[go: up one dir, main page]

WO2016000636A1 - Système et procédé de traitement de communications - Google Patents

Système et procédé de traitement de communications Download PDF

Info

Publication number
WO2016000636A1
WO2016000636A1 PCT/CN2015/083176 CN2015083176W WO2016000636A1 WO 2016000636 A1 WO2016000636 A1 WO 2016000636A1 CN 2015083176 W CN2015083176 W CN 2015083176W WO 2016000636 A1 WO2016000636 A1 WO 2016000636A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
communication
peer
terminal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/083176
Other languages
English (en)
Chinese (zh)
Inventor
谭少卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Publication of WO2016000636A1 publication Critical patent/WO2016000636A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a communication processing method and system.
  • the communication request of the unknown communication identifier is often received, and some unknown communication identifiers are saved by the user.
  • the unknown communication identifier is a newly recognized current user. Friends, the two exchange their respective communication logos with each other. At this time, the user needs to save the unknown communication identifier, but there are many problems in the process of saving the communication identifier.
  • the user when storing an unknown communication identifier, the user needs to perform a series of click operations to open the contact addition page in the address book, and needs to frequently switch between different interfaces, which is cumbersome, time consuming, and efficient. Low; affects the user's experience, and also increases the operation and processing burden of the terminal system. Further, the user needs to input the communication identifier by himself, and the input process takes a long time, and the input result has poor reliability and low accuracy.
  • the present invention has been made in order to provide a communication processing method and a corresponding communication processing system that overcome the above problems or at least partially solve the above problems.
  • a communication processing method including:
  • the communication information includes: a communication identifier
  • a communication processing system comprising:
  • the monitoring module is configured to monitor the communication in the terminal, and obtain the communication information of the peer currently communicating with the terminal; wherein the communication information includes: a communication identifier;
  • the comparison module is configured to compare the obtained communication identifier of the peer end with the contact information in the address book application;
  • Generating a module configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information
  • the first adding module is configured to add the obtained communication identifier of the peer end to a corresponding location of the newly created contact page.
  • a computer program comprising computer readable code, when said computer readable code is run on a terminal, causing said terminal to perform according to any one of claims 1-15 The communication processing method described.
  • a computer readable medium storing the computer program according to claim 31 is provided.
  • the communication processing method and system provided by the present invention by monitoring the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information; When the communication identifier of the opposite end does not match the contact information, the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified, and the operation is simplified.
  • the communication processing efficiency saves time and reduces the operation and processing burden of the terminal system. Further, the communication standard The automatic addition to the corresponding position of the newly created contact page avoids the manual input process of the user, improves the efficiency, and ensures the accuracy of the result.
  • FIG. 1 is a flow chart of a communication processing method in a first embodiment of the present invention
  • FIG. 2 is a flow chart of a communication processing method in a second embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for determining current communication security in a second embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a newly created contact page in a second embodiment of the present invention.
  • Figure 5 is a flowchart of a communication processing method in a third embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a newly created contact page in a third embodiment of the present invention.
  • Figure 7 is a block diagram showing the structure of a communication processing system in a fourth embodiment of the present invention.
  • Figure 8 is a block diagram showing the structure of a communication processing system in a fifth embodiment of the present invention.
  • FIG. 9 is a structural block diagram of a terminal for performing a communication processing method according to an embodiment of the present invention.
  • Figure 10 is a memory unit of the present invention for holding or carrying program code implementing a communication processing method in accordance with an embodiment of the present invention.
  • the communication processing method includes:
  • Step 102 Monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
  • the communication between the terminal and the peer end includes, but is not limited to, a telephone call, a short message, and a voice call and an instant message through IM (Instant Messaging) software.
  • IM Instant Messaging
  • commonly used IM software includes: QQ, MSN Messenger, Fetion, Skype, Sina UC, Google Talk, Ali Wangwang and so on.
  • the monitoring of the communication situation in the terminal may include: monitoring the access communication and monitoring the outgoing communication.
  • the opposite end is the receiving side, and the terminal is the sending side; when the current communication is initiated by the opposite end side, the terminal is the receiving side, and the opposite end is sender.
  • the communication information includes: a communication identifier.
  • the terminal is a mobile phone terminal, and the communication is performed by making a call/answering a call and transmitting and receiving a short message
  • the communication identifier of the opposite end may be the mobile phone number of the opposite end.
  • the terminal is a PC (Personal Computer) or a mobile phone terminal
  • the communication is an instant communication session (eg, QQ voice, QQ video, WeChat, etc.)
  • the communication identifier of the peer end may be corresponding to the peer end.
  • the user's instant communication number eg, QQ number, micro signal, etc.).
  • Step 104 Compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • Step 106 When the acquired communication identifier of the peer does not match the contact information, generate a new contact page.
  • the acquired communication identifier of the peer is not in the terminal's address book, or when the obtained communication identifier of the peer is not the friend number in the user's instant communication (eg, QQ friend number) When the WeChat friend number, etc.), determine the communication identity of the obtained peer Does not match the contact information, that is, an unfamiliar communication identifier.
  • Step 108 Add the obtained communication identifier of the peer end to the corresponding location of the newly created contact page.
  • the acquired communication identifier of the peer end may be automatically added to the corresponding location of the newly created contact page.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the third party application installed on the terminal side may be used to execute the communication processing method.
  • the method for executing the communication processing method is not limited to a third-party application on the terminal side, and a function module for executing the communication processing method may also be a function module of the terminal, for example, The function module is set in the operating system of the terminal or the address book application of the terminal.
  • the method for executing the communication processing method may also be a function module in a third-party application on the terminal side, such as a function module in a security application (for example, 360 mobile phone security guard) in the terminal.
  • the communication processing method includes:
  • Step 202 The third-party application monitors communications in the terminal, and obtains communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the communication between the terminal and the peer end may be voice communication (eg, telephone communication, QQ voice communication, etc.), or may be video communication (eg, video call, QQ video call). Etc.), it can also be text communication (eg, text message, text chat using QQ, etc.).
  • voice communication eg, telephone communication, QQ voice communication, etc.
  • video communication eg, video call, QQ video call.
  • Etc. it can also be text communication (eg, text message, text chat using QQ, etc.).
  • the communication processing method described in this embodiment may be, but is not limited to, performed in the following situations:
  • the communication processing method is executed after the terminal is turned on and then hangs up the communication; or the communication processing method is executed after the communication is not turned on and then hang up.
  • the communication processing method is executed after the terminal dials and then hangs up the communication; or the communication processing method is executed after the communication is not dialed and then hangs up.
  • Step 204 The third-party application compares the acquired communication identifier of the peer end with the contact information in the address book application.
  • the process may be directly ended.
  • step 206 is performed.
  • Step 206 When the obtained communication identifier of the opposite end does not match the contact information, the third-party application determines the security of the current communication.
  • the third-party application may directly judge through the security judgment module in the third-party application, or may invoke other security applications (eg, 360 mobile security guards). Judging, this embodiment does not limit this.
  • the step 206 may specifically include:
  • Sub-step S302 when the obtained communication identifier of the opposite end does not match the contact information, the third-party application compares the communication identifier of the opposite end with the data in the preset black/white list.
  • the data stored in the white list is a communication identifier corresponding to the communication that has been determined to be secure.
  • the data stored in the blacklist is a communication identifier corresponding to communication that has been determined to be fraud, and/or communication of a fake message, and/or communication of phishing, and/or communication of a Trojan, and/or communication of a pseudo base station.
  • the communication identifier of the peer matches the data in the blacklist, it may be determined that the current communication is a high-risk risk communication (eg, fraud communication, pseudo base station communication, etc.), and at this time, the third-party application directly intercepts the current communication. , end this process.
  • a high-risk risk communication eg, fraud communication, pseudo base station communication, etc.
  • the sub-step S304 may be continued.
  • the sub-step S304 may be further performed.
  • Sub-step S304 The third-party application acquires call information and tag information of the peer end that communicates with the terminal.
  • the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair Time distribution information when the terminal performs communication, the number of times the peer end sends and receives information, the communication identifier of the peer end is added to at least one of a contact and a number of times added to the blacklist; the tag information includes The number of times the communication identifier of the peer is marked as malicious and/or spam, the number of times the communication identifier of the peer appears on a page determined to be malicious and/or spam, sent using the communication identifier of the peer At least one of the number of times the information is marked as malicious and/or spam.
  • Sub-step S306 the third-party application matches the call information and/or the tag information with a preset interception policy to determine a matching result.
  • the preset interception policy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  • the third-party application matches the call information and/or the tag information with the preset interception policy, and determining the matching result may specifically include: determining, according to the call information and/or the tag information, the current call. The number of matching subintercept strategies.
  • Sub-step S308 the third-party application determines the risk of the current communication according to the matching result. level.
  • the determining the risk level of the current communication according to the matching result may include: determining a risk level of the current communication according to the number of the sub-interception policies that match the current communication. among them,
  • the third-party application may directly intercept the current communication, and end the current process.
  • the third-party application may load the display risk prompt information to prompt the user that the current communication is at risk, and may perform step 208.
  • step 208 is performed.
  • step 208 the third party application generates a new contact page.
  • the distance between the terminal and the peer end can be determined before the new contact page is generated.
  • the specific process is as follows:
  • the third-party application separately obtains location information of the terminal and the peer.
  • the location information may be obtained by using any known location information acquisition method.
  • the third-party application determines the distance between the terminal and the opposite end according to the location information of the terminal and the peer.
  • the above step 208 is performed, and the third party application generates a new contact page.
  • the third-party application may separately obtain the network information of the terminal and the peer before generating the newly created contact page.
  • the network information includes, but is not limited to, at least one of wireless fidelity (WIFI) information, base station information, and local area network information.
  • WIFI wireless fidelity
  • the third-party application determines whether the terminal and the peer have the same network information, and when the terminal and the peer have the same network information, perform the step of generating a new contact page.
  • the third-party application separately obtains the WIFI information of the terminal and the peer from the cloud server. Then, the third-party application determines, according to the WIFI information of the terminal and the peer, whether the terminal and the peer share the same WIFI. Finally, when it is determined that the terminal and the peer share the same WIFI, the third-party application performs the step of generating a new contact page.
  • the generating, by the third-party application, the newly created contact page may include: the third-party application generates the newly created contact page according to the set format.
  • the third-party application generates the new contact page according to the set format.
  • the new contact page may be generated according to the default format corresponding to the address book application by calling the address book application.
  • the address book application may be a system address book application on the terminal side.
  • the setting format is a template of a newly created contact page corresponding to the system address book application.
  • the address book application may also be a template in the third-party application or other application, and the format of the template matches the format of the newly created contact page, so as to make the format of the generated new contact page more diverse. Enriched to meet user needs.
  • the setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • FIG. 4 it is a schematic diagram of a newly created contact page in the second embodiment of the present invention.
  • the format of the new contact page includes four options: communication identifier, name, gender, and email.
  • Step 210 The third-party application adds the acquired communication identifier of the peer to the new contact. The corresponding location of the page.
  • the third party application adds the acquired communication identifier of the peer to the corresponding location of the communication identification option shown in FIG. 4.
  • Step 212 The third-party application acquires personal information of the user corresponding to the peer end from the cloud.
  • the third-party application can obtain the current connection with the terminal, in addition to monitoring the communication in the terminal.
  • the communication identifier of the peer end of the communication can also obtain more information of the peer end, that is, the personal information of the user from the cloud.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • Step 214 The third party application adds the acquired personal information to a corresponding option location in the set format.
  • step 216 the third party application responds to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
  • Step 218 The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
  • the third party application adds the information corresponding to the name information addition request to the position corresponding to the name option shown in FIG. 4, and adds the information corresponding to the gender information addition request to the position corresponding to the gender option shown in FIG. ,Wait.
  • Step 220 The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • the mobile phone call is taken as an example, that is, the terminal and the opposite end are mobile phone terminals, and the communication performed is a mobile phone call, and the current communication is a call request initiated by the opposite end to the terminal.
  • the communication processing method is executed. Specifically, the flow of the communication processing method is as follows:
  • the communication processing method includes:
  • Step 502 The third-party application monitors the communication in the terminal, and obtains the phone number of the peer currently communicating with the terminal.
  • the third-party application is an application installed in a terminal (eg, a mobile phone terminal).
  • step 504 the third party application compares the obtained phone number with the contact information.
  • the user corresponding to the peer that initiates the call request to the terminal is the contact of the user corresponding to the terminal, which is a known number. End this process directly.
  • step 506 is performed.
  • step 506 the third party application determines the security of the current communication.
  • the current communication can be divided into high-risk level, risk level, suspicious level and security level. It should be noted here that the level of current communication may include, but is not limited to, the above four levels.
  • the current communication is directly intercepted, and the process ends.
  • step 508 is performed.
  • step 510 is performed.
  • step 508 the third party application generates a risk prompt page.
  • the third party application loads the display risk prompt information on the risk prompt page to prompt the user that the current communication is a risk communication or a suspicious communication.
  • the risk prompt page further includes: a first trigger operation option and a second trigger operation option. If the user triggers the first trigger operation option after browsing the risk prompt information, canceling the generate new contact page ends the current process; if the user triggers the second trigger operation option after browsing the risk prompt information, Then step 510 is performed.
  • Step 510 When the user triggers the second trigger operation option, the third party application generates a new contact page.
  • the third party application generates the new contact page according to the set format.
  • the setting format includes, but is not limited to, at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • the newly created contact page may be a newly created contact page in the system address book of the mobile terminal, or may be a newly created contact page different from the system address book set by the third party application, but the same as the system address book, the third party
  • the newly created contact page of the application settings can also save the contact information to the system for use, or the contact information can be transmitted to the system address book and saved and used through the system address book. Referring to FIG.
  • the format of the new contact page includes four options: communication identifier, name, gender, and email.
  • the format of the page may be the same as or different from the newly created contact page of the system address book.
  • Step 512 The third-party application acquires personal information of the user corresponding to the peer end from the cloud, and Adding the personal information and the acquired phone number of the opposite end to the corresponding location of the newly created contact page.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • the third party application adds the acquired name information "Zhang San” to the corresponding name option, and adds the phone number "123456" acquired in step 502 to the corresponding phone number option.
  • step 514 the third party application responds to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one.
  • Step 516 The third-party application adds information corresponding to the add request to a corresponding option location in the set format.
  • the user can directly input “male” at the position corresponding to the gender option, and input “123@456.com” at the position corresponding to the email option.
  • Step 518 The third-party application responds to the save operation request, and saves the newly added new contact page update to the address book application.
  • the processing may be performed by referring to the flow of the communication processing method in this embodiment.
  • the communication processing method in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, and the various items in the newly created contact page are improved.
  • the content of the newly created contact page is improved, and the operation of verifying the search by the user is reduced.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • FIG. 7 a block diagram of a communication processing system in a fourth embodiment of the present invention is shown.
  • the communication processing system includes:
  • the monitoring module 702 is configured to monitor communications in the terminal, and obtain communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the comparison module 704 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • the generating module 706 is configured to generate a new contact page when the acquired communication identifier of the peer does not match the contact information.
  • the first adding module 708 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
  • the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified. , improve communication processing efficiency, It saves time and reduces the operational and processing burden of the terminal system.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the communication processing system includes:
  • the monitoring module 802 is configured to monitor communications in the terminal to obtain communication information of the peer currently communicating with the terminal.
  • the communication information includes: a communication identifier.
  • the comparison module 804 is configured to compare the acquired communication identifier of the peer end with the contact information in the address book application.
  • the determining module 806 is configured to determine the security of the current communication when the acquired communication identifier of the peer does not match the contact information.
  • the determining module 806 includes:
  • the data comparison module 8062 is configured to compare the communication identifier of the peer end with the data in the preset black/white list.
  • the first determining module 8064 is configured to determine that the current communication is a secure communication when the communication identifier of the peer matches the data in the whitelist.
  • the information acquisition module 8068 may continue to be executed.
  • the second determining module 8066 is configured to determine that the current communication is a high-risk communication when the communication identifier of the peer end matches the data in the blacklist.
  • the current communication may be directly intercepted by the intercepting module, and the current process is received.
  • the information obtaining module 8068 is configured to acquire call information and tag information of the peer end that communicates with the terminal.
  • the call information includes: the number of outgoing calls and incoming calls of the opposite end, the length of communication of the opposite end call and the incoming call, and the duration of the ringing of the opposite end and the incoming call, the pair End Time distribution information during communication, the number of times the peer sends and receives information, the communication identifier of the peer is added to at least one of a contact and a number of times added to the blacklist;
  • the tag information includes: The number of times the communication identifier of the peer end is marked as malicious and/or spam communication, the number of times the communication identifier of the peer end appears on the page determined to be malicious and/or spam, and the information sent using the communication identifier of the peer is At least one of the number of times marked as malicious and/or spam.
  • the matching module 80610 is configured to match the call information and/or the tag information with a preset interception policy to determine a matching result.
  • the preset interception strategy includes multiple sub-intercept strategies; wherein each sub-intercept strategy matches the corresponding call information and tag information, respectively.
  • the matching module 80610 is specifically configured to determine, according to the call information and/or the tag information, the number of sub-interception strategies that match the current incoming call.
  • the risk level determination module 80612 is configured to determine a risk level of the current communication based on the matching result.
  • the risk level determining module 80612 is specifically configured to determine a risk level of the current communication according to the number of sub-intercepting strategies that match the current communication. among them,
  • the security determining module 80614 is configured to determine that the current communication is a secure communication when it is determined that the risk level of the current communication is a security level according to the matching result.
  • the location information acquisition module 808 can be executed.
  • the location information obtaining module 808 is configured to separately obtain location information of the terminal and the peer end.
  • the distance determining module 810 is configured to determine a distance between the terminal and the opposite end according to location information of the terminal and the opposite end.
  • the generating module 816 is executed when the distance determining module 810 determines that the distance is less than or equal to the set distance.
  • the network information acquisition module 812 can be executed when it is determined that the current communication is a secure communication.
  • the network information obtaining module 812 is configured to acquire network information of the terminal and the peer end before the generating module generates a new contact page.
  • the network information includes at least one of the following: wireless fidelity WIFI information, base station information, and local area network information.
  • the network information determining module 814 is configured to determine whether the terminal and the peer end have the same network information; and when the terminal and the peer end are determined to have the same network information, the generating module 816 is executed.
  • a generation module 816 is configured to generate a new contact page.
  • the generating module 816 is configured to generate the newly created contact page according to a set format when the acquired peer communication identifier does not match the contact information.
  • the setting format includes at least one of a communication identifier, a name, a gender, a company information, an email, a birthday, an address, a hobby, and an avatar option.
  • the generating module 816 is configured to: when the obtained peer communication identifier does not match the contact information, invoke the address book application, and generate according to a default format corresponding to the address book application. Create a new contact page.
  • the personal information obtaining module 818 is configured to acquire personal information of the user corresponding to the peer end from the cloud.
  • the personal information includes at least one of name information, gender information, company information, email address, birthday information, address information, hobby information, and avatar information.
  • the third adding module 820 is configured to add the acquired personal information to a corresponding option location in the set format.
  • the first adding module 822 is configured to add the acquired communication identifier of the peer end to a corresponding location of the newly created contact page.
  • the first response module 824 is configured to respond to the user's add request.
  • the adding request includes: a name information adding request, a gender information adding request, a company information adding request, an email address adding request, a birthday information adding request, an address information adding request, a hobby information adding request, and an avatar information adding request. At least one
  • the second adding module 826 is configured to add information corresponding to the adding request to a corresponding option location in the setting format.
  • the second response module 828 is configured to save the newly added new contact page update to the address book application in response to the save operation request.
  • the communication processing system may be executed after the current communication is not connected to hang up, or after the hang up.
  • the current communication includes at least one of voice communication, video communication, and text communication.
  • the communication processing system in this embodiment monitors the communication in the terminal, acquires the communication identifier of the peer currently communicating with the terminal, and determines whether the communication identifier matches the contact information.
  • the newly created contact page is directly generated; the user is prevented from manually opening the address book through a complicated and lengthy triggering operation, and the contact adding page is established; the operation steps are simplified.
  • the communication processing efficiency is improved, the time is saved, and the operation and processing burden of the terminal system are also reduced.
  • the communication identifier is automatically added to the corresponding location of the newly created contact page, thereby avoiding the manual input process of the user, improving the efficiency, and ensuring the accuracy of the result.
  • the interactive terminal and the personal information of the user corresponding to the peer end are saved in the cloud, the detailed personal information of the user can be directly obtained from the cloud, the various contents in the newly created contact page are improved, and the newly created contact page is improved. Content integrity reduces the user's ability to verify the search.
  • the security of the current communication is also judged, the security and reliability of the stored communication identifier are ensured, the possibility of being deceived by the user is reduced, the user's rights are protected, and the user's rights are improved. safety.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the communication processing device in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • FIG. 9 shows a structural block diagram of a terminal for executing a communication processing method according to an embodiment of the present invention.
  • the terminal conventionally includes a processor 910 and a computer program product or computer readable medium in the form of a memory 920.
  • the memory 920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above.
  • storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the terminal of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 931', code that can be read by a processor, such as 910, which, when executed by a server, causes the server to perform various steps in the methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un système et un procédé de traitement de communications. Le procédé consiste: à surveiller les communications dans un terminal et à obtenir des informations de communication de l'extrémité opposée avec laquelle le terminal est actuellement en communication; les informations de communication comprennent : un identificateur de communications; à comparer l'identificateur de communications obtenu de l'extrémité opposée avec des informations d'une personne de contact dans une application de carnet d'adresses; si l'identificateur de communications obtenu de l'extrémité opposée ne correspond pas aux informations de la personne de contact, à générer une nouvelle page de personne de contact; à ajouter l'identificateur de communications obtenu de l'extrémité opposée à la position correspondante sur la nouvelle page de la personne de contact. La présente invention résout le problème de fonctionnement fastidieux et inefficace lorsqu'un utilisateur stocke un identificateur de communications inconnu.
PCT/CN2015/083176 2014-07-04 2015-07-02 Système et procédé de traitement de communications Ceased WO2016000636A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410319218.3A CN104135563B (zh) 2014-07-04 2014-07-04 一种通信处理方法和系统
CN201410319218.3 2014-07-04

Publications (1)

Publication Number Publication Date
WO2016000636A1 true WO2016000636A1 (fr) 2016-01-07

Family

ID=51808083

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/083176 Ceased WO2016000636A1 (fr) 2014-07-04 2015-07-02 Système et procédé de traitement de communications

Country Status (2)

Country Link
CN (1) CN104135563B (fr)
WO (1) WO2016000636A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878522A (zh) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 联系人添加方法、联系人添加装置和终端
CN113098898A (zh) * 2021-04-29 2021-07-09 王小平 一种业务数据监测预警平台及预警方法

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135563B (zh) * 2014-07-04 2017-03-15 北京奇虎科技有限公司 一种通信处理方法和系统
CN105657138B (zh) * 2014-11-14 2021-09-03 中兴通讯股份有限公司 呼叫处理方法及通信终端
CN104410693B (zh) * 2014-11-28 2019-06-21 北京搜狗科技发展有限公司 一种数据传输方法、信息获取方法、服务器及电子设备
CN104618874B (zh) * 2015-01-29 2019-01-29 北京搜狗科技发展有限公司 一种数据获取方法及电子设备
CN104836893B (zh) * 2015-03-30 2016-09-28 北京奇虎科技有限公司 一种添加联系人的方法、装置、系统和移动终端
CN105553679A (zh) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 一种信息推送方法、系统及服务器
CN105120045A (zh) * 2015-09-10 2015-12-02 陈包容 根据新增联系人姓名的备注信息创建通讯录的方法及装置
CN105245674A (zh) * 2015-09-10 2016-01-13 陈包容 根据新增电邮账号的备注信息创建通讯录的方法及装置
CN105120046A (zh) * 2015-09-10 2015-12-02 陈包容 一种根据新增号码的备注信息创建通讯录的方法及装置
CN106874254A (zh) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 一种名片生成方法和设备
CN105472090A (zh) * 2016-01-13 2016-04-06 陈包容 通讯录联系人合并的方法及装置
CN106657528B (zh) * 2016-12-29 2020-01-24 浙江吉利控股集团有限公司 一种来电管理方法及装置
CN107370863B (zh) * 2017-08-11 2020-07-10 北京安云世纪科技有限公司 一种基于蓝牙连接的连接信息更新方法及装置
CN110753158B (zh) * 2019-10-12 2020-10-23 上海赛连信息科技有限公司 一种智能呼叫记录方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (zh) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 一种自动添加联系人信息的方法、装置及移动终端
CN101976265A (zh) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 自动判断电话号码并添加联系人的方法
CN102892087A (zh) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 添加联系人信息的方法及移动终端
CN104135563A (zh) * 2014-07-04 2014-11-05 北京奇虎科技有限公司 一种通信处理方法和系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951425A (zh) * 2010-09-30 2011-01-19 宇龙计算机通信科技(深圳)有限公司 一种联系人信息处理方法、系统及移动终端
CN103167089A (zh) * 2011-12-15 2013-06-19 中国移动通信集团江苏有限公司 一种移动终端及其通讯录的维护方法
CN102594918B (zh) * 2012-03-19 2018-07-24 中兴通讯股份有限公司 一种终端通讯录实现的方法、终端及系统
CN103051765A (zh) * 2012-11-19 2013-04-17 广东欧珀移动通信有限公司 一种文本信息中个人信息的显示方法及装置
CN103078949B (zh) * 2013-01-17 2015-09-23 北京奇虎科技有限公司 显示电话号码信息的方法及系统
CN103167500B (zh) * 2013-02-01 2016-08-03 杭州东信北邮信息技术有限公司 一种实现移动电话来电统一处理的方法和系统
CN103249034A (zh) * 2013-05-21 2013-08-14 北京小米科技有限责任公司 一种获取联系人信息的方法和装置
CN103595547B (zh) * 2013-11-15 2016-07-13 北京奇虎科技有限公司 智能设备的广播拦截方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064012A1 (en) * 2008-09-08 2010-03-11 International Business Machines Corporation Method, system and apparatus to automatically add senders of email to a contact list
CN101945175A (zh) * 2010-09-26 2011-01-12 宇龙计算机通信科技(深圳)有限公司 一种自动添加联系人信息的方法、装置及移动终端
CN101976265A (zh) * 2010-11-17 2011-02-16 上海合合信息科技发展有限公司 自动判断电话号码并添加联系人的方法
CN102892087A (zh) * 2012-09-24 2013-01-23 东莞宇龙通信科技有限公司 添加联系人信息的方法及移动终端
CN104135563A (zh) * 2014-07-04 2014-11-05 北京奇虎科技有限公司 一种通信处理方法和系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878522A (zh) * 2015-12-10 2017-06-20 北京奇虎科技有限公司 联系人添加方法、联系人添加装置和终端
CN113098898A (zh) * 2021-04-29 2021-07-09 王小平 一种业务数据监测预警平台及预警方法

Also Published As

Publication number Publication date
CN104135563B (zh) 2017-03-15
CN104135563A (zh) 2014-11-05

Similar Documents

Publication Publication Date Title
WO2016000636A1 (fr) Système et procédé de traitement de communications
US12341925B2 (en) Computing device and system for rendering contact information that is retrieved from a network service
US11283919B2 (en) Caller ID verification using call identification and block lists
EP2852106B1 (fr) Procédé de communication en temps réel, dispositif terminal, serveur et système de communication en temps réel
US9402170B1 (en) Method and system for providing informative incoming call alerts
US8543144B2 (en) Automated caller identifier from contact lists of a user's contacts
CN104113626B (zh) 一种通信处理方法和系统
US8953471B2 (en) Counteracting spam in voice over internet protocol telephony systems
US10601762B2 (en) Techniques for coordinating a messaging experience across platforms
WO2012065381A1 (fr) Procédé et appareil pour empêcher la transmission de données par des logiciels malveillants
US11165899B1 (en) Techniques to manage contact records
CN105828454A (zh) 一种连接网络的方法、装置和一种wifi路由设备
CN109218506A (zh) 一种保护隐私信息的方法、装置及移动终端
CN107534660B (zh) 管理通信事件
CN103947173A (zh) 用于管理两个用户之间的通信的方法和系统
CN103634766A (zh) 一种来电转接方法、装置、系统及相关设备
CN106385516B (zh) 一种设置业务转移的方法、装置及终端
WO2016019488A1 (fr) Procédé, dispositif, serveur et équipement utilisateur d'interception de communication
CN105611032B (zh) 用于终端的通信信息的处理方法、处理装置和终端
US11070677B1 (en) Techniques for media call multiway relay escalation
US20240422174A1 (en) Using machine learning to identify phishing, vishing, and deep fake attacks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15814687

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15814687

Country of ref document: EP

Kind code of ref document: A1