CN104113626A - Communication processing method and system - Google Patents

Communication processing method and system Download PDF

Info

Publication number
CN104113626A
CN104113626A CN201410300178.8A CN201410300178A CN104113626A CN 104113626 A CN104113626 A CN 104113626A CN 201410300178 A CN201410300178 A CN 201410300178A CN 104113626 A CN104113626 A CN 104113626A
Authority
CN
China
Prior art keywords
opposite end
call
communication
matching
current communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410300178.8A
Other languages
Chinese (zh)
Other versions
CN104113626B (en
Inventor
谭少卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410300178.8A priority Critical patent/CN104113626B/en
Publication of CN104113626A publication Critical patent/CN104113626A/en
Application granted granted Critical
Publication of CN104113626B publication Critical patent/CN104113626B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a communication processing method and system. The method includes: monitoring a communication situation in a terminal, and obtaining a communication identifier of an opposite terminal which communicates with the terminal currently; according to the communication identifier of the opposite terminal, obtaining calling information and mark information of the opposite terminal; matching the calling information and/or mark information of the opposite terminal with a preset interception strategy to determine a matching result; determining the risk level of current communication according to the matching result; and processing the current communication according to the risk level. Through the communication processing method in the invention, the problems that processing of strange phone numbers by security software is entirely dependent on mark results of a user, and processing of strange phone numbers is inaccurate due to inaccurate mark results are solved.

Description

A kind of communication processing method and system
Technical field
The present invention relates to communication technical field, be specifically related to a kind of communication processing method and system.
Background technology
User in daily life, often can receive the call request of some strange conversation numbers.Because conversation number is strange, therefore, the call request that user's None-identified goes out this strange conversation number is normal call request or harassing and wrecking call request.User is only connecting after this call request, and whether the concrete dialog context transmitting according to the other side just can be judged this call request is harassing and wrecking call request, and deterministic process is passive, causes user to the answering of inessential call request, the waste duration of call.
At present, some security classes softwares provide the function of strange conversation number mark, taking the security classes software on mobile phone as example, concrete mark flow process is as follows: security classes software ejects a mark window after user connects the call incoming call of then hanging up strangeness numbers, so that user by described mark window to this strange conversation number carry out mark (as, this strange conversation number is labeled as to harassing call or advertisement sale call or letting agency's phone or dining room phone or hotel phone etc.).Then, described security classes software is processed strange conversation number according to user's mark.
But there are the following problems to the processing of strange conversation number to adopt the strange conversation number mark function that above-mentioned security classes software provides:
Described security classes software is to place one's entire reliance upon user's mark result of the processing of strange conversation number, but, in artificial labeling process, often there is more mistake mark and the inaccurate situation of mark, and then cause security classes software to the inaccurate situation of the processing of strange conversation number.As, when user is in the time that the time of being inconvenient to answer call receives the call request of strange conversation number, now user can think that this call request harassed own, therefore, user is after connecting the call incoming call of then hanging up strange conversation number, tending to directly this strange conversation number is labeled as harassing and wrecking call, is specifically non-harassing call or harassing call and can not remove to screen this strange conversation number, makes mark result inaccurate.
And described security classes software always ejects mark window after then user's connection hangs up strange conversation number incoming call, not only bothers user, affects user's experience, and has increased operation and the processing load of terminal system.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of overcome the problems referred to above or a kind of communication processing method addressing the above problem at least in part and corresponding a kind of communication processing system are provided.
According to one aspect of the present invention, a kind of communication processing method is provided, comprising:
Signal intelligence in terminal is monitored, obtain the communication identifier of the opposite end that current and described terminal communicates;
According to the communication identifier of described opposite end, obtain call information and the label information of described opposite end;
The call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy;
Determine the risk class of current communication according to described matching result;
According to described risk class, described current communication is processed.
According to a further aspect in the invention, provide a kind of communication processing system, having comprised:
Communication identifier acquisition module, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates;
Acquisition of information module, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end;
Matching module, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy;
Risk determination module, for determining the risk class of current communication according to described matching result;
Processing module, for processing described current communication according to described risk class.
A kind of communication processing method provided by the invention and system, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described terminal and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description of the drawings
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skill in the art.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 is the flow chart of a kind of communication processing method in first embodiment of the invention;
Fig. 2 is the flow chart of a kind of communication processing method in second embodiment of the invention;
Fig. 3 is the flow chart of a kind of communication processing method in third embodiment of the invention;
Fig. 4 is the structured flowchart of a kind of communication processing system in fourth embodiment of the invention;
Fig. 5 is the structured flowchart of a kind of communication processing system in fifth embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, but should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can be by the those skilled in the art that conveys to complete the scope of the present disclosure.
Embodiment mono-
With reference to Fig. 1, show the flow chart of a kind of communication processing method in first embodiment of the invention.In the present embodiment, described communication processing method comprises:
Step 102, monitors the signal intelligence in terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
In the present embodiment, communication includes but are not limited to: telephone relation, the note of being undertaken by terminal, and the voice call, the instant message that are undertaken by IM (Instant Messaging, instant messaging) software.Wherein, conventional IM software comprises: QQ, MSN Messenger, Fetion, Skype, the UC of Sina, Google Talk, Ali Wang Wang etc.
Wherein, the signal intelligence in terminal is monitored and can be comprised: the communication of monitoring access and communicating by letter that monitoring is breathed out.Be while being initiated by end side in current communication, described opposite end is recipient, and described terminal is transmit leg; Be when to distolateral initiation in current communication, described terminal is to receive to send out, and described opposite end is transmit leg.
Preferably, in the time that terminal is mobile phone terminal, and the communication of carrying out is when making a phone call/receive calls and receiving and dispatching note, and the communication identifier of described opposite end can be the phone number of described opposite end.When terminal is PC end (Personal Computer, personal computer) or mobile phone terminal, and the communication of carrying out be instant communication session (as, QQ voice, QQ video, micro-letter etc.) time, the communication identifier of described opposite end can be user corresponding to opposite end instant communication number (as, No. QQ, micro-signal etc.).
Step 104, according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Step 106, mates definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Step 108, determines the risk class of current communication according to described matching result.
Step 110, processes described current communication according to described risk class.
In sum, communication processing method described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information corresponding to described opposite end and/or label information to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
With reference to Fig. 2, show the flow chart of a kind of communication processing method in second embodiment of the invention.
In the present embodiment, can pass through mobile terminal (as, mobile phone) and carry out described communication processing method.Particularly,
Can be a functional module of terminal for what carry out described communication processing method.For example, this functional module is arranged in the operating system of terminal or the talk application of terminal, in the time having incoming call access in terminal, carries out described communication processing method by this functional module.
Or, can be a functional module in third party application or third party's application of terminal for what carry out described communication processing method.As: can be a functional module in Secure Application in terminal (as, 360 mobile phone security guards).Functional module in described third party application or third party's application is during in running status, in the time having incoming call access in terminal, can by this third party apply or third party's application in this functional module carry out described communication processing method.
In the present embodiment, described communication processing method comprises:
Step 202, third party application is monitored the signal intelligence in terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Step 204, third party applies according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Preferably, described call information includes but are not limited to: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist.
As, current communication be use mobile phone carry out call time, the call information of described opposite end can comprise: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added into the full detail such as number of times of blacklist.And current communication be use mobile phone carry out QQ voice call time, the call information of described opposite end can be the number of times of exhalation and the incoming call of described opposite end, the duration of call when exhalation of described opposite end and incoming call, the partial informations such as the time distributed intelligence while calls in the jingle bell duration when exhalation of described opposite end and incoming call and described opposite end.The information content that described call information specifically comprises can be definite according to practical communication situation, and the present embodiment is not restricted this.
Described label information includes but are not limited to: described current call is marked as the number of times of malice and/or junk incoming call, described current call is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the conversation number of described current call to send is marked as at least one maliciously and/or in the number of times of refuse messages.Similar to aforementioned call information, the information content that described label information specifically comprises can be definite according to practical communication situation, and the present embodiment is not restricted this.
Here it should be noted that, in the present embodiment, in the time that described call is the voice call of being undertaken by IM software, the note in described call information and described label information can be understood as, and adopts word to carry out mutual text message by IM software.
Step 206, third party's application is gone privacy processing to described call information and label information.
Step 208, third party's application is mated definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Preferably, described step 208 specifically can comprise:
If when the ratio of the exhalation number of times of the described terminal of S2002 and incoming call number of times is greater than the first set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the ratio of the number of times of the described opposite end transmission of S2004 note and the number of times of reception note is greater than the second set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the ratio of the telephone operation number of times of the described opposite end of S2006 and note number of operations is greater than the 3rd set point, third party applies and determines described current communication and preset interception strategy matching.Wherein, described telephone operation number of times comprises the number of times of exhalation and/or the incoming call of described opposite end; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note; And/or,
If the communication identifier of the described opposite end of S2008 is added into contact person's number of times while being less than the 4th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the communication identifier of the described opposite end of S2010 is added into the number of times of blacklist while being greater than the 5th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the duration of call while exhalation in the described opposite end of S2012 is less than the number of times of the first setting duration while being greater than the 6th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the duration of call when incoming call of the described opposite end of S2014 is less than the number of times of the second setting duration while being greater than the 7th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the jingle bell duration while exhalation in the described opposite end of S2016 is less than the 3rd number of times of setting duration while being greater than the 8th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the jingle bell duration when incoming call of the described opposite end of S2018 is less than the 4th when setting the number of times of duration and being greater than the 9th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If time when S2020 converses described opposite end distributes while meeting setting-up time distribution, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the communication identifier of the described opposite end of S2022 is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the communication identifier of the described opposite end of S2024 is in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the note that S2026 uses the communication identifier of described opposite end to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, third party applies and determines described current communication and preset interception strategy matching.
Here it should be noted that, in the present embodiment, can, according to practical communication situation, select corresponding one or more steps to carry out matching judgment from above-mentioned steps S2002-S2026.
In the present embodiment, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.For example, with above-mentioned steps S2002-S2026 accordingly, in the present embodiment, described preset interception strategy can comprise 13 son interception strategies, described 13 son interception strategies are corresponding one by one with above-mentioned steps S2002-S2026.
Preferably, described step 208 specifically can comprise: determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.As, can determine in described 13 son interception strategies and tackle tactful quantity with the described current son matching of communicating by letter according to above-mentioned steps S2002-S2026.
Step 210, the risk class of current communication is determined in third party's application according to described matching result.
In the present embodiment, described step 210 specifically can comprise:
When the son matching is tackled tactful quantity while being more than or equal to first threshold, third party applies and determines that described current communication is high-risk rank.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal at 10 o'clock, third party applies and determines that described current communication is high-risk rank.
When the son matching is tackled tactful quantity when being more than or equal to Second Threshold and being less than first threshold, third party applies and determines that described current communication is risk class.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal to 6 and be less than at 10 o'clock, third party applies and determines that described current communication is risk class.
When the son matching is tackled tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold, third party applies and determines that described current communication is level of suspicion.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal to 3 and be less than at 6 o'clock, third party applies and determines that described current communication is level of suspicion.
When the son matching is tackled tactful quantity while being less than the 3rd threshold value, third party applies and determines that described current communication is level of security.As, tackling tactful quantity with the described current son that matches of communicating by letter and be less than at 3 o'clock, third party applies and determines that described current communication is level of security.
Step 212, third party's application is processed described current communication according to described risk class.
From front described, in the present embodiment, the risk class of described current communication can be divided into: high-risk rank, risk class, level of suspicion and level of security.Here it should be noted that, the risk class of current communication can arrange multiple ranks according to actual conditions, includes but are not limited to: high-risk rank, risk class, level of suspicion and level of security.
Preferably,
In the time that described current communication is high-risk rank, third party's application is carried out indicating risk the directly described current communication of interception to described current communication.
In the time that described current communication is risk class or level of suspicion, described current communication is carried out to indicating risk.
In the time that described current communication is level of security, keep the talking state of described current communication.
In the present embodiment, concrete processing mode when third party's application is processed described current communication according to described risk class can be:
By voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
In the present embodiment, after described step 210 is complete, can also perform step 214.
Step 214, third party's application is carried out risk mark according to described risk class to described current communication, and preserves communication identifier and the risk mark of described current communication.
In the present embodiment, because third party's application is carried out risk mark according to described risk class to described current communication, therefore described risk mark can be used to refer to and judge risk class corresponding to described current communication.
Preferably, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, third party's application can be processed described outgoing call according to described risk mark, as carries out indicating risk.In the time that the communication identifier of incoming call call and the communication identifier of preservation match, third party's application can be conversed and process described incoming call according to described risk mark, as indicating risk or interception etc.
In sum, communication processing method described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation,, thus the processing of terminal system to the operation that needs user and participate in both alleviated, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described opposite end respectively, comprehensively judge the risk class of current communication according to the tactful match condition of multiple son interceptions, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current communication process.
Embodiment tri-
In conjunction with above-described embodiment, below by an instantiation, a kind of flow process of communication processing method is described.
In the present embodiment, described call refers to by mobile phone converses, and carries out the third party application that can be mounted in mobile phone side (as, address list bodyguard) of described communication processing method.With reference to Fig. 3, show the flow chart of a kind of communication processing method in third embodiment of the invention.In the present embodiment, described communication processing method comprises:
Step 302, address list bodyguard monitors the incoming call situation in mobile phone, obtains the telephone number of current call.
Step 304, address list bodyguard, according to the telephone number of described current call, obtains call information and the label information of described current call.
Preferably, described call information comprises: the number of times of described current call exhalation and incoming call, duration of call when described current call exhalation and incoming call, jingle bell duration when described current call exhalation and incoming call, time distributed intelligence when described current call is conversed, the number of times of described current call sending and receiving note, the telephone number of described current call is added into contact person and is added at least one in the number of times of blacklist.
Described label information comprise but: described current call is marked as malice and/or the number of times of junk incoming call, described current call is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the telephone number of described current call to send is marked as at least one maliciously and/or in the number of times of refuse messages.
Step 306, address list bodyguard goes privacy processing to described call information and label information.
In the present embodiment, described in, go privacy processing to refer to: the information that relates to privacy of user in deleted/hidden call information and label information.For example: by call information and label information, indicate the user of current call name, sex and head image information information deletion/hide.
Step 308, address list bodyguard is mated definite matching result by the call information of described current call and/or label information with preset interception strategy.
In the present embodiment, described preset interception strategy comprises multiple son interception strategies.Wherein, every height interception strategy can be specifically:
Son interception strategy 1: if when the ratio of the exhalation number of times of described current call and incoming call number of times is greater than the first set point, address list bodyguard determines described current call and preset interception strategy matching.
Sub-interception strategy 2: if when the ratio of the number of times of described current call transmission note and the number of times of reception note is greater than the second set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 3: if when the ratio of the telephone operation number of times of described current call and note number of operations is greater than the 3rd set point, address list bodyguard determines described current call and preset interception strategy matching.Wherein, described telephone operation number of times comprises that described current call is breathed out and/or the number of times of incoming call; Described note number of operations comprises that described current call sends and/or receive the number of times of note.
Son interception strategy 4: if the telephone number of described current call is added into contact person's number of times while being less than the 4th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 5: if the telephone number of described current call is added into the number of times of blacklist while being greater than the 5th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 6: if duration of call when described current call is breathed out is less than the number of times of the first setting duration while being greater than the 6th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 7: if duration of call when described current call incoming call is less than the number of times of the second setting duration while being greater than the 7th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 8: if jingle bell duration when described current call is breathed out is less than the 3rd number of times of setting duration while being greater than the 8th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 9: if jingle bell duration when described current call incoming call is less than the 4th number of times of setting duration while being greater than the 9th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 10: if time when described current call is conversed distributes while meeting setting-up time distribution, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 11: if when described current call is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 12: if described current call is in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 13: if when the note that uses the telephone number of described current call to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, address list bodyguard determines described current call and preset interception strategy matching.
As, in the present embodiment, address list bodyguard gets respectively incoming call number A, B, C, D; And telephone number A, B, call information and label information that C, D are corresponding are obtained respectively.Address list bodyguard has determined according to telephone number A, B, call information and label information that C, D are corresponding:
Telephone number A meets the tactful 1-11 of son interception simultaneously; Telephone number B meets the tactful 1-8 of son interception simultaneously; Telephone number C meets the tactful 1-4 of son interception simultaneously; Telephone number D only meets son interception strategy 1.
Step 310, address list bodyguard determines the risk class of current call according to described matching result.
In the present embodiment, address list bodyguard according to telephone number A, B, C, D separately corresponding satisfied son tackle tactful quantity, determine:
The risk class of telephone number A is high-risk rank;
The risk class of telephone number B is risk class;
The risk class of telephone number C is level of suspicion;
The risk class of telephone number D is level of security.
Step 312, address list bodyguard processes described current call according to described risk class.
In the present embodiment, address list bodyguard carries out indicating risk directly interception to the incoming call of telephone number A.Described indicating risk can carry out with voice broadcast form, can be also to carry out to load the also form of the Word message of highlighted demonstration indicating risk at the dial page.
Address list bodyguard carries out indicating risk to the incoming call of telephone number B and C.User can correspondingly operate according to indicating risk, as, connect this call, or hang up this call.
Address list bodyguard keeps the talking state of the incoming call of telephone number D.
In sum, communication processing method described in the present embodiment, by obtaining call information and the label information of described current call, then the call information of described current call and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current call according to described matching result, according to described risk class, described current call is processed.The present invention depends on call information and/or the label information of current call to the judgement of current call, but not depend on the artificial mark result to strange conversation number of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current call is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described current call respectively, comprehensively judge the risk class of current call according to the tactful match condition of multiple son interception, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current call processing.
It should be noted that, for aforesaid embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the present invention is not subject to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and related action might not be essential to the invention.
Embodiment tetra-
Based on the same inventive concept of said method embodiment.With reference to Fig. 4, show the structured flowchart of a kind of communication processing system in fourth embodiment of the invention.In the present embodiment, described communication processing system comprises:
Communication identifier acquisition module 402, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Acquisition of information module 404, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Matching module 406, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Risk determination module 408, for determining the risk class of current communication according to described matching result.
Processing module 410, for processing described current communication according to described risk class.
In sum, communication processing system described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described terminal and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation,, thus the processing of terminal system to the operation that needs user and participate in both alleviated, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
With reference to Fig. 5, show the structured flowchart of a kind of communication processing system in fifth embodiment of the invention.In the present embodiment, described communication processing system comprises:
Communication identifier acquisition module 502, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Acquisition of information module 504, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Wherein,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist.
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
Privacy processing module 506, for after described acquisition of information module 504 is obtained the call information and label information of described opposite end, goes privacy processing to described call information and label information.
In the present embodiment, described in, go privacy processing to refer to: the information that relates to privacy of user in deleted/hidden call information and label information.For example: by call information and label information, indicate the user of current call name, sex and head image information information deletion/hide.
Matching module 508, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
In the present embodiment, described matching module 508 specifically can comprise:
The first matching module, in the time that the exhalation number of times of described opposite end and the ratio of incoming call number of times are greater than the first set point, determines described current communication and preset interception strategy matching.
The second matching module, while being greater than the second set point, determines described current communication and preset interception strategy matching for send the ratio of the number of times of note and the number of times of reception note in described opposite end.
The 3rd matching module, in the time that the telephone operation number of times of described opposite end and the ratio of note number of operations are greater than the 3rd set point, determines described current communication and preset interception strategy matching.
Wherein, described telephone operation number of times comprises that breathe out in described opposite end and/or the number of times of incoming call; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
The 4th matching module, while being less than the 4th set point, determines described current communication and preset interception strategy matching for be added into contact person's number of times at the communication identifier of described opposite end.
The 5th matching module, while being greater than the 5th set point, determines described current communication and preset interception strategy matching for be added into the number of times of blacklist at the communication identifier of described opposite end.
The 6th matching module, when the number of times that the duration of call when breathing out in described opposite end is less than the first setting duration is greater than the 6th set point, determines described current communication and preset interception strategy matching.
The 7th matching module, when the number of times that is less than the second setting duration is greater than the 7th set point, determines described current communication and preset interception strategy matching for the duration of call when the incoming call of described opposite end.
The 8th matching module, when the jingle bell duration when breathing out in described opposite end is less than the 3rd number of times of setting duration and is greater than the 8th set point, determines described current communication and preset interception strategy matching.
The 9th matching module, while being less than the 4th number of times of setting duration and being greater than the 9th set point, determines described current communication and preset interception strategy matching for the jingle bell duration when the incoming call of described opposite end.
The tenth matching module, the time when conversing in described opposite end, when distributing and meeting setting-up time and distribute, is determined described current communication and preset interception strategy matching.
The 11 matching module, while being greater than the tenth set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or junk incoming call at the communication identifier of described opposite end.
The 12 matching module, when the number of times that is being defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, determines described current communication and preset interception strategy matching for the communication identifier in described opposite end.
The 13 matching module, while being greater than 12 set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or refuse messages in the note that uses the communication identifier of described opposite end to send.
Preferably, in the present embodiment, described preset interception strategy comprises multiple son interception strategies.Wherein, every height interception strategy matches with corresponding call information and label information respectively., can think that every height interception strategy is corresponding with above-mentioned the first to the 13 matching module respectively.
In the present embodiment, described matching module 508 the call information of described opposite end and/or label information being mated with preset interception strategy while determining matching result, specifically can comprise:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
Risk determination module 510, for determining the risk class of current communication according to described matching result.
Preferably, described risk determination module 510, specifically for according to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter.
Wherein,
Tackle tactful quantity while being more than or equal to first threshold at the son matching, determine that described current communication is high-risk rank.
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold at the son matching, determine that described current communication is risk class.
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold at the son matching, determine that described current communication is level of suspicion.
Tackle tactful quantity while being less than the 3rd threshold value at the son matching, determine that described current communication is level of security.
Processing module 512, for processing described current communication according to described risk class.
In the present embodiment, described processing module 512 can comprise:
The first processing module, in the time that described current communication is high-risk rank, carries out indicating risk the directly described current communication of interception to described current communication.
The second processing module, in the time that described current communication is risk class or level of suspicion, carries out indicating risk to described current communication.
The 3rd processing module, in the time that described current communication is level of security, keeps the communications status of described current communication.
Preferably, described processing module 512, in the time that described current communication is processed, specifically can comprise: by voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
Preserve module 514, for after described risk determination module 510 is determined the risk class of current communication according to described matching result, according to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the risk mark of described current communication.
The 4th processing module 516, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, processes described outgoing call according to described risk mark.
The 5th processing module 518, in the time that the communication identifier of incoming call call and the communication identifier of preservation match, converses and processes described incoming call according to described risk mark.
In sum, communication processing system described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described opposite end respectively, comprehensively judge the risk class of current communication according to the tactful match condition of multiple son interceptions, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current communication process.
For said apparatus embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the specification that provided herein, a large amount of details are described.But, can understand, embodiments of the invention can be put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.But, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them in addition multiple submodules or subelement or sub-component.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this specification (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature instead of further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize the some or all functions according to the some or all parts in the communication processing equipment of the embodiment of the present invention.The present invention can also be embodied as part or all equipment or the device program (for example, computer program and computer program) for carrying out method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, and those skilled in the art can design alternative embodiment in the case of not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has multiple such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In the unit claim of having enumerated some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The invention discloses A1, a kind of communication processing method, comprising:
Signal intelligence in terminal is monitored, obtain the communication identifier of the opposite end that current and described terminal communicates;
According to the communication identifier of described opposite end, obtain call information and the label information of described opposite end;
The call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy;
Determine the risk class of current communication according to described matching result;
According to described risk class, described current communication is processed.
A, method as described in A1,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist;
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
A3, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If when the ratio of the exhalation number of times of described opposite end and incoming call number of times is greater than the first set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the number of times of described opposite end transmission note and the number of times of reception note is greater than the second set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the telephone operation number of times of described opposite end and note number of operations is greater than the 3rd set point, determine described current communication and preset interception strategy matching; Wherein, described telephone operation number of times comprises the number of times of exhalation and/or the incoming call of described opposite end; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
A4, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If the communication identifier of described opposite end is added into contact person's number of times while being less than the 4th set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end is added into the number of times of blacklist while being greater than the 5th set point, determine described current communication and preset interception strategy matching.
A5, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If the duration of call while exhalation in described opposite end is less than the number of times of the first setting duration while being greater than the 6th set point, determine described current communication and preset interception strategy matching; And/or,
If the duration of call when incoming call of described opposite end is less than the number of times of the second setting duration while being greater than the 7th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration while exhalation in described opposite end is less than the 3rd number of times of setting duration while being greater than the 8th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration when incoming call of described opposite end is less than the 4th when setting the number of times of duration and being greater than the 9th set point, determine described current communication and preset interception strategy matching; And/or,
If the time while call in described opposite end distributes while meeting setting-up time distribution, determine described current communication and preset interception strategy matching.
A6, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If when the communication identifier of described opposite end is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end, in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, is determined described current communication and preset interception strategy matching; And/or,
If when the note that uses the communication identifier of described opposite end to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, determine described current communication and preset interception strategy matching.
A7, method as described in as arbitrary in A1-A6, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.
A8, method as described in A7, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
A9, method as described in A8, the described risk class of determining current communication according to described matching result, comprising:
According to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter;
Wherein,
Tackle tactful quantity while being more than or equal to first threshold when the son matching, determine that described current communication is high-risk rank;
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold when the son matching, determine that described current communication is risk class;
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold when the son matching, determine that described current communication is level of suspicion;
Tackle tactful quantity while being less than the 3rd threshold value when the son matching, determine that described current communication is level of security.
A10, method as described in A9, describedly process described current communication according to described risk class, comprising:
In the time that described current communication is high-risk rank, described current communication is carried out to indicating risk the directly described current communication of interception;
In the time that described current communication is risk class or level of suspicion, described current communication is carried out to indicating risk;
In the time that described current communication is level of security, keep the communications status of described current communication.
A11, method as described in A1, describedly process described current communication, comprising:
By voice broadcast, described current communication is carried out to indicating risk; And/or,
Dial side in terminal loads indicating risk information highlighted demonstration.
A12, method as described in A1, after the step of the described risk class of determining current communication according to described matching result, described method also comprises:
According to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the described risk mark of described opposite end.
A13, method as described in A12, described method also comprises:
In the time that the communication identifier of outgoing call and the communication identifier of preservation match, according to corresponding risk mark, described outgoing call is processed;
In the time that the communication identifier of incoming call call and the communication identifier of preservation match, according to corresponding risk mark, described incoming call is conversed and processed.
A14, method as described in A1, described obtain the call information of described opposite end and the step of label information after, described method also comprises:
Described call information and label information are gone to privacy processing.
The invention also discloses B15, a kind of communication processing system, comprising:
Communication identifier acquisition module, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates;
Acquisition of information module, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end;
Matching module, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy;
Risk determination module, for determining the risk class of current communication according to described matching result;
Processing module, for processing described current communication according to described risk class.
B16, system as described in B15,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist;
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
B17, system as described in B16, described matching module, comprising:
The first matching module, in the time that the exhalation number of times of described opposite end and the ratio of incoming call number of times are greater than the first set point, determines described current communication and preset interception strategy matching;
The second matching module, while being greater than the second set point, determines described current communication and preset interception strategy matching for send the ratio of the number of times of note and the number of times of reception note in described opposite end;
The 3rd matching module, in the time that the telephone operation number of times of described opposite end and the ratio of note number of operations are greater than the 3rd set point, determines described current communication and preset interception strategy matching; Wherein, described telephone operation number of times comprises that breathe out in described opposite end and/or the number of times of incoming call; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
B18, system as described in B16, described matching module, comprising:
The 4th matching module, while being less than the 4th set point, determines described current communication and preset interception strategy matching for be added into contact person's number of times at the communication identifier of described opposite end;
The 5th matching module, while being greater than the 5th set point, determines described current communication and preset interception strategy matching for be added into the number of times of blacklist at the communication identifier of described opposite end.
B19, system as described in B16, described matching module, comprising:
The 6th matching module, when the number of times that the duration of call when breathing out in described opposite end is less than the first setting duration is greater than the 6th set point, determines described current communication and preset interception strategy matching;
The 7th matching module, when the number of times that is less than the second setting duration is greater than the 7th set point, determines described current communication and preset interception strategy matching for the duration of call when the incoming call of described opposite end;
The 8th matching module, when the jingle bell duration when breathing out in described opposite end is less than the 3rd number of times of setting duration and is greater than the 8th set point, determines described current communication and preset interception strategy matching;
The 9th matching module, while being less than the 4th number of times of setting duration and being greater than the 9th set point, determines described current communication and preset interception strategy matching for the jingle bell duration when the incoming call of described opposite end;
The tenth matching module, the time when conversing in described opposite end, when distributing and meeting setting-up time and distribute, is determined described current communication and preset interception strategy matching.
B20, system as described in B16, described matching module, comprising:
The 11 matching module, while being greater than the tenth set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or junk incoming call at the communication identifier of described opposite end;
The 12 matching module, when the number of times that is being defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, determines described current communication and preset interception strategy matching for the communication identifier in described opposite end;
The 13 matching module, while being greater than 12 set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or refuse messages in the note that uses the communication identifier of described opposite end to send.
B21, system as described in as arbitrary in B15-B20, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.
B22, as described in B21 system, described matching module the call information of described opposite end and/or label information being mated with preset interception strategy while determining matching result, specifically comprises:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
B23, as described in B22 system,
Described risk determination module, specifically for according to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter;
Wherein,
Tackle tactful quantity while being more than or equal to first threshold at the son matching, determine that described current communication is high-risk rank;
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold at the son matching, determine that described current communication is risk class;
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold at the son matching, determine that described current communication is level of suspicion;
Tackle tactful quantity while being less than the 3rd threshold value at the son matching, determine that described current communication is level of security.
B24, system as described in B23, described processing module, comprising:
The first processing module, in the time that described current communication is high-risk rank, carries out indicating risk the directly described current communication of interception to described current communication;
The second processing module, in the time that described current communication is risk class or level of suspicion, carries out indicating risk to described current communication;
The 3rd processing module, in the time that described current communication is level of security, keeps the communications status of described current communication.
B25, system as described in B15, described processing module, in the time that described current communication is processed, specifically comprises:
By voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
B26, system as described in B15, described system also comprises:
Preserve module, for after described risk determination module is determined the risk class of current communication according to described matching result, according to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the described risk mark of described opposite end.
B27, system as described in B26, described system also comprises:
The 4th processing module, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, processes described outgoing call according to corresponding risk mark;
The 5th processing module, in the time that the communication identifier of incoming call call and the communication identifier of preservation match, converses and processes described incoming call according to corresponding risk mark.
B28, system as described in B15, described system also comprises:
Privacy processing module, for after described acquisition of information module is obtained the call information and label information of described opposite end, goes privacy processing to described call information and label information.

Claims (10)

1. a communication processing method, is characterized in that, comprising:
Signal intelligence in terminal is monitored, obtain the communication identifier of the opposite end that current and described terminal communicates;
According to the communication identifier of described opposite end, obtain call information and the label information of described opposite end;
The call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy;
Determine the risk class of current communication according to described matching result;
According to described risk class, described current communication is processed.
2. the method for claim 1, is characterized in that,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist;
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
3. method as claimed in claim 2, is characterized in that, described the call information of described opposite end and/or label information is mated to definite matching result with preset interception strategy, comprising:
If when the ratio of the exhalation number of times of described opposite end and incoming call number of times is greater than the first set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the number of times of described opposite end transmission note and the number of times of reception note is greater than the second set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the telephone operation number of times of described opposite end and note number of operations is greater than the 3rd set point, determine described current communication and preset interception strategy matching; Wherein, described telephone operation number of times comprises the number of times of exhalation and/or the incoming call of described opposite end; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
4. method as claimed in claim 2, is characterized in that, described the call information of described opposite end and/or label information is mated to definite matching result with preset interception strategy, comprising:
If the communication identifier of described opposite end is added into contact person's number of times while being less than the 4th set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end is added into the number of times of blacklist while being greater than the 5th set point, determine described current communication and preset interception strategy matching.
5. method as claimed in claim 2, is characterized in that, described the call information of described opposite end and/or label information is mated to definite matching result with preset interception strategy, comprising:
If the duration of call while exhalation in described opposite end is less than the number of times of the first setting duration while being greater than the 6th set point, determine described current communication and preset interception strategy matching; And/or,
If the duration of call when incoming call of described opposite end is less than the number of times of the second setting duration while being greater than the 7th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration while exhalation in described opposite end is less than the 3rd number of times of setting duration while being greater than the 8th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration when incoming call of described opposite end is less than the 4th when setting the number of times of duration and being greater than the 9th set point, determine described current communication and preset interception strategy matching; And/or,
If the time while call in described opposite end distributes while meeting setting-up time distribution, determine described current communication and preset interception strategy matching.
6. method as claimed in claim 2, is characterized in that, described the call information of described opposite end and/or label information is mated to definite matching result with preset interception strategy, comprising:
If when the communication identifier of described opposite end is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end, in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, is determined described current communication and preset interception strategy matching; And/or,
If when the note that uses the communication identifier of described opposite end to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, determine described current communication and preset interception strategy matching.
7. the method as described in claim as arbitrary in claim 1-6, is characterized in that, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.
8. method as claimed in claim 7, is characterized in that, described the call information of described opposite end and/or label information is mated to definite matching result with preset interception strategy, comprising:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
9. method as claimed in claim 8, is characterized in that, the described risk class of determining current communication according to described matching result, comprising:
According to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter;
Wherein,
Tackle tactful quantity while being more than or equal to first threshold when the son matching, determine that described current communication is high-risk rank;
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold when the son matching, determine that described current communication is risk class;
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold when the son matching, determine that described current communication is level of suspicion;
Tackle tactful quantity while being less than the 3rd threshold value when the son matching, determine that described current communication is level of security.
10. a communication processing system, is characterized in that, comprising:
Communication identifier acquisition module, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates;
Acquisition of information module, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end;
Matching module, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy;
Risk determination module, for determining the risk class of current communication according to described matching result;
Processing module, for processing described current communication according to described risk class.
CN201410300178.8A 2014-06-26 2014-06-26 A kind of communication processing method and system Active CN104113626B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410300178.8A CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410300178.8A CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Publications (2)

Publication Number Publication Date
CN104113626A true CN104113626A (en) 2014-10-22
CN104113626B CN104113626B (en) 2017-10-31

Family

ID=51710257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410300178.8A Active CN104113626B (en) 2014-06-26 2014-06-26 A kind of communication processing method and system

Country Status (1)

Country Link
CN (1) CN104113626B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506743A (en) * 2014-12-17 2015-04-08 百度在线网络技术(北京)有限公司 Method and device for dynamically intercepting call
CN104683537A (en) * 2015-01-28 2015-06-03 北京羽乐创新科技有限公司 Number marking method and device
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
CN105791574A (en) * 2016-03-02 2016-07-20 吴伟东 Communication shielding method and system of mobile phone app
CN105844475A (en) * 2016-03-17 2016-08-10 流量海科技成都有限公司 Risk control method and risk control apparatus
CN106101363A (en) * 2016-05-27 2016-11-09 北京小米移动软件有限公司 Income prompting method and device
CN106534464A (en) * 2016-11-30 2017-03-22 依偎科技(南昌)有限公司 Call processing method and terminal
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal
CN107317935A (en) * 2017-07-07 2017-11-03 北京奇虎科技有限公司 Telephone number query, display methods and device, cloud server and terminal device
CN107896287A (en) * 2017-09-30 2018-04-10 上海壹账通金融科技有限公司 Phone number risk monitoring method and mobile terminal
CN108780446A (en) * 2015-10-28 2018-11-09 维尔塞特公司 The prompt that time dependent machine generates

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160186A1 (en) * 2004-06-07 2007-07-12 Huawei Technologies Co., Ltd. Method for processing an incoming call
CN101459718A (en) * 2009-01-06 2009-06-17 华中科技大学 Rubbish voice filtering method based on mobile communication network and system thereof
CN101540797A (en) * 2009-01-21 2009-09-23 宇龙计算机通信科技(深圳)有限公司 Incoming number filter method, system and mobile terminal
CN102368853A (en) * 2011-09-26 2012-03-07 广州市动景计算机科技有限公司 Communication event processing method and system thereof
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN103685675A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160186A1 (en) * 2004-06-07 2007-07-12 Huawei Technologies Co., Ltd. Method for processing an incoming call
CN101459718A (en) * 2009-01-06 2009-06-17 华中科技大学 Rubbish voice filtering method based on mobile communication network and system thereof
CN101540797A (en) * 2009-01-21 2009-09-23 宇龙计算机通信科技(深圳)有限公司 Incoming number filter method, system and mobile terminal
CN102368853A (en) * 2011-09-26 2012-03-07 广州市动景计算机科技有限公司 Communication event processing method and system thereof
CN102413169A (en) * 2011-10-12 2012-04-11 盛乐信息技术(上海)有限公司 Cloud address list establishing and maintenance method and system thereof
CN103685675A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Information processing method and electronic device

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506743A (en) * 2014-12-17 2015-04-08 百度在线网络技术(北京)有限公司 Method and device for dynamically intercepting call
CN104683537A (en) * 2015-01-28 2015-06-03 北京羽乐创新科技有限公司 Number marking method and device
US9813538B2 (en) * 2015-02-27 2017-11-07 Tencent Technology (Shenzhen) Company Limited Malicious call recognition method and apparatus
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
WO2016134630A1 (en) * 2015-02-27 2016-09-01 腾讯科技(深圳)有限公司 Method and device for recognizing malicious call
CN104735671B (en) * 2015-02-27 2018-11-09 腾讯科技(深圳)有限公司 A kind of method and apparatus of identification malicious call
US11443099B2 (en) 2015-10-28 2022-09-13 Viasat, Inc. Time-dependent machine-generated hinting
CN108780446B (en) * 2015-10-28 2022-08-19 维尔塞特公司 Time-dependent machine-generated cues
CN108780446A (en) * 2015-10-28 2018-11-09 维尔塞特公司 The prompt that time dependent machine generates
CN106878993A (en) * 2015-12-10 2017-06-20 中国移动通信集团公司 A kind of information processing method, system, server and terminal
CN105791574A (en) * 2016-03-02 2016-07-20 吴伟东 Communication shielding method and system of mobile phone app
CN105844475A (en) * 2016-03-17 2016-08-10 流量海科技成都有限公司 Risk control method and risk control apparatus
CN106101363A (en) * 2016-05-27 2016-11-09 北京小米移动软件有限公司 Income prompting method and device
CN106534464A (en) * 2016-11-30 2017-03-22 依偎科技(南昌)有限公司 Call processing method and terminal
CN107317935A (en) * 2017-07-07 2017-11-03 北京奇虎科技有限公司 Telephone number query, display methods and device, cloud server and terminal device
CN107896287A (en) * 2017-09-30 2018-04-10 上海壹账通金融科技有限公司 Phone number risk monitoring method and mobile terminal

Also Published As

Publication number Publication date
CN104113626B (en) 2017-10-31

Similar Documents

Publication Publication Date Title
CN104113626A (en) Communication processing method and system
CN104135563B (en) A kind of communication processing method and system
CN103338308B (en) The method of calling of mobile terminal, the method controlling mobile terminal and relevant device
CN104992096B (en) A kind of data guard method and mobile terminal
EP1670197A3 (en) Messaging advice in presence-aware networks
GB2376836A (en) Responding to telephone calls using e-mails containing schedule information
CN103076977B (en) A kind of method and system of the transmission of trigger message in the standby state
GB2441196A (en) Mobile communications device with call-logging capability
US20150006655A1 (en) Intra-conversation Text Message Threading
CN103152462B (en) A kind of address list sharing method and device
CN103024151A (en) Call processing method and device for silent mode
CN104935719A (en) Method and device for intercepting junk call
CN104270509A (en) Displaying method of interface of mobile terminal, mobile terminal and server
CN105376426A (en) Information management method based on address book and mobile terminal
CN106027769A (en) Screen locking method of customized control cellphone
US20080285727A1 (en) Communications Controller And Protocol
CN201204701Y (en) Intelligently-adjustable system and device for prompting event
CN107404580A (en) A kind of method, storage medium and equipment for intercepting harassing call number and short message
CN102186149A (en) Automatic short message responding method
CN102158584A (en) Method, device and system for automatically identifying phone number of communication initiator
CN108270925A (en) Processing method, device, terminal and the computer readable storage medium of voice messaging
CN101764869A (en) Method for realizing firewall of mobile phone short messages
CN105704327A (en) Call rejection method and call rejection system
CN101572870A (en) Method for monitoring junk information in communication network
CN106506782A (en) Incoming call processing method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230629

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.