、或者被接入的手机号码为同一个号码的次数超过5次(可自行设定),可以认为这个号码为本机名片中的手机号码,保存在用户A名片中;或者,同一个邮箱地址接收邮件的次数超过5次(可自行设定)、或者同一个邮箱地址发出邮件的次数超过5次(可自行设定),可以认为这个号码为本机名片中的邮箱地址,保存在用户A名片中。在自动添加用户A名片中的某个信息时,也可以给用户A一个提示信息,提示用户A该信息是否准确,若不准确,用户A还可以及时手动修改。手动添加用户A名片时,虽然输入可能稍微繁琐一点,但是用户A自身输入的,准确性比较高。Optionally, the manner of automatically generating the local business card of each terminal may also be as follows: for example, the automatic generation may be that the first terminal has more than 5 times of the same number according to the detected mobile phone number. (You can set it yourself), or the number of mobile phones that are connected to the same number is more than 5 times (you can set it yourself), you can think that this number is the mobile phone number in the business card of the machine, and it is saved in the user's A business card; Or, the number of emails received by the same email address is more than 5 times (can be set by yourself), or the number of emails sent by the same email address is more than 5 times (you can set it yourself). You can think of this number as the mailbox in your business card. The address is saved in the user's A business card. When a certain information in the user A business card is automatically added, the user A can also be prompted with a prompt message to prompt the user A whether the information is accurate. If it is not accurate, the user A can also manually modify it. When manually adding a user's A business card, although the input may be a bit cumbersome, the user A's own input is more accurate.
进一步的,如图3C所示,为第一终端上显示的本地联系人的示意图。应理解,上传本机名片和/或本地联系人可以包括但不限于以下几种实现方式:Further, as shown in FIG. 3C, it is a schematic diagram of a local contact displayed on the first terminal. It should be understood that uploading a local business card and/or local contact may include, but is not limited to, the following implementations:
(1)用户A可以在第一终端的云服务已登录界面上选择将本机名片和/或本地联系人上传至云服务器。即第一终端根据用户A在显示屏上的云服务已登录界面上的选定操作生成上传指令,再根据上传指令将用户A名片和/或本地联系人上传至云服务器。如图3D所示,为第一终端将本机名片和本地联系人上传云服务器的一个示意图。(1) User A can select to upload the local business card and/or local contact to the cloud server on the login interface of the cloud service of the first terminal. That is, the first terminal generates an upload instruction according to the selected operation of the user A on the login interface of the cloud service on the display screen, and then uploads the user A business card and/or the local contact to the cloud server according to the upload instruction. As shown in FIG. 3D, a schematic diagram of uploading a local business card and a local contact to the cloud server for the first terminal is shown.
(2)用户A也可以在第一终端的本地上选择上传本机名片,和/或,本地联系人至云服务器。当用户A为云服务用户时,在显示通讯录和用户A名片的显示界面可以有一个云标识来指示,用户A可以在设置中选择通讯录,上传本地联系人,和/或,用户A名片;也可以直接在通讯录中点击云标识上传本地联系人,和/或,在用户A名片中点击云标识上传用户A名片,还可以是其他的上传云服务器的方式,具体不做限定。如图3E所示,为第一终端将本机名片上传至云服务器的一个示意图。如图3F所示,为第一终端将本地联系人上传至云服务器的一个示意图。(2) User A may also choose to upload a local business card and/or a local contact to the cloud server on the locality of the first terminal. When the user A is a cloud service user, the display interface displaying the address book and the user A business card may have a cloud identifier to indicate that the user A may select an address book, upload a local contact, and/or a user A business card in the setting. You can also click the cloud ID to upload the local contact directly in the address book, and/or click the cloud ID to upload the user A business card in the user A business card. It can also be another way of uploading the cloud server, which is not limited. As shown in FIG. 3E, a schematic diagram of uploading a local business card to a cloud server for the first terminal. As shown in FIG. 3F, a schematic diagram of uploading a local contact to a cloud server for the first terminal.
实际应用中,每个终端的联系人都可有至少一个用于让对方唯一确定自己的标识,在终端向服务器发送名片获取请求时,可携带至少一个唯一确定对方的标识,继而服务器可根据该标识获取对端用户的联系信息。在一个可能的实现中,云服务器保存的联系人中每个联系人都有一个唯一标识(Identification,ID),即云服务器中保存有联系人与唯一标识的映射关系表。这个唯一标识可以是字母、数字、字母与数字的组合、序列号、字符等,可以唯一指示不同的联系人;或者,该唯一标识也可以是与用户身份强相关的身份信息或几个身份信息的集合,例如身份证号、银行卡号、微信号、QQ号等,在遵从法律法规以及保障用户隐私的前提下,拥有用户身份数据的云服务器可根据这些用户身份信息,获取被请求终端用户的名片信息,从而提升用户的沟通效率。示例性地,如用户A通过手机向 运营商的服务器发送请求,请求获取用户B的联系方式,该请求中携带有用户B的相关信息,如微信号、支付宝帐号、姓名等相关信息。运营商的服务器获取这些信息后,经大数据处理,唯一筛选出复核该条件的用户,即用户B,继而在本地服务器获取用户B的手机号码,并将该手机号码推送给用户A的手机。下表1所示的为云服务器保存的联系人与唯一标识的一个映射关系表。In an actual application, each terminal contact may have at least one identifier for the other party to uniquely determine the identity. When the terminal sends a business card acquisition request to the server, the terminal may carry at least one identifier that uniquely identifies the other party, and then the server may The identifier obtains the contact information of the peer user. In a possible implementation, each contact in the contact saved by the cloud server has a unique identifier (ID), that is, a mapping table in which the contact information and the unique identifier are stored in the cloud server. The unique identifier may be a letter, a number, a combination of letters and numbers, a serial number, a character, etc., and may uniquely indicate a different contact; or the unique identifier may also be an identity information or several identity information that is strongly related to the user identity. The collection, such as ID number, bank card number, micro-signal, QQ number, etc., under the premise of complying with laws and regulations and protecting user privacy, the cloud server with user identity data can obtain the requested end user according to the user identity information. Business card information, thereby improving user communication efficiency. Illustratively, as user A uses a mobile phone to The server of the operator sends a request to obtain the contact information of the user B, and the request carries relevant information of the user B, such as a micro signal, an Alipay account number, a name, and the like. After the operator's server obtains the information, the user who has checked the condition, that is, the user B, is selected by the big data processing, and then the mobile phone number of the user B is obtained from the local server, and the mobile phone number is pushed to the mobile phone of the user A. Table 1 below shows a mapping table of contacts and unique identifiers saved by the cloud server.
联系人(用户名)Contact (username) 唯一标识Uniquely identifies
用户AUser A yun001Yun001
用户BUser B yun002Yun002
用户CUser C yun003Yun003
用户DUser D yun004Yun004
用户EUser E yun005Yun005
用户FUser F yun006Yun006
用户GUser G yun007Yun007
用户HUser H yun008Yun008
表1Table 1
其中,用户A在选择上传云服务器的数据时,还可以选择上传图片、音乐文件等其他数据,具体不做限定。用户A在选定上传的数据时,还可以根据实际需求设置自动上传周期,或者,第一终端上已经有几个推荐的自动上传周期,用户A可以自行选定。如图3G所示,为第一终端上显示推荐上传周期的示意图。上传周期可以是一个月、两个月或三个月,或者其他时间,用户A还可根据用户实际需求自行设定。应理解,第一终端上还可以有主动上传周期提醒,可以提醒用户A主动上传,例如:这个月15号上传的用户A名片和/或本地联系人,用户A选择的上传周期提醒是一个月,那么,到下个月15号,第一终端会提示用户A,是否重新上传用户A名片和/或本地联系人,以防用户A忘记。When user A selects to upload data of the cloud server, user A may also select other data such as uploading pictures and music files, which is not limited. When user A selects the uploaded data, the user can also set an automatic uploading period according to actual needs, or there are several recommended automatic uploading cycles on the first terminal, and user A can select it by himself. As shown in FIG. 3G, a schematic diagram of displaying a recommended upload period on the first terminal is shown. The uploading period can be one month, two months or three months, or other time, user A can also set according to the actual needs of the user. It should be understood that the first terminal may also have an active uploading period reminder, which may remind the user A to actively upload, for example, the user A business card and/or the local contact uploaded on the 15th of this month, and the uploading period reminder selected by the user A is one month. Then, by the 15th of next month, the first terminal will prompt the user A to re-upload the user A business card and/or local contact, in case the user A forgets.
202、第一终端获取最新常用联系人和/或最新不常用联系人。202. The first terminal acquires the latest frequently used contact and/or the latest unused contact.
在本申请实施例中,第一终端可以自己获取最新常用联系人和/或最新不常用联系人,也可以是通过云服务器来获取最新常用联系人和/或最新不常用联系人。In the embodiment of the present application, the first terminal may obtain the latest frequently used contact and/or the latest unused contact by itself, or may obtain the latest frequently used contact and/or the latest unused contact through the cloud server.
(1)第一终端自己获取最新常用联系人和/或最新不常用联系人,详见下述所示:(1) The first terminal itself obtains the latest frequently used contacts and/or the latest unused contacts, as shown below:
第一终端可以根据预置创建规则,获取最新常用联系人和/或最新不常用联系人。具体如下所示:该预置创建规则可以为第一终端按预置时间(半个月、一个月或两个月等)计算同一个号码与本机号码(第一终端上的号码)发生的通信次数(例如通话、短消息等),当通信次数大于第一阈值(例如10次/月)时,将该号码加入到当月常用联系人中,当通信次数小于第二阈值(例如3次/月)时,将该号码加入到当月不常用联系人中。当月常用联系人可以理解为最新常用联系人,当月不常用联系人可以理解为最新不常用联系人。The first terminal can acquire the latest frequently used contacts and/or the latest unused contacts according to the preset creation rules. The details are as follows: the preset creation rule may be that the first terminal calculates the same number and the local number (the number on the first terminal) according to the preset time (half month, one month or two months, etc.). The number of communications (eg, call, short message, etc.), when the number of communications is greater than the first threshold (eg, 10 times/month), the number is added to the frequent contacts of the current month, when the number of communications is less than the second threshold (eg, 3 times / When the month is added, the number is added to the contacts that are not commonly used in the month. The frequently used contacts of the month can be understood as the latest frequently used contacts, and the contacts that are not commonly used in the month can be understood as the latest unused contacts.
如图3H所示,为第一终端获取最新常用联系人的示意图。如图3I所示,为第一终端获取最新不常用联系人的示意图。应理解,第一阈值和第二阈值可以相同,也可以不相同,第一阈值和第二阈值都可以由用户自行设定;同一个号码可以是已经保存在第一终端上的联系人中的号码,也可以是未保存的陌生号码。 As shown in FIG. 3H, a schematic diagram of acquiring the latest frequently used contacts for the first terminal is shown. As shown in FIG. 3I, a schematic diagram of obtaining the latest infrequent contacts for the first terminal is shown. It should be understood that the first threshold and the second threshold may be the same or different, and the first threshold and the second threshold may be set by the user; the same number may be the contact that has been saved on the first terminal. The number can also be an unsaved strange number.
(2)第一终端通过云服务器来获取最新常用联系人和/或最新不常用联系人,详见下述所示:(2) The first terminal obtains the latest frequently used contacts and/or the latest unused contacts through the cloud server, as shown below:
第一终端可以根据预置创建规则,获取当前预置时间常用联系人和/或当前预置时间不常用联系人;第一终端将当前预置时间常用联系人和/或当前预置时间不常用联系人上传至云服务器;云服务器根据已上传的当前预置时间常用联系人和/或当前预置时间不常用联系人、预置运算规则以及本地联系人,分析计算出最新常用联系人和/或最新不常用联系人。应理解,假设预置时间为一个月,那么,当前预置时间就理解为最近一个月,也可以称为当月。如图3J所示,为第一终端上传云服务器最新常用联系人的示意图。如图3K所示,为第一终端上传云服务器最新不常用联系人的示意图。The first terminal may obtain the current preset time common contact and/or the current preset time unusable contact according to the preset creation rule; the first terminal may not use the current preset time common contact and/or the current preset time. The contact is uploaded to the cloud server; the cloud server analyzes and calculates the latest common contacts and/or according to the currently preset preset contacts and/or current preset time infrequent contacts, preset calculation rules, and local contacts that have been uploaded. Or the latest unused contacts. It should be understood that, assuming that the preset time is one month, the current preset time is understood as the most recent month, and may also be referred to as the current month. As shown in FIG. 3J, a schematic diagram of uploading the latest common contacts of the cloud server for the first terminal is shown. As shown in FIG. 3K, a schematic diagram of uploading the latest unused contacts of the cloud server for the first terminal is shown.
示例性的,第一终端可以按月创建当月常用联系人和/或当月不常用联系人,当第一终端连接无线保真(Wireless Fidelity,WIFI)、或连接3G/4G/5G等网络,并且中央处理器(central processing unit,CPU)占用处于空闲状态时,上传当月常用联系人和/或当月不常用联系人至云服务器。应理解,预置运算规则可以为当月常用联系人和云服务器保存的第一终端之前上传的常用联系人取并集或者取交集,或者,可以为当月不常用联系人和云服务器保存的第一终端之前上传的不常用联系人取并集或者取交集。云服务器得到最新常用联系人和/或最新不常用联系人时,将最新常用联系人和/或最新不常用联系人发送给第一终端。Exemplarily, the first terminal may create a monthly contact for the month and/or a contact that is not commonly used in the current month, when the first terminal is connected to a wireless fidelity (WIFI), or a network connected to the 3G/4G/5G, and When the central processing unit (CPU) is in an idle state, upload the frequently used contacts of the current month and/or the contacts that are not commonly used in the current month to the cloud server. It should be understood that the preset operation rule may take the union or the intersection of the common contacts uploaded before the first terminal saved by the common contact and the cloud server in the current month, or may be the first saved for the contacts and the cloud server that are not commonly used in the current month. The infrequent contacts uploaded by the terminal before the collection take the union or take the intersection. When the cloud server obtains the latest frequently used contacts and/or the latest unused contacts, the latest frequently used contacts and/or the latest unused contacts are sent to the first terminal.
进一步的,1、云服务器按照第一预置运算规则,计算得到最新常用联系人,第一预置运算规则具体可以是对当月常用联系人和云服务器保存的之前上传的常用联系人取并集或者取交集。和/或,云服务器按照第二预置运算规则,计算得到最新不常用联系人,第二预置运算规则具体可以是对当月不常用联系人和云服务器保存的第一终端之前上传的不常用联系人取并集或者取交集。Further, the cloud server calculates the latest common contact according to the first preset operation rule, and the first preset operation rule may be a union of the frequently used contacts uploaded by the common contacts and the cloud server saved in the current month. Or take the intersection. And/or, the cloud server calculates the latest infrequently used contacts according to the second preset operation rule, and the second preset operation rule may be not commonly used for uploading the first terminal saved by the contact and the cloud server in the current month. The contact takes the union or takes the intersection.
2、云服务器按照第一预置运算规则,计算得到最新常用联系人;再根据第三预置运算规则,计算出得到最新不常用联系人,第三预置运算规则具体可以为云服务器对最新常用联系人和保存的第一终端之前上传的本地联系人取补集。2. The cloud server calculates the latest common contact according to the first preset operation rule; and then calculates the latest unused contact according to the third preset operation rule, and the third preset operation rule may be the latest for the cloud server. The favorite contact and the saved local contact replenishment set previously saved by the first terminal.
3、云服务器按照第二预置运算规则,计算得到最新不常用联系人;再根据第四预置运算规则,计算得到最新常用联系人,第四预置运算规则具体可以为云服务器对最新不常用联系人和保存的第一终端之前上传的本地联系人取补集。3. The cloud server calculates the latest unusable contacts according to the second preset operation rule; and then calculates the latest common contacts according to the fourth preset operation rule, and the fourth preset operation rule may specifically be the cloud server to the latest one. The favorite contact and the saved local contact replenishment set previously saved by the first terminal.
在云服务器的参与中,可选择的,云服务器可以过滤出云服务器常用联系人中存在,但是第一终端上传的当月常用联系人中不存在的联系人,如果该联系人连续三个月(用户可自行设置时间)在此过滤集中,则云服务器在生成最新常用联系人时,可以在最新常用联系人中将该联系人删除。可选择的,云服务器可以记录陌生号码,即如果同一个陌生号码连续三个月(用户可自行设置时间)出现在第一终端的当月常用联系人中,云服务器在生成最新常用联系人时,同时向第一终端发送提示信息,如果第一终端电话薄中未保存该陌生号码,提示用户是否保存,用户点击一键保存后,自动插入本地电话薄中并上传保存至云服务器的联系人。该提示信息可以为“136-1234-0000为频繁通信号码,请确认是否需要新建联系人?”如图3L所示,为第一终端上显示新建联系人的提示信息的示意图。 In the participation of the cloud server, optionally, the cloud server may filter out the contacts that exist in the cloud server common contacts, but the first terminal uploads the common contacts in the current month, if the contact is for three consecutive months ( The user can set the time by himself. In this filtering set, the cloud server can delete the contact in the latest frequently used contact when generating the latest frequently used contact. Alternatively, the cloud server can record a strange number, that is, if the same strange number is displayed for three consecutive months (the user can set the time) in the common contacts of the first terminal of the current month, when the cloud server generates the latest frequently used contacts, At the same time, the prompt message is sent to the first terminal. If the strange number is not saved in the first terminal phone book, the user is prompted to save. After the user clicks a button to save, the user automatically inserts the local phone book and uploads the contact saved to the cloud server. The prompt information may be “136-1234-0000 is a frequent communication number, please confirm whether a new contact needs to be created?” as shown in FIG. 3L, which is a schematic diagram showing prompt information of a newly created contact on the first terminal.
应理解,最新不常用联系人和最新常用联系人中也可以包括没有保存在本地联系人中的通信号码,该通信号码可以指手机号码、电话号码等联系号码。It should be understood that the latest unused contacts and the latest frequently used contacts may also include a communication number that is not stored in the local contact, and the communication number may refer to a contact number such as a mobile phone number and a phone number.
203、第一终端向云服务器发送第一名片请求,该第一名片请求用于获取本地联系人中第一联系人的最新名片。203. The first terminal sends a first business card request to the cloud server, where the first business card request is used to obtain the latest business card of the first contact in the local contact.
在本申请实施例中,第一终端向服务器发送第一名片请求,该第一名片请求用于获取本地联系人中第一联系人的最新名片,最新名片为服务器从第二终端获取的名片,第二终端为第一联系人的终端,该最新名片可以包括用户名、通信号码。可选择的,第一名片请求中可以包括第一联系人的用户名,第一终端的用户名。其中,所述第一联系人可以为在预置时长内,与第一终端发生的通信次数少于第一阈值的联系人。第一联系人也可以为不常用联系人群组中的联系人,不常用联系人群组为服务器确定的第一常用联系人和第二常用联系人的并集或交集,第一常用联系人为所述第一终端向所述服务器发送的在预置时长内,与第一终端发生的通信次数少于第一阈值的联系人,第二不常用联系人为服务器保存的在接收第一不常用联系人之前的不常用联系人。In the embodiment of the present application, the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal. The second terminal is a terminal of the first contact, and the latest business card may include a username and a communication number. Optionally, the first business card request may include a username of the first contact, and a username of the first terminal. The first contact may be a contact that has less than the first threshold for the number of communications with the first terminal within a preset duration. The first contact may also be a contact in an infrequently used contact group, and the unused contact group is a union or intersection of the first common contact and the second common contact determined by the server, and the first common contact is The first terminal sends to the server, within a preset duration, the number of communications with the first terminal is less than the first threshold, and the second less frequently used contact is saved by the server. People don't use contacts before.
第一名片请求也可以称为第一联系人的名片请求。若是第一终端获取的最新不常用联系人,用户A可以对其进行确认,确认后向云服务器发送第一联系人的名片请求。例如,最新不常用为用户E和用户F,第一终端可以向云服务器发送查询用户E和用户F中的至少一个联系人的名片请求。如图3M所示,为第一终端发送第一联系人的名片请求的示意图。其中,用户A可以选定整个最新不常用联系人发送查询第一联系人的名片请求,也可以在选定最新不常用联系人中的至少一个联系人发送第一联系人的名片请求。The first business card request may also be referred to as a business card request of the first contact. If it is the latest unused contact obtained by the first terminal, the user A can confirm it, and send the first contact's business card request to the cloud server after confirming. For example, the user terminal E and the user F are not commonly used in the latest, and the first terminal may send a business card request for querying at least one of the user E and the user F to the cloud server. As shown in FIG. 3M, a schematic diagram of a business card request of a first contact is sent for the first terminal. The user A may select the latest latest infrequent contact to send a business card request for querying the first contact, or may send the first contact's business card request to at least one of the latest unused contacts.
需要说明的是,第一终端发送的第一联系人的名片请求中,还可以携带第一用户(用户A)的名称,用于指示使用第二终端的第二用户(用户B)可以知道是谁请求他的本机名片,因为对任何一个用户来说,不是任意联系人的名片请求都会发送自己的本机名片,如果知道是谁请求自己的本机名片,可以保障用户信息的安全。如果第一联系人的名片请求中,携带了用户A的信息,那么,用户B就可以知道是用户A在请求他的联系人的名片,用户B若认识用户A,或者,认为用户A可靠,则可以选择上传用户B名片;如果不认识,用户B可以选择不上传用户B名片。可选择的,用户A还可以在最新不常用联系人或者最新常用联系人中删除某些不想要的联系人。It should be noted that, in the business card request of the first contact sent by the first terminal, the name of the first user (user A) may also be carried, indicating that the second user (user B) using the second terminal may know that Who requests his local business card, because for any user, not the business card request of any contact will send his own business card, if you know who is requesting your own business card, you can protect the security of user information. If the information of the user A is carried in the business card request of the first contact, the user B can know that the user A is requesting the business card of the contact, and if the user B knows the user A, or considers that the user A is reliable, You can choose to upload the user B business card; if you don't know, user B can choose not to upload the user B business card. Alternatively, User A can also delete some unwanted contacts in the latest unused contacts or the latest frequently used contacts.
应理解,对于最新不常用联系人中的联系人,如果为云服务用户,则可以通过云服务器来获取其联系人的名片,也可以通过短信、彩信、微信、无线局域网(Wireless Local Area Networks,WLAN)直连、蓝牙共享等方式来获取其联系人的名片。如果不是云服务用户,则不能通过云服务器来获取其联系人的名片,可以用短消息、微信、WIFI、蓝牙共享等方式来获取其联系人的名片。It should be understood that for the contacts in the latest unusable contacts, if the user is a cloud service user, the business card of the contact person can be obtained through the cloud server, or through SMS, MMS, WeChat, or Wireless Local Area Networks (Wireless Local Area Networks, WLAN) Direct connection, Bluetooth sharing, etc. to obtain the business card of their contact. If it is not a cloud service user, you cannot obtain the business card of its contact through the cloud server. You can use short message, WeChat, WIFI, Bluetooth sharing, etc. to obtain the business card of its contact.
204、云服务器向第二终端发送第一名片请求。204. The cloud server sends a first business card request to the second terminal.
在本申请实施例中,云服务器收到第一终端发送的第一名片请求后,第一名片请求可以为最新不常用联系人中的至少一个联系人的名片请求,云服务器根据保存的联系人与唯一标识的关系映射表,查询出最新不常用联系人中的至少一个联系人对应的唯一标识。然后,云服务器向登录这些唯一标识的第二终端发送第一名片请求。以用户E为例进行说明, 云服务器收到查询用户E的名片请求后,根据保存的联系人与唯一标识的关系映射表(上述表1),查询出用户E的唯一标识为“yun005”,云服务器向使用第二终端登录唯一标识为“yun005”的用户E发送名片请求。以用户F为例进行说明,云服务器收到查询用户F的名片请求后,根据保存的联系人与唯一标识的关系映射表(上述表1),查询出用户F的唯一标识为“yun006”,云服务器向使用第二终端登录唯一标识为“yun006”的用户F发送名片请求。In the embodiment of the present application, after the cloud server receives the first business card request sent by the first terminal, the first business card request may be a business card request of at least one of the latest unused contacts, and the cloud server according to the saved contact And a unique identifier relationship mapping table, querying a unique identifier corresponding to at least one of the latest unused contacts. Then, the cloud server sends a first business card request to the second terminal that logs in to the unique identifiers. Take user E as an example for explanation. After receiving the business card request of the user E, the cloud server searches for the relationship between the saved contact and the unique identifier (Table 1 above), and finds that the unique identifier of the user E is "yun005", and the cloud server logs in to the second terminal. User E, which is uniquely identified as "yun005", sends a business card request. The user F is used as an example. After receiving the business card request of the user F, the cloud server searches for the unique identifier of the user F as "yun006" according to the relationship mapping table between the saved contact and the unique identifier (Table 1 above). The cloud server sends a business card request to the user F who is uniquely identified as "yun006" by using the second terminal.
需要说明的是,第一名片请求可以携带第一终端的用户信息,用于指示使用第二终端的用户可以知道是谁请求他的本机名片。可选择的,云服务器本身也存储云服务用户的名片,可以直接查询至少一个最新不常用联系人的名片,然后向第一终端反馈至少一个最新不常用联系人的名片。It should be noted that the first business card request may carry user information of the first terminal, and is used to indicate that the user using the second terminal can know who requested his local business card. Optionally, the cloud server itself also stores the business card of the cloud service user, and can directly query the business card of at least one latest unused contact, and then feed back the business card of at least one latest unused contact to the first terminal.
205、第二终端向云服务器发送本机名片。205. The second terminal sends the local business card to the cloud server.
在本申请实施例中,第二终端接收第一名片请求后,可以提示第二终端的第二用户是否上传本机名片,也可称为本机最新名片、本机名片。示例性的,用户E在第二终端上以“yun005”登录,第二终端接收名片请求后,根据名片请求提示用户E是否向云服务器上传用户E名片。用户F在第二终端上以“yun006”登录,第二终端接收名片请求后,根据名片请求提示用户F是否向云服务器上传用户F名片。如图3N所示,为第二终端显示是否上传本机名片的提示信息的示意图。In the embodiment of the present application, after receiving the first business card request, the second terminal may prompt the second user of the second terminal to upload the local business card, which may also be referred to as the local business card and the local business card. Exemplarily, the user E logs in as "yun005" on the second terminal. After receiving the business card request, the second terminal prompts the user E to upload the user E business card to the cloud server according to the business card request. The user F logs in with the "yun006" on the second terminal. After receiving the business card request, the second terminal prompts the user F to upload the user F business card to the cloud server according to the business card request. As shown in FIG. 3N, a schematic diagram of displaying prompt information for uploading a local business card for the second terminal is shown.
应理解,该提示信息可以为是否上传第二联系人的名片至云服务器或者其他的提示信息。例如在第二终端上显示的提示信息可以为“用户A请求本机名片,请确定是否上传云服务器以告知用户A?”也可以是其他来指示上传本机名片的提示信息,而且,关于在第二终端显示提示信息的方式可以有多种,通知栏的方式,悬浮的方式、滑入的方式、跳转的方式等,不做具体限定。可选择的,在终端显示提示信息的时候,还可以对应的进行语音播放,以防用户在终端锁屏时,或者不方便看显示屏时,或者其他情况时,用户可以根据语音播放的内容来判断该事件的优先级,及时反馈请求结果。如果用户E和用户F选择“是”,则指示第二终端向云服务器上传本机名片。示例性的,这里的第二终端指的是用户E对应的终端和用户F对应的终端,用户E对应终端的本机名片指的是用户E名片,用户F对应终端的本机名片指的是用户F名片。It should be understood that the prompt information may be whether to upload the business card of the second contact to the cloud server or other prompt information. For example, the prompt information displayed on the second terminal may be “User A requests the local business card, please determine whether to upload the cloud server to inform the user A?”, or other prompt information indicating that the local business card is uploaded, and The manner in which the second terminal displays the prompt information may be various, the manner of the notification bar, the manner of suspension, the manner of sliding in, the manner of jumping, and the like, and are not specifically limited. Optionally, when the terminal displays the prompt information, the corresponding voice play may also be performed, in case the user locks the screen when the terminal is locked, or when the display screen is inconvenient, or other circumstances, the user may Determine the priority of the event and feedback the result of the request in time. If the user E and the user F select "Yes", the second terminal is instructed to upload the local business card to the cloud server. Exemplarily, the second terminal herein refers to the terminal corresponding to the user E and the terminal corresponding to the user F, and the local business card corresponding to the user E of the user E refers to the user E business card, and the local business card corresponding to the terminal of the user F refers to User F business card.
206、云服务器向第一终端发送第二终端的本机名片。206. The cloud server sends the local business card of the second terminal to the first terminal.
在本申请实施例中,云服务器接收第二终端发送的本机名片后,可以直接将第二终端的本机名片返回给第一终端,也可以是云服务器根据存储的联系人的名片和第二终端的本机名片确定是否有内容更新,如果有更新,云服务器可以更新存储的第二终端的本机名片,将已更新的第二终端的本机名片返回给第一终端。示例性的,云服务器将用户E名片和用户F名片返回给第一终端。In the embodiment of the present application, after receiving the local business card sent by the second terminal, the cloud server may directly return the local business card of the second terminal to the first terminal, or may be the business card and the cloud server according to the stored contact. The local business card of the second terminal determines whether there is content update. If there is an update, the cloud server may update the stored local business card of the second terminal, and return the updated local business card of the second terminal to the first terminal. Exemplarily, the cloud server returns the user E business card and the user F business card to the first terminal.
207、第一终端根据第二终端的本机名片,更新最新不常用联系人中至少一个联系人的历史名片。207. The first terminal updates, according to the local business card of the second terminal, a historical business card of at least one of the latest unused contacts.
在本申请实施例中,第一终端根据第一联系人的本机名片,更新最新不常用联系人中至少一个联系人的历史名片。示例性的,若第一终端保存的用户E历史名片、用户F历史名 片和云服务器反馈的用户E本机名片、用户F本机名片相同,则不更新,若不相同,则更新为云服务器反馈的用户E本机名片、用户F本机名片,实现第一终端本地联系人中的名片及时更新的目的。如图3O所示,为第一终端更新本地联系人的名片一个示意图。图3O是以用户E名片为例进行说明的,对于用户F也是同样的处理方式,此处不再赘述,也可以是云服务器一起发送用户E本机名片和用户F本机名片给第一终端。In the embodiment of the present application, the first terminal updates the historical business card of at least one of the latest unused contacts according to the local business card of the first contact. Exemplarily, if the first terminal saves the user E history card, the user F history name If the user E is not the same as the user's local business card and the user's F business card, the user's E business card and the user's F business card are fed back to the cloud server to implement the first terminal. The purpose of the business card in the local contact is updated in time. As shown in FIG. 3O, a schematic diagram of updating the business card of the local contact for the first terminal is shown. FIG. 3O illustrates the user E card as an example, and the same processing method is used for the user F. The details are not described herein. The cloud server may also send the user E local business card and the user F local business card to the first terminal. .
在本申请实施例中,本申请实施例可以获取最新常用联系人和/或最新不常用联系人,还可以通过云服务器发送第一联系人的名片请求,第一联系人的名片请求为至少一个最新不常用联系人的名片请求,云服务器可以向第一联系人的第二终端发送第一名片请求,第二终端可以反馈本机名片给云服务器,云服务器再反馈给第一终端。达到云服务器优化第一终端的本地联系人的名片目的,可以及时更新用户本地电话薄中各联系人的名片,确保用户本地电话薄中的联系人的名片为最新状态,对用户能够及时联系到不常用联系人起到关键作用。本申请实施例还可以借助云服务器实现终端与云服务器共享数据,可增强终端特性竞争力,改善终端易用性,提升用户体验。In the embodiment of the present application, the embodiment of the present application may obtain the latest common contact and/or the latest unused contact, and may also send a business card request of the first contact through the cloud server, where the first contact's business card request is at least one. The cloud server may send a first business card request to the second terminal of the first contact, and the second terminal may feed back the local business card to the cloud server, and the cloud server feeds back to the first terminal. To achieve the purpose of the business card of the local contact of the first terminal of the cloud server, the business card of each contact in the user's local phone book can be updated in time to ensure that the business card of the contact in the user's local phone book is up-to-date, and the user can be contacted in time. Infrequently used contacts play a key role. The embodiment of the present application can also implement the data sharing between the terminal and the cloud server by using the cloud server, which can enhance the competitiveness of the terminal, improve the usability of the terminal, and improve the user experience.
实施例二、终端与云服务器共享名片信息更新Embodiment 2: The terminal and the cloud server share the business card information update
实施场景1.终端主动上传本机名片至云服务器,如图4所示,为本申请实施例中更新联系人的名片的方法的一个实施例示意图。Implementation scenario 1. The terminal actively uploads the local business card to the cloud server, as shown in FIG. 4 , which is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
401、若第一终端的本机名片发生更新,第一终端向云服务器发送已更新的本机名片。401. If the local business card of the first terminal is updated, the first terminal sends the updated local business card to the cloud server.
在本申请实施例中,以使用第一终端的第一用户(用户A)为例进行说明,用户A名片由上述图3B所示更新为如图5A所示,为第一终端将已更新的本机名片上传云服务器的示意图。在上述图3B所示中,用户A的手机号码为:18312345678;在图5A所示中,用户A的手机号码变为:18356781234,办公地址和邮箱地址未变,办公地址:深圳市罗湖区国贸大厦,邮箱地址:123456789@qq.com。应理解,用户A的云账号不变。用户A名片的更新内容还可以是座机号码、家庭地址、办公地址、昵称、头像、邮箱地址等信息。第一终端将已更新的第一联系人的名片上传至云服务器时,可以在登录云账号的界面上上传,也可以点击联系人的名片旁边的云标识进行上传,还可以是其他的上传方式,具体不做限定。In the embodiment of the present application, the first user (user A) using the first terminal is taken as an example. The user A business card is updated as shown in FIG. 3B above, as shown in FIG. 5A, and the first terminal is updated. A schematic diagram of uploading a local business card to a cloud server. In the above FIG. 3B, the mobile phone number of user A is: 18312345678; in FIG. 5A, the mobile phone number of user A becomes: 18735778234, the office address and the email address have not changed, and the office address: Shenzhen Luohu District International Trade Center Building, email address: 123456789@qq.com. It should be understood that User A's cloud account does not change. The updated content of the user A business card may also be information such as a landline number, a home address, an office address, a nickname, an avatar, an email address, and the like. When the first terminal uploads the updated first contact's business card to the cloud server, it may upload on the login cloud account interface, or click the cloud identifier next to the contact's business card to upload, or other uploading methods. The specific is not limited.
用户A名片发生更新的方式,可以是自动更新,也可以是手动更新。自动更新:第一终端插入新的用户身份识别(subscriber identification module,SIM)卡(机卡配对发生变化时),获取新插入SIM卡的号码,用户界面(user interface,UI)上弹出是否更新用户A名片的提示框,用户选择保存后,UI上还可以弹出是否上传用户A最新名片(已更新的用户A名片)至云服务器。手动更新:手动修改用户A名片中某一信息,用户选择保存后,UI上呈现提示信息,询问用户是否上传用户A最新名片至云服务器。The way in which the user A business card is updated may be an automatic update or a manual update. Automatic update: The first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), obtains the number of the newly inserted SIM card, and pops up the user interface (UI) to update the user. The prompt box of the A business card, after the user selects to save, the UI can also pop up whether to upload the user A latest business card (the updated user A business card) to the cloud server. Manual update: Manually modify a certain information in the user's A business card. After the user chooses to save, the UI displays a prompt message asking the user whether to upload the latest business card of User A to the cloud server.
402、云服务器向第一终端发送第一终端的本地联系人。402. The cloud server sends a local contact of the first terminal to the first terminal.
在本申请实施例中,云服务器接收到已更新的第一用户(用户A)名片后,分析更新内容,并更新在云服务器上存储的用户A名片。云服务器还可以根据用户A的云账号yun001,在存储的数据中查找出云账号为“yun001”对应的本地联系人,云服务器将这个本地联系人发送给第一终端。如图5B所示,为第一终端显示云服务器发送的本地联系人的示意图。In the embodiment of the present application, after receiving the updated first user (user A) business card, the cloud server analyzes the updated content and updates the user A business card stored on the cloud server. The cloud server can also find the local contact corresponding to the cloud account "yun001" in the stored data according to the cloud account yun001 of the user A, and the cloud server sends the local contact to the first terminal. As shown in FIG. 5B, a schematic diagram of a local contact sent by the cloud server is displayed for the first terminal.
需要说明的是,第一联系人可以是第一终端上传的关于用户A更新过的本地联系人, 在第一联系人中的联系人,有些是云服务用户,有些不是云服务用户,关于为云服务用户的联系人,可以有一个标识、文字或者其他的提示信息,用于指示该联系人为云服务用户。It should be noted that the first contact may be a local contact uploaded by the first terminal and updated by the user A. The contacts in the first contact, some are cloud service users, some are not cloud service users, and the contact person for the cloud service user may have an identifier, a text or other prompt information for indicating that the contact is a cloud. Service user.
403、第一终端通过云服务器向第二终端发送已更新的本机名片。403. The first terminal sends the updated local business card to the second terminal by using the cloud server.
在本申请实施例中,第一终端接收云服务器发送的本地联系人后,第一终端可以过滤出没有在云服务器发送的本地联系人里的联系人,选择其它方式通知这些联系人,例如短信、彩信、微信、WLAN直连、蓝牙共享等方式。如图5C所示,为第一终端上过滤出的不在本地联系人中的其他联系人的示意图。在本地联系人中的联系人,可以选择云服务器的方式通知这些联系人,也可以通过短信、彩信、微信、无线局域网(Wireless Local Area Networks,WLAN)直连、蓝牙共享等方式通知这些联系人。如图5D所示,为第一终端上过滤出的在本地联系人中的联系人的示意图。In the embodiment of the present application, after the first terminal receives the local contact sent by the cloud server, the first terminal may filter the contacts in the local contact that are not sent by the cloud server, and select other manners to notify the contact, such as a short message. , MMS, WeChat, WLAN direct connection, Bluetooth sharing, etc. As shown in FIG. 5C, it is a schematic diagram of other contacts that are filtered out on the first terminal and are not in the local contact. The contacts in the local contacts can be notified by selecting the cloud server, or they can be notified by SMS, MMS, WeChat, Wireless Local Area Networks (WLAN), Bluetooth sharing, etc. . As shown in FIG. 5D, it is a schematic diagram of contacts in the local contacts filtered on the first terminal.
需要说明的是,通过云服务器向第二终端发送第一终端已更新的本机名片时,云服务器需要先根据联系人与唯一标识的映射关系表(如上述表1),查询出与第一终端的本地联系人对应的目标唯一标识,然后向登录目标唯一标识的第二终端发送已更新的本机名片。如图5E所示,为第一终端向不在本地联系人中的其他联系人发送已更新的本机名片的示意图。如图5F所示,为第一终端向在本地联系人的联系人发送已更新的本机名片的示意图。It should be noted that, when the cloud server sends the local business card that has been updated by the first terminal to the second terminal, the cloud server needs to first query and output the first business card according to the mapping relationship between the contact and the unique identifier (such as Table 1 above). The target unique identifier corresponding to the local contact of the terminal, and then the updated local business card is sent to the second terminal uniquely identified by the login target. As shown in FIG. 5E, a schematic diagram of the updated local business card is sent to the other contacts that are not in the local contact for the first terminal. As shown in FIG. 5F, a schematic diagram of the updated local business card is sent to the contact of the local contact for the first terminal.
可选择的,针对本地联系人中为云服务用户的联系人,可以通过云服务器向其发送已更新的本机名片,也可以通过短消息(短信、彩信)、微信、直连、蓝牙共享等方式向其发送已更新本机名片;针对本地联系人中不是云服务用户的联系人,可以通过短消息(短信、彩信)、微信、WLAN直连、蓝牙共享等方式向其发送已更新本机名片。应理解,对于为云服务用户的联系人,可以是通过特定标识来指示,例如云标识,也可以是通过文字、语音等其他方式来提示。Optionally, for the contact of the cloud service user in the local contact, the updated local business card can be sent to the cloud server through the cloud server, or through short messages (SMS, MMS), WeChat, direct connection, Bluetooth sharing, etc. The method sends the updated local business card to the contact; for the contact who is not the cloud service user in the local contact, the updated local machine can be sent to the short message (SMS, MMS), WeChat, WLAN direct connection, Bluetooth sharing, etc. business card. It should be understood that the contact for the cloud service user may be indicated by a specific identifier, such as a cloud identifier, or may be prompted by other means such as text, voice, or the like.
可选择的,如果因为第一终端的SIM卡发生变化,导致第一终端的本机名片发生更新,若本地联系人保存在第一终端本地,则第一终端可以向本地联系人发送已更新的本机名片,若是本地联系人保存在之前的SIM卡上,则第一终端可以从云服务器获取本地联系人,再对其进行发送已更新本机名片。Alternatively, if the local business card of the first terminal is updated because the SIM card of the first terminal changes, if the local contact is saved locally at the first terminal, the first terminal may send the updated update to the local contact. The local business card, if the local contact is saved on the previous SIM card, the first terminal can obtain the local contact from the cloud server, and then send the updated local business card.
404、第二终端接收并更新保存的第一终端的历史名片。404. The second terminal receives and updates the saved historical business card of the first terminal.
在本申请实施例中,第二终端可以指一个终端,也可以指多个终端,第二终端的数量可以与第一终端的本地联系人的数量对应。第二终端接收已更新的第一终端的本机名片,在第二终端的UI界面可以有一个提示信息,选择是否更新本地联系人的名片。示例性的,如图5G所示,为第二终端显示接收第一终端的已更新的本机名片并选择是否保存到第二终端的本地联系人的示意图。In the embodiment of the present application, the second terminal may refer to one terminal or multiple terminals, and the number of the second terminals may correspond to the number of local contacts of the first terminal. The second terminal receives the updated local business card of the first terminal, and the UI interface of the second terminal may have a prompt message for selecting whether to update the business card of the local contact. Exemplarily, as shown in FIG. 5G, a schematic diagram is displayed for the second terminal to receive the updated local business card of the first terminal and select whether to save to the local contact of the second terminal.
应理解,第一终端上保存有第二终端的本机名片,但是第二终端上不一定会保存第一终端的本机名片。示例性的,第一终端上对应的用户为用户A,第二终端对应的用户为用户B,若用户B的本地联系人中未保存用户A名片,则第二终端接收已更新的用户A名片时,用户B可以选择是否保存,若用户B的本地联系人中有保存用户A名片,则第二终端接收已更新的用户A名片时,用户B可以选择是否更新。It should be understood that the local business card of the second terminal is saved on the first terminal, but the local business card of the first terminal may not be saved on the second terminal. Exemplarily, the corresponding user on the first terminal is user A, and the user corresponding to the second terminal is user B. If the user A business card is not saved in the local contact of user B, the second terminal receives the updated user A business card. When the user B's local contact has the user A business card saved, the second terminal receives the updated user A business card, and the user B can select whether to update.
在本申请实施例中,当第一终端本机名片发生更新时,第一终端可以向云服务器上传 已更新的本机名片,云服务器可以更新存储的第一终端的本机名片,云服务器还可以向第一终端发送其本地联系人,然后,第一终端可以通过云服务器向本地联系人中的联系人发送已更新的本机名片,第二终端接收第一终端已更新的本机名片,可以选择是否更新第二终端的本地联系人。本申请实施例可以借助终端与云服务器数据共享,达到了及时分享本机名片的目的,解决了由于用户更换手机号,导致对方无法联系到本机用户的问题,本机发生更新时,可以主动向云服务器上传已更新本机名片,云服务器将该用户的本地联系人发送给该用户的终端,该用户确认后,可以选择是否通知已更新本机名片给本地联系人中的联系人。本地联系人中的联系人可以按照已更新名片进行保存,可以解决手动新建联系人操作复杂的问题,对方忘记保存我的名片问题。本申请实施可增强终端特性竞争力,改善终端易用性,提升用户体验。In the embodiment of the present application, when the first terminal local business card is updated, the first terminal may upload to the cloud server. The updated local business card, the cloud server may update the stored local business card of the first terminal, and the cloud server may also send its local contact to the first terminal, and then the first terminal may pass through the cloud server to the local contact The contact sends the updated local business card, and the second terminal receives the local business card that has been updated by the first terminal, and can select whether to update the local contact of the second terminal. The embodiment of the present application can share the data of the terminal with the cloud server by using the terminal, and achieve the purpose of sharing the business card in time, and solve the problem that the user cannot contact the local user because the user replaces the mobile phone number, and the device can take the initiative when the device is updated. The updated local business card is uploaded to the cloud server, and the cloud server sends the local contact of the user to the user's terminal. After the user confirms, the user can select whether to notify the updated local business card to the local contact. The contacts in the local contact can be saved according to the updated business card, which can solve the complicated problem of manually creating a new contact, and the other party forgets to save my business card problem. The implementation of the application can enhance the competitiveness of the terminal characteristics, improve the usability of the terminal, and improve the user experience.
实施场景2.终端响应云服务器请求上传本机名片,如图6所示,为本申请实施例中终端更新联系人的名片的方法的一个实施例示意图。Implementation scenario 2. The terminal responds to the request of the cloud server to upload the local business card. As shown in FIG. 6 , it is a schematic diagram of an embodiment of a method for the terminal to update the business card of the contact in the embodiment of the present application.
601、第一终端向第二终端发送通信请求,请求失败,提示第一用户是否获取第二终端的最新名片。601. The first terminal sends a communication request to the second terminal, and the request fails, and prompts the first user whether to obtain the latest business card of the second terminal.
在本申请实施例中,以使用第一终端的第一用户(用户A),使用第二终端的第二用户(用户B)为例进行说明。为第一手机号码的第一终端向为第二手机号码的第二终端发送呼叫请求,呼叫失败,或者,为第一手机号码的第一终端向为第二手机号码的第二终端发送短信或彩信,发送失败。示例性的,用户A的手机号码为18312345678,第一终端上保存的本地联系人中用户B的手机号码为13500001234,用户A使用第一终端为18312345678的手机号码向用户B使用第二终端为13500001234的手机号码发送呼叫请求,第一终端提示“您呼叫的号码为空号”、或者“您呼叫的用户已停机”、或者“您呼叫的号码不正确,请查证后再拨”等提示信息,该提示信息可以是在呼叫过程中的语音提示,也可以是语音提示+文字提示,也可以是其他的方式提示,具体不做限定。如图7A所示,为第一终端呼叫第一通信号码的示意图。In the embodiment of the present application, the first user (user A) using the first terminal and the second user (user B) using the second terminal are taken as an example for description. Sending a call request to the second terminal that is the second mobile phone number, the call is failed, or the first terminal that is the first mobile phone number sends a short message to the second terminal that is the second mobile phone number or MMS, failed to send. Exemplarily, the mobile phone number of user A is 18312345678, and the mobile phone number of user B in the local contact saved on the first terminal is 13500001234, and the user A uses the mobile phone number of the first terminal as 18312345678 to use the second terminal of user B as 13500001234. The mobile phone number sends a call request, and the first terminal prompts “The number you call is an empty number”, or “The user you are calling has been stopped”, or “The number you are calling is incorrect, please dial after verification” and other prompt information. The prompt information may be a voice prompt during a call, or may be a voice prompt + a text prompt, or may be prompted by other methods, and is not limited. As shown in FIG. 7A, a schematic diagram of calling the first communication number for the first terminal.
602、第一终端向云服务器发送名片请求。602. The first terminal sends a business card request to the cloud server.
在本申请实施例中,若第一用户在第一终端的提示信息中选择获取通信失败的联系人的名片,则第一终端响应用户的操作,向云服务器发送名片请求;若第一用户在第一终端的提示信息中未选择获取通信失败的联系人的名片,则第一用户可以采用其他方式来获取通信失败的联系人的名片,例如可以采用微信、QQ、或者向共同认识的朋友打电话(短信)等方式来获取通信失败的联系人的名片。如图7B所示,为第一终端向云服务器发送名片请求的示意图。应理解,名片请求携带用户A的信息和用户B的信息,可以是用户A名称,也可以是用户B名称。In the embodiment of the present application, if the first user selects the business card of the contact that failed to communicate in the prompt information of the first terminal, the first terminal sends a business card request to the cloud server in response to the operation of the user; If the information of the contact of the communication failure is not selected in the prompt information of the first terminal, the first user may use other methods to obtain the business card of the contact that failed the communication, for example, using WeChat, QQ, or playing with a friend who is commonly known. A phone (sms) or the like to obtain a business card of a contact that failed communication. As shown in FIG. 7B, a schematic diagram of sending a business card request to the cloud server for the first terminal. It should be understood that the business card request carries the information of the user A and the information of the user B, which may be the user A name or the user B name.
603、云服务器向第二终端发送名片请求。603. The cloud server sends a business card request to the second terminal.
在本申请实施例中,云服务器接收第一终端发送的名片请求后,云服务器根据保存的联系人与唯一标识的映射关系表,查找出第二用户对应的唯一标识为“yun002”,云服务器向使用第二终端登录唯一标识为“yun002”的用户B发送名片请求。In the embodiment of the present application, after the cloud server receives the business card request sent by the first terminal, the cloud server searches for the unique identifier corresponding to the second user as “yun002” according to the mapping relationship between the saved contact and the unique identifier, and the cloud server A business card request is sent to the user B who is logged in with the second terminal and uniquely identified as "yun002".
可选择的,云服务器上也会存储每个联系人的名片,云服务器可以直接在存储的名片 数据中查找,若是云服务器查找到的用户B名片与第一终端保存的用户B名片相同,再向第二终端发送名片请求;若是云服务器查找到的用户B名片与第一终端保存的用户B名片不相同,则可以将云服务器上存储的用户B名片发送给第一终端,第一终端可以使用云服务器发送的用户B名片进行通信,例如:电话、短信等。Alternatively, the cloud server will also store the business card of each contact, and the cloud server can directly store the business card. If the user B business card found by the cloud server is the same as the user B business card saved by the first terminal, the business card request is sent to the second terminal; if the user B business card found by the cloud server and the user B saved by the first terminal If the business card is different, the user B business card stored on the cloud server can be sent to the first terminal, and the first terminal can communicate by using the user B business card sent by the cloud server, for example, a phone, a short message, or the like.
604、第二终端根据名片请求,向云服务器发送本机名片。604. The second terminal sends the local business card to the cloud server according to the business card request.
在本申请实施例中,第二终端接收云服务器发送的名片请求,如图7C所示,为第二终端显示是否上传本机名片的提示信息的示意图。应理解,在图7C所示中,用户B选择“是”这个选项后,第二终端可以直接上传已更新的用户B名片(最新名片)至云服务器。也可以是用户B选择“是”这个选项后,第二终端显示一个确认用户B名片的提示信息,即用户B可以确认下上传的用户B名片的具体信息,若有不准确,用户B还可以及时修改,修改后再上传云服务器。In the embodiment of the present application, the second terminal receives the business card request sent by the cloud server, as shown in FIG. 7C, and displays a schematic diagram of whether the second terminal displays the prompt information of the local business card. It should be understood that, in FIG. 7C, after the user B selects the option “Yes”, the second terminal may directly upload the updated user B business card (the latest business card) to the cloud server. Alternatively, after the user B selects the option “Yes”, the second terminal displays a prompt message for confirming the user B business card, that is, the user B can confirm the specific information of the uploaded user B business card, and if there is inaccuracy, the user B can also Modify it in time, modify it and upload it to the cloud server.
需要说明的是,该名片请求可以携带第一用户的信息,用于使用第二终端的第二用户可以知道是谁请求他的联系人的名片。那么,用户B若是不认识用户A,用户B可以选择不上传用户B名片,这样可以保障用户B的信息安全。It should be noted that the business card request may carry information of the first user, and the second user for using the second terminal may know who requested the business card of his contact. Then, if user B does not know user A, user B can choose not to upload user B business card, which can ensure user B's information security.
在图7C所示中,用户B名片信息为:称呼:用户B,手机号码:13500123456,办公地址:深圳市南山区海岸城。第二用户的手机号码已更新为“13500123456”,而不是之前的“13500001234”了。In FIG. 7C, the user B business card information is: title: user B, mobile phone number: 13500123456, office address: Shenzhen Nanshan District Coastal City. The second user's mobile number has been updated to "13500123456" instead of the previous "13500001234".
605、云服务器向第一终端发送第二终端已更新的本机名片。605. The cloud server sends, to the first terminal, the local business card that the second terminal has updated.
在本申请实施例中,云服务器接收第二终端发送的已更新的本机名片后,向第一终端发送已更新的第二用户(用户B)名片,同时,云服务器也可以更新存储在云服务器上的用户B名片。可选择的,云服务器更新用户B名片后,可以向用户B的云账号“yun002”获取用户B的本地联系人,云服务器可以向第二终端的本地联系人发送已更新的用户B名片。In the embodiment of the present application, after receiving the updated local business card sent by the second terminal, the cloud server sends the updated second user (user B) business card to the first terminal, and the cloud server may also be updated and stored in the cloud. User B business card on the server. Optionally, after the cloud server updates the user B business card, the cloud server “yun002” of the user B may obtain the local contact of the user B, and the cloud server may send the updated user B business card to the local contact of the second terminal.
606、第一终端根据第二终端已更新的本机名片,向第二终端发送通信请求。606. The first terminal sends a communication request to the second terminal according to the local business card that has been updated by the second terminal.
在本申请实施例中,第一终端接收云服务器发送的第二终端的已更新的本机名片,如图7D所示,为第一终端接收第二终端的已更新的本机名片的示意图。可选择的,第一终端可以更新本地保存的第二终端对应的本地联系人中的名片。第一终端可以根据已更新的本机名片,向第二终端发送通信请求。如图7E所示,为第一终端向已更新后的第二用户拨号的示意图。即手机号码为18312345678的第一终端可以向手机号码为13500123456的第二终端发送呼叫请求、短信、彩信等。In the embodiment of the present application, the first terminal receives the updated local business card of the second terminal sent by the cloud server, as shown in FIG. 7D, and is a schematic diagram of the first terminal receiving the updated local business card of the second terminal. Optionally, the first terminal may update the business card in the local contact corresponding to the locally saved second terminal. The first terminal may send a communication request to the second terminal according to the updated local business card. As shown in FIG. 7E, a schematic diagram of dialing the first terminal to the updated second user. That is, the first terminal with the mobile phone number 18312345678 can send a call request, a short message, a multimedia message, and the like to the second terminal with the mobile phone number 13500123456.
在本申请实施例中,借助终端与云服务器数据共享,解决了由于对方更换手机号或保存了错误的对方手机号,导致无法联系到对方的问题,对用户能够及时联系上好友起到关键作用,可以提升用户体验。本申请实施例不局限于呼叫获取新号码的场景,一系列如第一终端A主动向云服务器获取第二终端B的其它数据(位置信息、办公电话、办公地址、电子邮箱等),都在该实施例的保护范围。还可以解决手动新建联系人操作复杂的问题,可增强终端特性竞争力,改善终端易用性,提升用户体验。In the embodiment of the present application, the data sharing between the terminal and the cloud server solves the problem that the other party can change the mobile phone number or save the wrong mobile phone number, which makes it impossible to contact the other party, and plays a key role in timely contacting the user. Can enhance the user experience. The embodiment of the present application is not limited to a scenario in which a new number is acquired by a call, and a series of other data (location information, office phone, office address, e-mail address, etc.) of the second terminal B are actively obtained from the first terminal A to the cloud server. The scope of protection of this embodiment. It can also solve the complicated problem of manually creating new contacts, enhance the competitiveness of the terminal features, improve the usability of the terminal, and improve the user experience.
实施例三、智能化互存联系人的名片,如图8所示,为本申请实施例中更新联系人的名片的方法的一个实施例示意图。 The embodiment of the present invention is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
801、第一终端在本地联系人中新建第二联系人的名片。801. The first terminal creates a business card of the second contact in the local contact.
在本申请实施例中,以使用第一终端的第一用户(用户A),第一终端在本地电话薄(通讯录)中新建某一联系人,该联系人以用户K为例进行说明。如图9A所示,为第一终端新建联系人的示意图;新建用户的联系人的名片中,名称为用户K,手机号码为13587654321。示例性的,用户A在候机、就餐、出游等场合中,有认识新的朋友,可能会存储一下别人的联系方式。In the embodiment of the present application, the first user (user A) of the first terminal is used to create a new contact in the local phone book (address book), and the contact is described by taking the user K as an example. As shown in FIG. 9A, a schematic diagram of creating a new contact for the first terminal; in the business card of the contact of the newly created user, the name is user K, and the mobile phone number is 13587543321. Exemplarily, user A has a new friend in the waiting, dining, traveling, etc., and may store other people's contact information.
802、第一终端向云服务器上传第二联系人的名片。802. The first terminal uploads a business card of the second contact to the cloud server.
在本申请实施例中,第一终端的本地联系人中新建第二联系人的名片后,将第二联系人的名片上传至云服务器。如图9B所示,为第一终端上第二联系人的名片的示意图。即在第一终端的本地保存完成后上传新建联系人的名片(用户K名片)至云服务器,云服务器将第二联系人的名片加入到云联系人中。如果用户K为云服务用户,则云服务器也会对应的保存有用户K和唯一标识的映射关系。In the embodiment of the present application, after the business card of the second contact is newly created in the local contact of the first terminal, the business card of the second contact is uploaded to the cloud server. As shown in FIG. 9B, it is a schematic diagram of a business card of a second contact on the first terminal. That is, after the local save of the first terminal is completed, the business card (user K business card) of the newly created contact is uploaded to the cloud server, and the cloud server adds the business card of the second contact to the cloud contact. If the user K is a cloud service user, the cloud server also stores a mapping relationship between the user K and the unique identifier.
803、第一终端与第二终端发生通信时,向第二终端发送第一终端的本机名片。803. When the first terminal communicates with the second terminal, send the local business card of the first terminal to the second terminal.
在本申请实施例中,以使用第二终端的第二用户(用户K)为例进行说明。用户A使用第一终端与第一终端新建的联系人(用户K)发生通信时,第一终端向用户K使用的第二终端发送第一终端的第一用户(用户A)名片。该通信可以是通话、短信或彩信等。如图9C所示,为第一终端与第二终端发生通信记录的示意图,在图9C所示中,是以发生通话为例进行说明的。In the embodiment of the present application, the second user (user K) using the second terminal is taken as an example for description. When the user A communicates with the newly established contact (user K) of the first terminal, the first terminal sends the first user (user A) business card of the first terminal to the second terminal used by the user K. The communication can be a call, a text message or a multimedia message. As shown in FIG. 9C, a schematic diagram of a communication record between the first terminal and the second terminal is shown in FIG. 9C as an example of occurrence of a call.
可选择的,若第一终端与第二终端发生通信的次数大于阈值,例如大于2次,则第一终端提示用户A是否向用户K发送用户A名片。如果用户A选择通知用户K保存我的联系人的名片,则第一终端向第二终端发送用户A名片。第一终端(用户A)通知第二终端(用户K)的方式可以包括但不限于以下几种实现方式:(1)第一终端借助云服务器向第二终端发送第一终端的本机名片,应理解,用户K为云服务用户;(2)第一终端也可以使用短信、彩信、微信、WLAN直连、蓝牙共享等方式向第二终端发送第一终端的本机名片,具体不做限定。如图9D所示,为第一终端将本机名片向第二终端通知的示意图。Optionally, if the number of times the first terminal communicates with the second terminal is greater than a threshold, for example, greater than 2 times, the first terminal prompts the user A whether to send the user A business card to the user K. If the user A chooses to notify the user K to save the business card of my contact, the first terminal sends the user A business card to the second terminal. The manner in which the first terminal (the user A) notifies the second terminal (the user K) may include, but is not limited to, the following implementation manners: (1) the first terminal sends the local business card of the first terminal to the second terminal by using the cloud server, It should be understood that the user K is a cloud service user; (2) the first terminal may also send the local business card of the first terminal to the second terminal by using a short message, a multimedia message, a WeChat, a WLAN direct connection, or a Bluetooth sharing, etc., which is not limited. . As shown in FIG. 9D, it is a schematic diagram of the first terminal notifying the local business card to the second terminal.
应理解,在选择将用户A名片通知给用户K时,也可以在UI界面不显示提示通知的方式,让用户选择,可以是预置的第一终端默认的通知方式,例如,用户A和用户K都是云服务用户,则第一终端可以将用户A名片通过云服务器(默认方式)告知第二终端,如果用户K不是云服务用户,则第一终端可以将用户A名片通过短信、彩信、微信、QQ、WLAN直连、蓝牙共享等方式,具体不做限定。It should be understood that, when the user A business card is selected to be notified to the user K, the prompt information may not be displayed on the UI interface, and the user may select, which may be the default notification mode of the preset first terminal, for example, the user A and the user. If the K is a cloud service user, the first terminal can notify the second terminal of the user A business card through the cloud server (the default mode). If the user K is not the cloud service user, the first terminal can use the user A business card to send a text message or a multimedia message. WeChat, QQ, WLAN direct connection, Bluetooth sharing, etc., are not limited.
需要说明的是,如果通过云服务器通知对方,则第一终端需要向云服务器发送对用户K发送用户A名片请求,云服务器接收该请求后,查询联系人与唯一标识的映射关系表中用户K的唯一标识,例如用户K的唯一标识为“yun011”,云服务器向登录唯一标识“yun011”的第二终端发送用户A名片。It should be noted that, if the other party is notified by the cloud server, the first terminal needs to send a request to the cloud server to send the user A business card to the user K, and after receiving the request, the cloud server queries the user K in the mapping relationship between the contact and the unique identifier. The unique identifier, for example, the unique identifier of the user K is "yun011", and the cloud server sends the user A business card to the second terminal that logs in the unique identifier "yun011".
804、第二终端接收第一终端的本机名片并保存在第二终端的本地联系人中。804. The second terminal receives the local business card of the first terminal and saves the local business card in the second terminal.
在本申请实施例中,使用第二终端的联系人K收到云服务器发送的用户A名片后,可以选择是否在本地保存,保存可以是一键保存的快捷方式。示例性的,用户A名片包括:称呼: 用户A,手机号码:18312345678,办公地址:深圳市罗湖区国贸大厦,邮箱地址:123456789@qq.com。如图9E所示,为第二终端保存第一终端的本机名片的示意图。用户K也可以选择不保存用户A名片,根据实际需求而定。In the embodiment of the present application, after the contact K of the second terminal receives the user A business card sent by the cloud server, the contact K can be selected to be saved locally, and the save can be a shortcut saved by one button. Exemplarily, the user A business card includes: title: User A, mobile phone number: 18312345678, office address: International Trade Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com. As shown in FIG. 9E, a schematic diagram of saving the local business card of the first terminal for the second terminal is shown. User K can also choose not to save user A business card, depending on actual needs.
本实施例借助终端与云服务器数据共享,第一终端上新建一个联系人(第二联系人的名片),在一种可能的场景下,第一终端可能只是新建了一个联系人,但是之后可能都不会再联系,所以,也就没必要向对方发送我的本机名片。但是,如果与新建的联系人有发生通信,则可以向对方发送我的本机名片,达到联系人及时互相存储的目的,解决了手动新建联系人操作复杂,对方忘记保存我的名片,以及老年用户群体不会保存等问题,本申请实施后可增强终端特性竞争力,改善终端易用性,提升用户体验。In this embodiment, a new contact (a business card of a second contact) is created on the first terminal by using the data sharing between the terminal and the cloud server. In a possible scenario, the first terminal may only create a new contact, but may No more contact, so there is no need to send my local business card to the other party. However, if there is communication with the newly created contact, you can send my local business card to the other party, so that the contact can store each other in time, solve the complicated operation of manually creating a new contact, the other party forgets to save my business card, and the elderly The user group does not save the problem. After the implementation of the application, the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
实施例四、借助云服务器管理黑名单Embodiment 4: Managing a blacklist by using a cloud server
实施场景1,如图10所示,为本申请实施例中管理黑名单的方法的一个实施例示意图。Embodiment 1 is shown in FIG. 10 , which is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
1001、第一终端将第一通信号码加入黑名单。1001. The first terminal adds the first communication number to the blacklist.
在本申请实施例中,以使用第一终端的第一用户(用户A)为例进行说明,用户A可能接收多次来自房地产、卖保险、卖车等销售人员的电话或者短信,用户A又不需要这些需求,则用户A可以将其通信号码(电话号码或手机号码)加入到黑名单中。或者,用户A将第一终端上保存的本地联系人中的某个联系人的名片加入到黑名单中,某个联系人的名片可以包括用户名称、通信号码等信息。In the embodiment of the present application, the first user (user A) using the first terminal is taken as an example, and the user A may receive multiple calls or text messages from a salesperson who sells real estate, sells insurance, sells a car, etc. Without these requirements, User A can add his communication number (phone number or mobile number) to the blacklist. Alternatively, the user A adds the business card of a contact in the local contact saved on the first terminal to the blacklist, and the business card of a contact may include the user name, the communication number, and the like.
示例性的,第二联系人的名片为新加入黑名单的联系人的名片,第二用户以用户K为例进行说明。如图11A所示,为第一终端显示将第一通信号码加入黑名单的示意图。将某一通信号码或者某个联系人的名片加入黑名单的方式可以有多种操作方式,例如可以在通话结束后的用户界面(User Interface,UI)有“加入黑名单”的选项,用户A选择将其加入,也可以是在通信录中点击要加入黑名单的联系人,跳转到该联系人的名片界面,下拉联系人的名片界面,可以有“加入黑名单”的选项,或者是其他操作方式将某个通信号码或者某个联系人的名片加入黑名单,此处不一一赘述。Exemplarily, the business card of the second contact is the business card of the newly added contact, and the second user takes the user K as an example for description. As shown in FIG. 11A, a schematic diagram of adding a first communication number to a blacklist is displayed for the first terminal. There are several ways to add a communication number or a contact's business card to the blacklist. For example, the user interface (UI) after the call ends has the option of “blacklisting”. User A Select to add it, or you can click on the contact to be blacklisted in the address book, jump to the contact card's business card interface, pull down the contact's business card interface, you can have the option of "blacklist", or Other operations add a communication number or a contact's business card to the blacklist, which is not described here.
假设:第一终端上之前保存的黑名单为用户M和用户N,新加入黑名单的联系人为用户K。如图11B所示,为第一终端上显示的黑名单示意图。可选择的,在第一终端上将某一号码加入黑名单时,可以进行标记,如标记为诈骗电话、骚扰电话、广告电话等。示例性的,用户K的手机号码13500004321可以标记为骚扰电话。Assume that the blacklist previously saved on the first terminal is user M and user N, and the newly added blacklist is user K. As shown in FIG. 11B, it is a black list diagram displayed on the first terminal. Alternatively, when a certain number is added to the blacklist on the first terminal, it may be marked, such as a fraudulent call, an harassing call, an advertisement call, and the like. Illustratively, user K's mobile number 13000043031 can be marked as an harassing call.
可选择的,对每个终端的本地黑名单中的联系人,如果没在微信黑名单和/或QQ黑名单中,可以提示用户是否将其移除黑名单。Optionally, if the contact in the local blacklist of each terminal is not in the WeChat blacklist and/or the QQ blacklist, the user may be prompted to remove the blacklist.
1002、第一终端向云服务器发送更新云黑名单请求。1002. The first terminal sends an update cloud blacklist request to the cloud server.
在本申请实施例中,第一终端的黑名单中因为有新加入的联系人的名片(用户K名片)或者陌生的通信号码,第一终端的本地黑名单有更新,那么,对应的在云服务器上,也需要更新第一用户对应的黑名单。应理解,用户A可以选择上传整个黑名单,也可以选择上传新加入黑名单的联系人用户K。第一终端响应用户A的选择操作,在第一终端上生成请求,该请求可以是更新云黑名单请求,第一终端再向云服务器发送更新云黑名单请求,更新云黑名单请求中可以携带用户A的黑名单或者新加入黑名单的联系人用户K。如图11C所示,第 一终端将黑名单上传云服务器的示意图。需要说明的是,图11C所示将黑名单上传云服务器只是其中的一种示例方式,还可以有其他的方式,不做具体限定。In the embodiment of the present application, the blacklist of the first terminal has a new business card (user K business card) or a strange communication number, and the local blacklist of the first terminal is updated, then the corresponding blacklist is updated. On the server, you also need to update the blacklist corresponding to the first user. It should be understood that user A may choose to upload the entire blacklist, or may choose to upload the newly added blacklisted contact user K. The first terminal responds to the user A's selection operation, and generates a request on the first terminal, where the request may be an update cloud blacklist request, and the first terminal sends an update cloud blacklist request to the cloud server, and the update cloud blacklist request may be carried. User A's blacklist or newly blacklisted contact user K. As shown in Figure 11C, A schematic diagram of a terminal uploading a blacklist to a cloud server. It should be noted that the uploading of the blacklist to the cloud server is only one example of the method shown in FIG. 11C, and there may be other manners, which are not specifically limited.
可选择的,用户A将某一通信号码误加黑名单后,如果第一终端检测到该号码在某一时间段内主动呼叫用户A的次数超过某一阈值,或者主动向用户A发短消息的次数超过某一阈值,则第一终端的显示屏可以提示用户A“号码135********被加入黑名单,已来电多次,是否从黑名单移除?”用户A可以在终端的显示屏上进行选定操作等。防止用户误将某一号码加入黑名单,导致对方无法联系到用户。Alternatively, after the user A blacklists a certain communication number, if the first terminal detects that the number of the user actively calls the user A exceeds a certain threshold within a certain period of time, or sends a short message to the user A actively. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
1003、云服务器根据更新云黑名单请求,更新云黑名单。1003. The cloud server updates the cloud blacklist according to the update cloud blacklist request.
在本申请实施例中,云服务器之前保存的关于用户A的黑名单中的联系人为用户M和用户N,云服务器接收更新黑名单请求中,携带有用户A更新的黑名单(用户M、用户N、用户K),或者用户A的黑名单中新加入黑名单的联系人(用户K)。云服务器将保存的关于用户A的黑名单进行更新,即由之前的用户M和用户N更新为用户M、用户N和用户K。In the embodiment of the present application, the contact in the blacklist of the user A saved by the cloud server is the user M and the user N, and the cloud server receives the updated blacklist request, and carries the blacklist updated by the user A (the user M, the user N, user K), or the newly added blacklisted contact (user K) in the blacklist of user A. The cloud server updates the saved blacklist for user A, that is, the previous user M and user N are updated to user M, user N, and user K.
1004、云服务器根据各个终端上报的黑名单,确定被标记为黑名单的用户数量大于预置阈值的号码为目标号码集。1004. The cloud server determines, according to the blacklist reported by each terminal, that the number of users marked as blacklists is greater than a preset threshold as the target number set.
在本申请实施例中,云服务器收集各个终端上传的黑名单数据,通过大数据分析后,过滤出被50%(用户可自行设定)以上用户加入黑名单的目标号码集。示例性的,假设,有100个云服务用户,这100个云服务用户有些有黑名单,有些没有黑名单,有黑名单的上传云服务器。云服务器保存每个用户对应的黑名单,对于同一个手机号码或者座机号码,如果超过50个用户上传的黑名单中都有该号码,则将这个号码加入目标号码集。应理解,目标号码集中可能会包括用户A的黑名单中联系人的号码,也可能不会包括用户A的黑名单中联系人的号码。In the embodiment of the present application, the cloud server collects the blacklist data uploaded by each terminal, and after the big data analysis, filters out the target number set that is added to the blacklist by 50% (the user can set the user). Exemplarily, assume that there are 100 cloud service users, some of which have blacklists, some have no blacklists, and some have blacklisted upload cloud servers. The cloud server stores the blacklist corresponding to each user. For the same mobile phone number or landline number, if there are more than 50 users uploading the blacklist, the number is added to the target number set. It should be understood that the target number set may include the number of the contact in the blacklist of User A, and may not include the number of the contact in the blacklist of User A.
假设,目标号码集中包括13500004321、13300001111、13300002222、13300003333、13300004444、13300005555、13300006666、13300007777、13300008888。可选择的,云服务器也可以将各个终端上报的黑名单的并集,作为目标号码集。Assume that the target number set includes 1350000432, 133000011, 133000022, 13300003333, 13300004444, 13300005555, 13300006666, 13300007777, 13300008888. Optionally, the cloud server may also use the union of the blacklists reported by each terminal as the target number set.
1005、云服务器向运营商服务端发送关于目标号码集的被标记数据请求。1005. The cloud server sends a tagged data request for the target number set to the operator server.
在本申请实施例中,云服务器将关于目标号码集的被标记数据请求发送至运营商服务端,运营商服务端查询号码标记数据库中是否有目标号码集中的号码,应理解,运营商服务端中的号码标记库类似于终端上的黑名单,但运营商服务端的号码标记库的可靠性比终端的黑名单高。而且,将目标号码集的被标记数据请求发送至运营商服务端,可以理解为二次确认的过程,即在终端上,用户将目标号码集中的号码加入在黑名单中,云服务器将目标号码集发送至运营商服务端,运营商服务端可以进一步的确认,在号码标记库中再次查询这几个号码的标记信息。In the embodiment of the present application, the cloud server sends the tagged data request for the target number set to the operator server, and the operator server queries the number tag database for the number in the target number set. It should be understood that the operator server The number tag library in the middle is similar to the blacklist on the terminal, but the number tag library of the operator server is more reliable than the blacklist of the terminal. Moreover, sending the marked data request of the target number set to the operator server can be understood as a process of secondary confirmation, that is, on the terminal, the user adds the number in the target number set to the blacklist, and the cloud server sets the target number. The set is sent to the operator server, and the operator server can further confirm and query the tag information of these numbers again in the number tag library.
示例性的,如果目标号码集中的号码13500004321在号码标记数据库中查找到的标记信息为诈骗电话,13300001111和13300002222在号码标记数据库中查找到的标记信息为可信任电话。标记信息还可以是其他的官方信任号码,例如110,120等号码,还可以是非法号码等标记信息。Illustratively, if the tag information found in the number tag database in the target number set is 13500004321 is a fraudulent phone, the tag information found in the number tag database is 1330,00011111 and 13400002222 is a trusted phone. The tag information may also be other official trust numbers, such as numbers such as 110, 120, and may also be tagged information such as illegal numbers.
如下述表2所示,为运营商服务端查询出的目标号码集对应的标记信息。 As shown in Table 2 below, the tag information corresponding to the target number set queried by the operator server.
目标号码集Target number set 标记信息Tag information
1350000432113500004321 诈骗电话Fraud phone
1330000111113300001111 诈骗电话Fraud phone
1330000222213300002222 可信任电话Trusted phone
1330000333313300003333 可信任电话Trusted phone
1330000444413300004444 诈骗电话Fraud phone
1330000555513300005555 诈骗电话Fraud phone
1330000666613300006666 诈骗电话Fraud phone
表2Table 2
1006、运营商服务端向云服务器发送查询结果。1006. The operator server sends the query result to the cloud server.
在本申请实施例中,运营商服务端将目标号码集中的查询结果发送至云服务器。示例性的,运营商服务端将上述表2的信息发送至云服务器。可选择的,对于目标号码集中的号码,在运营商服务端中可能没有查找到关于其中某个或多个号码的标记信息,则可以认为该号码为可信任电话。In the embodiment of the present application, the operator server sends the query result in the target number set to the cloud server. Exemplarily, the operator server sends the information of Table 2 above to the cloud server. Alternatively, for the number in the target number set, the tag information about one or more of the numbers may not be found in the operator server, and the number may be considered as a trusted phone.
1007、云服务器对查询结果归类,并向第一终端发送归类的查询结果。1007. The cloud server classifies the query result, and sends the classified query result to the first terminal.
在本申请实施例中,云服务器收到运营商返回的查询结果后,按规则归类查询结果,并将归类完整的结果发送给终端;以上述表2为例进行说明,云服务器可以将标记为“诈骗电话”的号码归为一类,标记为“可信任电话”的号码归为一类。In the embodiment of the present application, after receiving the query result returned by the operator, the cloud server classifies the query result according to the rule, and sends the complete result to the terminal; taking the above Table 2 as an example, the cloud server may The numbers labeled "Scam Phones" fall into one category, and the numbers labeled "Trust Phones" fall into one category.
需要说明的是,云服务器可以对每个终端都发送归类的查询结果,也可以是只对第一终端发送归类的查询结果,也可以是对联系人中有保存上述表2中的号码的终端发送归类的查询结果,具体不做限定。It should be noted that the cloud server may send the classified query result to each terminal, or may only send the classified query result to the first terminal, or may save the number in the above table 2 in the contact. The terminal sends the classified query result, which is not limited.
1008、第一终端根据归类的查询结果,优化本地黑名单。1008. The first terminal optimizes the local blacklist according to the classified query result.
在本申请实施例中,第一终端收到云服务器发送后,根据云服务器发送的归类的查询结果,查询本地联系人(也称电话薄或通讯录)和黑名单,对本地联系人中标记过的号码,如果与查询结果的标记信息不一样,则进行更新;如果本地联系人中的号码未标记,而归类的查询结果中已标记,则对该号码进行智能标记。还可以将本地联系人中被识别出的非法号码智能加入本地黑名单中,优化本地黑名单与云黑名单。In the embodiment of the present application, after receiving the cloud server, the first terminal queries the local contact (also called a phone book or address book) and the blacklist according to the classified query result sent by the cloud server, and is in the local contact. The marked number is updated if it is different from the tag information of the query result; if the number in the local contact is not marked and the classified query result is marked, the number is smart tagged. You can also add the illegal number IDs identified in the local contacts to the local blacklist to optimize the local blacklist and cloud blacklist.
可选择的,第一终端根据第一查询结果,更新黑名单,可以包括:Optionally, the first terminal updates the blacklist according to the first query result, and may include:
若第一查询结果指示第一通信号码未在运营商黑名单中,则第一终端显示第一提示信息,第一提示信息用于提示用户是否将第一通信号码从黑名单移除;第一终端响应用户输入的移除操作,从黑名单中移除第一通信号码;If the first query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist; The terminal removes the first communication number from the blacklist in response to the user input removal operation;
或,若第一查询结果指示第二通信号码在运营商黑名单中,则第一终端将第二通信号码加入黑名单,第二通信号码为之前不在第一终端的黑名单中的通信号码。Or, if the first query result indicates that the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is the communication number that is not in the blacklist of the first terminal.
如图11D所示,为第一终端显示更新黑名单的示意图。在图11D所示中,号码为13300004444的号码为本地联系人中的某个联系人的手机号码,或者,第一终端检测出13300004444的手机号码与第一终端的手机号码18312345678发生过通信,但是用户A未将其加入黑名单。在云服务器发送的归类的查询结果中,13300004444的标记信息为诈骗电话, 因此,第一终端可以自动将手机号码13300004444加入到本地黑名单中,也可以是用户A的选定操作,将其加入到本地黑名单中。As shown in FIG. 11D, a schematic diagram of updating the blacklist for the first terminal is displayed. In FIG. 11D, the number 13300004444 is the mobile number of a contact in the local contact, or the first terminal detects that the mobile phone number of 13300004444 has communicated with the mobile phone number 18312345678 of the first terminal, but User A did not blacklist it. In the categorized query result sent by the cloud server, the tag information of 13300004444 is a fraudulent phone. Therefore, the first terminal may automatically add the mobile phone number 13300004444 to the local blacklist, or may be the selected operation of user A, and add it to the local blacklist.
如图11E所示,为第一终端是否将黑名单中的标记信息进行更新的示意图。在第一终端上将用户K名片加入黑名单的时候,标记为骚扰电话,但是云服务器反馈的归类的查询结果中,用户K的手机号码13500004321标记为诈骗电话,所以,第一终端上可以弹出一个提示信息,提示是否将其更新为诈骗电话,用户可以进行选定操作,第一终端可以响应用户的操作,执行对应的功能。As shown in FIG. 11E, it is a schematic diagram of whether the first terminal updates the tag information in the blacklist. When the user K business card is added to the blacklist on the first terminal, it is marked as an harassing call, but in the categorized query result fed back by the cloud server, the mobile phone number of the user K is 13500004321, which is marked as a fraudulent call, so the first terminal can A prompt message is displayed to prompt whether to update it as a fraudulent call, and the user can perform a selected operation, and the first terminal can perform a corresponding function in response to the user's operation.
本申请实施例解决了终端黑名单识别不准确、黑名单号码无标记数据以及错误将某一号码加入黑名单导致该号码无法正常呼入的问题,终端与云服务器同步黑名单,借助终端与云服务器数据共享,通过云服务器与运营商服务端交互,达到管理、优化终端黑名单的目的。本申请实施后可增强终端特性竞争力,改善终端易用性,提升用户体验。The embodiment of the present application solves the problem that the blacklist of the terminal is inaccurate, the blacklisted number is not marked, and the number is incorrectly added to the blacklist, so that the number cannot be normally entered. The terminal and the cloud server synchronize the blacklist, and the terminal and the cloud are used. The server data is shared, and the cloud server interacts with the server of the carrier to manage and optimize the blacklist of the terminal. After the implementation of the application, the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
实施场景2:如图12所示,为本申请实施例中管理黑名单的方法的一个实施例示意图。Implementation Scenario 2: As shown in FIG. 12, it is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
1201、第一终端将目标通信号码加入黑名单,同时向云服务器发送更新云黑名单请求。1201. The first terminal adds the target communication number to the blacklist, and sends an update cloud blacklist request to the cloud server.
在本申请实施例中,以使用第一终端的第一用户(用户A)为例进行说明,因为用户A的误操作,使得第一终端将某号码或某个联系人的名片加入黑名单。示例性的,老年人对终端的使用不熟悉,在接/打电话时不小心将某号码或者某个联系人的名片加入黑名单,小孩在终端上玩游戏或者接/打电话时,不小心将某号码或者某个联系人的名片加入黑名单,或者因为误触摸等其他原因等将某号码或者某个联系人的名片加入黑名单。如图13A所示,为第一终端将目标联系人的名片加入黑名单的示意图。在图13A中,目标联系人的名片以用户B为例进行说明,用户B名片的手机号码为13500123456。应理解,第一终端将某通信号码或者某个联系人的名片加入黑名单时,同时向云服务器发送更新云黑名单请求,云黑名单请求可以携带新加入黑名单的目标通信号码、或者目标联系人的名片、或者目标联系人的名片中的通信号码。In the embodiment of the present application, the first user (user A) using the first terminal is taken as an example. Because the user A mishandles, the first terminal adds a certain number or a business card of a contact to the blacklist. Except for the elderly, the elderly are unfamiliar with the use of the terminal, and accidentally add a number or a contact's business card to the blacklist when picking up/calling, and the child is not careful when playing games or picking up/calling on the terminal. Add a number or a contact's business card to the blacklist, or add a number or a contact's business card to the blacklist for other reasons such as accidental touch. As shown in FIG. 13A, a schematic diagram of adding a business card of a target contact to a blacklist for the first terminal. In FIG. 13A, the business card of the target contact is described by taking the user B as an example, and the mobile phone number of the user B business card is 13500123456. It should be understood that, when the first terminal adds a communication number or a business card of a contact to the blacklist, the first terminal sends an update cloud blacklist request to the cloud server, and the cloud blacklist request may carry the target communication number or target of the newly added blacklist. The communication number of the contact card or the business card of the target contact.
1202、云服务器根据更新云黑名单请求,更新云黑名单。1202: The cloud server updates the cloud blacklist according to the update cloud blacklist request.
在本申请实施例中,云服务器接收第一终端发送的更新云黑名单请求,更新云黑名单请求中可以携带加入黑名单的某通信号码、或者某个联系人的名片、或者联系人的名片中的通信号码。云服务器可以更新云黑名单请求,更新云黑名单。示例性的,云更新黑名单请求携带的是用户B的手机号码13500123456,那么,云服务器将该号码加入到云黑名单中。或者,云更新黑名单请求携带的是用户B名片,则云服务器将用户B名片加入到云黑名单中。In the embodiment of the present application, the cloud server receives the update cloud blacklist request sent by the first terminal, and updates the cloud blacklist request to carry a blacklisted communication number, or a contact's business card, or a contact's business card. The communication number in . The cloud server can update the cloud blacklist request and update the cloud blacklist. Exemplarily, the cloud update blacklist request carries the mobile phone number 13500123456 of the user B. Then, the cloud server adds the number to the cloud blacklist. Alternatively, the cloud update blacklist request carries the user B business card, and the cloud server adds the user B business card to the cloud blacklist.
1203、第一终端检测到与加入黑名单的目标号码的通信次数超过预置阈值,则第一终端向云服务器发送查询目标号码的被标记数据请求。1203. The first terminal detects that the number of communications with the blacklisted target number exceeds a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server.
在本申请实施例中,第一终端检测到与加入黑名单的目标号码的通信次数大于或等于预置阈值,第一终端向云服务器发送查询目标号码的被标记数据请求。例如,第一终端的手机号码为18312345678,加入黑名单的用户B的号码为13500123456;其中,第一终端的手机号码(18312345678)接收号码13500123456发送短信的次数超过3次(用户可自行设定)、发送彩信的次数超过3次或者来电的次数如果超过3次,或者,第一终端的手机号码(18312345678)接收号码13500123456发送短信的次数+发送彩信的次数+来电的次数的总 和超过5次(用户可自行设定);则第一终端向云服务器发送查询该目标号码(13500123456)的被标记数据请求。如图13B所示,为第一终端检测到与目标号码的通信次数大于预置阈值,并向云服务器发送查询目标号码的被标记数据请求的示意图。In the embodiment of the present application, the first terminal detects that the number of communications with the target number of the blacklist is greater than or equal to a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server. For example, the mobile number of the first terminal is 18312345678, and the number of the user B that is blacklisted is 13500123456. The mobile number of the first terminal (18312345678) receives the number 13500123456 and sends the short message more than 3 times (user can set it) The number of times the MMS is sent more than 3 times or the number of calls exceeds 3 times, or the number of times the mobile phone number of the first terminal (18312345678) receives the number 13500123456, the number of times the message is sent, the number of times the MMS is sent, and the number of calls And more than 5 times (user can set it by itself); then the first terminal sends a tagged data request for querying the target number (13500123456) to the cloud server. As shown in FIG. 13B, the first terminal detects that the number of communications with the target number is greater than a preset threshold, and sends a schematic request for the tagged data request of the query target number to the cloud server.
可选择的,用户A将某一号码误加黑名单后,如果第一终端检测到该目标号码在某一时间段内主动呼叫用户A的次数超过某一阈值,或者主动向用户A发短消息的次数超过某一阈值,则第一终端的显示屏可以提示用户A“号码135********被加入黑名单,已来电多次,是否从黑名单移除?”用户A可以在终端的显示屏上进行选定操作等。防止用户误将某一号码加入黑名单,导致对方无法联系到用户。Alternatively, after the user A blacklists a certain number, the first terminal detects that the number of the target number actively calls the user A exceeds a certain threshold in a certain period of time, or sends a short message to the user A. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
1204、云服务器向运营商服务端发送查询目标号码的被标记数据请求。1204. The cloud server sends a tagged data request for querying the target number to the operator server.
在本申请实施例中,云服务器收到查询目标号码的被标记数据请求后,该查询目标号码的被标记数据请求用于向运营商服务端查询该目标号码的标记数据。那么,云服务器再将查询目标号码的被标记数据请求发送至运营商服务端。示例性的,云服务器将查询13500123456的被标记数据请求发送至运营商服务端。In the embodiment of the present application, after the cloud server receives the tagged data request of the query target number, the tagged data request of the query target number is used to query the operator server for the tag data of the target number. Then, the cloud server sends a tagged data request for the query target number to the operator server. Exemplarily, the cloud server sends a tagged data request for query 13500123456 to the carrier server.
可选择的,云服务器可以在接收的各个终端上传的黑名单中,确定该目标号码被加入黑名单的用户数量少于特定阈值,例如,有100个云服务用户,上传云服务器的黑名单中,只有3个用户将该号码加入黑名单了,则云服务器可以确定该号码为可信任号码,向第一终端返回提示信息,该提示信息可以为“13500123456为可信任号码,是否将其从黑名单中移除?”在第一终端的显示屏上显示,用户可以进行选定操作,选择是否将其移除。也可以是进行语音提示或者其他方式的提示信息,不做具体限定。Optionally, the cloud server may determine, in the blacklist uploaded by each terminal, that the number of users whose target number is blacklisted is less than a specific threshold, for example, there are 100 cloud service users, and the cloud server is blacklisted. If only three users add the number to the blacklist, the cloud server can determine that the number is a trusted number, and return a prompt message to the first terminal. The prompt information can be "13500123456 is a trusted number, whether it is black. Removed from the list?” Displayed on the display of the first terminal, the user can perform the selected operation and choose whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited.
1205、运营商服务端根据查询目标号码的被标记数据请求,查询号码标记数据库,得到目标查询结果。1205. The operator server queries the number tag database according to the tagged data request of the query target number, and obtains the target query result.
在本申请实施例中,运营商服务端根据目标号码的被标记数据查询请求,查询号码标记数据库,得到目标查询结果。示例性的,运营商服务端在号码标记数据库中查询13500123456的被标记数据,被标记数据可以为“非法号码”、“诈骗号码”、“可信任号码”、“不可信任号码”等标记数据。假如这里的目标号码13500123456的被标记数据为可信任号码,查询结果就为可信任号码。In the embodiment of the present application, the operator server queries the number tag database according to the tagged data query request of the target number, and obtains the target query result. Exemplarily, the operator server queries the tagged data of 13500123456 in the number tag database, and the tagged data may be tag data such as "illegal number", "scam number", "trusted number", "untrusted number", and the like. If the marked data of the target number 13500123456 here is a trusted number, the query result is a trusted number.
应理解,对于终端上加入黑名单的可靠性没有运营商服务端的号码标记库的可靠性高。即终端上加入黑名单的不一定就是诈骗电话,有些可能误操作加入的,有些可能就是主观的不想和某个人联系,将其加入黑名单。It should be understood that the reliability of the number tag library of the operator server is not high for the reliability of the blacklist on the terminal. That is, the blacklist on the terminal is not necessarily a fraudulent call. Some may be mistakenly added. Some may be subjective and do not want to contact someone to blacklist.
1206、运营商服务端向云服务器发送目标查询结果。1206. The operator server sends the target query result to the cloud server.
在本申请实施例中,运营商服务端得到目标查询结果后,将目标查询结果发送至云服务器。示例性的,运营商服务端将关于目标号码13500123456被标记数据查询请求的目标查询结果为可信任号码。In the embodiment of the present application, after obtaining the target query result, the operator server sends the target query result to the cloud server. Exemplarily, the operator server will treat the target query result of the marked data query request with respect to the target number 13500123456 as a trusted number.
1207、云服务器向第一终端发送目标查询结果。1207. The cloud server sends the target query result to the first terminal.
在本申请实施例中,云服务器收到运营商返回的目标查询结果后,将目标查询结果发送给第一终端。可选择的,云服务器也可以在云端对目标号码的目标查询结果进行保存。示例性的,云服务器接收到运营商服务端发送的目标查询结果为:关于目标号码 13500123456被标记数据查询请求的目标查询结果为可信任号码,将可信任号码这个目标查询结果发送给第一终端。In the embodiment of the present application, after receiving the target query result returned by the operator, the cloud server sends the target query result to the first terminal. Alternatively, the cloud server can also save the target query result of the target number in the cloud. Exemplarily, the cloud server receives the target query result sent by the operator server: about the target number. 13500123456 The target query result of the marked data query request is a trusted number, and the target query result of the trusted number is sent to the first terminal.
1208、第一终端根据目标查询结果对目标号码进行处理。1208. The first terminal processes the target number according to the target query result.
在本申请实施例中,第一终端接收云服务器发送的目标查询结果为:目标号码13500123456被标记数据查询请求的目标查询结果为可信任号码。在第一终端的显示屏上显示的提示消息为“13500123456为可信任号码,是否将其从黑名单中移除?”用户可以进行选定操作,选择是否将其移除。也可以是进行语音提示或者其他方式的提示信息,不做具体限定。如图13C所示,为本申请实施例中第一终端显示目标查询结果的提示信息的示意图。In the embodiment of the present application, the first terminal receives the target query result sent by the cloud server as: the target number 13500123456 is the trusted query number of the marked data query request. The prompt message displayed on the display screen of the first terminal is "13500123456 is a trusted number, is it removed from the blacklist?" The user can perform a selection operation and select whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited. As shown in FIG. 13C, it is a schematic diagram of prompt information for displaying a target query result by the first terminal in the embodiment of the present application.
即第一终端收到云服务器发送的查询结果后,将云服务器的标记信息附加到提示内容中,提示用户该号码已被加入黑名单,是否需要从黑名单中移除该号码;云服务器标记的号码类型,用户结合自己需求对该号码执行恢复或继续保留至黑名单操作。After receiving the query result sent by the cloud server, the first terminal appends the tag information of the cloud server to the prompt content, prompting the user that the number has been added to the blacklist, and whether the number needs to be removed from the blacklist; the cloud server tag The number type, the user performs recovery on the number or keeps the blacklist operation in combination with his own needs.
本申请实施例借助云服务器实现终端与云服务器共享数据,解决了终端黑名单识别不准确、黑名单号码无标记数据以及错误将某一号码加入黑名单导致该号码无法正常呼入的问题,区别现有技术在于终端与云服务器同步黑名单,借助终端与云服务器数据共享,通过云服务器与运营商服务端交互,达到管理、优化终端黑名单的目的。本申请实施后可增强终端特性竞争力,改善终端易用性,提升用户体验。In the embodiment of the present application, the cloud server is used to share data between the terminal and the cloud server, and the problem that the terminal blacklist identification is inaccurate, the blacklist number is not marked, and the number is incorrectly added to the blacklist causes the number to fail to be normally entered. The current technology is that the terminal and the cloud server synchronize the blacklist, and the data sharing between the terminal and the cloud server is used, and the cloud server interacts with the server of the operator to manage and optimize the blacklist of the terminal. After the implementation of the application, the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
需要说明的是,对于上述的实施例,在具体的实现方式中,可以任意组合成新的一个实施例,此处不再详细赘述。而且,对于本申请实施例所提供的UI图中,显示的是在WIFI的场景下实现的,也可以在2G/3G/4G/5G甚至后续更高级别的通信网中实现,并不构成对本申请实施例所提供的方案的限定。It should be noted that, in the specific implementation manners, the foregoing embodiments may be arbitrarily combined into a new embodiment, and details are not described herein again. Moreover, in the UI diagram provided by the embodiment of the present application, the display is implemented in a WIFI scenario, and may also be implemented in a 2G/3G/4G/5G or even a later higher-level communication network, and does not constitute a pair. The definition of the solution provided by the embodiment is applied.
上面对本申请中的方法实施例进行说明,下面对本申请实施例中的装置实施例进行说明,如图14所示,为本申请实施例中终端的一个实施例示意图。The method embodiment in the present application is described above. The following describes an embodiment of the device in the embodiment of the present application. As shown in FIG. 14 , it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application.
发送模块1401,用于向服务器发送第一名片请求,所述第一名片请求用于获取本地联系人中第一联系人的最新名片,所述最新名片为所述服务器从第二终端获取的名片,所述第二终端为所述第一联系人的终端,所述最新名片包括用户名、通信号码;The sending module 1401 is configured to send a first business card request to the server, where the first business card is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal. The second terminal is a terminal of the first contact, and the latest business card includes a user name and a communication number;
接收模块1402,用于接收所述服务器发送的最新名片;The receiving module 1402 is configured to receive the latest business card sent by the server;
处理模块1403,用于根据所述最新名片,更新所述第一终端保存的所述第一联系人的历史名片。The processing module 1403 is configured to update, according to the latest business card, a historical business card of the first contact saved by the first terminal.
可选的,在本申请的一些实施例中,所述第一联系人为在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人。Optionally, in some embodiments of the present application, the first contact is a contact that has a number of communications with the first terminal that is less than a first threshold within a preset duration.
可选的,在本申请的一些实施例中,所述第一联系人为不常用联系人群组中的联系人,所述不常用联系人群组为所述服务器确定的第一不常用联系人和第二不常用联系人的并集或交集,所述第一不常用联系人为所述第一终端向所述服务器发送的在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人,所述第二不常用联系人为所述服务器保存的在接收所述第一不常用联系人之前的不常用联系人。Optionally, in some embodiments of the present application, the first contact is a contact in an infrequent contact group, and the infrequent contact group is a first infrequent contact determined by the server. And the union or intersection of the second infrequent contacts, wherein the first infrequent contact is within the preset duration sent by the first terminal to the server, and the number of communications with the first terminal is less than a first threshold contact, the second infrequent contact being an infrequent contact saved by the server before receiving the first infrequent contact.
可选的,在本申请的一些实施例中, Optionally, in some embodiments of the present application,
发送模块1401,具体用于若所述第一终端向所述第二终端发起的通信失败,则发送模块1401向所述服务器发送第一名片请求;The sending module 1401 is specifically configured to: if the communication initiated by the first terminal to the second terminal fails, the sending module 1401 sends a first business card request to the server;
处理模块1403,还用于根据所述最新名片与所述第二终端进行通信。The processing module 1403 is further configured to communicate with the second terminal according to the latest business card.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
发送模块1401,还用于若所述第一终端的本机名片发生更新,则发送模块1401向所述服务器发送已更新的本机名片;通过所述服务器向所述第二终端发送所述已更新的本机名片;The sending module 1401 is further configured to: if the local business card of the first terminal is updated, the sending module 1401 sends the updated local business card to the server; and the sending, by the server, the Updated local business card;
接收模块1402,还用于接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人。The receiving module 1402 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1403,还用于在所述本地联系人中新建第二联系人的名片;The processing module 1403 is further configured to create a business card of the second contact in the local contact;
发送模块1401,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则发送模块1401通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The sending module 1401 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1401 sends, by using the server, the local business card of the first terminal to the third terminal by using the server The third terminal is a terminal of the second contact.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1403,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processing module 1403 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
发送模块1401,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The sending module 1401 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1403,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则处理模块1403显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processing module 1403 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1403 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1403,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则处理模块1403将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processing module 1403 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1403 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
发送模块1401,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则发送模块1401向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The sending module 1401 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1401 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
接收模块1402,还用于接收所述服务器发送的第二名片请求;The receiving module 1402 is further configured to receive a second business card request sent by the server;
发送模块1401,还用于根据所述第二名片请求,向所述服务器上传所述本机名片。The sending module 1401 is further configured to upload the local business card to the server according to the second business card request.
如图15A所示,为本申请实施例中终端的另一个实施例示意图。FIG. 15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
发送模块1501,还用于若所述第一终端的本机名片发生更新,则发送模块1501向所 述服务器发送已更新的本机名片;通过所述服务器向所述第二终端发送所述已更新的本机名片;The sending module 1501 is further configured to: if the local business card of the first terminal is updated, the sending module 1501 sends the module Transmitting, by the server, the updated local business card; sending, by the server, the updated local business card to the second terminal;
接收模块1502,还用于接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人。The receiving module 1502 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
可选的,在本申请的一些实施例中,如图15B所示,为本申请实施例中终端的另一个实施例示意图。Optionally, in some embodiments of the present application, as shown in FIG. 15B, it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
处理模块1503,还用于在所述本地联系人中新建第二联系人的名片;The processing module 1503 is further configured to create a business card of the second contact in the local contact.
发送模块1501,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则发送模块1501通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The sending module 1501 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1501 sends, by using the server, the local business card of the first terminal to the third terminal by using the server The third terminal is a terminal of the second contact.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1503,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processing module 1503 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
发送模块1501,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The sending module 1501 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1503,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则处理模块1503显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processing module 1503 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1503 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1503,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则处理模块1503将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processing module 1503 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1503 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
发送模块1501,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则发送模块1501向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The sending module 1501 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1501 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
接收模块1502,还用于接收所述服务器发送的第二名片请求;The receiving module 1502 is further configured to receive a second business card request sent by the server;
发送模块1501,还用于根据所述第二名片请求,向所述服务器上传所述本机名片。The sending module 1501 is further configured to upload the local business card to the server according to the second business card request.
如图16A所示,为本申请实施例中终端的另一个实施例示意图。FIG. 16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
处理模块1601,还用于在所述本地联系人中新建第二联系人的名片;The processing module 1601 is further configured to create a business card of the second contact in the local contact.
发送模块1602,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则发送模块1602通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The sending module 1602 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1602 sends, by using the server, the local business card of the first terminal to the third terminal by using the server The third terminal is a terminal of the second contact.
可选的,在本申请的一些实施例中, Optionally, in some embodiments of the present application,
处理模块1601,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processing module 1601 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
发送模块1602,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The sending module 1602 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1601,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则处理模块1601显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processing module 1601 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1601 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1601,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则处理模块1601将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processing module 1601 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1601 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
发送模块1602,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则发送模块1602向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The sending module 1602 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1602 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
可选的,在本申请的一些实施例中,如图16B所示,为本申请实施例中终端的另一个实施例示意图。Optionally, in some embodiments of the present application, as shown in FIG. 16B, it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
接收模块1603,还用于接收所述服务器发送的第二名片请求;The receiving module 1603 is further configured to receive a second business card request sent by the server;
发送模块1602,还用于根据所述第二名片请求,向所述服务器上传所述本机名片。The sending module 1602 is further configured to upload the local business card to the server according to the second business card request.
如图17A所示,为本申请实施例中终端的另一个实施例示意图。FIG. 17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
处理模块1701,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processing module 1701 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
发送模块1702,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The sending module 1702 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1701,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则处理模块1701显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processing module 1701 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1701 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
处理模块1701,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则处理模块1701将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processing module 1701 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1701 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
发送模块1702,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值, 则发送模块1702向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The sending module 1702 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal, is greater than a third threshold, Then, the sending module 1702 initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number.
可选的,在本申请的一些实施例中,如图17B所示,为本申请实施例中终端的另一个实施例示意图。Optionally, in some embodiments of the present application, as shown in FIG. 17B, it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
接收模块1703,还用于接收所述服务器发送的第二名片请求;The receiving module 1703 is further configured to receive a second business card request sent by the server;
发送模块1702,还用于根据所述第二名片请求,向所述服务器上传所述本机名片。The sending module 1702 is further configured to upload the local business card to the server according to the second business card request.
如图18所示,为本申请实施例中终端的另一个实施例示意图。为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以包括手机、平板电脑、个人数字助理(personal digital assistant,PDA)、销售终端(point of sales,POS)、车载电脑等任意终端设备。以终端为手机为例:FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application. For the convenience of description, only the parts related to the embodiments of the present application are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present application. The terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a car computer, and the like. Take the terminal as a mobile phone as an example:
图18示出的是与本申请实施例提供的终端相关的手机的部分结构的框图。参考图18,手机包括:射频(Radio Frequency,RF)电路1810、存储器1820、输入单元1830、显示单元1840、传感器1850、音频电路1860、无线保真(wireless fidelity,WiFi)模块1870、处理器1880、以及电源1890等部件。本领域技术人员可以理解,图18中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 18 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application. Referring to FIG. 18, the mobile phone includes: a radio frequency (RF) circuit 1810, a memory 1820, an input unit 1830, a display unit 1840, a sensor 1850, an audio circuit 1860, a wireless fidelity (WiFi) module 1870, and a processor 1880. And power supply 1890 and other components. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 18 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different components may be arranged.
下面结合图18对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 18:
RF电路1810可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1880处理;另外,将设计上行的数据发送给基站。通常,RF电路1810包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1810还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 1810 can be used for receiving and transmitting signals during and after the transmission or reception of information, in particular, after receiving the downlink information of the base station, and processing it to the processor 1880; in addition, transmitting the designed uplink data to the base station. Generally, RF circuit 1810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 1810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
存储器1820可用于存储软件程序以及模块,处理器1880通过运行存储在存储器1820的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1820可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1820 can be used to store software programs and modules, and the processor 1880 can execute various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1820. The memory 1820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.). Moreover, memory 1820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
输入单元1830可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1830可包括触控面板1831以及其他输入设备1832。触控面板1831,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1831上或在触控面板1831附近的操 作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1880,并能接收处理器1880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1831。除了触控面板1831,输入单元1830还可以包括其他输入设备1832。具体地,其他输入设备1832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. Specifically, the input unit 1830 may include a touch panel 1831 and other input devices 1832. The touch panel 1831, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1831 or near the touch panel 1831. Fuck ()), and according to a preset program to drive the corresponding connection device. Optionally, the touch panel 1831 may include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 1880 is provided and can receive commands from the processor 1880 and execute them. In addition, the touch panel 1831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch panel 1831, the input unit 1830 may also include other input devices 1832. Specifically, other input devices 1832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
显示单元1840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1840可包括显示面板1841,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1841。进一步的,触控面板1831可覆盖显示面板1841,当触控面板1831检测到在其上或附近的触摸操作后,传送给处理器1880以确定触摸事件的类型,随后处理器1880根据触摸事件的类型在显示面板1841上提供相应的视觉输出。虽然在图18中,触控面板1831与显示面板1841是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1831与显示面板1841集成而实现手机的输入和输出功能。The display unit 1840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. The display unit 1840 can include a display panel 1841. Alternatively, the display panel 1841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 1831 may cover the display panel 1841. After the touch panel 1831 detects a touch operation thereon or nearby, the touch panel 1831 transmits to the processor 1880 to determine the type of the touch event, and then the processor 1880 according to the touch event. The type provides a corresponding visual output on display panel 1841. Although in FIG. 18, the touch panel 1831 and the display panel 1841 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1831 can be integrated with the display panel 1841. Realize the input and output functions of the phone.
手机还可包括至少一种传感器1850,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1841的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1841和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset can also include at least one type of sensor 1850, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1841 and/or when the mobile phone moves to the ear. Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
音频电路1860、扬声器1861,传声器1862可提供用户与手机之间的音频接口。音频电路1860可将接收到的音频数据转换后的电信号,传输到扬声器1861,由扬声器1861转换为声音信号输出;另一方面,传声器1862将收集的声音信号转换为电信号,由音频电路1860接收后转换为音频数据,再将音频数据输出处理器1880处理后,经RF电路1810以发送给比如另一手机,或者将音频数据输出至存储器1820以便进一步处理。An audio circuit 1860, a speaker 1861, and a microphone 1862 can provide an audio interface between the user and the handset. The audio circuit 1860 can transmit the converted electrical data of the received audio data to the speaker 1861, and convert it into a sound signal output by the speaker 1861; on the other hand, the microphone 1862 converts the collected sound signal into an electrical signal, by the audio circuit 1860. After receiving, it is converted into audio data, and then processed by the audio data output processor 1880, transmitted to the other mobile phone via the RF circuit 1810, or outputted to the memory 1820 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块1870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图18示出了WiFi模块1870,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology. The mobile phone through the WiFi module 1870 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access. Although FIG. 18 shows the WiFi module 1870, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
处理器1880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1820内的软件程序和/或模块,以及调用存储在存储器1820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1880可包括一个或多个处理单元;优选的,处理器1880可集成应用处理器和调制解调处理器, 其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1880中。The processor 1880 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1820, and by invoking data stored in the memory 1820, The phone's various functions and processing data, so that the overall monitoring of the phone. Optionally, the processor 1880 may include one or more processing units; preferably, the processor 1880 may integrate an application processor and a modem processor. The application processor mainly processes an operating system, a user interface, an application, and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 1880.
手机还包括给各个部件供电的电源1890(比如电池),优选的,电源可以通过电源管理系统与处理器1880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1890 (such as a battery) for powering various components. Preferably, the power supply can be logically coupled to the processor 1880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
上述方法实施例中终端的结构可以基于图18所示的结构,图18所示的终端结构可以对应的执行上述方法实施例中的步骤,此处不再一一赘述。The structure of the terminal in the foregoing method embodiment may be based on the structure shown in FIG. 18. The terminal structure shown in FIG. 18 may perform the steps in the foregoing method embodiment, and details are not described herein again.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product.
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。 The terms "first", "second", "third", "fourth", etc. (if present) in the specification and claims of the present application and the above figures are used to distinguish similar objects without having to use To describe a specific order or order. It is to be understood that the data so used may be interchanged where appropriate so that the embodiments described herein can be implemented in a sequence other than what is illustrated or described herein. In addition, the terms "comprises" and "comprises" and "the" and "the" are intended to cover a non-exclusive inclusion, for example, a process, method, system, product, or device that comprises a series of steps or units is not necessarily limited to Those steps or units may include other steps or units not explicitly listed or inherent to such processes, methods, products or devices.

Claims (60)

  1. 一种更新联系人的名片的方法,其特征在于,包括:A method for updating a business card of a contact, comprising:
    第一终端向服务器发送第一名片请求,所述第一名片请求用于获取本地联系人中第一联系人的最新名片,所述最新名片为所述服务器从第二终端获取的名片,所述第二终端为所述第一联系人的终端,所述最新名片包括用户名、通信号码;The first terminal sends a first business card request to the server, where the first business card is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal, The second terminal is a terminal of the first contact, and the latest business card includes a user name and a communication number;
    所述第一终端接收所述服务器发送的最新名片;Receiving, by the first terminal, the latest business card sent by the server;
    所述第一终端根据所述最新名片,更新所述第一终端保存的所述第一联系人的历史名片。Updating, by the first terminal, the historical business card of the first contact saved by the first terminal according to the latest business card.
  2. 根据权利要求1所述的方法,其特征在于,所述第一联系人为在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人。The method according to claim 1, wherein the first contact is a contact that has a number of communications with the first terminal that is less than a first threshold within a preset duration.
  3. 根据权利要求1所述的方法,其特征在于,所述第一联系人为不常用联系人群组中的联系人,所述不常用联系人群组为所述服务器确定的第一不常用联系人和第二不常用联系人的并集或交集,所述第一不常用联系人为所述第一终端向所述服务器发送的在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人,所述第二不常用联系人为所述服务器保存的在接收所述第一不常用联系人之前的不常用联系人。The method according to claim 1, wherein the first contact is a contact in an infrequent contact group, and the infrequent contact group is a first infrequent contact determined by the server. And the union or intersection of the second infrequent contacts, wherein the first infrequent contact is within the preset duration sent by the first terminal to the server, and the number of communications with the first terminal is less than a first threshold contact, the second infrequent contact being an infrequent contact saved by the server before receiving the first infrequent contact.
  4. 根据权利要求1-3任一所述的方法,其特征在于,所述第一终端向服务器发送第一名片请求,包括:The method according to any one of claims 1-3, wherein the first terminal sends a first business card request to the server, including:
    若所述第一终端向所述第二终端发起的通信失败,则所述第一终端向所述服务器发送第一名片请求;If the communication initiated by the first terminal to the second terminal fails, the first terminal sends a first business card request to the server;
    所述方法还包括:The method further includes:
    所述第一终端根据所述最新名片与所述第二终端进行通信。The first terminal communicates with the second terminal according to the latest business card.
  5. 根据权利要求1-4任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    若所述第一终端的本机名片发生更新,则所述第一终端向所述服务器发送已更新的本机名片;If the local business card of the first terminal is updated, the first terminal sends the updated local business card to the server;
    所述第一终端接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人;Receiving, by the first terminal, a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server;
    所述第一终端通过所述服务器向所述第二终端发送所述已更新的本机名片。The first terminal sends the updated local business card to the second terminal by using the server.
  6. 根据权利要求1-5任一所述的方法,其特征在于,所述方法还包括:The method of any of claims 1-5, wherein the method further comprises:
    所述第一终端在所述本地联系人中新建第二联系人的名片;The first terminal creates a business card of the second contact in the local contact;
    若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述第一终端通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。If the number of communications between the first terminal and the third terminal is greater than a second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal The terminal is a terminal of the second contact.
  7. 根据权利要求1-6任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 6, wherein the method further comprises:
    所述第一终端将第一通信号码加入黑名单;The first terminal adds the first communication number to the blacklist;
    所述第一终端向所述服务器发送更新黑名单请求;Sending, by the first terminal, an update blacklist request to the server;
    所述第一终端接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单; Receiving, by the first terminal, a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server;
    所述第一终端根据所述查询结果,更新所述黑名单。The first terminal updates the blacklist according to the query result.
  8. 根据权利要求7所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 7, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述第一终端显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays first prompt information, where the first prompt information is used to prompt the user whether the first The communication number is removed from the blacklist;
    所述第一终端响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The first terminal removes the first communication number from the blacklist in response to the removal operation input by the user.
  9. 根据权利要求7所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 7, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述第一终端将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。If the query result indicates that the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is not in the foregoing The communication number in the blacklist of a terminal.
  10. 根据权利要求7-9任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 7-9, wherein the method further comprises:
    若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述第一终端向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。If the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number. .
  11. 根据权利要求1-10任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 10, wherein the method further comprises:
    所述第一终端接收所述服务器发送的第二名片请求;Receiving, by the first terminal, a second business card request sent by the server;
    所述第一终端根据所述第二名片请求,向所述服务器上传所述本机名片。The first terminal uploads the local business card to the server according to the second business card request.
  12. 一种更新联系人的名片的方法,其特征在于,包括:A method for updating a business card of a contact, comprising:
    若第一终端的本机名片发生更新,则所述第一终端向服务器发送已更新的本机名片;If the local business card of the first terminal is updated, the first terminal sends the updated local business card to the server;
    所述第一终端接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人;Receiving, by the first terminal, a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server;
    所述第一终端通过所述服务器向所述第二终端发送所述已更新的本机名片。The first terminal sends the updated local business card to the second terminal by using the server.
  13. 根据权利要求12所述的方法,其特征在于,所述方法还包括:The method of claim 12, wherein the method further comprises:
    所述第一终端在所述本地联系人中新建第二联系人的名片;The first terminal creates a business card of the second contact in the local contact;
    若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述第一终端通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。If the number of communications between the first terminal and the third terminal is greater than a second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal The terminal is a terminal of the second contact.
  14. 根据权利要求12或13所述的方法,其特征在于,所述方法还包括:The method according to claim 12 or 13, wherein the method further comprises:
    所述第一终端将第一通信号码加入黑名单;The first terminal adds the first communication number to the blacklist;
    所述第一终端向所述服务器发送更新黑名单请求;Sending, by the first terminal, an update blacklist request to the server;
    所述第一终端接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单;Receiving, by the first terminal, a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server;
    所述第一终端根据所述查询结果,更新所述黑名单。The first terminal updates the blacklist according to the query result.
  15. 根据权利要求14所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 14, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述第一终端显 示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays The first prompt information is used to prompt the user whether to remove the first communication number from the blacklist;
    所述第一终端响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The first terminal removes the first communication number from the blacklist in response to the removal operation input by the user.
  16. 根据权利要求14所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 14, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述第一终端将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。If the query result indicates that the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is not in the foregoing The communication number in the blacklist of a terminal.
  17. 根据权利要求14-16任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 14-16, wherein the method further comprises:
    若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述第一终端向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。If the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number. .
  18. 根据权利要求12-17任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 12-17, wherein the method further comprises:
    所述第一终端接收所述服务器发送的第二名片请求;Receiving, by the first terminal, a second business card request sent by the server;
    所述第一终端根据所述第二名片请求,向所述服务器上传所述本机名片。The first terminal uploads the local business card to the server according to the second business card request.
  19. 一种更新联系人的名片的方法,其特征在于,包括:A method for updating a business card of a contact, comprising:
    第一终端在本地联系人中新建第二联系人的名片;The first terminal creates a business card of the second contact in the local contact;
    若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述第一终端通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。If the number of communications between the first terminal and the third terminal is greater than a second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal The terminal is a terminal of the second contact.
  20. 根据权利要求19所述的方法,其特征在于,所述方法还包括:The method of claim 19, wherein the method further comprises:
    所述第一终端将第一通信号码加入黑名单;The first terminal adds the first communication number to the blacklist;
    所述第一终端向所述服务器发送更新黑名单请求;Sending, by the first terminal, an update blacklist request to the server;
    所述第一终端接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单;Receiving, by the first terminal, a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server;
    所述第一终端根据所述查询结果,更新所述黑名单。The first terminal updates the blacklist according to the query result.
  21. 根据权利要求20所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 20, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述第一终端显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays first prompt information, where the first prompt information is used to prompt the user whether the first The communication number is removed from the blacklist;
    所述第一终端响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The first terminal removes the first communication number from the blacklist in response to the removal operation input by the user.
  22. 根据权利要求20所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 20, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述第一终端将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。If the query result indicates that the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is not in the foregoing The communication number in the blacklist of a terminal.
  23. 根据权利要求20-22任一所述的方法,其特征在于,所述方法还包括: The method according to any one of claims 20-22, wherein the method further comprises:
    若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述第一终端向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。If the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number. .
  24. 根据权利要求19-23任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 19 to 23, wherein the method further comprises:
    所述第一终端接收所述服务器发送的第二名片请求;Receiving, by the first terminal, a second business card request sent by the server;
    所述第一终端根据所述第二名片请求,向所述服务器上传所述本机名片。The first terminal uploads the local business card to the server according to the second business card request.
  25. 一种更新联系人的名片的方法,其特征在于,包括:A method for updating a business card of a contact, comprising:
    第一终端将第一通信号码加入黑名单;The first terminal adds the first communication number to the blacklist;
    所述第一终端向所述服务器发送更新黑名单请求;Sending, by the first terminal, an update blacklist request to the server;
    所述第一终端接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单;Receiving, by the first terminal, a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server;
    所述第一终端根据所述查询结果,更新所述黑名单。The first terminal updates the blacklist according to the query result.
  26. 根据权利要求25所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 25, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述第一终端显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays first prompt information, where the first prompt information is used to prompt the user whether the first The communication number is removed from the blacklist;
    所述第一终端响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The first terminal removes the first communication number from the blacklist in response to the removal operation input by the user.
  27. 根据权利要求25所述的方法,其特征在于,所述第一终端根据所述查询结果,更新所述黑名单,包括:The method according to claim 25, wherein the updating, by the first terminal, the blacklist according to the query result comprises:
    若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述第一终端将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。If the query result indicates that the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is not in the foregoing The communication number in the blacklist of a terminal.
  28. 根据权利要求25-27任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 25-27, wherein the method further comprises:
    若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述第一终端向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。If the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number. .
  29. 根据权利要求25-28任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 25-28, wherein the method further comprises:
    所述第一终端接收所述服务器发送的第二名片请求;Receiving, by the first terminal, a second business card request sent by the server;
    所述第一终端根据所述第二名片请求,向所述服务器上传所述本机名片。The first terminal uploads the local business card to the server according to the second business card request.
  30. 一种终端,其特征在于,包括:A terminal, comprising:
    存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;a memory, a transceiver, a processor, and a bus, the memory, the transceiver, and the processor being connected by the bus;
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述收发器,用于向服务器发送第一名片请求,所述第一名片请求用于获取本地联系人中第一联系人的最新名片,所述最新名片为所述服务器从第二终端获取的名片,所述第二终端为所述第一联系人的终端,所述最新名片包括用户名、通信号码;接收所述服务器发送的最新名片;The transceiver is configured to send a first business card request to the server, where the first business card request is used to obtain a latest business card of the first contact in the local contact, where the latest business card is obtained by the server from the second terminal. a business card, the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number; and receives the latest business card sent by the server;
    所述处理器,用于调用所述操作指令,根据所述最新名片,更新所述第一终端保存的 所述第一联系人的历史名片。The processor is configured to invoke the operation instruction, and update the saved by the first terminal according to the latest business card The historical business card of the first contact.
  31. 根据权利要求30所述的终端,其特征在于,所述第一联系人为在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人。The terminal according to claim 30, wherein the first contact is a contact that has less than a first threshold for communication with the first terminal within a preset duration.
  32. 根据权利要求30所述的终端,其特征在于,所述第一联系人为不常用联系人群组中的联系人,所述不常用联系人群组为所述服务器确定的第一不常用联系人和第二不常用联系人的并集或交集,所述第一不常用联系人为所述第一终端向所述服务器发送的在预置时长内,与所述第一终端发生的通信次数少于第一阈值的联系人,所述第二不常用联系人为所述服务器保存的在接收所述第一不常用联系人之前的不常用联系人。The terminal according to claim 30, wherein the first contact is a contact in an infrequent contact group, and the infrequent contact group is a first infrequent contact determined by the server. And the union or intersection of the second infrequent contacts, wherein the first infrequent contact is within the preset duration sent by the first terminal to the server, and the number of communications with the first terminal is less than a first threshold contact, the second infrequent contact being an infrequent contact saved by the server before receiving the first infrequent contact.
  33. 根据权利要求30-32任一所述的终端,其特征在于,A terminal according to any of claims 30-32, characterized in that
    所述收发器,具体用于若所述第一终端向所述第二终端发起的通信失败,则所述收发器向所述服务器发送第一名片请求;The transceiver is specifically configured to: if the communication initiated by the first terminal to the second terminal fails, the transceiver sends a first business card request to the server;
    所述处理器,还用于根据所述最新名片与所述第二终端进行通信。The processor is further configured to communicate with the second terminal according to the latest business card.
  34. 根据权利要求30-33任一所述的终端,其特征在于,A terminal according to any of claims 30-33, characterized in that
    所述收发器,还用于若所述第一终端的本机名片发生更新,则所述收发器向所述服务器发送已更新的本机名片;接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人;通过所述服务器向所述第二终端发送所述已更新的本机名片。The transceiver is further configured to: if the local business card of the first terminal is updated, the transceiver sends the updated local business card to the server; and receives a local contact sent by the server, The local contact is a contact of the first terminal saved by the server; and the updated local business card is sent to the second terminal by the server.
  35. 根据权利要求30-34任一所述的终端,其特征在于,A terminal according to any of claims 30-34, characterized in that
    所述处理器,还用于在所述本地联系人中新建第二联系人的名片;The processor is further configured to create a business card of the second contact in the local contact;
    所述收发器,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述收发器通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
  36. 根据权利要求30-35任一所述的终端,其特征在于,A terminal according to any of claims 30-35, characterized in that
    所述处理器,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processor is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
    所述收发器,用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The transceiver is configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  37. 根据权利要求36所述的终端,其特征在于,The terminal according to claim 36, characterized in that
    所述处理器,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述处理器显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processor is configured to: when the query result indicates that the first communication number is not in the operator blacklist, the processor displays first prompt information, where the first prompt information is used for prompting Whether the user removes the first communication number from the blacklist; in response to the removal operation input by the user, the first communication number is removed from the blacklist.
  38. 根据权利要求36所述的终端,其特征在于,The terminal according to claim 36, characterized in that
    所述处理器,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述处理器将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processor is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processor adds the second communication number to the blacklist, the second communication The number is a communication number that was not previously in the blacklist of the first terminal.
  39. 根据权利要求36-38任一所述的终端,其特征在于, A terminal according to any of claims 36-38, characterized in that
    所述收发器,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述收发器向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The transceiver is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the transceiver initiates a marked data request to the server, and the communication number of the fourth terminal Is the first communication number.
  40. 根据权利要求30-39任一所述的终端,其特征在于,A terminal according to any of claims 30-39, characterized in that
    所述收发器,还用于接收所述服务器发送的第二名片请求;根据所述第二名片请求,向所述服务器上传所述本机名片。The transceiver is further configured to receive a second business card request sent by the server, and upload the local business card to the server according to the second business card request.
  41. 一种终端,其特征在于,包括:A terminal, comprising:
    存储器、收发器和总线,所述存储器和所述收发器通过所述总线连接;a memory, a transceiver, and a bus, the memory and the transceiver being connected by the bus;
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述收发器,用于若第一终端的本机名片发生更新,则所述收发器向服务器发送已更新的本机名片;接收所述服务器发送的本地联系人,所述本地联系人为所述服务器保存的所述第一终端的联系人;通过所述服务器向所述第二终端发送所述已更新的本机名片。The transceiver is configured to: if the local business card of the first terminal is updated, the transceiver sends the updated local business card to the server; and receives a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server; sending, by the server, the updated local business card to the second terminal.
  42. 根据权利要求41所述的终端,其特征在于,所述终端还包括处理器,The terminal according to claim 41, wherein the terminal further comprises a processor,
    所述处理器,还用于在所述本地联系人中新建第二联系人的名片;The processor is further configured to create a business card of the second contact in the local contact;
    所述收发器,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述收发器通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
  43. 根据权利要求41或42所述的终端,其特征在于,A terminal according to claim 41 or 42, wherein
    所述处理器,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processor is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
    所述收发器,用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The transceiver is configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  44. 根据权利要求43所述的终端,其特征在于,The terminal according to claim 43, wherein:
    所述处理器,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述处理器显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processor is configured to: when the query result indicates that the first communication number is not in the operator blacklist, the processor displays first prompt information, where the first prompt information is used for prompting Whether the user removes the first communication number from the blacklist; in response to the removal operation input by the user, the first communication number is removed from the blacklist.
  45. 根据权利要求43所述的终端,其特征在于,The terminal according to claim 43, wherein:
    所述处理器,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述处理器将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processor is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processor adds the second communication number to the blacklist, the second communication The number is a communication number that was not previously in the blacklist of the first terminal.
  46. 根据权利要求43-45任一所述的终端,其特征在于,A terminal according to any of claims 43-45, characterized in that
    所述收发器,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述收发器向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The transceiver is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the transceiver initiates a marked data request to the server, and the communication number of the fourth terminal Is the first communication number.
  47. 根据权利要求41-46任一所述的终端,其特征在于,A terminal according to any of claims 41-46, characterized in that
    所述收发器,还用于接收所述服务器发送的第二名片请求;根据所述第二名片请求, 向所述服务器上传所述本机名片。The transceiver is further configured to receive a second business card request sent by the server; according to the second business card request, Uploading the local business card to the server.
  48. 一种终端,其特征在于,包括:A terminal, comprising:
    存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;a memory, a transceiver, a processor, and a bus, the memory, the transceiver, and the processor being connected by the bus;
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述处理器,用于调用所述存储操作指令,在所述本地联系人中新建第二联系人的名片;The processor is configured to invoke the storage operation instruction, and create a business card of the second contact in the local contact;
    所述收发器,还用于若所述第一终端与第三终端发生的通信次数大于第二阈值,则所述收发器通过所述服务器向所述第三终端发送所述第一终端的本机名片,所述第三终端为所述第二联系人的终端。The transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
  49. 根据权利要求48所述的终端,其特征在于,A terminal according to claim 48, characterized in that
    所述处理器,还用于将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单;The processor is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
    所述收发器,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The transceiver is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  50. 根据权利要求49所述的终端,其特征在于,The terminal according to claim 49, characterized in that
    所述处理器,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述处理器显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processor is configured to: when the query result indicates that the first communication number is not in the operator blacklist, the processor displays first prompt information, where the first prompt information is used for prompting Whether the user removes the first communication number from the blacklist; in response to the removal operation input by the user, the first communication number is removed from the blacklist.
  51. 根据权利要求49所述的终端,其特征在于,The terminal according to claim 49, characterized in that
    所述处理器,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述处理器将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processor is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processor adds the second communication number to the blacklist, the second communication The number is a communication number that was not previously in the blacklist of the first terminal.
  52. 根据权利要求49-51任一所述的终端,其特征在于,A terminal according to any of claims 49-51, characterized in that
    所述收发器,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述收发器向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The transceiver is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the transceiver initiates a marked data request to the server, and the communication number of the fourth terminal Is the first communication number.
  53. 根据权利要求48-52任一所述的终端,其特征在于,A terminal according to any of claims 48-52, characterized in that
    所述收发器,还用于接收所述服务器发送的第二名片请求;根据所述第二名片请求,向所述服务器上传所述本机名片。The transceiver is further configured to receive a second business card request sent by the server, and upload the local business card to the server according to the second business card request.
  54. 一种终端,其特征在于,包括:A terminal, comprising:
    存储器、收发器、处理器和总线,所述存储器、所述收发器和所述处理器通过所述总线连接;a memory, a transceiver, a processor, and a bus, the memory, the transceiver, and the processor being connected by the bus;
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述处理器,用于调用所述存储操作指令,将第一通信号码加入黑名单;根据所述查询结果,更新所述黑名单; The processor is configured to invoke the storage operation instruction to add a first communication number to a blacklist; and update the blacklist according to the query result;
    所述收发器,还用于向所述服务器发送更新黑名单请求;接收所述服务器发送的查询结果,所述查询结果为所述服务器从运营商服务端确认的运营商黑名单。The transceiver is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  55. 根据权利要求54所述的终端,其特征在于,The terminal of claim 54 wherein:
    所述处理器,具体用于若所述查询结果指示所述第一通信号码未在所述运营商黑名单中,则所述处理器显示第一提示信息,所述第一提示信息用于提示用户是否将所述第一通信号码从所述黑名单移除;响应所述用户输入的移除操作,从所述黑名单中移除所述第一通信号码。The processor is configured to: when the query result indicates that the first communication number is not in the operator blacklist, the processor displays first prompt information, where the first prompt information is used for prompting Whether the user removes the first communication number from the blacklist; in response to the removal operation input by the user, the first communication number is removed from the blacklist.
  56. 根据权利要求54所述的终端,其特征在于,The terminal of claim 54 wherein:
    所述处理器,具体用于若所述查询结果指示第二通信号码在所述运营商黑名单中,则所述处理器将所述第二通信号码加入所述黑名单,所述第二通信号码为之前不在所述第一终端的黑名单中的通信号码。The processor is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processor adds the second communication number to the blacklist, the second communication The number is a communication number that was not previously in the blacklist of the first terminal.
  57. 根据权利要求54-56任一所述的终端,其特征在于,A terminal according to any of claims 54-56, characterized in that
    所述收发器,还用于若所述第一终端接收第四终端发起的通信次数大于第三阈值,则所述收发器向所述服务器发起被标记数据请求,所述第四终端的通信号码为所述第一通信号码。The transceiver is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the transceiver initiates a marked data request to the server, and the communication number of the fourth terminal Is the first communication number.
  58. 根据权利要求54-57任一所述的终端,其特征在于,A terminal according to any of claims 54-57, characterized in that
    所述收发器,还用于接收所述服务器发送的第二名片请求;根据所述第二名片请求,向所述服务器上传所述本机名片。The transceiver is further configured to receive a second business card request sent by the server, and upload the local business card to the server according to the second business card request.
  59. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求1-29任意一项所述的方法。A computer readable storage medium comprising instructions which, when executed on a terminal, cause the terminal to perform the method of any of claims 1-29.
  60. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求1-29任意一项所述的方法。 A computer readable storage medium comprising instructions which, when executed on a terminal, cause the terminal to perform the method of any of claims 1-29.
PCT/CN2017/100518 2017-06-16 2017-09-05 Method for updating business card of contact and terminal WO2018227785A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710459555.6 2017-06-16
CN201710459555 2017-06-16

Publications (1)

Publication Number Publication Date
WO2018227785A1 true WO2018227785A1 (en) 2018-12-20

Family

ID=64658942

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100518 WO2018227785A1 (en) 2017-06-16 2017-09-05 Method for updating business card of contact and terminal

Country Status (1)

Country Link
WO (1) WO2018227785A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745711A (en) * 2022-03-28 2022-07-12 闻泰通讯股份有限公司 Method and device for sending cloud business card, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753725A (en) * 2008-12-17 2010-06-23 深圳Tcl新技术有限公司 System for blacklist processing, method and device therefor
CN103248655A (en) * 2012-02-10 2013-08-14 腾讯科技(深圳)有限公司 Method and device for business card information updating
CN105100206A (en) * 2015-06-15 2015-11-25 北京奇虎科技有限公司 Method, equipment and system for pushing business card
CN106254635A (en) * 2016-07-26 2016-12-21 惠州市斯坦利科技有限公司 Call information method for pushing and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753725A (en) * 2008-12-17 2010-06-23 深圳Tcl新技术有限公司 System for blacklist processing, method and device therefor
CN103248655A (en) * 2012-02-10 2013-08-14 腾讯科技(深圳)有限公司 Method and device for business card information updating
CN105100206A (en) * 2015-06-15 2015-11-25 北京奇虎科技有限公司 Method, equipment and system for pushing business card
CN106254635A (en) * 2016-07-26 2016-12-21 惠州市斯坦利科技有限公司 Call information method for pushing and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745711A (en) * 2022-03-28 2022-07-12 闻泰通讯股份有限公司 Method and device for sending cloud business card, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US10581774B2 (en) Method, terminal and computer storage medium for group sending message in instant communication
US10691703B2 (en) User recommendation method and system in SNS community, and computer storage medium
US9813538B2 (en) Malicious call recognition method and apparatus
US10958459B2 (en) Method and apparatus for processing group chat message
JP6461173B2 (en) Message withdrawal method and apparatus
EP3200487B1 (en) Message processing method and apparatus
US10587741B2 (en) Communication event processing method and apparatus
CN107346397B (en) Information processing method and related product
WO2018120905A1 (en) Message reminding method for terminal, and terminal
JP2018529138A (en) Picture combining method, terminal, and picture combining system
JP2019502190A (en) Information push method, device and system, and computer storage medium
CN104683301B (en) Password storage method and device
TW201502986A (en) Apparatus, system and method of showing notifications of web browser application
WO2015024372A1 (en) Communication initiation method, apparatus, and mobile terminal
CN107360179B (en) Risk information sharing method, terminal and computer readable storage medium
TW201839624A (en) Method for transmitting information, method for displaying information, terminal, server, system and storage medium
CN106020945B (en) Shortcut item adding method and device
WO2015024393A1 (en) Method, apparatus, and terminal for sending sms message
TW201531945A (en) Method, device and system for providing service based on application
CN110351101B (en) Group invitation processing method, system and mobile terminal
WO2018133284A1 (en) Prompting method, terminal, and server
WO2018129804A1 (en) Method, cloud platform and terminal for synchronizing call records
JP2020535774A (en) Notification message processing method and terminal
WO2018227785A1 (en) Method for updating business card of contact and terminal
US20160307216A1 (en) Electronic information collection method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17913341

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17913341

Country of ref document: EP

Kind code of ref document: A1