Friend message shielding method and device based on address list

An address book and message technology, applied in the network field, can solve the problems of inconvenient operation and use, low possibility of realization, troublesome operation, etc., and achieve the effect of enhancing personal experience, improving applicability, and high practicability

Inactive Publication Date: 2015-10-21
GUANGZHOU IAROUND NETWORK TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially when blocking friends in other applications, it is necessary to manually find the friends to be blocked by comparison, which brings great inconvenience to the user's operation and use
If two friend users mutually block the messages sent by each other, they need to set stealth respectively, the synchronization is poor, and the possibility of realization is low, and the operation is troublesome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Friend message shielding method and device based on address list
  • Friend message shielding method and device based on address list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] An embodiment of the present invention provides a method for blocking friend messages based on an address book, refer to figure 1 As shown, the method includes:

[0047] S101. Obtain the first address book of the user's mobile terminal, where the first address book is the address book of the first application program;

[0048] S102. Determine at least one object to be shielded according to the first address book and the pre-stored second address book, where the second address book is the address book of the second application program;

[0049] S103. Execute a screening policy corresponding to at least one object to be screened.

[0050] Wherein, obtaining the first address book of the mobile terminal includes:

[0051]Sending a request instruction for obtaining the first address book of the mobile terminal to the user; the request instruction is used to instruct the mobile terminal to upload the first address book to the server;

[0052] After receiving the request i...

Embodiment 2

[0065] An embodiment of the present invention provides a method for shielding friend messages based on an address book, referring to figure 1 As shown, the method includes:

[0066] S101. Acquire a first address book of a mobile terminal of a user, where the first address book is an address book of a first application program.

[0067] Wherein, the first address book may be an address book in the user's mobile phone or other mobile terminal, or may be an address book in an application program in the mobile phone or other mobile terminal.

[0068] Specifically, the process of obtaining the first address book on the server side may be as follows:

[0069] The server sends to the user a request instruction for acquiring the first address book of the mobile terminal; the request instruction is used to instruct the mobile device to upload the first address book to the server;

[0070] After receiving the request instruction, the mobile device displays the authorization request to...

Embodiment 3

[0132] This embodiment provides a friend message shielding device based on the address book, refer to figure 2 As shown, the device 2 includes:

[0133] The acquiring module 201 is configured to acquire the first address book of the user's mobile terminal, where the first address book is the address book of the first application program;

[0134] The processing module 202 is configured to determine at least one object to be shielded according to the first address book and the pre-stored second address book, the second address book being the address book of the second application program;

[0135] An execution module 203, configured to execute a screening policy corresponding to at least one object to be screened.

[0136] The acquisition module 201 includes:

[0137] The server module sends to the user a request instruction for obtaining the first address book of the mobile terminal; the request instruction is used to instruct the mobile terminal to upload the first address...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a friend message shielding method and device based on an address list and belongs to the network field. The method comprises the following steps: obtaining a first address list of a user mobile terminal, wherein the first address list is the address list of a first application program; determining at least one object to be shielded according to the first address list and a pre-stored second address list, wherein the second address list is the address list of a second application program; and executing a shielding strategy corresponding to the at least one object to be shielded. The technical scheme can realize bidirectional message shielding between friends, thereby simplifying operation of a user, protecting privacy safety of the user and enhancing user experience.

Description

technical field [0001] The invention relates to the network field, in particular to an address book-based friend message shielding method and device. Background technique [0002] With the popularity of strangers' social interaction, more and more users interact with other people through strangers' social interaction. In strangers' social interaction, users' attention and sharing information needs to be more private, and they don't want to be seen by familiar people. arrive. If a user wants a friend not to see the messages he sends, he needs to set the friend or several friends to be invisible. [0003] In the prior art, if the user unilaterally sets invisibility, he can still receive and browse the messages sent by the friend, and can still be seen by other friends. Especially when blocking friends in other applications, it is necessary to manually find the friends to be blocked by comparison, which brings great inconvenience to the user's operation and use. If two frien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58
Inventor 潘晓旭
Owner GUANGZHOU IAROUND NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products