Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, but should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can be by the those skilled in the art that conveys to complete the scope of the present disclosure.
Embodiment mono-
With reference to Fig. 1, show the flow chart of a kind of communication processing method in first embodiment of the invention.In the present embodiment, described communication processing method comprises:
Step 102, monitors the signal intelligence in terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
In the present embodiment, communication includes but are not limited to: telephone relation, the note of being undertaken by terminal, and the voice call, the instant message that are undertaken by IM (Instant Messaging, instant messaging) software.Wherein, conventional IM software comprises: QQ, MSN Messenger, Fetion, Skype, the UC of Sina, Google Talk, Ali Wang Wang etc.
Wherein, the signal intelligence in terminal is monitored and can be comprised: the communication of monitoring access and communicating by letter that monitoring is breathed out.Be while being initiated by end side in current communication, described opposite end is recipient, and described terminal is transmit leg; Be when to distolateral initiation in current communication, described terminal is to receive to send out, and described opposite end is transmit leg.
Preferably, in the time that terminal is mobile phone terminal, and the communication of carrying out is when making a phone call/receive calls and receiving and dispatching note, and the communication identifier of described opposite end can be the phone number of described opposite end.When terminal is PC end (Personal Computer, personal computer) or mobile phone terminal, and the communication of carrying out be instant communication session (as, QQ voice, QQ video, micro-letter etc.) time, the communication identifier of described opposite end can be user corresponding to opposite end instant communication number (as, No. QQ, micro-signal etc.).
Step 104, according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Step 106, mates definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Step 108, determines the risk class of current communication according to described matching result.
Step 110, processes described current communication according to described risk class.
In sum, communication processing method described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information corresponding to described opposite end and/or label information to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
With reference to Fig. 2, show the flow chart of a kind of communication processing method in second embodiment of the invention.
In the present embodiment, can pass through mobile terminal (as, mobile phone) and carry out described communication processing method.Particularly,
Can be a functional module of terminal for what carry out described communication processing method.For example, this functional module is arranged in the operating system of terminal or the talk application of terminal, in the time having incoming call access in terminal, carries out described communication processing method by this functional module.
Or, can be a functional module in third party application or third party's application of terminal for what carry out described communication processing method.As: can be a functional module in Secure Application in terminal (as, 360 mobile phone security guards).Functional module in described third party application or third party's application is during in running status, in the time having incoming call access in terminal, can by this third party apply or third party's application in this functional module carry out described communication processing method.
In the present embodiment, described communication processing method comprises:
Step 202, third party application is monitored the signal intelligence in terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Step 204, third party applies according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Preferably, described call information includes but are not limited to: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist.
As, current communication be use mobile phone carry out call time, the call information of described opposite end can comprise: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added into the full detail such as number of times of blacklist.And current communication be use mobile phone carry out QQ voice call time, the call information of described opposite end can be the number of times of exhalation and the incoming call of described opposite end, the duration of call when exhalation of described opposite end and incoming call, the partial informations such as the time distributed intelligence while calls in the jingle bell duration when exhalation of described opposite end and incoming call and described opposite end.The information content that described call information specifically comprises can be definite according to practical communication situation, and the present embodiment is not restricted this.
Described label information includes but are not limited to: described current call is marked as the number of times of malice and/or junk incoming call, described current call is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the conversation number of described current call to send is marked as at least one maliciously and/or in the number of times of refuse messages.Similar to aforementioned call information, the information content that described label information specifically comprises can be definite according to practical communication situation, and the present embodiment is not restricted this.
Here it should be noted that, in the present embodiment, in the time that described call is the voice call of being undertaken by IM software, the note in described call information and described label information can be understood as, and adopts word to carry out mutual text message by IM software.
Step 206, third party's application is gone privacy processing to described call information and label information.
Step 208, third party's application is mated definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Preferably, described step 208 specifically can comprise:
If when the ratio of the exhalation number of times of the described terminal of S2002 and incoming call number of times is greater than the first set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the ratio of the number of times of the described opposite end transmission of S2004 note and the number of times of reception note is greater than the second set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the ratio of the telephone operation number of times of the described opposite end of S2006 and note number of operations is greater than the 3rd set point, third party applies and determines described current communication and preset interception strategy matching.Wherein, described telephone operation number of times comprises the number of times of exhalation and/or the incoming call of described opposite end; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note; And/or,
If the communication identifier of the described opposite end of S2008 is added into contact person's number of times while being less than the 4th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the communication identifier of the described opposite end of S2010 is added into the number of times of blacklist while being greater than the 5th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the duration of call while exhalation in the described opposite end of S2012 is less than the number of times of the first setting duration while being greater than the 6th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the duration of call when incoming call of the described opposite end of S2014 is less than the number of times of the second setting duration while being greater than the 7th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the jingle bell duration while exhalation in the described opposite end of S2016 is less than the 3rd number of times of setting duration while being greater than the 8th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the jingle bell duration when incoming call of the described opposite end of S2018 is less than the 4th when setting the number of times of duration and being greater than the 9th set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If time when S2020 converses described opposite end distributes while meeting setting-up time distribution, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the communication identifier of the described opposite end of S2022 is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If the communication identifier of the described opposite end of S2024 is in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, third party applies and determines described current communication and preset interception strategy matching; And/or,
If when the note that S2026 uses the communication identifier of described opposite end to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, third party applies and determines described current communication and preset interception strategy matching.
Here it should be noted that, in the present embodiment, can, according to practical communication situation, select corresponding one or more steps to carry out matching judgment from above-mentioned steps S2002-S2026.
In the present embodiment, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.For example, with above-mentioned steps S2002-S2026 accordingly, in the present embodiment, described preset interception strategy can comprise 13 son interception strategies, described 13 son interception strategies are corresponding one by one with above-mentioned steps S2002-S2026.
Preferably, described step 208 specifically can comprise: determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.As, can determine in described 13 son interception strategies and tackle tactful quantity with the described current son matching of communicating by letter according to above-mentioned steps S2002-S2026.
Step 210, the risk class of current communication is determined in third party's application according to described matching result.
In the present embodiment, described step 210 specifically can comprise:
When the son matching is tackled tactful quantity while being more than or equal to first threshold, third party applies and determines that described current communication is high-risk rank.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal at 10 o'clock, third party applies and determines that described current communication is high-risk rank.
When the son matching is tackled tactful quantity when being more than or equal to Second Threshold and being less than first threshold, third party applies and determines that described current communication is risk class.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal to 6 and be less than at 10 o'clock, third party applies and determines that described current communication is risk class.
When the son matching is tackled tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold, third party applies and determines that described current communication is level of suspicion.As, tackling tactful quantity with the described current son that matches of communicating by letter and be more than or equal to 3 and be less than at 6 o'clock, third party applies and determines that described current communication is level of suspicion.
When the son matching is tackled tactful quantity while being less than the 3rd threshold value, third party applies and determines that described current communication is level of security.As, tackling tactful quantity with the described current son that matches of communicating by letter and be less than at 3 o'clock, third party applies and determines that described current communication is level of security.
Step 212, third party's application is processed described current communication according to described risk class.
From front described, in the present embodiment, the risk class of described current communication can be divided into: high-risk rank, risk class, level of suspicion and level of security.Here it should be noted that, the risk class of current communication can arrange multiple ranks according to actual conditions, includes but are not limited to: high-risk rank, risk class, level of suspicion and level of security.
Preferably,
In the time that described current communication is high-risk rank, third party's application is carried out indicating risk the directly described current communication of interception to described current communication.
In the time that described current communication is risk class or level of suspicion, described current communication is carried out to indicating risk.
In the time that described current communication is level of security, keep the talking state of described current communication.
In the present embodiment, concrete processing mode when third party's application is processed described current communication according to described risk class can be:
By voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
In the present embodiment, after described step 210 is complete, can also perform step 214.
Step 214, third party's application is carried out risk mark according to described risk class to described current communication, and preserves communication identifier and the risk mark of described current communication.
In the present embodiment, because third party's application is carried out risk mark according to described risk class to described current communication, therefore described risk mark can be used to refer to and judge risk class corresponding to described current communication.
Preferably, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, third party's application can be processed described outgoing call according to described risk mark, as carries out indicating risk.In the time that the communication identifier of incoming call call and the communication identifier of preservation match, third party's application can be conversed and process described incoming call according to described risk mark, as indicating risk or interception etc.
In sum, communication processing method described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation,, thus the processing of terminal system to the operation that needs user and participate in both alleviated, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described opposite end respectively, comprehensively judge the risk class of current communication according to the tactful match condition of multiple son interceptions, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current communication process.
Embodiment tri-
In conjunction with above-described embodiment, below by an instantiation, a kind of flow process of communication processing method is described.
In the present embodiment, described call refers to by mobile phone converses, and carries out the third party application that can be mounted in mobile phone side (as, address list bodyguard) of described communication processing method.With reference to Fig. 3, show the flow chart of a kind of communication processing method in third embodiment of the invention.In the present embodiment, described communication processing method comprises:
Step 302, address list bodyguard monitors the incoming call situation in mobile phone, obtains the telephone number of current call.
Step 304, address list bodyguard, according to the telephone number of described current call, obtains call information and the label information of described current call.
Preferably, described call information comprises: the number of times of described current call exhalation and incoming call, duration of call when described current call exhalation and incoming call, jingle bell duration when described current call exhalation and incoming call, time distributed intelligence when described current call is conversed, the number of times of described current call sending and receiving note, the telephone number of described current call is added into contact person and is added at least one in the number of times of blacklist.
Described label information comprise but: described current call is marked as malice and/or the number of times of junk incoming call, described current call is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the telephone number of described current call to send is marked as at least one maliciously and/or in the number of times of refuse messages.
Step 306, address list bodyguard goes privacy processing to described call information and label information.
In the present embodiment, described in, go privacy processing to refer to: the information that relates to privacy of user in deleted/hidden call information and label information.For example: by call information and label information, indicate the user of current call name, sex and head image information information deletion/hide.
Step 308, address list bodyguard is mated definite matching result by the call information of described current call and/or label information with preset interception strategy.
In the present embodiment, described preset interception strategy comprises multiple son interception strategies.Wherein, every height interception strategy can be specifically:
Son interception strategy 1: if when the ratio of the exhalation number of times of described current call and incoming call number of times is greater than the first set point, address list bodyguard determines described current call and preset interception strategy matching.
Sub-interception strategy 2: if when the ratio of the number of times of described current call transmission note and the number of times of reception note is greater than the second set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 3: if when the ratio of the telephone operation number of times of described current call and note number of operations is greater than the 3rd set point, address list bodyguard determines described current call and preset interception strategy matching.Wherein, described telephone operation number of times comprises that described current call is breathed out and/or the number of times of incoming call; Described note number of operations comprises that described current call sends and/or receive the number of times of note.
Son interception strategy 4: if the telephone number of described current call is added into contact person's number of times while being less than the 4th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 5: if the telephone number of described current call is added into the number of times of blacklist while being greater than the 5th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 6: if duration of call when described current call is breathed out is less than the number of times of the first setting duration while being greater than the 6th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 7: if duration of call when described current call incoming call is less than the number of times of the second setting duration while being greater than the 7th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 8: if jingle bell duration when described current call is breathed out is less than the 3rd number of times of setting duration while being greater than the 8th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 9: if jingle bell duration when described current call incoming call is less than the 4th number of times of setting duration while being greater than the 9th set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 10: if time when described current call is conversed distributes while meeting setting-up time distribution, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 11: if when described current call is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 12: if described current call is in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, address list bodyguard determines described current call and preset interception strategy matching.
Son interception strategy 13: if when the note that uses the telephone number of described current call to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, address list bodyguard determines described current call and preset interception strategy matching.
As, in the present embodiment, address list bodyguard gets respectively incoming call number A, B, C, D; And telephone number A, B, call information and label information that C, D are corresponding are obtained respectively.Address list bodyguard has determined according to telephone number A, B, call information and label information that C, D are corresponding:
Telephone number A meets the tactful 1-11 of son interception simultaneously; Telephone number B meets the tactful 1-8 of son interception simultaneously; Telephone number C meets the tactful 1-4 of son interception simultaneously; Telephone number D only meets son interception strategy 1.
Step 310, address list bodyguard determines the risk class of current call according to described matching result.
In the present embodiment, address list bodyguard according to telephone number A, B, C, D separately corresponding satisfied son tackle tactful quantity, determine:
The risk class of telephone number A is high-risk rank;
The risk class of telephone number B is risk class;
The risk class of telephone number C is level of suspicion;
The risk class of telephone number D is level of security.
Step 312, address list bodyguard processes described current call according to described risk class.
In the present embodiment, address list bodyguard carries out indicating risk directly interception to the incoming call of telephone number A.Described indicating risk can carry out with voice broadcast form, can be also to carry out to load the also form of the Word message of highlighted demonstration indicating risk at the dial page.
Address list bodyguard carries out indicating risk to the incoming call of telephone number B and C.User can correspondingly operate according to indicating risk, as, connect this call, or hang up this call.
Address list bodyguard keeps the talking state of the incoming call of telephone number D.
In sum, communication processing method described in the present embodiment, by obtaining call information and the label information of described current call, then the call information of described current call and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current call according to described matching result, according to described risk class, described current call is processed.The present invention depends on call information and/or the label information of current call to the judgement of current call, but not depend on the artificial mark result to strange conversation number of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current call is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described current call respectively, comprehensively judge the risk class of current call according to the tactful match condition of multiple son interception, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current call processing.
It should be noted that, for aforesaid embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the present invention is not subject to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and related action might not be essential to the invention.
Embodiment tetra-
Based on the same inventive concept of said method embodiment.With reference to Fig. 4, show the structured flowchart of a kind of communication processing system in fourth embodiment of the invention.In the present embodiment, described communication processing system comprises:
Communication identifier acquisition module 402, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Acquisition of information module 404, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Matching module 406, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
Risk determination module 408, for determining the risk class of current communication according to described matching result.
Processing module 410, for processing described current communication according to described risk class.
In sum, communication processing system described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described terminal and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation,, thus the processing of terminal system to the operation that needs user and participate in both alleviated, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
With reference to Fig. 5, show the structured flowchart of a kind of communication processing system in fifth embodiment of the invention.In the present embodiment, described communication processing system comprises:
Communication identifier acquisition module 502, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates.
Acquisition of information module 504, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end.
Wherein,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist.
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
Privacy processing module 506, for after described acquisition of information module 504 is obtained the call information and label information of described opposite end, goes privacy processing to described call information and label information.
In the present embodiment, described in, go privacy processing to refer to: the information that relates to privacy of user in deleted/hidden call information and label information.For example: by call information and label information, indicate the user of current call name, sex and head image information information deletion/hide.
Matching module 508, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy.
In the present embodiment, described matching module 508 specifically can comprise:
The first matching module, in the time that the exhalation number of times of described opposite end and the ratio of incoming call number of times are greater than the first set point, determines described current communication and preset interception strategy matching.
The second matching module, while being greater than the second set point, determines described current communication and preset interception strategy matching for send the ratio of the number of times of note and the number of times of reception note in described opposite end.
The 3rd matching module, in the time that the telephone operation number of times of described opposite end and the ratio of note number of operations are greater than the 3rd set point, determines described current communication and preset interception strategy matching.
Wherein, described telephone operation number of times comprises that breathe out in described opposite end and/or the number of times of incoming call; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
The 4th matching module, while being less than the 4th set point, determines described current communication and preset interception strategy matching for be added into contact person's number of times at the communication identifier of described opposite end.
The 5th matching module, while being greater than the 5th set point, determines described current communication and preset interception strategy matching for be added into the number of times of blacklist at the communication identifier of described opposite end.
The 6th matching module, when the number of times that the duration of call when breathing out in described opposite end is less than the first setting duration is greater than the 6th set point, determines described current communication and preset interception strategy matching.
The 7th matching module, when the number of times that is less than the second setting duration is greater than the 7th set point, determines described current communication and preset interception strategy matching for the duration of call when the incoming call of described opposite end.
The 8th matching module, when the jingle bell duration when breathing out in described opposite end is less than the 3rd number of times of setting duration and is greater than the 8th set point, determines described current communication and preset interception strategy matching.
The 9th matching module, while being less than the 4th number of times of setting duration and being greater than the 9th set point, determines described current communication and preset interception strategy matching for the jingle bell duration when the incoming call of described opposite end.
The tenth matching module, the time when conversing in described opposite end, when distributing and meeting setting-up time and distribute, is determined described current communication and preset interception strategy matching.
The 11 matching module, while being greater than the tenth set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or junk incoming call at the communication identifier of described opposite end.
The 12 matching module, when the number of times that is being defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, determines described current communication and preset interception strategy matching for the communication identifier in described opposite end.
The 13 matching module, while being greater than 12 set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or refuse messages in the note that uses the communication identifier of described opposite end to send.
Preferably, in the present embodiment, described preset interception strategy comprises multiple son interception strategies.Wherein, every height interception strategy matches with corresponding call information and label information respectively., can think that every height interception strategy is corresponding with above-mentioned the first to the 13 matching module respectively.
In the present embodiment, described matching module 508 the call information of described opposite end and/or label information being mated with preset interception strategy while determining matching result, specifically can comprise:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
Risk determination module 510, for determining the risk class of current communication according to described matching result.
Preferably, described risk determination module 510, specifically for according to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter.
Wherein,
Tackle tactful quantity while being more than or equal to first threshold at the son matching, determine that described current communication is high-risk rank.
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold at the son matching, determine that described current communication is risk class.
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold at the son matching, determine that described current communication is level of suspicion.
Tackle tactful quantity while being less than the 3rd threshold value at the son matching, determine that described current communication is level of security.
Processing module 512, for processing described current communication according to described risk class.
In the present embodiment, described processing module 512 can comprise:
The first processing module, in the time that described current communication is high-risk rank, carries out indicating risk the directly described current communication of interception to described current communication.
The second processing module, in the time that described current communication is risk class or level of suspicion, carries out indicating risk to described current communication.
The 3rd processing module, in the time that described current communication is level of security, keeps the communications status of described current communication.
Preferably, described processing module 512, in the time that described current communication is processed, specifically can comprise: by voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
Preserve module 514, for after described risk determination module 510 is determined the risk class of current communication according to described matching result, according to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the risk mark of described current communication.
The 4th processing module 516, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, processes described outgoing call according to described risk mark.
The 5th processing module 518, in the time that the communication identifier of incoming call call and the communication identifier of preservation match, converses and processes described incoming call according to described risk mark.
In sum, communication processing system described in the present embodiment, by obtaining the communication identifier of the opposite end communicating with described terminal, and further obtain call information and the label information of described opposite end according to described communication identifier, then the call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy, finally determine the risk class of current communication according to described matching result, according to described risk class, described current communication is processed.The present invention depends on call information and/or the label information of described opposite end to the judgement of current communication, but not depend on the artificial mark result to strange communication identifier of user, improve the accuracy of judged result, and then ensured the accuracy in the time that current communication is processed.And, reduce user's participation, thereby both alleviated the processing of terminal system to the operation that needs user and participate in, alleviate operation and the processing load of terminal system, avoid again the harassing and wrecking to user, promote user's experience.
Further, described preset interception strategy comprises multiple son interception strategies, multiple son interception strategies are corresponding one by one with call information and/or the label information of described opposite end respectively, comprehensively judge the risk class of current communication according to the tactful match condition of multiple son interceptions, but not rely on single parameter to judge, improve accuracy and the detailed degree of judged result, and then ensured the accuracy to current communication process.
For said apparatus embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the specification that provided herein, a large amount of details are described.But, can understand, embodiments of the invention can be put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.But, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them in addition multiple submodules or subelement or sub-component.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this specification (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature instead of further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize the some or all functions according to the some or all parts in the communication processing equipment of the embodiment of the present invention.The present invention can also be embodied as part or all equipment or the device program (for example, computer program and computer program) for carrying out method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, and those skilled in the art can design alternative embodiment in the case of not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has multiple such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In the unit claim of having enumerated some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The invention discloses A1, a kind of communication processing method, comprising:
Signal intelligence in terminal is monitored, obtain the communication identifier of the opposite end that current and described terminal communicates;
According to the communication identifier of described opposite end, obtain call information and the label information of described opposite end;
The call information of described opposite end and/or label information are mated to definite matching result with preset interception strategy;
Determine the risk class of current communication according to described matching result;
According to described risk class, described current communication is processed.
A, method as described in A1,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist;
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
A3, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If when the ratio of the exhalation number of times of described opposite end and incoming call number of times is greater than the first set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the number of times of described opposite end transmission note and the number of times of reception note is greater than the second set point, determine described current communication and preset interception strategy matching; And/or,
If when the ratio of the telephone operation number of times of described opposite end and note number of operations is greater than the 3rd set point, determine described current communication and preset interception strategy matching; Wherein, described telephone operation number of times comprises the number of times of exhalation and/or the incoming call of described opposite end; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
A4, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If the communication identifier of described opposite end is added into contact person's number of times while being less than the 4th set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end is added into the number of times of blacklist while being greater than the 5th set point, determine described current communication and preset interception strategy matching.
A5, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If the duration of call while exhalation in described opposite end is less than the number of times of the first setting duration while being greater than the 6th set point, determine described current communication and preset interception strategy matching; And/or,
If the duration of call when incoming call of described opposite end is less than the number of times of the second setting duration while being greater than the 7th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration while exhalation in described opposite end is less than the 3rd number of times of setting duration while being greater than the 8th set point, determine described current communication and preset interception strategy matching; And/or,
If the jingle bell duration when incoming call of described opposite end is less than the 4th when setting the number of times of duration and being greater than the 9th set point, determine described current communication and preset interception strategy matching; And/or,
If the time while call in described opposite end distributes while meeting setting-up time distribution, determine described current communication and preset interception strategy matching.
A6, method as described in A2, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
If when the communication identifier of described opposite end is marked as maliciously and/or the number of times of junk incoming call is greater than the tenth set point, determine described current communication and preset interception strategy matching; And/or,
If the communication identifier of described opposite end, in the time that the number of times that is defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, is determined described current communication and preset interception strategy matching; And/or,
If when the note that uses the communication identifier of described opposite end to send is marked as maliciously and/or the number of times of refuse messages is greater than 12 set point, determine described current communication and preset interception strategy matching.
A7, method as described in as arbitrary in A1-A6, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.
A8, method as described in A7, describedly mate definite matching result by the call information of described opposite end and/or label information with preset interception strategy, comprising:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
A9, method as described in A8, the described risk class of determining current communication according to described matching result, comprising:
According to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter;
Wherein,
Tackle tactful quantity while being more than or equal to first threshold when the son matching, determine that described current communication is high-risk rank;
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold when the son matching, determine that described current communication is risk class;
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold when the son matching, determine that described current communication is level of suspicion;
Tackle tactful quantity while being less than the 3rd threshold value when the son matching, determine that described current communication is level of security.
A10, method as described in A9, describedly process described current communication according to described risk class, comprising:
In the time that described current communication is high-risk rank, described current communication is carried out to indicating risk the directly described current communication of interception;
In the time that described current communication is risk class or level of suspicion, described current communication is carried out to indicating risk;
In the time that described current communication is level of security, keep the communications status of described current communication.
A11, method as described in A1, describedly process described current communication, comprising:
By voice broadcast, described current communication is carried out to indicating risk; And/or,
Dial side in terminal loads indicating risk information highlighted demonstration.
A12, method as described in A1, after the step of the described risk class of determining current communication according to described matching result, described method also comprises:
According to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the described risk mark of described opposite end.
A13, method as described in A12, described method also comprises:
In the time that the communication identifier of outgoing call and the communication identifier of preservation match, according to corresponding risk mark, described outgoing call is processed;
In the time that the communication identifier of incoming call call and the communication identifier of preservation match, according to corresponding risk mark, described incoming call is conversed and processed.
A14, method as described in A1, described obtain the call information of described opposite end and the step of label information after, described method also comprises:
Described call information and label information are gone to privacy processing.
The invention also discloses B15, a kind of communication processing system, comprising:
Communication identifier acquisition module, monitors for the signal intelligence to terminal, obtains the communication identifier of the opposite end that current and described terminal communicates;
Acquisition of information module, for according to the communication identifier of described opposite end, obtains call information and the label information of described opposite end;
Matching module, for mating definite matching result by the call information of described opposite end and/or label information with preset interception strategy;
Risk determination module, for determining the risk class of current communication according to described matching result;
Processing module, for processing described current communication according to described risk class.
B16, system as described in B15,
Described call information comprises: the exhalation of described opposite end and the number of times of incoming call, the duration of call when exhalation of described opposite end and incoming call, jingle bell duration when the exhalation of described opposite end and incoming call, time distributed intelligence while call in described opposite end, the number of times of described opposite end sending and receiving note, the communication identifier of described opposite end is added into contact person and is added at least one in the number of times of blacklist;
Described label information comprises: the communication identifier of described opposite end is marked as the number of times of malice and/or junk incoming call, the communication identifier of described opposite end is at the number of times that is defined as occurring on the page of malice and/or rubbish network address, and the note that uses the communication identifier of described opposite end to send is marked as at least one maliciously and/or in the number of times of refuse messages.
B17, system as described in B16, described matching module, comprising:
The first matching module, in the time that the exhalation number of times of described opposite end and the ratio of incoming call number of times are greater than the first set point, determines described current communication and preset interception strategy matching;
The second matching module, while being greater than the second set point, determines described current communication and preset interception strategy matching for send the ratio of the number of times of note and the number of times of reception note in described opposite end;
The 3rd matching module, in the time that the telephone operation number of times of described opposite end and the ratio of note number of operations are greater than the 3rd set point, determines described current communication and preset interception strategy matching; Wherein, described telephone operation number of times comprises that breathe out in described opposite end and/or the number of times of incoming call; Described note number of operations comprises that described opposite end sends and/or receive the number of times of note.
B18, system as described in B16, described matching module, comprising:
The 4th matching module, while being less than the 4th set point, determines described current communication and preset interception strategy matching for be added into contact person's number of times at the communication identifier of described opposite end;
The 5th matching module, while being greater than the 5th set point, determines described current communication and preset interception strategy matching for be added into the number of times of blacklist at the communication identifier of described opposite end.
B19, system as described in B16, described matching module, comprising:
The 6th matching module, when the number of times that the duration of call when breathing out in described opposite end is less than the first setting duration is greater than the 6th set point, determines described current communication and preset interception strategy matching;
The 7th matching module, when the number of times that is less than the second setting duration is greater than the 7th set point, determines described current communication and preset interception strategy matching for the duration of call when the incoming call of described opposite end;
The 8th matching module, when the jingle bell duration when breathing out in described opposite end is less than the 3rd number of times of setting duration and is greater than the 8th set point, determines described current communication and preset interception strategy matching;
The 9th matching module, while being less than the 4th number of times of setting duration and being greater than the 9th set point, determines described current communication and preset interception strategy matching for the jingle bell duration when the incoming call of described opposite end;
The tenth matching module, the time when conversing in described opposite end, when distributing and meeting setting-up time and distribute, is determined described current communication and preset interception strategy matching.
B20, system as described in B16, described matching module, comprising:
The 11 matching module, while being greater than the tenth set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or junk incoming call at the communication identifier of described opposite end;
The 12 matching module, when the number of times that is being defined as occurring on the page of malice and/or rubbish network address is greater than 11 set point, determines described current communication and preset interception strategy matching for the communication identifier in described opposite end;
The 13 matching module, while being greater than 12 set point, determines described current communication and preset interception strategy matching for be marked as the number of times of malice and/or refuse messages in the note that uses the communication identifier of described opposite end to send.
B21, system as described in as arbitrary in B15-B20, described preset interception strategy comprises multiple son interception strategies; Wherein, every height interception strategy matches with corresponding call information and label information respectively.
B22, as described in B21 system, described matching module the call information of described opposite end and/or label information being mated with preset interception strategy while determining matching result, specifically comprises:
Determine and tackle tactful quantity with the described current son matching of communicating by letter according to the call information of opposite end and/or label information.
B23, as described in B22 system,
Described risk determination module, specifically for according to tackling tactful quantity and determine the risk class of current communication with the described current son that matches of communicating by letter;
Wherein,
Tackle tactful quantity while being more than or equal to first threshold at the son matching, determine that described current communication is high-risk rank;
Tackle tactful quantity when being more than or equal to Second Threshold and being less than first threshold at the son matching, determine that described current communication is risk class;
Tackle tactful quantity when being more than or equal to the 3rd threshold value and being less than Second Threshold at the son matching, determine that described current communication is level of suspicion;
Tackle tactful quantity while being less than the 3rd threshold value at the son matching, determine that described current communication is level of security.
B24, system as described in B23, described processing module, comprising:
The first processing module, in the time that described current communication is high-risk rank, carries out indicating risk the directly described current communication of interception to described current communication;
The second processing module, in the time that described current communication is risk class or level of suspicion, carries out indicating risk to described current communication;
The 3rd processing module, in the time that described current communication is level of security, keeps the communications status of described current communication.
B25, system as described in B15, described processing module, in the time that described current communication is processed, specifically comprises:
By voice broadcast, described current communication is carried out to indicating risk; And/or, load indicating risk information highlighted demonstration in the dial side of terminal.
B26, system as described in B15, described system also comprises:
Preserve module, for after described risk determination module is determined the risk class of current communication according to described matching result, according to described risk class, described current communication is carried out to risk mark, and preserve communication identifier and the described risk mark of described opposite end.
B27, system as described in B26, described system also comprises:
The 4th processing module, in the time that the communication identifier of outgoing call and the communication identifier of preservation match, processes described outgoing call according to corresponding risk mark;
The 5th processing module, in the time that the communication identifier of incoming call call and the communication identifier of preservation match, converses and processes described incoming call according to corresponding risk mark.
B28, system as described in B15, described system also comprises:
Privacy processing module, for after described acquisition of information module is obtained the call information and label information of described opposite end, goes privacy processing to described call information and label information.