[go: up one dir, main page]

WO2016150221A1 - Nuisance contact information releasing method and apparatus - Google Patents

Nuisance contact information releasing method and apparatus Download PDF

Info

Publication number
WO2016150221A1
WO2016150221A1 PCT/CN2015/099575 CN2015099575W WO2016150221A1 WO 2016150221 A1 WO2016150221 A1 WO 2016150221A1 CN 2015099575 W CN2015099575 W CN 2015099575W WO 2016150221 A1 WO2016150221 A1 WO 2016150221A1
Authority
WO
WIPO (PCT)
Prior art keywords
harassment
contact information
client
information
preset database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/099575
Other languages
French (fr)
Chinese (zh)
Inventor
马璇
王强
常富洋
秦吉胜
李振博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Publication of WO2016150221A1 publication Critical patent/WO2016150221A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Definitions

  • the present invention relates to the field of information technology, and in particular, to a method and apparatus for distributing harassment contact information.
  • the functions of terminal devices are becoming more and more powerful, which brings convenience to people and brings hidden dangers to people's lives.
  • the harassing phone is one of the biggest hidden dangers, so the harassment contact information corresponding to the harassing phone needs to be presented to the user.
  • the harassment contact information corresponding to the harassing call it is necessary to store the harassment contact information in the terminal in advance.
  • the present invention provides a method and apparatus for distributing harassment contact information, the main purpose of which is to save terminal memory while improving the accuracy of storing harassment contact information.
  • a method for distributing harassment contact information including:
  • the harassment contact information corresponding to the identifier information of the client from the preset database, where the preset database stores harassment contact information corresponding to the identifier information of different clients;
  • a device for distributing contact information including:
  • a receiving unit configured to receive a harassing contact information obtaining request sent by the client, where the harassing contact information obtaining request carries the identification information of the client;
  • An obtaining unit configured to acquire, according to the identification information of the client, the harassment contact information corresponding to the identification information of the client from the preset database, where the preset database stores harassment corresponding to the identification information of different clients respectively contact information;
  • a sending unit configured to send the harassment contact information to the client.
  • a computer program comprising computer readable code that, when executed on a computing device, causes the computing device to perform the harassment contact information described above Publishing method.
  • a computer readable medium wherein the computer program described above is stored.
  • the technical solution provided by the embodiment of the present invention has at least the following advantages:
  • An embodiment of the present invention provides a method and a device for distributing harassment contact information, which firstly receives a harassment contact information acquisition request sent by a client, where the harassment contact information acquisition request carries the identification information of the client;
  • the spoofing contact information corresponding to the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database;
  • the harassment contact information is sent to the client.
  • the embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.
  • FIG. 1 shows a method for distributing harassment contact information according to an embodiment of the present invention
  • FIG. 2 is a diagram showing another method for distributing harassment contact information according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a harassment contact information distribution apparatus according to an embodiment of the present invention.
  • FIG. 4 is a diagram showing another harassment contact information distribution apparatus according to an embodiment of the present invention.
  • Figure 5 shows schematically a block diagram of a computing device for performing the method according to the invention
  • Fig. 6 schematically shows a storage unit for holding or carrying program code implementing the method according to the invention.
  • the embodiment of the invention provides a method for distributing harassment contact information. As shown in FIG. 1 , the method includes:
  • the harassment contact information obtaining request carries the identification information of the client.
  • the harassment contact information may include an harassment phone number, a number attribution information, a type of the harassment number, or information of a user to whom the number belongs.
  • the harassing phone number for harassing contact information is 13840001 ***
  • the information of the number attribution is Shenyang, Liaoning
  • the type of harassment number is advertising.
  • the identification information of the client is used to distinguish different clients.
  • the identification information of the client may be a physical address (Media Access Control Address, MAC address) of the client and/or an International Mobile Equipment Identification Number (IMEI), an IP address of the client, and a attribution of the client usage number.
  • the embodiment of the present invention is not limited to the ground or the Global Positioning System (GPS), the International Mobile Subscriber Identification Number (IMSI), and the like.
  • the preset database stores the harassment contact information corresponding to the identification information of different clients.
  • the storage method of the preset database may adopt a key/value storage mode, and a key Corresponding to the identification information of the client, the value corresponds to the harassment contact information corresponding to the client.
  • the harassment contact information corresponding to the client may be compressed and saved in the preset database.
  • the step 103 may include: if the received identification information of the client carried in the harassment contact information acquisition request sent by the client is consistent with the identification information of the client in the preset database. And transmitting the harassment contact information to the client. If the identification information of the client does not exist in the preset database, the harassment contact information is not sent to the client.
  • the method for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client;
  • the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of the client is stored in the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database;
  • the harassment contact information is sent to the client.
  • the embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.
  • this embodiment provides another method for distributing harassment contact information. As shown in FIG. 2, the method includes:
  • the log of the client access server records the interaction information between the client and the server, and the interaction process between the client and the server may be: if there is contact information in the client that is marked as harassing the contact information by the user, The client sends the harassment contact information to the server; or the client requests the server to obtain the harassment contact information.
  • the server needs to access the server through the network connection, so the client can obtain the corresponding client according to the log of the access server. IP address.
  • the preset time range may be set according to the requirements of the user, which is not limited in the embodiment of the present invention.
  • the preset time range can be three days or one week.
  • the step 202 may be specifically: if the client and each client connect to each other through the same WiFi, the IP address of the client is the same as the IP address corresponding to each client.
  • the harassment contact information corresponding to each client whose IP address is the same as the IP address corresponding to the client it is possible to implement recommended harassment contact information for each user, for example, recommending an Android system user report to the ios system user. Harassment contact information.
  • the method further includes: obtaining, from the preset database, similar harassment contact information of the harassment contact information corresponding to the respective clients.
  • the similar harassment contact information of the harassment contact information corresponding to each client may be obtained through the harassment contact information corresponding to each client, specifically according to a traditional collaborative filtering algorithm, such as user-based ( The user-based, item-based (project-based) algorithm is used to solve the harassment contact information corresponding to each client.
  • the harassment contact information received by each user is different, and for similar users, such as the user's geographical proximity and similar positions, the received harassment contact information will be similar.
  • it is possible to recommend more harassing contact information for each user thereby covering as much harassment as possible while ensuring a small amount of storage. Contact information to further improve the security of the terminal device.
  • the identification information of the client is used to distinguish different clients.
  • the identification information of the client may be the MAC address of the client and/or the IMEI, the IP address of the client, the attribution of the client usage number, or the GPS, the IMSI, etc., which are not limited in the embodiment of the present invention.
  • the step 203 may be: establishing a correspondence between the identification information of the client and the harassment contact information corresponding to each client and the similar harassment contact information, and saving the In the preset database.
  • the harassment contact information corresponding to each client and the similar harassment contact information may be merged into harassment.
  • the contact information list is saved to the preset database in a compressed form.
  • the storage mode of the preset database may be a key/value storage mode, where the key corresponds to the identification information of the client, and the value corresponds to the compression list of the harassment contact information corresponding to the client.
  • the harassment contact information obtaining request carries the identification information of the client.
  • the preset database stores the harassment contact information corresponding to the identification information of the different clients, and the preset database further stores the harassment contact information corresponding to the different regions whose frequency of occurrence is greater than or equal to the preset threshold.
  • the step 205 may be: obtaining, according to the identification information of the client, the harassment contact information corresponding to the regional information that is greater than or equal to a preset threshold.
  • the obtaining the regional information corresponding to the client according to the identifier information of the client may be: according to the identifier information of the client, for example, the IP address of the client and the attribution of the client usage number. Or GPS and other information, you can locate the geographical information corresponding to the client.
  • the area information corresponding to the client may be the city where the client is located.
  • the preset threshold may be set according to a user's needs, or may be set according to a default mode.
  • the storage method of the preset database may be a key/value storage mode, and the key may also correspond to the regional information corresponding to the client, and the value may also correspond to the harassment contact whose corresponding frequency is greater than or equal to the preset threshold. information.
  • the preset threshold may be set as the number of times the harassment contact information ranked by the 5000th dialed frequency is marked. If the harassment contact information of the 5000th ranked frequency is marked as 1000 times, the harassment contact information corresponding to the geographic information whose occurrence frequency is greater than or equal to the preset threshold is the city where the client is located. The harassment contact information is marked with a number of times greater than or equal to 1000 times. If the city where the client is located is Beijing, when the client requests the harassment contact information of the Beijing Municipality, the preset threshold is set to 1000 times, and the number of times the Beijing is marked is greater than or from the preset database. Equal to 1000 times of harassing contact information, and then send the harassment contact information of Beijing marked times greater than or equal to 1000 times to the client. The harassment contact information of the top 5000 frequency dialed in Beijing will be sent to the client.
  • the basic harassment contact information may be saved in the preset database, where the basic harassment contact information is that the frequency of occurrence of the harassment contact information stored in the preset database is greater than or equal to a preset threshold. Harassment contact information. If the location information corresponding to the client is not saved in the preset database, the basic harassment contact information is obtained from the preset database; and the basic harassment contact information is sent to the client.
  • the basic harassment contact information may be harassment contact information whose frequency is greater than or equal to a preset threshold in all harassment contact information of the country where the client corresponds to the location. For example, if the client corresponds to the region of Beijing and the country of Beijing is China, the basic harassment contact information is all cities in China, such as Beijing, Tianjin, Shanghai, Shenzhen, etc. Or the sum of the harassment contact information equal to the preset threshold. After receiving the harassment contact information of the Beijing Municipality, the preset threshold is set to 1000 times. If the harassment contact information corresponding to Beijing does not exist in the preset database, from the preset database. Obtain harassment contact information with more than or equal to 1000 times in China, and then send harassment contact information with more than or equal to 1000 times in China to the client, that is, the 5,000 harassment contact information of China's frequency Sent to the client.
  • a preset threshold in all harassment contact information of the country where the client corresponds to the location. For example, if the client corresponds to the region of Beijing and the country of Beijing is China
  • the step 206 may be specifically: when receiving the harassment contact information acquisition request sent by the client, the corresponding information of the client may be obtained according to the identifier information of the client corresponding to the key in the preset database.
  • the contact information compression list is harassed, and then the compressed list of the harassment contact information corresponding to the client is sent to the client.
  • the harassing contact information corresponding to the regional information whose frequency of occurrence is greater than or equal to a preset threshold is obtained according to the regional information corresponding to the client corresponding to the key in the preset database, and then the frequency of occurrence corresponding to the regional information is greater than or
  • the harassment contact information equal to the preset threshold is sent to the client. If the location information corresponding to the client is not saved in the preset database, the basic harassment contact information is obtained from the preset database; and the basic harassment contact information is sent to the client.
  • the method for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client;
  • the identification information of the client is obtained from the preset database.
  • the embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.
  • the embodiment of the present invention provides a device for distributing contact information.
  • the device includes: a receiving unit 31, an obtaining unit 32, and a sending unit 33.
  • the receiving unit 31 is configured to receive the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client.
  • the obtaining unit 32 is configured to obtain, according to the identification information of the client in the receiving unit 31, the harassment contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients.
  • the harassment contact information corresponding to the identification information is obtained.
  • the sending unit 33 is configured to send the harassment contact information obtained by the acquiring unit 32 to the client.
  • the device for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client;
  • the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of the client is stored in the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database;
  • the harassment contact information is sent to the client.
  • the embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.
  • an embodiment of the present invention provides another apparatus for distributing a contact information, as shown in FIG. 4, the apparatus includes: a receiving unit 41, an acquisition order Element 42, transmitting unit 43, establishing unit 44.
  • the receiving unit 41 is configured to receive a harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client.
  • the obtaining unit 42 is configured to obtain, according to the identification information of the client in the receiving unit 41, the harassing contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients.
  • the harassment contact information corresponding to the identification information is obtained by the obtaining unit 42 to obtain, according to the identification information of the client in the receiving unit 41, the harassing contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients.
  • the harassment contact information corresponding to the identification information is configured to obtain, according to the identification information of the client in the receiving unit 41, the harassing contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients.
  • the sending unit 43 is configured to send the harassment contact information obtained by the obtaining unit 42 to the client.
  • the obtaining unit 42 is further configured to obtain an IP address corresponding to the client from the log information of the accessed server of the client.
  • the obtaining unit 42 is further configured to: obtain, from the preset database, the harassment contact information corresponding to each client in the preset time range, where the IP address is the same as the IP address corresponding to the client.
  • the establishing unit 44 is configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client, and save the information in the preset database.
  • the obtaining unit 42 is further configured to obtain, from the preset database, similar harassment contact information of the harassment contact information corresponding to the respective clients.
  • the establishing unit 44 is specifically configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client and the similar harassment contact information, and save the Set in the database.
  • the obtaining unit 42 is configured to acquire, according to the identifier information of the client, the area information corresponding to the client, and obtain, from the preset database, the harassment corresponding to the area information, where the frequency of occurrence is greater than or equal to a preset threshold. contact information.
  • the obtaining unit 42 is further configured to: if the regional information corresponding to the client is not saved in the preset database, obtain basic harassment contact information from the preset database.
  • the sending unit 43 is further configured to send the basic harassment contact information to the client.
  • Another harassment contact information distribution apparatus provided by the embodiment of the present invention first receives a harassment contact information acquisition request sent by a client, where the harassment contact information acquisition request carries the identification information of the client;
  • the spoofing contact information corresponding to the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database;
  • the harassment contact information is sent to the client.
  • the embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of some or all of the components of the harassment contact information distribution method and apparatus in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals.
  • Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 5 schematically illustrates a block diagram of a computing device for performing the method in accordance with the present invention.
  • the computing device conventionally includes a processor 510 and a computer program in the form of a memory 520 Product or computer readable medium.
  • the memory 520 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 520 has a memory space 530 for program code 531 for performing any of the method steps described above.
  • storage space 530 for program code may include various program code 531 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such computer program products are typically portable or fixed storage units as described with reference to FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 520 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit comprises computer readable code 531 ' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 510, which when executed by the computing device causes the calculation The device performs the various steps in the methods described above.
  • the present invention is applicable to computer systems/servers that can operate with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server meters Computer systems, thin clients, thick clients, handheld or laptop devices, microprocessor-based systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and any system including any of the above Distributed cloud computing technology environments, and more.
  • the computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system.
  • program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network.
  • program modules may be located on a local or remote computing system storage medium including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to the technical field of information. Disclosed are a nuisance contact information releasing method and apparatus, which can save the memory of a terminal and improve the precision of stored nuisance contact information. The method comprises: receiving a nuisance contact information acquiring request sent by a client, wherein the nuisance contact information acquiring request carries identifier information of the client; acquiring, according to the identifier information of the client, nuisance contact information corresponding to the identifier information of the client from a preset database, wherein nuisance contact information respectively corresponding to identifier information of different clients is stored in the preset database; and sending the nuisance contact information to the client. The present invention is applicable to the release of nuisance contact information.

Description

骚扰联系人信息发布方法及装置Harassment contact information release method and device 技术领域Technical field

本发明涉及信息领域技术,特别是涉及一种骚扰联系人信息发布方法及装置。The present invention relates to the field of information technology, and in particular, to a method and apparatus for distributing harassment contact information.

背景技术Background technique

随着信息技术的不断发展,终端设备的功能也越来越强大,它给人们带来方便的同时也给人们的生活带来了隐患。其中,骚扰电话就是最大的隐患之一,因此需要将骚扰电话对应的骚扰联系人信息提示给用户。为了将骚扰电话对应的骚扰联系人信息提示给用户,需要预先在终端中存入骚扰联系人信息。With the continuous development of information technology, the functions of terminal devices are becoming more and more powerful, which brings convenience to people and brings hidden dangers to people's lives. Among them, the harassing phone is one of the biggest hidden dangers, so the harassment contact information corresponding to the harassing phone needs to be presented to the user. In order to prompt the user with the harassment contact information corresponding to the harassing call, it is necessary to store the harassment contact information in the terminal in advance.

目前,在预先存储骚扰联系人信息时,需要在终端中存入大量的骚扰联系人信息。然而,在终端中存入大量的骚扰联系人信息会占用较多的终端内存,同时会导致存储的骚扰联系人信息的精度较低。Currently, when pre-storing contact information, it is necessary to deposit a large amount of harassment contact information in the terminal. However, storing a large amount of harassing contact information in the terminal may occupy more terminal memory, and at the same time, the accuracy of the stored harassing contact information is low.

发明内容Summary of the invention

有鉴于此,本发明提供一种骚扰联系人信息发布方法及装置,主要目的在于能够节省终端内存的同时提高存储骚扰联系人信息的精度。In view of this, the present invention provides a method and apparatus for distributing harassment contact information, the main purpose of which is to save terminal memory while improving the accuracy of storing harassment contact information.

依据本发明一个方面,提供了一种骚扰联系人信息发布方法,包括:According to an aspect of the present invention, a method for distributing harassment contact information is provided, including:

接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;Receiving a harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client;

根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;Obtaining, according to the identifier information of the client, the harassment contact information corresponding to the identifier information of the client from the preset database, where the preset database stores harassment contact information corresponding to the identifier information of different clients;

将所述骚扰联系人信息发送给所述客户端。Sending the harassment contact information to the client.

依据本发明另一个方面,提供了一种骚扰联系人信息发布装置,包括:According to another aspect of the present invention, a device for distributing contact information is provided, including:

接收单元,用于接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息; a receiving unit, configured to receive a harassing contact information obtaining request sent by the client, where the harassing contact information obtaining request carries the identification information of the client;

获取单元,用于根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;An obtaining unit, configured to acquire, according to the identification information of the client, the harassment contact information corresponding to the identification information of the client from the preset database, where the preset database stores harassment corresponding to the identification information of different clients respectively contact information;

发送单元,用于将所述骚扰联系人信息发送给所述客户端。And a sending unit, configured to send the harassment contact information to the client.

根据本发明的又一个方面,提出了一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行上文所述的骚扰联系人信息发布方法。According to still another aspect of the present invention, a computer program is presented, comprising computer readable code that, when executed on a computing device, causes the computing device to perform the harassment contact information described above Publishing method.

根据本发明的再一个方面,提出了一种计算机可读介质,其中存储了上述的计算机程序。According to still another aspect of the present invention, a computer readable medium is proposed, wherein the computer program described above is stored.

借由上述技术方案,本发明实施例提供的技术方案至少具有下列优点:With the above technical solution, the technical solution provided by the embodiment of the present invention has at least the following advantages:

本发明实施例提供一种骚扰联系人信息发布方法及装置,首先接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;然后根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;最后将所述骚扰联系人信息发送给所述客户端。与现有在预先存储骚扰联系人信息时,将大量的骚扰联系人信息存入终端相比,本发明实施例通过将预置数据库中与客户端的标识信息对应的骚扰联系人信息存入到终端,可以实现节省终端内存的同时提高存储骚扰联系人信息的精度。An embodiment of the present invention provides a method and a device for distributing harassment contact information, which firstly receives a harassment contact information acquisition request sent by a client, where the harassment contact information acquisition request carries the identification information of the client; The spoofing contact information corresponding to the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database; The harassment contact information is sent to the client. The embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.

上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.

附图说明DRAWINGS

通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:

图1示出了本发明实施例提供的一种骚扰联系人信息发布方法;FIG. 1 shows a method for distributing harassment contact information according to an embodiment of the present invention;

图2示出了本发明实施例提供的另一种骚扰联系人信息发布方法; FIG. 2 is a diagram showing another method for distributing harassment contact information according to an embodiment of the present invention;

图3示出了本发明实施例提供的一种骚扰联系人信息发布装置;FIG. 3 is a schematic diagram of a harassment contact information distribution apparatus according to an embodiment of the present invention;

图4示出了本发明实施例提供的另一种骚扰联系人信息发布装置;FIG. 4 is a diagram showing another harassment contact information distribution apparatus according to an embodiment of the present invention;

图5示意性地示出了用于执行根据本发明的方法的计算设备的框图;以及Figure 5 shows schematically a block diagram of a computing device for performing the method according to the invention;

图6示意性地示出了用于保持或者携带实现根据本发明的方法的程序代码的存储单元。Fig. 6 schematically shows a storage unit for holding or carrying program code implementing the method according to the invention.

具体实施例Specific embodiment

下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.

本发明实施例提供一种骚扰联系人信息发布方法,如图1所示,所述方法包括:The embodiment of the invention provides a method for distributing harassment contact information. As shown in FIG. 1 , the method includes:

101、接收客户端发送的骚扰联系人信息获取请求。101. Receive a harassment contact information acquisition request sent by the client.

其中,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息。所述骚扰联系人信息可以包括骚扰电话号码、号码归属地信息、骚扰号码所属类型、或者号码所属使用者的信息。例如,骚扰联系人信息的骚扰电话号码为13840001***、号码归属地信息为辽宁沈阳、骚扰号码所属类型为广告推销。所述客户端的标识信息用于区分不同的客户端。所述客户端的标识信息可以为客户端的物理地址(Media Access Control Address,MAC地址)和/或国际移动设备识别码(International Mobile Equipment Identification Number,IMEI)、客户端的IP地址、客户端使用号码的归属地或者全球定位系统(Global Positioning System,GPS)、国际移动用户识别码(IMSI,International Mobile Subscriber Identification Number)等,本发明实施例不做限定。The harassment contact information obtaining request carries the identification information of the client. The harassment contact information may include an harassment phone number, a number attribution information, a type of the harassment number, or information of a user to whom the number belongs. For example, the harassing phone number for harassing contact information is 13840001 ***, the information of the number attribution is Shenyang, Liaoning, and the type of harassment number is advertising. The identification information of the client is used to distinguish different clients. The identification information of the client may be a physical address (Media Access Control Address, MAC address) of the client and/or an International Mobile Equipment Identification Number (IMEI), an IP address of the client, and a attribution of the client usage number. The embodiment of the present invention is not limited to the ground or the Global Positioning System (GPS), the International Mobile Subscriber Identification Number (IMSI), and the like.

102、根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息。102. Acquire, according to the identifier information of the client, the harassment contact information corresponding to the identifier information of the client from the preset database.

其中,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息。所述预置数据库的存储方式可以采用key/value存储方式,key 对应所述客户端的标识信息,value对应所述客户端对应的骚扰联系人信息。对于本发明实施例,可以将所述客户端对应的骚扰联系人信息进行压缩后保存在所述预置数据库。The preset database stores the harassment contact information corresponding to the identification information of different clients. The storage method of the preset database may adopt a key/value storage mode, and a key Corresponding to the identification information of the client, the value corresponds to the harassment contact information corresponding to the client. For the embodiment of the present invention, the harassment contact information corresponding to the client may be compressed and saved in the preset database.

103、将所述骚扰联系人信息发送给所述客户端。103. Send the harassment contact information to the client.

对于本发明实施例,步骤103具体可以包括:如果接收到的客户端发送的骚扰联系人信息获取请求中携带的所述客户端的标识信息与所述预置数据库中的所述客户端的标识信息一致,则将所述骚扰联系人信息发送给所述客户端。如果在所述预置数据库中不存在所述客户端的标识信息,则不向所述客户端发送骚扰联系人信息。For the embodiment of the present invention, the step 103 may include: if the received identification information of the client carried in the harassment contact information acquisition request sent by the client is consistent with the identification information of the client in the preset database. And transmitting the harassment contact information to the client. If the identification information of the client does not exist in the preset database, the harassment contact information is not sent to the client.

本发明实施例提供的一种骚扰联系人信息发布方法,首先接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;然后根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;最后将所述骚扰联系人信息发送给所述客户端。与现有在预先存储骚扰联系人信息时,将大量的骚扰联系人信息存入终端相比,本发明实施例通过将预置数据库中与客户端的标识信息对应的骚扰联系人信息存入到终端,可以实现节省终端内存的同时提高存储骚扰联系人信息的精度。The method for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client; The identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of the client is stored in the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database; The harassment contact information is sent to the client. The embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.

进一步地,本实施例提供另一种骚扰联系人信息发布方法,如图2所示,所述方法包括:Further, this embodiment provides another method for distributing harassment contact information. As shown in FIG. 2, the method includes:

201、从记录的客户端访问服务器的日志信息中,获取所述客户端对应的IP地址。201. Obtain an IP address corresponding to the client from the log information of the recorded client access server.

其中,客户端访问服务器的日志记录了客户端与服务器的交互信息,客户端与服务器的交互过程具体可以为:若所述客户端中存在被用户标记为骚扰联系人信息的联系人信息,所述客户端则将所述骚扰联系人信息发送到服务器;或者所述客户端向服务器请求获取骚扰联系人信息。所述客户端将骚扰联系人信息发送到服务器或者所述客户端向服务器请求获取骚扰联系人信息时,需要通过网络连接访问服务器,因此客户端根据访问服务器的日志可以获取所述客户端对应的IP地址。 The log of the client access server records the interaction information between the client and the server, and the interaction process between the client and the server may be: if there is contact information in the client that is marked as harassing the contact information by the user, The client sends the harassment contact information to the server; or the client requests the server to obtain the harassment contact information. When the client sends the harassment contact information to the server or the client requests the server to obtain the harassment contact information, the server needs to access the server through the network connection, so the client can obtain the corresponding client according to the log of the access server. IP address.

202、从所述预置数据库中获取预置时间范围内,IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息。202. Obtain, from the preset database, the harassment contact information corresponding to each client that has the same IP address and the IP address corresponding to the client in the preset time range.

其中,所述预置时间范围可以根据用户的需求设定,本发明实施例不做限定。例如,所述预置时间范围可以为三天或者一个星期。The preset time range may be set according to the requirements of the user, which is not limited in the embodiment of the present invention. For example, the preset time range can be three days or one week.

对于本发明实施例,步骤202具体可以为:如果所述客户端与各个客户端通过同一WiFi进行网络连接,则所述客户端的IP地址与各个客户端对应的IP地址相同。通过获取IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息,可以实现针对每个用户进行推荐骚扰联系人信息,例如,向ios系统用户推荐安卓系统用户上报的骚扰联系人信息。For the embodiment of the present invention, the step 202 may be specifically: if the client and each client connect to each other through the same WiFi, the IP address of the client is the same as the IP address corresponding to each client. By obtaining the harassment contact information corresponding to each client whose IP address is the same as the IP address corresponding to the client, it is possible to implement recommended harassment contact information for each user, for example, recommending an Android system user report to the ios system user. Harassment contact information.

可选地,步骤202之后还可以包括:从所述预置数据库中获取与所述各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息。Optionally, after step 202, the method further includes: obtaining, from the preset database, similar harassment contact information of the harassment contact information corresponding to the respective clients.

对于本发明实施例,各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息可以通过各个客户端分别对应的骚扰联系人信息得到,具体地可以根据传统协同过滤算法,如user-based(基于用户)、item-based(基于项目)算法等进行求解得到各个客户端分别对应的骚扰联系人信息。每个用户接收到的骚扰联系人信息不同,而对于相似的用户如用户的地域相近、职位相近,接收到的骚扰联系人信息会比较相似。通过各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息,可以实现针对每个用户进行推荐更多的骚扰联系人信息,从而在保证存储量不大的情况下覆盖尽可能多的骚扰联系人信息,进而进一步提高终端设备的安全性。For the embodiment of the present invention, the similar harassment contact information of the harassment contact information corresponding to each client may be obtained through the harassment contact information corresponding to each client, specifically according to a traditional collaborative filtering algorithm, such as user-based ( The user-based, item-based (project-based) algorithm is used to solve the harassment contact information corresponding to each client. The harassment contact information received by each user is different, and for similar users, such as the user's geographical proximity and similar positions, the received harassment contact information will be similar. Through the similar harassment contact information of the harassment contact information corresponding to each client, it is possible to recommend more harassing contact information for each user, thereby covering as much harassment as possible while ensuring a small amount of storage. Contact information to further improve the security of the terminal device.

203、建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息之间的对应关系并保存在所述预置数据库中。203. Establish a correspondence between the identifier information of the client and the harassment contact information corresponding to each client, and save the relationship in the preset database.

其中,所述客户端的标识信息用于区分不同的客户端。所述客户端的标识信息可以为客户端的MAC地址和/或IMEI、客户端的IP地址、客户端使用号码归属地或者GPS、IMSI等,本发明实施例不做限定。The identification information of the client is used to distinguish different clients. The identification information of the client may be the MAC address of the client and/or the IMEI, the IP address of the client, the attribution of the client usage number, or the GPS, the IMSI, etc., which are not limited in the embodiment of the present invention.

对于本发明实施例,步骤203具体可以为:建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息和与所述相似骚扰联系人信息之间的对应关系,并保存在所述预置数据库中。其中,可以将所述各个客户端分别对应的骚扰联系人信息和与所述相似骚扰联系人信息合并成骚扰 联系人信息列表并且以压缩的形式保存到所述预置数据库。其中,所述预置数据库的存储方式可以为key/value存储方式,key对应所述客户端的标识信息,value对应所述客户端对应的骚扰联系人信息压缩列表。For the embodiment of the present invention, the step 203 may be: establishing a correspondence between the identification information of the client and the harassment contact information corresponding to each client and the similar harassment contact information, and saving the In the preset database. The harassment contact information corresponding to each client and the similar harassment contact information may be merged into harassment. The contact information list is saved to the preset database in a compressed form. The storage mode of the preset database may be a key/value storage mode, where the key corresponds to the identification information of the client, and the value corresponds to the compression list of the harassment contact information corresponding to the client.

204、接收客户端发送的骚扰联系人信息获取请求。204. Receive a harassment contact information acquisition request sent by the client.

其中,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息。The harassment contact information obtaining request carries the identification information of the client.

205、根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息。205. Acquire, according to the identifier information of the client, the harassment contact information corresponding to the identifier information of the client from the preset database.

其中,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;所述预置数据库中还保存有不同地域分别对应的出现频率大于或等于预设阈值的骚扰联系人信息。对于本发明实施例,步骤205具体可以为:根据所述客户端的标识信息,从所述预置数据库中获取与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息。The preset database stores the harassment contact information corresponding to the identification information of the different clients, and the preset database further stores the harassment contact information corresponding to the different regions whose frequency of occurrence is greater than or equal to the preset threshold. . For the embodiment of the present invention, the step 205 may be: obtaining, according to the identification information of the client, the harassment contact information corresponding to the regional information that is greater than or equal to a preset threshold.

对于本发明实施例,根据所述客户端的标识信息,获取所述客户端对应的地域信息具体可以为:根据所述客户端的标识信息,例如所述客户端的IP地址、客户端使用号码的归属地或者GPS等信息,可以定位到客户端对应的地域信息。其中,所述客户端对应的地域信息可以为所述客户端的所在城市。所述预设阈值可以根据用户的需求设置,也可以根据默认模式设置。所述预置数据库的存储方式可以采用key/value存储方式,key还可以对应所述客户端对应的地域信息,value还可以对应与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息。For the embodiment of the present invention, the obtaining the regional information corresponding to the client according to the identifier information of the client may be: according to the identifier information of the client, for example, the IP address of the client and the attribution of the client usage number. Or GPS and other information, you can locate the geographical information corresponding to the client. The area information corresponding to the client may be the city where the client is located. The preset threshold may be set according to a user's needs, or may be set according to a default mode. The storage method of the preset database may be a key/value storage mode, and the key may also correspond to the regional information corresponding to the client, and the value may also correspond to the harassment contact whose corresponding frequency is greater than or equal to the preset threshold. information.

例如,获取所述客户端对应的地域被拨打频率排名前5000名的骚扰联系人信息,所述预设阈值可以设置为被拨打频率排名第5000名的骚扰联系人信息被标记的次数。若被拨打频率排名第5000名的骚扰联系人信息被标记次数为1000次,则所述地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息,即为所述客户端的所在城市被标记次数大于或等于1000次的骚扰联系人信息。若所述客户端的所在城市为北京市,当接收到客户端请求北京市的骚扰联系人信息后,将预设阈值设置为1000次,从所述预置数据库中获取北京市被标记次数大于或等于1000次的骚扰联系人信息,然后将北京市被标记次数大于或等于1000次的骚扰联系人信息发送给客户端, 即将北京市被拨打频率排名前5000的骚扰联系人信息发送给客户端。For example, the 5,000-member harassment contact information of the top-ranked area corresponding to the frequency of the client is obtained, and the preset threshold may be set as the number of times the harassment contact information ranked by the 5000th dialed frequency is marked. If the harassment contact information of the 5000th ranked frequency is marked as 1000 times, the harassment contact information corresponding to the geographic information whose occurrence frequency is greater than or equal to the preset threshold is the city where the client is located. The harassment contact information is marked with a number of times greater than or equal to 1000 times. If the city where the client is located is Beijing, when the client requests the harassment contact information of the Beijing Municipality, the preset threshold is set to 1000 times, and the number of times the Beijing is marked is greater than or from the preset database. Equal to 1000 times of harassing contact information, and then send the harassment contact information of Beijing marked times greater than or equal to 1000 times to the client. The harassment contact information of the top 5000 frequency dialed in Beijing will be sent to the client.

206、将所述骚扰联系人信息发送给所述客户端。206. Send the harassment contact information to the client.

对于本发明实施例,所述预置数据库中还可以保存有基础骚扰联系人信息,所述基础骚扰联系信息为所述预置数据库中保存的骚扰联系人信息中出现频率大于或等于预设阈值的骚扰联系人信息。若所述预置数据库中未保存所述客户端对应的地域信息,则从所述预置数据库中获取基础骚扰联系人信息;将所述基础骚扰联系人信息发送给所述客户端。For the embodiment of the present invention, the basic harassment contact information may be saved in the preset database, where the basic harassment contact information is that the frequency of occurrence of the harassment contact information stored in the preset database is greater than or equal to a preset threshold. Harassment contact information. If the location information corresponding to the client is not saved in the preset database, the basic harassment contact information is obtained from the preset database; and the basic harassment contact information is sent to the client.

其中,所述基础骚扰联系人信息可以为所述客户端对应的地域所在国家的全部骚扰联系人信息中出现频率大于或等于预设阈值的骚扰联系人信息。例如,所述客户端对应的地域为北京市,北京市所在国家为中国,则所述基础骚扰联系人信息为中国所有城市,如北京市、天津市、上海市、深圳市等城市出现频率大于或等于预设阈值的骚扰联系人信息的总和。当接收到客户端请求北京市的骚扰联系人信息后,将预设阈值设置为1000次,如果所述预置数据库中不存在北京市对应的骚扰联系人信息,则从所述预置数据库中获取中国被标记次数大于或等于1000次的骚扰联系人信息,然后将中国被标记次数大于或等于1000次的骚扰联系人信息发送给客户端,即将中国被拨打频率排名前5000的骚扰联系人信息发送给客户端。The basic harassment contact information may be harassment contact information whose frequency is greater than or equal to a preset threshold in all harassment contact information of the country where the client corresponds to the location. For example, if the client corresponds to the region of Beijing and the country of Beijing is China, the basic harassment contact information is all cities in China, such as Beijing, Tianjin, Shanghai, Shenzhen, etc. Or the sum of the harassment contact information equal to the preset threshold. After receiving the harassment contact information of the Beijing Municipality, the preset threshold is set to 1000 times. If the harassment contact information corresponding to Beijing does not exist in the preset database, from the preset database. Obtain harassment contact information with more than or equal to 1000 times in China, and then send harassment contact information with more than or equal to 1000 times in China to the client, that is, the 5,000 harassment contact information of China's frequency Sent to the client.

对于本发明实施例,步骤206具体可以为:当接收到客户端发送的骚扰联系人信息获取请求时,可以根据预置数据库中key对应的所述客户端的标识信息,获取所述客户端对应的骚扰联系人信息压缩列表,然后将所述客户端对应的骚扰联系人信息压缩列表发送给所述客户端。也可以根据预置数据库中key对应的所述客户端对应的地域信息,获取与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息,然后将与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息发送给所述客户端。如果所述预置数据库中未保存所述客户端对应的地域信息,则从所述预置数据库中获取基础骚扰联系人信息;然后将所述基础骚扰联系人信息发送给所述客户端。For the embodiment of the present invention, the step 206 may be specifically: when receiving the harassment contact information acquisition request sent by the client, the corresponding information of the client may be obtained according to the identifier information of the client corresponding to the key in the preset database. The contact information compression list is harassed, and then the compressed list of the harassment contact information corresponding to the client is sent to the client. The harassing contact information corresponding to the regional information whose frequency of occurrence is greater than or equal to a preset threshold is obtained according to the regional information corresponding to the client corresponding to the key in the preset database, and then the frequency of occurrence corresponding to the regional information is greater than or The harassment contact information equal to the preset threshold is sent to the client. If the location information corresponding to the client is not saved in the preset database, the basic harassment contact information is obtained from the preset database; and the basic harassment contact information is sent to the client.

本发明实施例提供的另一种骚扰联系人信息发布方法,首先接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;然后根据所述客户端的标识信息,从预置数据库中获 取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;最后将所述骚扰联系人信息发送给所述客户端。与现有在预先存储骚扰联系人信息时,将大量的骚扰联系人信息存入终端相比,本发明实施例通过将预置数据库中与客户端的标识信息对应的骚扰联系人信息存入到终端,可以实现节省终端内存的同时提高存储骚扰联系人信息的精度。The method for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client; The identification information of the client is obtained from the preset database. Obtaining the harassing contact information corresponding to the identification information of the client, where the preset database stores harassment contact information corresponding to the identification information of different clients; and finally sending the harassment contact information to the client . The embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.

进一步地,作为图1所述方法的具体实现,本发明实施例提供一种骚扰联系人信息发布装置,如图3所示,所述装置包括:接收单元31,获取单元32,发送单元33。Further, as a specific implementation of the method shown in FIG. 1, the embodiment of the present invention provides a device for distributing contact information. As shown in FIG. 3, the device includes: a receiving unit 31, an obtaining unit 32, and a sending unit 33.

接收单元31,用于接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息。The receiving unit 31 is configured to receive the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client.

获取单元32,用于根据所述接收单元31中的客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息。The obtaining unit 32 is configured to obtain, according to the identification information of the client in the receiving unit 31, the harassment contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients. The harassment contact information corresponding to the identification information.

发送单元33,用于将通过所述获取单元32获得的所述骚扰联系人信息发送给所述客户端。The sending unit 33 is configured to send the harassment contact information obtained by the acquiring unit 32 to the client.

需要说明的是,本发明实施例提供的骚扰联系人信息发布装置所涉及各功能单元的其他相应描述,可以参考图1中的对应描述,在此不再赘述。It should be noted that other corresponding descriptions of the functional units involved in the harassment contact information distribution apparatus provided by the embodiment of the present invention may be referred to the corresponding description in FIG. 1 and will not be further described herein.

本发明实施例提供的一种骚扰联系人信息发布装置,首先接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;然后根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;最后将所述骚扰联系人信息发送给所述客户端。与现有在预先存储骚扰联系人信息时,将大量的骚扰联系人信息存入终端相比,本发明实施例通过将预置数据库中与客户端的标识信息对应的骚扰联系人信息存入到终端,可以实现节省终端内存的同时提高存储骚扰联系人信息的精度。The device for distributing the harassment contact information provided by the embodiment of the present invention firstly receives the harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client; The identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of the client is stored in the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database; The harassment contact information is sent to the client. The embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.

进一步地,作为图2所述方法的具体实现,本发明实施例提供另一种骚扰联系人信息发布装置,如图4所示,所述装置包括:接收单元41,获取单 元42,发送单元43,建立单元44。Further, as a specific implementation of the method in FIG. 2, an embodiment of the present invention provides another apparatus for distributing a contact information, as shown in FIG. 4, the apparatus includes: a receiving unit 41, an acquisition order Element 42, transmitting unit 43, establishing unit 44.

接收单元41,用于接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息。The receiving unit 41 is configured to receive a harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client.

获取单元42,用于根据所述接收单元41中的客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息。The obtaining unit 42 is configured to obtain, according to the identification information of the client in the receiving unit 41, the harassing contact information corresponding to the identification information of the client from the preset database, where the preset database stores different clients. The harassment contact information corresponding to the identification information.

发送单元43,用于将通过所述获取单元42获得的所述骚扰联系人信息发送给所述客户端。The sending unit 43 is configured to send the harassment contact information obtained by the obtaining unit 42 to the client.

所述获取单元42,还用于从记录的所述客户端的访问服务器的日志信息中,获取所述客户端对应的IP地址。The obtaining unit 42 is further configured to obtain an IP address corresponding to the client from the log information of the accessed server of the client.

所述获取单元42,还用于从所述预置数据库中获取预置时间范围内,IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息。The obtaining unit 42 is further configured to: obtain, from the preset database, the harassment contact information corresponding to each client in the preset time range, where the IP address is the same as the IP address corresponding to the client.

建立单元44,用于建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息之间的对应关系并保存在所述预置数据库中。The establishing unit 44 is configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client, and save the information in the preset database.

所述获取单元42,还用于从所述预置数据库中获取与所述各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息。The obtaining unit 42 is further configured to obtain, from the preset database, similar harassment contact information of the harassment contact information corresponding to the respective clients.

所述建立单元44,具体用于建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息和与所述相似骚扰联系人信息之间的对应关系,并保存在所述预置数据库中。The establishing unit 44 is specifically configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client and the similar harassment contact information, and save the Set in the database.

所述获取单元42,具体用于根据所述客户端的标识信息,获取所述客户端对应的地域信息;从所述预置数据库中获取与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息。The obtaining unit 42 is configured to acquire, according to the identifier information of the client, the area information corresponding to the client, and obtain, from the preset database, the harassment corresponding to the area information, where the frequency of occurrence is greater than or equal to a preset threshold. contact information.

所述获取单元42,还用于若所述预置数据库中未保存所述客户端对应的地域信息,则从所述预置数据库中获取基础骚扰联系人信息。The obtaining unit 42 is further configured to: if the regional information corresponding to the client is not saved in the preset database, obtain basic harassment contact information from the preset database.

所述发送单元43,还用于将所述基础骚扰联系人信息发送给所述客户端。The sending unit 43 is further configured to send the basic harassment contact information to the client.

需要说明的是,本发明实施例提供的骚扰联系人信息发布装置所涉及各功能单元的其他相应描述,可以参考图2中的对应描述,在此不再赘述。 It should be noted that other corresponding descriptions of the functional units involved in the harassment contact information distribution apparatus provided by the embodiment of the present invention may be referred to the corresponding description in FIG. 2, and details are not described herein again.

本发明实施例提供的另一种骚扰联系人信息发布装置,首先接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;然后根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;最后将所述骚扰联系人信息发送给所述客户端。与现有在预先存储骚扰联系人信息时,将大量的骚扰联系人信息存入终端相比,本发明实施例通过将预置数据库中与客户端的标识信息对应的骚扰联系人信息存入到终端,可以实现节省终端内存的同时提高存储骚扰联系人信息的精度。Another harassment contact information distribution apparatus provided by the embodiment of the present invention first receives a harassment contact information acquisition request sent by a client, where the harassment contact information acquisition request carries the identification information of the client; The spoofing contact information corresponding to the identification information of the client is obtained from the preset database, and the harassment contact information corresponding to the identification information of different clients is stored in the preset database; The harassment contact information is sent to the client. The embodiment of the present invention stores the harassment contact information corresponding to the identification information of the client in the preset database to the terminal, compared with the existing harassment contact information stored in the terminal. It can save the terminal memory while improving the accuracy of storing the harassment contact information.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.

可以理解的是,上述方法及装置中的相关特征可以相互参考。另外,上述实施例中的“第一”、“第二”等是用于区分各实施例,而并不代表各实施例的优劣。It will be appreciated that related features in the above methods and apparatus can be referenced to each other. In addition, "first", "second", and the like in the above embodiments are used to distinguish the embodiments, and do not represent the advantages and disadvantages of the embodiments.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.

在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.

类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求 中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed should not be construed as reflecting the intent that the claimed invention is claimed in the claims More features are clearly described in the feature. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.

此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的骚扰联系人信息发布方法及装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of some or all of the components of the harassment contact information distribution method and apparatus in accordance with embodiments of the present invention. Features. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.

例如,图5示意性地示出了用于执行根据本发明的方法的计算设备的框图。该计算设备传统上包括处理器510和以存储器520形式的计算机程序产 品或者计算机可读介质。存储器520可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器520具有用于执行上述方法中的任何方法步骤的程序代码531的存储空间530。例如,用于程序代码的存储空间530可以包括分别用于实现上面的方法中的各种步骤的各个程序代码531。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图6所述的便携式或者固定存储单元。该存储单元可以具有与图5的计算设备中的存储器520类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括用于执行根据本发明的方法步骤的计算机可读代码531’,即可以由例如诸如510之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。For example, Figure 5 schematically illustrates a block diagram of a computing device for performing the method in accordance with the present invention. The computing device conventionally includes a processor 510 and a computer program in the form of a memory 520 Product or computer readable medium. The memory 520 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. Memory 520 has a memory space 530 for program code 531 for performing any of the method steps described above. For example, storage space 530 for program code may include various program code 531 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such computer program products are typically portable or fixed storage units as described with reference to FIG. The storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 520 in the computing device of FIG. The program code can be compressed, for example, in an appropriate form. In general, the storage unit comprises computer readable code 531 ' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 510, which when executed by the computing device causes the calculation The device performs the various steps in the methods described above.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.

此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。In addition, it should be noted that the language used in the specification has been selected for the purpose of readability and teaching, and is not intended to be construed or limited. Therefore, many modifications and changes will be apparent to those skilled in the art without departing from the scope of the invention. The disclosure of the present invention is intended to be illustrative, and not restrictive, and the scope of the invention is defined by the appended claims.

本发明可以应用于计算机系统/服务器,其可与众多其它通用或专用计算系统环境或配置一起操作。适于与计算机系统/服务器一起使用的众所周知的计算系统、环境和/或配置的例子包括但不限于:个人计算机系统、服务器计 算机系统、瘦客户机、厚客户机、手持或膝上设备、基于微处理器的系统、机顶盒、可编程消费电子产品、网络个人电脑、小型计算机系统、大型计算机系统和包括上述任何系统的分布式云计算技术环境,等等。The present invention is applicable to computer systems/servers that can operate with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server meters Computer systems, thin clients, thick clients, handheld or laptop devices, microprocessor-based systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and any system including any of the above Distributed cloud computing technology environments, and more.

计算机系统/服务器可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。The computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system. Generally, program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types. The computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network. In a distributed cloud computing environment, program modules may be located on a local or remote computing system storage medium including storage devices.

本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。 "an embodiment," or "an embodiment," or "an embodiment," In addition, it is noted that the phrase "in one embodiment" is not necessarily referring to the same embodiment.

Claims (12)

一种骚扰联系人信息发布方法,其特征在于,包括:A method for distributing harassment contact information, comprising: 接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;Receiving a harassment contact information acquisition request sent by the client, where the harassment contact information acquisition request carries the identification information of the client; 根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;Obtaining, according to the identifier information of the client, the harassment contact information corresponding to the identifier information of the client from the preset database, where the preset database stores harassment contact information corresponding to the identifier information of different clients; 将所述骚扰联系人信息发送给所述客户端。Sending the harassment contact information to the client. 根据权利要求1所述的骚扰联系人信息发布方法,其特征在于,所述接收客户端发送的骚扰联系人信息获取请求之前,还包括:The harassment contact information issuance method according to claim 1, wherein before the receiving the harassment contact information acquisition request sent by the client, the method further includes: 从记录的所述客户端访问服务器的日志信息中,获取所述客户端对应的IP地址;Obtaining an IP address corresponding to the client from the recorded log information of the client access server; 从所述预置数据库中获取预置时间范围内,IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息;Obtaining, from the preset database, the harassment contact information corresponding to each client whose IP address is the same as the IP address corresponding to the client in the preset time range; 建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息之间的对应关系并保存在所述预置数据库中。Corresponding relationship between the identification information of the client and the harassment contact information corresponding to each client is established and saved in the preset database. 根据权利要求2所述的骚扰联系人信息发布方法,其特征在于,所述从所述预置数据库中获取预置时间范围内,IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息之后,还包括:The method for distributing a harassment contact information according to claim 2, wherein the obtaining, from the preset database, each client having the same IP address as the IP address corresponding to the client within a preset time range After the corresponding harassment contact information, it also includes: 从所述预置数据库中获取与所述各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息;Obtaining similar harassment contact information of the harassment contact information corresponding to each of the respective clients from the preset database; 所述建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息之间的对应关系并保存在所述预置数据库中包括:The establishing a correspondence between the identifier information of the client and the harassment contact information corresponding to each client and saving in the preset database includes: 建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息和与所述相似骚扰联系人信息之间的对应关系,并保存在所述预置数据库中。Establishing a correspondence between the identification information of the client and the harassment contact information corresponding to each of the clients and the similar harassment contact information, and saving the information in the preset database. 根据权利要求1所述的骚扰联系人信息发布方法,其特征在于,所述预置数据库中还保存有不同地域分别对应的出现频率大于或等于预设阈值的骚扰联系人信息;The harassment contact information issuance method according to claim 1, wherein the preset database further stores harassment contact information corresponding to different regions whose frequency of occurrence is greater than or equal to a preset threshold; 所述根据所述客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息包括: Obtaining the harassing contact information corresponding to the identifier information of the client from the preset database according to the identifier information of the client includes: 根据所述客户端的标识信息,获取所述客户端对应的地域信息;Obtaining, according to the identifier information of the client, the area information corresponding to the client; 从所述预置数据库中获取与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息。The harassment contact information corresponding to the area information and having an occurrence frequency greater than or equal to a preset threshold is obtained from the preset database. 根据权利要求4所述的骚扰联系人信息发布方法,其特征在于,所述预置数据库中还保存有基础骚扰联系人信息,所述基础骚扰联系信息为所述预置数据库中保存的骚扰联系人信息中出现频率大于或等于预设阈值的骚扰联系人信息;所述方法还包括:The harassment contact information issuance method according to claim 4, wherein the preset database further stores basic harassment contact information, and the basic harassment contact information is a harassment contact stored in the preset database. The harassment contact information whose frequency is greater than or equal to the preset threshold occurs in the person information; the method further includes: 若所述预置数据库中未保存所述客户端对应的地域信息,则从所述预置数据库中获取基础骚扰联系人信息;If the location information corresponding to the client is not saved in the preset database, obtaining basic harassment contact information from the preset database; 将所述基础骚扰联系人信息发送给所述客户端。Sending the basic harassment contact information to the client. 一种骚扰联系人信息发布装置,其特征在于,包括:An apparatus for distributing harassment contact information, comprising: 接收单元,用于接收客户端发送的骚扰联系人信息获取请求,所述骚扰联系人信息获取请求中携带有所述客户端的标识信息;a receiving unit, configured to receive a harassing contact information obtaining request sent by the client, where the harassing contact information obtaining request carries the identification information of the client; 获取单元,用于根据所述接收单元中的客户端的标识信息,从预置数据库中获取与所述客户端的标识信息对应的骚扰联系人信息,所述预置数据库中保存有不同客户端的标识信息分别对应的骚扰联系人信息;An obtaining unit, configured to acquire, according to the identifier information of the client in the receiving unit, the harassing contact information corresponding to the identifier information of the client from the preset database, where the preset database stores identifier information of different clients Corresponding harassment contact information; 发送单元,用于将通过所述获取单元获得的所述骚扰联系人信息发送给所述客户端。And a sending unit, configured to send the harassment contact information obtained by the acquiring unit to the client. 根据权利要求6所述的骚扰联系人信息发布装置,其特征在于,还包括:建立单元;The device for distributing harassment contact information according to claim 6, further comprising: an establishing unit; 所述获取单元,还用于从记录的所述客户端的访问服务器的日志信息中,获取所述客户端对应的IP地址;The obtaining unit is further configured to obtain, from the log information of the accessed server of the client, the IP address corresponding to the client; 所述获取单元,还用于从所述预置数据库中获取预置时间范围内,IP地址与所述客户端对应的IP地址相同的各个客户端分别对应的骚扰联系人信息;The obtaining unit is further configured to: obtain, from the preset database, the harassment contact information corresponding to each client in the preset time range, where the IP address is the same as the IP address corresponding to the client; 所述建立单元,用于建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息之间的对应关系并保存在所述预置数据库中。The establishing unit is configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client, and save the information in the preset database. 根据权利要求7所述的骚扰联系人信息发布装置,其特征在于,The apparatus for distributing harassment contact information according to claim 7, wherein: 所述获取单元,还用于从所述预置数据库中获取与所述各个客户端分别对应的骚扰联系人信息的相似骚扰联系人信息;The obtaining unit is further configured to acquire, from the preset database, similar harassment contact information of the harassment contact information corresponding to each of the respective clients; 所述建立单元,具体用于建立所述客户端的标识信息与所述各个客户端分别对应的骚扰联系人信息和与所述相似骚扰联系人信息之间的对应关系, 并保存在所述预置数据库中The establishing unit is specifically configured to establish a correspondence between the identification information of the client and the harassment contact information corresponding to each client and the similar harassment contact information. And saved in the preset database 根据权利要求6所述的骚扰联系人信息发布装置,其特征在于,所述预置数据库中还保存有不同地域分别对应的出现频率大于或等于预设阈值的骚扰联系人信息;The apparatus for distributing harassment contact information according to claim 6, wherein the preset database further stores harassment contact information corresponding to different regions whose frequency of occurrence is greater than or equal to a preset threshold; 所述获取单元,具体用于根据所述客户端的标识信息,获取所述客户端对应的地域信息;从所述预置数据库中获取与地域信息对应的出现频率大于或等于预设阈值的骚扰联系人信息。The obtaining unit is configured to acquire, according to the identifier information of the client, the area information corresponding to the client, and obtain, from the preset database, the harassment link that the frequency corresponding to the area information is greater than or equal to a preset threshold. People information. 根据权利要求9所述的骚扰联系人信息发布装置,其特征在于,所述预置数据库中还保存有基础骚扰联系人信息,所述基础骚扰联系信息为所述预置数据库中保存的全部骚扰联系人信息中出现频率大于或等于预设阈值的骚扰联系人信息;The apparatus for distributing harassment contact information according to claim 9, wherein the preset database further stores basic harassment contact information, and the basic harassment contact information is all harassment stored in the preset database. The harassment contact information whose frequency is greater than or equal to the preset threshold appears in the contact information; 所述获取单元,还用于若所述预置数据库中未保存所述客户端对应的地域信息,则从所述预置数据库中获取基础骚扰联系人信息;The obtaining unit is further configured to: if the regional information corresponding to the client is not saved in the preset database, obtain basic harassment contact information from the preset database; 所述发送单元,还用于将所述基础骚扰联系人信息发送给所述客户端。The sending unit is further configured to send the basic harassment contact information to the client. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-5中的任一项所述的骚扰联系人信息发布方法。A computer program comprising computer readable code, when said computer readable code is run on a computing device, causing said computing device to perform the issuance of harassment contact information according to any one of claims 1-5 method. 一种计算机可读介质,其中存储了如权利要求11所述的计算机程序。 A computer readable medium storing the computer program of claim 11.
PCT/CN2015/099575 2015-03-25 2015-12-29 Nuisance contact information releasing method and apparatus Ceased WO2016150221A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510134765.9 2015-03-25
CN201510134765.9A CN106161730B (en) 2015-03-25 2015-03-25 Harassment contact information publishing method and device

Publications (1)

Publication Number Publication Date
WO2016150221A1 true WO2016150221A1 (en) 2016-09-29

Family

ID=56977457

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/099575 Ceased WO2016150221A1 (en) 2015-03-25 2015-12-29 Nuisance contact information releasing method and apparatus

Country Status (2)

Country Link
CN (1) CN106161730B (en)
WO (1) WO2016150221A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls
US20130316744A1 (en) * 2012-05-27 2013-11-28 Qualcomm Incorporated Notification based on user context
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100586112C (en) * 2006-05-31 2010-01-27 阿里巴巴集团控股有限公司 Method for establishing contact list and managing contact information in instant messaging
CN101404607B (en) * 2008-11-19 2011-04-13 腾讯科技(深圳)有限公司 Method, apparatus and system for updating data
AU2010285928B2 (en) * 2009-08-17 2014-03-13 Astro Suri Holdings Inc. Information update system
CN104469012B (en) * 2014-12-11 2016-09-21 北京奇虎科技有限公司 Mobile communication terminal is harassed store method and the mobile communication terminal of address

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130316744A1 (en) * 2012-05-27 2013-11-28 Qualcomm Incorporated Notification based on user context
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103037062A (en) * 2012-12-07 2013-04-10 中国联合网络通信集团有限公司 Method and terminal and server used for intercepting crank calls
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system

Also Published As

Publication number Publication date
CN106161730B (en) 2020-02-14
CN106161730A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
US20210006937A1 (en) Systems and methods for deploying dynamic geo-fences based on content consumption levels in a geographic location
US10097420B2 (en) Method and apparatus for determining area in which IP address is located
CN103001826B (en) The equipment logged in for monitor user ' and method
CN103648089B (en) Anti-theft processing method and anti-theft processing device for mobile equipment
US9544721B2 (en) Address point data mining
CN102546656B (en) Method, system and device for finding user in social network
US20150073709A1 (en) Point of Interest Location Determination Based on Application Usage
CN103873269A (en) Group joining method and system
WO2016101749A1 (en) Method and device for configuring communication groups
CN105447129B (en) Personalized content acquisition method, user attribute mining method, system and device
CN103631888B (en) Multi-data source data searching method and device based on positions
CN106411878B (en) Method, device and system for making access control strategy
US10630799B2 (en) Method and apparatus for pushing information
WO2016127881A1 (en) Positioning method and apparatus
CN107454126B (en) Message pushing method, server and terminal
WO2016150108A1 (en) Resource information pushing method and apparatus
TW201611635A (en) Method and system for determining relationship between users based on physical addresses of wireless signal sources
CN111782897A (en) User rights management method, server, system, device and medium
CN105072169A (en) Intelligent information display system of culture exhibition hall
WO2020119269A1 (en) User position determination method and apparatus, device, and computer readable storage medium
CN103618810B (en) A kind of IP address recognition methods of CDN source station and device
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
WO2016150221A1 (en) Nuisance contact information releasing method and apparatus
WO2019242279A1 (en) Message processing method and device
CN103618996B (en) Position data processing method, client and server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15886143

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15886143

Country of ref document: EP

Kind code of ref document: A1