WO2023221917A1 - Account shielding method, communication system, and electronic device - Google Patents

Account shielding method, communication system, and electronic device Download PDF

Info

Publication number
WO2023221917A1
WO2023221917A1 PCT/CN2023/094171 CN2023094171W WO2023221917A1 WO 2023221917 A1 WO2023221917 A1 WO 2023221917A1 CN 2023094171 W CN2023094171 W CN 2023094171W WO 2023221917 A1 WO2023221917 A1 WO 2023221917A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
server
message
electronic device
account
Prior art date
Application number
PCT/CN2023/094171
Other languages
French (fr)
Chinese (zh)
Inventor
孟繁瑞
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023221917A1 publication Critical patent/WO2023221917A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Definitions

  • This application relates to the field of electronic technology, and in particular to account shielding methods, communication systems and electronic devices.
  • a mobile phone can receive cellular calls and/or cellular text messages from other users; at the same time, as a smart device, a mobile phone can also run You can also receive audio and video calls and messages from other users through instant messaging applications (such as messages), Internet calls and/or Internet SMS.
  • instant messaging applications such as messages
  • users' electronic devices may receive cellular calls and/or cellular text messages from unwanted persons. After receiving the user's blocking operation of a cellular number (phone number), the electronic device can intercept incoming calls from the cellular number, and move the text messages sent by the cellular number into the trash without reminding the user, but the undesirable person can still Make online calls and/or send online text messages to users through the account of the instant messaging application.
  • a cellular number phone number
  • the electronic device can intercept incoming calls from the cellular number, and move the text messages sent by the cellular number into the trash without reminding the user, but the undesirable person can still Make online calls and/or send online text messages to users through the account of the instant messaging application.
  • the embodiments of this application provide an account shielding method, a communication system and an electronic device.
  • the account blocking method provided by this application can obtain multiple other communication identifications by correlating the communication identifications that the user has added to the blocking list; and when the communication identifications added to the blocking list are associated with other communication identifications, the newly added communication identifications The identifier will also be added to the block list, so that the server or electronic device can intercept the communication corresponding to the block list.
  • the account blocking method provided by this application can determine more communication identifiers of undesirable persons, thereby preventing users from being disturbed by unwelcome persons.
  • embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device.
  • the method includes: after the first server receives the first message, the first server based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message.
  • the first server determines When the first communication identification belongs to the first blocking list, the first server adds the second communication identification to the first blocking list, and the first blocking list is the blocking list of the second user; the first electronic device intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or the first server intercepts the first communication, and the first communication
  • the communication identifier of the initiator is in the first blocking list
  • the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons.
  • the first communication identification is equivalent to communication identification 3001
  • the second communication identification is equivalent to communication identification 3003.
  • the method further includes: after the first server receives the second message, the first server communicates the first communication identifier with a third communication based on the second message. Identity association, the second message is sent by the application server corresponding to the instant messaging application, and the second message is used to indicate that the third communication identification is associated with the first communication identification, wherein the application server is associated with the third communication identification. Before the communication identification and the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the first server adds the third communication identification to the first blocking list.
  • the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people.
  • the third communication identification is equivalent to communication identification 3003.
  • the method before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the third message is received by the first server.
  • the third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list.
  • the fourth communication identifier is added to the first blocking list.
  • the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb.
  • the fourth communication identifier is communication identifier 3002.
  • the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  • the newly registered account when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
  • the method before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account.
  • the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number.
  • the account blocking method provided by the embodiment of the present application can add the newly registered second account to the blocking list, thereby making Users are not disturbed by undesirables.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • the system further includes a second server
  • the method further includes: the first server sending a fourth message to the second server, the fourth message including a fifth communication
  • the fifth communication identifier is a communication identifier in the first blocking list; after the second server determines the sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server , after the fifth message includes the sixth communication identifier, The first server adds the fifth communication identifier to the first blocking list.
  • multiple servers can also be used to determine the communication identification of the undesirable person as complete as possible, so that the user is not disturbed by the undesirable person.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: after the first server receives the first message, the first server sends the first communication to the first server based on the first message.
  • the identification is associated with a second communication identification, and the first communication identification is the communication identification of the first user.
  • the second communication identification does not exist or the second communication identification is different from the first communication identification.
  • the first communication identifier is not associated, the first message is sent by the first user's electronic device, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first user.
  • the first server When blocking the list, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the initiator of the first communication The communication identifier of is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons.
  • the first communication identification is equivalent to communication identification 3001
  • the second communication identification is equivalent to communication identification 3003.
  • the first server associates the first communication identification with the third communication identification based on the second message, and the first communication identification is The second message is sent by the application server corresponding to the instant messaging application.
  • the second message is used to indicate that the third communication identifier is associated with the first communication identifier, wherein the third communication identifier is associated with the first communication identifier in the application server.
  • the third communication identifier does not exist or the third communication identifier is not associated with the first communication identifier; the first server adds the third communication identifier to the first blocking list.
  • the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people.
  • the third communication identification is equivalent to communication identification 3003.
  • the method before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list.
  • the fourth communication identifier is added to the first blocking list.
  • the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb.
  • the fourth communication identifier is communication identifier 3002.
  • the first message is used to instruct the first server to register the second communication identification based on the first communication identification.
  • the newly registered account when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
  • the method before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account.
  • the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is the second communication identifier logo.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device.
  • the method includes: the first electronic device sending a first message to the first server, the The first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identifier; the first server sends a message to the first electronic device Send the first cellular number; the first electronic device intercepts the first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the first cell number is communication identifier 3002 and communication identifier 3003.
  • the method further includes: the first server receives a second message, and the first server based on the second message The message determines that the second communication identifier is associated with the first cellular number, and the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to register the first account based on the first cellular number. Bind the first cellular number to the first account; the first server intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message, or Internet call initiated by the first account to the first user's account. information.
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • the first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used Instructing the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to bind the first cellular number and the first account; the first server sends a message to the first server.
  • the first electronic device sends a third message, the third message includes the first account; the first electronic device intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message or message initiated by the first account .
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: the first server receives a first message sent by a first electronic device, where the first message includes a first communication identifier.
  • communication identification is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identification; the first server sends a second message to the first electronic device, the second message includes the The first cellular number, the cellular call or cellular text message corresponding to the first cellular number is intercepted by the first electronic device.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the first cell number is communication identifier 3002 and communication identifier 3003.
  • the method further includes: the first server receives the second message, and the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate
  • the first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • embodiments of the present application provide an account blocking method, applied to a first electronic device.
  • the method includes: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking list.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the second communication identifier is communication identifier 3002 or communication identifier 3003.
  • the first electronic device determines a second communication identifier associated with the first communication identifier, specifically including: a system application sending a first communication identifier to one or more instant messaging applications.
  • a message, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application program; the first application program determines that the second communication identifier is associated with the first communication identifier; the first communication identifier is An application program sends a second message to the system application, where the second message includes the second communication identifier.
  • the system application determines that the second communication identifier is associated with the first communication identifier.
  • the system application can obtain other communication identifiers associated with the first communication identifier by querying other third-party applications, and then add the other communication identifiers to the blocking list.
  • embodiments of the present application provide an account shielding method, applied to a system including a first electronic device, a second electronic device, and a first server.
  • the method includes: the first electronic device sends an account to the first server.
  • the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
  • the first server determines the second electronic device based on the first communication identifier, and the first communication identifier is The communication identification of the user on the second electronic device;
  • the first server sends the second communication identification to the second electronic device, and the second communication identification is the communication identification of the user on the first electronic device;
  • the second electronic device receives After receiving the second communication identifier, the first communication is intercepted, and the third communication is intercepted.
  • the identity of the recipient of a communication is the second communication identity.
  • the server after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device.
  • the first communication identifier is communication identifier 3001
  • the second communication identifier is communication identifier 3002 or communication identifier 3003.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number. or the account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device.
  • the device sends a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, and the second message is used to instruct the second electronic device to intercept the first communication,
  • the communication identification of the recipient of the first communication is the second communication identification.
  • the server after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device. User communications.
  • embodiments of the present application provide an account shielding method, applied to a second electronic device.
  • the method includes: receiving a first message, the first message including a first communication identifier, and the communication identifier is a cellular number or instant messaging.
  • the account of the application program intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
  • the second electronic device after the second electronic device receives the first message and determines that the user on the second electronic device has been added to the blocked list by the user on the other electronic device, the second electronic device will intercept the communication to the user on the other electronic device. .
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer
  • the program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first server receives the first message, the first server combines the first communication identification with the first message based on the first message.
  • a second communication identification is associated, and the first communication identification is the communication identification of the first user. Before the first server receives the first message, the second communication identification does not exist or the second communication identification is not related to the third communication identification.
  • a communication identifier is not associated, the first message is sent by the electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first blocking list When, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the communication of the initiator of the first communication The identifier is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: after the first server receives the second message, the third A server associates the first communication identifier with the third communication identifier based on the second message.
  • the second message is sent by the application server corresponding to the instant messaging application.
  • the second message is used to indicate that the third communication identifier is associated with the third communication identifier.
  • the first communication identification is associated, wherein before the application server associates the third communication identification with the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the third communication identification is not associated with the first communication identification;
  • a server adds the third communication identifier to the first blocking list.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the first electronic device sent by the first electronic device. Three messages, the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list. The fourth communication identifier is added to the first blocking list.
  • the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  • the one or more processors are also used to call the computer instructions to cause the electronic device to execute: the first server receives a logout request, and the first server logs out The first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is Second communication identifier.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the first user's cellular number also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer
  • the program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: the first server receives a first message sent by the first electronic device, the first message includes a first communication identifier, and the communication
  • the identification is a cellular number or an account of an instant messaging application;
  • the first server determines the first cellular number associated with the first communication identification;
  • the first server sends a second message to the first electronic device, the second message includes The first cellular number, the cellular call or the cellular text message corresponding to the first cellular number are intercepted by the first electronic device.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the second message, the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate The first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
  • embodiments of the present application provide an electronic device.
  • the electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes.
  • the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking
  • the one or more processors are specifically configured to invoke the computer instructions to cause the electronic device to execute: a system application sends a message to one or more instant messaging applications first match information, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application; the first application determines that the second communication identifier is associated with the first communication identifier; the first The application program sends a second message to the system application, where the second message includes the second communication identifier and the system application determines that the second communication identifier is associated with the first communication identifier.
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes, the The computer program code includes computer instructions that are invoked by the one or more processors to cause the electronic device to execute: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or The account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device Send a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, the second message is used to instruct the second electronic device to intercept the first communication, the The communication identification of the recipient of the first communication is the second communication identification.
  • embodiments of the present application provide an electronic device.
  • the electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes.
  • the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to perform: receiving a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or instant messaging
  • the account of the application program intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
  • inventions of the present application provide a communication system.
  • the communication system includes: the communication system includes a first electronic device and a first server, wherein the first server is configured to receive the first message based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message.
  • the first server is configured to add the second communication identification to the first blocking list when determining that the first communication identification belongs to the first blocking list.
  • the first blocking list is the blocking list of the second user.
  • the first electronic device is used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or, the first server Used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • inventions of the present application provide a communication system.
  • the communication system includes a first electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, and the first electronic device is configured to send a first message to the first server.
  • a message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server is used to determine the first cellular number associated with the first communication identifier; the first server is used to send a message to the third communication identifier.
  • An electronic device sends a first cellular number; the first electronic device is used to intercept a first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
  • embodiments of the present application provide a communication system, which includes a first electronic device, a second An electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
  • the first server is configured to determine the second electronic device based on the first communication identification, which is the communication identification of the user on the second electronic device; the first server is configured to send the second communication to the second electronic device
  • the second communication identification is the communication identification of the user on the first electronic device; the second electronic device is configured to intercept the first communication after receiving the second communication identification, and the identification of the recipient of the first communication is the second communication identifier.
  • embodiments of the present application provide a chip system, which is applied to electronic equipment or servers.
  • the chip system includes one or more processors, and the processor is used to call computer instructions to cause the electronic equipment to execute
  • the processor is used to call computer instructions to cause the electronic equipment to execute
  • embodiments of the present application provide a computer program product containing instructions.
  • the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, The method described in the twelfth aspect and any possible implementation manner in the ninth aspect, the tenth aspect, the eleventh aspect and the twelfth aspect.
  • embodiments of the present application provide a computer-readable storage medium, including instructions.
  • the electronic device When the instructions are run on an electronic device, the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, and the first aspect.
  • the electronic devices or servers provided by the above-mentioned ninth, tenth, eleventh, twelfth and thirteenth aspects, the electronic devices or servers provided by the fourteenth, fifteenth and sixteenth aspects are all used to execute the method provided by the embodiment of the present application. Therefore, the beneficial effects it can achieve can be referred to the beneficial effects in the corresponding methods, and will not be described again here.
  • Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
  • Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • FIG. 4A is an exemplary schematic diagram of determining one or more second communication identifiers provided by an embodiment of the present application.
  • FIG. 4B is an exemplary schematic diagram of the first server determining one or more second communication identifiers provided by the embodiment of the present application.
  • FIG. 4C is an exemplary schematic diagram of a first electronic device determining one or more second communication identifiers according to an embodiment of the present application.
  • Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
  • Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
  • FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
  • FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
  • Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
  • first and second are used for descriptive purposes only and shall not be understood as implying or implying relative importance or implicitly specifying the quantity of indicated technical features. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of this application, unless otherwise specified, “plurality” The meaning is two or more.
  • GUI graphical user interface
  • Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
  • user 1 makes a cellular call to mobile phone 2 through mobile phone 1.
  • user 2 can determine that user 1 is an undesirable person, and then user 2 can block the cellular number corresponding to user 1, as shown in stage 2.
  • the interface displayed by mobile phone 2 may be as shown in interface 101.
  • the content displayed on the interface 101 includes the cellular number of user 1 and the control 102 .
  • the cellular number of user 1 is 123456789.
  • the mobile phone 2 can promptly hang up the incoming call from the cellular number, and/or do not display the interface for the incoming call.
  • Mobile phone 2 can also move the text messages of this cellular number to the trash.
  • user 1 can access the Wait for the instant messaging software to send an Internet text message to mobile phone 2 or initiate an Internet call.
  • user 1 can also use mobile phone 1 to to user 2 account (or account) to send messages or initiate audio and video calls; or, in the corresponding account of user 1
  • the account corresponds to user 2
  • User 1 can use the friend adding function to add the corresponding account to User 2.
  • the account sends friend adding messages.
  • the unwanted person when the unwanted person holds more than one SIM card, that is, multiple cellular numbers, the unwanted person can only block the unwanted person's cellular numbers one by one after being disturbed.
  • user 2 needs to manually perform many operations, resulting in poor user experience.
  • embodiments of the present application provide account shielding methods, systems and electronic devices.
  • the account blocking method provided by this application can automatically query the undesirable person by the first user's electronic device or server after the first user (for example, user 2 in Figure 1) blocks the communication identification of any undesirable person. All communication identifiers of the unwanted person, and after querying all the identifiers of the unwanted person, intercept the communication initiated by the unwanted person on the terminal side or the server side, such as cellular phone calls, cellular text messages, Internet calls, Internet SMS, emails, messages and/or audio and video calls.
  • the communication identifier may be a cellular number, an account of an instant messaging application (where the account of an instant messaging application may be an account of an undesirable person, or a network number displayed on the first electronic device
  • the account of an instant messaging application may be an account of an undesirable person, or a network number displayed on the first electronic device
  • the network number displayed on the unwanted person’s electronic device is YYYYY, then YYYYY can also be used as an instant messaging application account
  • Interception on the terminal side may include intercepting communications initiated by the undesirable person's electronic device on the electronic device side of the undesirable person, or intercepting communications initiated by the unwelcome person on the electronic device side of the first user.
  • the server detects the operation of the undesirable person's new communication identifier
  • the new communication identifier can be added in a timely manner.
  • the identifier is added to the first user's blacklist.
  • the undesirable person's operation of adding a new communication identification may include the undesirable person using the blocked cellular number to register a new instant messaging application account, and the new communication identification is the newly registered instant messaging application. account; or, the undesirable person cancels the account of the instant messaging application and then re-registers an account of a new instant messaging application, and the new communication ID is the account of the re-registered instant messaging application; or, the undesirable person Use the cellular number corresponding to the secondary card to register an account for the instant messaging application.
  • the account for the registered instant messaging application is the new communication ID, etc.
  • the cellular number may also include a virtual number, where the virtual number is a number in a Virtual Private Mobile Network (Virtual Private Mobile Network, VPMN).
  • VPMN Virtual Private Mobile Network
  • Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Phase 1 and Phase 2 in Figure 2 the content shown in Phase 1 and Phase 2 in Figure 2 is the same as that shown in Phase 1 and Phase 2 in Figure 1. You can refer to the corresponding text description in Figure 1 and will not be described again here.
  • the first server and/or mobile phone 2 associate the communication identification of user 1 to discover other communication identifications of user 1.
  • the server associates the communication identifier of the cellular number "123456789" and determines that the result of the association is: instant messaging application account (such as Account) is Ab123456789, The email account is: 123456789@huawei.com, other cellular numbers: 987654321, The email account is: 987654321@huawei.com.
  • the first server can synchronize some or all of user 1's communication identifiers to mobile phone 2.
  • the first server and/or mobile phone 2 can intercept communications initiated by user 1, such as Internet calls, Internet text messages, emails, messages and/or audio and video calls.
  • the first server can intercept audio and video calls initiated by user 1 through an instant messaging application, messages sent; for another example, mobile phone 2 can intercept incoming calls and text messages from cellular numbers 123456789 and cellular number 987654321; for another example, mobile phone 2 or the server can intercept emails sent by 123456789@huawei.com and 987654321@huawei.com.
  • the first server or mobile phone 2 can update user 1's new communication identification, and then intercept user 1's communication through mobile phone 1 or other Communication initiated by the electronic device to mobile phone 2; or, after detecting user 1's new communication identification operation, the first server or mobile phone 1 can update the new communication identification of the undesirable person and transfer the new communication identification of user 2 to The communication identifier is updated to mobile phone 2 so that mobile phone 2 can intercept communications initiated by user 1 through mobile phone 1 or other electronic devices.
  • the first server in response to user 2 blocking any communication identification of user 1, can associate the communication identification to obtain all communication identifications of the undesirable person, and then use mobile phone 2 and/or the third server to block the communication identification of user 1.
  • One server blocks all communication identifiers of the undesirable person, protecting user 2 from being disturbed by user 1, without requiring user 2 to perform cumbersome operations, and improving the user experience.
  • Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • the first electronic device determines that the communication identifier 3001 is added to the blacklist.
  • the first electronic device determines that the communication identifier 3001 is added to the blacklist (which may also be called a shielded list); or, the first electronic device may obtain the information from other servers including the first server or the first
  • the instant messaging application on the electronic device obtains communication identifiers 3001 marked as promotional or advertising types by other users, and then adds the communication identifiers 3001 to the blacklist.
  • the communication identifier 3001 may be a cellular number, an account of an instant messaging application, or an email address.
  • blacklist synchronization can be performed between multiple electronic devices logged in with the same user account.
  • the synchronization of the blacklist may be performed by the first server or other servers.
  • the first electronic device determines the communication identifier 3001
  • the communication identifier 3001 is a cellular number
  • it is added to the blacklist
  • the communication identifier 3001 is an account or cellular number of an instant messaging application
  • the first electronic device sends the communication identification 3001 to the first server, and the server adds the communication identification 3001 to the blacklist.
  • the communication identifier 3001 can be added to the blacklist.
  • the addition and deletion of communication identifiers in the blacklist are only performed by the first server, and the first electronic device is synchronized to the blacklist by the first server.
  • the addition and deletion of communication identifiers in the blacklist are performed by the first server and/or the first electronic device.
  • S302 The first electronic device sends message 1 to the first server, where message 1 includes communication identification 3001.
  • the first server is system and The server corresponding to the system, for example server.
  • the first server is an application server corresponding to the instant messaging application.
  • the first server is an operator server.
  • the first server after receiving message 1, the first server adds the communication identifier 3001 to the blacklist.
  • the first server determines one or more communication identifiers 3002 associated with the communication identifier 3001.
  • the first server may use multiple methods to determine one or more communication identifiers 3002 associated with the communication identifier 3001, which are not limited here.
  • the following is an exemplary introduction to several methods by which the first server determines one or more communication identifiers 3002.
  • the first server when the first server is a server corresponding to the operating system, a set of communication identifiers of different users is stored on the first server; when the first server determines that the communication identifier 3001 belongs to the If the set of communication identifications of welcome persons is set, each communication identification in the set of communication identifications of unwelcome persons may be used as one or more associated communication identifications 3002. Wherein, the first server may periodically obtain communication identification sets of different users.
  • the first server when the first server is a server corresponding to the operating system, the first server may also request the communication identification 3002 associated with the communication identification 3001 from the application server corresponding to the instant messaging application.
  • the server can server or The server sends request 1, which carries communication identifier 3001.
  • Request 1 is a request for obtaining other communication identifiers associated with communication identifier 3001.
  • the first server can determine the second electronic device based on the communication identification 3001, and then, the first server sends the information to the third electronic device.
  • the second electronic device queries other communication identifiers on the second electronic device; and then, after receiving the communication identifier sent by the second electronic device, the first server can determine one or more communication identifiers 3002.
  • other communication identifiers on the second electronic device may not have a direct correlation with the communication identifier 3001, for example, on the second electronic device
  • the account logged in by the application is not bound to the communication ID 3001.
  • the second electronic device The account logged in by the application program is obtained by the first server instructing the system application on the second electronic device to execute a query.
  • the server may be an operator server, such as server or server.
  • the operator server can distinguish different electronic devices through parameters such as international mobile equipment identity (IMEI) and international mobile subscriber identification number (IMSI), and then determine an electronic device. or multiple cellular numbers, and then the communication identification 3002 can be determined.
  • the operator server may determine the second user based on the communication identifier 3001, and further determine other cellular numbers of the second user based on the second user.
  • the first electronic device and the operator server can establish a connection and exchange information, or the first electronic device can exchange information with the operator server through a server corresponding to the operating system.
  • the method for determining one or more communication identifiers 3002 is exemplarily introduced above.
  • the first server will perform more than one association to obtain one or more communication identifiers 3002 that are as complete as possible.
  • the first server sends message 2 to the first electronic device, where message 2 includes part or all of one or more communication identifiers 3002.
  • the first server after the first server determines one or more communication identifiers 3002 associated with the communication identifier 3001, the first server sends one or more communication identifiers 3002 to the first electronic device.
  • the first server may not send message 2 to the first electronic device.
  • the message 2 sent by the first server to the first electronic device includes the cellular number in the one or more communication identifiers 3002.
  • the first electronic device may also send the first user's identification, such as the first user's communication identification, the user's ID, the first electronic device's identification, to the first server. logged in account or or other parameters used to distinguish different users.
  • the first server is an application server corresponding to the instant messaging application
  • the identity of the first user may also be the account of the first user's instant messaging application.
  • the first server may create a blacklist for the first user, and add the account of the instant messaging application in the one or more communication identifiers 3002 to the first user's blacklist.
  • the first server determines that an undesirable person initiates an Internet phone call, Internet text message, email, message and/or audio and video call to the first user, it can directly intercept the call.
  • the first server can synchronize the cellular numbers in one or more communication identifiers 3002 with the operator server.
  • the operator server may intercept the cellular number in one or more communication identifiers 3002 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
  • the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3002.
  • the first electronic device may update the blacklist.
  • the first electronic device may intercept cellular calls, cellular text messages, audio and video calls, messages, Internet calls and/or Internet text messages based on the blacklist.
  • a system application on the first electronic device can obtain the cellular number in one or more communication identifiers 3002 and add the cellular number to the blacklist.
  • the system manager determines whether the number of the incoming call or text message is in the blacklist. If the number of the incoming call or text message is in the blacklist, the system manager can intercept the incoming call or text message.
  • the system application on the first electronic device may add the cellular numbers in the one or more communication identifiers 3002 to
  • the instant messaging application account is sent to the corresponding instant messaging application through the agreed API; after the instant messaging application receives the corresponding communication identification 3002, it can intercept the message initiated by the account of the instant messaging application corresponding to the communication identification 3002. video calls and intercepting Internet text messages, Internet calls, messages and/or audio and video calls sent by the account of the instant messaging application corresponding to the communication identifier 3002.
  • the first electronic device and/or the first server may assign the one or more communication identifications to In 3002, the accounts of different instant messaging applications and the account logged in by the first user on the different instant messaging applications are sent to the application servers corresponding to the different instant messaging applications, so that the servers of the different instant messaging applications can intercept undesirable persons.
  • the first server updates one or more communication identifiers 3002 to obtain one or more communication identifiers 3003.
  • the difference between the communication identification 3003 and the communication identification 3002 is that when the first server executes step S303, the communication identification 3003 is not associated with the communication identification in the blacklist, or the communication identification 3003 does not exist (not registered); in the first server After step S303 is executed, the communication identification 3003 is associated with the communication identification in the blacklist.
  • the association between the communication identifier 3003 and the communication identifiers in the blacklist may be established by the application server corresponding to the instant messaging application, or may be established by the electronic device of the undesirable person. For example, the binding of different instant messaging application accounts is established by the application server, or the communication identifier 3003 is a newly registered account. For another example, if a new SIM card is inserted into the electronic device of the unwanted person, the cellular number corresponding to the newly inserted SIM card is the communication identification 3003.
  • the first server has multiple methods to determine one or more communication identifiers 3003, which are not limited here. Several methods are illustratively introduced below.
  • the first server may periodically update one or more communication identifiers 3002 to obtain one or more communication identifiers 3003. For example, when an unwanted person registered using cellular number 1 account, the The account is account 1, and the cellular number 1 belongs to the one or more communication identifiers 3002, then the first server updates a Account 1 is included in one or more communication identifiers 3003 obtained from the communication identifiers 3002 or multiple communication identifiers 3002 .
  • the first server after detecting the new communication identification operation of the undesirable person, updates the communication identification of the unwelcome person, which is recorded as communication identification 3003.
  • the application server corresponding to the instant messaging application when the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1, the application server corresponding to the instant messaging application sends a request to The first server sends a message indicating an association between the cellular number 1 and the account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include the account of the undesirable instant messaging application.
  • the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is the application server corresponding to the instant messaging application
  • the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1
  • the first server determines that the uninvited person A new cellular number 1 is added to the greeter's communication identifier.
  • cell number 1 belongs to communication identifier 3003.
  • the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is a server corresponding to the operating system
  • the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include cellular number 2.
  • the first server is an application server corresponding to an instant messaging application
  • the first server determines The undesirable person's communication identifier has a new cell number 2.
  • cell number 2 belongs to communication identifier 3003.
  • the first server is a server corresponding to the operating system
  • the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include cellular number 2.
  • the first server can interact with the application server, and the first server sends the communication identifier 3002 to the application server. After the application server determines that there is a new communication identifier 3003 associated with the communication identifier 3002, the application server sends a communication to the first server.
  • the application server sends communication identification 3003 and communication identification 3002 to the first server.
  • the application server can send it through a specific interface or carry the identifier in the message.
  • the interface or the identifier is used to indicate that the communication identifier 3003 is associated with a certain communication identifier 3002 .
  • the message sent by the application server to the first server carries the communication identifier 3003 and the identifier of the undesirable person.
  • the application server since in step S303, the first server has inquired the application server about the communication identification of the undesirable person, the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is a server corresponding to the operating system
  • the second A system application on an electronic device such as a mobile phone manager
  • the message is used to inform the first server that the undesirable person's communication identifier has a new cellular number 1; then, the first server can determine a or Multiple communication identifiers 3003 include the cell number 1.
  • the first server sends message 3 to the first electronic device, where message 3 includes part or all of one or more communication identifiers 3003.
  • the first server may send a message 3 to the first electronic device, where the message 3 includes a communication identifier that is different from the one or more communication identifiers 3002 among the one or more communication identifiers 3003 .
  • the first server may synchronize the cellular numbers in one or more communication identifiers 3003 to the first electronic device.
  • the first server can synchronize the cellular numbers in one or more communication identifiers 3003 with the operator server.
  • the operator server may intercept the cellular number in one or more communication identifiers 3003 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
  • the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3003.
  • step S305 For the operation of updating the blacklist by the first electronic device, reference can be made to the textual description of step S305 above, which will not be described again here.
  • the first server stores a blacklist
  • the blacklist on the first server stores complete communication identifications of undesirable persons.
  • the blacklist on the first electronic device stores complete communication identifiers of the undesirable persons, or the blacklist on the first electronic device stores the cellular numbers of the undesirable persons.
  • the first electronic device obtains the communication identifier of the undesirable person through the first server and adds the communication identifier of the undesirable person to the blacklist.
  • the first electronic device or the first server can obtain the communication identification of the undesirable person as complete as possible through multiple associations, as shown in Figure 4A below. , shown in Figure 4B and Figure 4C.
  • the first server may be a server corresponding to the operating system
  • the second server and the third server may be application servers corresponding to the instant messaging application.
  • FIG. 4A is an exemplary schematic diagram of determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • the communication identifier 3001 is cell number 1.
  • the communication identifier 3002 includes: account 1, mailbox 1, and cellular number 2.
  • account 1 is an instant messaging application account.
  • the communication identifier 3002 includes: account 1, mailbox 1, cell number 2, and mailbox 2.
  • the first electronic device may also perform multiple associations.
  • FIG. 4B is an exemplary schematic diagram of the first server determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • S4B01 The first server sends query request 1 to the second server, and query request 1 includes communication identification 1.
  • communication identification 1 belongs to communication identification 3001 or communication identification 3002; the second server is an application server corresponding to the instant messaging application.
  • S4B02 The first server sends query request 2 to the third server.
  • Query request 2 includes communication identification 1.
  • the third server is an application server corresponding to the instant messaging application.
  • the instant messaging applications corresponding to the second server and the third server are different.
  • the second server determines one or more communication identifiers 2 based on the communication identifier 1.
  • one or more communication identifiers 2 belong to communication identifier 3002.
  • S4B04 The third server determines one or more communication identifiers 3 based on the communication identifier 1.
  • one or more communication identifiers 3 belong to the communication identifier 3002.
  • the second server sends query result 1 to the first server.
  • the query result 1 includes one or more communication identifiers. 2.
  • the third server sends the query result 2 to the first server.
  • the query result 2 includes one or more communication identifiers 3.
  • the first server sends a query request 3 to the third server.
  • the query request 3 includes one or more communication identifiers 2.
  • S4B08 The third server determines one or more communication identifiers 4 based on the one or more communication identifiers 2.
  • one or more communication identifiers 4 belong to the communication identifier 3002.
  • the third server sends the query result 3 to the first server.
  • the query result 3 includes one or more communication identifiers 4.
  • steps S4B01 to step S4B06 can be the first association; steps S4B07 to step S4B09 can be the second association, so that the first server can determine as complete as possible A communication sign belonging to an undesirable person.
  • FIG. 4C is an exemplary schematic diagram of the first electronic device determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • S4C01 The first electronic device sends query request 1 to the second server, where query request 1 includes communication identification 1.
  • S4C02 The first electronic device sends query request 2 to the third server.
  • Query request 2 includes communication identification 1.
  • the second server determines one or more communication identifiers 2 based on the communication identifier 1.
  • S4C04 The third server determines one or more communication identifiers 3 based on the communication identifier 1.
  • S4C05 The second server sends query result 1 to the first electronic device.
  • Query result 1 includes one or more communication identifiers 2.
  • the third server sends the query result 2 to the first electronic device.
  • the query result 2 includes one or more communication identifiers 3.
  • the first electronic device sends a query request 3 to the third server.
  • the query request 3 includes one or more communication identifiers 2.
  • S4C08 The third server determines one or more communication identifiers 4 based on one or more communication identifiers 2.
  • S4C09 The third server sends query result 3 to the first electronic device, where query result 3 includes one or more communication identifiers 4.
  • steps S4C01 to step S4C06 can be the first association; steps S4C07 to step S4C09 can be the second association, so that the first electronic device can determine that it is as complete as possible A communication sign belonging to an undesirable person.
  • the first server serves as a server for querying association relationships
  • the first electronic device serves as an interceptor of communication.
  • the first electronic device interacts with the first server to obtain the communication identification of the undesirable person.
  • the first electronic device can independently determine the communication identification of the undesirable person, as shown in Figure 4D below.
  • Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • account 1 is communication identifier 3001.
  • S4D02 Instant messaging application 1 sends message 1 to the system application, and message 1 includes cellular number 1.
  • cell number 1 is communication identifier 3002.
  • the instant messaging application 1 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1.
  • a contact's contact details in the app include the contact's cellular number.
  • message 1 also includes account 1.
  • the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
  • the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
  • S4D04 Optionally, the system application adds account 1 to the first user's blacklist.
  • S4D05 The system application adds cellular number 1 to the first user's blacklist.
  • S4D06 The system application sends message 2 to instant messaging application 2, and message 2 includes cellular number 1.
  • the instant messaging application 1 adds the account 2 corresponding to the cellular number 1 to the first user's blacklist.
  • the instant messaging application 2 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1.
  • the instant messaging application 2 sends message 3 to the system application, and the message 3 includes account 2.
  • S4D09 Optionally, the system application adds account 2 to the first user's blacklist.
  • the system application on the first electronic device can also perform multiple associations.
  • the system application determines that cellular number 1 is the communication identifier of an undesirable person, it queries the instant messaging application 1 for the associated result of cellular number 1, which is account 1 and cellular number 2, and queries the instant messaging application 2 for cellular number 1.
  • the association result is account 2.
  • the system application can query the instant messaging application 2 that the associated result of the cellular number 2 is account 3.
  • the result of the first association performed by the first electronic device is account 1, account 2, and cellular number 2; the result of the second association performed by the second electronic device is account 3.
  • Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • the first electronic device is the user's electronic device
  • the second electronic device is the unwanted person's electronic device.
  • the first server may be a server corresponding to the operating systems of the first electronic device and the second electronic device, or may be an application server corresponding to the instant messaging application.
  • S501 The first electronic device determines that the communication identifier 3001 is added to the blacklist.
  • step S501 For the content of step S501, reference can be made to the text description in step S301, which will not be described again here.
  • S502 The first electronic device sends the communication identification 3001 to the first server.
  • the first server determines that the electronic device of the undesirable person is the second electronic device based on the communication identification 3001.
  • the first server stores communication identification sets of different users; when the first server determines that the communication identification 3001 belongs to the communication identification set of an undesirable person, the undesirable person can be Each communication identification in the set of communication identifications serves as one or more associated communication identifications 3002.
  • the first server may determine the second electronic device based on the communication identifier 3001, such as the account of the undesirable person's instant messaging application.
  • the first server sends an interception instruction to the second electronic device, where the interception instruction includes the communication identification of the first user.
  • the communication identification of the first user may include the cellular number on the first electronic device, and the account of the instant messaging application on the first electronic device.
  • the first server can also associate the communication identification of the first user to obtain the communication identification of the first user as complete as possible.
  • the communication identification of the first user can also associate the communication identification of the first user to obtain the communication identification of the first user as complete as possible.
  • S505 The second electronic device intercepts the communication initiated to the first user.
  • the second electronic device can intercept communications initiated to the first user, such as cellular phone calls, cellular text messages, and audio and video calls. , messages, Internet calls and/or Internet SMS.
  • the first server when the first server is an application server corresponding to an instant messaging application, the first server may determine the account of the instant messaging application logged in by the first user. For example, in step S502, the first electronic device also sends parameters for determining the account of the user's instant messaging application to the first server, such as the account of the user's instant messaging application. The first server sends the user's communication identification to the second electronic device including an identification of an account of the user's instant messaging application.
  • the first server when the first server is a server corresponding to the operating system, the first server can determine the user's communication identifier, such as a cellular number, an account of an instant messaging application, etc.
  • the system application on the second electronic device such as the mobile phone manager, after obtaining the user's communication identification, can send the account of the instant messaging application in the user's communication identification to the corresponding instant messaging application through the agreed API, allowing instant communication
  • the application can intercept Internet calls, Internet text messages, emails, messages and/or audio and video calls initiated by unwanted persons to the user.
  • the system application on the second electronic device such as a mobile phone manager, can intercept cellular calls and cellular text messages initiated by the second electronic device after obtaining the user's communication identifier.
  • Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • S601 The system application determines that cellular number 1 is added to the blacklist.
  • the cellular number 1 belongs to the communication identifier 3001.
  • the communication identifier 3001 For specific content, please refer to the text description of step S301 above, which will not be described again here.
  • S602 The system application sends a query request 1 to the instant messaging application 1, and the query request 1 includes the cellular number 1.
  • system applications can include address book and mobile phone manager.
  • query requests can be sent through the agreed API.
  • the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
  • the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
  • cell number 1 and account 1 are the communication identifiers of the undesirable person.
  • account 1 is communication identifier 3002.
  • the instant messaging application 1 sends a query request 2 to the server 1.
  • the query request 2 includes the cellular number 1 and/or the account 1.
  • server 1 is the server corresponding to instant messaging application 1.
  • Server 1 determines mailbox 1 based on cellular number 1 and/or account 1.
  • server 1 will add account 1 to the first user's blacklist.
  • step S606 may not be executed; if step S603 has not been executed, step S606 needs to be executed.
  • Server 1 sends the query result to instant messaging application 1, and the query result includes mailbox 1.
  • mailbox 1 is communication identifier 3002.
  • S608 The instant messaging application 1 sends the query result to the system application, and the query result includes the mailbox 1.
  • the query results also include account 1.
  • Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
  • S701 The instant messaging application 1 on the second electronic device initiates communication to the instant messaging application 1 on the first electronic device.
  • communication can be Internet phone calls, Internet text messages, emails, messages and/or audio and video calls.
  • the second electronic device is the electronic device of the undesirable person
  • the account logged in by the instant messaging application 1 on the second electronic device is account 2
  • the account logged in by the instant messaging application 1 on the first electronic device is account 1 .
  • S702 The instant messaging application 1 sends a query request 1 to the system application, and the query request includes account 2.
  • steps S702 and S703 are optional steps.
  • S703 The system application sends query result 1 to instant messaging application 1, and query result 1 includes confirmation information.
  • the blacklist stores the communication identifiers of undesirable persons.
  • account 2 belongs to the blacklist.
  • the instant messaging application intercepts communications initiated by the instant messaging application on the second electronic device, such as Internet calls, Internet text messages, messages, and audio and video calls.
  • the server corresponding to the instant messaging application 1 if the server can send a query request 1 to the server corresponding to the operating system, then after receiving the query result, the server corresponding to the instant messaging application 1 The server intercepts.
  • the communication system provided by the embodiment of the present application the hardware architecture and software architecture of the first electronic device, the second electronic device and the server provided by the embodiment of the present application are introduced.
  • the hardware architecture and software architecture of the first electronic device and the second electronic device may be the same, so in the following, the first electronic device and the second electronic device are referred to as electronic devices.
  • Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
  • the communication system provided by the embodiment of the present application may include a first electronic device and a second electronic device.
  • the first electronic device is the electronic device of the first user
  • the second electronic device is the electronic device of the undesirable user
  • the communication system may also include one or more servers.
  • the one or more servers may include servers corresponding to operating systems and/or application servers corresponding to instant messaging applications.
  • FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • the electronic device may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, as well as a cellular phone, a personal digital assistant (personal digital assistant) assistant (PDA), augmented reality (AR) devices electronic equipment, virtual reality (VR) equipment, artificial intelligence (AI) equipment, wearable equipment, vehicle-mounted equipment, smart home equipment and/or smart city equipment.
  • PDA personal digital assistant
  • AR augmented reality
  • AR electronic equipment
  • VR virtual reality
  • AI artificial intelligence
  • wearable equipment wearable equipment
  • vehicle-mounted equipment smart home equipment and/or smart city equipment.
  • the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and user Identification module (subscriber identification module, SIM) card interface 195, etc.
  • a processor 110 an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structures illustrated in the embodiments of the present invention do not constitute specific limitations on the electronic equipment.
  • the electronic device may include more or less components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
  • the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller video codec
  • digital signal processor digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit
  • the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 110 may also be provided with a memory for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous receiver and transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces.
  • the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device.
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
  • audio Module 170 and wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 110 and the camera 193 communicate through a CSI interface to implement the shooting function of the electronic device.
  • the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device.
  • the GPIO interface can be configured through software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
  • the interface connection relationships between the modules illustrated in the embodiments of the present invention are only schematic illustrations and do not constitute structural limitations on the electronic equipment.
  • the electronic device may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive wireless charging input through a wireless charging coil of the electronic device. While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like.
  • the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the electronic device can be realized through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • Antenna 1 can be reused as a diversity antenna for a wireless LAN.
  • antennas may be used in conjunction with tuning switches.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied to electronic devices.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier amplifier, LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (BT), and global navigation satellite systems for use in electronic devices. (global navigation satellite system, GNSS), frequency modulation (FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device implements display functions through the GPU, display screen 194, and application processor.
  • the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 194 is used to display images, videos, etc.
  • Display 194 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode).
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • AMOLED organic light-emitting diode
  • FLED flexible light-emitting diode
  • Miniled MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc.
  • the electronic device may include 1 or N display screens 194, where N is a positive integer greater than 1.
  • Electronic devices can use ISPs, cameras 193 , video codecs, GPUs, displays 194 and application processors Wait for the shooting function to be realized.
  • the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise and brightness. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
  • Camera 193 is used to capture still images or video.
  • the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device may include 1 or N cameras 193, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
  • Video codecs are used to compress or decompress digital video.
  • Electronic devices may support one or more video codecs. In this way, electronic devices can play or record videos in multiple encoding formats, such as: Moving Picture Experts Group (MPEG)1, MPEG2, MPEG3, MPEG4, etc.
  • MPEG Moving Picture Experts Group
  • MPEG2 MPEG2, MPEG3, MPEG4, etc.
  • NPU is a neural network (NN) computing processor.
  • NN neural network
  • Intelligent cognitive applications of electronic devices can be realized through NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
  • the internal memory 121 may include one or more random access memories (RAM) and one or more non-volatile memories (NVM).
  • RAM random access memories
  • NVM non-volatile memories
  • Random access memory can include static random-access memory (SRAM), dynamic random-access memory (DRAM), synchronous dynamic random-access memory (SDRAM), double data rate synchronous Dynamic random access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as the fifth generation DDR SDRAM is generally called DDR5SDRAM), etc.;
  • SRAM static random-access memory
  • DRAM dynamic random-access memory
  • SDRAM synchronous dynamic random-access memory
  • DDR SDRAM double data rate synchronous Dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • DDR5SDRAM double data rate synchronous dynamic random access memory
  • Non-volatile memory can include disk storage devices and flash memory.
  • Flash memory can be divided according to the operating principle to include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc.
  • the storage unit potential level it can include single-level storage cells (single-level cell, SLC), multi-level storage cells (multi-level cell, MLC), third-level storage unit (triple-level cell, TLC), fourth-level storage unit (quad-level cell, QLC), etc., which can include universal flash storage (English: universal flash storage, UFS) according to storage specifications. , embedded multi media card (embedded multi media Card, eMMC), etc.
  • the random access memory can be directly read and written by the processor 110, can be used to store executable programs (such as machine instructions) of the operating system or other running programs, and can also be used to store user and application data, etc.
  • the non-volatile memory can also store executable programs and user and application program data, etc., and can be loaded into the random access memory in advance for direct reading and writing by the processor 110.
  • the external memory interface 120 can be used to connect an external non-volatile memory to expand the storage capacity of the electronic device.
  • the external non-volatile memory communicates with the processor 110 through the external memory interface 120 to implement the data storage function. For example, save music, video and other files in external non-volatile memory.
  • the electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
  • Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the electronic device can listen to music through speaker 170A, or listen to hands-free calls.
  • Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the electronic device answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
  • Microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C.
  • the electronic device may be provided with at least one microphone 170C. In other embodiments, the electronic device may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. In other embodiments, the electronic device can also be equipped with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
  • the headphone interface 170D is used to connect wired headphones.
  • the headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA Cellular Telecommunications Industry Association of the USA
  • the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
  • pressure sensor 180A may be disposed on display screen 194 .
  • pressure sensors 180A there are many types of pressure sensors 180A, such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc.
  • a capacitive pressure sensor may include at least two parallel plates of conductive material.
  • the electronic device detects the strength of the touch operation according to the pressure sensor 180A.
  • the electronic device may also calculate the touched position based on the detection signal of the pressure sensor 180A.
  • touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
  • the gyro sensor 180B can be used to determine the motion posture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (ie, x, y, and z axes) may be determined by gyro sensor 180B.
  • the gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device shakes, and calculates the distance that the lens module needs to compensate based on the angle, so that the lens can offset the shake of the electronic device through reverse movement to achieve anti-shake.
  • the gyro sensor 180B can also be used for navigation and somatosensory game scenes.
  • Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
  • Magnetic sensor 180D includes a Hall sensor.
  • the electronic device can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
  • the electronic device may detect opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the acceleration of the electronic device in various directions (generally three axes). When the electronic device is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
  • Distance sensor 180F for measuring distance.
  • Electronic devices can measure distance via infrared or laser. In some implementations, in shooting scenes, electronic devices can use the distance sensor 180F to measure distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
  • the light emitting diode may be an infrared light emitting diode.
  • Electronic devices emit infrared light through light-emitting diodes.
  • Electronic devices use photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device. When insufficient reflected light is detected, the electronic device can determine that there is no object near the electronic device.
  • Electronic devices can use the proximity light sensor 180G to detect when the user holds the electronic device close to the ear and talk, so that the screen can be automatically turned off to save power.
  • the proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device can adaptively adjust the brightness of the display screen 194 based on perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touching.
  • Fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, answer incoming calls with fingerprints, etc.
  • Temperature sensor 180J is used to detect temperature.
  • the electronic device uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device heats the battery 142 to prevent the low temperature from causing abnormal shutdown of the electronic device. In some other embodiments, when the temperature is lower than another threshold, the electronic device performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also known as "touch device”.
  • the touch sensor 180K can be disposed on the display screen 194.
  • the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
  • the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
  • Visual output related to the touch operation may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device at a location different from that of the display screen 194 .
  • Bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human body's vocal part.
  • the bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals.
  • the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone.
  • the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function.
  • the application processor can analyze the heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M to implement the heart rate detection function.
  • the buttons 190 include a power button, a volume button, etc.
  • Key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device can receive key input and generate key signal input related to user settings and function control of the electronic device.
  • the motor 191 can generate vibration prompts.
  • the motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
  • touch operations for different applications can correspond to different vibration feedback effects.
  • the motor 191 can also respond to different vibration feedback effects for touch operations in different areas of the display screen 194 .
  • Different application scenarios such as time reminders, receiving information, alarm clocks, games, etc.
  • the touch vibration feedback effect can also be customized.
  • the indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
  • the SIM card interface 195 is used to connect a SIM card.
  • the SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to realize contact and separation from the electronic device.
  • the electronic device can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card, etc. same Each SIM card interface 195 can insert multiple cards at the same time. The types of the plurality of cards may be the same or different.
  • the SIM card interface 195 is also compatible with different types of SIM cards.
  • the SIM card interface 195 is also compatible with external memory cards.
  • Electronic devices interact with the network through SIM cards to implement functions such as calls and data communications.
  • the electronic device uses an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device and cannot be separated from the electronic device.
  • Software systems of electronic devices can adopt layered architecture, event-driven architecture, microkernel architecture, microservice architecture, or cloud architecture.
  • the embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device.
  • FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
  • the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
  • the layers communicate through software interfaces.
  • the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
  • the application layer can include a series of application packages.
  • the application package can include camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and other applications.
  • the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer can include a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
  • a window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make this data accessible to applications.
  • Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
  • a view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • Telephone managers are used to provide communication functions of electronic devices. For example, call status management (including connected, hung up, etc.).
  • the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
  • Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
  • the application layer and application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and application framework layer into binary files.
  • the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
  • System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
  • the surface manager manages the display subsystem and provides integration of 2D and 3D layers for multiple applications. combine.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
  • 2D Graphics Engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the phone manager may be responsible for performing the interception of unwanted cell phone calls and cell text messages.
  • the phone manager may also be responsible for executing emails, Internet calls, Internet text messages, messages, and short video communications from unwanted persons.
  • FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
  • the instant messaging application will send the account to the system application.
  • the account is the communication identifier of the undesirable person.
  • the system application may be a mobile phone manager, or a service running on the operating system, such as a phone manager.
  • the blacklist library is located in the internal memory 121.
  • the blacklist database may also be located in the server corresponding to the operating system.
  • the blacklist database is saved locally in the form of a configuration file.
  • FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
  • the instant messaging application After receiving an audio or video call or message, the instant messaging application queries whether the peer's communication identifier is in the blacklist.
  • the instant messaging application determines that the peer's communication identifier is in the blacklist, it will intercept the audio and video call or message.
  • Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
  • the instant messaging application or system application After receiving an Internet call or an Internet text message, the instant messaging application or system application sends a query request to the phone manager.
  • the query request includes the communication identifier of the peer user.
  • the phone manager queries whether the communication ID of the peer user belongs to the blacklist database.
  • the phone manager After the phone manager determines that the user's communication identifier belongs to the blacklist library, the phone manager sends an instruction message to the instant messaging application or system application.
  • the instruction message is used to instruct the communication application or system application to intercept Internet calls or Internet text messages.
  • the instant messaging application can also determine whether to intercept in the manner shown in Figure 11C.
  • the term “when” may be interpreted to mean “if" or “after” or “in response to determining" or “in response to detecting" depending on the context.
  • the phrase “when determining" or “if (stated condition or event) is detected” may be interpreted to mean “if it is determined" or “in response to determining" or “when (stated condition or event) is detected” or “in response to upon detection of (stated condition or event)”.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted over a wired connection from a website, computer, server, or data center (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state drive), etc.

Abstract

The embodiments of the present application provide an account shielding method, a communication system, and an electronic device. According to the account shielding method, association can be executed with respect to a communication identifier added to a shielding list by a user, so that a plurality of other communication identifiers are obtained; and after the communication identifier added to the shielding list is associated with the other communication identifiers, the newly added communication identifier is also added to the shielding list, so that a server or an electronic device can intercept communication corresponding to the shielding list. The account shielding method provided by the present application can determine more communication identifiers which are not welcome, so that the user is not disturbed by unwelcome communication.

Description

账户屏蔽方法、通信系统及电子设备Account blocking methods, communication systems and electronic devices
本申请要求于2022年05月16日提交中国专利局、申请号为202210529855.8、申请名称为“基于账号和手机号码的黑名单拦截方法、装置和系统”,以及,于2022年08月31日提交中国专利局、申请号为202211062344.6、申请名称为“账户屏蔽方法、通信系统及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application is required to be submitted to the China Patent Office on May 16, 2022, the application number is 202210529855.8, the application name is "Blacklist interception method, device and system based on account number and mobile phone number", and it is submitted on August 31, 2022 The Chinese Patent Office has the right of priority to the Chinese patent application with application number 202211062344.6 and the application title is "Account Shielding Method, Communication System and Electronic Device", the entire content of which is incorporated into this application by reference.
技术领域Technical field
本申请涉及电子技术领域,尤其涉及账户屏蔽方法、通信系统及电子设备。This application relates to the field of electronic technology, and in particular to account shielding methods, communication systems and electronic devices.
背景技术Background technique
手机作为通讯设备可以接收到其他用户的蜂窝电话和/或蜂窝短信;同时,手机作为智能设备,手机上还可以运行有等即时通信应用程序,也可以通过即时通信应用程序接收其他用户的音视频通话、消息(如消息)、网络电话和/或网络短信。As a communication device, a mobile phone can receive cellular calls and/or cellular text messages from other users; at the same time, as a smart device, a mobile phone can also run You can also receive audio and video calls and messages from other users through instant messaging applications (such as messages), Internet calls and/or Internet SMS.
在日常生活中,用户的电子设备可能会收到不受欢迎者的蜂窝电话和/或蜂窝短信。在接收到用户对蜂窝号码(电话号码)的拉黑操作后,电子设备可以拦截该蜂窝号码的来电,并且将该蜂窝号码发送的短信移入垃圾箱且不提醒用户,但是不受欢迎者仍然可以通过即时通信应用程序的账户向用户拨打网络电话和/或发送网络短信。In daily life, users' electronic devices may receive cellular calls and/or cellular text messages from unwanted persons. After receiving the user's blocking operation of a cellular number (phone number), the electronic device can intercept incoming calls from the cellular number, and move the text messages sent by the cellular number into the trash without reminding the user, but the undesirable person can still Make online calls and/or send online text messages to users through the account of the instant messaging application.
发明内容Contents of the invention
本申请实施例提供了账户屏蔽方法、通信系统及电子设备。本申请提供的账户屏蔽方法,可以通过对用户已经加入屏蔽名单的通信标识执行关联,进而得到多个其它通信标识;并且,当加入屏蔽名单的通信标识被其他通信标识关联后,新增的通信标识也会被加入屏蔽名单,进而服务器或电子设备可以拦截屏蔽名单对应的通信。本申请提供的账户屏蔽方法可以确定不受欢迎者更多的通信标识,进而使得用户不被不受欢迎这打扰。The embodiments of this application provide an account shielding method, a communication system and an electronic device. The account blocking method provided by this application can obtain multiple other communication identifications by correlating the communication identifications that the user has added to the blocking list; and when the communication identifications added to the blocking list are associated with other communication identifications, the newly added communication identifications The identifier will also be added to the block list, so that the server or electronic device can intercept the communication corresponding to the block list. The account blocking method provided by this application can determine more communication identifiers of undesirable persons, thereby preventing users from being disturbed by unwelcome persons.
第一方面,本申请实施例提供了一种账户屏蔽方法,应用于包括第一服务器和第一电子设备的系统,该方法包括:该第一服务器接收到第一消息后,该第一服务器基于该第一消息将第一通信标识与第二通信标识关联,该第一通信标识为第一用户的通信标识,其中,在该第一服务器接收到该第一消息前,该第二通信标识不存在或者该第二通信标识与该第一通信标识不关联,该第一消息为该第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;该第一服务器在确定该第一通信标识属于第一屏蔽名单时,该第一服务器将该第二通信标识加入该第一屏蔽名单,该第一屏蔽名单为第二用户的屏蔽名单;该第一电子设备拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,该第一电子设备为该第二用户的电子设备;或者,该第一服务器拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,且该第一通信的接收方的通信标识为该第二用户的通信标识。In a first aspect, embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device. The method includes: after the first server receives the first message, the first server based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message. There is or the second communication identifier is not associated with the first communication identifier, the first message is sent by the electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines When the first communication identification belongs to the first blocking list, the first server adds the second communication identification to the first blocking list, and the first blocking list is the blocking list of the second user; the first electronic device intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or the first server intercepts the first communication, and the first communication The communication identifier of the initiator is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定与新增的与屏蔽名单相关联的一个或多个通信标识,并将这些新增的一个或多个通信标识加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。其中,第一通信标识相当于通信标识3001,第二通信标识相当于通信标识3003。 In the above embodiments, the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons. Among them, the first communication identification is equivalent to communication identification 3001, and the second communication identification is equivalent to communication identification 3003.
结合第一方面的一些实施例,在一些实施例中,该方法还包括:该第一服务器接收到第二消息后,该第一服务器基于该第二消息将该第一通信标识与第三通信标识关联,该第二消息为即时通信应用程序对应的应用服务器发送的,该第二消息用于指示该第三通信标识与该第一通信标识关联,其中,在该应用服务器在关联该第三通信标识与该第一通信标识前,该第三通信标识不存在或者该第三通信标识与该第一通信标识不关联;该第一服务器将该第三通信标识加入该第一屏蔽名单。With reference to some embodiments of the first aspect, in some embodiments, the method further includes: after the first server receives the second message, the first server communicates the first communication identifier with a third communication based on the second message. Identity association, the second message is sent by the application server corresponding to the instant messaging application, and the second message is used to indicate that the third communication identification is associated with the first communication identification, wherein the application server is associated with the third communication identification. Before the communication identification and the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the first server adds the third communication identification to the first blocking list.
在上述实施例中,新增的通信标识还可以来自于应用服务器,应用服务器确定关联后,可以将新增的通信标识发送到第一服务器,进而使得服务器可以更新屏蔽名单,获取尽可能完备的屏蔽名单,进而使得用户不被不受欢迎者打扰。第三通信标识相当于通信标识3003。In the above embodiment, the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people. The third communication identification is equivalent to communication identification 3003.
结合第一方面的一些实施例,在一些实施例中,在该第一服务器接收到第一消息前,该方法还包括:该第一服务器接收该第一电子设备发送的第三消息,该第三消息包括该第一通信标识;该第一服务器将该第一通信标识加入该第一屏蔽名单;该第一服务器确定与该第一通信标识关联的第四通信标识;该第一服务器将该第四通信标识加入该第一屏蔽名单。With reference to some embodiments of the first aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the third message is received by the first server. The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list. The fourth communication identifier is added to the first blocking list.
在上述实施例中,当用户拉黑第一通信标识后,服务器可以确定与该第一通信标识关联的第二通信标识,并将第四通信标识加入屏蔽名单,进而使得用户不被不受欢迎者打扰。其中,第四通信标识为通信标识3002。In the above embodiment, after the user blocks the first communication identifier, the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb. The fourth communication identifier is communication identifier 3002.
结合第一方面的一些实施例,在一些实施例中,该第一消息用于指示该第一服务器基于该第一通信标识注册该第二通信标识。With reference to some embodiments of the first aspect, in some embodiments, the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
在上述实施例中,当不受欢迎者注册新的账号后,该新注册的账号也会被加入到第一屏蔽名单中,进而使得用户不被不受欢迎者打扰。In the above embodiment, when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
结合第一方面的一些实施例,在一些实施例中,在该第一服务器在接收到该第一消息前,该方法还包括:该第一服务器接收注销请求,该第一服务器注销第一账号,该第一账号为该第一通信标识;该第一消息用于基于第一蜂窝号码注册该第二账号。In conjunction with some embodiments of the first aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account. , the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number.
在上述实施例中,在不受欢迎者通过注销并重新注册的方法试图从屏蔽名单逃逸的情况下,本申请实施例提供的账户屏蔽方法能够将新注册的第二账号加入屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiment, when an undesirable person attempts to escape from the blocking list by logging out and re-registering, the account blocking method provided by the embodiment of the present application can add the newly registered second account to the blocking list, thereby making Users are not disturbed by undesirables.
结合第一方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第一消息用于指示该第一服务器绑定该第一蜂窝号码和第一账号,该第二通信标识为该第一账号。With reference to some embodiments of the first aspect, in some embodiments, the first communication identifier is a first cellular number, the first message is used to instruct the first server to bind the first cellular number and the first account, the The second communication identification is the first account.
在上述实施例中,在不受欢迎者绑定其他通信标识至屏蔽名单中的通信标识后,该其他标识也会被加入屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiment, after the undesirable person binds other communication identifications to the communication identifications in the blocking list, the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
结合第一方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第二消息用于告知该第一服务器该第一用户的蜂窝号码还包括第二蜂窝号码,该第一消息是该第一用户的电子设备检测到新插入的SIM卡后发送的。With reference to some embodiments of the first aspect, in some embodiments, the first communication identifier is a first cellular number, and the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number. , the first message is sent after the first user's electronic device detects the newly inserted SIM card.
在上述实施例中,当不受欢迎者的一个蜂窝号码被加入屏蔽名单后,若不受欢迎者的电子设备插入新的SIM卡后,新的SIM卡对应的第二蜂窝号码也会被加入屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiment, when a cellular number of the unwanted person is added to the blocking list, if a new SIM card is inserted into the electronic device of the unwanted person, the second cellular number corresponding to the new SIM card will also be added. Blocklist, thus preventing users from being disturbed by unwanted persons.
结合第一方面的一些实施例,在一些实施例中,该系统还包括第二服务器,该方法还包括:该第一服务器向该第二服务器发送第四消息,该第四消息包括第五通信标识,该第五通信标识为该第一屏蔽名单中的通信标识;该第二服务器确定与该第五通信标识关联的第六通信标识后,该第二服务器向该第一服务器发送第五消息,该第五消息包括该第六通信标识后, 该第一服务器将该第五通信标识加入该第一屏蔽名单。In conjunction with some embodiments of the first aspect, in some embodiments, the system further includes a second server, and the method further includes: the first server sending a fourth message to the second server, the fourth message including a fifth communication The fifth communication identifier is a communication identifier in the first blocking list; after the second server determines the sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server , after the fifth message includes the sixth communication identifier, The first server adds the fifth communication identifier to the first blocking list.
在上述实施例中,还可以通过多个服务器来确定尽可能完备的不受欢迎者的通信标识,进而使得用户不被不受欢迎者打扰。In the above embodiment, multiple servers can also be used to determine the communication identification of the undesirable person as complete as possible, so that the user is not disturbed by the undesirable person.
第二方面,本申请实施例提供了一种账户屏蔽方法,应用于第一服务器,该方法包括:该第一服务器接收到第一消息后,该第一服务器基于该第一消息将第一通信标识与第二通信标识关联,该第一通信标识为第一用户的通信标识,其中,在该第一服务器接收到该第一消息前,该第二通信标识不存在或者该第二通信标识与该第一通信标识不关联,该第一消息为该第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;该第一服务器在确定该第一通信标识属于第一屏蔽名单时,该第一服务器将该第二通信标识加入该第一屏蔽名单,该第一屏蔽名单为第二用户的屏蔽名单;该第一服务器拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,且该第一通信的接收方的通信标识为该第二用户的通信标识。In a second aspect, embodiments of the present application provide an account shielding method, applied to a first server. The method includes: after the first server receives the first message, the first server sends the first communication to the first server based on the first message. The identification is associated with a second communication identification, and the first communication identification is the communication identification of the first user. Before the first server receives the first message, the second communication identification does not exist or the second communication identification is different from the first communication identification. The first communication identifier is not associated, the first message is sent by the first user's electronic device, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first user. When blocking the list, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the initiator of the first communication The communication identifier of is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定与新增的与屏蔽名单相关联的一个或多个通信标识,并将这些新增的一个或多个通信标识加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。其中,第一通信标识相当于通信标识3001,第二通信标识相当于通信标识3003。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons. Among them, the first communication identification is equivalent to communication identification 3001, and the second communication identification is equivalent to communication identification 3003.
结合第二方面的一些实施例,在一些实施例中,该第一服务器接收到第二消息后,该第一服务器基于该第二消息将该第一通信标识与第三通信标识关联,该第二消息为即时通信应用程序对应的应用服务器发送的,该第二消息用于指示该第三通信标识与该第一通信标识关联,其中,在该应用服务器关联该第三通信标识与该第一通信标识前,该第三通信标识不存在或者该第三通信标识与该第一通信标识不关联;该第一服务器将该第三通信标识加入该第一屏蔽名单。With reference to some embodiments of the second aspect, in some embodiments, after the first server receives the second message, the first server associates the first communication identification with the third communication identification based on the second message, and the first communication identification is The second message is sent by the application server corresponding to the instant messaging application. The second message is used to indicate that the third communication identifier is associated with the first communication identifier, wherein the third communication identifier is associated with the first communication identifier in the application server. Before the communication identifier, the third communication identifier does not exist or the third communication identifier is not associated with the first communication identifier; the first server adds the third communication identifier to the first blocking list.
在上述实施例中,新增的通信标识还可以来自于应用服务器,应用服务器确定关联后,可以将新增的通信标识发送到第一服务器,进而使得服务器可以更新屏蔽名单,获取尽可能完备的屏蔽名单,进而使得用户不被不受欢迎者打扰。第三通信标识相当于通信标识3003。In the above embodiment, the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people. The third communication identification is equivalent to communication identification 3003.
结合第二方面的一些实施例,在一些实施例中,在该第一服务器接收到第一消息前,该方法还包括:该第一服务器接收该第一电子设备发送的第三消息,该第三消息包括该第一通信标识;该第一服务器将该第一通信标识加入该第一屏蔽名单;该第一服务器确定与该第一通信标识关联的第四通信标识;该第一服务器将该第四通信标识加入该第一屏蔽名单。With reference to some embodiments of the second aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list. The fourth communication identifier is added to the first blocking list.
在上述实施例中,当用户拉黑第一通信标识后,服务器可以确定与该第一通信标识关联的第二通信标识,并将第四通信标识加入屏蔽名单,进而使得用户不被不受欢迎者打扰。其中,第四通信标识为通信标识3002。In the above embodiment, after the user blocks the first communication identifier, the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb. The fourth communication identifier is communication identifier 3002.
结合第二方面的一些实施例,在一些实施例中,该第一消息用于指示该第一服务器基于该第一通信标识注册该第二通信标识。With reference to some embodiments of the second aspect, in some embodiments, the first message is used to instruct the first server to register the second communication identification based on the first communication identification.
在上述实施例中,当不受欢迎者注册新的账号后,该新注册的账号也会被加入到第一屏蔽名单中,进而使得用户不被不受欢迎者打扰。In the above embodiment, when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
结合第二方面的一些实施例,在一些实施例中,在该第一服务器在接收到该第一消息前,该方法还包括:该第一服务器接收注销请求,该第一服务器注销第一账号,该第一账号为该第一通信标识;该第一消息用于基于第一蜂窝号码注册该第二账号,该第一蜂窝号码为该第四通信标识,该第二账号为该第二通信标识。 Combined with some embodiments of the second aspect, in some embodiments, before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account. , the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is the second communication identifier logo.
结合第一方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第一消息用于指示该第一服务器绑定该第一蜂窝号码和第一账号,该第二通信标识为该第一账号。With reference to some embodiments of the first aspect, in some embodiments, the first communication identifier is a first cellular number, the first message is used to instruct the first server to bind the first cellular number and the first account, the The second communication identification is the first account.
在上述实施例中,在不受欢迎者绑定其他通信标识至屏蔽名单中的通信标识后,该其他标识也会被加入屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiment, after the undesirable person binds other communication identifications to the communication identifications in the blocking list, the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
结合第一方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第二消息用于告知该第一服务器该第一用户的蜂窝号码还包括第二蜂窝号码,该第一消息是该第一用户的电子设备检测到新插入的SIM卡后发送的。With reference to some embodiments of the first aspect, in some embodiments, the first communication identifier is a first cellular number, and the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number. , the first message is sent after the first user's electronic device detects the newly inserted SIM card.
在上述实施例中,当不受欢迎者的一个蜂窝号码被加入屏蔽名单后,若不受欢迎者的电子设备插入新的SIM卡后,新的SIM卡对应的第二蜂窝号码也会被加入屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiment, when a cellular number of the unwanted person is added to the blocking list, if a new SIM card is inserted into the electronic device of the unwanted person, the second cellular number corresponding to the new SIM card will also be added. Blocklist, thus preventing users from being disturbed by unwanted people.
第三方面,本申请实施例提供了一种账户屏蔽方法,应用于包括第一服务器和第一电子设备的系统,该方法包括:该第一电子设备向该第一服务器发送第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器确定与该第一通信标识关联的第一蜂窝号码;该第一服务器向该第一电子设备发送第一蜂窝号码;该第一电子设备拦截第一通信,该第一通信为该第一蜂窝号码对应的蜂窝通话或蜂窝短信。In a third aspect, embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device. The method includes: the first electronic device sending a first message to the first server, the The first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identifier; the first server sends a message to the first electronic device Send the first cellular number; the first electronic device intercepts the first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定与屏蔽名单相关联的蜂窝号码,并将这些蜂窝号码加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。第一通信标识为通信标识3001,第一蜂窝号码为通信标识3002和通信标识3003。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons. The first communication identifier is communication identifier 3001, and the first cell number is communication identifier 3002 and communication identifier 3003.
结合第三方面的一些实施例,在一些实施例中,在该第一服务器在接收到第一消息后,该方法还包括:该第一服务器接收第二消息,该第一服务器基于该第二消息确定第二通信标识与该第一蜂窝号码关联,述第二消息用于指示该第一服务器基于该第一蜂窝号码注册该第一账号,或者,该第二消息用于指示该第一服务器绑定该第一蜂窝号码与该第一账号;该第一服务器拦截第二通信,该第二通信为该第一账号向该第一用户的账号发起的音视频通话、网络电话、网络短信或消息。In conjunction with some embodiments of the third aspect, in some embodiments, after the first server receives the first message, the method further includes: the first server receives a second message, and the first server based on the second message The message determines that the second communication identifier is associated with the first cellular number, and the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to register the first account based on the first cellular number. Bind the first cellular number to the first account; the first server intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message, or Internet call initiated by the first account to the first user's account. information.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定新增的通信标识是否与屏蔽名单相关联,若关联则将这些新增的通信标识加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
结合第三方面的一些实施例,在一些实施例中该第一服务器接收第二消息,该第一服务器基于该第二消息确定第二通信标识与该第一蜂窝号码关联,述第二消息用于指示该第一服务器基于该第一蜂窝号码注册该第一账号,或者,该第二消息用于指示该第一服务器绑定该第一蜂窝号码与该第一账号;该第一服务器向该第一电子设备发送第三消息,该第三消息包括第一账号;该第一电子设备拦截第二通信,该第二通信为该第一账号发起的音视频通话、网络电话、网络短信或消息。In conjunction with some embodiments of the third aspect, in some embodiments the first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used Instructing the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to bind the first cellular number and the first account; the first server sends a message to the first server. The first electronic device sends a third message, the third message includes the first account; the first electronic device intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message or message initiated by the first account .
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定新增的通信标识是否与屏蔽名单相关联,若关联则将这些新增的通信标识加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
第四方面,本申请实施例提供了一种账户屏蔽方法,应用于第一服务器,该方法包括:该第一服务器接收第一电子设备发送的第一消息,该第一消息包括第一通信标识,通信标识 为蜂窝号码或即时通信应用程序的账号;该第一服务器确定与该第一通信标识关联的第一蜂窝号码;该第一服务器向该第一电子设备发送第二消息,该第二消息包括该第一蜂窝号码,该第一蜂窝号码对应的蜂窝通话或蜂窝短信被该第一电子设备拦截。In a fourth aspect, embodiments of the present application provide an account shielding method, applied to a first server. The method includes: the first server receives a first message sent by a first electronic device, where the first message includes a first communication identifier. , communication identification is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identification; the first server sends a second message to the first electronic device, the second message includes the The first cellular number, the cellular call or cellular text message corresponding to the first cellular number is intercepted by the first electronic device.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定与屏蔽名单相关联的蜂窝号码,并将这些蜂窝号码加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。第一通信标识为通信标识3001,第一蜂窝号码为通信标识3002和通信标识3003。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons. The first communication identifier is communication identifier 3001, and the first cell number is communication identifier 3002 and communication identifier 3003.
结合第四方面的一些实施例,在一些实施例中,在该第一服务器接收第一电子设备发送的第一消息后,该方法还包括:该第一服务器接收第二消息,该第一服务器基于该第二消息确定第二通信标识与该第一蜂窝号码关联,该第二消息用于指示该第一服务器基于该第一蜂窝号码注册该第一账号,或者,该第二消息用于指示该第一服务器绑定该第一蜂窝号码与该第一账号;该第一服务器拦截第二通信,该第二通信为该第一账号向该第一用户的账号发起的音视频通话、网络电话、网络短信或消息。With reference to some embodiments of the fourth aspect, in some embodiments, after the first server receives the first message sent by the first electronic device, the method further includes: the first server receives the second message, and the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate The first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定新增的通信标识是否与屏蔽名单相关联,若关联则将这些新增的通信标识加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
第五方面,本申请实施例提供了一种账户屏蔽方法,应用于第一电子设备,该方法包括:该第一电子设备确定第一通信标识在第一屏蔽名单中后,该第一电子设备确定与该第一通信标识关联的第二通信标识,其中,在该第一通信标识为第一蜂窝号码的情况下,该第二通信标识为第二蜂窝号码;在该第一通信标识为第一账户的情况下,该第二通信标识为第一蜂窝号码,通信标识为蜂窝号码或即时通信应用程序的账号;在该第一电子设备将该第二通信标识被加入该第一屏蔽名单;该第一电子设备拦截第一通信,该第一通信的发起方的标识为该第一屏蔽名单中的通信标识。In the fifth aspect, embodiments of the present application provide an account blocking method, applied to a first electronic device. The method includes: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking list.
在上述实施例中,本申请实施例提供的账户屏蔽方法可以确定与屏蔽名单相关联的蜂窝号码,并将这些蜂窝号码加入到屏蔽名单,进而使得用户不被不受欢迎者打扰。第一通信标识为通信标识3001,第二通信标识为通信标识3002或通信标识3003。In the above embodiments, the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons. The first communication identifier is communication identifier 3001, and the second communication identifier is communication identifier 3002 or communication identifier 3003.
结合第五方面的一些实施例,在一些实施例中,该第一电子设备确定与该第一通信标识关联的第二通信标识,具体包括:系统应用向一个或多个即时通信应用程序发送第一消息,该第一消息包括该第一通信标识,该一个或多个即时通信应用程序包括第一应用程序;该第一应用程序确定该第二通信标识与该第一通信标识关联;该第一应用程序向该系统应用发送第二消息,该第二消息包括该第二通信标识该系统应用确定该第二通信标识与该第一通信标识关联。With reference to some embodiments of the fifth aspect, in some embodiments, the first electronic device determines a second communication identifier associated with the first communication identifier, specifically including: a system application sending a first communication identifier to one or more instant messaging applications. A message, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application program; the first application program determines that the second communication identifier is associated with the first communication identifier; the first communication identifier is An application program sends a second message to the system application, where the second message includes the second communication identifier. The system application determines that the second communication identifier is associated with the first communication identifier.
在上述实施例中,系统应用可以通过向其他第三方应用程序查询获取到与第一通信标识关联的其他通信标识,进而将其他通信标识加入屏蔽名单。In the above embodiment, the system application can obtain other communication identifiers associated with the first communication identifier by querying other third-party applications, and then add the other communication identifiers to the blocking list.
第六方面,本申请实施例提供了一种账户屏蔽方法,应用于包括第一电子设备、第二电子设备和第一服务器的系统,该方法包括:该第一电子设备向该第一服务器发送第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器基于该第一通信标识确定第二电子设备,该第一通信标识为该第二电子设备上用户的通信标识;该第一服务器向该第二电子设备发送第二通信标识,该第二通信标识为该第一电子设备上用户的通信标识;该第二电子设备在接收到该第二通信标识后,拦截第一通信,该第 一通信的接收方的标识为该第二通信标识。In a sixth aspect, embodiments of the present application provide an account shielding method, applied to a system including a first electronic device, a second electronic device, and a first server. The method includes: the first electronic device sends an account to the first server. The first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines the second electronic device based on the first communication identifier, and the first communication identifier is The communication identification of the user on the second electronic device; the first server sends the second communication identification to the second electronic device, and the second communication identification is the communication identification of the user on the first electronic device; the second electronic device receives After receiving the second communication identifier, the first communication is intercepted, and the third communication is intercepted. The identity of the recipient of a communication is the second communication identity.
在上述实施例中,服务器确定第一电子设备将第一通信标识加入到屏蔽名单后,服务器通知第二电子设备,使得第二电子设备拦截第二电子设备上用户发起的向第一电子设备上用户的通信。第一通信标识为通信标识3001,第二通信标识为通信标识3002或通信标识3003。In the above embodiment, after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device. User communications. The first communication identifier is communication identifier 3001, and the second communication identifier is communication identifier 3002 or communication identifier 3003.
第七方面,本申请实施例提供了一种账户屏蔽方法,应用于第一服务器,该方法包括:该第一服务器接收第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器基于该第一通信标识确定第二电子设备,该第一通信标识为该第二电子设备上用户的通信标识;该第一服务器向该第二电子设备发送第二消息,该第二消息包括该第二通信标识,该第二通信标识为第一电子设备上用户的通信标识,该第二消息用于指示该第二电子设备拦截第一通信,该第一通信的接收方的通信标识为该第二通信标识。In the seventh aspect, embodiments of the present application provide an account shielding method, applied to a first server. The method includes: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number. or the account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device. The device sends a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, and the second message is used to instruct the second electronic device to intercept the first communication, The communication identification of the recipient of the first communication is the second communication identification.
在上述实施例中,服务器确定第一电子设备将第一通信标识加入到屏蔽名单后,服务器通知第二电子设备,使得第二电子设备拦截第二电子设备上用户发起的向第一电子设备上用户的通信。In the above embodiment, after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device. User communications.
第八方面,本申请实施例提供了一种账户屏蔽方法,应用于第二电子设备,该方法包括:接收第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;拦截第一通信,该第一通信的接收方的通信标识为该第一通信标识。In an eighth aspect, embodiments of the present application provide an account shielding method, applied to a second electronic device. The method includes: receiving a first message, the first message including a first communication identifier, and the communication identifier is a cellular number or instant messaging. The account of the application program; intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
在上述实施例中,第二电子设备接收第一消息后,确定第二电子设备上的用户被其他电子设备的上用户加入屏蔽名单,则第二电子设备会拦截向其他电子设备上用户的通信。In the above embodiment, after the second electronic device receives the first message and determines that the user on the second electronic device has been added to the blocked list by the user on the other electronic device, the second electronic device will intercept the communication to the user on the other electronic device. .
第九方面,本申请实施例提供了一种服务器,该服务器包括:一个或多个处理器和存储器;该存储器与该一个或多个处理器耦合,该存储器用于存储计算机程序代码,该计算机程序代码包括计算机指令,该一个或多个处理器调用该计算机指令以使得该电子设备执行:该第一服务器接收到第一消息后,该第一服务器基于该第一消息将第一通信标识与第二通信标识关联,该第一通信标识为第一用户的通信标识,其中,在该第一服务器接收到该第一消息前,该第二通信标识不存在或者该第二通信标识与该第一通信标识不关联,该第一消息为该第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;该第一服务器在确定该第一通信标识属于第一屏蔽名单时,该第一服务器将该第二通信标识加入该第一屏蔽名单,该第一屏蔽名单为第二用户的屏蔽名单;该第一服务器拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,且该第一通信的接收方的通信标识为该第二用户的通信标识。In a ninth aspect, embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer The program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first server receives the first message, the first server combines the first communication identification with the first message based on the first message. A second communication identification is associated, and the first communication identification is the communication identification of the first user. Before the first server receives the first message, the second communication identification does not exist or the second communication identification is not related to the third communication identification. A communication identifier is not associated, the first message is sent by the electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first blocking list When, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the communication of the initiator of the first communication The identifier is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
结合第九方面的一些实施例,在一些实施例中,该一个或多个处理器,还用于调用该计算机指令以使得该电子设备执行:该第一服务器接收到第二消息后,该第一服务器基于该第二消息将该第一通信标识与第三通信标识关联,该第二消息为即时通信应用程序对应的应用服务器发送的,该第二消息用于指示该第三通信标识与该第一通信标识关联,其中,在该应用服务器关联该第三通信标识与该第一通信标识前,该第三通信标识不存在或者该第三通信标识与该第一通信标识不关联;该第一服务器将该第三通信标识加入该第一屏蔽名单。In conjunction with some embodiments of the ninth aspect, in some embodiments, the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: after the first server receives the second message, the third A server associates the first communication identifier with the third communication identifier based on the second message. The second message is sent by the application server corresponding to the instant messaging application. The second message is used to indicate that the third communication identifier is associated with the third communication identifier. The first communication identification is associated, wherein before the application server associates the third communication identification with the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the third communication identification is not associated with the first communication identification; A server adds the third communication identifier to the first blocking list.
结合第九方面的一些实施例,在一些实施例中,该一个或多个处理器,还用于调用该计算机指令以使得该电子设备执行:该第一服务器接收该第一电子设备发送的第三消息,该第 三消息包括该第一通信标识;该第一服务器将该第一通信标识加入该第一屏蔽名单;该第一服务器确定与该第一通信标识关联的第四通信标识;该第一服务器将该第四通信标识加入该第一屏蔽名单。In conjunction with some embodiments of the ninth aspect, in some embodiments, the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the first electronic device sent by the first electronic device. Three messages, the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list. The fourth communication identifier is added to the first blocking list.
结合第九方面的一些实施例,在一些实施例中,该第一消息用于指示该第一服务器基于该第一通信标识注册该第二通信标识。With reference to some embodiments of the ninth aspect, in some embodiments, the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
结合第九方面的一些实施例,在一些实施例中,该一个或多个处理器,还用于调用该计算机指令以使得该电子设备执行:该第一服务器接收注销请求,该第一服务器注销第一账号,该第一账号为该第一通信标识;该第一消息用于基于第一蜂窝号码注册该第二账号,该第一蜂窝号码为该第四通信标识,该第二账号为该第二通信标识。In conjunction with some embodiments of the ninth aspect, in some embodiments, the one or more processors are also used to call the computer instructions to cause the electronic device to execute: the first server receives a logout request, and the first server logs out The first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is Second communication identifier.
结合第九方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第一消息用于指示该第一服务器绑定该第一蜂窝号码和第一账号,该第二通信标识为该第一账号。With reference to some embodiments of the ninth aspect, in some embodiments, the first communication identifier is a first cellular number, the first message is used to instruct the first server to bind the first cellular number and the first account, the The second communication identification is the first account.
结合第九方面的一些实施例,在一些实施例中,该第一通信标识为第一蜂窝号码,该第二消息用于告知该第一服务器该第一用户的蜂窝号码还包括第二蜂窝号码,该第一消息是该第一用户的电子设备检测到新插入的SIM卡后发送的。With reference to some embodiments of the ninth aspect, in some embodiments, the first communication identifier is a first cellular number, and the second message is used to inform the first server that the first user's cellular number also includes a second cellular number. , the first message is sent after the first user's electronic device detects the newly inserted SIM card.
第十方面,本申请实施例提供了一种服务器,该服务器包括:一个或多个处理器和存储器;该存储器与该一个或多个处理器耦合,该存储器用于存储计算机程序代码,该计算机程序代码包括计算机指令,该一个或多个处理器调用该计算机指令以使得该电子设备执行:该第一服务器接收第一电子设备发送的第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器确定与该第一通信标识关联的第一蜂窝号码;该第一服务器向该第一电子设备发送第二消息,该第二消息包括该第一蜂窝号码,该第一蜂窝号码对应的蜂窝通话或蜂窝短信被该第一电子设备拦截。In a tenth aspect, embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer The program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: the first server receives a first message sent by the first electronic device, the first message includes a first communication identifier, and the communication The identification is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identification; the first server sends a second message to the first electronic device, the second message includes The first cellular number, the cellular call or the cellular text message corresponding to the first cellular number are intercepted by the first electronic device.
结合第十方面的一些实施例,在一些实施例中,该一个或多个处理器,还用于调用该计算机指令以使得该电子设备执行:该第一服务器接收第二消息,该第一服务器基于该第二消息确定第二通信标识与该第一蜂窝号码关联,该第二消息用于指示该第一服务器基于该第一蜂窝号码注册该第一账号,或者,该第二消息用于指示该第一服务器绑定该第一蜂窝号码与该第一账号;该第一服务器拦截第二通信,该第二通信为该第一账号向该第一用户的账号发起的音视频通话、网络电话、网络短信或消息。In conjunction with some embodiments of the tenth aspect, in some embodiments, the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the second message, the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate The first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
第十一方面,本申请实施例提供了一种电子设备,该电子设备包括:一个或多个处理器和存储器;该存储器与该一个或多个处理器耦合,该存储器用于存储计算机程序代码,该计算机程序代码包括计算机指令,该一个或多个处理器调用该计算机指令以使得该电子设备执行:该第一电子设备确定第一通信标识在第一屏蔽名单中后,该第一电子设备确定与该第一通信标识关联的第二通信标识,其中,在该第一通信标识为第一蜂窝号码的情况下,该第二通信标识为第二蜂窝号码;在该第一通信标识为第一账户的情况下,该第二通信标识为第一蜂窝号码,通信标识为蜂窝号码或即时通信应用程序的账号;在该第一电子设备将该第二通信标识被加入该第一屏蔽名单;该第一电子设备拦截第一通信,该第一通信的发起方的标识为该第一屏蔽名单中的通信标识。In an eleventh aspect, embodiments of the present application provide an electronic device. The electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes. , the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking list.
结合第十一方面的一些实施例,在一些实施例中,该一个或多个处理器,具体用于调用该计算机指令以使得该电子设备执行:系统应用向一个或多个即时通信应用程序发送第一消 息,该第一消息包括该第一通信标识,该一个或多个即时通信应用程序包括第一应用程序;该第一应用程序确定该第二通信标识与该第一通信标识关联;该第一应用程序向该系统应用发送第二消息,该第二消息包括该第二通信标识该系统应用确定该第二通信标识与该第一通信标识关联。In conjunction with some embodiments of the eleventh aspect, in some embodiments, the one or more processors are specifically configured to invoke the computer instructions to cause the electronic device to execute: a system application sends a message to one or more instant messaging applications first match information, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application; the first application determines that the second communication identifier is associated with the first communication identifier; the first The application program sends a second message to the system application, where the second message includes the second communication identifier and the system application determines that the second communication identifier is associated with the first communication identifier.
第十二方面,本申请实施例提供了一种服务器,该服务器包括:一个或多个处理器和存储器;该存储器与该一个或多个处理器耦合,该存储器用于存储计算机程序代码,该计算机程序代码包括计算机指令,该一个或多个处理器调用该计算机指令以使得该电子设备执行:该第一服务器接收第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器基于该第一通信标识确定第二电子设备,该第一通信标识为该第二电子设备上用户的通信标识;该第一服务器向该第二电子设备发送第二消息,该第二消息包括该第二通信标识,该第二通信标识为第一电子设备上用户的通信标识,该第二消息用于指示该第二电子设备拦截第一通信,该第一通信的接收方的通信标识为该第二通信标识。In a twelfth aspect, embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes, the The computer program code includes computer instructions that are invoked by the one or more processors to cause the electronic device to execute: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or The account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device Send a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, the second message is used to instruct the second electronic device to intercept the first communication, the The communication identification of the recipient of the first communication is the second communication identification.
第十三方面,本申请实施例提供了一种电子设备,该电子设备包括:一个或多个处理器和存储器;该存储器与该一个或多个处理器耦合,该存储器用于存储计算机程序代码,该计算机程序代码包括计算机指令,该一个或多个处理器调用该计算机指令以使得该电子设备执行:接收第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;拦截第一通信,该第一通信的接收方的通信标识为该第一通信标识。In a thirteenth aspect, embodiments of the present application provide an electronic device. The electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes. , the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to perform: receiving a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or instant messaging The account of the application program; intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
第十四方面,本申请实施例提供了一种通信系统,该通信系统包括:该通信系统包括第一电子设备和第一服务器,其中,该第一服务器用于在接收到第一消息后基于该第一消息将第一通信标识与第二通信标识关联,该第一通信标识为第一用户的通信标识,其中,在该第一服务器接收到该第一消息前,该第二通信标识不存在或者该第二通信标识与该第一通信标识不关联,该第一消息为该第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;In a fourteenth aspect, embodiments of the present application provide a communication system. The communication system includes: the communication system includes a first electronic device and a first server, wherein the first server is configured to receive the first message based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message. There is or the second communication identifier is not associated with the first communication identifier, the first message is sent by the electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application;
该第一服务器用于在确定该第一通信标识属于第一屏蔽名单时,将该第二通信标识加入该第一屏蔽名单,该第一屏蔽名单为第二用户的屏蔽名单The first server is configured to add the second communication identification to the first blocking list when determining that the first communication identification belongs to the first blocking list. The first blocking list is the blocking list of the second user.
该第一电子设备用于拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,该第一电子设备为该第二用户的电子设备;或者,该第一服务器用于拦截第一通信,该第一通信的发起方的通信标识在该第一屏蔽名单中,且该第一通信的接收方的通信标识为该第二用户的通信标识。The first electronic device is used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or, the first server Used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
第十五方面,本申请实施例提供了一种通信系统,该通信系统包括第一电子设备和第一服务器,其中,该第一电子设备用于向该第一服务器发送第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器用于确定与该第一通信标识关联的第一蜂窝号码;该第一服务器用于向该第一电子设备发送第一蜂窝号码;该第一电子设备用于拦截第一通信,该第一通信为该第一蜂窝号码对应的蜂窝通话或蜂窝短信。In a fifteenth aspect, embodiments of the present application provide a communication system. The communication system includes a first electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, and the first electronic device is configured to send a first message to the first server. A message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server is used to determine the first cellular number associated with the first communication identifier; the first server is used to send a message to the third communication identifier. An electronic device sends a first cellular number; the first electronic device is used to intercept a first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
第十六方面,本申请实施例提供了一种通信系统,该通信系统包括第一电子设备、第二 电子设备和第一服务器,其中,该第一电子设备用于向该第一服务器发送第一消息,该第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;该第一服务器用于基于该第一通信标识确定第二电子设备,该第一通信标识为该第二电子设备上用户的通信标识;该第一服务器用于向该第二电子设备发送第二通信标识,该第二通信标识为该第一电子设备上用户的通信标识;该第二电子设备用于在接收到该第二通信标识后,拦截第一通信,该第一通信的接收方的标识为该第二通信标识。In a sixteenth aspect, embodiments of the present application provide a communication system, which includes a first electronic device, a second An electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; The first server is configured to determine the second electronic device based on the first communication identification, which is the communication identification of the user on the second electronic device; the first server is configured to send the second communication to the second electronic device The second communication identification is the communication identification of the user on the first electronic device; the second electronic device is configured to intercept the first communication after receiving the second communication identification, and the identification of the recipient of the first communication is the second communication identifier.
第十七方面,本申请实施例提供了一种芯片系统,该芯片系统应用于电子设备或服务器,该芯片系统包括一个或多个处理器,该处理器用于调用计算机指令以使得该电子设备执行如第九方面、第十方面、第十一方面、第十二方面以及第九方面、第十方面、第十一方面和第十二方面中任一可能的实现方式描述的方法。In the seventeenth aspect, embodiments of the present application provide a chip system, which is applied to electronic equipment or servers. The chip system includes one or more processors, and the processor is used to call computer instructions to cause the electronic equipment to execute Such as the method described in the ninth aspect, the tenth aspect, the eleventh aspect, the twelfth aspect and any possible implementation manner of the ninth aspect, the tenth aspect, the eleventh aspect and the twelfth aspect.
第十八方面,本申请实施例提供一种包含指令的计算机程序产品,当上述计算机程序产品在电子设备上运行时,使得上述电子设备执行如第九方面、第十方面、第十一方面、第十二方面以及第九方面、第十方面、第十一方面和第十二方面中任一可能的实现方式描述的方法。In an eighteenth aspect, embodiments of the present application provide a computer program product containing instructions. When the computer program product is run on an electronic device, the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, The method described in the twelfth aspect and any possible implementation manner in the ninth aspect, the tenth aspect, the eleventh aspect and the twelfth aspect.
第十九方面,本申请实施例提供一种计算机可读存储介质,包括指令,当上述指令在电子设备上运行时,使得上述电子设备执行第九方面、第十方面、第十一方面、第十二方面以及第九方面、第十方面、第十一方面和第十二方面中任一可能的实现方式描述的方法。In a nineteenth aspect, embodiments of the present application provide a computer-readable storage medium, including instructions. When the instructions are run on an electronic device, the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, and the first aspect. The method described in the twelfth aspect and any possible implementation manner in the ninth aspect, the tenth aspect, the eleventh aspect and the twelfth aspect.
可以理解地,上述第九方面、第十方面、第十一方面、第十二方面和第十三方面提供的电子设备或服务器、第十四方面、第十五方面和第十六方面提供的系统、第十七方面提供的芯片系统、第十八方面提供的计算机程序产品和第十九方面提供的计算机存储介质均用于执行本申请实施例所提供的方法。因此,其所能达到的有益效果可参考对应方法中的有益效果,此处不再赘述。It can be understood that the electronic devices or servers provided by the above-mentioned ninth, tenth, eleventh, twelfth and thirteenth aspects, the electronic devices or servers provided by the fourteenth, fifteenth and sixteenth aspects The system, the chip system provided in the seventeenth aspect, the computer program product provided in the eighteenth aspect, and the computer storage medium provided in the nineteenth aspect are all used to execute the method provided by the embodiment of the present application. Therefore, the beneficial effects it can achieve can be referred to the beneficial effects in the corresponding methods, and will not be described again here.
附图说明Description of the drawings
图1为本申请实施例提供的账户屏蔽方法适用场景的一个示例性示意图。Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
图2为本申请实施例提供的账户屏蔽方法的流程的一个示例性示意图。Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
图3为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
图4A为本申请实施例提供的确定一个或多个第二通信标识的一个示例性示意图。FIG. 4A is an exemplary schematic diagram of determining one or more second communication identifiers provided by an embodiment of the present application.
图4B为本申请实施例提供的第一服务器确定一个或多个第二通信标识的一个示例性示意图。FIG. 4B is an exemplary schematic diagram of the first server determining one or more second communication identifiers provided by the embodiment of the present application.
图4C为本申请实施例提供的第一电子设备确定一个或多个第二通信标识的一个示例性示意图。FIG. 4C is an exemplary schematic diagram of a first electronic device determining one or more second communication identifiers according to an embodiment of the present application.
图4D为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
图5为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
图6为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
图7为本申请实施例提供的账户屏蔽方法中拦截通信的一个示例性示意图。Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
图8为本申请实施例提供的通信系统的一个示例性示意图。 Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
图9为本申请实施例提供的电子设备的硬件结构的一个示例性示意图。FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
图10是本申请实施例提供的电子设备的软件架构的一个示例性示意图。FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
图11A为本申请实施例提供的第一电子设备添加通信标识至黑名单库过程中数据流动的一个示例性示意图。FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
图11B为本申请实施例提供的即时通信应用程序拦截音视频通话或消息的一个示例性示意图。FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
图11C为本申请实施例提供的即时通信应用程序拦截网络电话或网络短信的另一个示例性示意图。Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
具体实施方式Detailed ways
本申请以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请的限制。如在本申请的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“该”、“上述”、“该”和“这一”旨在也包括复数表达形式,除非其上下文中明确地有相反指示。还应当理解,本申请中使用的术语“和/或”是指并包含一个或多个所列出项目的任何或所有可能组合。The terms used in the following embodiments of the present application are only for the purpose of describing specific embodiments and are not intended to limit the present application. As used in the specification and appended claims of this application, the singular expressions "a", "an", "the", "above", "the" and "the" are intended to also include Plural expressions unless the context clearly indicates otherwise. It will also be understood that the term "and/or" as used in this application refers to and includes any and all possible combinations of one or more of the listed items.
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为暗示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征,在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。Hereinafter, the terms “first” and “second” are used for descriptive purposes only and shall not be understood as implying or implying relative importance or implicitly specifying the quantity of indicated technical features. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of this application, unless otherwise specified, “plurality” The meaning is two or more.
本申请以下实施例中的术语“用户界面(user interface,UI)”,是应用程序或操作系统与用户之间进行交互和信息交换的介质接口,它实现信息的内部形式与用户可以接受形式之间的转换。用户界面是通过java、可扩展标记语言(extensible markup language,XML)等特定计算机语言编写的源代码,界面源代码在电子设备上经过解析,渲染,最终呈现为用户可以识别的内容。用户界面常用的表现形式是图形用户界面(graphic user interface,GUI),是指采用图形方式显示的与计算机操作相关的用户界面。它可以是在电子设备的显示屏中显示的文本、图标、按钮、菜单、选项卡、文本框、对话框、状态栏、导航栏、Widget等可视的界面元素。The term "user interface (UI)" in the following embodiments of this application is a media interface for interaction and information exchange between an application or operating system and a user. It realizes the difference between the internal form of information and the form acceptable to the user. conversion between. The user interface is source code written in specific computer languages such as Java and extensible markup language (XML). The interface source code is parsed and rendered on the electronic device, and finally presented as content that can be recognized by the user. The commonly used form of user interface is graphical user interface (GUI), which refers to a user interface related to computer operations that is displayed graphically. It can be text, icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, widgets and other visual interface elements displayed on the display screen of an electronic device.
图1为本申请实施例提供的账户屏蔽方法适用场景的一个示例性示意图。Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
如图1所示,在阶段1,用户1通过手机1向手机2拨打蜂窝电话。用户2在接听该蜂窝电话后,可以确定用户1为不受欢迎者,进而用户2可以拉黑该用户1对应的蜂窝号码,如阶段2所示。As shown in Figure 1, in phase 1, user 1 makes a cellular call to mobile phone 2 through mobile phone 1. After answering the cellular call, user 2 can determine that user 1 is an undesirable person, and then user 2 can block the cellular number corresponding to user 1, as shown in stage 2.
在阶段2,手机2显示的界面可以如界面101所示。界面101显示的内容包括用户1的蜂窝号码以及控件102。其中,用户1的蜂窝号码为123456789。响应于接收到用户2点击控件102的操作,手机2拉黑该蜂窝号码后,手机2可以及时挂断该蜂窝号码的来电,和/或,不显示来电的界面。手机2还可以将该蜂窝号码的短信移入垃圾箱。In stage 2, the interface displayed by mobile phone 2 may be as shown in interface 101. The content displayed on the interface 101 includes the cellular number of user 1 and the control 102 . Among them, the cellular number of user 1 is 123456789. In response to receiving the operation of user 2 clicking on the control 102, after the mobile phone 2 blocks the cellular number, the mobile phone 2 can promptly hang up the incoming call from the cellular number, and/or do not display the interface for the incoming call. Mobile phone 2 can also move the text messages of this cellular number to the trash.
但是,在阶段3,用户1可以通过手机1上的等即时通信软件向手机2发送网络短信或者发起网络电话。However, in stage 3, user 1 can access the Wait for the instant messaging software to send an Internet text message to mobile phone 2 or initiate an Internet call.
或者,用户1还可以通过手机1上的向用户2的账户(或账号)发送消息或发起音视频通话;或者,在用户1对应的账户与用户2对应的账户不是好友关系的情况下,用户1可以通过好友添加功能向用户2对应的账户发送好友添加消息。 Alternatively, user 1 can also use mobile phone 1 to to user 2 account (or account) to send messages or initiate audio and video calls; or, in the corresponding account of user 1 The account corresponds to user 2 When the account is not a friend, User 1 can use the friend adding function to add the corresponding account to User 2. The account sends friend adding messages.
结合图1所示的内容,可以理解的是,当用户2拉黑不受欢迎者的蜂窝号码后,还需要拉黑不受欢迎者的即时通信软件的账户,才能全面的避免被不受欢迎者打扰。但是,在许多情况下,在用户被打扰前,用户2是无法得知不受欢迎者的全部即时通信软件的账户,而在被打扰后也只能亡羊补牢式的去拉黑不受欢迎者的即时通信软件的账户。Combined with the content shown in Figure 1, it can be understood that after user 2 blocks the cell phone number of the undesirable person, he also needs to block the instant messaging software account of the unwelcome person in order to fully avoid being unwelcome. or disturb. However, in many cases, before the user is disturbed, User 2 cannot know all the instant messaging software accounts of the undesirable person, and after being disturbed, he can only block the undesirable person in a makeshift manner. Instant messaging software account.
更进一步的,在不受欢迎者持有不止一张SIM卡,即持有多个蜂窝号码的情况下,被不受欢迎者只能在被打扰后一一拉黑不受欢迎者的蜂窝号码以及不同蜂窝号码对应的即时通信应用程序的账户,需要用户2手动执行较多的操作,用户体验差。Furthermore, when the unwanted person holds more than one SIM card, that is, multiple cellular numbers, the unwanted person can only block the unwanted person's cellular numbers one by one after being disturbed. As well as accounts for instant messaging applications corresponding to different cellular numbers, user 2 needs to manually perform many operations, resulting in poor user experience.
基于上述问题,本申请实施例提供了账户屏蔽方法、系统及电子设备。Based on the above problems, embodiments of the present application provide account shielding methods, systems and electronic devices.
本申请提供的账户屏蔽方法可以在第一用户(例如,图1中的用户2)拉黑任意不受欢迎者的通信标识后,由第一用户的电子设备或服务器自动的查询不受欢迎者的全部的通信标识,并在查询到不受欢迎者的全部标识后,在端侧或服务器侧拦截不受欢迎者发起的通信,如蜂窝电话、蜂窝短信、网络电话、网络短信、邮件、消息和/或音视频通话。The account blocking method provided by this application can automatically query the undesirable person by the first user's electronic device or server after the first user (for example, user 2 in Figure 1) blocks the communication identification of any undesirable person. All communication identifiers of the unwanted person, and after querying all the identifiers of the unwanted person, intercept the communication initiated by the unwanted person on the terminal side or the server side, such as cellular phone calls, cellular text messages, Internet calls, Internet SMS, emails, messages and/or audio and video calls.
其中,在本申请实施例中,通信标识可以是蜂窝号码、即时通信应用程序的账户(其中,即时通信应用程序的账户可以不受欢迎者的账户,或者是第一电子设备上显示的网络号码标识,例如畅联的账户为XXXXXX,但是在被不受欢迎者的电子设备上显示的网络号码为YYYYY,则YYYYY也可以作为即时通信应用程序的账户)、系统账户等。其中,在端侧拦截,可以是在不受欢迎者的电子设备侧拦截不受欢迎者的电子设备发起的通信,也可以在第一用户的电子设备侧拦截不受欢迎者发起的通信。In this embodiment of the present application, the communication identifier may be a cellular number, an account of an instant messaging application (where the account of an instant messaging application may be an account of an undesirable person, or a network number displayed on the first electronic device For example, Changlian’s account is XXXXXX, but the network number displayed on the unwanted person’s electronic device is YYYYY, then YYYYY can also be used as an instant messaging application account), system account, etc. Interception on the terminal side may include intercepting communications initiated by the undesirable person's electronic device on the electronic device side of the undesirable person, or intercepting communications initiated by the unwelcome person on the electronic device side of the first user.
可选的,在本申请一些实施方式中,在不受欢迎者通过不同方式去新增通信标识后,服务器检测到不受欢迎者的新增通信标识操作后,可以及时将该新增的通信标识加入到第一用户的黑名单中。Optionally, in some embodiments of the present application, after the undesirable person adds a communication identifier through different methods, and the server detects the operation of the undesirable person's new communication identifier, the new communication identifier can be added in a timely manner. The identifier is added to the first user's blacklist.
其中,不受欢迎者的新增通信标识操作可以包括,不受欢迎者使用已经被拉黑的蜂窝号码注册新的即时通信应用程序的账户,新增的通信标识为新注册的即时通信应用程序的账户;或者,不受欢迎者注销即时通信应用程序的账户后重新注册新的即时通信应用程序的账户,新增的通信标识为重新注册的即时通信应用程序的账户;或者,不受欢迎者使用副卡对应的蜂窝号码注册即时通信应用程序的账户,注册的即时通信应用程序的账户为新增的通信标识等。Among them, the undesirable person's operation of adding a new communication identification may include the undesirable person using the blocked cellular number to register a new instant messaging application account, and the new communication identification is the newly registered instant messaging application. account; or, the undesirable person cancels the account of the instant messaging application and then re-registers an account of a new instant messaging application, and the new communication ID is the account of the re-registered instant messaging application; or, the undesirable person Use the cellular number corresponding to the secondary card to register an account for the instant messaging application. The account for the registered instant messaging application is the new communication ID, etc.
可选地,在本申请一些实施方式中,蜂窝号码还可以包括虚拟号码,其中,虚拟号码为虚拟专用移动网络(Virtual Private Mobile Network,VPMN)中的号码。Optionally, in some embodiments of the present application, the cellular number may also include a virtual number, where the virtual number is a number in a Virtual Private Mobile Network (Virtual Private Mobile Network, VPMN).
图2为本申请实施例提供的账户屏蔽方法的流程的一个示例性示意图。Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
其中,图2中的阶段1和阶段2与图1中的阶段1和阶段2所示的内容相同,可以参考图1对应的文字描述,此处不再赘述。Among them, the content shown in Phase 1 and Phase 2 in Figure 2 is the same as that shown in Phase 1 and Phase 2 in Figure 1. You can refer to the corresponding text description in Figure 1 and will not be described again here.
在阶段3,由第一服务器和/或手机2对用户1的通信标识进行关联,以发现用户1的其他通信标识。例如,服务器对蜂窝号码“123456789”这一通信标识进行关联,确定关联的结果为:即时通信应用程序账户(如账户)为Ab123456789,邮箱账户为:123456789@huawei.com,其他蜂窝号码:987654321,邮箱账户为:987654321@huawei.com。In stage 3, the first server and/or mobile phone 2 associate the communication identification of user 1 to discover other communication identifications of user 1. For example, the server associates the communication identifier of the cellular number "123456789" and determines that the result of the association is: instant messaging application account (such as Account) is Ab123456789, The email account is: 123456789@huawei.com, other cellular numbers: 987654321, The email account is: 987654321@huawei.com.
在阶段4,第一服务器可以将用户1的部分或全部的通信标识同步到手机2上,第一服务器和/或手机2可以拦截来自用户1发起的通信,如网络电话、网络短信、邮件、消息和/或音视频通话。例如,第一服务器可以拦截用户1通过即时通信应用程序发起的音视频通话、 发送的消息;又例如,手机2可以拦截蜂窝号码123456789和蜂窝号码987654321的来电和短信;又例如,手机2或服务器可以拦截123456789@huawei.com和987654321@huawei.com发送的邮件。In stage 4, the first server can synchronize some or all of user 1's communication identifiers to mobile phone 2. The first server and/or mobile phone 2 can intercept communications initiated by user 1, such as Internet calls, Internet text messages, emails, messages and/or audio and video calls. For example, the first server can intercept audio and video calls initiated by user 1 through an instant messaging application, messages sent; for another example, mobile phone 2 can intercept incoming calls and text messages from cellular numbers 123456789 and cellular number 987654321; for another example, mobile phone 2 or the server can intercept emails sent by 123456789@huawei.com and 987654321@huawei.com.
可选的,在本申请一些实施方式,在检测到用户1的新增通信标识操作后,第一服务器或手机2可以更新用户1的新增的通信标识,然后拦截用户1通过手机1或其他电子设备向手机2发起的通信;或者,在检测到用户1的新增通信标识操作后,第一服务器或手机1可以更新不受欢迎者的新增的通信标识并将用户2的新增的通信标识更新到手机2上,使得手机2可以拦截用户1通过手机1或其他电子设备发起的通信。Optionally, in some embodiments of this application, after detecting user 1's new communication identification operation, the first server or mobile phone 2 can update user 1's new communication identification, and then intercept user 1's communication through mobile phone 1 or other Communication initiated by the electronic device to mobile phone 2; or, after detecting user 1's new communication identification operation, the first server or mobile phone 1 can update the new communication identification of the undesirable person and transfer the new communication identification of user 2 to The communication identifier is updated to mobile phone 2 so that mobile phone 2 can intercept communications initiated by user 1 through mobile phone 1 or other electronic devices.
可以理解的是,响应于用户2对用户1的任意通信标识的拉黑操作,第一服务器可以对该通信标识进行关联以获取不受欢迎者的全部通信标识,进而由手机2和/或第一服务器拉黑该不受欢迎者的全部通信标识,保护用户2不被用户1打扰,且无需用户2进行繁琐的操作,提升用户体验。It can be understood that in response to user 2 blocking any communication identification of user 1, the first server can associate the communication identification to obtain all communication identifications of the undesirable person, and then use mobile phone 2 and/or the third server to block the communication identification of user 1. One server blocks all communication identifiers of the undesirable person, protecting user 2 from being disturbed by user 1, without requiring user 2 to perform cumbersome operations, and improving the user experience.
图3为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
S301:可选地,第一电子设备确定通信标识3001加入黑名单。S301: Optionally, the first electronic device determines that the communication identifier 3001 is added to the blacklist.
响应于接收到第一用户的操作,第一电子设备确定通信标识3001加入黑名单(也可以称为屏蔽名单);或者,第一电子设备可以从包括第一服务器在内的其他服务器或第一电子设备上的即时通信应用程序获取其他用户标记为推销或广告类型的通信标识3001,进而将该通信标识3001加入黑名单。In response to receiving the first user's operation, the first electronic device determines that the communication identifier 3001 is added to the blacklist (which may also be called a shielded list); or, the first electronic device may obtain the information from other servers including the first server or the first The instant messaging application on the electronic device obtains communication identifiers 3001 marked as promotional or advertising types by other users, and then adds the communication identifiers 3001 to the blacklist.
其中,通信标识3001可以是蜂窝号码、即时通信应用程序的账户或邮箱。The communication identifier 3001 may be a cellular number, an account of an instant messaging application, or an email address.
可选地,在本申请一些实施方式,登录有相同用户账户的多个电子设备之间可以执行黑名单的同步。其中,黑名单的同步可以由第一服务器执行,或者其他服务器执行。Optionally, in some embodiments of the present application, blacklist synchronization can be performed between multiple electronic devices logged in with the same user account. The synchronization of the blacklist may be performed by the first server or other servers.
可选地,在本申请一些实施方式,第一电子设备确定通信标识3001后,若通信标识3001为蜂窝号码,则加入黑名单;若通信标识3001为即时通信应用程序的账号或蜂窝号码,则第一电子设备向第一服务器发送通信标识3001,服务器将通信标识3001加入黑名单。Optionally, in some embodiments of the present application, after the first electronic device determines the communication identifier 3001, if the communication identifier 3001 is a cellular number, it is added to the blacklist; if the communication identifier 3001 is an account or cellular number of an instant messaging application, then The first electronic device sends the communication identification 3001 to the first server, and the server adds the communication identification 3001 to the blacklist.
可选地,在本申请一些实施方式,第一电子设备确定通信标识3001后,可以将通信标识3001加入黑名单。Optionally, in some embodiments of the present application, after the first electronic device determines the communication identifier 3001, the communication identifier 3001 can be added to the blacklist.
可选地,在本申请一些实施方式,黑名单中的通信标识的增加、删除仅由第一服务器执行操作,第一电子设备被第一服务器同步黑名单。Optionally, in some embodiments of the present application, the addition and deletion of communication identifiers in the blacklist are only performed by the first server, and the first electronic device is synchronized to the blacklist by the first server.
可选地,在本申请一些实施方式,黑名单中的通信标识的增加、删除由第一服务器和/或第一电子设备执行操作。Optionally, in some embodiments of the present application, the addition and deletion of communication identifiers in the blacklist are performed by the first server and/or the first electronic device.
S302:第一电子设备向第一服务器发送消息1,消息1包括通信标识3001。S302: The first electronic device sends message 1 to the first server, where message 1 includes communication identification 3001.
可选地,在本申请一些实施方式中,第一服务器为系统和系统对应的服务器,例如服务器。Optionally, in some implementations of this application, the first server is system and The server corresponding to the system, for example server.
可选地,在本申请一些实施方式中,第一服务器为即时通信应用程序对应的应用服务器。Optionally, in some embodiments of the present application, the first server is an application server corresponding to the instant messaging application.
可选地,在本申请一些实施方式中,若通信标识3001为蜂窝号码,第一服务器为运营商服务器。Optionally, in some embodiments of this application, if the communication identifier 3001 is a cellular number, the first server is an operator server.
可选地,在本申请一些实施方式中,第一服务器接收到消息1后,将通信标识3001加入黑名单。Optionally, in some embodiments of the present application, after receiving message 1, the first server adds the communication identifier 3001 to the blacklist.
S303:第一服务器确定通信标识3001关联的一个或多个通信标识3002。 S303: The first server determines one or more communication identifiers 3002 associated with the communication identifier 3001.
其中,第一服务器可以有多种方法确定通信标识3001关联的一个或多个通信标识3002,在此不做限定。The first server may use multiple methods to determine one or more communication identifiers 3002 associated with the communication identifier 3001, which are not limited here.
下面示例性的介绍几种第一服务器确定一个或多个通信标识3002的方法。The following is an exemplary introduction to several methods by which the first server determines one or more communication identifiers 3002.
可选地,在本申请一些实施方式中,在第一服务器为操作系统对应的服务器的情况下,第一服务器上保存有不同用户的通信标识集合;当第一服务器确定通信标识3001属于不受欢迎者的通信标识集合,则可以将不受欢迎者的通信标识集合中的每个通信标识作为被关联的一个或多个通信标识3002。其中,第一服务器可以周期性的获取不同用户的通信标识集合。Optionally, in some embodiments of the present application, when the first server is a server corresponding to the operating system, a set of communication identifiers of different users is stored on the first server; when the first server determines that the communication identifier 3001 belongs to the If the set of communication identifications of welcome persons is set, each communication identification in the set of communication identifications of unwelcome persons may be used as one or more associated communication identifications 3002. Wherein, the first server may periodically obtain communication identification sets of different users.
可选地,在本申请一些实施方式中,在第一服务器为操作系统对应的服务器的情况下,第一服务器还可以向即时通信应用程序对应的应用服务器请求通信标识3001关联的通信标识3002。例如,服务器可以向服务器或服务器发送请求1,该请求1中携带有通信标识3001,请求1为用于获取与通信标识3001关联的其他通信标识的请求。服务器或服务器在接收到请求1后,可以向第一服务器发送与第一标识关联的一个或多个通信标识3002。Optionally, in some embodiments of the present application, when the first server is a server corresponding to the operating system, the first server may also request the communication identification 3002 associated with the communication identification 3001 from the application server corresponding to the instant messaging application. For example, The server can server or The server sends request 1, which carries communication identifier 3001. Request 1 is a request for obtaining other communication identifiers associated with communication identifier 3001. server or After receiving request 1, the server may send one or more communication identifiers 3002 associated with the first identifier to the first server.
可选地,在本申请一些实施方式中,在包括不受欢迎者在内的用户同意某些隐私协议后,第一服务器可以基于通信标识3001确定第二电子设备,然后,第一服务器向第二电子设备查询第二电子设备上的其他通信标识;再然后,第一服务器接收到第二电子设备发送的通信标识后,可以确定一个或多个通信标识3002。其中,第二电子设备上的其他通信标识可以与通信标识3001没有直接的关联关系,例如,第二电子设备上应用程序登录的账户并未与通信标识3001绑定。其中,第二电子设备上应用程序登录的账户是由第一服务器指示第二电子设备上的系统应用执行查询得到的。Optionally, in some embodiments of the present application, after users, including unwanted persons, agree to certain privacy protocols, the first server can determine the second electronic device based on the communication identification 3001, and then, the first server sends the information to the third electronic device. The second electronic device queries other communication identifiers on the second electronic device; and then, after receiving the communication identifier sent by the second electronic device, the first server can determine one or more communication identifiers 3002. Among them, other communication identifiers on the second electronic device may not have a direct correlation with the communication identifier 3001, for example, on the second electronic device The account logged in by the application is not bound to the communication ID 3001. Among them, the second electronic device The account logged in by the application program is obtained by the first server instructing the system application on the second electronic device to execute a query.
可选地,在本申请一些实施方式中,在通信标识3001为蜂窝号码的情况下,服务器可以为运营商服务器,如服务器或服务器。其中,运营商服务器可以通过国际移动设备识别码(international mobile equipment identity,IMEI)、国际移动用户识别码(international mobile subscriber identification number,IMSI)等参数区别不同的电子设备,进而确定电子设备上的一个或多个蜂窝号码,进而可以确定通信标识3002。或者,运营商服务器可以根据通信标识3001确定第二用户,进而根据第二用户确定第二用户的其他蜂窝号码。其中,第一电子设备和运营商服务器可以建立连接,进而交互信息,或者第一电子设备可以通过操作系统对应的服务器与运营商服务器交互信息。Optionally, in some embodiments of this application, when the communication identifier 3001 is a cellular number, the server may be an operator server, such as server or server. Among them, the operator server can distinguish different electronic devices through parameters such as international mobile equipment identity (IMEI) and international mobile subscriber identification number (IMSI), and then determine an electronic device. or multiple cellular numbers, and then the communication identification 3002 can be determined. Alternatively, the operator server may determine the second user based on the communication identifier 3001, and further determine other cellular numbers of the second user based on the second user. The first electronic device and the operator server can establish a connection and exchange information, or the first electronic device can exchange information with the operator server through a server corresponding to the operating system.
上文示例性的介绍了确定一个或多个通信标识3002的方法,在本申请一些实施方式中,第一服务器会进行不止一次的关联,进而获取尽可能完备的一个或多个通信标识3002。The method for determining one or more communication identifiers 3002 is exemplarily introduced above. In some embodiments of the present application, the first server will perform more than one association to obtain one or more communication identifiers 3002 that are as complete as possible.
S304:可选地,第一服务器向第一电子设备发送消息2,消息2包括部分或全部的一个或多个通信标识3002。S304: Optionally, the first server sends message 2 to the first electronic device, where message 2 includes part or all of one or more communication identifiers 3002.
可选地,在本申请一些实施方式中,在第一服务器确定与通信标识3001关联的一个或多个通信标识3002后,第一服务器向第一电子设备发送一个或多个通信标识3002。Optionally, in some implementations of the present application, after the first server determines one or more communication identifiers 3002 associated with the communication identifier 3001, the first server sends one or more communication identifiers 3002 to the first electronic device.
可选地,在本申请一些实施方式中,若一个或多个通信标识3002不包括蜂窝号码,则第一服务器可以不向第一电子设备发送消息2。Optionally, in some embodiments of the present application, if one or more communication identifiers 3002 do not include a cellular number, the first server may not send message 2 to the first electronic device.
可选地,在本申请一些实施方式中,若一个或多个通信标识3002包括蜂窝号码,则第一服务器向第一电子设备发送的消息2包括一个或多个通信标识3002中的蜂窝号码。Optionally, in some embodiments of the present application, if one or more communication identifiers 3002 include a cellular number, the message 2 sent by the first server to the first electronic device includes the cellular number in the one or more communication identifiers 3002.
可选地,在本申请一些实施方式中,在步骤S302中,第一电子设备还可以向第一服务器发送第一用户的标识,如第一用户的通信标识、用户的ID、第一电子设备上的登录的账户或 者其他用于区分不同用户的参数。在第一服务器为即时通信应用程序对应的应用服务器的情况下,第一用户的标识还可以是第一用户的即时通信应用程序的账户。第一服务器在确定一个或多个通信标识3002后,可以为第一用户创建黑名单,并将一个或多个通信标识3002中的即时通信应用程序的账户加入第一用户的黑名单。当第一服务器确定不受欢迎者向第一用户发起网络电话、网络短信、邮件、消息和/或音视频通话时,可以直接进行拦截。Optionally, in some embodiments of the present application, in step S302, the first electronic device may also send the first user's identification, such as the first user's communication identification, the user's ID, the first electronic device's identification, to the first server. logged in account or or other parameters used to distinguish different users. In the case where the first server is an application server corresponding to the instant messaging application, the identity of the first user may also be the account of the first user's instant messaging application. After determining one or more communication identifiers 3002, the first server may create a blacklist for the first user, and add the account of the instant messaging application in the one or more communication identifiers 3002 to the first user's blacklist. When the first server determines that an undesirable person initiates an Internet phone call, Internet text message, email, message and/or audio and video call to the first user, it can directly intercept the call.
可选地,在本申请一些实施方式中,若第一服务器不为运营商服务器,第一服务器可以向运营商服务器同步一个或多个通信标识3002中的蜂窝号码。运营商服务器可以拦截一个或多个通信标识3002中的蜂窝号码向第一电子设备上的蜂窝号码发起蜂窝电话和/或蜂窝短信。Optionally, in some implementations of this application, if the first server is not an operator server, the first server can synchronize the cellular numbers in one or more communication identifiers 3002 with the operator server. The operator server may intercept the cellular number in one or more communication identifiers 3002 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
S305:可选地,第一电子设备基于部分或全部的一个或多个通信标识3002更新黑名单。S305: Optionally, the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3002.
第一电子设备在接收到一个或多个通信标识3002后,可以更新黑名单。第一电子设备可以基于黑名单拦截蜂窝电话、蜂窝短信、音视频通话、消息、网络电话和/或网络短信。After receiving one or more communication identifiers 3002, the first electronic device may update the blacklist. The first electronic device may intercept cellular calls, cellular text messages, audio and video calls, messages, Internet calls and/or Internet text messages based on the blacklist.
可选地,在本申请一些实施方式中,第一电子设备上的系统应用,如系统管家,可以获取一个或多个通信标识3002中的蜂窝号码,并将该蜂窝号码加入到黑名单。当第一电子设备接收到来电或短信后,系统管家判断来电或短信的号码是否处于黑名单中,若是来电或短信的号码处于黑名单中,则系统管家可以拦截该来电和短信。Optionally, in some embodiments of the present application, a system application on the first electronic device, such as a system manager, can obtain the cellular number in one or more communication identifiers 3002 and add the cellular number to the blacklist. When the first electronic device receives an incoming call or text message, the system manager determines whether the number of the incoming call or text message is in the blacklist. If the number of the incoming call or text message is in the blacklist, the system manager can intercept the incoming call or text message.
可选地,在本申请一些实施方式中,第一电子设备上的系统应用,如系统管家,在获取一个或多个通信标识3002中的蜂窝号码后,可以将一个或多个通信标识3002中的即时通信应用程序账户通过约定好的API发送到对应的即时通信应用程序;即时通信应用程序接收到对应的通信标识3002后,可以拦截该通信标识3002对应的即时通信应用程序的账户发起的音视频通话以及拦截该通信标识3002对应的即时通信应用程序的账户发送的网络短信、网络电话、消息和/或音视频通话。Optionally, in some embodiments of the present application, the system application on the first electronic device, such as the system manager, after obtaining the cellular numbers in the one or more communication identifiers 3002, may add the cellular numbers in the one or more communication identifiers 3002 to The instant messaging application account is sent to the corresponding instant messaging application through the agreed API; after the instant messaging application receives the corresponding communication identification 3002, it can intercept the message initiated by the account of the instant messaging application corresponding to the communication identification 3002. video calls and intercepting Internet text messages, Internet calls, messages and/or audio and video calls sent by the account of the instant messaging application corresponding to the communication identifier 3002.
可选地,在本申请一些实施方式中,第一电子设备和/或第一服务器在确定不受欢迎者的通信标识后,例如一个或多个通信标识3002,可以将一个或多个通信标识3002中不同即时通信应用程序的账户和第一用户在不同即时通信应用程序上登录的账户发送到不同即时通信应用程序对应的应用服务器上,使得不同即时通信应用程序的服务器可以拦截不受欢迎者通过即时通信应用程序发起的网络短信、网络电话、消息和/或音视频通话。Optionally, in some embodiments of the present application, after determining the communication identification of the undesirable person, such as one or more communication identifications 3002, the first electronic device and/or the first server may assign the one or more communication identifications to In 3002, the accounts of different instant messaging applications and the account logged in by the first user on the different instant messaging applications are sent to the application servers corresponding to the different instant messaging applications, so that the servers of the different instant messaging applications can intercept undesirable persons. Internet text messages, Internet calls, messages and/or audio and video calls initiated through instant messaging applications.
S306:可选地,第一服务器更新一个或多个通信标识3002得到一个或多个通信标识3003。S306: Optionally, the first server updates one or more communication identifiers 3002 to obtain one or more communication identifiers 3003.
其中,通信标识3003与通信标识3002不同的是,在第一服务器执行步骤S303时,通信标识3003与黑名单中的通信标识不关联,或者通信标识3003不存在(未注册);在第一服务器执行步骤S303后,通信标识3003与黑名单中的通信标识关联。The difference between the communication identification 3003 and the communication identification 3002 is that when the first server executes step S303, the communication identification 3003 is not associated with the communication identification in the blacklist, or the communication identification 3003 does not exist (not registered); in the first server After step S303 is executed, the communication identification 3003 is associated with the communication identification in the blacklist.
其中,通信标识3003与黑名单中的通信标识的关联关系可以由即时通信应用程序对应的应用服务器建立,也可以由不受欢迎者的电子设备建立。例如,不同即时通信应用程序账号的绑定由应用服务器建立,或者,通信标识3003为新注册的账号。又例如,不受欢迎者的电子设备新插入SIM卡,则新插入SIM卡对应的蜂窝号码为通信标识3003。The association between the communication identifier 3003 and the communication identifiers in the blacklist may be established by the application server corresponding to the instant messaging application, or may be established by the electronic device of the undesirable person. For example, the binding of different instant messaging application accounts is established by the application server, or the communication identifier 3003 is a newly registered account. For another example, if a new SIM card is inserted into the electronic device of the unwanted person, the cellular number corresponding to the newly inserted SIM card is the communication identification 3003.
第一服务器有多种方法确定一个或多个通信标识3003,在此不作限定,下面示例性的介绍几种方法。The first server has multiple methods to determine one or more communication identifiers 3003, which are not limited here. Several methods are illustratively introduced below.
可选地,在本申请一些实施方式中,第一服务器可以周期性的更新一个或多个通信标识3002得到一个或多个通信标识3003。例如,当不受欢迎者使用蜂窝号码1注册了账户,该账户为账户1,蜂窝号码1属于该一个或多个通信标识3002,则第一服务器更新一个 或多个通信标识3002得到的一个或多个通信标识3003中包括账户1。Optionally, in some implementations of this application, the first server may periodically update one or more communication identifiers 3002 to obtain one or more communication identifiers 3003. For example, when an unwanted person registered using cellular number 1 account, the The account is account 1, and the cellular number 1 belongs to the one or more communication identifiers 3002, then the first server updates a Account 1 is included in one or more communication identifiers 3003 obtained from the communication identifiers 3002 or multiple communication identifiers 3002 .
可选地,在本申请一些实施方式中,在检测到不受欢迎者的新增通信标识操作后,第一服务器更新不受欢迎者的通信标识,记为通信标识3003。Optionally, in some embodiments of the present application, after detecting the new communication identification operation of the undesirable person, the first server updates the communication identification of the unwelcome person, which is recorded as communication identification 3003.
例如,在第一服务器为操作系统对应的服务器的情况下,当不受欢迎者使用蜂窝号码1注册了即时通信应用程序的账户后,例如畅联账户1,即时通信应用程序对应的应用服务器向第一服务器发送消息,该消息用于指示蜂窝号码1与不受欢迎者的即时通信应用程序的账户的关联关系。第一服务器接收到该消息后,可以确定一个或多个通信标识3003包括不受欢迎者的即时通信应用程序的账户。其中,由于在步骤S303中,第一服务器向应用服务器查询过不受欢迎者的通信标识,故应用服务器可以确定新增的通信标识3003的用户为不受欢迎者。For example, in the case where the first server is the server corresponding to the operating system, when the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1, the application server corresponding to the instant messaging application sends a request to The first server sends a message indicating an association between the cellular number 1 and the account of the unwanted person's instant messaging application. After receiving the message, the first server may determine that one or more communication identifiers 3003 include the account of the undesirable instant messaging application. Among them, since in step S303, the first server has inquired the application server about the communication identification of the undesirable person, the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
例如,在第一服务器为即时通信应用程序对应的应用服务器的情况下,当不受欢迎者使用蜂窝号码1注册了即时通信应用程序的账户后,例如畅联账户1,第一服务器确定不受欢迎者的通信标识新增蜂窝号码1。其中,蜂窝号码1属于通信标识3003。其中,由于在步骤S303中,第一服务器向应用服务器查询过不受欢迎者的通信标识,故应用服务器可以确定新增的通信标识3003的用户为不受欢迎者。For example, in the case where the first server is the application server corresponding to the instant messaging application, when the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1, the first server determines that the uninvited person A new cellular number 1 is added to the greeter's communication identifier. Among them, cell number 1 belongs to communication identifier 3003. Among them, since in step S303, the first server has inquired the application server about the communication identification of the undesirable person, the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
例如,在第一服务器为操作系统对应的服务器的情况下,当不受欢迎者的即时通信应用程序的账户与蜂窝号码1解绑后与蜂窝号码2绑定后,即时通信应用程序对应的应用服务器向第一服务器发送消息,该消息用于指示蜂窝号码2与不受欢迎者的即时通信应用程序的账户关联。第一服务器接收到该消息后,可以确定一个或多个通信标识3003包括蜂窝号码2。For example, in the case where the first server is a server corresponding to the operating system, when the account of the unwanted person's instant messaging application is unbound from cellular number 1 and then bound to cellular number 2, the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application. After receiving the message, the first server may determine that one or more communication identifiers 3003 include cellular number 2.
例如,在第一服务器为即时通信应用程序对应的应用服务器的情况下,当不受欢迎者的即时通信应用程序的账户与蜂窝号码1解绑后与蜂窝号码2绑定后,第一服务器确定不受欢迎者的通信标识新增蜂窝号码2。其中,蜂窝号码2属于通信标识3003。For example, in the case where the first server is an application server corresponding to an instant messaging application, when the account of the unwanted person's instant messaging application is unbound from cellular number 1 and then bound to cellular number 2, the first server determines The undesirable person's communication identifier has a new cell number 2. Among them, cell number 2 belongs to communication identifier 3003.
例如,在第一服务器为操作系统对应的服务器的情况下,当不受欢迎者的即时通信应用程序的账户与蜂窝号码1解绑后与蜂窝号码2绑定后,即时通信应用程序对应的应用服务器向第一服务器发送消息,该消息用于指示蜂窝号码2与不受欢迎者的即时通信应用程序的账户关联。第一服务器接收到该消息后,可以确定一个或多个通信标识3003包括蜂窝号码2。其中,第一服务器可以和应用服务器交互,由第一服务器发送通信标识3002至应用服务器,应用服务器在确定有新的关联的至通信标识3002的通信标识3003后,应用服务器向第一服务器发送通信标识3003,或者应用服务器向第一服务器发送通信标识3003和通信标识3002。其中,当应用服务器向第一服务器发送通信标识3003的情况下,应用服务器可以通过特定的接口发送或者在消息中携带标识,该接口或该标识用于指示通信标识3003与某个通信标识3002关联。或者,应用服务器向第一服务器发送的消息中携带通信标识3003和不受欢迎者的标识。其中,由于在步骤S303中,第一服务器向应用服务器查询过不受欢迎者的通信标识,故应用服务器可以确定新增的通信标识3003的用户为不受欢迎者。For example, in the case where the first server is a server corresponding to the operating system, when the account of the unwanted person's instant messaging application is unbound from cellular number 1 and then bound to cellular number 2, the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application. After receiving the message, the first server may determine that one or more communication identifiers 3003 include cellular number 2. The first server can interact with the application server, and the first server sends the communication identifier 3002 to the application server. After the application server determines that there is a new communication identifier 3003 associated with the communication identifier 3002, the application server sends a communication to the first server. Identity 3003, or the application server sends communication identification 3003 and communication identification 3002 to the first server. When the application server sends the communication identifier 3003 to the first server, the application server can send it through a specific interface or carry the identifier in the message. The interface or the identifier is used to indicate that the communication identifier 3003 is associated with a certain communication identifier 3002 . Alternatively, the message sent by the application server to the first server carries the communication identifier 3003 and the identifier of the undesirable person. Among them, since in step S303, the first server has inquired the application server about the communication identification of the undesirable person, the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
例如,在第一服务器为操作系统对应的服务器的情况下,当不受欢迎者在第二电子设备插入了新的SIM卡,该新的SIM卡对应的蜂窝号码为蜂窝号码1,则第二电子设备上的系统应用,如手机管家,可以向第一服务器发送消息,该消息用于告知第一服务器,不受欢迎者的通信标识新增蜂窝号码1;然后,第一服务器可以确定一个或多个通信标识3003包括该蜂窝号码1。For example, when the first server is a server corresponding to the operating system, when the unwanted person inserts a new SIM card into the second electronic device, and the cellular number corresponding to the new SIM card is cellular number 1, then the second A system application on an electronic device, such as a mobile phone manager, can send a message to the first server. The message is used to inform the first server that the undesirable person's communication identifier has a new cellular number 1; then, the first server can determine a or Multiple communication identifiers 3003 include the cell number 1.
S307:可选地,第一服务器向第一电子设备发送消息3,消息3包括部分或全部的一个或多个通信标识3003。 S307: Optionally, the first server sends message 3 to the first electronic device, where message 3 includes part or all of one or more communication identifiers 3003.
可选地,在本申请一些实施方式中,第一服务器可以向第一电子设备发送消息3,该消息3包括一个或多个通信标识3003中与一个或多个通信标识3002不同的通信标识。Optionally, in some implementations of the present application, the first server may send a message 3 to the first electronic device, where the message 3 includes a communication identifier that is different from the one or more communication identifiers 3002 among the one or more communication identifiers 3003 .
可选地,在本申请一些实施方式中,第一服务器可以向第一电子设备同步一个或多个通信标识3003中的蜂窝号码。Optionally, in some implementations of the present application, the first server may synchronize the cellular numbers in one or more communication identifiers 3003 to the first electronic device.
可选地,在本申请一些实施方式中,若第一服务器不为运营商服务器,第一服务器可以向运营商服务器同步一个或多个通信标识3003中的蜂窝号码。运营商服务器可以拦截一个或多个通信标识3003中的蜂窝号码向第一电子设备上的蜂窝号码发起蜂窝电话和/或蜂窝短信。Optionally, in some embodiments of this application, if the first server is not an operator server, the first server can synchronize the cellular numbers in one or more communication identifiers 3003 with the operator server. The operator server may intercept the cellular number in one or more communication identifiers 3003 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
S308:可选地,第一电子设备基于部分或全部的一个或多个通信标识3003更新黑名单。S308: Optionally, the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3003.
其中,第一电子设备更新黑名单的操作可以参考上文中步骤S305的文字描述,此处不再赘述。For the operation of updating the blacklist by the first electronic device, reference can be made to the textual description of step S305 above, which will not be described again here.
其中,在图3所示的内容中,第一服务器保存有黑名单,第一服务器上的黑名单存有完备的不受欢迎者的通信标识。第一电子设备上的黑名单存有完备的不受欢迎者的通信标识,或者,第一电子设备上的黑名单存有不受欢迎者的蜂窝号码。Among them, in the content shown in Figure 3, the first server stores a blacklist, and the blacklist on the first server stores complete communication identifications of undesirable persons. The blacklist on the first electronic device stores complete communication identifiers of the undesirable persons, or the blacklist on the first electronic device stores the cellular numbers of the undesirable persons.
上文介绍了第一电子设备通过第一服务器获取不受欢迎者的通信标识,并将不受欢迎者的通信标识加入黑名单的过程中。其中,在第一电子设备获取不受欢迎者的通信标识的过程中,第一电子设备或第一服务器可以通过多次关联获取尽可能完备的不受欢迎者的通信标识,如下文中的图4A、图4B和图4C所示。The above describes the process in which the first electronic device obtains the communication identifier of the undesirable person through the first server and adds the communication identifier of the undesirable person to the blacklist. In the process of the first electronic device obtaining the communication identification of the undesirable person, the first electronic device or the first server can obtain the communication identification of the undesirable person as complete as possible through multiple associations, as shown in Figure 4A below. , shown in Figure 4B and Figure 4C.
其中,在图4B和图4C所示的内容中,第一服务器可以为操作系统对应的服务器,第二服务器和第三服务器为即时通信应用程序对应的应用服务器。In the content shown in FIG. 4B and FIG. 4C, the first server may be a server corresponding to the operating system, and the second server and the third server may be application servers corresponding to the instant messaging application.
图4A为本申请实施例提供的确定一个或多个通信标识3002的一个示例性示意图。FIG. 4A is an exemplary schematic diagram of determining one or more communication identifiers 3002 provided by the embodiment of the present application.
如图4A所示,通信标识3001为蜂窝号码1。当第一服务器执行一次关联以确定通信标识3002包括:账户1、邮箱1、蜂窝号码2。其中,账户1为即时通信应用程序账户。As shown in Figure 4A, the communication identifier 3001 is cell number 1. When the first server performs an association, it is determined that the communication identifier 3002 includes: account 1, mailbox 1, and cellular number 2. Among them, account 1 is an instant messaging application account.
在第一服务器执行一次关联后,还会执行第二次关联。After the first server performs an association, a second association is performed.
如图4A所示,第一服务器执行第二次关联后,确定通信标识3002包括:账户1、邮箱1、蜂窝号码2、邮箱2。As shown in Figure 4A, after the first server performs the second association, it is determined that the communication identifier 3002 includes: account 1, mailbox 1, cell number 2, and mailbox 2.
值得说明的是,在图4A所示的内容中,也可以由第一电子设备执行多次关联。It is worth noting that in the content shown in FIG. 4A , the first electronic device may also perform multiple associations.
图4B为本申请实施例提供的第一服务器确定一个或多个通信标识3002的一个示例性示意图。FIG. 4B is an exemplary schematic diagram of the first server determining one or more communication identifiers 3002 provided by the embodiment of the present application.
S4B01:第一服务器向第二服务器发送查询请求1,查询请求1包括通信标识1。S4B01: The first server sends query request 1 to the second server, and query request 1 includes communication identification 1.
其中,通信标识1属于通信标识3001或通信标识3002;第二服务器为即时通信应用程序对应的应用服务器。Among them, communication identification 1 belongs to communication identification 3001 or communication identification 3002; the second server is an application server corresponding to the instant messaging application.
S4B02:第一服务器向第三服务器发送查询请求2,查询请求2包括通信标识1。S4B02: The first server sends query request 2 to the third server. Query request 2 includes communication identification 1.
其中,第三服务器为即时通信应用程序对应的应用服务器。The third server is an application server corresponding to the instant messaging application.
可选地,在本申请一些实施方式中,第二服务器和第三服务器对应的即时通信应用程序不同。Optionally, in some embodiments of the present application, the instant messaging applications corresponding to the second server and the third server are different.
S4B03:第二服务器基于通信标识1确定一个或多个通信标识2。S4B03: The second server determines one or more communication identifiers 2 based on the communication identifier 1.
其中,一个或多个通信标识2属于通信标识3002。Among them, one or more communication identifiers 2 belong to communication identifier 3002.
S4B04:第三服务器基于通信标识1确定一个或多个通信标识3。S4B04: The third server determines one or more communication identifiers 3 based on the communication identifier 1.
其中,一个或多个通信标识3属于通信标识3002。Among them, one or more communication identifiers 3 belong to the communication identifier 3002.
S4B05:第二服务器向第一服务器发送查询结果1,查询结果1包括一个或多个通信标识 2。S4B05: The second server sends query result 1 to the first server. The query result 1 includes one or more communication identifiers. 2.
S4B06:第三服务器向第一服务器发送查询结果2,查询结果2包括一个或多个通信标识3。S4B06: The third server sends the query result 2 to the first server. The query result 2 includes one or more communication identifiers 3.
S4B07:第一服务器向第三服务器发送查询请求3,查询请求3包括一个或多个通信标识2。S4B07: The first server sends a query request 3 to the third server. The query request 3 includes one or more communication identifiers 2.
S4B08:第三服务器基于一个或多个通信标识2确定一个或多个通信标识4。S4B08: The third server determines one or more communication identifiers 4 based on the one or more communication identifiers 2.
其中,一个或多个通信标识4属于通信标识3002。Among them, one or more communication identifiers 4 belong to the communication identifier 3002.
S4B09:第三服务器向第一服务器发送查询结果3,查询结果3包括一个或多个通信标识4。S4B09: The third server sends the query result 3 to the first server. The query result 3 includes one or more communication identifiers 4.
结合上文中图4B所示的内容,可以理解的是,步骤S4B01至步骤S4B06可以为第一次关联;步骤S4B07至步骤S4B09可以为第二次关联,进而使得第一服务器可以确定尽可能完备的属于不受欢迎者的通信标识。Combined with the content shown in Figure 4B above, it can be understood that steps S4B01 to step S4B06 can be the first association; steps S4B07 to step S4B09 can be the second association, so that the first server can determine as complete as possible A communication sign belonging to an undesirable person.
图4C为本申请实施例提供的第一电子设备确定一个或多个通信标识3002的一个示例性示意图。FIG. 4C is an exemplary schematic diagram of the first electronic device determining one or more communication identifiers 3002 provided by the embodiment of the present application.
S4C01:第一电子设备向第二服务器发送查询请求1,查询请求1包括通信标识1。S4C01: The first electronic device sends query request 1 to the second server, where query request 1 includes communication identification 1.
S4C02:第一电子设备向第三服务器发送查询请求2,查询请求2包括通信标识1。S4C02: The first electronic device sends query request 2 to the third server. Query request 2 includes communication identification 1.
S4C03:第二服务器基于通信标识1确定一个或多个通信标识2。S4C03: The second server determines one or more communication identifiers 2 based on the communication identifier 1.
S4C04:第三服务器基于通信标识1确定一个或多个通信标识3。S4C04: The third server determines one or more communication identifiers 3 based on the communication identifier 1.
S4C05:第二服务器向第一电子设备发送查询结果1,查询结果1包括一个或多个通信标识2。S4C05: The second server sends query result 1 to the first electronic device. Query result 1 includes one or more communication identifiers 2.
S4C06:第三服务器向第一电子设备发送查询结果2,查询结果2包括一个或多个通信标识3。S4C06: The third server sends the query result 2 to the first electronic device. The query result 2 includes one or more communication identifiers 3.
S4C07:第一电子设备向第三服务器发送查询请求3,查询请求3包括一个或多个通信标识2。S4C07: The first electronic device sends a query request 3 to the third server. The query request 3 includes one or more communication identifiers 2.
S4C08:第三服务器基于一个或多个通信标识2确定一个或多个通信标识4。S4C08: The third server determines one or more communication identifiers 4 based on one or more communication identifiers 2.
S4C09:第三服务器向第一电子设备发送查询结果3,查询结果3包括一个或多个通信标识4。S4C09: The third server sends query result 3 to the first electronic device, where query result 3 includes one or more communication identifiers 4.
结合上文中图4C所示的内容,可以理解的是,步骤S4C01至步骤S4C06可以为第一次关联;步骤S4C07至步骤S4C09可以为第二次关联,进而使得第一电子设备可以确定尽可能完备的属于不受欢迎者的通信标识。Combined with the content shown in Figure 4C above, it can be understood that steps S4C01 to step S4C06 can be the first association; steps S4C07 to step S4C09 can be the second association, so that the first electronic device can determine that it is as complete as possible A communication sign belonging to an undesirable person.
对于图4C所示的内容来说,第一服务器作为查询关联关系的服务器,第一电子设备作为通信的拦截方。For the content shown in Figure 4C, the first server serves as a server for querying association relationships, and the first electronic device serves as an interceptor of communication.
值得说明的是,在上文中图3至图4C所示的内容中,第一电子设备与第一服务器交互获取不受欢迎者的通信标识。可选的,在本申请一些实施方式中,第一电子设备可以独立的确定不受欢迎者的通信标识,如下图中的图4D所示。It is worth noting that in the content shown in FIGS. 3 to 4C above, the first electronic device interacts with the first server to obtain the communication identification of the undesirable person. Optionally, in some embodiments of the present application, the first electronic device can independently determine the communication identification of the undesirable person, as shown in Figure 4D below.
图4D为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
S4D01:即时通信应用程序1确定账户1加入黑名单。S4D01: Instant messaging application 1 determines that account 1 is added to the blacklist.
其中,账户1为通信标识3001。Among them, account 1 is communication identifier 3001.
S4D02:即时通信应用程序1向系统应用发送消息1,消息1包括蜂窝号码1。S4D02: Instant messaging application 1 sends message 1 to the system application, and message 1 includes cellular number 1.
其中,蜂窝号码1为通信标识3002。 Among them, cell number 1 is communication identifier 3002.
可选地,在本申请一些实施方式中,即时通信应用程序1可以与该应用程序对应的服务器通信以确定账户1关联的通信标识包括账户1。例如,应用程序中联系人的联系方式包括联系人的蜂窝号码。Optionally, in some embodiments of the present application, the instant messaging application 1 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1. For example, A contact's contact details in the app include the contact's cellular number.
可选地,在本申请一些实施方式中,消息1还包括账户1。Optionally, in some implementations of this application, message 1 also includes account 1.
S4D03:可选地,即时通信应用程序1将与蜂窝号码1对应的账户1加入第一用户的黑名单。S4D03: Optionally, the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
其中,第一用户的黑名单为第一用户在即时通信应用程序1中登录的账户的黑名单。Wherein, the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
S4D04:可选地,系统应用将账户1加入第一用户的黑名单。S4D04: Optionally, the system application adds account 1 to the first user's blacklist.
S4D05:系统应用将蜂窝号码1加入第一用户的黑名单。S4D05: The system application adds cellular number 1 to the first user's blacklist.
S4D06:系统应用向即时通信应用程序2发送消息2,消息2包括蜂窝号码1。S4D06: The system application sends message 2 to instant messaging application 2, and message 2 includes cellular number 1.
S4D07:可选地,即时通信应用程序1将与蜂窝号码1对应的账户2加入第一用户的黑名单。S4D07: Optionally, the instant messaging application 1 adds the account 2 corresponding to the cellular number 1 to the first user's blacklist.
可选地,在本申请一些实施方式中,即时通信应用程序2可以与该应用程序对应的服务器通信以确定账户1关联的通信标识包括账户1。Optionally, in some embodiments of the present application, the instant messaging application 2 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1.
S4D08:可选地,即时通信应用程序2向系统应用发送消息3,消息3包括账户2。S4D08: Optionally, the instant messaging application 2 sends message 3 to the system application, and the message 3 includes account 2.
S4D09:可选地,系统应用将账户2加入第一用户的黑名单。S4D09: Optionally, the system application adds account 2 to the first user's blacklist.
值得说明的是,在第一电子设备独立的确定不受欢迎者的通信标识的情况下,第一电子设备上的系统应用也可以执行多次关联。It is worth noting that, in the case where the first electronic device independently determines the communication identification of the undesirable person, the system application on the first electronic device can also perform multiple associations.
例如,系统应用确定蜂窝号码1为不受欢迎者的通信标识后,向即时通信应用程序1查询蜂窝号码1的关联结果为账户1和蜂窝号码2,并且向即时通信应用程序2查询蜂窝号码1的关联结果为账户2。然后,系统应用可以向即时通信应用程序2查询蜂窝号码2的关联结果为账户3。在该情况下,第一电子设备执行第一次关联的结果为账户1、账户2、蜂窝号码2;第二电子设备执行第二次关联的结果为账户3。For example, after the system application determines that cellular number 1 is the communication identifier of an undesirable person, it queries the instant messaging application 1 for the associated result of cellular number 1, which is account 1 and cellular number 2, and queries the instant messaging application 2 for cellular number 1. The association result is account 2. Then, the system application can query the instant messaging application 2 that the associated result of the cellular number 2 is account 3. In this case, the result of the first association performed by the first electronic device is account 1, account 2, and cellular number 2; the result of the second association performed by the second electronic device is account 3.
图5为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
其中,在图5所示的内容中,第一电子设备为用户的电子设备,第二电子设备为不受欢迎者的电子设备。第一服务器可以是第一电子设备和第二电子设备的操作系统对应的服务器,或者,可以为即时通信应用程序对应的应用服务器。In the content shown in FIG. 5 , the first electronic device is the user's electronic device, and the second electronic device is the unwanted person's electronic device. The first server may be a server corresponding to the operating systems of the first electronic device and the second electronic device, or may be an application server corresponding to the instant messaging application.
S501:第一电子设备确定通信标识3001加入黑名单。S501: The first electronic device determines that the communication identifier 3001 is added to the blacklist.
步骤S501的内容可以参考步骤S301中的文字描述,此处不再赘述。For the content of step S501, reference can be made to the text description in step S301, which will not be described again here.
S502:第一电子设备向第一服务器发送通信标识3001。S502: The first electronic device sends the communication identification 3001 to the first server.
S503:第一服务器基于通信标识3001确定不受欢迎者的电子设备为第二电子设备。S503: The first server determines that the electronic device of the undesirable person is the second electronic device based on the communication identification 3001.
可选地,在本申请一些实施方式中,第一服务器上保存有不同用户的通信标识集合;当第一服务器确定通信标识3001属于不受欢迎者的通信标识集合,则可以将不受欢迎者的通信标识集合中的每个通信标识作为被关联的一个或多个通信标识3002。Optionally, in some embodiments of the present application, the first server stores communication identification sets of different users; when the first server determines that the communication identification 3001 belongs to the communication identification set of an undesirable person, the undesirable person can be Each communication identification in the set of communication identifications serves as one or more associated communication identifications 3002.
可选地,在本申请一些实施方式中,第一服务器可以基于通信标识3001,如不受欢迎者的即时通信应用程序的账户,确定第二电子设备。Optionally, in some embodiments of the present application, the first server may determine the second electronic device based on the communication identifier 3001, such as the account of the undesirable person's instant messaging application.
S504:第一服务器向第二电子设备发送拦截指示,拦截指示中包括第一用户的通信标识。 S504: The first server sends an interception instruction to the second electronic device, where the interception instruction includes the communication identification of the first user.
其中,第一用户的通信标识可以包括第一电子设备上的蜂窝号码,第一电子设备上的即时通信应用程序的账户。Wherein, the communication identification of the first user may include the cellular number on the first electronic device, and the account of the instant messaging application on the first electronic device.
可选地,第一服务器也可以对第一用户的通信标识进行关联,获取尽可能完备的第一用户的通信标识,具体的内容可以参考上文中步骤S303中的文字描述,此处不再赘述。Optionally, the first server can also associate the communication identification of the first user to obtain the communication identification of the first user as complete as possible. For specific content, please refer to the text description in step S303 above, which will not be described again here. .
S505:第二电子设备拦截向第一用户发起的通信。S505: The second electronic device intercepts the communication initiated to the first user.
可选地,在本申请一些实施方式中,在不受欢迎者同意某些隐私协议的情况下,第二电子设备可以拦截向第一用户发起的通信,如蜂窝电话、蜂窝短信、音视频通话、消息、网络电话和/或网络短信。Optionally, in some embodiments of the present application, if the unwanted person agrees to certain privacy protocols, the second electronic device can intercept communications initiated to the first user, such as cellular phone calls, cellular text messages, and audio and video calls. , messages, Internet calls and/or Internet SMS.
可选地,在本申请一些实施方式中,在第一服务器为即时通信应用程序对应的应用服务器的情况下,第一服务器可以确定第一用户登录的即时通信应用程序的账户。例如,在步骤S502中,第一电子设备还向第一服务器发送用于确定用户的即时通信应用程序的账户的参数,如用户的即时通信应用程序的账户。第一服务器向第二电子设备发送用户的通信标识中包括用户的即时通信应用程序的账户的标识。Optionally, in some embodiments of the present application, when the first server is an application server corresponding to an instant messaging application, the first server may determine the account of the instant messaging application logged in by the first user. For example, in step S502, the first electronic device also sends parameters for determining the account of the user's instant messaging application to the first server, such as the account of the user's instant messaging application. The first server sends the user's communication identification to the second electronic device including an identification of an account of the user's instant messaging application.
可选地,在本申请一些实施方式中,在第一服务器为操作系统对应的服务器的情况下,第一服务器可以确定,如蜂窝号码、即时通信应用程序的账户等用户的通信标识。第二电子设备上的系统应用如手机管家,在获取用户的通信标识后,可以将用户的通信标识中的即时通信应用程序的账户通过约定的API发送到对应的即时通信应用程序,使得即时通信应用程序可以拦截不受欢迎者向用户发起的网络电话、网络短信、邮件、消息和/或音视频通话。第二电子设备上的系统应用如手机管家,在获取用户的通信标识后,可以拦截第二电子设备发起的蜂窝电话和蜂窝短信。Optionally, in some embodiments of the present application, when the first server is a server corresponding to the operating system, the first server can determine the user's communication identifier, such as a cellular number, an account of an instant messaging application, etc. The system application on the second electronic device, such as the mobile phone manager, after obtaining the user's communication identification, can send the account of the instant messaging application in the user's communication identification to the corresponding instant messaging application through the agreed API, allowing instant communication The application can intercept Internet calls, Internet text messages, emails, messages and/or audio and video calls initiated by unwanted persons to the user. The system application on the second electronic device, such as a mobile phone manager, can intercept cellular calls and cellular text messages initiated by the second electronic device after obtaining the user's communication identifier.
图6为本申请实施例提供的账户屏蔽方法的流程的另一个示例性示意图。Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
S601:系统应用确定蜂窝号码1加入黑名单。S601: The system application determines that cellular number 1 is added to the blacklist.
其中,蜂窝号码1属于通信标识3001,具体的内容可以参考上文中步骤S301的文字描述,此处不再赘述。Among them, the cellular number 1 belongs to the communication identifier 3001. For specific content, please refer to the text description of step S301 above, which will not be described again here.
S602:系统应用向即时通信应用程序1发送查询请求1,查询请求1包括蜂窝号码1。S602: The system application sends a query request 1 to the instant messaging application 1, and the query request 1 includes the cellular number 1.
其中,系统应用可以包括通讯录、手机管家。Among them, system applications can include address book and mobile phone manager.
其中,查询请求可以通过约定好的API发送。Among them, query requests can be sent through the agreed API.
S603:可选地,即时通信应用程序1将与蜂窝号码1对应的账户1加入第一用户的黑名单。S603: Optionally, the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
其中,第一用户的黑名单为第一用户在即时通信应用程序1中登录的账户的黑名单。Wherein, the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
其中,蜂窝号码1和账户1为不受欢迎者的通信标识。其中,账户1为通信标识3002。Among them, cell number 1 and account 1 are the communication identifiers of the undesirable person. Among them, account 1 is communication identifier 3002.
S604:即时通信应用程序1向服务器1发送查询请求2,查询请求2包括蜂窝号码1和/或账户1。S604: The instant messaging application 1 sends a query request 2 to the server 1. The query request 2 includes the cellular number 1 and/or the account 1.
其中,服务器1为即时通信应用程序1对应的服务器。Among them, server 1 is the server corresponding to instant messaging application 1.
S605:服务器1基于蜂窝号码1和/或账户1确定邮箱1。S605: Server 1 determines mailbox 1 based on cellular number 1 and/or account 1.
S606:可选地,服务器1将与账户1加入第一用户的黑名单。S606: Optionally, server 1 will add account 1 to the first user's blacklist.
其中,若步骤S603已经执行,则步骤S606可以不执行;若步骤S603未执行,则需要执行步骤S606。Among them, if step S603 has been executed, step S606 may not be executed; if step S603 has not been executed, step S606 needs to be executed.
S607:服务器1向即时通信应用程序1发送查询结果,查询结果包括邮箱1。 S607: Server 1 sends the query result to instant messaging application 1, and the query result includes mailbox 1.
其中,邮箱1为通信标识3002。Among them, mailbox 1 is communication identifier 3002.
S608:即时通信应用程序1向系统应用发送查询结果,查询结果包括邮箱1。S608: The instant messaging application 1 sends the query result to the system application, and the query result includes the mailbox 1.
在系统应用接收到邮箱1后,可以将邮箱1加入黑名单。After the system application receives mailbox 1, it can add mailbox 1 to the blacklist.
可选地,在本申请一些实施方式中,查询结果还包括账户1。Optionally, in some implementations of this application, the query results also include account 1.
图7为本申请实施例提供的账户屏蔽方法中拦截通信的一个示例性示意图。Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
S701:第二电子设备上的即时通信应用程序1向第一电子设备上的即时通信应用程序1发起通信。S701: The instant messaging application 1 on the second electronic device initiates communication to the instant messaging application 1 on the first electronic device.
其中,通信可以为网络电话、网络短信、邮件、消息和/或音视频通话。Among them, communication can be Internet phone calls, Internet text messages, emails, messages and/or audio and video calls.
其中,第二电子设备为不受欢迎者的电子设备,第二电子设备上的即时通信应用程序1登录的账户为账户2;第一电子设备上的即时通信应用程序1登录的账户为账户1。Among them, the second electronic device is the electronic device of the undesirable person, the account logged in by the instant messaging application 1 on the second electronic device is account 2; the account logged in by the instant messaging application 1 on the first electronic device is account 1 .
S702:即时通信应用程序1向系统应用发送查询请求1,查询请求包括账户2。S702: The instant messaging application 1 sends a query request 1 to the system application, and the query request includes account 2.
可选地,在本申请一些实施方式中,当即时通信应用程序1保存有黑名单的情况下,步骤S702和步骤S703为可选地步骤。Optionally, in some embodiments of the present application, when the instant messaging application 1 stores a blacklist, steps S702 and S703 are optional steps.
S703:系统应用向即时通信应用程序1发送查询结果1,查询结果1包括确认信息。S703: The system application sends query result 1 to instant messaging application 1, and query result 1 includes confirmation information.
其中,系统应用中存有黑名单,黑名单中保存有不受欢迎者的通信标识。其中,账户2属于黑名单。Among them, there is a blacklist in the system application, and the blacklist stores the communication identifiers of undesirable persons. Among them, account 2 belongs to the blacklist.
S704:即时通信应用程序1拦截通信。S704: Instant messaging application 1 intercepts communication.
即时通信应用程序基于查询结果1拦截第二电子设备上的即时通信应用程序发起的通信,如网络电话、网络短信、消息、音视频通话。Based on query result 1, the instant messaging application intercepts communications initiated by the instant messaging application on the second electronic device, such as Internet calls, Internet text messages, messages, and audio and video calls.
值得说明的是,在由即时通信应用程序1对应的服务器进行拦截的情况下,若服务器可以通过即时通信应用程序1向系统应用发送查询请求1,进而在接收到查询结果后由即时通信应用程序1对应的服务器进行拦截。It is worth noting that in the case of interception by the server corresponding to the instant messaging application 1, if the server can send a query request 1 to the system application through the instant messaging application 1, then after receiving the query result, the instant messaging application 1 corresponding server to intercept.
值得说明的是,在由即时通信应用程序1对应的服务器进行拦截的情况下,若服务器可以向操作系统对应的服务器发送查询请求1,进而在接收到查询结果后由即时通信应用程序1对应的服务器进行拦截。It is worth noting that in the case of interception by the server corresponding to the instant messaging application 1, if the server can send a query request 1 to the server corresponding to the operating system, then after receiving the query result, the server corresponding to the instant messaging application 1 The server intercepts.
最后介绍本申请实施例提供的通信系统,本申请实施例提供的第一电子设备、第二电子设备和服务器的硬件架构和软件架构。其中,第一电子设备和第二电子设备硬件架构和软件架构可以相同,所以后文中以电子设备指代第一电子设备和第二电子设备。Finally, the communication system provided by the embodiment of the present application, the hardware architecture and software architecture of the first electronic device, the second electronic device and the server provided by the embodiment of the present application are introduced. The hardware architecture and software architecture of the first electronic device and the second electronic device may be the same, so in the following, the first electronic device and the second electronic device are referred to as electronic devices.
图8为本申请实施例提供的通信系统的一个示例性示意图。Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
如图8所示,本申请实施例提供的通信系统可以包括第一电子设备和第二电子设备。As shown in Figure 8, the communication system provided by the embodiment of the present application may include a first electronic device and a second electronic device.
其中,第一电子设备为第一用户的电子设备,第二电子设备为不受欢迎用户的电子设备。Wherein, the first electronic device is the electronic device of the first user, and the second electronic device is the electronic device of the undesirable user.
可选地,在本申请一些实施方式中,通信系统还可以包括一个或多个服务器。其中,该一个或多个服务器可以包括操作系统对应的服务器和/或即时通信应用程序对应的应用服务器。Optionally, in some implementations of this application, the communication system may also include one or more servers. The one or more servers may include servers corresponding to operating systems and/or application servers corresponding to instant messaging applications.
图9为本申请实施例提供的电子设备的硬件结构的一个示例性示意图。FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
电子设备可以是手机、平板电脑、桌面型计算机、膝上型计算机、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本,以及蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)设 备、虚拟现实(virtual reality,VR)设备、人工智能(artificial intelligence,AI)设备、可穿戴式设备、车载设备、智能家居设备和/或智慧城市设备,本申请实施例对该电子设备的具体类型不作特殊限制。The electronic device may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, as well as a cellular phone, a personal digital assistant (personal digital assistant) assistant (PDA), augmented reality (AR) devices electronic equipment, virtual reality (VR) equipment, artificial intelligence (AI) equipment, wearable equipment, vehicle-mounted equipment, smart home equipment and/or smart city equipment. The embodiments of the present application specifically describe the electronic equipment. There are no special restrictions on the type.
电子设备可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。The electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and user Identification module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
可以理解的是,本发明实施例示意的结构并不构成对电子设备的具体限定。在本申请另一些实施例中,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It can be understood that the structures illustrated in the embodiments of the present invention do not constitute specific limitations on the electronic equipment. In other embodiments of the present application, the electronic device may include more or less components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently. The components illustrated may be implemented in hardware, software, or a combination of software and hardware.
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。The processor 110 may include one or more processing units. For example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc. Among them, different processing units can be independent devices or integrated in one or more processors.
控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。The controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。The processor 110 may also be provided with a memory for storing instructions and data. In some embodiments, the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。In some embodiments, processor 110 may include one or more interfaces. Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备的触摸功能。The I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces. For example, the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device.
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。The I2S interface can be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 . In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频 模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。The PCM interface can also be used for audio communications to sample, quantize and encode analog signals. In some embodiments, audio Module 170 and wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。The UART interface is a universal serial data bus used for asynchronous communication. The bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 and the wireless communication module 160 . For example, the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function. In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备的显示功能。The MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 . MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc. In some embodiments, the processor 110 and the camera 193 communicate through a CSI interface to implement the shooting function of the electronic device. The processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device.
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。The GPIO interface can be configured through software. The GPIO interface can be configured as a control signal or as a data signal. In some embodiments, the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc. The GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备充电,也可以用于电子设备与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。The USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc. The USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备的结构限定。在本申请另一些实施例中,电子设备也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。It can be understood that the interface connection relationships between the modules illustrated in the embodiments of the present invention are only schematic illustrations and do not constitute structural limitations on the electronic equipment. In other embodiments of the present application, the electronic device may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。The charging management module 140 is used to receive charging input from the charger. Among them, the charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from the wired charger through the USB interface 130 . In some wireless charging embodiments, the charging management module 140 may receive wireless charging input through a wireless charging coil of the electronic device. While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters. In some other embodiments, the power management module 141 may also be provided in the processor 110 . In other embodiments, the power management module 141 and the charging management module 140 may also be provided in the same device.
电子设备的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。The wireless communication function of the electronic device can be realized through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
天线1和天线2用于发射和接收电磁波信号。电子设备中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals. Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
移动通信模块150可以提供应用在电子设备上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise  amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。The mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied to electronic devices. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier amplifier, LNA), etc. The mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation. The mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation. In some embodiments, at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 . In some embodiments, at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。A modem processor may include a modulator and a demodulator. Among them, the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing. After the low-frequency baseband signal is processed by the baseband processor, it is passed to the application processor. The application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
无线通信模块160可以提供应用在电子设备上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。The wireless communication module 160 can provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (BT), and global navigation satellite systems for use in electronic devices. (global navigation satellite system, GNSS), frequency modulation (FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 . The wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
在一些实施例中,电子设备的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the electronic device is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc. The GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
电子设备通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The electronic device implements display functions through the GPU, display screen 194, and application processor. The GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备可以包括1个或N个显示屏194,N为大于1的正整数。The display screen 194 is used to display images, videos, etc. Display 194 includes a display panel. The display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode). emitting diode (AMOLED), flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc. In some embodiments, the electronic device may include 1 or N display screens 194, where N is a positive integer greater than 1.
电子设备可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器 等实现拍摄功能。Electronic devices can use ISPs, cameras 193 , video codecs, GPUs, displays 194 and application processors Wait for the shooting function to be realized.
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。The ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise and brightness. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备可以包括1个或N个摄像头193,N为大于1的正整数。Camera 193 is used to capture still images or video. The object passes through the lens to produce an optical image that is projected onto the photosensitive element. The photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal. ISP outputs digital image signals to DSP for processing. DSP converts digital image signals into standard RGB, YUV and other format image signals. In some embodiments, the electronic device may include 1 or N cameras 193, where N is a positive integer greater than 1.
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
视频编解码器用于对数字视频压缩或解压缩。电子设备可以支持一种或多种视频编解码器。这样,电子设备可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。Video codecs are used to compress or decompress digital video. Electronic devices may support one or more video codecs. In this way, electronic devices can play or record videos in multiple encoding formats, such as: Moving Picture Experts Group (MPEG)1, MPEG2, MPEG3, MPEG4, etc.
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。NPU is a neural network (NN) computing processor. By drawing on the structure of biological neural networks, such as the transmission mode between neurons in the human brain, it can quickly process input information and can continuously learn by itself. Intelligent cognitive applications of electronic devices can be realized through NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
内部存储器121可以包括一个或多个随机存取存储器(random access memory,RAM)和一个或多个非易失性存储器(non-volatile memory,NVM)。The internal memory 121 may include one or more random access memories (RAM) and one or more non-volatile memories (NVM).
随机存取存储器可以包括静态随机存储器(static random-access memory,SRAM)、动态随机存储器(dynamic random access memory,DRAM)、同步动态随机存储器(synchronous dynamic random access memory,SDRAM)、双倍资料率同步动态随机存取存储器(double data rate synchronous dynamic random access memory,DDR SDRAM,例如第五代DDR SDRAM一般称为DDR5SDRAM)等;Random access memory can include static random-access memory (SRAM), dynamic random-access memory (DRAM), synchronous dynamic random-access memory (SDRAM), double data rate synchronous Dynamic random access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as the fifth generation DDR SDRAM is generally called DDR5SDRAM), etc.;
非易失性存储器可以包括磁盘存储器件、快闪存储器(flash memory)。Non-volatile memory can include disk storage devices and flash memory.
快闪存储器按照运作原理划分可以包括NOR FLASH、NAND FLASH、3D NAND FLASH等,按照存储单元电位阶数划分可以包括单阶存储单元(single-level cell,SLC)、多阶存储单元(multi-level cell,MLC)、三阶储存单元(triple-level cell,TLC)、四阶储存单元(quad-level cell,QLC)等,按照存储规范划分可以包括通用闪存存储(英文:universal flash storage,UFS)、嵌入式多媒体存储卡(embedded multi media Card,eMMC)等。Flash memory can be divided according to the operating principle to include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc. According to the storage unit potential level, it can include single-level storage cells (single-level cell, SLC), multi-level storage cells (multi-level cell, MLC), third-level storage unit (triple-level cell, TLC), fourth-level storage unit (quad-level cell, QLC), etc., which can include universal flash storage (English: universal flash storage, UFS) according to storage specifications. , embedded multi media card (embedded multi media Card, eMMC), etc.
随机存取存储器可以由处理器110直接进行读写,可以用于存储操作系统或其他正在运行中的程序的可执行程序(例如机器指令),还可以用于存储用户及应用程序的数据等。The random access memory can be directly read and written by the processor 110, can be used to store executable programs (such as machine instructions) of the operating system or other running programs, and can also be used to store user and application data, etc.
非易失性存储器也可以存储可执行程序和存储用户及应用程序的数据等,可以提前加载到随机存取存储器中,用于处理器110直接进行读写。The non-volatile memory can also store executable programs and user and application program data, etc., and can be loaded into the random access memory in advance for direct reading and writing by the processor 110.
外部存储器接口120可以用于连接外部的非易失性存储器,实现扩展电子设备的存储能力。外部的非易失性存储器通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部的非易失性存储器中。The external memory interface 120 can be used to connect an external non-volatile memory to expand the storage capacity of the electronic device. The external non-volatile memory communicates with the processor 110 through the external memory interface 120 to implement the data storage function. For example, save music, video and other files in external non-volatile memory.
电子设备可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。 The electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。The audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备可以通过扬声器170A收听音乐,或收听免提通话。Speaker 170A, also called "speaker", is used to convert audio electrical signals into sound signals. The electronic device can listen to music through speaker 170A, or listen to hands-free calls.
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。Receiver 170B, also called "earpiece", is used to convert audio electrical signals into sound signals. When the electronic device answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备可以设置至少一个麦克风170C。在另一些实施例中,电子设备可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,电子设备还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。Microphone 170C, also called "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C. The electronic device may be provided with at least one microphone 170C. In other embodiments, the electronic device may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. In other embodiments, the electronic device can also be equipped with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。The headphone interface 170D is used to connect wired headphones. The headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器180A,电极之间的电容改变。电子设备根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,电子设备根据压力传感器180A检测所述触摸操作强度。电子设备也可以根据压力传感器180A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。The pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals. In some embodiments, pressure sensor 180A may be disposed on display screen 194 . There are many types of pressure sensors 180A, such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc. A capacitive pressure sensor may include at least two parallel plates of conductive material. When a force is applied to pressure sensor 180A, the capacitance between the electrodes changes. Electronics determine the intensity of the pressure based on changes in capacitance. When a touch operation is performed on the display screen 194, the electronic device detects the strength of the touch operation according to the pressure sensor 180A. The electronic device may also calculate the touched position based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
陀螺仪传感器180B可以用于确定电子设备的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测电子设备抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消电子设备的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。The gyro sensor 180B can be used to determine the motion posture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (ie, x, y, and z axes) may be determined by gyro sensor 180B. The gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device shakes, and calculates the distance that the lens module needs to compensate based on the angle, so that the lens can offset the shake of the electronic device through reverse movement to achieve anti-shake. The gyro sensor 180B can also be used for navigation and somatosensory game scenes.
气压传感器180C用于测量气压。在一些实施例中,电子设备通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
磁传感器180D包括霍尔传感器。电子设备可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备是翻盖机时,电子设备可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。Magnetic sensor 180D includes a Hall sensor. The electronic device can use the magnetic sensor 180D to detect the opening and closing of the flip holster. In some embodiments, when the electronic device is a flip machine, the electronic device may detect opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
加速度传感器180E可检测电子设备在各个方向上(一般为三轴)加速度的大小。当电子设备静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。The acceleration sensor 180E can detect the acceleration of the electronic device in various directions (generally three axes). When the electronic device is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
距离传感器180F,用于测量距离。电子设备可以通过红外或激光测量距离。在一些实施 例中,拍摄场景,电子设备可以利用距离传感器180F测距以实现快速对焦。Distance sensor 180F for measuring distance. Electronic devices can measure distance via infrared or laser. In some implementations For example, in shooting scenes, electronic devices can use the distance sensor 180F to measure distance to achieve fast focusing.
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备通过发光二极管向外发射红外光。电子设备使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备附近有物体。当检测到不充分的反射光时,电子设备可以确定电子设备附近没有物体。电子设备可以利用接近光传感器180G检测用户手持电子设备贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. Electronic devices emit infrared light through light-emitting diodes. Electronic devices use photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device. When insufficient reflected light is detected, the electronic device can determine that there is no object near the electronic device. Electronic devices can use the proximity light sensor 180G to detect when the user holds the electronic device close to the ear and talk, so that the screen can be automatically turned off to save power. The proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
环境光传感器180L用于感知环境光亮度。电子设备可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备是否在口袋里,以防误触。The ambient light sensor 180L is used to sense ambient light brightness. The electronic device can adaptively adjust the brightness of the display screen 194 based on perceived ambient light brightness. The ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures. The ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touching.
指纹传感器180H用于采集指纹。电子设备可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。Fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, answer incoming calls with fingerprints, etc.
温度传感器180J用于检测温度。在一些实施例中,电子设备利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备对电池142加热,以避免低温导致电子设备异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备对电池142的输出电压执行升压,以避免低温导致的异常关机。Temperature sensor 180J is used to detect temperature. In some embodiments, the electronic device uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device heats the battery 142 to prevent the low temperature from causing abnormal shutdown of the electronic device. In some other embodiments, when the temperature is lower than another threshold, the electronic device performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
触摸传感器180K,也称“触控器件”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备的表面,与显示屏194所处的位置不同。Touch sensor 180K, also known as "touch device". The touch sensor 180K can be disposed on the display screen 194. The touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K. The touch sensor can pass the detected touch operation to the application processor to determine the touch event type. Visual output related to the touch operation may be provided through display screen 194 . In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device at a location different from that of the display screen 194 .
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于所述骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于所述骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。Bone conduction sensor 180M can acquire vibration signals. In some embodiments, the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human body's vocal part. The bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals. In some embodiments, the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone. The audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function. The application processor can analyze the heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M to implement the heart rate detection function.
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备可以接收按键输入,产生与电子设备的用户设置以及功能控制有关的键信号输入。The buttons 190 include a power button, a volume button, etc. Key 190 may be a mechanical key. It can also be a touch button. The electronic device can receive key input and generate key signal input related to user settings and function control of the electronic device.
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。The motor 191 can generate vibration prompts. The motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback. For example, touch operations for different applications (such as taking pictures, audio playback, etc.) can correspond to different vibration feedback effects. The motor 191 can also respond to different vibration feedback effects for touch operations in different areas of the display screen 194 . Different application scenarios (such as time reminders, receiving information, alarm clocks, games, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect can also be customized.
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。The indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备的接触和分离。电子设备可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一 个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。电子设备通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在电子设备中,不能和电子设备分离。The SIM card interface 195 is used to connect a SIM card. The SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to realize contact and separation from the electronic device. The electronic device can support 1 or N SIM card interfaces, where N is a positive integer greater than 1. SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card, etc. same Each SIM card interface 195 can insert multiple cards at the same time. The types of the plurality of cards may be the same or different. The SIM card interface 195 is also compatible with different types of SIM cards. The SIM card interface 195 is also compatible with external memory cards. Electronic devices interact with the network through SIM cards to implement functions such as calls and data communications. In some embodiments, the electronic device uses an eSIM, that is, an embedded SIM card. The eSIM card can be embedded in the electronic device and cannot be separated from the electronic device.
电子设备的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本发明实施例以分层架构的Android系统为例,示例性说明电子设备的软件结构。Software systems of electronic devices can adopt layered architecture, event-driven architecture, microkernel architecture, microservice architecture, or cloud architecture. The embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device.
图10是本申请实施例提供的电子设备的软件架构的一个示例性示意图。FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。The layered architecture divides the software into several layers, and each layer has clear roles and division of labor. The layers communicate through software interfaces. In some embodiments, the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
应用程序层可以包括一系列应用程序包。The application layer can include a series of application packages.
如图10所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。As shown in Figure 10, the application package can include camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and other applications.
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (API) and programming framework for applications in the application layer. The application framework layer includes some predefined functions.
如图10所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。As shown in Figure 10, the application framework layer can include a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。A window manager is used to manage window programs. The window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。Content providers are used to store and retrieve data and make this data accessible to applications. Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。The view system includes visual controls, such as controls that display text, controls that display pictures, etc. A view system can be used to build applications. The display interface can be composed of one or more views. For example, a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
电话管理器用于提供电子设备的通信功能。例如通话状态的管理(包括接通,挂断等)。Telephone managers are used to provide communication functions of electronic devices. For example, call status management (including connected, hung up, etc.).
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。The resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。The notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc. The notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。The core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。The application layer and application framework layer run in virtual machines. The virtual machine executes the java files of the application layer and application framework layer into binary files. The virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融 合。The surface manager manages the display subsystem and provides integration of 2D and 3D layers for multiple applications. combine.
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。The media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc. The media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
2D图形引擎是2D绘图的绘图引擎。2D Graphics Engine is a drawing engine for 2D drawing.
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。The kernel layer is the layer between hardware and software. The kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
在本申请一些实施方式中,电话管理器可以负责执行拦截不受欢迎者的蜂窝电话和蜂窝短信。In some embodiments of the present application, the phone manager may be responsible for performing the interception of unwanted cell phone calls and cell text messages.
可选的,在本申请一些实施方式中,电话管理器还可以负责执行不受欢迎者的邮件、网络电话、网络短信、消息、短视频通信。Optionally, in some embodiments of the present application, the phone manager may also be responsible for executing emails, Internet calls, Internet text messages, messages, and short video communications from unwanted persons.
图11A为本申请实施例提供的第一电子设备添加通信标识至黑名单库过程中数据流动的一个示例性示意图。FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
如图11A所示,当第一用户在即时通信应用程序中拉黑某个账户后,即时通信应用程序会将该账户发送到系统应用。其中,该账户即为不受欢迎者的通信标识。As shown in Figure 11A, after the first user blocks an account in the instant messaging application, the instant messaging application will send the account to the system application. Among them, the account is the communication identifier of the undesirable person.
可选地,在本申请一些实施方式中,系统应用可以为手机管家,或者是操作系统上运行的服务,如电话管理器。Optionally, in some implementations of this application, the system application may be a mobile phone manager, or a service running on the operating system, such as a phone manager.
在系统应用接收到不受欢迎者的通信标识后,系统应用将不受欢迎者的通信标识写入黑名单库中。其中黑名单库位于内部存储器121中。After the system application receives the communication identification of the undesirable person, the system application writes the communication identification of the unwelcome person into the blacklist database. The blacklist library is located in the internal memory 121.
可选地,在本申请一些实施方式中,黑名单库也可以位于操作系统对应的服务器中。Optionally, in some implementations of this application, the blacklist database may also be located in the server corresponding to the operating system.
可选地,在本申请一些实施方式中,黑名单库以配置文件的形式保存在本地。Optionally, in some implementations of this application, the blacklist database is saved locally in the form of a configuration file.
图11B为本申请实施例提供的即时通信应用程序拦截音视频通话或消息的一个示例性示意图。FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
即时通信应用程序在接收到音视频通话或消息后,查询对端的通信标识是否位于黑名单库中。After receiving an audio or video call or message, the instant messaging application queries whether the peer's communication identifier is in the blacklist.
若即时通信应用程序在确定对端的通信标识位于黑名单库中,则拦截该音视频通话或消息。If the instant messaging application determines that the peer's communication identifier is in the blacklist, it will intercept the audio and video call or message.
其中,不同的即时通信应用程序和系统应用均可以访问该黑名单库。Among them, different instant messaging applications and system applications can access the blacklist library.
图11C为本申请实施例提供的即时通信应用程序拦截网络电话或网络短信的另一个示例性示意图。Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
接收到网络电话或网络短信后,即时通信应用程序或系统应用发送查询请求至电话管理器,查询请求包括对端用户的通信标识。由电话管理器查询对端用户的通信标识是否属于黑名单库。After receiving an Internet call or an Internet text message, the instant messaging application or system application sends a query request to the phone manager. The query request includes the communication identifier of the peer user. The phone manager queries whether the communication ID of the peer user belongs to the blacklist database.
在电话管理器确定用户的通信标识属于黑名单库后,电话管理器向即时通信应用程序或系统应用发送指示消息,指示消息用于指示通信应用程序或系统应用拦截网络电话或网络短信。After the phone manager determines that the user's communication identifier belongs to the blacklist library, the phone manager sends an instruction message to the instant messaging application or system application. The instruction message is used to instruct the communication application or system application to intercept Internet calls or Internet text messages.
可选地,在本申请一些实施方式中,在即时通信应用程序接收到消息、音视频通话后,即时通信应用程序也可以按照图11C的方式确定是否拦截。Optionally, in some embodiments of the present application, after the instant messaging application receives a message or an audio or video call, the instant messaging application can also determine whether to intercept in the manner shown in Figure 11C.
上述实施例中所用,根据上下文,术语“当…时”可以被解释为意思是“如果…”或“在…后”或“响应于确定…”或“响应于检测到…”。类似地,根据上下文,短语“在确定…时” 或“如果检测到(所陈述的条件或事件)”可以被解释为意思是“如果确定…”或“响应于确定…”或“在检测到(所陈述的条件或事件)时”或“响应于检测到(所陈述的条件或事件)”。As used in the above embodiments, the term "when" may be interpreted to mean "if..." or "after" or "in response to determining..." or "in response to detecting..." depending on the context. Similarly, depending on the context, the phrase "when determining..." or "if (stated condition or event) is detected" may be interpreted to mean "if it is determined..." or "in response to determining..." or "when (stated condition or event) is detected" or "in response to upon detection of (stated condition or event)”.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例该的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如DVD)、或者半导体介质(例如固态硬盘)等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted over a wired connection from a website, computer, server, or data center (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website, computer, server or data center. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state drive), etc.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。 Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments are implemented. This process can be completed by instructing relevant hardware through a computer program. The program can be stored in a computer-readable storage medium. When the program is executed, , may include the processes of the above method embodiments. The aforementioned storage media include: ROM, random access memory (RAM), magnetic disks, optical disks and other media that can store program codes.

Claims (32)

  1. 一种账户屏蔽方法,应用于包括第一服务器和第一电子设备的系统,其特征在于,所述方法包括:An account shielding method, applied to a system including a first server and a first electronic device, characterized in that the method includes:
    所述第一服务器接收到第一消息后,所述第一服务器基于所述第一消息将第一通信标识与第二通信标识关联,所述第一通信标识为第一用户的通信标识,其中,在所述第一服务器接收到所述第一消息前,所述第二通信标识不存在或者所述第二通信标识与所述第一通信标识不关联,所述第一消息为所述第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;After the first server receives the first message, the first server associates the first communication identification with the second communication identification based on the first message, and the first communication identification is the communication identification of the first user, wherein , before the first server receives the first message, the second communication identifier does not exist or the second communication identifier is not associated with the first communication identifier, and the first message is the first communication identifier. Sent by a user's electronic device, the communication is identified as a cellular number or account of an instant messaging application;
    所述第一服务器在确定所述第一通信标识属于第一屏蔽名单时,所述第一服务器将所述第二通信标识加入所述第一屏蔽名单,所述第一屏蔽名单为第二用户的屏蔽名单;When the first server determines that the first communication identification belongs to the first blocking list, the first server adds the second communication identification to the first blocking list, and the first blocking list is the second user. block list;
    所述第一电子设备拦截第一通信,所述第一通信的发起方的通信标识在所述第一屏蔽名单中,所述第一电子设备为所述第二用户的电子设备;或者,所述第一服务器拦截第一通信,所述第一通信的发起方的通信标识在所述第一屏蔽名单中,且所述第一通信的接收方的通信标识为所述第二用户的通信标识。The first electronic device intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or, The first server intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user. .
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1, further comprising:
    所述第一服务器接收到第二消息后,所述第一服务器基于所述第二消息将所述第一通信标识与第三通信标识关联,所述第二消息为即时通信应用程序对应的应用服务器发送的,所述第二消息用于指示所述第三通信标识与所述第一通信标识关联,其中,在所述应用服务器关联所述第三通信标识与所述第一通信标识前,所述第三通信标识不存在或者所述第三通信标识与所述第一通信标识不关联;After the first server receives the second message, the first server associates the first communication identifier with a third communication identifier based on the second message, and the second message is an application corresponding to the instant messaging application. Sent by the server, the second message is used to indicate that the third communication identification is associated with the first communication identification, wherein before the application server associates the third communication identification with the first communication identification, The third communication identification does not exist or the third communication identification is not associated with the first communication identification;
    所述第一服务器将所述第三通信标识加入所述第一屏蔽名单。The first server adds the third communication identifier to the first blocking list.
  3. 根据权利要求1或2所述的方法,其特征在于,在所述第一服务器接收到第一消息前,所述方法还包括:The method according to claim 1 or 2, characterized in that, before the first server receives the first message, the method further includes:
    所述第一服务器接收所述第一电子设备发送的第三消息,所述第三消息包括所述第一通信标识;The first server receives a third message sent by the first electronic device, where the third message includes the first communication identifier;
    所述第一服务器将所述第一通信标识加入所述第一屏蔽名单;The first server adds the first communication identifier to the first blocking list;
    所述第一服务器确定与所述第一通信标识关联的第四通信标识;The first server determines a fourth communication identification associated with the first communication identification;
    所述第一服务器将所述第四通信标识加入所述第一屏蔽名单。The first server adds the fourth communication identifier to the first blocking list.
  4. 根据权利要求3所述的方法,其特征在于,The method according to claim 3, characterized in that:
    在所述第一服务器在接收到所述第一消息前,所述方法还包括:所述第一服务器接收注销请求,所述第一服务器注销第一账号,所述第一账号为所述第一通信标识;Before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account, and the first account is the first account. a communication identifier;
    所述第一消息用于基于第一蜂窝号码注册所述第二账号,所述第一蜂窝号码为所述第四通信标识,所述第二账号为所述第二通信标识。The first message is used to register the second account based on a first cellular number, the first cellular number is the fourth communication identification, and the second account is the second communication identification.
  5. 根据权利要求1-3中任一项所述的方法,其特征在于,The method according to any one of claims 1-3, characterized in that,
    所述第一消息用于指示所述第一服务器基于所述第一通信标识注册所述第二通信标识。 The first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  6. 根据权利要求1-3中任一项所述的方法,其特征在于,The method according to any one of claims 1-3, characterized in that,
    所述第一通信标识为第一蜂窝号码,所述第一消息用于指示所述第一服务器绑定所述第一蜂窝号码和第一账号,所述第二通信标识为所述第一账号。The first communication identifier is a first cellular number, the first message is used to instruct the first server to bind the first cellular number and a first account, and the second communication identifier is the first account .
  7. 根据权利要求1-3中任一项所述的方法,其特征在于,The method according to any one of claims 1-3, characterized in that,
    所述第一通信标识为第一蜂窝号码,所述第二消息用于告知所述第一服务器所述第一用户的蜂窝号码还包括第二蜂窝号码,所述第一消息是所述第一用户的电子设备检测到新插入的SIM卡后发送的。The first communication identifier is a first cellular number, the second message is used to inform the first server that the first user's cellular number also includes a second cellular number, and the first message is the first cellular number. Sent after the user's electronic device detects a newly inserted SIM card.
  8. 根据权利要求1-6中任一项所述的方法,其特征在于,所述系统还包括第二服务器,所述方法还包括:The method according to any one of claims 1-6, characterized in that the system further includes a second server, and the method further includes:
    所述第一服务器向所述第二服务器发送第四消息,所述第四消息包括第五通信标识,所述第五通信标识为所述第一屏蔽名单中的通信标识;The first server sends a fourth message to the second server, the fourth message includes a fifth communication identifier, and the fifth communication identifier is a communication identifier in the first blocking list;
    所述第二服务器确定与所述第五通信标识关联的第六通信标识后,所述第二服务器向所述第一服务器发送第五消息,所述第五消息包括所述第六通信标识后,After the second server determines the sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server, where the fifth message includes the sixth communication identifier. ,
    所述第一服务器将所述第五通信标识加入所述第一屏蔽名单。The first server adds the fifth communication identifier to the first blocking list.
  9. 一种账户屏蔽方法,其特征在于,应用于第一服务器,所述方法包括:An account shielding method, characterized in that it is applied to the first server, and the method includes:
    所述第一服务器接收到第一消息后,所述第一服务器基于所述第一消息将第一通信标识与第二通信标识关联,所述第一通信标识为第一用户的通信标识,其中,在所述第一服务器接收到所述第一消息前,所述第二通信标识不存在或者所述第二通信标识与所述第一通信标识不关联,所述第一消息为所述第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;After the first server receives the first message, the first server associates the first communication identification with the second communication identification based on the first message, and the first communication identification is the communication identification of the first user, wherein , before the first server receives the first message, the second communication identifier does not exist or the second communication identifier is not associated with the first communication identifier, and the first message is the first communication identifier. Sent by a user's electronic device, the communication is identified as a cellular number or account of an instant messaging application;
    所述第一服务器在确定所述第一通信标识属于第一屏蔽名单时,所述第一服务器将所述第二通信标识加入所述第一屏蔽名单,所述第一屏蔽名单为第二用户的屏蔽名单;When the first server determines that the first communication identification belongs to the first blocking list, the first server adds the second communication identification to the first blocking list, and the first blocking list is the second user. block list;
    所述第一服务器拦截第一通信,所述第一通信的发起方的通信标识在所述第一屏蔽名单中,且所述第一通信的接收方的通信标识为所述第二用户的通信标识。The first server intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication of the second user. logo.
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:The method of claim 9, further comprising:
    所述第一服务器接收到第二消息后,所述第一服务器基于所述第二消息将所述第一通信标识与第三通信标识关联,所述第二消息为即时通信应用程序对应的应用服务器发送的,所述第二消息用于指示所述第三通信标识与所述第一通信标识关联,其中,在所述应用服务器关联所述第三通信标识与所述第一通信标识前,所述第三通信标识不存在或者所述第三通信标识与所述第一通信标识不关联;After the first server receives the second message, the first server associates the first communication identifier with a third communication identifier based on the second message, and the second message is an application corresponding to the instant messaging application. Sent by the server, the second message is used to indicate that the third communication identification is associated with the first communication identification, wherein before the application server associates the third communication identification with the first communication identification, The third communication identification does not exist or the third communication identification is not associated with the first communication identification;
    所述第一服务器将所述第三通信标识加入所述第一屏蔽名单。The first server adds the third communication identifier to the first blocking list.
  11. 根据权利要求9或10所述的方法,其特征在于,在所述第一服务器接收到第一消息前,所述方法还包括:The method according to claim 9 or 10, characterized in that, before the first server receives the first message, the method further includes:
    所述第一服务器接收所述第一电子设备发送的第三消息,所述第三消息包括所述第一通信标识;The first server receives a third message sent by the first electronic device, where the third message includes the first communication identifier;
    所述第一服务器将所述第一通信标识加入所述第一屏蔽名单; The first server adds the first communication identifier to the first blocking list;
    所述第一服务器确定与所述第一通信标识关联的第四通信标识;The first server determines a fourth communication identification associated with the first communication identification;
    所述第一服务器将所述第四通信标识加入所述第一屏蔽名单。The first server adds the fourth communication identifier to the first blocking list.
  12. 根据权利要求11所述的方法,其特征在于,The method according to claim 11, characterized in that:
    在所述第一服务器在接收到所述第一消息前,所述方法还包括:所述第一服务器接收注销请求,所述第一服务器注销第一账号,所述第一账号为所述第一通信标识;Before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account, and the first account is the first account. a communication identifier;
    所述第一消息用于基于第一蜂窝号码注册所述第二账号,所述第一蜂窝号码为所述第四通信标识,所述第二账号为所述第二通信标识。The first message is used to register the second account based on a first cellular number, the first cellular number is the fourth communication identification, and the second account is the second communication identification.
  13. 根据权利要求9-11中任一项所述的方法,其特征在于,The method according to any one of claims 9-11, characterized in that,
    所述第一消息用于指示所述第一服务器基于所述第一通信标识注册所述第二通信标识。The first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  14. 根据权利要求9-11中任一项所述的方法,其特征在于,The method according to any one of claims 9-11, characterized in that,
    所述第一通信标识为第一蜂窝号码,所述第一消息用于指示所述第一服务器绑定所述第一蜂窝号码和第一账号,所述第二通信标识为所述第一账号。The first communication identifier is a first cellular number, the first message is used to instruct the first server to bind the first cellular number and a first account, and the second communication identifier is the first account .
  15. 根据权利要求9-11中任一项所述的方法,其特征在于,The method according to any one of claims 9-11, characterized in that,
    所述第一通信标识为第一蜂窝号码,所述第二消息用于告知所述第一服务器所述第一用户的蜂窝号码还包括第二蜂窝号码,所述第一消息是所述第一用户的电子设备检测到新插入的SIM卡后发送的。The first communication identifier is a first cellular number, the second message is used to inform the first server that the first user's cellular number also includes a second cellular number, and the first message is the first cellular number. Sent after the user's electronic device detects a newly inserted SIM card.
  16. 一种账户屏蔽方法,应用于包括第一服务器和第一电子设备的系统,其特征在于,所述方法包括:An account shielding method, applied to a system including a first server and a first electronic device, characterized in that the method includes:
    所述第一电子设备向所述第一服务器发送第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first electronic device sends a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器确定与所述第一通信标识关联的第一蜂窝号码;The first server determines a first cellular number associated with the first communication identification;
    所述第一服务器向所述第一电子设备发送第一蜂窝号码;The first server sends a first cellular number to the first electronic device;
    所述第一电子设备拦截第一通信,所述第一通信为所述第一蜂窝号码对应的蜂窝通话或蜂窝短信。The first electronic device intercepts a first communication, and the first communication is a cellular call or a cellular text message corresponding to the first cellular number.
  17. 根据权利要求16所述的方法,其特征在于,在所述第一服务器在接收到第一消息后,所述方法还包括:The method according to claim 16, characterized in that, after the first server receives the first message, the method further includes:
    所述第一服务器接收第二消息,所述第一服务器基于所述第二消息确定第二通信标识与所述第一蜂窝号码关联,述第二消息用于指示所述第一服务器基于所述第一蜂窝号码注册所述第一账号,或者,所述第二消息用于指示所述第一服务器绑定所述第一蜂窝号码与所述第一账号;The first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used to indicate that the first server is based on the The first cellular number registers the first account, or the second message is used to instruct the first server to bind the first cellular number and the first account;
    所述第一服务器拦截第二通信,所述第二通信为所述第一账号向所述第一用户的账号发起的音视频通话、网络电话、网络短信或消息。The first server intercepts the second communication, and the second communication is an audio and video call, Internet phone call, Internet text message, or message initiated by the first account to the first user's account.
  18. 根据权利要求16所述的方法,其特征在于,在所述第一服务器在接收到第一消息后,所述方法还包括: The method according to claim 16, characterized in that, after the first server receives the first message, the method further includes:
    所述第一服务器接收第二消息,所述第一服务器基于所述第二消息确定第二通信标识与所述第一蜂窝号码关联,述第二消息用于指示所述第一服务器基于所述第一蜂窝号码注册所述第一账号,或者,所述第二消息用于指示所述第一服务器绑定所述第一蜂窝号码与所述第一账号;The first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used to indicate that the first server is based on the The first cellular number registers the first account, or the second message is used to instruct the first server to bind the first cellular number and the first account;
    所述第一服务器向所述第一电子设备发送第三消息,所述第三消息包括第一账号;The first server sends a third message to the first electronic device, where the third message includes a first account number;
    所述第一电子设备拦截第二通信,所述第二通信为所述第一账号发起的音视频通话、网络电话、网络短信或消息。The first electronic device intercepts the second communication, and the second communication is an audio and video call, an Internet phone call, an Internet text message, or a message initiated by the first account.
  19. 一种账户屏蔽方法,应用于第一服务器,其特征在于,所述方法包括:An account shielding method, applied to the first server, characterized in that the method includes:
    所述第一服务器接收第一电子设备发送的第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first server receives a first message sent by a first electronic device, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器确定与所述第一通信标识关联的第一蜂窝号码;The first server determines a first cellular number associated with the first communication identification;
    所述第一服务器向所述第一电子设备发送第二消息,所述第二消息包括所述第一蜂窝号码,所述第一蜂窝号码对应的蜂窝通话或蜂窝短信被所述第一电子设备拦截。The first server sends a second message to the first electronic device, the second message includes the first cellular number, and the cellular call or cellular text message corresponding to the first cellular number is sent by the first electronic device. Interception.
  20. 根据权利要求19所述的方法,其特征在于,在所述第一服务器接收第一电子设备发送的第一消息后,所述方法还包括:The method according to claim 19, characterized in that, after the first server receives the first message sent by the first electronic device, the method further includes:
    所述第一服务器接收第二消息,所述第一服务器基于所述第二消息确定第二通信标识与所述第一蜂窝号码关联,所述第二消息用于指示所述第一服务器基于所述第一蜂窝号码注册所述第一账号,或者,所述第二消息用于指示所述第一服务器绑定所述第一蜂窝号码与所述第一账号;The first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used to indicate that the first server is based on the The first cellular number registers the first account, or the second message is used to instruct the first server to bind the first cellular number and the first account;
    所述第一服务器拦截第二通信,所述第二通信为所述第一账号向所述第一用户的账号发起的音视频通话、网络电话、网络短信或消息。The first server intercepts the second communication, and the second communication is an audio and video call, Internet phone call, Internet text message, or message initiated by the first account to the first user's account.
  21. 一种账户屏蔽方法,应用于第一电子设备,其特征在于,所述方法包括:An account shielding method, applied to a first electronic device, characterized in that the method includes:
    所述第一电子设备确定第一通信标识在第一屏蔽名单中后,所述第一电子设备确定与所述第一通信标识关联的第二通信标识,其中,在所述第一通信标识为第一蜂窝号码的情况下,所述第二通信标识为第二蜂窝号码;在所述第一通信标识为第一账户的情况下,所述第二通信标识为第一蜂窝号码,通信标识为蜂窝号码或即时通信应用程序的账号;After the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device determines a second communication identifier associated with the first communication identifier, wherein the first communication identifier is In the case of the first cellular number, the second communication identification is the second cellular number; in the case of the first communication identification being the first account, the second communication identification is the first cellular number, and the communication identification is Cellular number or messaging application account number;
    在所述第一电子设备将所述第二通信标识被加入所述第一屏蔽名单;Add the second communication identifier to the first blocking list in the first electronic device;
    所述第一电子设备拦截第一通信,所述第一通信的发起方的标识为所述第一屏蔽名单中的通信标识。The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking list.
  22. 根据权利要求21所述的方法,其特征在于,所述第一电子设备确定与所述第一通信标识关联的第二通信标识,具体包括:The method according to claim 21, characterized in that the first electronic device determines a second communication identification associated with the first communication identification, specifically including:
    系统应用向一个或多个即时通信应用程序发送第一消息,所述第一消息包括所述第一通信标识,所述一个或多个即时通信应用程序包括第一应用程序;The system application sends a first message to one or more instant messaging applications, where the first message includes the first communication identifier, and the one or more instant messaging applications include the first application;
    所述第一应用程序确定所述第二通信标识与所述第一通信标识关联;The first application determines that the second communication identification is associated with the first communication identification;
    所述第一应用程序向所述系统应用发送第二消息,所述第二消息包括所述第二通信标识所述系统应用确定所述第二通信标识与所述第一通信标识关联。 The first application program sends a second message to the system application, where the second message includes the second communication identifier and the system application determines that the second communication identifier is associated with the first communication identifier.
  23. 一种账户屏蔽方法,其特征在于,应用于包括第一电子设备、第二电子设备和第一服务器的系统,所述方法包括:An account shielding method, characterized in that it is applied to a system including a first electronic device, a second electronic device and a first server, and the method includes:
    所述第一电子设备向所述第一服务器发送第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first electronic device sends a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器基于所述第一通信标识确定第二电子设备,所述第一通信标识为所述第二电子设备上用户的通信标识;The first server determines the second electronic device based on the first communication identification, where the first communication identification is the communication identification of the user on the second electronic device;
    所述第一服务器向所述第二电子设备发送第二通信标识,所述第二通信标识为所述第一电子设备上用户的通信标识;The first server sends a second communication identification to the second electronic device, where the second communication identification is the communication identification of the user on the first electronic device;
    所述第二电子设备在接收到所述第二通信标识后,拦截第一通信,所述第一通信的接收方的标识为所述第二通信标识。After receiving the second communication identifier, the second electronic device intercepts the first communication, and the identifier of the recipient of the first communication is the second communication identifier.
  24. 一种账户屏蔽方法,其特征在于,应用于第一服务器,所述方法包括:An account shielding method, characterized in that it is applied to the first server, and the method includes:
    所述第一服务器接收第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器基于所述第一通信标识确定第二电子设备,所述第一通信标识为所述第二电子设备上用户的通信标识;The first server determines the second electronic device based on the first communication identification, where the first communication identification is the communication identification of the user on the second electronic device;
    所述第一服务器向所述第二电子设备发送第二消息,所述第二消息包括所述第二通信标识,所述第二通信标识为第一电子设备上用户的通信标识,所述第二消息用于指示所述第二电子设备拦截第一通信,所述第一通信的接收方的通信标识为所述第二通信标识。The first server sends a second message to the second electronic device, the second message includes the second communication identifier, and the second communication identifier is the communication identifier of the user on the first electronic device. The second message is used to instruct the second electronic device to intercept the first communication, and the communication identifier of the recipient of the first communication is the second communication identifier.
  25. 一种账户屏蔽方法,其特征在于,应用于第二电子设备,所述方法包括:An account shielding method, characterized in that it is applied to a second electronic device, and the method includes:
    接收第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;Receive a first message, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    拦截第一通信,所述第一通信的接收方的通信标识为所述第一通信标识。Intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
  26. 一种服务器,其特征在于,所述服务器包括:一个或多个处理器和存储器;A server, characterized in that the server includes: one or more processors and memories;
    所述存储器与所述一个或多个处理器耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述一个或多个处理器调用所述计算机指令以使得所述电子设备执行如权利要求9-15、19、20或24中任一项所述的方法。The memory is coupled to the one or more processors, the memory is used to store computer program code, the computer program code includes computer instructions, and the one or more processors invoke the computer instructions to cause the The electronic device performs the method according to any one of claims 9-15, 19, 20 or 24.
  27. 一种电子设备,其特征在于,所述电子设备包括:一个或多个处理器和存储器;An electronic device, characterized in that the electronic device includes: one or more processors and memories;
    所述存储器与所述一个或多个处理器耦合,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述一个或多个处理器调用所述计算机指令以使得所述电子设备执行如权利要求21、22或25所述的方法。The memory is coupled to the one or more processors, the memory is used to store computer program code, the computer program code includes computer instructions, and the one or more processors invoke the computer instructions to cause the The electronic device performs the method as claimed in claim 21, 22 or 25.
  28. 一种芯片系统,其特征在于,所述芯片系统应用于电子设备,所述芯片系统包括一个或多个处理器,所述处理器用于调用计算机指令以使得所述电子设备执行如权利要求9-15、19-22、24或25中任一项所述的方法。A chip system, characterized in that the chip system is applied to electronic equipment, and the chip system includes one or more processors, and the processor is used to call computer instructions to cause the electronic equipment to execute claims 9- The method described in any one of 15, 19-22, 24 or 25.
  29. 一种计算机可读存储介质,包括指令,其特征在于,当所述指令在电子设备上运行时,使得所述电子设备执行如权利要求9-15、19-22、24或25中任一项所述的方法。 A computer-readable storage medium comprising instructions, characterized in that when the instructions are run on an electronic device, the electronic device is caused to perform any one of claims 9-15, 19-22, 24 or 25. the method described.
  30. 一种通信系统,其特征在于,所述通信系统包括第一电子设备和第一服务器,其中,A communication system, characterized in that the communication system includes a first electronic device and a first server, wherein,
    所述第一服务器用于在接收到第一消息后基于所述第一消息将第一通信标识与第二通信标识关联,所述第一通信标识为第一用户的通信标识,其中,在所述第一服务器接收到所述第一消息前,所述第二通信标识不存在或者所述第二通信标识与所述第一通信标识不关联,所述第一消息为所述第一用户的电子设备发送的,通信标识为蜂窝号码或即时通信应用程序的账户;The first server is configured to associate a first communication identification with a second communication identification based on the first message after receiving the first message, and the first communication identification is the communication identification of the first user, wherein in the Before the first server receives the first message, the second communication identifier does not exist or the second communication identifier is not associated with the first communication identifier, and the first message is the first user's Sent by an electronic device, the communication identifier is a cellular number or an account with an instant messaging application;
    所述第一服务器用于在确定所述第一通信标识属于第一屏蔽名单时,将所述第二通信标识加入所述第一屏蔽名单,所述第一屏蔽名单为第二用户的屏蔽名单The first server is configured to add the second communication identification to the first blocking list when determining that the first communication identification belongs to the first blocking list, and the first blocking list is the blocking list of the second user.
    所述第一电子设备用于拦截第一通信,所述第一通信的发起方的通信标识在所述第一屏蔽名单中,所述第一电子设备为所述第二用户的电子设备;或者,所述第一服务器用于拦截第一通信,所述第一通信的发起方的通信标识在所述第一屏蔽名单中,且所述第一通信的接收方的通信标识为所述第二用户的通信标识。The first electronic device is used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or , the first server is used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the second communication The user's communication ID.
  31. 一种通信系统,其特征在于,所述通信系统包括第一电子设备和第一服务器,其中,A communication system, characterized in that the communication system includes a first electronic device and a first server, wherein,
    所述第一电子设备用于向所述第一服务器发送第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器用于确定与所述第一通信标识关联的第一蜂窝号码;The first server is configured to determine a first cellular number associated with the first communication identification;
    所述第一服务器用于向所述第一电子设备发送第一蜂窝号码;The first server is configured to send a first cellular number to the first electronic device;
    所述第一电子设备用于拦截第一通信,所述第一通信为所述第一蜂窝号码对应的蜂窝通话或蜂窝短信。The first electronic device is configured to intercept a first communication, and the first communication is a cellular call or a cellular text message corresponding to the first cellular number.
  32. 一种通信系统,其特征在于,所述通信系统包括第一电子设备、第二电子设备和第一服务器,其中,A communication system, characterized in that the communication system includes a first electronic device, a second electronic device and a first server, wherein,
    所述第一电子设备用于向所述第一服务器发送第一消息,所述第一消息包括第一通信标识,通信标识为蜂窝号码或即时通信应用程序的账号;The first electronic device is configured to send a first message to the first server, where the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
    所述第一服务器用于基于所述第一通信标识确定第二电子设备,所述第一通信标识为所述第二电子设备上用户的通信标识;The first server is configured to determine the second electronic device based on the first communication identification, where the first communication identification is the communication identification of the user on the second electronic device;
    所述第一服务器用于向所述第二电子设备发送第二通信标识,所述第二通信标识为所述第一电子设备上用户的通信标识;The first server is configured to send a second communication identification to the second electronic device, where the second communication identification is the communication identification of the user on the first electronic device;
    所述第二电子设备用于在接收到所述第二通信标识后,拦截第一通信,所述第一通信的接收方的标识为所述第二通信标识。 The second electronic device is configured to intercept the first communication after receiving the second communication identifier, and the identifier of the recipient of the first communication is the second communication identifier.
PCT/CN2023/094171 2022-05-16 2023-05-15 Account shielding method, communication system, and electronic device WO2023221917A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210529855.8 2022-05-16
CN202210529855 2022-05-16
CN202211062344.6 2022-08-31
CN202211062344.6A CN117119098A (en) 2022-05-16 2022-08-31 Account shielding method, communication system and electronic equipment

Publications (1)

Publication Number Publication Date
WO2023221917A1 true WO2023221917A1 (en) 2023-11-23

Family

ID=88807925

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/094171 WO2023221917A1 (en) 2022-05-16 2023-05-15 Account shielding method, communication system, and electronic device

Country Status (2)

Country Link
CN (1) CN117119098A (en)
WO (1) WO2023221917A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
CN102970362A (en) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 Method and device for sharing cloud data
US20140128047A1 (en) * 2012-11-02 2014-05-08 Lookout, Inc. System and method for call blocking and sms blocking
WO2016011614A1 (en) * 2014-07-23 2016-01-28 华为技术有限公司 Method and device for blocking harassment number
CN107580357A (en) * 2017-10-27 2018-01-12 努比亚技术有限公司 Limitation communication means, equipment and the computer-readable storage medium of a kind of black list user
CN107911530A (en) * 2017-11-27 2018-04-13 努比亚技术有限公司 Message prompt method, communication hold-up interception method, terminal and computer-readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
US20140128047A1 (en) * 2012-11-02 2014-05-08 Lookout, Inc. System and method for call blocking and sms blocking
CN102970362A (en) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 Method and device for sharing cloud data
WO2016011614A1 (en) * 2014-07-23 2016-01-28 华为技术有限公司 Method and device for blocking harassment number
CN107580357A (en) * 2017-10-27 2018-01-12 努比亚技术有限公司 Limitation communication means, equipment and the computer-readable storage medium of a kind of black list user
CN107911530A (en) * 2017-11-27 2018-04-13 努比亚技术有限公司 Message prompt method, communication hold-up interception method, terminal and computer-readable storage medium

Also Published As

Publication number Publication date
CN117119098A (en) 2023-11-24

Similar Documents

Publication Publication Date Title
AU2019385366B2 (en) Voice control method and electronic device
CN113542485B (en) Notification processing method, electronic equipment and computer readable storage medium
WO2021036770A1 (en) Split-screen processing method and terminal device
WO2020155014A1 (en) Smart home device sharing system and method, and electronic device
CN113806105B (en) Message processing method, device, electronic equipment and readable storage medium
WO2020150917A1 (en) Application permission management method and electronic device
WO2021253975A1 (en) Permission management method and apparatus for application, and electronic device
WO2021052204A1 (en) Address book-based device discovery method, audio and video communication method, and electronic device
WO2020259554A1 (en) Learning-based keyword search method, and electronic device
WO2021159746A1 (en) File sharing method and system, and related device
WO2023273540A1 (en) Method for preventing missed calls, system, electronic device, and storage medium
WO2020107463A1 (en) Electronic device control method and electronic device
WO2021218429A1 (en) Method for managing application window, and terminal device and computer-readable storage medium
WO2022253158A1 (en) User privacy protection method and apparatus
WO2020151408A1 (en) Contact displaying method and related device
EP3852344A1 (en) Method and device for domain name resolution by sending key value to grs server
CN115543145A (en) Folder management method and device
CN115022982B (en) Multi-screen cooperative non-inductive access method, electronic equipment and storage medium
CN114006698B (en) token refreshing method and device, electronic equipment and readable storage medium
WO2022033355A1 (en) Mail processing method and electronic device
WO2022062902A1 (en) File transfer method and electronic device
WO2020216144A1 (en) Method for adding mail contact, and electronic device
WO2023221917A1 (en) Account shielding method, communication system, and electronic device
CN115017498A (en) Method for operating applet and electronic device
CN112286596A (en) Message display method and electronic equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23806869

Country of ref document: EP

Kind code of ref document: A1