WO2018227785A1 - Procédé de mise à jour de carte de visite de contact et terminal - Google Patents

Procédé de mise à jour de carte de visite de contact et terminal Download PDF

Info

Publication number
WO2018227785A1
WO2018227785A1 PCT/CN2017/100518 CN2017100518W WO2018227785A1 WO 2018227785 A1 WO2018227785 A1 WO 2018227785A1 CN 2017100518 W CN2017100518 W CN 2017100518W WO 2018227785 A1 WO2018227785 A1 WO 2018227785A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
business card
blacklist
contact
Prior art date
Application number
PCT/CN2017/100518
Other languages
English (en)
Chinese (zh)
Inventor
代栓青
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018227785A1 publication Critical patent/WO2018227785A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present application relates to the field of terminal applications, and in particular, to a method and a terminal for updating a business card of a contact.
  • the terminal can send update information to the friend's terminal through the system application (Wireless Local Area Networks (WLAN) direct connection, Bluetooth sharing, etc.) provided by itself or the third-party application (WeChat, QQ, etc.), which can realize real-time dynamic Share data with each other.
  • system application Wireless Local Area Networks (WLAN) direct connection, Bluetooth sharing, etc.
  • third-party application WeChat, QQ, etc.
  • the contacts stored in the existing terminal, the local business card, the blacklist, and the data stored in the cloud server are independent of each other, and are not managed and optimized. For example, after a contact card's business card (such as mobile phone number, email address, etc.) is updated, the friend in the address book does not know that the business card data has been updated, which may result in failure to contact, etc., and the contact card of the terminal is not updated in time, the user The experience is relatively poor.
  • a contact card's business card such as mobile phone number, email address, etc.
  • the embodiment of the present application provides a method, a terminal, and a server for updating a business card of a contact, which are used for data sharing between the terminal and the cloud server, so as to achieve the purpose of updating the business card of the local contact in time.
  • a first aspect of the present application provides a method for updating a business card of a contact, which may include: the first terminal sends a first business card request to the server, where the first business card request is used to obtain the first contact of the local contact
  • the latest business card is a business card obtained by the server from the second terminal, the second terminal is the terminal of the first contact, the latest business card may include a user name and a communication number;
  • the first terminal receives the sending by the server The latest business card;
  • the first terminal updates the historical business card of the first contact saved by the first terminal according to the latest business card. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact.
  • the latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server.
  • the updated local business card (the latest business card) is sent to the server.
  • the server can directly query the first business card.
  • the corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal.
  • the first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
  • the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts.
  • the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration.
  • the first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may both be empirical values, which are determined by the user.
  • the first contact is a contact in an inactive contact group
  • the inactive contact group is a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold
  • the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact.
  • the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server.
  • the first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server.
  • a common contact before the first favorite contact is received.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
  • the first terminal sends a first business card request to the server, where The method includes: if the communication initiated by the first terminal to the second terminal fails, the first terminal sends a first business card request to the server; the method may further include: the first terminal according to the latest business card and the second terminal Communicate. It should be understood that, when the first terminal initiates a communication request to the business card corresponding terminal that saves the first contact, the request fails, specifically, the call request is initiated; then, the first terminal may initiate a first business card request to the server, and the first business card Request the latest business card used to request the first contact.
  • the first terminal When the first terminal receives the latest business card sent by the server, the first terminal can communicate with the second terminal by using the communication number in the latest business card, which can provide a good communication service for the user, and does not change the business card of the contact. And can't contact each other.
  • the method may further include: if the first terminal is If the business card is updated, the first terminal sends the updated local business card to the server; the first terminal receives the local contact sent by the server, and the local contact is the contact of the first terminal saved by the server; The first terminal sends the updated local business card to the second terminal through the server.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: the first terminal is in the local a new business card of the second contact is set in the contact; if the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local device of the first terminal to the third terminal by using the server The business card, the third terminal is the terminal of the second contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal's local business card may be more easily found, and the first terminal The user of the terminal contacts.
  • the method may further include: the first terminal The communication number is added to the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal receives If the number of communications initiated by the fourth terminal is greater than the third threshold, the first terminal initiates a marked data request to the server, and the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal can take the initiative Uploading the business card to the server, or receiving the business card request sent by the server, and then uploading the business card to the server provides an achievable way.
  • the second aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a first business card request sent by the first terminal, where the first business card request is used to obtain the first contact in the local contact
  • the latest business card, the latest business card may include a user name and a communication number; the server acquires the latest business card from the second terminal, the second terminal is the terminal of the first contact; the server sends the latest business card to the first terminal,
  • the latest business card is used to update the historical business card of the first contact saved by the first terminal. It should be understood that the latest business card of the first contact may or may not be the same as the historical business card of the first contact.
  • the latest business card of the first contact may be a server that sends a first business card request to the second terminal, and the second terminal uploads the local business card to the server.
  • the updated local business card (the latest business card) is sent to the server.
  • the server can directly query the first business card.
  • the corresponding business card is requested, and the latest business card reported to the server by the second terminal is returned to the first terminal.
  • the first terminal may update the historical business card of the first contact saved locally according to the latest business card of the first contact, so that the business card of the contact saved by the first terminal is kept in the latest state, facilitating the connection between the user and the local contact. People contact.
  • the first contact is within a preset duration, and the number of communications with the first terminal is less than A threshold of contacts.
  • the first contact is obtained by the common contact and the local contact, and the common contact is a contact that is greater than the second threshold when the number of communications with the first terminal is within a preset duration.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the first terminal, and the preset duration, the first threshold, and the second threshold may be used. It is the experience value, which is determined by the user.
  • the first contact is a contact in an infrequent contact group, and the infrequent contact group a union or intersection of the first infrequent contact and the second infrequent contact determined by the server, where the first infrequent contact is within the preset duration sent by the first terminal to the server, and the first The number of communications that occurs in the terminal is less than the first threshold, and the second infrequent contact is the infrequent contact that is saved by the server before receiving the first infrequent contact.
  • the first contact is obtained by the common contact group and the local contact set, and the common contact group is a union or intersection of the first common contact and the second common contact determined by the server.
  • the first common contact is a contact that is sent by the first terminal to the server within a preset duration, and the number of communications with the first terminal is greater than a second threshold, where the second common contact is saved by the server.
  • a common contact before the first favorite contact is received.
  • An explanation is provided for the first contact, and an optional implementation is provided in the embodiment of the present application.
  • the first contact may be determined by the server, and the preset duration, the first threshold, and the second threshold may be experiences. The value is determined by the user.
  • the method may further include: the server receiving the first terminal Sending an updated local business card; the server sends a local contact to the first terminal, where the local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the first terminal to send The updated local business card, the updated local business card includes a username, a terminal communication number; the server sends the updated local to the second terminal business card.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like. Because the local business card of the first terminal is updated, after the first terminal sends the updated local business card to the second terminal through the server, the local contact saved by the first terminal can be effectively prevented from contacting the user corresponding to the first terminal.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: receiving, by the server, the first terminal The local business card; the server sends the local business card to the second terminal, where the local business card is used for saving the second terminal in the business card of the local contact.
  • the server sends the local business card to the second terminal, where the local business card is used for saving the second terminal in the business card of the local contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving the first terminal
  • the updated blacklist request is sent, and the update blacklist request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number in the local contact or Landline number.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal.
  • the first terminal can actively upload the local business card to the server, It can provide a business card request sent by the server, and then upload the local business card to the server, providing an achievable way.
  • the third aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: if the local business card of the first terminal is updated, the first terminal sends the updated local business card to the server; The first terminal receives a local contact sent by the server, and the local contact is a contact of the first terminal saved by the server; the first terminal sends the updated local business card to the second terminal by using the server.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: the first terminal newly creating a business card of the second contact in the local contact If the number of communications between the first terminal and the third terminal is greater than the second threshold, the first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the second The terminal of the contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the first terminal: the first communication
  • the number is added to the blacklist; it should be understood that the first communication number can be a strange number, or it can be a mobile number or a landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set. The operator server can return the query result to the server, and the server feeds back the result to the first terminal. The first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal updating the blacklist may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal may include: If the query result refers to If the second communication number is in the operator blacklist, the first terminal adds the second communication number to the blacklist, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal And receiving, by the fourth terminal, the number of communications initiated by the fourth terminal is greater than a third threshold, the first terminal initiates a marked data request to the server, where the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • a fourth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: the server receiving an updated local business card sent by the first terminal; the server sending a local contact to the first terminal,
  • the local contact is a contact that is uploaded before the update of the local business card of the first terminal; the server receives the updated local business card sent by the first terminal, and the updated local business card includes the user name and the terminal communication. Number; the server sends the updated local business card to the second terminal.
  • the updated local business card may also be referred to as the latest business card, and the specific updated content may include information such as a landline number, a mobile phone number, an email address, an office address, and the like.
  • the second terminal may be a terminal of at least one of the first terminal local contacts.
  • the method may further include: receiving, by the server, the local business card sent by the first terminal; Sending the local business card, the local business card is used for saving the second terminal in the business card of the local contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving the update black sent by the first terminal
  • the list request includes the first communication number that the first terminal joins the blacklist; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact.
  • the server is based on the update black name
  • the single request, the cloud blacklist is updated; the server determines the target communication number, and the target communication number is the communication number of the blacklist in which the same communication number is added to the blacklist, and the number of times the blacklist is greater than the third threshold; the server serves the operator.
  • the terminal queries the first marked data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, where the first query result is used Update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server sending the second business card to the first terminal Request; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the fifth aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal newly creates a business card of the second contact in the local contact; if the first terminal and the third terminal occur The first terminal sends the local business card of the first terminal to the third terminal by using the server, and the third terminal is the terminal of the second contact.
  • the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the first terminal adds the first communication number to the blacklist;
  • a communication number can be a strange number, or it can be a mobile number or a landline number in a local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set. Query the operator server to further determine the marked information of the target number set.
  • the carrier server can return the query result.
  • the server sends the feedback to the first terminal, and the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: If the query result indicates that the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to use the first communication number from the blacklist. Removing; the first terminal removes the first communication number from the blacklist in response to the removal operation input by the user. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal, according to the query result, updating the blacklist may include: If the query result indicates that the second communication number is in the blacklist of the operator, the first terminal adds the second communication number to the blacklist, where the second communication number is not in the blacklist of the first terminal. Communication number. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first And the first terminal sends a marked data request to the server, where the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner.
  • the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • a sixth aspect of the embodiments of the present application provides a method for updating a business card of a contact, which may include: receiving, by the server, a local business card sent by the first terminal; the server sending the local business card to the second terminal, where the local business card is used The second terminal is saved in the business card of the local contact.
  • a business card of a contact is newly created in the local contact of the first terminal, but it may not be communicated with the new contact, the new local business card of the first terminal may not be sent to the terminal corresponding to the newly created contact.
  • the first terminal may send the local business card of the first terminal to the terminal corresponding to the newly created contact, and the next time the communication is performed, the first terminal may be more easily found.
  • the method may further include: the server receiving an update blacklist request sent by the first terminal, the update black List request package
  • the first communication number that the first terminal joins the blacklist is included; it should be understood that the first communication number may be a strange number, or may be a mobile number or a landline number in the local contact.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, the second The data request is marked, the second tagged data request includes a second communication number; the server sends the second tagged data request to the operator server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server is configured to the first terminal Sending a second business card request; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the seventh aspect of the embodiment of the present application provides a method for updating a business card of a contact, which may include: the first terminal adds a first communication number to a blacklist; it should be understood that the first communication number may be a strange number, or Is the mobile number or landline number in the local contact.
  • the first terminal sends an update blacklist request to the server; the first terminal receives the query result sent by the server, and the query result is an operator blacklist confirmed by the server from the operator server; the first terminal according to the query As a result, the blacklist is updated.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the first terminal may include: if the query result indicates the If the first communication number is not in the operator blacklist, the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist; The terminal responds to the user input removal operation from the black The first communication number is removed from the list. It can be understood that the first communication number is in the blacklist of the first terminal, but is not in the operator blacklist returned by the operator, and may remind the user whether to remove it from the blacklist, which may be a user error. Action to blacklist it.
  • the first terminal, according to the query result, updating the blacklist may include: if the query result indicates The second communication number is added to the blacklist by the first terminal, and the second communication number is a communication number that is not in the blacklist of the first terminal. It can be understood that the second communication number is not in the blacklist of the first terminal, but in the operator blacklist returned by the operator, the user may be reminded to add the blacklist to the blacklist, and the query result further confirmed by the operator is The reliability is relatively high, which can prevent users from being deceived.
  • the method may further include: if the first terminal receives the first When the number of communications initiated by the four terminals is greater than the third threshold, the first terminal initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the first terminal receiving the server Sending a second business card request; the first terminal uploads the local business card to the server according to the second business card request.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the eighth aspect of the present application provides a method for updating a business card of a contact, which may include: the method further includes: receiving, by the server, an update blacklist request sent by the first terminal, where the update blacklist request includes the first A terminal joins the first communication number of the blacklist; it should be understood that the first communication number may be a strange number or a mobile number or a landline number in the local contact.
  • the server updates the cloud blacklist according to the update blacklist request; the server determines the target communication number, and the target communication number is the communication number of the blacklist sent by each terminal, and the number of times the same communication number is added to the blacklist is greater than the third threshold;
  • the server queries the operator server for the first tagged data request of the target communication number; the server receives the first query result sent by the operator server; the server sends the first query result to the first terminal, The first query result is used to update the blacklist of the first terminal.
  • Each terminal uploads a local blacklist to the server.
  • the server can determine from the blacklist uploaded by each terminal that the number of users marked as blacklist is greater than the third threshold, and the server sets the target number set.
  • the operator server can return the query result to the server, and the server feeds back the result to the first terminal.
  • the first terminal can update the blacklist according to the query result, and effectively manage the blacklist of the terminal.
  • the method may further include: receiving, by the server, a second tagged data request sent by the first terminal, where Second number of markers A second communication number is included as requested; the server sends the second tagged data request to the carrier server.
  • the embodiment of the present application provides an optional implementation manner. When the first terminal adds the first communication number to the blacklist, but the first communication number initiates multiple communications to the first terminal, the user may misplace the first communication.
  • the first terminal may initiate a tagged data request to the server, and the server may query the operator server to return a query result to the first terminal, where the first terminal
  • the blacklist can be updated based on the results of the query.
  • the method may further include: the server sending the first terminal The second business card requests; the server receives the local business card sent by the first terminal.
  • the first terminal may actively upload the local business card to the server, or may receive the business card request sent by the server, and then upload the local business card to the server, providing an achievable manner.
  • the ninth aspect of the embodiment of the present application provides a terminal, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the tenth aspect of the embodiment of the present application provides a server, which has the function of updating the business card of the local contact in time by sharing data with the cloud server by using the terminal.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • An eleventh embodiment of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to send a first business card request to the server, where the first business card request is used to obtain a latest business card of the first contact in the local contact, where the latest business card is obtained by the server from the second terminal.
  • a business card the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number; and receives the latest business card sent by the server;
  • the processor is configured to invoke the operation instruction, and update a historical business card of the first contact saved by the first terminal according to the latest business card.
  • a twelfth aspect of the embodiments of the present application provides a terminal, which may include:
  • a memory a transceiver, and a bus, the memory and the transceiver being connected by the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to: if the communication number in the local business card of the first terminal is updated, the transceiver sends the updated local business card to the server; and receives the local contact sent by the server, the local The contact is a contact of the first terminal saved by the server; and the updated local business card is sent to the second terminal by the server.
  • a thirteenth aspect of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the storage operation instruction to create a second contact name in the local contact sheet
  • the transceiver is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the transceiver sends the first terminal to the third terminal by using the server The business card, the third terminal is a terminal of the second contact.
  • a fourteenth aspect of the embodiments of the present application provides a terminal, which may include: a memory, a transceiver, a processor, and a bus, where the memory, the transceiver, and the processor are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the storage operation instruction to add a first communication number to a blacklist; and update the blacklist according to the query result;
  • the transceiver is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • a fifteenth aspect of the embodiments of the present application provides a computer readable storage medium having instructions stored therein that, when run on a computer, cause the computer to perform the methods described in the above aspects.
  • the technical solution of the present application or the part that contributes to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a computer software instruction for storing the above device, comprising a program designed to execute the above first aspect, the second aspect is a data node or a management node.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a sixteenth aspect of the present application provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform any of the optional implementations of the first aspect or the first aspect of the present application, or the present application The method of any of the alternative implementations of the second aspect or the second aspect.
  • the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the second business card.
  • a business card acquired by the terminal, the second terminal is a terminal of the first contact, the latest business card includes a user name and a communication number;
  • the first terminal receives a latest business card sent by the server;
  • the first terminal And updating, according to the latest business card, a historical business card of the first contact saved by the first terminal.
  • the data sharing between the terminal and the cloud server achieves the purpose of timely updating the business card of the local contact, and solves the problem that the user cannot contact the user because the user replaces the mobile phone number, and the terminal can save according to the updated business card of the contact.
  • the problem that the manual new contact operation is complicated can be solved.
  • the implementation of the present application can enhance the terminal characteristic competitiveness, improve the terminal usability, and improve the user experience.
  • FIG. 1 is a schematic diagram of a scenario applied to an embodiment of the present application
  • FIG. 2 is a schematic diagram of an embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • 3A is a schematic diagram of an interface of a first terminal logging in to a cloud server
  • 3B is a schematic diagram of a local business card displayed by the first terminal
  • 3C is a schematic diagram of a local contact displayed by the first terminal
  • FIG. 3D is a schematic diagram of the first terminal uploading a local business card and a local contact to the cloud server;
  • 3E is a schematic diagram of a first terminal uploading a local business card to a cloud server
  • 3F is a schematic diagram of a first terminal uploading a local contact to a cloud server
  • FIG. 3G is a schematic diagram showing a recommended upload period of the first terminal
  • FIG. 3H is a schematic diagram of the first terminal acquiring a frequently used contact in the current month
  • FIG. 3I is a schematic diagram of the first terminal acquiring a contact that is not commonly used in the current month
  • FIG. 3J is a schematic diagram of uploading the latest common contacts of the cloud server by the first terminal
  • FIG. 3K is a schematic diagram of uploading the latest unused contacts of the cloud server by the first terminal
  • FIG. 3L is a schematic diagram showing prompt information of a newly created contact by the first terminal
  • 3M is a schematic diagram of a first terminal sending a business card request of a first contact
  • FIG. 3N is a schematic diagram of the second terminal displaying whether to upload a local business card
  • FIG. 3O is a schematic diagram of updating a business card of a local contact by the first terminal
  • FIG. 4 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • 5A is a schematic diagram of a first terminal uploading an updated local business card to a cloud server
  • 5B is a schematic diagram of a first terminal receiving a local contact sent by a cloud server
  • 5C is a schematic diagram of other contacts that are not filtered by the first terminal and are not in the local contact;
  • 5D is a schematic diagram of contacts in a local contact filtered by the first terminal
  • 5E is a schematic diagram of the first terminal sending an updated local business card to other contacts not in the local contact;
  • 5F is a schematic diagram of the first terminal sending an updated local business card to a contact in a local contact
  • 5G is a schematic diagram of whether the second terminal saves the local business card that the first terminal has updated
  • FIG. 6 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application
  • FIG. 7A is a schematic diagram of a first terminal call communication number
  • FIG. 7B is a schematic diagram of a first terminal sending a business card request to a cloud server
  • 7C is a schematic diagram showing the uploading of the local business card by the second terminal
  • 7D is a schematic diagram of a first terminal receiving a local business card of a second terminal
  • 7E is a schematic diagram of dialing the latest communication number of the first terminal to the second terminal
  • FIG. 8 is a schematic diagram of another embodiment of a method for updating a business card of a contact in an embodiment of the present application.
  • 9A is a schematic diagram of a new contact of a first terminal
  • 9B is a schematic diagram of a business card of a newly created contact on the first terminal
  • 9C is a schematic diagram of communication records between a first terminal and a second terminal
  • 9D is a schematic diagram of a first terminal transmitting a local business card of a first terminal to a second terminal;
  • 9E is a schematic diagram of storing, by the second terminal, a local business card of the first terminal
  • FIG. 10 is a schematic diagram of an embodiment of a method for managing a blacklist in an embodiment of the present application.
  • 11A is a schematic diagram of a first terminal adding a first communication number to a blacklist
  • 11B is a schematic diagram of a blacklist on the first terminal
  • 11C is a schematic diagram of a first terminal uploading a blacklist to a cloud server
  • 11D is a schematic diagram of updating a blacklist by a first terminal
  • 11E is a schematic diagram of whether the first terminal updates the tag information in the blacklist
  • FIG. 12 is a schematic diagram of another embodiment of a method for managing a blacklist
  • FIG. 13A is a schematic diagram of a first terminal adding a first communication number to a blacklist
  • 13B is a schematic diagram of the first terminal detecting that the number of communications with the target number is greater than a preset threshold, and sending the tagged data request of the query target number to the cloud server;
  • 13C is a schematic diagram showing a result of a target query by a first terminal
  • FIG. 14 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application.
  • 15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 15B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 16B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • 17B is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the applied scenario is as shown in FIG. 1 , and the cloud server establishes a connection with multiple terminals.
  • the terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a vehicle-mounted computer, and the like.
  • the terminal may use a mobile phone as an example.
  • the cloud server program is deployed on the cloud server, and each terminal can communicate with each other.
  • Cloud servers are models of the addition, use, and delivery of Internet-based related services, often involving the provision of dynamically scalable and often virtualized resources over the Internet.
  • Embodiment 1 The cloud server optimizes the contacts saved by the terminal, as shown in FIG. 2 , which is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal uploads a local business card and/or a local contact to the cloud server.
  • the first user (user A) using the first terminal is taken as an example.
  • the user A is a cloud service user
  • the cloud server is not required to be registered, and the user can log in directly.
  • FIG. 3A it is a schematic diagram of an interface for logging in to the cloud server on the first terminal.
  • the local business card can also be referred to as the business card of the local user.
  • the local business card may include the user's mobile phone number and the landline number, and may also include any one of the user's name and/or nickname, avatar, email address, address (office address or home address), birthday, gender, and the like. Any combination of several.
  • the local business card can include: title: user A, mobile phone number: 18312345678, Office Address: Guomao Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com.
  • the information in the local business card corresponding to each terminal can be manually added or automatically generated.
  • the method for automatically generating the local business card of each terminal is: the first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), and obtains the number of the newly inserted SIM card.
  • SIM subscriber identification module
  • the user interface (UI) can pop up a prompt box for saving the user A business card. After the user selects to save, the UI can also pop up whether to upload the user A business card to the cloud server.
  • the manner of automatically generating the local business card of each terminal may also be as follows: for example, the automatic generation may be that the first terminal has more than 5 times of the same number according to the detected mobile phone number. (You can set it yourself), or the number of mobile phones that are connected to the same number is more than 5 times (you can set it yourself), you can think that this number is the mobile phone number in the business card of the machine, and it is saved in the user's A business card; Or, the number of emails received by the same email address is more than 5 times (can be set by yourself), or the number of emails sent by the same email address is more than 5 times (you can set it yourself). You can think of this number as the mailbox in your business card. The address is saved in the user's A business card.
  • the user A can also be prompted with a prompt message to prompt the user A whether the information is accurate. If it is not accurate, the user A can also manually modify it.
  • manually adding a user's A business card although the input may be a bit cumbersome, the user A's own input is more accurate.
  • FIG. 3C it is a schematic diagram of a local contact displayed on the first terminal. It should be understood that uploading a local business card and/or local contact may include, but is not limited to, the following implementations:
  • User A can select to upload the local business card and/or local contact to the cloud server on the login interface of the cloud service of the first terminal. That is, the first terminal generates an upload instruction according to the selected operation of the user A on the login interface of the cloud service on the display screen, and then uploads the user A business card and/or the local contact to the cloud server according to the upload instruction.
  • FIG. 3D a schematic diagram of uploading a local business card and a local contact to the cloud server for the first terminal is shown.
  • User A may also choose to upload a local business card and/or a local contact to the cloud server on the locality of the first terminal.
  • the display interface displaying the address book and the user A business card may have a cloud identifier to indicate that the user A may select an address book, upload a local contact, and/or a user A business card in the setting.
  • FIG. 3E a schematic diagram of uploading a local business card to a cloud server for the first terminal.
  • FIG. 3F a schematic diagram of uploading a local contact to a cloud server for the first terminal.
  • each terminal contact may have at least one identifier for the other party to uniquely determine the identity.
  • the terminal may carry at least one identifier that uniquely identifies the other party, and then the server may The identifier obtains the contact information of the peer user.
  • each contact in the contact saved by the cloud server has a unique identifier (ID), that is, a mapping table in which the contact information and the unique identifier are stored in the cloud server.
  • ID unique identifier
  • the unique identifier may be a letter, a number, a combination of letters and numbers, a serial number, a character, etc., and may uniquely indicate a different contact; or the unique identifier may also be an identity information or several identity information that is strongly related to the user identity.
  • the collection such as ID number, bank card number, micro-signal, QQ number, etc., under the premise of complying with laws and regulations and protecting user privacy, the cloud server with user identity data can obtain the requested end user according to the user identity information. Business card information, thereby improving user communication efficiency.
  • the server of the operator sends a request to obtain the contact information of the user B, and the request carries relevant information of the user B, such as a micro signal, an Alipay account number, a name, and the like.
  • relevant information of the user B such as a micro signal, an Alipay account number, a name, and the like.
  • the user who has checked the condition, that is, the user B is selected by the big data processing, and then the mobile phone number of the user B is obtained from the local server, and the mobile phone number is pushed to the mobile phone of the user A.
  • Table 1 below shows a mapping table of contacts and unique identifiers saved by the cloud server.
  • user A may also select other data such as uploading pictures and music files, which is not limited.
  • user A selects the uploaded data
  • the user can also set an automatic uploading period according to actual needs, or there are several recommended automatic uploading cycles on the first terminal, and user A can select it by himself.
  • FIG. 3G a schematic diagram of displaying a recommended upload period on the first terminal is shown.
  • the uploading period can be one month, two months or three months, or other time, user A can also set according to the actual needs of the user.
  • the first terminal may also have an active uploading period reminder, which may remind the user A to actively upload, for example, the user A business card and/or the local contact uploaded on the 15th of this month, and the uploading period reminder selected by the user A is one month. Then, by the 15th of next month, the first terminal will prompt the user A to re-upload the user A business card and/or local contact, in case the user A forgets.
  • an active uploading period reminder may remind the user A to actively upload, for example, the user A business card and/or the local contact uploaded on the 15th of this month, and the uploading period reminder selected by the user A is one month. Then, by the 15th of next month, the first terminal will prompt the user A to re-upload the user A business card and/or local contact, in case the user A forgets.
  • the first terminal acquires the latest frequently used contact and/or the latest unused contact.
  • the first terminal may obtain the latest frequently used contact and/or the latest unused contact by itself, or may obtain the latest frequently used contact and/or the latest unused contact through the cloud server.
  • the first terminal itself obtains the latest frequently used contacts and/or the latest unused contacts, as shown below:
  • the first terminal can acquire the latest frequently used contacts and/or the latest unused contacts according to the preset creation rules.
  • the preset creation rule may be that the first terminal calculates the same number and the local number (the number on the first terminal) according to the preset time (half month, one month or two months, etc.).
  • the number of communications eg, call, short message, etc.
  • the first threshold e.g, 10 times/month
  • the second threshold eg, 3 times /
  • the month is added, the number is added to the contacts that are not commonly used in the month.
  • the frequently used contacts of the month can be understood as the latest frequently used contacts, and the contacts that are not commonly used in the month can be understood as the latest unused contacts.
  • FIG. 3H a schematic diagram of acquiring the latest frequently used contacts for the first terminal is shown.
  • FIG. 3I a schematic diagram of obtaining the latest infrequent contacts for the first terminal is shown.
  • the first threshold and the second threshold may be the same or different, and the first threshold and the second threshold may be set by the user; the same number may be the contact that has been saved on the first terminal. The number can also be an unsaved strange number.
  • the first terminal obtains the latest frequently used contacts and/or the latest unused contacts through the cloud server, as shown below:
  • the first terminal may obtain the current preset time common contact and/or the current preset time unusable contact according to the preset creation rule; the first terminal may not use the current preset time common contact and/or the current preset time.
  • the contact is uploaded to the cloud server; the cloud server analyzes and calculates the latest common contacts and/or according to the currently preset preset contacts and/or current preset time infrequent contacts, preset calculation rules, and local contacts that have been uploaded. Or the latest unused contacts. It should be understood that, assuming that the preset time is one month, the current preset time is understood as the most recent month, and may also be referred to as the current month.
  • FIG. 3J a schematic diagram of uploading the latest common contacts of the cloud server for the first terminal is shown.
  • FIG. 3K a schematic diagram of uploading the latest unused contacts of the cloud server for the first terminal is shown.
  • the first terminal may create a monthly contact for the month and/or a contact that is not commonly used in the current month, when the first terminal is connected to a wireless fidelity (WIFI), or a network connected to the 3G/4G/5G, and
  • WIFI wireless fidelity
  • CPU central processing unit
  • the preset operation rule may take the union or the intersection of the common contacts uploaded before the first terminal saved by the common contact and the cloud server in the current month, or may be the first saved for the contacts and the cloud server that are not commonly used in the current month.
  • the infrequent contacts uploaded by the terminal before the collection take the union or take the intersection.
  • the cloud server obtains the latest frequently used contacts and/or the latest unused contacts, the latest frequently used contacts and/or the latest unused contacts are sent to the first terminal.
  • the cloud server calculates the latest common contact according to the first preset operation rule, and the first preset operation rule may be a union of the frequently used contacts uploaded by the common contacts and the cloud server saved in the current month. Or take the intersection. And/or, the cloud server calculates the latest infrequently used contacts according to the second preset operation rule, and the second preset operation rule may be not commonly used for uploading the first terminal saved by the contact and the cloud server in the current month.
  • the contact takes the union or takes the intersection.
  • the cloud server calculates the latest common contact according to the first preset operation rule; and then calculates the latest unused contact according to the third preset operation rule, and the third preset operation rule may be the latest for the cloud server.
  • the cloud server calculates the latest unusable contacts according to the second preset operation rule; and then calculates the latest common contacts according to the fourth preset operation rule, and the fourth preset operation rule may specifically be the cloud server to the latest one.
  • the cloud server may filter out the contacts that exist in the cloud server common contacts, but the first terminal uploads the common contacts in the current month, if the contact is for three consecutive months ( The user can set the time by himself. In this filtering set, the cloud server can delete the contact in the latest frequently used contact when generating the latest frequently used contact.
  • the cloud server can record a strange number, that is, if the same strange number is displayed for three consecutive months (the user can set the time) in the common contacts of the first terminal of the current month, when the cloud server generates the latest frequently used contacts, At the same time, the prompt message is sent to the first terminal. If the strange number is not saved in the first terminal phone book, the user is prompted to save.
  • the prompt information may be “136-1234-0000 is a frequent communication number, please confirm whether a new contact needs to be created?” as shown in FIG. 3L, which is a schematic diagram showing prompt information of a newly created contact on the first terminal.
  • the latest unused contacts and the latest frequently used contacts may also include a communication number that is not stored in the local contact, and the communication number may refer to a contact number such as a mobile phone number and a phone number.
  • the first terminal sends a first business card request to the cloud server, where the first business card request is used to obtain the latest business card of the first contact in the local contact.
  • the first terminal sends a first business card request to the server, where the first business card request is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal.
  • the second terminal is a terminal of the first contact, and the latest business card may include a username and a communication number.
  • the first business card request may include a username of the first contact, and a username of the first terminal.
  • the first contact may be a contact that has less than the first threshold for the number of communications with the first terminal within a preset duration.
  • the first contact may also be a contact in an infrequently used contact group, and the unused contact group is a union or intersection of the first common contact and the second common contact determined by the server, and the first common contact is
  • the first terminal sends to the server, within a preset duration, the number of communications with the first terminal is less than the first threshold, and the second less frequently used contact is saved by the server. People don't use contacts before.
  • the first business card request may also be referred to as a business card request of the first contact. If it is the latest unused contact obtained by the first terminal, the user A can confirm it, and send the first contact's business card request to the cloud server after confirming. For example, the user terminal E and the user F are not commonly used in the latest, and the first terminal may send a business card request for querying at least one of the user E and the user F to the cloud server. As shown in FIG. 3M, a schematic diagram of a business card request of a first contact is sent for the first terminal. The user A may select the latest latest infrequent contact to send a business card request for querying the first contact, or may send the first contact's business card request to at least one of the latest unused contacts.
  • the name of the first user may also be carried, indicating that the second user (user B) using the second terminal may know that Who requests his local business card, because for any user, not the business card request of any contact will send his own business card, if you know who is requesting your own business card, you can protect the security of user information.
  • the user B can know that the user A is requesting the business card of the contact, and if the user B knows the user A, or considers that the user A is reliable, You can choose to upload the user B business card; if you don't know, user B can choose not to upload the user B business card. Alternatively, User A can also delete some unwanted contacts in the latest unused contacts or the latest frequently used contacts.
  • the business card of the contact person can be obtained through the cloud server, or through SMS, MMS, WeChat, or Wireless Local Area Networks (Wireless Local Area Networks, WLAN) Direct connection, Bluetooth sharing, etc. to obtain the business card of their contact. If it is not a cloud service user, you cannot obtain the business card of its contact through the cloud server. You can use short message, WeChat, WIFI, Bluetooth sharing, etc. to obtain the business card of its contact.
  • the cloud server sends a first business card request to the second terminal.
  • the first business card request may be a business card request of at least one of the latest unused contacts, and the cloud server according to the saved contact And a unique identifier relationship mapping table, querying a unique identifier corresponding to at least one of the latest unused contacts. Then, the cloud server sends a first business card request to the second terminal that logs in to the unique identifiers.
  • the cloud server After receiving the business card request of the user E, the cloud server searches for the relationship between the saved contact and the unique identifier (Table 1 above), and finds that the unique identifier of the user E is "yun005", and the cloud server logs in to the second terminal.
  • User E which is uniquely identified as "yun005", sends a business card request.
  • the user F is used as an example.
  • the cloud server After receiving the business card request of the user F, the cloud server searches for the unique identifier of the user F as "yun006" according to the relationship mapping table between the saved contact and the unique identifier (Table 1 above).
  • the cloud server sends a business card request to the user F who is uniquely identified as "yun006" by using the second terminal.
  • the first business card request may carry user information of the first terminal, and is used to indicate that the user using the second terminal can know who requested his local business card.
  • the cloud server itself also stores the business card of the cloud service user, and can directly query the business card of at least one latest unused contact, and then feed back the business card of at least one latest unused contact to the first terminal.
  • the second terminal sends the local business card to the cloud server.
  • the second terminal may prompt the second user of the second terminal to upload the local business card, which may also be referred to as the local business card and the local business card.
  • the user E logs in as "yun005" on the second terminal.
  • the second terminal prompts the user E to upload the user E business card to the cloud server according to the business card request.
  • the user F logs in with the "yun006" on the second terminal.
  • the second terminal prompts the user F to upload the user F business card to the cloud server according to the business card request.
  • FIG. 3N a schematic diagram of displaying prompt information for uploading a local business card for the second terminal is shown.
  • the prompt information may be whether to upload the business card of the second contact to the cloud server or other prompt information.
  • the prompt information displayed on the second terminal may be “User A requests the local business card, please determine whether to upload the cloud server to inform the user A?”, or other prompt information indicating that the local business card is uploaded, and
  • the manner in which the second terminal displays the prompt information may be various, the manner of the notification bar, the manner of suspension, the manner of sliding in, the manner of jumping, and the like, and are not specifically limited.
  • the corresponding voice play may also be performed, in case the user locks the screen when the terminal is locked, or when the display screen is inconvenient, or other circumstances, the user may Determine the priority of the event and feedback the result of the request in time. If the user E and the user F select "Yes", the second terminal is instructed to upload the local business card to the cloud server.
  • the second terminal herein refers to the terminal corresponding to the user E and the terminal corresponding to the user F
  • the local business card corresponding to the user E of the user E refers to the user E business card
  • the local business card corresponding to the terminal of the user F refers to User F business card.
  • the cloud server sends the local business card of the second terminal to the first terminal.
  • the cloud server may directly return the local business card of the second terminal to the first terminal, or may be the business card and the cloud server according to the stored contact.
  • the local business card of the second terminal determines whether there is content update. If there is an update, the cloud server may update the stored local business card of the second terminal, and return the updated local business card of the second terminal to the first terminal. Exemplarily, the cloud server returns the user E business card and the user F business card to the first terminal.
  • the first terminal updates, according to the local business card of the second terminal, a historical business card of at least one of the latest unused contacts.
  • the first terminal updates the historical business card of at least one of the latest unused contacts according to the local business card of the first contact.
  • the first terminal saves the user E history card, the user F history name
  • the user E is not the same as the user's local business card and the user's F business card
  • the user's E business card and the user's F business card are fed back to the cloud server to implement the first terminal.
  • the purpose of the business card in the local contact is updated in time.
  • FIG. 3O a schematic diagram of updating the business card of the local contact for the first terminal is shown.
  • FIG. 3O illustrates the user E card as an example, and the same processing method is used for the user F. The details are not described herein.
  • the cloud server may also send the user E local business card and the user F local business card to the first terminal. .
  • the embodiment of the present application may obtain the latest common contact and/or the latest unused contact, and may also send a business card request of the first contact through the cloud server, where the first contact's business card request is at least one.
  • the cloud server may send a first business card request to the second terminal of the first contact, and the second terminal may feed back the local business card to the cloud server, and the cloud server feeds back to the first terminal.
  • the business card of each contact in the user's local phone book can be updated in time to ensure that the business card of the contact in the user's local phone book is up-to-date, and the user can be contacted in time. Infrequently used contacts play a key role.
  • the embodiment of the present application can also implement the data sharing between the terminal and the cloud server by using the cloud server, which can enhance the competitiveness of the terminal, improve the usability of the terminal, and improve the user experience.
  • Embodiment 2 The terminal and the cloud server share the business card information update
  • FIG. 4 is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal sends the updated local business card to the cloud server.
  • the first user (user A) using the first terminal is taken as an example.
  • the user A business card is updated as shown in FIG. 3B above, as shown in FIG. 5A, and the first terminal is updated.
  • the mobile phone number of user A is: 18312345678; in FIG. 5A, the mobile phone number of user A becomes: 18735778234, the office address and the email address have not changed, and the office address: Shenzhen Luohu District International Trade Center Building, email address: 123456789@qq.com. It should be understood that User A's cloud account does not change.
  • the updated content of the user A business card may also be information such as a landline number, a home address, an office address, a nickname, an avatar, an email address, and the like.
  • the first terminal uploads the updated first contact's business card to the cloud server, it may upload on the login cloud account interface, or click the cloud identifier next to the contact's business card to upload, or other uploading methods.
  • the specific is not limited.
  • the way in which the user A business card is updated may be an automatic update or a manual update.
  • Automatic update The first terminal inserts a new subscriber identification module (SIM) card (when the card pairing changes), obtains the number of the newly inserted SIM card, and pops up the user interface (UI) to update the user.
  • SIM subscriber identification module
  • UI user interface
  • the prompt box of the A business card after the user selects to save, the UI can also pop up whether to upload the user A latest business card (the updated user A business card) to the cloud server.
  • Manual update Manually modify a certain information in the user's A business card. After the user chooses to save, the UI displays a prompt message asking the user whether to upload the latest business card of User A to the cloud server.
  • the cloud server sends a local contact of the first terminal to the first terminal.
  • the cloud server after receiving the updated first user (user A) business card, the cloud server analyzes the updated content and updates the user A business card stored on the cloud server.
  • the cloud server can also find the local contact corresponding to the cloud account "yun001" in the stored data according to the cloud account yun001 of the user A, and the cloud server sends the local contact to the first terminal.
  • FIG. 5B a schematic diagram of a local contact sent by the cloud server is displayed for the first terminal.
  • the first contact may be a local contact uploaded by the first terminal and updated by the user A.
  • the contacts in the first contact some are cloud service users, some are not cloud service users, and the contact person for the cloud service user may have an identifier, a text or other prompt information for indicating that the contact is a cloud. Service user.
  • the first terminal sends the updated local business card to the second terminal by using the cloud server.
  • the first terminal may filter the contacts in the local contact that are not sent by the cloud server, and select other manners to notify the contact, such as a short message. , MMS, WeChat, WLAN direct connection, Bluetooth sharing, etc.
  • FIG. 5C it is a schematic diagram of other contacts that are filtered out on the first terminal and are not in the local contact.
  • the contacts in the local contacts can be notified by selecting the cloud server, or they can be notified by SMS, MMS, WeChat, Wireless Local Area Networks (WLAN), Bluetooth sharing, etc.
  • FIG. 5D it is a schematic diagram of contacts in the local contacts filtered on the first terminal.
  • the cloud server when the cloud server sends the local business card that has been updated by the first terminal to the second terminal, the cloud server needs to first query and output the first business card according to the mapping relationship between the contact and the unique identifier (such as Table 1 above).
  • the target unique identifier corresponding to the local contact of the terminal, and then the updated local business card is sent to the second terminal uniquely identified by the login target.
  • FIG. 5E a schematic diagram of the updated local business card is sent to the other contacts that are not in the local contact for the first terminal.
  • FIG. 5F a schematic diagram of the updated local business card is sent to the contact of the local contact for the first terminal.
  • the updated local business card can be sent to the cloud server through the cloud server, or through short messages (SMS, MMS), WeChat, direct connection, Bluetooth sharing, etc.
  • SMS short messages
  • MMS mobile phone
  • WeChat direct connection
  • Bluetooth sharing etc.
  • the method sends the updated local business card to the contact; for the contact who is not the cloud service user in the local contact, the updated local machine can be sent to the short message (SMS, MMS), WeChat, WLAN direct connection, Bluetooth sharing, etc. business card.
  • SMS short message
  • MMS WeChat
  • WLAN direct connection
  • Bluetooth sharing etc. business card.
  • the contact for the cloud service user may be indicated by a specific identifier, such as a cloud identifier, or may be prompted by other means such as text, voice, or the like.
  • the first terminal may send the updated update to the local contact.
  • the local business card if the local contact is saved on the previous SIM card, the first terminal can obtain the local contact from the cloud server, and then send the updated local business card.
  • the second terminal receives and updates the saved historical business card of the first terminal.
  • the second terminal may refer to one terminal or multiple terminals, and the number of the second terminals may correspond to the number of local contacts of the first terminal.
  • the second terminal receives the updated local business card of the first terminal, and the UI interface of the second terminal may have a prompt message for selecting whether to update the business card of the local contact.
  • FIG. 5G a schematic diagram is displayed for the second terminal to receive the updated local business card of the first terminal and select whether to save to the local contact of the second terminal.
  • the local business card of the second terminal is saved on the first terminal, but the local business card of the first terminal may not be saved on the second terminal.
  • the corresponding user on the first terminal is user A
  • the user corresponding to the second terminal is user B. If the user A business card is not saved in the local contact of user B, the second terminal receives the updated user A business card.
  • the second terminal receives the updated user A business card, and the user B can select whether to update.
  • the first terminal when the first terminal local business card is updated, the first terminal may upload to the cloud server.
  • the updated local business card the cloud server may update the stored local business card of the first terminal, and the cloud server may also send its local contact to the first terminal, and then the first terminal may pass through the cloud server to the local contact
  • the contact sends the updated local business card
  • the second terminal receives the local business card that has been updated by the first terminal, and can select whether to update the local contact of the second terminal.
  • the embodiment of the present application can share the data of the terminal with the cloud server by using the terminal, and achieve the purpose of sharing the business card in time, and solve the problem that the user cannot contact the local user because the user replaces the mobile phone number, and the device can take the initiative when the device is updated.
  • the updated local business card is uploaded to the cloud server, and the cloud server sends the local contact of the user to the user's terminal. After the user confirms, the user can select whether to notify the updated local business card to the local contact.
  • the contacts in the local contact can be saved according to the updated business card, which can solve the complicated problem of manually creating a new contact, and the other party forgets to save my business card problem.
  • the implementation of the application can enhance the competitiveness of the terminal characteristics, improve the usability of the terminal, and improve the user experience.
  • FIG. 6 it is a schematic diagram of an embodiment of a method for the terminal to update the business card of the contact in the embodiment of the present application.
  • the first terminal sends a communication request to the second terminal, and the request fails, and prompts the first user whether to obtain the latest business card of the second terminal.
  • the first user (user A) using the first terminal and the second user (user B) using the second terminal are taken as an example for description.
  • Sending a call request to the second terminal that is the second mobile phone number, the call is failed, or the first terminal that is the first mobile phone number sends a short message to the second terminal that is the second mobile phone number or MMS, failed to send.
  • the mobile phone number of user A is 18312345678, and the mobile phone number of user B in the local contact saved on the first terminal is 13500001234, and the user A uses the mobile phone number of the first terminal as 18312345678 to use the second terminal of user B as 13500001234.
  • the mobile phone number sends a call request, and the first terminal prompts “The number you call is an empty number”, or “The user you are calling has been stopped”, or “The number you are calling is incorrect, please dial after verification” and other prompt information.
  • the prompt information may be a voice prompt during a call, or may be a voice prompt + a text prompt, or may be prompted by other methods, and is not limited.
  • FIG. 7A a schematic diagram of calling the first communication number for the first terminal.
  • the first terminal sends a business card request to the cloud server.
  • the first terminal sends a business card request to the cloud server in response to the operation of the user; If the information of the contact of the communication failure is not selected in the prompt information of the first terminal, the first user may use other methods to obtain the business card of the contact that failed the communication, for example, using WeChat, QQ, or playing with a friend who is commonly known. A phone (sms) or the like to obtain a business card of a contact that failed communication.
  • FIG. 7B a schematic diagram of sending a business card request to the cloud server for the first terminal. It should be understood that the business card request carries the information of the user A and the information of the user B, which may be the user A name or the user B name.
  • the cloud server sends a business card request to the second terminal.
  • the cloud server after the cloud server receives the business card request sent by the first terminal, the cloud server searches for the unique identifier corresponding to the second user as “yun002” according to the mapping relationship between the saved contact and the unique identifier, and the cloud server A business card request is sent to the user B who is logged in with the second terminal and uniquely identified as "yun002".
  • the cloud server will also store the business card of each contact, and the cloud server can directly store the business card. If the user B business card found by the cloud server is the same as the user B business card saved by the first terminal, the business card request is sent to the second terminal; if the user B business card found by the cloud server and the user B saved by the first terminal If the business card is different, the user B business card stored on the cloud server can be sent to the first terminal, and the first terminal can communicate by using the user B business card sent by the cloud server, for example, a phone, a short message, or the like.
  • the second terminal sends the local business card to the cloud server according to the business card request.
  • the second terminal receives the business card request sent by the cloud server, as shown in FIG. 7C, and displays a schematic diagram of whether the second terminal displays the prompt information of the local business card.
  • the second terminal may directly upload the updated user B business card (the latest business card) to the cloud server.
  • the second terminal displays a prompt message for confirming the user B business card, that is, the user B can confirm the specific information of the uploaded user B business card, and if there is inaccuracy, the user B can also Modify it in time, modify it and upload it to the cloud server.
  • the business card request may carry information of the first user, and the second user for using the second terminal may know who requested the business card of his contact. Then, if user B does not know user A, user B can choose not to upload user B business card, which can ensure user B's information security.
  • the user B business card information is: title: user B, mobile phone number: 13500123456, office address: Shenzhen Nanshan District Coastal City.
  • the second user's mobile number has been updated to "13500123456" instead of the previous "13500001234".
  • the cloud server sends, to the first terminal, the local business card that the second terminal has updated.
  • the cloud server after receiving the updated local business card sent by the second terminal, the cloud server sends the updated second user (user B) business card to the first terminal, and the cloud server may also be updated and stored in the cloud.
  • User B business card on the server.
  • the cloud server “yun002” of the user B may obtain the local contact of the user B, and the cloud server may send the updated user B business card to the local contact of the second terminal.
  • the first terminal sends a communication request to the second terminal according to the local business card that has been updated by the second terminal.
  • the first terminal receives the updated local business card of the second terminal sent by the cloud server, as shown in FIG. 7D, and is a schematic diagram of the first terminal receiving the updated local business card of the second terminal.
  • the first terminal may update the business card in the local contact corresponding to the locally saved second terminal.
  • the first terminal may send a communication request to the second terminal according to the updated local business card.
  • FIG. 7E a schematic diagram of dialing the first terminal to the updated second user. That is, the first terminal with the mobile phone number 18312345678 can send a call request, a short message, a multimedia message, and the like to the second terminal with the mobile phone number 13500123456.
  • the data sharing between the terminal and the cloud server solves the problem that the other party can change the mobile phone number or save the wrong mobile phone number, which makes it impossible to contact the other party, and plays a key role in timely contacting the user. Can enhance the user experience.
  • the embodiment of the present application is not limited to a scenario in which a new number is acquired by a call, and a series of other data (location information, office phone, office address, e-mail address, etc.) of the second terminal B are actively obtained from the first terminal A to the cloud server.
  • the scope of protection of this embodiment It can also solve the complicated problem of manually creating new contacts, enhance the competitiveness of the terminal features, improve the usability of the terminal, and improve the user experience.
  • the embodiment of the present invention is a schematic diagram of an embodiment of a method for updating a business card of a contact in the embodiment of the present application.
  • the first terminal creates a business card of the second contact in the local contact.
  • the first user (user A) of the first terminal is used to create a new contact in the local phone book (address book), and the contact is described by taking the user K as an example.
  • FIG. 9A a schematic diagram of creating a new contact for the first terminal; in the business card of the contact of the newly created user, the name is user K, and the mobile phone number is 13587543321.
  • user A has a new friend in the waiting, dining, traveling, etc., and may store other people's contact information.
  • the first terminal uploads a business card of the second contact to the cloud server.
  • the business card of the second contact is uploaded to the cloud server.
  • FIG. 9B it is a schematic diagram of a business card of a second contact on the first terminal. That is, after the local save of the first terminal is completed, the business card (user K business card) of the newly created contact is uploaded to the cloud server, and the cloud server adds the business card of the second contact to the cloud contact. If the user K is a cloud service user, the cloud server also stores a mapping relationship between the user K and the unique identifier.
  • the second user (user K) using the second terminal is taken as an example for description.
  • the first terminal sends the first user (user A) business card of the first terminal to the second terminal used by the user K.
  • the communication can be a call, a text message or a multimedia message.
  • FIG. 9C a schematic diagram of a communication record between the first terminal and the second terminal is shown in FIG. 9C as an example of occurrence of a call.
  • the first terminal prompts the user A whether to send the user A business card to the user K. If the user A chooses to notify the user K to save the business card of my contact, the first terminal sends the user A business card to the second terminal.
  • a threshold for example, greater than 2 times
  • the manner in which the first terminal (the user A) notifies the second terminal (the user K) may include, but is not limited to, the following implementation manners: (1) the first terminal sends the local business card of the first terminal to the second terminal by using the cloud server, It should be understood that the user K is a cloud service user; (2) the first terminal may also send the local business card of the first terminal to the second terminal by using a short message, a multimedia message, a WeChat, a WLAN direct connection, or a Bluetooth sharing, etc., which is not limited. . As shown in FIG. 9D, it is a schematic diagram of the first terminal notifying the local business card to the second terminal.
  • the prompt information may not be displayed on the UI interface, and the user may select, which may be the default notification mode of the preset first terminal, for example, the user A and the user.
  • the K is a cloud service user
  • the first terminal can notify the second terminal of the user A business card through the cloud server (the default mode).
  • the user K is not the cloud service user
  • the first terminal can use the user A business card to send a text message or a multimedia message.
  • WeChat, QQ, WLAN direct connection, Bluetooth sharing, etc. are not limited.
  • the first terminal needs to send a request to the cloud server to send the user A business card to the user K, and after receiving the request, the cloud server queries the user K in the mapping relationship between the contact and the unique identifier.
  • the unique identifier for example, the unique identifier of the user K is "yun011", and the cloud server sends the user A business card to the second terminal that logs in the unique identifier "yun011".
  • the second terminal receives the local business card of the first terminal and saves the local business card in the second terminal.
  • the contact K of the second terminal after the contact K of the second terminal receives the user A business card sent by the cloud server, the contact K can be selected to be saved locally, and the save can be a shortcut saved by one button.
  • the user A business card includes: title: User A, mobile phone number: 18312345678, office address: International Trade Building, Luohu District, Shenzhen, E-mail address: 123456789@qq.com.
  • FIG. 9E a schematic diagram of saving the local business card of the first terminal for the second terminal is shown.
  • User K can also choose not to save user A business card, depending on actual needs.
  • a new contact (a business card of a second contact) is created on the first terminal by using the data sharing between the terminal and the cloud server.
  • the first terminal may only create a new contact, but may No more contact, so there is no need to send my local business card to the other party.
  • you can send my local business card to the other party so that the contact can store each other in time, solve the complicated operation of manually creating a new contact, the other party forgets to save my business card, and the elderly
  • the user group does not save the problem.
  • the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
  • Embodiment 4 Managing a blacklist by using a cloud server
  • Embodiment 1 is shown in FIG. 10 , which is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
  • the first terminal adds the first communication number to the blacklist.
  • the first user (user A) using the first terminal is taken as an example, and the user A may receive multiple calls or text messages from a salesperson who sells real estate, sells insurance, sells a car, etc. Without these requirements, User A can add his communication number (phone number or mobile number) to the blacklist. Alternatively, the user A adds the business card of a contact in the local contact saved on the first terminal to the blacklist, and the business card of a contact may include the user name, the communication number, and the like.
  • the business card of the second contact is the business card of the newly added contact, and the second user takes the user K as an example for description.
  • FIG. 11A a schematic diagram of adding a first communication number to a blacklist is displayed for the first terminal.
  • the user interface (UI) after the call ends has the option of “blacklisting”.
  • User A Select to add it, or you can click on the contact to be blacklisted in the address book, jump to the contact card's business card interface, pull down the contact's business card interface, you can have the option of "blacklist”, or Other operations add a communication number or a contact's business card to the blacklist, which is not described here.
  • the blacklist previously saved on the first terminal is user M and user N
  • the newly added blacklist is user K.
  • FIG. 11B it is a black list diagram displayed on the first terminal.
  • a certain number is added to the blacklist on the first terminal, it may be marked, such as a fraudulent call, an harassing call, an advertisement call, and the like.
  • user K's mobile number 13000043031 can be marked as an harassing call.
  • the user may be prompted to remove the blacklist.
  • the first terminal sends an update cloud blacklist request to the cloud server.
  • the blacklist of the first terminal has a new business card (user K business card) or a strange communication number, and the local blacklist of the first terminal is updated, then the corresponding blacklist is updated.
  • user A may choose to upload the entire blacklist, or may choose to upload the newly added blacklisted contact user K.
  • the first terminal responds to the user A's selection operation, and generates a request on the first terminal, where the request may be an update cloud blacklist request, and the first terminal sends an update cloud blacklist request to the cloud server, and the update cloud blacklist request may be carried.
  • FIG. 11C A schematic diagram of a terminal uploading a blacklist to a cloud server. It should be noted that the uploading of the blacklist to the cloud server is only one example of the method shown in FIG. 11C, and there may be other manners, which are not specifically limited.
  • the first terminal detects that the number of the user actively calls the user A exceeds a certain threshold within a certain period of time, or sends a short message to the user A actively. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
  • the cloud server updates the cloud blacklist according to the update cloud blacklist request.
  • the contact in the blacklist of the user A saved by the cloud server is the user M and the user N
  • the cloud server receives the updated blacklist request, and carries the blacklist updated by the user A (the user M, the user N, user K), or the newly added blacklisted contact (user K) in the blacklist of user A.
  • the cloud server updates the saved blacklist for user A, that is, the previous user M and user N are updated to user M, user N, and user K.
  • the cloud server determines, according to the blacklist reported by each terminal, that the number of users marked as blacklists is greater than a preset threshold as the target number set.
  • the cloud server collects the blacklist data uploaded by each terminal, and after the big data analysis, filters out the target number set that is added to the blacklist by 50% (the user can set the user).
  • the target number set may include the number of the contact in the blacklist of User A, and may not include the number of the contact in the blacklist of User A.
  • the cloud server may also use the union of the blacklists reported by each terminal as the target number set.
  • the cloud server sends a tagged data request for the target number set to the operator server.
  • the cloud server sends the tagged data request for the target number set to the operator server, and the operator server queries the number tag database for the number in the target number set.
  • the number tag library in the middle is similar to the blacklist on the terminal, but the number tag library of the operator server is more reliable than the blacklist of the terminal.
  • sending the marked data request of the target number set to the operator server can be understood as a process of secondary confirmation, that is, on the terminal, the user adds the number in the target number set to the blacklist, and the cloud server sets the target number. The set is sent to the operator server, and the operator server can further confirm and query the tag information of these numbers again in the number tag library.
  • the tag information found in the number tag database in the target number set is 13500004321 is a fraudulent phone
  • the tag information found in the number tag database is 1330,00011111 and 13400002222 is a trusted phone.
  • the tag information may also be other official trust numbers, such as numbers such as 110, 120, and may also be tagged information such as illegal numbers.
  • the tag information corresponding to the target number set queried by the operator server As shown in Table 2 below, the tag information corresponding to the target number set queried by the operator server.
  • Target number set Tag information 13500004321 Fraud phone 13300001111 Fraud phone 13300002222 Trusted phone 13300003333 Trusted phone 13300004444 Fraud phone 13300005555 Fraud phone 13300006666 Fraud phone
  • the operator server sends the query result to the cloud server.
  • the operator server sends the query result in the target number set to the cloud server.
  • the operator server sends the information of Table 2 above to the cloud server.
  • the tag information about one or more of the numbers may not be found in the operator server, and the number may be considered as a trusted phone.
  • the cloud server classifies the query result, and sends the classified query result to the first terminal.
  • the cloud server classifies the query result according to the rule, and sends the complete result to the terminal; taking the above Table 2 as an example, the cloud server may The numbers labeled "Scam Phones” fall into one category, and the numbers labeled "Trust Phones” fall into one category.
  • the cloud server may send the classified query result to each terminal, or may only send the classified query result to the first terminal, or may save the number in the above table 2 in the contact.
  • the terminal sends the classified query result, which is not limited.
  • the first terminal optimizes the local blacklist according to the classified query result.
  • the first terminal after receiving the cloud server, the first terminal queries the local contact (also called a phone book or address book) and the blacklist according to the classified query result sent by the cloud server, and is in the local contact.
  • the marked number is updated if it is different from the tag information of the query result; if the number in the local contact is not marked and the classified query result is marked, the number is smart tagged. You can also add the illegal number IDs identified in the local contacts to the local blacklist to optimize the local blacklist and cloud blacklist.
  • the first terminal updates the blacklist according to the first query result, and may include:
  • the first terminal displays the first prompt information, where the first prompt information is used to prompt the user whether to remove the first communication number from the blacklist;
  • the terminal removes the first communication number from the blacklist in response to the user input removal operation;
  • the first terminal adds the second communication number to the blacklist, and the second communication number is the communication number that is not in the blacklist of the first terminal.
  • FIG. 11D a schematic diagram of updating the blacklist for the first terminal is displayed.
  • the number 13300004444 is the mobile number of a contact in the local contact, or the first terminal detects that the mobile phone number of 13300004444 has communicated with the mobile phone number 18312345678 of the first terminal, but User A did not blacklist it.
  • the tag information of 13300004444 is a fraudulent phone. Therefore, the first terminal may automatically add the mobile phone number 13300004444 to the local blacklist, or may be the selected operation of user A, and add it to the local blacklist.
  • FIG. 11E it is a schematic diagram of whether the first terminal updates the tag information in the blacklist.
  • the user K business card is added to the blacklist on the first terminal, it is marked as an harassing call, but in the categorized query result fed back by the cloud server, the mobile phone number of the user K is 13500004321, which is marked as a fraudulent call, so the first terminal can A prompt message is displayed to prompt whether to update it as a fraudulent call, and the user can perform a selected operation, and the first terminal can perform a corresponding function in response to the user's operation.
  • the embodiment of the present application solves the problem that the blacklist of the terminal is inaccurate, the blacklisted number is not marked, and the number is incorrectly added to the blacklist, so that the number cannot be normally entered.
  • the terminal and the cloud server synchronize the blacklist, and the terminal and the cloud are used.
  • the server data is shared, and the cloud server interacts with the server of the carrier to manage and optimize the blacklist of the terminal.
  • FIG. 12 it is a schematic diagram of an embodiment of a method for managing a blacklist in the embodiment of the present application.
  • the first terminal adds the target communication number to the blacklist, and sends an update cloud blacklist request to the cloud server.
  • the first user (user A) using the first terminal is taken as an example. Because the user A mishandles, the first terminal adds a certain number or a business card of a contact to the blacklist. Except for the elderly, the elderly are unfamiliar with the use of the terminal, and accidentally add a number or a contact's business card to the blacklist when picking up/calling, and the child is not careful when playing games or picking up/calling on the terminal. Add a number or a contact's business card to the blacklist, or add a number or a contact's business card to the blacklist for other reasons such as accidental touch. As shown in FIG. 13A, a schematic diagram of adding a business card of a target contact to a blacklist for the first terminal.
  • the business card of the target contact is described by taking the user B as an example, and the mobile phone number of the user B business card is 13500123456. It should be understood that, when the first terminal adds a communication number or a business card of a contact to the blacklist, the first terminal sends an update cloud blacklist request to the cloud server, and the cloud blacklist request may carry the target communication number or target of the newly added blacklist. The communication number of the contact card or the business card of the target contact.
  • the cloud server updates the cloud blacklist according to the update cloud blacklist request.
  • the cloud server receives the update cloud blacklist request sent by the first terminal, and updates the cloud blacklist request to carry a blacklisted communication number, or a contact's business card, or a contact's business card.
  • the communication number in .
  • the cloud server can update the cloud blacklist request and update the cloud blacklist.
  • the cloud update blacklist request carries the mobile phone number 13500123456 of the user B. Then, the cloud server adds the number to the cloud blacklist.
  • the cloud update blacklist request carries the user B business card, and the cloud server adds the user B business card to the cloud blacklist.
  • the first terminal detects that the number of communications with the blacklisted target number exceeds a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server.
  • the first terminal detects that the number of communications with the target number of the blacklist is greater than or equal to a preset threshold, and the first terminal sends a tagged data request for querying the target number to the cloud server.
  • the mobile number of the first terminal is 18312345678, and the number of the user B that is blacklisted is 13500123456.
  • the mobile number of the first terminal receives the number 13500123456 and sends the short message more than 3 times (user can set it)
  • the first terminal detects that the number of communications with the target number is greater than a preset threshold, and sends a schematic request for the tagged data request of the query target number to the cloud server.
  • the first terminal detects that the number of the target number actively calls the user A exceeds a certain threshold in a certain period of time, or sends a short message to the user A. If the number of times exceeds a certain threshold, the display screen of the first terminal may prompt the user A "the number 135******** is added to the blacklist, has been called multiple times, is it removed from the blacklist?" User A can Perform selected operations on the display of the terminal, etc. Prevent users from accidentally adding a certain number to the blacklist, which prevents the other party from contacting the user.
  • the cloud server sends a tagged data request for querying the target number to the operator server.
  • the cloud server after the cloud server receives the tagged data request of the query target number, the tagged data request of the query target number is used to query the operator server for the tag data of the target number. Then, the cloud server sends a tagged data request for the query target number to the operator server. Exemplarily, the cloud server sends a tagged data request for query 13500123456 to the carrier server.
  • the cloud server may determine, in the blacklist uploaded by each terminal, that the number of users whose target number is blacklisted is less than a specific threshold, for example, there are 100 cloud service users, and the cloud server is blacklisted. If only three users add the number to the blacklist, the cloud server can determine that the number is a trusted number, and return a prompt message to the first terminal.
  • the prompt information can be "13500123456 is a trusted number, whether it is black. Removed from the list?” Displayed on the display of the first terminal, the user can perform the selected operation and choose whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited.
  • the operator server queries the number tag database according to the tagged data request of the query target number, and obtains the target query result.
  • the operator server queries the number tag database according to the tagged data query request of the target number, and obtains the target query result.
  • the operator server queries the tagged data of 13500123456 in the number tag database, and the tagged data may be tag data such as "illegal number”, “scam number”, “trusted number”, “untrusted number”, and the like. If the marked data of the target number 13500123456 here is a trusted number, the query result is a trusted number.
  • the reliability of the number tag library of the operator server is not high for the reliability of the blacklist on the terminal. That is, the blacklist on the terminal is not necessarily a fraudulent call. Some may be mistakenly added. Some may be subjective and do not want to contact someone to blacklist.
  • the operator server sends the target query result to the cloud server.
  • the operator server after obtaining the target query result, the operator server sends the target query result to the cloud server.
  • the operator server will treat the target query result of the marked data query request with respect to the target number 13500123456 as a trusted number.
  • the cloud server sends the target query result to the first terminal.
  • the cloud server after receiving the target query result returned by the operator, the cloud server sends the target query result to the first terminal.
  • the cloud server can also save the target query result of the target number in the cloud.
  • the cloud server receives the target query result sent by the operator server: about the target number. 13500123456
  • the target query result of the marked data query request is a trusted number, and the target query result of the trusted number is sent to the first terminal.
  • the first terminal processes the target number according to the target query result.
  • the first terminal receives the target query result sent by the cloud server as: the target number 13500123456 is the trusted query number of the marked data query request.
  • the prompt message displayed on the display screen of the first terminal is "13500123456 is a trusted number, is it removed from the blacklist?"
  • the user can perform a selection operation and select whether to remove it. It can also be a prompt for voice prompts or other methods, and is not specifically limited.
  • FIG. 13C it is a schematic diagram of prompt information for displaying a target query result by the first terminal in the embodiment of the present application.
  • the first terminal After receiving the query result sent by the cloud server, the first terminal appends the tag information of the cloud server to the prompt content, prompting the user that the number has been added to the blacklist, and whether the number needs to be removed from the blacklist; the cloud server tag The number type, the user performs recovery on the number or keeps the blacklist operation in combination with his own needs.
  • the cloud server is used to share data between the terminal and the cloud server, and the problem that the terminal blacklist identification is inaccurate, the blacklist number is not marked, and the number is incorrectly added to the blacklist causes the number to fail to be normally entered.
  • the current technology is that the terminal and the cloud server synchronize the blacklist, and the data sharing between the terminal and the cloud server is used, and the cloud server interacts with the server of the operator to manage and optimize the blacklist of the terminal.
  • the terminal characteristic competitiveness can be enhanced, the terminal usability is improved, and the user experience is improved.
  • the display is implemented in a WIFI scenario, and may also be implemented in a 2G/3G/4G/5G or even a later higher-level communication network, and does not constitute a pair.
  • the definition of the solution provided by the embodiment is applied.
  • FIG. 14 it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application.
  • the sending module 1401 is configured to send a first business card request to the server, where the first business card is used to obtain the latest business card of the first contact in the local contact, and the latest business card is the business card obtained by the server from the second terminal.
  • the second terminal is a terminal of the first contact, and the latest business card includes a user name and a communication number;
  • the receiving module 1402 is configured to receive the latest business card sent by the server;
  • the processing module 1403 is configured to update, according to the latest business card, a historical business card of the first contact saved by the first terminal.
  • the first contact is a contact that has a number of communications with the first terminal that is less than a first threshold within a preset duration.
  • the first contact is a contact in an infrequent contact group
  • the infrequent contact group is a first infrequent contact determined by the server.
  • the union or intersection of the second infrequent contacts wherein the first infrequent contact is within the preset duration sent by the first terminal to the server, and the number of communications with the first terminal is less than a first threshold contact, the second infrequent contact being an infrequent contact saved by the server before receiving the first infrequent contact.
  • the sending module 1401 is specifically configured to: if the communication initiated by the first terminal to the second terminal fails, the sending module 1401 sends a first business card request to the server;
  • the processing module 1403 is further configured to communicate with the second terminal according to the latest business card.
  • the sending module 1401 is further configured to: if the local business card of the first terminal is updated, the sending module 1401 sends the updated local business card to the server; and the sending, by the server, the Updated local business card;
  • the receiving module 1402 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
  • the processing module 1403 is further configured to create a business card of the second contact in the local contact;
  • the sending module 1401 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1401 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1403 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1401 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1403 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1403 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1403 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1403 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1401 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1401 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • the receiving module 1402 is further configured to receive a second business card request sent by the server;
  • the sending module 1401 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 15A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the sending module 1501 is further configured to: if the local business card of the first terminal is updated, the sending module 1501 sends the module Transmitting, by the server, the updated local business card; sending, by the server, the updated local business card to the second terminal;
  • the receiving module 1502 is further configured to receive a local contact sent by the server, where the local contact is a contact of the first terminal saved by the server.
  • FIG. 15B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the processing module 1503 is further configured to create a business card of the second contact in the local contact.
  • the sending module 1501 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1501 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1503 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1501 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1503 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1503 displays the first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1503 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1503 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1501 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1501 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • the receiving module 1502 is further configured to receive a second business card request sent by the server;
  • the sending module 1501 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 16A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the processing module 1601 is further configured to create a business card of the second contact in the local contact.
  • the sending module 1602 is further configured to: if the number of communications between the first terminal and the third terminal is greater than a second threshold, the sending module 1602 sends, by using the server, the local business card of the first terminal to the third terminal by using the server
  • the third terminal is a terminal of the second contact.
  • the processing module 1601 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1602 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1601 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1601 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1601 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1601 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1602 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal that is greater than a third threshold, the sending module 1602 initiates a tagged data request to the server, where the communication number of the fourth terminal is The first communication number is described.
  • FIG. 16B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the receiving module 1603 is further configured to receive a second business card request sent by the server;
  • the sending module 1602 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 17A is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the processing module 1701 is further configured to add the first communication number to the blacklist; and update the blacklist according to the query result;
  • the sending module 1702 is further configured to send an update blacklist request to the server, and receive a query result sent by the server, where the query result is an operator blacklist confirmed by the server from an operator server.
  • the processing module 1701 is configured to: if the query result indicates that the first communication number is not in the operator blacklist, the processing module 1701 displays first prompt information, where the first prompt information is used to prompt the user whether Removing the first communication number from the blacklist; and removing the first communication number from the blacklist in response to the removal operation input by the user.
  • the processing module 1701 is specifically configured to: if the query result indicates that the second communication number is in the operator blacklist, the processing module 1701 adds the second communication number to the blacklist, where the second communication number is The communication number that was not previously in the blacklist of the first terminal.
  • the sending module 1702 is further configured to: if the first terminal receives the number of communications initiated by the fourth terminal, is greater than a third threshold, Then, the sending module 1702 initiates a tagged data request to the server, and the communication number of the fourth terminal is the first communication number.
  • FIG. 17B it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
  • the receiving module 1703 is further configured to receive a second business card request sent by the server;
  • the sending module 1702 is further configured to upload the local business card to the server according to the second business card request.
  • FIG. 18 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a car computer, and the like. Take the terminal as a mobile phone as an example:
  • FIG. 18 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 1810, a memory 1820, an input unit 1830, a display unit 1840, a sensor 1850, an audio circuit 1860, a wireless fidelity (WiFi) module 1870, and a processor 1880. And power supply 1890 and other components.
  • RF radio frequency
  • the RF circuit 1810 can be used for receiving and transmitting signals during and after the transmission or reception of information, in particular, after receiving the downlink information of the base station, and processing it to the processor 1880; in addition, transmitting the designed uplink data to the base station.
  • RF circuit 1810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 1810 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Pack
  • the memory 1820 can be used to store software programs and modules, and the processor 1880 can execute various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1820.
  • the memory 1820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1830 may include a touch panel 1831 and other input devices 1832.
  • the touch panel 1831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1831 or near the touch panel 1831. Fuck ()), and according to a preset program to drive the corresponding connection device.
  • the touch panel 1831 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1880 is provided and can receive commands from the processor 1880 and execute them.
  • the touch panel 1831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1830 may also include other input devices 1832.
  • other input devices 1832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1840 can include a display panel 1841.
  • the display panel 1841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1831 may cover the display panel 1841. After the touch panel 1831 detects a touch operation thereon or nearby, the touch panel 1831 transmits to the processor 1880 to determine the type of the touch event, and then the processor 1880 according to the touch event. The type provides a corresponding visual output on display panel 1841.
  • the touch panel 1831 and the display panel 1841 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1831 can be integrated with the display panel 1841. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 1850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1841 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 1860, a speaker 1861, and a microphone 1862 can provide an audio interface between the user and the handset.
  • the audio circuit 1860 can transmit the converted electrical data of the received audio data to the speaker 1861, and convert it into a sound signal output by the speaker 1861; on the other hand, the microphone 1862 converts the collected sound signal into an electrical signal, by the audio circuit 1860. After receiving, it is converted into audio data, and then processed by the audio data output processor 1880, transmitted to the other mobile phone via the RF circuit 1810, or outputted to the memory 1820 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1870 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 18 shows the WiFi module 1870, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1880 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1820, and by invoking data stored in the memory 1820, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1880 may include one or more processing units; preferably, the processor 1880 may integrate an application processor and a modem processor.
  • the application processor mainly processes an operating system, a user interface, an application, and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 1880.
  • the mobile phone also includes a power supply 1890 (such as a battery) for powering various components.
  • a power supply 1890 (such as a battery) for powering various components.
  • the power supply can be logically coupled to the processor 1880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the structure of the terminal in the foregoing method embodiment may be based on the structure shown in FIG. 18.
  • the terminal structure shown in FIG. 18 may perform the steps in the foregoing method embodiment, and details are not described herein again.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • wire eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne, dans ses modes de réalisation, un procédé de mise à jour de la carte de visite d'un contact et un terminal, qui sont utilisés pour partager des données à l'aide du terminal et d'un serveur en nuage, remplissant ainsi la fonction qui consiste à mettre à jour la carte de visite d'un contact local à temps. Le procédé peut comporter les étapes suivantes: un premier terminal envoie un première demande de carte de visite à un serveur, la première demande de carte de visite étant utilisée pour obtenir la plus récente carte de visite d'un premier contact parmi des contacts locaux, la plus récente carte de visite étant la carte de visite obtenue par le serveur à partir d'un second terminal, le second terminal étant le terminal du premier contact, et la plus récente carte de visite comportant un nom d'utilisateur et un numéro de communication; le premier terminal reçoit la plus récente carte de visite qui est envoyée par le serveur; et le premier terminal, d'après la plus récente carte de visite, met à jour la carte de visite historique du premier contact qui est sauvegardée par le premier terminal.
PCT/CN2017/100518 2017-06-16 2017-09-05 Procédé de mise à jour de carte de visite de contact et terminal WO2018227785A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710459555 2017-06-16
CN201710459555.6 2017-06-16

Publications (1)

Publication Number Publication Date
WO2018227785A1 true WO2018227785A1 (fr) 2018-12-20

Family

ID=64658942

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100518 WO2018227785A1 (fr) 2017-06-16 2017-09-05 Procédé de mise à jour de carte de visite de contact et terminal

Country Status (1)

Country Link
WO (1) WO2018227785A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745711A (zh) * 2022-03-28 2022-07-12 闻泰通讯股份有限公司 云名片的发送方法、装置、计算机设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753725A (zh) * 2008-12-17 2010-06-23 深圳Tcl新技术有限公司 黑名单处理系统、方法及装置
CN103248655A (zh) * 2012-02-10 2013-08-14 腾讯科技(深圳)有限公司 名片信息更新的方法和装置
CN105100206A (zh) * 2015-06-15 2015-11-25 北京奇虎科技有限公司 名片的推送方法、设备及系统
CN106254635A (zh) * 2016-07-26 2016-12-21 惠州市斯坦利科技有限公司 呼叫信息推送方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753725A (zh) * 2008-12-17 2010-06-23 深圳Tcl新技术有限公司 黑名单处理系统、方法及装置
CN103248655A (zh) * 2012-02-10 2013-08-14 腾讯科技(深圳)有限公司 名片信息更新的方法和装置
CN105100206A (zh) * 2015-06-15 2015-11-25 北京奇虎科技有限公司 名片的推送方法、设备及系统
CN106254635A (zh) * 2016-07-26 2016-12-21 惠州市斯坦利科技有限公司 呼叫信息推送方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745711A (zh) * 2022-03-28 2022-07-12 闻泰通讯股份有限公司 云名片的发送方法、装置、计算机设备和存储介质

Similar Documents

Publication Publication Date Title
US10581774B2 (en) Method, terminal and computer storage medium for group sending message in instant communication
US10691703B2 (en) User recommendation method and system in SNS community, and computer storage medium
US9813538B2 (en) Malicious call recognition method and apparatus
US10958459B2 (en) Method and apparatus for processing group chat message
JP6461173B2 (ja) メッセージ撤回方法および装置
EP3200487B1 (fr) Procédé et appareil de traitement de messages
US10587741B2 (en) Communication event processing method and apparatus
CN107346397B (zh) 信息处理方法及相关产品
WO2018120905A1 (fr) Procédé de rappel de message pour terminal, et terminal
JP2018529138A (ja) ピクチャ結合方法、端末、及びピクチャ結合システム
JP2019502190A (ja) 情報プッシュ方法、デバイス及びシステム並びにコンピュータ記憶媒体
CN104683301B (zh) 一种密码保存的方法及装置
TW201502986A (zh) 使用於瀏覽器網頁的應用程式訊息通知顯示方法、相關設備與系統
WO2015024372A1 (fr) Procédé d'initiation de communication, appareil, et terminal mobile
CN109428871B (zh) 防御策略确定方法及装置
CN107360179B (zh) 一种风险信息共享的方法、终端及计算机可读存储介质
TW201839624A (zh) 信息發送方法、信息顯示方法、終端、伺服器、系統及儲存介質
WO2018129804A1 (fr) Procédé, plate-forme en nuage et terminal de synchronisation d'enregistrements d'appels
WO2015024393A1 (fr) Procédé, appareil, et terminal pour l'envoi d'un sms
TW201531945A (zh) 基於應用的服務提供方法、裝置及系統
CN110351101B (zh) 一种群邀请处理方法、系统及移动终端
WO2018133284A1 (fr) Procédé d'invite, terminal et serveur
CN106020945B (zh) 快捷项添加方法及装置
JP2020535774A (ja) 通知メッセージ処理方法及び端末
WO2018227785A1 (fr) Procédé de mise à jour de carte de visite de contact et terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17913341

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17913341

Country of ref document: EP

Kind code of ref document: A1